
This patch provides support for assigning and unassigning roles to group on domain or project. Change-Id: If7b8c54720f3bcab2da71bbd8ca088ac572e382a (cherry picked from commit ed887d10b8f139b4a23e9f259957aad357464715)
183 lines
7.6 KiB
Python
Executable File
183 lines
7.6 KiB
Python
Executable File
# Copyright 2016 AT&T Corp
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the 'License'); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an 'AS IS' BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import random
|
|
|
|
from ranger_tempest_plugin.tests.api import grp_base
|
|
from tempest import config
|
|
from tempest.lib import decorators
|
|
from tempest.lib import exceptions
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class TestTempestGrp(grp_base.GrpBaseOrmTest):
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
cls.setup_customer_params = cls._get_customer_params()
|
|
cls.setup_customer_id = \
|
|
cls._create_cust_validate_creation_on_dcp_and_lcp(
|
|
**cls.setup_customer_params)
|
|
|
|
cls.setup_group = cls._get_group_params()
|
|
cls.setup_group_id = \
|
|
cls._create_grp_validate_creation_on_dcp_and_lcp(
|
|
**cls.setup_group)
|
|
super(TestTempestGrp, cls).resource_setup()
|
|
|
|
@classmethod
|
|
def resource_cleanup(cls):
|
|
cls._del_group_validate_deletion_on_dcp_and_lcp(cls.setup_group_id)
|
|
|
|
cls._del_cust_validate_deletion_on_dcp_and_lcp(
|
|
cls.setup_customer_id)
|
|
|
|
super(TestTempestGrp, cls).resource_cleanup()
|
|
|
|
@decorators.idempotent_id('deeb3b8a-fb38-46e1-97ba-c878b0ba890f')
|
|
def test_get_group(self):
|
|
""" Execute 'get_group' using the following options:
|
|
- get group by id
|
|
- get group by name
|
|
"""
|
|
|
|
# execute get_group using group id and group name
|
|
for identifier in [self.setup_group_id,
|
|
self.setup_group['name']]:
|
|
_, body = self.grp_client.get_group(identifier)
|
|
self.assertIn(self.setup_group_id, body['uuid'])
|
|
|
|
@decorators.idempotent_id('8068e33f-a6aa-416a-9505-048c6ad037b2')
|
|
def test_list_groups_with_filters(self):
|
|
""" This function executes 'list groups' with all available filters:
|
|
- no filter (i.e. list all groups)
|
|
- filter by region
|
|
- group name contains a substring
|
|
- group name starts_with a string
|
|
"""
|
|
|
|
# format filter parameter values
|
|
region_name = [
|
|
region['name'] for region in self.setup_group['regions']]
|
|
group_name = self.setup_group['name']
|
|
substr_name = random.randint(0, len(group_name))
|
|
|
|
# define the list groups filters to be used for this test
|
|
no_filter = None
|
|
region_filter = {'region': region_name[0]}
|
|
contains_filter = {'contains': group_name[substr_name:]}
|
|
startswith_filter = {'starts_with': group_name[:substr_name]}
|
|
|
|
# execute list_groups with the available filters
|
|
for list_filter in [no_filter, region_filter, contains_filter,
|
|
startswith_filter]:
|
|
_, body = self.grp_client.list_groups(list_filter)
|
|
groups = [grp['id'] for grp in body['groups']]
|
|
self.assertIn(self.setup_group_id, groups)
|
|
|
|
@decorators.idempotent_id('880f614f-6317-4973-a244-f2e44443f551')
|
|
def test_delete_regions(self):
|
|
# setup data for delete_region
|
|
post_body = self._get_group_params()
|
|
region_name = post_body["regions"][0]["name"]
|
|
test_group_id = self._create_grp_validate_creation_on_dcp_and_lcp(
|
|
**post_body)
|
|
self.addCleanup(self._del_group_validate_deletion_on_dcp_and_lcp,
|
|
test_group_id)
|
|
_, group = self.grp_client.get_group(test_group_id)
|
|
self.assertTrue(group["regions"])
|
|
_, body = self.grp_client.delete_groups_region(test_group_id,
|
|
region_name)
|
|
self._wait_for_group_status(test_group_id, 'no regions')
|
|
_, group = self.grp_client.get_group(test_group_id)
|
|
self.assertFalse(group["regions"])
|
|
|
|
@decorators.idempotent_id('bba25028-d962-47df-9566-557eec48f22d')
|
|
def test_create_group(self):
|
|
post_body = self._get_group_params()
|
|
test_group_name = post_body['name']
|
|
_, body = self.grp_client.create_group(**post_body)
|
|
test_group_id = body['group']['id']
|
|
self.addCleanup(self._del_group_validate_deletion_on_dcp_and_lcp,
|
|
test_group_id)
|
|
self._wait_for_group_status(test_group_id, 'Success')
|
|
_, body = self.grp_client.get_group(test_group_name)
|
|
self.assertIn(test_group_id, body['uuid'])
|
|
|
|
@decorators.idempotent_id('356633f0-c615-4bdc-8f0f-d97b6ca409e0')
|
|
def test_delete_group(self):
|
|
# setup data for test case
|
|
post_body = self._get_group_params()
|
|
test_group_id = self._create_grp_validate_creation_on_dcp_and_lcp(
|
|
**post_body)
|
|
|
|
# delete the data and do get_group to ensure 404-NotFound response
|
|
self._del_group_validate_deletion_on_dcp_and_lcp(test_group_id)
|
|
self.assertRaises(exceptions.NotFound, self.grp_client.get_group,
|
|
test_group_id)
|
|
|
|
@decorators.idempotent_id('afe5c72f-499b-493f-b61b-68bbaca12b7a')
|
|
def test_assign_unassign_role_to_group_on_domain(self):
|
|
role = {
|
|
'roles': ["admin"],
|
|
'domain_name': CONF.ranger.domain
|
|
}
|
|
post_body = [role]
|
|
|
|
_, body = self.grp_client.assign_group_roles(self.setup_group_id,
|
|
*post_body)
|
|
|
|
self._wait_for_group_status(self.setup_group_id, 'Success')
|
|
self.assertEqual(body['roles'][0]['domain_name'], role['domain_name'])
|
|
self.assertEqual(body['roles'][0]['roles'][0], role['roles'][0])
|
|
|
|
_, body = self.grp_client.unassign_group_roles(self.setup_group_id,
|
|
role['roles'][0],
|
|
'domain',
|
|
role['domain_name'])
|
|
|
|
self._wait_for_group_status(self.setup_group_id, 'Success')
|
|
# Once the get groups role function is implemented, it will be
|
|
# added here to retreive the role and call assert to verfify that
|
|
# the role has indeed been unassigned.
|
|
self.assertEqual(body, '')
|
|
|
|
@decorators.idempotent_id('67f5e46e-9267-4cbb-84d6-ee8521370e23')
|
|
def test_assign_unassign_role_to_group_on_project(self):
|
|
role = {
|
|
'roles': ["admin"],
|
|
'project': self.setup_customer_id
|
|
}
|
|
post_body = [role]
|
|
|
|
_, body = self.grp_client.assign_group_roles(self.setup_group_id,
|
|
*post_body)
|
|
|
|
self._wait_for_group_status(self.setup_group_id, 'Success')
|
|
self.assertEqual(body['roles'][0]['project'], role['project'])
|
|
self.assertEqual(body['roles'][0]['roles'][0], role['roles'][0])
|
|
|
|
_, body = self.grp_client.unassign_group_roles(self.setup_group_id,
|
|
role['roles'][0],
|
|
'customer',
|
|
role['project'])
|
|
|
|
self._wait_for_group_status(self.setup_group_id, 'Success')
|
|
# Once the get groups role function is implemented, it will be
|
|
# added here to retreive the role and call assert to verfify that
|
|
# the role has indeed been unassigned.
|
|
self.assertEqual(body, '')
|