nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 1 | # Copyright 2013 OpenStack Foundation |
| 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 15 | import testtools |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 16 | |
| 17 | from tempest.api.identity import base |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 18 | from tempest import config |
Ken'ichi Ohmichi | 7bd2575 | 2017-03-10 10:45:39 -0800 | [diff] [blame] | 19 | from tempest.lib.common.utils import data_utils |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 20 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 21 | from tempest.lib import decorators |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 22 | from tempest.lib import exceptions as lib_exc |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 23 | |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 24 | CONF = config.CONF |
| 25 | |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 26 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 27 | class RolesV3TestJSON(base.BaseIdentityV3AdminTest): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 28 | """Test roles""" |
| 29 | |
Trevor McCasland | 7ea7e0a | 2019-01-17 11:35:39 -0600 | [diff] [blame] | 30 | # NOTE: force_tenant_isolation is true in the base class by default but |
| 31 | # overridden to false here to allow test execution for clouds using the |
| 32 | # pre-provisioned credentials provider. |
| 33 | force_tenant_isolation = False |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 34 | |
| 35 | @classmethod |
Andrea Frittoli | 7688e74 | 2014-09-15 12:38:22 +0100 | [diff] [blame] | 36 | def resource_setup(cls): |
| 37 | super(RolesV3TestJSON, cls).resource_setup() |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 38 | cls.roles = list() |
nayna-patel | c905c18 | 2014-04-21 14:00:32 +0000 | [diff] [blame] | 39 | for _ in range(3): |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 40 | role_name = data_utils.rand_name(name='role') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 41 | role = cls.roles_client.create_role(name=role_name)['role'] |
Trevor McCasland | dbfd7c2 | 2017-11-28 14:32:23 -0600 | [diff] [blame] | 42 | cls.addClassResourceCleanup(cls.roles_client.delete_role, |
| 43 | role['id']) |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 44 | cls.roles.append(role) |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 45 | u_name = data_utils.rand_name('user') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 46 | u_desc = '%s description' % u_name |
| 47 | u_email = '%s@testmail.tm' % u_name |
Zack Feldstein | d8c5f7a | 2015-12-14 10:44:07 -0600 | [diff] [blame] | 48 | cls.u_password = data_utils.rand_password() |
zhufl | 2b33c1a | 2017-04-24 17:33:48 +0800 | [diff] [blame] | 49 | cls.domain = cls.create_domain() |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 50 | cls.project = cls.projects_client.create_project( |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 51 | data_utils.rand_name('project'), |
| 52 | description=data_utils.rand_name('project-desc'), |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 53 | domain_id=cls.domain['id'])['project'] |
Trevor McCasland | dbfd7c2 | 2017-11-28 14:32:23 -0600 | [diff] [blame] | 54 | cls.addClassResourceCleanup(cls.projects_client.delete_project, |
| 55 | cls.project['id']) |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 56 | cls.group_body = cls.groups_client.create_group( |
Yaroslav Lobankov | 45025c0 | 2015-11-19 17:55:15 +0300 | [diff] [blame] | 57 | name=data_utils.rand_name('Group'), project_id=cls.project['id'], |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 58 | domain_id=cls.domain['id'])['group'] |
Trevor McCasland | dbfd7c2 | 2017-11-28 14:32:23 -0600 | [diff] [blame] | 59 | cls.addClassResourceCleanup(cls.groups_client.delete_group, |
| 60 | cls.group_body['id']) |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 61 | cls.role = cls.roles_client.create_role( |
piyush110786 | afaaf26 | 2015-12-11 18:54:05 +0530 | [diff] [blame] | 62 | name=data_utils.rand_name('Role'))['role'] |
Trevor McCasland | dbfd7c2 | 2017-11-28 14:32:23 -0600 | [diff] [blame] | 63 | cls.addClassResourceCleanup(cls.roles_client.delete_role, |
| 64 | cls.role['id']) |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 65 | if not CONF.identity_feature_enabled.immutable_user_source: |
| 66 | cls.user_body = cls.users_client.create_user( |
| 67 | name=u_name, |
| 68 | description=u_desc, |
| 69 | email=u_email, |
| 70 | password=cls.u_password, |
| 71 | domain_id=cls.domain['id'], |
| 72 | project_id=cls.project['id'] |
| 73 | )['user'] |
| 74 | cls.addClassResourceCleanup(cls.users_client.delete_user, |
| 75 | cls.user_body['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 76 | |
Jordan Pittier | 3b46d27 | 2017-04-12 16:17:28 +0200 | [diff] [blame] | 77 | @decorators.attr(type='smoke') |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 78 | @decorators.idempotent_id('18afc6c0-46cf-4911-824e-9989cc056c3a') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 79 | def test_role_create_update_show_list(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 80 | """Test creating, updating, showing and listing a role""" |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 81 | r_name = data_utils.rand_name('Role') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 82 | role = self.roles_client.create_role(name=r_name)['role'] |
| 83 | self.addCleanup(self.roles_client.delete_role, role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 84 | self.assertIn('name', role) |
| 85 | self.assertEqual(role['name'], r_name) |
| 86 | |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 87 | new_name = data_utils.rand_name('NewRole') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 88 | updated_role = self.roles_client.update_role(role['id'], |
| 89 | name=new_name)['role'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 90 | self.assertIn('name', updated_role) |
| 91 | self.assertIn('id', updated_role) |
| 92 | self.assertIn('links', updated_role) |
| 93 | self.assertNotEqual(r_name, updated_role['name']) |
| 94 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 95 | new_role = self.roles_client.show_role(role['id'])['role'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 96 | self.assertEqual(new_name, new_role['name']) |
| 97 | self.assertEqual(updated_role['id'], new_role['id']) |
| 98 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 99 | roles = self.roles_client.list_roles()['roles'] |
wanglianmin | a3e84ea | 2014-03-26 17:30:33 +0800 | [diff] [blame] | 100 | self.assertIn(role['id'], [r['id'] for r in roles]) |
| 101 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 102 | @decorators.idempotent_id('c6b80012-fe4a-498b-9ce8-eb391c05169f') |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 103 | @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source, |
| 104 | 'Skipped because environment has an immutable user ' |
| 105 | 'source and solely provides read-only access to users.') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 106 | def test_grant_list_revoke_role_to_user_on_project(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 107 | """Test granting, listing, revoking role to user on project""" |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 108 | self.roles_client.create_user_role_on_project(self.project['id'], |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 109 | self.user_body['id'], |
| 110 | self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 111 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 112 | roles = self.roles_client.list_user_roles_on_project( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 113 | self.project['id'], self.user_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 114 | |
zhufl | 628642b | 2017-08-01 14:39:34 +0800 | [diff] [blame] | 115 | self.assertEqual(1, len(roles)) |
| 116 | self.assertEqual(self.role['id'], roles[0]['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 117 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 118 | self.roles_client.check_user_role_existence_on_project( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 119 | self.project['id'], self.user_body['id'], self.role['id']) |
| 120 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 121 | self.roles_client.delete_role_from_user_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 122 | self.project['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 123 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 124 | @decorators.idempotent_id('6c9a2940-3625-43a3-ac02-5dcec62ef3bd') |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 125 | @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source, |
| 126 | 'Skipped because environment has an immutable user ' |
| 127 | 'source and solely provides read-only access to users.') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 128 | def test_grant_list_revoke_role_to_user_on_domain(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 129 | """Test granting, listing, revoking role to user on domain""" |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 130 | self.roles_client.create_user_role_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 131 | self.domain['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 132 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 133 | roles = self.roles_client.list_user_roles_on_domain( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 134 | self.domain['id'], self.user_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 135 | |
zhufl | 628642b | 2017-08-01 14:39:34 +0800 | [diff] [blame] | 136 | self.assertEqual(1, len(roles)) |
| 137 | self.assertEqual(self.role['id'], roles[0]['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 138 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 139 | self.roles_client.check_user_role_existence_on_domain( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 140 | self.domain['id'], self.user_body['id'], self.role['id']) |
| 141 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 142 | self.roles_client.delete_role_from_user_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 143 | self.domain['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 144 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 145 | @decorators.idempotent_id('cbf11737-1904-4690-9613-97bcbb3df1c4') |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 146 | @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source, |
| 147 | 'Skipped because environment has an immutable user ' |
| 148 | 'source and solely provides read-only access to users.') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 149 | def test_grant_list_revoke_role_to_group_on_project(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 150 | """Test granting, listing, revoking role to group on project""" |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 151 | # Grant role to group on project |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 152 | self.roles_client.create_group_role_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 153 | self.project['id'], self.group_body['id'], self.role['id']) |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 154 | # List group roles on project |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 155 | roles = self.roles_client.list_group_roles_on_project( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 156 | self.project['id'], self.group_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 157 | |
zhufl | 628642b | 2017-08-01 14:39:34 +0800 | [diff] [blame] | 158 | self.assertEqual(1, len(roles)) |
| 159 | self.assertEqual(self.role['id'], roles[0]['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 160 | |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 161 | # Add user to group, and insure user has role on project |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 162 | self.groups_client.add_group_user(self.group_body['id'], |
| 163 | self.user_body['id']) |
| 164 | self.addCleanup(self.groups_client.delete_group_user, |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 165 | self.group_body['id'], self.user_body['id']) |
Jamie Lennox | 9750461 | 2015-02-26 16:47:06 +1100 | [diff] [blame] | 166 | body = self.token.auth(user_id=self.user_body['id'], |
Jamie Lennox | e5a95d4 | 2015-02-11 07:19:57 +0000 | [diff] [blame] | 167 | password=self.u_password, |
Jamie Lennox | 9750461 | 2015-02-26 16:47:06 +1100 | [diff] [blame] | 168 | user_domain_name=self.domain['name'], |
| 169 | project_name=self.project['name'], |
| 170 | project_domain_name=self.domain['name']) |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 171 | roles = body['token']['roles'] |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 172 | self.assertEqual(len(roles), 1) |
| 173 | self.assertEqual(roles[0]['id'], self.role['id']) |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 174 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 175 | self.roles_client.check_role_from_group_on_project_existence( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 176 | self.project['id'], self.group_body['id'], self.role['id']) |
| 177 | |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 178 | # Revoke role to group on project |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 179 | self.roles_client.delete_role_from_group_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 180 | self.project['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 181 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 182 | @decorators.idempotent_id('4bf8a70b-e785-413a-ad53-9f91ce02faa7') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 183 | def test_grant_list_revoke_role_to_group_on_domain(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 184 | """Test granting, listing, revoking role to group on domain""" |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 185 | self.roles_client.create_group_role_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 186 | self.domain['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 187 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 188 | roles = self.roles_client.list_group_roles_on_domain( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 189 | self.domain['id'], self.group_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 190 | |
zhufl | 628642b | 2017-08-01 14:39:34 +0800 | [diff] [blame] | 191 | self.assertEqual(1, len(roles)) |
| 192 | self.assertEqual(self.role['id'], roles[0]['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 193 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 194 | self.roles_client.check_role_from_group_on_domain_existence( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 195 | self.domain['id'], self.group_body['id'], self.role['id']) |
| 196 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 197 | self.roles_client.delete_role_from_group_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 198 | self.domain['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 199 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 200 | @decorators.idempotent_id('f5654bcc-08c4-4f71-88fe-05d64e06de94') |
nayna-patel | c905c18 | 2014-04-21 14:00:32 +0000 | [diff] [blame] | 201 | def test_list_roles(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 202 | """Test listing roles""" |
nayna-patel | c905c18 | 2014-04-21 14:00:32 +0000 | [diff] [blame] | 203 | # Return a list of all roles |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 204 | body = self.roles_client.list_roles()['roles'] |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 205 | found = [role for role in body if role in self.roles] |
| 206 | self.assertEqual(len(found), len(self.roles)) |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 207 | |
| 208 | def _create_implied_role(self, prior_role_id, implies_role_id, |
| 209 | ignore_not_found=False): |
| 210 | self.roles_client.create_role_inference_rule( |
| 211 | prior_role_id, implies_role_id) |
| 212 | if ignore_not_found: |
| 213 | self.addCleanup( |
| 214 | test_utils.call_and_ignore_notfound_exc, |
| 215 | self.roles_client.delete_role_inference_rule, |
| 216 | prior_role_id, |
| 217 | implies_role_id) |
| 218 | else: |
| 219 | self.addCleanup( |
| 220 | self.roles_client.delete_role_inference_rule, |
| 221 | prior_role_id, |
| 222 | implies_role_id) |
| 223 | |
| 224 | @decorators.idempotent_id('c90c316c-d706-4728-bcba-eb1912081b69') |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 225 | def test_implied_roles_create_check_show_delete(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 226 | """Test creating, checking, showing and deleting implied roles""" |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 227 | prior_role_id = self.roles[0]['id'] |
| 228 | implies_role_id = self.roles[1]['id'] |
| 229 | |
| 230 | # Create an inference rule from prior_role to implies_role |
| 231 | self._create_implied_role(prior_role_id, implies_role_id, |
| 232 | ignore_not_found=True) |
| 233 | |
| 234 | # Check if the inference rule exists |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 235 | self.roles_client.check_role_inference_rule( |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 236 | prior_role_id, implies_role_id) |
| 237 | |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 238 | # Show the inference rule and check its elements |
| 239 | resp_body = self.roles_client.show_role_inference_rule( |
| 240 | prior_role_id, implies_role_id) |
| 241 | self.assertIn('role_inference', resp_body) |
| 242 | role_inference = resp_body['role_inference'] |
| 243 | for key1 in ['prior_role', 'implies']: |
| 244 | self.assertIn(key1, role_inference) |
| 245 | for key2 in ['id', 'links', 'name']: |
| 246 | self.assertIn(key2, role_inference[key1]) |
| 247 | |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 248 | # Delete the inference rule |
| 249 | self.roles_client.delete_role_inference_rule( |
| 250 | prior_role_id, implies_role_id) |
| 251 | # Check if the inference rule no longer exists |
| 252 | self.assertRaises( |
| 253 | lib_exc.NotFound, |
| 254 | self.roles_client.show_role_inference_rule, |
| 255 | prior_role_id, |
| 256 | implies_role_id) |
| 257 | |
| 258 | @decorators.idempotent_id('dc6f5959-b74d-4e30-a9e5-a8255494ff00') |
| 259 | def test_roles_hierarchy(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 260 | """Test creating implied role and listing role inferences rules""" |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 261 | # Create inference rule from "roles[0]" to "role[1]" |
| 262 | self._create_implied_role( |
| 263 | self.roles[0]['id'], self.roles[1]['id']) |
| 264 | |
| 265 | # Create inference rule from "roles[0]" to "role[2]" |
| 266 | self._create_implied_role( |
| 267 | self.roles[0]['id'], self.roles[2]['id']) |
| 268 | |
| 269 | # Create inference rule from "roles[2]" to "role" |
| 270 | self._create_implied_role( |
| 271 | self.roles[2]['id'], self.role['id']) |
| 272 | |
| 273 | # Listing inferences rules from "roles[2]" should only return "role" |
| 274 | rules = self.roles_client.list_role_inferences_rules( |
| 275 | self.roles[2]['id'])['role_inference'] |
| 276 | self.assertEqual(1, len(rules['implies'])) |
| 277 | self.assertEqual(self.role['id'], rules['implies'][0]['id']) |
| 278 | |
| 279 | # Listing inferences rules from "roles[0]" should return "roles[1]" and |
| 280 | # "roles[2]" (only direct rules are listed) |
| 281 | rules = self.roles_client.list_role_inferences_rules( |
| 282 | self.roles[0]['id'])['role_inference'] |
| 283 | implies_ids = [role['id'] for role in rules['implies']] |
| 284 | self.assertEqual(2, len(implies_ids)) |
| 285 | self.assertIn(self.roles[1]['id'], implies_ids) |
| 286 | self.assertIn(self.roles[2]['id'], implies_ids) |
| 287 | |
| 288 | @decorators.idempotent_id('c8828027-df48-4021-95df-b65b92c7429e') |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 289 | @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source, |
| 290 | 'Skipped because environment has an immutable user ' |
| 291 | 'source and solely provides read-only access to users.') |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 292 | def test_assignments_for_implied_roles_create_delete(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 293 | """Test assignments when implied roles are created and deleted""" |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 294 | # Create a grant using "roles[0]" |
| 295 | self.roles_client.create_user_role_on_project( |
| 296 | self.project['id'], self.user_body['id'], self.roles[0]['id']) |
| 297 | self.addCleanup( |
| 298 | self.roles_client.delete_role_from_user_on_project, |
| 299 | self.project['id'], self.user_body['id'], self.roles[0]['id']) |
| 300 | |
| 301 | # Create an inference rule from "roles[0]" to "roles[1]" |
| 302 | self._create_implied_role(self.roles[0]['id'], self.roles[1]['id'], |
| 303 | ignore_not_found=True) |
| 304 | |
| 305 | # In the effective list of role assignments, both prior role and |
| 306 | # implied role should be present. This means that a user can |
| 307 | # authenticate using both roles (both roles will be present |
| 308 | # in the token). |
| 309 | params = {'scope.project.id': self.project['id'], |
| 310 | 'user.id': self.user_body['id']} |
| 311 | role_assignments = self.role_assignments.list_role_assignments( |
| 312 | effective=True, **params)['role_assignments'] |
| 313 | self.assertEqual(2, len(role_assignments)) |
| 314 | |
| 315 | roles_ids = [assignment['role']['id'] |
| 316 | for assignment in role_assignments] |
| 317 | self.assertIn(self.roles[0]['id'], roles_ids) |
| 318 | self.assertIn(self.roles[1]['id'], roles_ids) |
| 319 | |
| 320 | # After deleting the implied role, only the assignment with "roles[0]" |
| 321 | # should be present. |
| 322 | self.roles_client.delete_role_inference_rule( |
| 323 | self.roles[0]['id'], self.roles[1]['id']) |
| 324 | |
| 325 | role_assignments = self.role_assignments.list_role_assignments( |
| 326 | effective=True, **params)['role_assignments'] |
| 327 | self.assertEqual(1, len(role_assignments)) |
| 328 | |
| 329 | roles_ids = [assignment['role']['id'] |
| 330 | for assignment in role_assignments] |
| 331 | self.assertIn(self.roles[0]['id'], roles_ids) |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 332 | |
| 333 | @decorators.idempotent_id('d92a41d2-5501-497a-84bb-6e294330e8f8') |
| 334 | def test_domain_roles_create_delete(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 335 | """Test creating, listing and deleting domain roles""" |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 336 | domain_role = self.roles_client.create_role( |
| 337 | name=data_utils.rand_name('domain_role'), |
| 338 | domain_id=self.domain['id'])['role'] |
| 339 | self.addCleanup( |
| 340 | test_utils.call_and_ignore_notfound_exc, |
| 341 | self.roles_client.delete_role, |
| 342 | domain_role['id']) |
| 343 | |
| 344 | domain_roles = self.roles_client.list_roles( |
| 345 | domain_id=self.domain['id'])['roles'] |
| 346 | self.assertEqual(1, len(domain_roles)) |
| 347 | self.assertIn(domain_role, domain_roles) |
| 348 | |
| 349 | self.roles_client.delete_role(domain_role['id']) |
| 350 | domain_roles = self.roles_client.list_roles( |
| 351 | domain_id=self.domain['id'])['roles'] |
| 352 | self.assertEmpty(domain_roles) |
| 353 | |
| 354 | @decorators.idempotent_id('eb1e1c24-1bc4-4d47-9748-e127a1852c82') |
| 355 | def test_implied_domain_roles(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 356 | """Test creating implied roles when roles are in domains""" |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 357 | # Create two roles in the same domain |
| 358 | domain_role1 = self.setup_test_role(domain_id=self.domain['id']) |
| 359 | domain_role2 = self.setup_test_role(domain_id=self.domain['id']) |
| 360 | |
| 361 | # Check if we can create an inference rule from roles in the same |
| 362 | # domain |
| 363 | self._create_implied_role(domain_role1['id'], domain_role2['id']) |
| 364 | |
| 365 | # Create another role in a different domain |
| 366 | domain2 = self.setup_test_domain() |
| 367 | domain_role3 = self.setup_test_role(domain_id=domain2['id']) |
| 368 | |
| 369 | # Check if we can create cross domain implied roles |
| 370 | self._create_implied_role(domain_role1['id'], domain_role3['id']) |
| 371 | |
| 372 | # Finally, we also should be able to create an implied from a |
| 373 | # domain role to a global one |
| 374 | self._create_implied_role(domain_role1['id'], self.role['id']) |
| 375 | |
ghanshyam | efb12be | 2017-12-10 04:18:38 +0300 | [diff] [blame] | 376 | # The contrary is not true: we can't create an inference rule |
| 377 | # from a global role to a domain role |
| 378 | self.assertRaises( |
| 379 | lib_exc.Forbidden, |
| 380 | self.roles_client.create_role_inference_rule, |
| 381 | self.role['id'], |
| 382 | domain_role1['id']) |
Rodrigo Duarte Sousa | 592148c | 2017-01-31 15:26:16 -0300 | [diff] [blame] | 383 | |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 384 | @decorators.idempotent_id('3859df7e-5b78-4e4d-b10e-214c8953842a') |
Trevor McCasland | c44eadc | 2019-01-17 11:27:48 -0600 | [diff] [blame] | 385 | @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source, |
| 386 | 'Skipped because environment has an immutable user ' |
| 387 | 'source and solely provides read-only access to users.') |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 388 | def test_assignments_for_domain_roles(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 389 | """Test assignments for domain roles""" |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 390 | domain_role = self.setup_test_role(domain_id=self.domain['id']) |
| 391 | |
| 392 | # Create a grant using "domain_role" |
| 393 | self.roles_client.create_user_role_on_project( |
| 394 | self.project['id'], self.user_body['id'], domain_role['id']) |
| 395 | self.addCleanup( |
| 396 | self.roles_client.delete_role_from_user_on_project, |
| 397 | self.project['id'], self.user_body['id'], domain_role['id']) |
| 398 | |
| 399 | # NOTE(rodrigods): Regular roles would appear in the effective |
| 400 | # list of role assignments (meaning the role would be returned in |
| 401 | # a token) as a result from the grant above. This is not the case |
| 402 | # for domain roles, they should not appear in the effective role |
| 403 | # assignments list. |
| 404 | params = {'scope.project.id': self.project['id'], |
| 405 | 'user.id': self.user_body['id']} |
| 406 | role_assignments = self.role_assignments.list_role_assignments( |
| 407 | effective=True, **params)['role_assignments'] |
| 408 | self.assertEmpty(role_assignments) |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 409 | |
| 410 | @decorators.idempotent_id('3748c316-c18f-4b08-997b-c60567bc6235') |
| 411 | def test_list_all_implied_roles(self): |
zhufl | a7635d7 | 2020-04-29 14:36:41 +0800 | [diff] [blame] | 412 | """Test listing all implied roles""" |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 413 | # Create inference rule from "roles[0]" to "roles[1]" |
| 414 | self._create_implied_role( |
| 415 | self.roles[0]['id'], self.roles[1]['id']) |
| 416 | |
| 417 | # Create inference rule from "roles[0]" to "roles[2]" |
| 418 | self._create_implied_role( |
| 419 | self.roles[0]['id'], self.roles[2]['id']) |
| 420 | |
| 421 | # Create inference rule from "roles[2]" to "role" |
| 422 | self._create_implied_role( |
| 423 | self.roles[2]['id'], self.role['id']) |
| 424 | |
| 425 | rules = self.roles_client.list_all_role_inference_rules()[ |
| 426 | 'role_inferences'] |
Juan Antonio Osorio Robles | 7d2b636 | 2018-06-11 10:23:21 +0300 | [diff] [blame] | 427 | |
| 428 | # NOTE(jaosorior): With the work related to the define-default-roles |
| 429 | # blueprint, we now have 'admin', 'member' and 'reader' by default. So |
| 430 | # we filter every other implied role to only take into account the ones |
| 431 | # relates to this test. |
| 432 | relevant_roles = (self.roles[0]['id'], self.roles[1]['id'], |
| 433 | self.roles[2]['id'], self.role['id']) |
| 434 | |
| 435 | def is_implied_role_relevant(rule): |
| 436 | return any(r for r in rule['implies'] if r['id'] in relevant_roles) |
| 437 | |
| 438 | relevant_rules = filter(is_implied_role_relevant, rules) |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 439 | # Sort the rules by the number of inferences, since there should be 1 |
| 440 | # inference between "roles[2]" and "role" and 2 inferences for |
| 441 | # "roles[0]": between "roles[1]" and "roles[2]". |
Juan Antonio Osorio Robles | 7d2b636 | 2018-06-11 10:23:21 +0300 | [diff] [blame] | 442 | sorted_rules = sorted(relevant_rules, key=lambda r: len(r['implies'])) |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 443 | |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 444 | self.assertEqual(2, len(sorted_rules)) |
| 445 | # Check that only 1 inference rule exists between "roles[2]" and "role" |
| 446 | self.assertEqual(1, len(sorted_rules[0]['implies'])) |
| 447 | # Check that 2 inference rules exist for "roles[0]": one between |
| 448 | # "roles[1]" and one between "roles[2]". |
| 449 | self.assertEqual(2, len(sorted_rules[1]['implies'])) |
| 450 | |
| 451 | # Check that "roles[2]" is the "prior_role" and that "role" is the |
| 452 | # "implies" role. |
| 453 | self.assertEqual(self.roles[2]['id'], |
| 454 | sorted_rules[0]['prior_role']['id']) |
| 455 | self.assertEqual(self.role['id'], |
| 456 | sorted_rules[0]['implies'][0]['id']) |
| 457 | |
| 458 | # Check that "roles[0]" is the "prior_role" and that "roles[1]" and |
| 459 | # "roles[2]" are the "implies" roles. |
| 460 | self.assertEqual(self.roles[0]['id'], |
| 461 | sorted_rules[1]['prior_role']['id']) |
| 462 | |
| 463 | implies_ids = [r['id'] for r in sorted_rules[1]['implies']] |
| 464 | self.assertIn(self.roles[1]['id'], implies_ids) |
| 465 | self.assertIn(self.roles[2]['id'], implies_ids) |