| #include "mock_user_mgr.hpp" |
| |
| #include <sdbusplus/test/sdbus_mock.hpp> |
| #include <xyz/openbmc_project/Common/error.hpp> |
| #include <xyz/openbmc_project/User/Common/error.hpp> |
| |
| #include <exception> |
| |
| #include <gtest/gtest.h> |
| |
| namespace phosphor |
| { |
| namespace user |
| { |
| |
| using ::testing::Return; |
| |
| using InternalFailure = |
| sdbusplus::xyz::openbmc_project::Common::Error::InternalFailure; |
| |
| class TestUserMgr : public testing::Test |
| { |
| public: |
| sdbusplus::SdBusMock sdBusMock; |
| sdbusplus::bus_t bus; |
| MockManager mockManager; |
| |
| TestUserMgr() : |
| bus(sdbusplus::get_mocked_new(&sdBusMock)), mockManager(bus, objpath) |
| {} |
| |
| void createLocalUser(const std::string& userName, |
| std::vector<std::string> groupNames, |
| const std::string& priv, bool enabled) |
| { |
| sdbusplus::message::object_path tempObjPath(usersObjPath); |
| tempObjPath /= userName; |
| std::string userObj(tempObjPath); |
| mockManager.usersList.emplace( |
| userName, std::make_unique<phosphor::user::Users>( |
| mockManager.bus, userObj.c_str(), groupNames, priv, |
| enabled, mockManager)); |
| } |
| |
| DbusUserObj createPrivilegeMapperDbusObject(void) |
| { |
| DbusUserObj object; |
| DbusUserObjValue objValue; |
| |
| DbusUserObjPath objPath("/xyz/openbmc_project/user/ldap/openldap"); |
| DbusUserPropVariant enabled(true); |
| DbusUserObjProperties property = {std::make_pair("Enabled", enabled)}; |
| std::string intf = "xyz.openbmc_project.Object.Enable"; |
| objValue.emplace(intf, property); |
| object.emplace(objPath, objValue); |
| |
| DbusUserObjPath objectPath( |
| "/xyz/openbmc_project/user/ldap/openldap/role_map/1"); |
| std::string group = "ldapGroup"; |
| std::string priv = "priv-admin"; |
| DbusUserObjProperties properties = {std::make_pair("GroupName", group), |
| std::make_pair("Privilege", priv)}; |
| std::string interface = "xyz.openbmc_project.User.PrivilegeMapperEntry"; |
| |
| objValue.emplace(interface, properties); |
| object.emplace(objectPath, objValue); |
| |
| return object; |
| } |
| |
| DbusUserObj createLdapConfigObjectWithoutPrivilegeMapper(void) |
| { |
| DbusUserObj object; |
| DbusUserObjValue objValue; |
| |
| DbusUserObjPath objPath("/xyz/openbmc_project/user/ldap/openldap"); |
| DbusUserPropVariant enabled(true); |
| DbusUserObjProperties property = {std::make_pair("Enabled", enabled)}; |
| std::string intf = "xyz.openbmc_project.Object.Enable"; |
| objValue.emplace(intf, property); |
| object.emplace(objPath, objValue); |
| return object; |
| } |
| }; |
| |
| TEST_F(TestUserMgr, ldapEntryDoesNotExist) |
| { |
| std::string userName = "user"; |
| UserInfoMap userInfo; |
| |
| EXPECT_CALL(mockManager, getLdapGroupName(userName)) |
| .WillRepeatedly(Return("")); |
| EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), InternalFailure); |
| } |
| |
| TEST_F(TestUserMgr, localUser) |
| { |
| UserInfoMap userInfo; |
| std::string userName = "testUser"; |
| std::string privilege = "priv-admin"; |
| std::vector<std::string> groups{"testGroup"}; |
| // Create local user |
| createLocalUser(userName, groups, privilege, true); |
| EXPECT_CALL(mockManager, userLockedForFailedAttempt(userName)).Times(1); |
| userInfo = mockManager.getUserInfo(userName); |
| |
| EXPECT_EQ(privilege, std::get<std::string>(userInfo["UserPrivilege"])); |
| EXPECT_EQ(groups, |
| std::get<std::vector<std::string>>(userInfo["UserGroups"])); |
| EXPECT_EQ(true, std::get<bool>(userInfo["UserEnabled"])); |
| EXPECT_EQ(false, std::get<bool>(userInfo["UserLockedForFailedAttempt"])); |
| EXPECT_EQ(false, std::get<bool>(userInfo["UserPasswordExpired"])); |
| EXPECT_EQ(false, std::get<bool>(userInfo["RemoteUser"])); |
| } |
| |
| TEST_F(TestUserMgr, ldapUserWithPrivMapper) |
| { |
| UserInfoMap userInfo; |
| std::string userName = "ldapUser"; |
| std::string ldapGroup = "ldapGroup"; |
| |
| EXPECT_CALL(mockManager, getLdapGroupName(userName)) |
| .WillRepeatedly(Return(ldapGroup)); |
| // Create privilege mapper dbus object |
| DbusUserObj object = createPrivilegeMapperDbusObject(); |
| EXPECT_CALL(mockManager, getPrivilegeMapperObject()) |
| .WillRepeatedly(Return(object)); |
| userInfo = mockManager.getUserInfo(userName); |
| EXPECT_EQ(true, std::get<bool>(userInfo["RemoteUser"])); |
| EXPECT_EQ("priv-admin", std::get<std::string>(userInfo["UserPrivilege"])); |
| } |
| |
| TEST_F(TestUserMgr, ldapUserWithoutPrivMapper) |
| { |
| UserInfoMap userInfo; |
| std::string userName = "ldapUser"; |
| std::string ldapGroup = "ldapGroup"; |
| |
| EXPECT_CALL(mockManager, getLdapGroupName(userName)) |
| .WillRepeatedly(Return(ldapGroup)); |
| // Create LDAP config object without privilege mapper |
| DbusUserObj object = createLdapConfigObjectWithoutPrivilegeMapper(); |
| EXPECT_CALL(mockManager, getPrivilegeMapperObject()) |
| .WillRepeatedly(Return(object)); |
| userInfo = mockManager.getUserInfo(userName); |
| EXPECT_EQ(true, std::get<bool>(userInfo["RemoteUser"])); |
| EXPECT_EQ("", std::get<std::string>(userInfo["UserPrivilege"])); |
| } |
| } // namespace user |
| } // namespace phosphor |