blob: 8b687cd6cc8e39038508a94fa750cb72d043b7ac [file] [log] [blame]
Maho Koshiya962e7d72015-11-27 20:31:17 +09001# Licensed under the Apache License, Version 2.0 (the "License"); you may
2# not use this file except in compliance with the License. You may obtain
3# a copy of the License at
4#
5# http://www.apache.org/licenses/LICENSE-2.0
6#
7# Unless required by applicable law or agreed to in writing, software
8# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
9# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
10# License for the specific language governing permissions and limitations
11# under the License.
12
13from tempest.api.identity import base
Andrea Frittolicd368412017-08-14 21:37:56 +010014from tempest.common import utils
Ken'ichi Ohmichi7bd25752017-03-10 10:45:39 -080015from tempest.lib.common.utils import data_utils
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -080016from tempest.lib import decorators
Maho Koshiya962e7d72015-11-27 20:31:17 +090017
Maho Koshiya962e7d72015-11-27 20:31:17 +090018
zhuflf6bae312017-08-14 13:37:53 +080019class InheritsV3TestJSON(base.BaseIdentityV3AdminTest):
Maho Koshiya962e7d72015-11-27 20:31:17 +090020
21 @classmethod
22 def skip_checks(cls):
zhuflf6bae312017-08-14 13:37:53 +080023 super(InheritsV3TestJSON, cls).skip_checks()
Andrea Frittolicd368412017-08-14 21:37:56 +010024 if not utils.is_extension_enabled('OS-INHERIT', 'identity'):
Maho Koshiya962e7d72015-11-27 20:31:17 +090025 raise cls.skipException("Inherits aren't enabled")
26
27 @classmethod
28 def resource_setup(cls):
zhuflf6bae312017-08-14 13:37:53 +080029 super(InheritsV3TestJSON, cls).resource_setup()
Maho Koshiya962e7d72015-11-27 20:31:17 +090030 u_name = data_utils.rand_name('user-')
31 u_desc = '%s description' % u_name
32 u_email = '%s@testmail.tm' % u_name
33 u_password = data_utils.rand_name('pass-')
zhufl2b33c1a2017-04-24 17:33:48 +080034 cls.domain = cls.create_domain()
Maho Koshiya962e7d72015-11-27 20:31:17 +090035 cls.project = cls.projects_client.create_project(
36 data_utils.rand_name('project-'),
37 description=data_utils.rand_name('project-desc-'),
38 domain_id=cls.domain['id'])['project']
39 cls.group = cls.groups_client.create_group(
40 name=data_utils.rand_name('group-'), project_id=cls.project['id'],
41 domain_id=cls.domain['id'])['group']
42 cls.user = cls.users_client.create_user(
ghanshyam7f817db2016-08-01 18:37:13 +090043 name=u_name, description=u_desc, password=u_password,
Maho Koshiya962e7d72015-11-27 20:31:17 +090044 email=u_email, project_id=cls.project['id'],
45 domain_id=cls.domain['id'])['user']
46
47 @classmethod
48 def resource_cleanup(cls):
49 cls.groups_client.delete_group(cls.group['id'])
50 cls.users_client.delete_user(cls.user['id'])
51 cls.projects_client.delete_project(cls.project['id'])
52 cls.domains_client.update_domain(cls.domain['id'], enabled=False)
53 cls.domains_client.delete_domain(cls.domain['id'])
zhuflf6bae312017-08-14 13:37:53 +080054 super(InheritsV3TestJSON, cls).resource_cleanup()
Maho Koshiya962e7d72015-11-27 20:31:17 +090055
56 def _list_assertions(self, body, fetched_role_ids, role_id):
57 self.assertEqual(len(body), 1)
58 self.assertIn(role_id, fetched_role_ids)
59
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -080060 @decorators.idempotent_id('4e6f0366-97c8-423c-b2be-41eae6ac91c8')
Maho Koshiya962e7d72015-11-27 20:31:17 +090061 def test_inherit_assign_list_check_revoke_roles_on_domains_user(self):
62 # Create role
zhufl66b616a2017-04-11 15:00:32 +080063 src_role = self.setup_test_role()
Maho Koshiya962e7d72015-11-27 20:31:17 +090064 # Assign role on domains user
ghanshyamad55eb82016-09-06 13:58:29 +090065 self.inherited_roles_client.create_inherited_role_on_domains_user(
Maho Koshiya962e7d72015-11-27 20:31:17 +090066 self.domain['id'], self.user['id'], src_role['id'])
67 # list role on domains user
ghanshyamad55eb82016-09-06 13:58:29 +090068 roles = self.inherited_roles_client.\
Maho Koshiya962e7d72015-11-27 20:31:17 +090069 list_inherited_project_role_for_user_on_domain(
70 self.domain['id'], self.user['id'])['roles']
71
72 fetched_role_ids = [i['id'] for i in roles]
73 self._list_assertions(roles, fetched_role_ids,
74 src_role['id'])
75
76 # Check role on domains user
ghanshyamad55eb82016-09-06 13:58:29 +090077 (self.inherited_roles_client.
78 check_user_inherited_project_role_on_domain(
79 self.domain['id'], self.user['id'], src_role['id']))
Maho Koshiya962e7d72015-11-27 20:31:17 +090080 # Revoke role from domains user.
ghanshyamad55eb82016-09-06 13:58:29 +090081 self.inherited_roles_client.delete_inherited_role_from_user_on_domain(
Maho Koshiya962e7d72015-11-27 20:31:17 +090082 self.domain['id'], self.user['id'], src_role['id'])
83
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -080084 @decorators.idempotent_id('c7a8dda2-be50-4fb4-9a9c-e830771078b1')
Maho Koshiya962e7d72015-11-27 20:31:17 +090085 def test_inherit_assign_list_check_revoke_roles_on_domains_group(self):
86 # Create role
zhufl66b616a2017-04-11 15:00:32 +080087 src_role = self.setup_test_role()
Maho Koshiya962e7d72015-11-27 20:31:17 +090088 # Assign role on domains group
ghanshyamad55eb82016-09-06 13:58:29 +090089 self.inherited_roles_client.create_inherited_role_on_domains_group(
Maho Koshiya962e7d72015-11-27 20:31:17 +090090 self.domain['id'], self.group['id'], src_role['id'])
91 # List role on domains group
ghanshyamad55eb82016-09-06 13:58:29 +090092 roles = self.inherited_roles_client.\
Maho Koshiya962e7d72015-11-27 20:31:17 +090093 list_inherited_project_role_for_group_on_domain(
94 self.domain['id'], self.group['id'])['roles']
95
96 fetched_role_ids = [i['id'] for i in roles]
97 self._list_assertions(roles, fetched_role_ids,
98 src_role['id'])
99
100 # Check role on domains group
ghanshyamad55eb82016-09-06 13:58:29 +0900101 (self.inherited_roles_client.
102 check_group_inherited_project_role_on_domain(
103 self.domain['id'], self.group['id'], src_role['id']))
Maho Koshiya962e7d72015-11-27 20:31:17 +0900104 # Revoke role from domains group
ghanshyamad55eb82016-09-06 13:58:29 +0900105 self.inherited_roles_client.delete_inherited_role_from_group_on_domain(
Maho Koshiya962e7d72015-11-27 20:31:17 +0900106 self.domain['id'], self.group['id'], src_role['id'])
107
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -0800108 @decorators.idempotent_id('18b70e45-7687-4b72-8277-b8f1a47d7591')
Maho Koshiya962e7d72015-11-27 20:31:17 +0900109 def test_inherit_assign_check_revoke_roles_on_projects_user(self):
110 # Create role
zhufl66b616a2017-04-11 15:00:32 +0800111 src_role = self.setup_test_role()
Maho Koshiya962e7d72015-11-27 20:31:17 +0900112 # Assign role on projects user
ghanshyamad55eb82016-09-06 13:58:29 +0900113 self.inherited_roles_client.create_inherited_role_on_projects_user(
Maho Koshiya962e7d72015-11-27 20:31:17 +0900114 self.project['id'], self.user['id'], src_role['id'])
115 # Check role on projects user
ghanshyamad55eb82016-09-06 13:58:29 +0900116 (self.inherited_roles_client.
117 check_user_has_flag_on_inherited_to_project(
118 self.project['id'], self.user['id'], src_role['id']))
Maho Koshiya962e7d72015-11-27 20:31:17 +0900119 # Revoke role from projects user
ghanshyamad55eb82016-09-06 13:58:29 +0900120 self.inherited_roles_client.delete_inherited_role_from_user_on_project(
Maho Koshiya962e7d72015-11-27 20:31:17 +0900121 self.project['id'], self.user['id'], src_role['id'])
122
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -0800123 @decorators.idempotent_id('26021436-d5a4-4256-943c-ded01e0d4b45')
Maho Koshiya962e7d72015-11-27 20:31:17 +0900124 def test_inherit_assign_check_revoke_roles_on_projects_group(self):
125 # Create role
zhufl66b616a2017-04-11 15:00:32 +0800126 src_role = self.setup_test_role()
Maho Koshiya962e7d72015-11-27 20:31:17 +0900127 # Assign role on projects group
ghanshyamad55eb82016-09-06 13:58:29 +0900128 self.inherited_roles_client.create_inherited_role_on_projects_group(
Maho Koshiya962e7d72015-11-27 20:31:17 +0900129 self.project['id'], self.group['id'], src_role['id'])
130 # Check role on projects group
ghanshyamad55eb82016-09-06 13:58:29 +0900131 (self.inherited_roles_client.
132 check_group_has_flag_on_inherited_to_project(
133 self.project['id'], self.group['id'], src_role['id']))
Maho Koshiya962e7d72015-11-27 20:31:17 +0900134 # Revoke role from projects group
ghanshyamad55eb82016-09-06 13:58:29 +0900135 (self.inherited_roles_client.
136 delete_inherited_role_from_group_on_project(
137 self.project['id'], self.group['id'], src_role['id']))
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300138
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -0800139 @decorators.idempotent_id('3acf666e-5354-42ac-8e17-8b68893bcd36')
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300140 def test_inherit_assign_list_revoke_user_roles_on_domain(self):
141 # Create role
zhufl66b616a2017-04-11 15:00:32 +0800142 src_role = self.setup_test_role()
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300143
144 # Create a project hierarchy
zhuflf2f47052017-04-20 15:08:02 +0800145 leaf_project = self.setup_test_project(domain_id=self.domain['id'],
146 parent_id=self.project['id'])
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300147
148 # Assign role on domain
149 self.inherited_roles_client.create_inherited_role_on_domains_user(
150 self.domain['id'], self.user['id'], src_role['id'])
151
152 # List "effective" role assignments from user on the parent project
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300153 params = {'scope.project.id': self.project['id'],
154 'user.id': self.user['id']}
155 assignments = self.role_assignments.list_role_assignments(
156 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300157 self.assertNotEmpty(assignments)
158
159 # List "effective" role assignments from user on the leaf project
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300160 params['scope.project.id'] = leaf_project['id']
161 assignments = self.role_assignments.list_role_assignments(
162 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300163 self.assertNotEmpty(assignments)
164
165 # Revoke role from domain
166 self.inherited_roles_client.delete_inherited_role_from_user_on_domain(
167 self.domain['id'], self.user['id'], src_role['id'])
168
169 # List "effective" role assignments from user on the parent project
170 # should return an empty list
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300171 params['scope.project.id'] = self.project['id']
172 assignments = self.role_assignments.list_role_assignments(
173 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300174 self.assertEmpty(assignments)
175
176 # List "effective" role assignments from user on the leaf project
177 # should return an empty list
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300178 params['scope.project.id'] = leaf_project['id']
179 assignments = self.role_assignments.list_role_assignments(
180 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300181 self.assertEmpty(assignments)
182
Ken'ichi Ohmichieeabdd22017-01-27 17:46:00 -0800183 @decorators.idempotent_id('9f02ccd9-9b57-46b4-8f77-dd5a736f3a06')
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300184 def test_inherit_assign_list_revoke_user_roles_on_project_tree(self):
185 # Create role
zhufl66b616a2017-04-11 15:00:32 +0800186 src_role = self.setup_test_role()
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300187
188 # Create a project hierarchy
zhuflf2f47052017-04-20 15:08:02 +0800189 leaf_project = self.setup_test_project(domain_id=self.domain['id'],
190 parent_id=self.project['id'])
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300191
192 # Assign role on parent project
193 self.inherited_roles_client.create_inherited_role_on_projects_user(
194 self.project['id'], self.user['id'], src_role['id'])
195
196 # List "effective" role assignments from user on the leaf project
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300197 params = {'scope.project.id': leaf_project['id'],
198 'user.id': self.user['id']}
199 assignments = self.role_assignments.list_role_assignments(
200 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300201 self.assertNotEmpty(assignments)
202
203 # Revoke role from parent project
204 self.inherited_roles_client.delete_inherited_role_from_user_on_project(
205 self.project['id'], self.user['id'], src_role['id'])
206
207 # List "effective" role assignments from user on the leaf project
208 # should return an empty list
Rodrigo Duarte Sousabd128d12016-10-04 10:07:34 -0300209 assignments = self.role_assignments.list_role_assignments(
210 effective=True, **params)['role_assignments']
Rodrigo Duarte12f8d4a2016-07-08 11:53:53 -0300211 self.assertEmpty(assignments)