blob: efaed39b0a1e571eb80a38887090fe8f71a33fd1 [file] [log] [blame]
nayna-patel755d8142013-07-16 06:45:34 +00001# Copyright 2013 OpenStack Foundation
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
16from tempest.api.identity import base
Masayuki Igawa259c1132013-10-31 17:48:44 +090017from tempest.common.utils import data_utils
nayna-patel755d8142013-07-16 06:45:34 +000018from tempest.test import attr
19
20
21class RolesV3TestJSON(base.BaseIdentityAdminTest):
22 _interface = 'json'
23
24 @classmethod
25 def setUpClass(cls):
26 super(RolesV3TestJSON, cls).setUpClass()
27 cls.fetched_role_ids = list()
Masayuki Igawa259c1132013-10-31 17:48:44 +090028 u_name = data_utils.rand_name('user-')
nayna-patel755d8142013-07-16 06:45:34 +000029 u_desc = '%s description' % u_name
30 u_email = '%s@testmail.tm' % u_name
Masayuki Igawa259c1132013-10-31 17:48:44 +090031 u_password = data_utils.rand_name('pass-')
nayna-patel755d8142013-07-16 06:45:34 +000032 resp = [None] * 5
33 resp[0], cls.project = cls.v3_client.create_project(
Masayuki Igawa259c1132013-10-31 17:48:44 +090034 data_utils.rand_name('project-'),
35 description=data_utils.rand_name('project-desc-'))
nayna-patel755d8142013-07-16 06:45:34 +000036 resp[1], cls.domain = cls.v3_client.create_domain(
Masayuki Igawa259c1132013-10-31 17:48:44 +090037 data_utils.rand_name('domain-'),
38 description=data_utils.rand_name('domain-desc-'))
nayna-patel755d8142013-07-16 06:45:34 +000039 resp[2], cls.group_body = cls.v3_client.create_group(
Masayuki Igawa259c1132013-10-31 17:48:44 +090040 data_utils.rand_name('Group-'), project_id=cls.project['id'],
nayna-patel755d8142013-07-16 06:45:34 +000041 domain_id=cls.domain['id'])
42 resp[3], cls.user_body = cls.v3_client.create_user(
43 u_name, description=u_desc, password=u_password,
44 email=u_email, project_id=cls.project['id'],
45 domain_id=cls.domain['id'])
Masayuki Igawa259c1132013-10-31 17:48:44 +090046 resp[4], cls.role = cls.v3_client.create_role(
47 data_utils.rand_name('Role-'))
nayna-patel755d8142013-07-16 06:45:34 +000048 for r in resp:
49 assert r['status'] == '201', "Expected: %s" % r['status']
50
51 @classmethod
52 def tearDownClass(cls):
53 resp = [None] * 5
54 resp[0], _ = cls.v3_client.delete_role(cls.role['id'])
55 resp[1], _ = cls.v3_client.delete_group(cls.group_body['id'])
56 resp[2], _ = cls.v3_client.delete_user(cls.user_body['id'])
57 resp[3], _ = cls.v3_client.delete_project(cls.project['id'])
Chang Bo Guof099f802013-09-13 19:01:46 -070058 # NOTE(harika-vakadi): It is necessary to disable the domain
nayna-patel755d8142013-07-16 06:45:34 +000059 # before deleting,or else it would result in unauthorized error
60 cls.v3_client.update_domain(cls.domain['id'], enabled=False)
61 resp[4], _ = cls.v3_client.delete_domain(cls.domain['id'])
62 for r in resp:
63 assert r['status'] == '204', "Expected: %s" % r['status']
64 super(RolesV3TestJSON, cls).tearDownClass()
65
66 def _list_assertions(self, resp, body, fetched_role_ids, role_id):
67 self.assertEqual(resp['status'], '200')
68 self.assertEqual(len(body), 1)
69 self.assertIn(role_id, fetched_role_ids)
70
71 @attr(type='smoke')
72 def test_role_create_update_get(self):
Masayuki Igawa259c1132013-10-31 17:48:44 +090073 r_name = data_utils.rand_name('Role-')
nayna-patel755d8142013-07-16 06:45:34 +000074 resp, role = self.v3_client.create_role(r_name)
75 self.addCleanup(self.v3_client.delete_role, role['id'])
76 self.assertEqual(resp['status'], '201')
77 self.assertIn('name', role)
78 self.assertEqual(role['name'], r_name)
79
Masayuki Igawa259c1132013-10-31 17:48:44 +090080 new_name = data_utils.rand_name('NewRole-')
nayna-patel755d8142013-07-16 06:45:34 +000081 resp, updated_role = self.v3_client.update_role(new_name, role['id'])
82 self.assertEqual(resp['status'], '200')
83 self.assertIn('name', updated_role)
84 self.assertIn('id', updated_role)
85 self.assertIn('links', updated_role)
86 self.assertNotEqual(r_name, updated_role['name'])
87
88 resp, new_role = self.v3_client.get_role(role['id'])
89 self.assertEqual(resp['status'], '200')
90 self.assertEqual(new_name, new_role['name'])
91 self.assertEqual(updated_role['id'], new_role['id'])
92
93 @attr(type='smoke')
94 def test_grant_list_revoke_role_to_user_on_project(self):
95 resp, _ = self.v3_client.assign_user_role_on_project(
96 self.project['id'], self.user_body['id'], self.role['id'])
97 self.assertEqual(resp['status'], '204')
98
99 resp, roles = self.v3_client.list_user_roles_on_project(
100 self.project['id'], self.user_body['id'])
101
102 for i in roles:
103 self.fetched_role_ids.append(i['id'])
104
105 self._list_assertions(resp, roles, self.fetched_role_ids,
106 self.role['id'])
107
108 resp, _ = self.v3_client.revoke_role_from_user_on_project(
109 self.project['id'], self.user_body['id'], self.role['id'])
110 self.assertEqual(resp['status'], '204')
111
112 @attr(type='smoke')
113 def test_grant_list_revoke_role_to_user_on_domain(self):
114 resp, _ = self.v3_client.assign_user_role_on_domain(
115 self.domain['id'], self.user_body['id'], self.role['id'])
116 self.assertEqual(resp['status'], '204')
117
118 resp, roles = self.v3_client.list_user_roles_on_domain(
119 self.domain['id'], self.user_body['id'])
120
121 for i in roles:
122 self.fetched_role_ids.append(i['id'])
123
124 self._list_assertions(resp, roles, self.fetched_role_ids,
125 self.role['id'])
126
127 resp, _ = self.v3_client.revoke_role_from_user_on_domain(
128 self.domain['id'], self.user_body['id'], self.role['id'])
129 self.assertEqual(resp['status'], '204')
130
131 @attr(type='smoke')
132 def test_grant_list_revoke_role_to_group_on_project(self):
133 resp, _ = self.v3_client.assign_group_role_on_project(
134 self.project['id'], self.group_body['id'], self.role['id'])
135 self.assertEqual(resp['status'], '204')
136
137 resp, roles = self.v3_client.list_group_roles_on_project(
138 self.project['id'], self.group_body['id'])
139
140 for i in roles:
141 self.fetched_role_ids.append(i['id'])
142
143 self._list_assertions(resp, roles, self.fetched_role_ids,
144 self.role['id'])
145
146 resp, _ = self.v3_client.revoke_role_from_group_on_project(
147 self.project['id'], self.group_body['id'], self.role['id'])
148 self.assertEqual(resp['status'], '204')
149
150 @attr(type='smoke')
151 def test_grant_list_revoke_role_to_group_on_domain(self):
152 resp, _ = self.v3_client.assign_group_role_on_domain(
153 self.domain['id'], self.group_body['id'], self.role['id'])
154 self.assertEqual(resp['status'], '204')
155
156 resp, roles = self.v3_client.list_group_roles_on_domain(
157 self.domain['id'], self.group_body['id'])
158
159 for i in roles:
160 self.fetched_role_ids.append(i['id'])
161
162 self._list_assertions(resp, roles, self.fetched_role_ids,
163 self.role['id'])
164
165 resp, _ = self.v3_client.revoke_role_from_group_on_domain(
166 self.domain['id'], self.group_body['id'], self.role['id'])
167 self.assertEqual(resp['status'], '204')
168
169
170class RolesV3TestXML(RolesV3TestJSON):
171 _interface = 'xml'