Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tracking Testing Results for v.0.14.0 #446

Closed
davitol opened this issue Aug 6, 2019 · 2 comments
Closed

Tracking Testing Results for v.0.14.0 #446

davitol opened this issue Aug 6, 2019 · 2 comments

Comments

@davitol
Copy link
Contributor

davitol commented Aug 6, 2019

'LDAP' Test Plan

Testing functionality

ldap:test-config

  • Run occ command ldap:test-config with a valid configID
  • Run occ command ldap:test-config with a wrong host
  • Run occ command ldap:test-config with empty password
  • Run occ command ldap:test-config with invalid configID

ldap:show-config

  • Run occ command ldap:show-config with no parameters
  • Run occ command ldap:show-config with valid configID
  • Run occ command ldap:show-config with invalid configID
  • Run occ command ldap:show-config with show-password flag
  • Run occ command ldap:show-config without show-password flag

ldap:set-config

  • Run occ command ldap:set-config with invalid configID
  • Run occ command ldap:set-config with valid configID

ldap:search

  • Run occ command ldap:search with valid configuration and no params
  • Run occ command ldap:search with valid configuration and longer limit
  • Run occ command ldap:search with offset multiple of limit (both positive)
  • Run occ command ldap:search name (default configuration)
  • Run occ command ldap:search name (fixed configuration – added “displayName” and/or other attributes in the User Search Attributes field in the wizard)
  • Run occ command ldap:search group (fixed configuration – added “displayName” and/or other attributes in the Group Search Attributes field in the wizard)
  • Run occ command ldap:search Group without search

ldap:check-user

  • Run occ command ldap:check-user with a good oC user id
  • Run occ command ldap:check-user with a wrong oC user id
  • Run occ command ldap:check-user with a good oC user id + 1 disabled configuration
  • Run occ command ldap:check-user Good oc user id + 1 disabled configuration (another one active) + force option
  • Run occ command ldap:check-user Good oc user id + all disabled configuration + force option; then enable the configuration and recheck

ldap:create-empty-config

  • Run occ command ldap:create-empty-config

ldap:delete-config

  • Run occ command ldap:delete-config

ldap:update-group

  • ❓ Run occ command ldap:update-group Deprecated ?

LDAP quota

If both LDAP quota field and default LDAP quota are set

  • The user has a value for the LDAP quota attribute
  • The user doesn't have a value for the LDAP quota attribute or the value can't be parsed correctly,
  • the user doesn't have a value for the LDAP quota attribute or the value can't be parsed correctly, and the default LDAP quota can't be parsed correctly

The LDAP quota field is empty and the default LDAP quota is set

  • If default LDAP quota can be parsed correctly
  • If default LDAP quota can't be parsed correctly

If the LDAP quota field isn't empty and the LDAP default quota isn't set

  • The user has a value for the attribute
  • The user hasn't a value for the attribute

If neither the LDAP quota field nor the default LDAP quota is set

  • If neither the LDAP quota field nor the default LDAP quota is set

Several LDAP servers

  • Setup and configure 2 LDAP servers correctly
  • Setup and configure 2 LDAP servers correctly, shutdown / disconnect one of them
  • Setup and configure 2 LDAP servers correctly, making sure that at least one user is “shared” in both servers (uid and display name are the same, with different password)
  • Setup and configure 2 LDAP servers correctly, making sure that at least one user is “shared” in both servers (uid and display name are the same, with different password), and change in the LDAP wizard the internal username to “uid” (to force a collision)
  • Setup and configure 2 LDAP servers correctly, making sure that at least one user is “shared” in both servers (uid and display name are the same, an also with the same password)
  • Setup a Backup (Replica) Host, a Backup (Replica) Port and Disable/Shutdown the Main Server

Test LDAP properties

  • email Set a field as mail in advanced tab
  • avatar Login with a user with an avatar field set in LDAP backend
  • nested group In advanced tab , check nested groups checkbox
  • internalUserAttribute In expert tab , set an attribute as Internal Username

LDAP Scenarios integrated with external Storage

  • External Storage General Mount an external storage using login credentials save in session
  • External Storage Personal Mount an external storage using login credentials save in session
  • WND Mount Point General Mount a WND mountpoint using a user from an Active Directory
  • WND Mount Point Personal Mount a WND mountpoint using a user from an Active Directory

User account table integration

  • occ user:sync Run occ user:sync -l
  • occ user:sync Run occ user:sync "OCA\User_LDAP\User_Proxy"
  • occ user:sync Make changes in oC backend and ReRun occ user:sync "OCA\User_LDAP\User_Proxy" choosing disabling accounts option
  • occ user:sync Make changes in oC backend and ReRun occ user:sync "OCA\User_LDAP\User_Proxy" choosing deleting accounts option

Wizard General

  • default configuration: host + port + admin + pass+ base DN + default filters
  • configuration: port with string (rest as defaults)
  • configuration: wrong credentials
  • configuration: from valid config, change to a wrong url and change back to the good ones
  • [ x user filter: choose one of the “only those object” select
  • user filter: choose one of the “only those object” select
  • user filter: edit raw filter (tested with (|(&(objectclass=inetOrgPerson)(sn=a*))))
  • user filter: edit raw filter (tested with (|(&(objectclass=inetOrgPerson)(sn=a*))))
  • login filter: checked with LDAP username (uid)
  • login filter: checked with LDAP username (uid) and raw filter based on the user filter (tested with (|(&(objectclass=inetOrgPerson)(sn=a*))))
  • login filter: checked with LDAP username (uid) and with LDAP email

Wizard Configuration Server

  • 1. Have LDAP running on a standard port
    2. Enter Hostname
    3. Click “Detect Port”
  • 1. Have LDAP running on a standard port
    2. Enter Hostname
    3. Enter a wrong port
    4. Click “Detect Port”
  • 1. Have LDAP running on a non-standard port
    2. Enter Hostname
    3. Enter a wrong port 4. Click “Detect Port”
  • 1. Have LDAP running on a non-standard port
    2. Enter Hostname
    3. Enter the correct port
    4. Click “Detect Port”
  • 1. Have the host and port configured correctly
    2. Click “Detect Base DN”
  • 1. Have the host, port, user dn and password configured correctly
    2. Click “Detect Base DN”
  • 1. Have a valid Base DN (and Host, Port, User, Password)
    2. Click “Test Base DN”
  • 1. Have Basic tab completed correctly
    2. “Manually enter LDAP filters” is disabled
    3. Move to Users tab
  • 1. Have Basic tab completed correctly
    2. “Manually enter LDAP filters” is enabled
    3. Move to Users tab

Wizard Configuration Users

  • 1. “Manually enter LDAP filters” is enabled
    2. The input field for manually writing LDAP filter is shown
  • (“raw mode”)
    3. Click on “Edit LDAP Query”
  • 1a. “Manually enter LDAP filters” is enabled and assisted mode is active
    1b. or “Manually enter LDAP filters” is disabled
    3. Click on “Edit LDAP Query”
  • 1. In Assisted Mode, click the “edit LDAP query” having selected an object class
    2. Click again in the “edit LDAP query”
    3. Select another object class keeping the old class
  • 1. Be in Assisted Mode
    2. Open object class multiselect
    3. Change values up to your choice and close it
  • 1. Be in Assisted Mode, LDAP server supports memberof,Less than 40 groups available
    2. Open group multiselect
    3. Change values up to your choice and close it
  • 1. Be in Assisted Mode, LDAP server supports memberof, At least 40 groups available
  • 1. Have the extended group selector
    2. Perform search with the search input field
  • 1. Have the extended group selector
    2. Select one or more groups in the “available groups” list
    3. Click the “>” button
  • 1. Have the extended group selector
    2. Select one or more groups in the “available groups” list
    3. Click the “<” button
  • 1. Have a properly set up filter
    2. Click on “Verify settings and count users”
  • 1. Have a filter set up that does not return users
    2. Click on “Verify settings and count users”

Wizard Configuration login

  • 1. Have Basic and Users tab completed correctly
    2. “Manually enter LDAP filters” is disabled
    3. Move to Login Attributes tab
  • 1. Have Basic and Users tab completed correctly
    2. “Manually enter LDAP filters” is enabled
    3. Move to Login Attributes tab
  • 1. “Manually enter LDAP filters” is enabled
    2. The input field for manually writing LDAP filter is shown (“raw mode”)
    3. Click on “Edit LDAP Query”
  • 1a. “Manually enter LDAP filters” is enabled and assisted mode is active
    1b. or “Manually enter LDAP filters” is disabled
    3. Click on “Edit LDAP Query”
  • 1. In Assisted Mode, click the “edit LDAP query” having selected an attribute
    2. Click again in the “edit LDAP query”
    3. Select another attribute keeping the old attribute
  • 1. Be in Assisted Mode
    2. Open other attributes multiselect
    3. Change values up to your choice and close it
  • 1. Be in Assisted Mode
    2. (Un)check LDAP / AD Username
  • 1. Be in Assisted Mode
    2. (Un)check LDAP / AD Email address
  • 1. Have a properly set up filter
    2. Enter a valid “Test Loginname”
    3. Click on “Verify settings”
  • 1. Have a properly set up filter
    2. Enter an invalid “Test Loginname”
    3. Click on “Verify settings”

Wizard Configuration groups

  • 1. Have other tabs completed correctly
    2. “Manually enter LDAP filters” is disabled
    3. Move to Groups tab
  • 1. Have other tabs completed correctly
    2. “Manually enter LDAP filters” is enabled
    3. Move to Groups tab
  • 1. “Manually enter LDAP filters” is enabled
    2. The input field for manually writing LDAP filter is shown
  • (“raw mode”)
    3. Click on “Edit LDAP Query”
  • 1a. “Manually enter LDAP filters” is enabled and assisted mode is active
    1b. or “Manually enter LDAP filters” is disabled
    3. Click on “Edit LDAP Query”
  • 1. Be in Assisted Mode
    2. Open object class multiselect
    3. Change values up to your choice and close it
  • 1. Be in Assisted Mode, Less than 40 groups available
    2. Open group multiselect
    3. Change values up to your choice and close it
  • 1. Be in Assisted Mode, at least 40 groups available.
  • 1. Have the extended group selector.
    2. Perform search with the search input field
  • 1. Have the extended group selector 2. Select one or more groups in the “available groups” list 3. Click the “>” button
  • 1. Have the extended group selector
    2. Select one or more groups in the “selected groups” list
    3. Click the “<” button
  • 1. Have a properly set up filter
    2. Click on “Verify settings and count groups”
  • 1. Have a filter set up that does not return groups
    2. Click on “Verify settings and count groups”

Wizard Configuration Advanced

  • 1. Have other tabs completed correctly
    2. Go to Advanced Tab
    3. Be in Connection Settings
  • 1. Have other tabs completed correctly
    2. Go to Advanced Tab
    3. Open Directory Settings
  • 1. Have other tabs completed correctly
    2. Go to Advanced Tab
    3. Open Special Attributes
  • 1. Change anything in advanced tab
    2. Reload
  • Click on “Test configuration”
  • Click button to clear user mappings
  • Click button to clear group mappings

Wizard Configuration Chooser

  • Click on “+” Button
  • Click on Clone Button
  • Click on Delete Button
  • Select a different configuration from the drop down
@davitol davitol added the QA:team label Aug 6, 2019
@davitol davitol added this to the qa milestone Aug 6, 2019
@davitol davitol self-assigned this Aug 6, 2019
@davitol
Copy link
Contributor Author

davitol commented Aug 6, 2019

Changelog

Added

Changed

  • Allow avatars to be changed by users if not provided by LDAP - #188 @davitol
  • Remove PHP 5.6 support - #388 @davitol
  • Clean up Application initialization code - #396
  • Remove unused use statements - #399 #400 @davitol Test steps: Check that unused code was deleted
  • Simplify connection: Get rid of init method #437 @davitol Just removes some over-engineering in the process of connection establishment. Not tested this code is involved in the connection establishment for any test case.
  • Replace magic numbers with constants #435 @davitol Not testable, just checked the changes in the code

Fixed

@davitol
Copy link
Contributor Author

davitol commented Aug 6, 2019

Issues found while QA

@PVince81 PVince81 mentioned this issue Aug 7, 2019
38 tasks
@micbar micbar added the p2-high label Oct 10, 2019
@davitol davitol closed this as completed Nov 7, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants