blob: cab84c06f3deb91e685b628ac0133bc80cadcacf [file] [log] [blame]
nayna-patel755d8142013-07-16 06:45:34 +00001# vim: tabstop=4 shiftwidth=4 softtabstop=4
2
3# Copyright 2013 OpenStack Foundation
4# All Rights Reserved.
5#
6# Licensed under the Apache License, Version 2.0 (the "License"); you may
7# not use this file except in compliance with the License. You may obtain
8# a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
14# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
15# License for the specific language governing permissions and limitations
16# under the License.
17
18from tempest.api.identity import base
19from tempest.common.utils.data_utils import rand_name
20from tempest.test import attr
21
22
23class RolesV3TestJSON(base.BaseIdentityAdminTest):
24 _interface = 'json'
25
26 @classmethod
27 def setUpClass(cls):
28 super(RolesV3TestJSON, cls).setUpClass()
29 cls.fetched_role_ids = list()
30 u_name = rand_name('user-')
31 u_desc = '%s description' % u_name
32 u_email = '%s@testmail.tm' % u_name
33 u_password = rand_name('pass-')
34 resp = [None] * 5
35 resp[0], cls.project = cls.v3_client.create_project(
36 rand_name('project-'), description=rand_name('project-desc-'))
37 resp[1], cls.domain = cls.v3_client.create_domain(
38 rand_name('domain-'), description=rand_name('domain-desc-'))
39 resp[2], cls.group_body = cls.v3_client.create_group(
40 rand_name('Group-'), project_id=cls.project['id'],
41 domain_id=cls.domain['id'])
42 resp[3], cls.user_body = cls.v3_client.create_user(
43 u_name, description=u_desc, password=u_password,
44 email=u_email, project_id=cls.project['id'],
45 domain_id=cls.domain['id'])
46 resp[4], cls.role = cls.v3_client.create_role(rand_name('Role-'))
47 for r in resp:
48 assert r['status'] == '201', "Expected: %s" % r['status']
49
50 @classmethod
51 def tearDownClass(cls):
52 resp = [None] * 5
53 resp[0], _ = cls.v3_client.delete_role(cls.role['id'])
54 resp[1], _ = cls.v3_client.delete_group(cls.group_body['id'])
55 resp[2], _ = cls.v3_client.delete_user(cls.user_body['id'])
56 resp[3], _ = cls.v3_client.delete_project(cls.project['id'])
57 #NOTE(harika-vakadi): It is necessary to disable the domian
58 # before deleting,or else it would result in unauthorized error
59 cls.v3_client.update_domain(cls.domain['id'], enabled=False)
60 resp[4], _ = cls.v3_client.delete_domain(cls.domain['id'])
61 for r in resp:
62 assert r['status'] == '204', "Expected: %s" % r['status']
63 super(RolesV3TestJSON, cls).tearDownClass()
64
65 def _list_assertions(self, resp, body, fetched_role_ids, role_id):
66 self.assertEqual(resp['status'], '200')
67 self.assertEqual(len(body), 1)
68 self.assertIn(role_id, fetched_role_ids)
69
70 @attr(type='smoke')
71 def test_role_create_update_get(self):
72 r_name = rand_name('Role-')
73 resp, role = self.v3_client.create_role(r_name)
74 self.addCleanup(self.v3_client.delete_role, role['id'])
75 self.assertEqual(resp['status'], '201')
76 self.assertIn('name', role)
77 self.assertEqual(role['name'], r_name)
78
79 new_name = rand_name('NewRole-')
80 resp, updated_role = self.v3_client.update_role(new_name, role['id'])
81 self.assertEqual(resp['status'], '200')
82 self.assertIn('name', updated_role)
83 self.assertIn('id', updated_role)
84 self.assertIn('links', updated_role)
85 self.assertNotEqual(r_name, updated_role['name'])
86
87 resp, new_role = self.v3_client.get_role(role['id'])
88 self.assertEqual(resp['status'], '200')
89 self.assertEqual(new_name, new_role['name'])
90 self.assertEqual(updated_role['id'], new_role['id'])
91
92 @attr(type='smoke')
93 def test_grant_list_revoke_role_to_user_on_project(self):
94 resp, _ = self.v3_client.assign_user_role_on_project(
95 self.project['id'], self.user_body['id'], self.role['id'])
96 self.assertEqual(resp['status'], '204')
97
98 resp, roles = self.v3_client.list_user_roles_on_project(
99 self.project['id'], self.user_body['id'])
100
101 for i in roles:
102 self.fetched_role_ids.append(i['id'])
103
104 self._list_assertions(resp, roles, self.fetched_role_ids,
105 self.role['id'])
106
107 resp, _ = self.v3_client.revoke_role_from_user_on_project(
108 self.project['id'], self.user_body['id'], self.role['id'])
109 self.assertEqual(resp['status'], '204')
110
111 @attr(type='smoke')
112 def test_grant_list_revoke_role_to_user_on_domain(self):
113 resp, _ = self.v3_client.assign_user_role_on_domain(
114 self.domain['id'], self.user_body['id'], self.role['id'])
115 self.assertEqual(resp['status'], '204')
116
117 resp, roles = self.v3_client.list_user_roles_on_domain(
118 self.domain['id'], self.user_body['id'])
119
120 for i in roles:
121 self.fetched_role_ids.append(i['id'])
122
123 self._list_assertions(resp, roles, self.fetched_role_ids,
124 self.role['id'])
125
126 resp, _ = self.v3_client.revoke_role_from_user_on_domain(
127 self.domain['id'], self.user_body['id'], self.role['id'])
128 self.assertEqual(resp['status'], '204')
129
130 @attr(type='smoke')
131 def test_grant_list_revoke_role_to_group_on_project(self):
132 resp, _ = self.v3_client.assign_group_role_on_project(
133 self.project['id'], self.group_body['id'], self.role['id'])
134 self.assertEqual(resp['status'], '204')
135
136 resp, roles = self.v3_client.list_group_roles_on_project(
137 self.project['id'], self.group_body['id'])
138
139 for i in roles:
140 self.fetched_role_ids.append(i['id'])
141
142 self._list_assertions(resp, roles, self.fetched_role_ids,
143 self.role['id'])
144
145 resp, _ = self.v3_client.revoke_role_from_group_on_project(
146 self.project['id'], self.group_body['id'], self.role['id'])
147 self.assertEqual(resp['status'], '204')
148
149 @attr(type='smoke')
150 def test_grant_list_revoke_role_to_group_on_domain(self):
151 resp, _ = self.v3_client.assign_group_role_on_domain(
152 self.domain['id'], self.group_body['id'], self.role['id'])
153 self.assertEqual(resp['status'], '204')
154
155 resp, roles = self.v3_client.list_group_roles_on_domain(
156 self.domain['id'], self.group_body['id'])
157
158 for i in roles:
159 self.fetched_role_ids.append(i['id'])
160
161 self._list_assertions(resp, roles, self.fetched_role_ids,
162 self.role['id'])
163
164 resp, _ = self.v3_client.revoke_role_from_group_on_domain(
165 self.domain['id'], self.group_body['id'], self.role['id'])
166 self.assertEqual(resp['status'], '204')
167
168
169class RolesV3TestXML(RolesV3TestJSON):
170 _interface = 'xml'