nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 1 | # Copyright 2013 OpenStack Foundation |
| 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
| 16 | from tempest.api.identity import base |
Rodrigo Duarte Sousa | 592148c | 2017-01-31 15:26:16 -0300 | [diff] [blame] | 17 | from tempest import config |
Ken'ichi Ohmichi | 7bd2575 | 2017-03-10 10:45:39 -0800 | [diff] [blame] | 18 | from tempest.lib.common.utils import data_utils |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 19 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 20 | from tempest.lib import decorators |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 21 | from tempest.lib import exceptions as lib_exc |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 22 | |
Rodrigo Duarte Sousa | 592148c | 2017-01-31 15:26:16 -0300 | [diff] [blame] | 23 | CONF = config.CONF |
| 24 | |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 25 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 26 | class RolesV3TestJSON(base.BaseIdentityV3AdminTest): |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 27 | |
| 28 | @classmethod |
Andrea Frittoli | 7688e74 | 2014-09-15 12:38:22 +0100 | [diff] [blame] | 29 | def resource_setup(cls): |
| 30 | super(RolesV3TestJSON, cls).resource_setup() |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 31 | cls.roles = list() |
nayna-patel | c905c18 | 2014-04-21 14:00:32 +0000 | [diff] [blame] | 32 | for _ in range(3): |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 33 | role_name = data_utils.rand_name(name='role') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 34 | role = cls.roles_client.create_role(name=role_name)['role'] |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 35 | cls.roles.append(role) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 36 | cls.fetched_role_ids = list() |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 37 | u_name = data_utils.rand_name('user') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 38 | u_desc = '%s description' % u_name |
| 39 | u_email = '%s@testmail.tm' % u_name |
Zack Feldstein | d8c5f7a | 2015-12-14 10:44:07 -0600 | [diff] [blame] | 40 | cls.u_password = data_utils.rand_password() |
zhufl | 2b33c1a | 2017-04-24 17:33:48 +0800 | [diff] [blame] | 41 | cls.domain = cls.create_domain() |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 42 | cls.project = cls.projects_client.create_project( |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 43 | data_utils.rand_name('project'), |
| 44 | description=data_utils.rand_name('project-desc'), |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 45 | domain_id=cls.domain['id'])['project'] |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 46 | cls.group_body = cls.groups_client.create_group( |
Yaroslav Lobankov | 45025c0 | 2015-11-19 17:55:15 +0300 | [diff] [blame] | 47 | name=data_utils.rand_name('Group'), project_id=cls.project['id'], |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 48 | domain_id=cls.domain['id'])['group'] |
Daniel Mellado | 7aea534 | 2016-02-09 09:10:12 +0000 | [diff] [blame] | 49 | cls.user_body = cls.users_client.create_user( |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 50 | name=u_name, description=u_desc, password=cls.u_password, |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 51 | email=u_email, project_id=cls.project['id'], |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 52 | domain_id=cls.domain['id'])['user'] |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 53 | cls.role = cls.roles_client.create_role( |
piyush110786 | afaaf26 | 2015-12-11 18:54:05 +0530 | [diff] [blame] | 54 | name=data_utils.rand_name('Role'))['role'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 55 | |
| 56 | @classmethod |
Andrea Frittoli | 7688e74 | 2014-09-15 12:38:22 +0100 | [diff] [blame] | 57 | def resource_cleanup(cls): |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 58 | cls.roles_client.delete_role(cls.role['id']) |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 59 | cls.groups_client.delete_group(cls.group_body['id']) |
Daniel Mellado | 7aea534 | 2016-02-09 09:10:12 +0000 | [diff] [blame] | 60 | cls.users_client.delete_user(cls.user_body['id']) |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 61 | cls.projects_client.delete_project(cls.project['id']) |
Chang Bo Guo | f099f80 | 2013-09-13 19:01:46 -0700 | [diff] [blame] | 62 | # NOTE(harika-vakadi): It is necessary to disable the domain |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 63 | # before deleting,or else it would result in unauthorized error |
Daniel Mellado | 91a26b6 | 2016-02-11 11:13:04 +0000 | [diff] [blame] | 64 | cls.domains_client.update_domain(cls.domain['id'], enabled=False) |
| 65 | cls.domains_client.delete_domain(cls.domain['id']) |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 66 | for role in cls.roles: |
| 67 | cls.roles_client.delete_role(role['id']) |
Andrea Frittoli | 7688e74 | 2014-09-15 12:38:22 +0100 | [diff] [blame] | 68 | super(RolesV3TestJSON, cls).resource_cleanup() |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 69 | |
David Kranz | e9d2f42 | 2014-07-02 13:57:41 -0400 | [diff] [blame] | 70 | def _list_assertions(self, body, fetched_role_ids, role_id): |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 71 | self.assertEqual(len(body), 1) |
| 72 | self.assertIn(role_id, fetched_role_ids) |
| 73 | |
Jordan Pittier | 3b46d27 | 2017-04-12 16:17:28 +0200 | [diff] [blame] | 74 | @decorators.attr(type='smoke') |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 75 | @decorators.idempotent_id('18afc6c0-46cf-4911-824e-9989cc056c3a') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 76 | def test_role_create_update_show_list(self): |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 77 | r_name = data_utils.rand_name('Role') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 78 | role = self.roles_client.create_role(name=r_name)['role'] |
| 79 | self.addCleanup(self.roles_client.delete_role, role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 80 | self.assertIn('name', role) |
| 81 | self.assertEqual(role['name'], r_name) |
| 82 | |
Ken'ichi Ohmichi | 9650847 | 2015-03-23 01:43:42 +0000 | [diff] [blame] | 83 | new_name = data_utils.rand_name('NewRole') |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 84 | updated_role = self.roles_client.update_role(role['id'], |
| 85 | name=new_name)['role'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 86 | self.assertIn('name', updated_role) |
| 87 | self.assertIn('id', updated_role) |
| 88 | self.assertIn('links', updated_role) |
| 89 | self.assertNotEqual(r_name, updated_role['name']) |
| 90 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 91 | new_role = self.roles_client.show_role(role['id'])['role'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 92 | self.assertEqual(new_name, new_role['name']) |
| 93 | self.assertEqual(updated_role['id'], new_role['id']) |
| 94 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 95 | roles = self.roles_client.list_roles()['roles'] |
wanglianmin | a3e84ea | 2014-03-26 17:30:33 +0800 | [diff] [blame] | 96 | self.assertIn(role['id'], [r['id'] for r in roles]) |
| 97 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 98 | @decorators.idempotent_id('c6b80012-fe4a-498b-9ce8-eb391c05169f') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 99 | def test_grant_list_revoke_role_to_user_on_project(self): |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 100 | self.roles_client.create_user_role_on_project(self.project['id'], |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 101 | self.user_body['id'], |
| 102 | self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 103 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 104 | roles = self.roles_client.list_user_roles_on_project( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 105 | self.project['id'], self.user_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 106 | |
| 107 | for i in roles: |
| 108 | self.fetched_role_ids.append(i['id']) |
| 109 | |
David Kranz | e9d2f42 | 2014-07-02 13:57:41 -0400 | [diff] [blame] | 110 | self._list_assertions(roles, self.fetched_role_ids, |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 111 | self.role['id']) |
| 112 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 113 | self.roles_client.check_user_role_existence_on_project( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 114 | self.project['id'], self.user_body['id'], self.role['id']) |
| 115 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 116 | self.roles_client.delete_role_from_user_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 117 | self.project['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 118 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 119 | @decorators.idempotent_id('6c9a2940-3625-43a3-ac02-5dcec62ef3bd') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 120 | def test_grant_list_revoke_role_to_user_on_domain(self): |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 121 | self.roles_client.create_user_role_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 122 | self.domain['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 123 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 124 | roles = self.roles_client.list_user_roles_on_domain( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 125 | self.domain['id'], self.user_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 126 | |
| 127 | for i in roles: |
| 128 | self.fetched_role_ids.append(i['id']) |
| 129 | |
David Kranz | e9d2f42 | 2014-07-02 13:57:41 -0400 | [diff] [blame] | 130 | self._list_assertions(roles, self.fetched_role_ids, |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 131 | self.role['id']) |
| 132 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 133 | self.roles_client.check_user_role_existence_on_domain( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 134 | self.domain['id'], self.user_body['id'], self.role['id']) |
| 135 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 136 | self.roles_client.delete_role_from_user_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 137 | self.domain['id'], self.user_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 138 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 139 | @decorators.idempotent_id('cbf11737-1904-4690-9613-97bcbb3df1c4') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 140 | def test_grant_list_revoke_role_to_group_on_project(self): |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 141 | # Grant role to group on project |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 142 | self.roles_client.create_group_role_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 143 | self.project['id'], self.group_body['id'], self.role['id']) |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 144 | # List group roles on project |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 145 | roles = self.roles_client.list_group_roles_on_project( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 146 | self.project['id'], self.group_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 147 | |
| 148 | for i in roles: |
| 149 | self.fetched_role_ids.append(i['id']) |
| 150 | |
David Kranz | e9d2f42 | 2014-07-02 13:57:41 -0400 | [diff] [blame] | 151 | self._list_assertions(roles, self.fetched_role_ids, |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 152 | self.role['id']) |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 153 | # Add user to group, and insure user has role on project |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 154 | self.groups_client.add_group_user(self.group_body['id'], |
| 155 | self.user_body['id']) |
| 156 | self.addCleanup(self.groups_client.delete_group_user, |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 157 | self.group_body['id'], self.user_body['id']) |
Jamie Lennox | 9750461 | 2015-02-26 16:47:06 +1100 | [diff] [blame] | 158 | body = self.token.auth(user_id=self.user_body['id'], |
Jamie Lennox | e5a95d4 | 2015-02-11 07:19:57 +0000 | [diff] [blame] | 159 | password=self.u_password, |
Jamie Lennox | 9750461 | 2015-02-26 16:47:06 +1100 | [diff] [blame] | 160 | user_domain_name=self.domain['name'], |
| 161 | project_name=self.project['name'], |
| 162 | project_domain_name=self.domain['name']) |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 163 | roles = body['token']['roles'] |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 164 | self.assertEqual(len(roles), 1) |
| 165 | self.assertEqual(roles[0]['id'], self.role['id']) |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 166 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 167 | self.roles_client.check_role_from_group_on_project_existence( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 168 | self.project['id'], self.group_body['id'], self.role['id']) |
| 169 | |
wanglianmin | d599cc5 | 2014-03-17 17:03:56 +0800 | [diff] [blame] | 170 | # Revoke role to group on project |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 171 | self.roles_client.delete_role_from_group_on_project( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 172 | self.project['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 173 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 174 | @decorators.idempotent_id('4bf8a70b-e785-413a-ad53-9f91ce02faa7') |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 175 | def test_grant_list_revoke_role_to_group_on_domain(self): |
ghanshyam | 2e6fb56 | 2016-09-06 11:14:31 +0900 | [diff] [blame] | 176 | self.roles_client.create_group_role_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 177 | self.domain['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 178 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 179 | roles = self.roles_client.list_group_roles_on_domain( |
John Warren | 56317e0 | 2015-08-12 20:48:32 +0000 | [diff] [blame] | 180 | self.domain['id'], self.group_body['id'])['roles'] |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 181 | |
| 182 | for i in roles: |
| 183 | self.fetched_role_ids.append(i['id']) |
| 184 | |
David Kranz | e9d2f42 | 2014-07-02 13:57:41 -0400 | [diff] [blame] | 185 | self._list_assertions(roles, self.fetched_role_ids, |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 186 | self.role['id']) |
| 187 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 188 | self.roles_client.check_role_from_group_on_domain_existence( |
Maho Koshiya | b6fa2e4 | 2015-12-07 16:52:53 +0900 | [diff] [blame] | 189 | self.domain['id'], self.group_body['id'], self.role['id']) |
| 190 | |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 191 | self.roles_client.delete_role_from_group_on_domain( |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 192 | self.domain['id'], self.group_body['id'], self.role['id']) |
nayna-patel | 755d814 | 2013-07-16 06:45:34 +0000 | [diff] [blame] | 193 | |
Ken'ichi Ohmichi | eeabdd2 | 2017-01-27 17:46:00 -0800 | [diff] [blame] | 194 | @decorators.idempotent_id('f5654bcc-08c4-4f71-88fe-05d64e06de94') |
nayna-patel | c905c18 | 2014-04-21 14:00:32 +0000 | [diff] [blame] | 195 | def test_list_roles(self): |
| 196 | # Return a list of all roles |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 197 | body = self.roles_client.list_roles()['roles'] |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 198 | found = [role for role in body if role in self.roles] |
| 199 | self.assertEqual(len(found), len(self.roles)) |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 200 | |
| 201 | def _create_implied_role(self, prior_role_id, implies_role_id, |
| 202 | ignore_not_found=False): |
| 203 | self.roles_client.create_role_inference_rule( |
| 204 | prior_role_id, implies_role_id) |
| 205 | if ignore_not_found: |
| 206 | self.addCleanup( |
| 207 | test_utils.call_and_ignore_notfound_exc, |
| 208 | self.roles_client.delete_role_inference_rule, |
| 209 | prior_role_id, |
| 210 | implies_role_id) |
| 211 | else: |
| 212 | self.addCleanup( |
| 213 | self.roles_client.delete_role_inference_rule, |
| 214 | prior_role_id, |
| 215 | implies_role_id) |
| 216 | |
| 217 | @decorators.idempotent_id('c90c316c-d706-4728-bcba-eb1912081b69') |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 218 | def test_implied_roles_create_check_show_delete(self): |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 219 | prior_role_id = self.roles[0]['id'] |
| 220 | implies_role_id = self.roles[1]['id'] |
| 221 | |
| 222 | # Create an inference rule from prior_role to implies_role |
| 223 | self._create_implied_role(prior_role_id, implies_role_id, |
| 224 | ignore_not_found=True) |
| 225 | |
| 226 | # Check if the inference rule exists |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 227 | self.roles_client.check_role_inference_rule( |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 228 | prior_role_id, implies_role_id) |
| 229 | |
jeremy.zhang | ef5d4e9 | 2017-05-04 19:19:27 +0800 | [diff] [blame] | 230 | # Show the inference rule and check its elements |
| 231 | resp_body = self.roles_client.show_role_inference_rule( |
| 232 | prior_role_id, implies_role_id) |
| 233 | self.assertIn('role_inference', resp_body) |
| 234 | role_inference = resp_body['role_inference'] |
| 235 | for key1 in ['prior_role', 'implies']: |
| 236 | self.assertIn(key1, role_inference) |
| 237 | for key2 in ['id', 'links', 'name']: |
| 238 | self.assertIn(key2, role_inference[key1]) |
| 239 | |
Rodrigo Duarte | ca3b39d | 2017-01-26 18:10:31 -0300 | [diff] [blame] | 240 | # Delete the inference rule |
| 241 | self.roles_client.delete_role_inference_rule( |
| 242 | prior_role_id, implies_role_id) |
| 243 | # Check if the inference rule no longer exists |
| 244 | self.assertRaises( |
| 245 | lib_exc.NotFound, |
| 246 | self.roles_client.show_role_inference_rule, |
| 247 | prior_role_id, |
| 248 | implies_role_id) |
| 249 | |
| 250 | @decorators.idempotent_id('dc6f5959-b74d-4e30-a9e5-a8255494ff00') |
| 251 | def test_roles_hierarchy(self): |
| 252 | # Create inference rule from "roles[0]" to "role[1]" |
| 253 | self._create_implied_role( |
| 254 | self.roles[0]['id'], self.roles[1]['id']) |
| 255 | |
| 256 | # Create inference rule from "roles[0]" to "role[2]" |
| 257 | self._create_implied_role( |
| 258 | self.roles[0]['id'], self.roles[2]['id']) |
| 259 | |
| 260 | # Create inference rule from "roles[2]" to "role" |
| 261 | self._create_implied_role( |
| 262 | self.roles[2]['id'], self.role['id']) |
| 263 | |
| 264 | # Listing inferences rules from "roles[2]" should only return "role" |
| 265 | rules = self.roles_client.list_role_inferences_rules( |
| 266 | self.roles[2]['id'])['role_inference'] |
| 267 | self.assertEqual(1, len(rules['implies'])) |
| 268 | self.assertEqual(self.role['id'], rules['implies'][0]['id']) |
| 269 | |
| 270 | # Listing inferences rules from "roles[0]" should return "roles[1]" and |
| 271 | # "roles[2]" (only direct rules are listed) |
| 272 | rules = self.roles_client.list_role_inferences_rules( |
| 273 | self.roles[0]['id'])['role_inference'] |
| 274 | implies_ids = [role['id'] for role in rules['implies']] |
| 275 | self.assertEqual(2, len(implies_ids)) |
| 276 | self.assertIn(self.roles[1]['id'], implies_ids) |
| 277 | self.assertIn(self.roles[2]['id'], implies_ids) |
| 278 | |
| 279 | @decorators.idempotent_id('c8828027-df48-4021-95df-b65b92c7429e') |
| 280 | def test_assignments_for_implied_roles_create_delete(self): |
| 281 | # Create a grant using "roles[0]" |
| 282 | self.roles_client.create_user_role_on_project( |
| 283 | self.project['id'], self.user_body['id'], self.roles[0]['id']) |
| 284 | self.addCleanup( |
| 285 | self.roles_client.delete_role_from_user_on_project, |
| 286 | self.project['id'], self.user_body['id'], self.roles[0]['id']) |
| 287 | |
| 288 | # Create an inference rule from "roles[0]" to "roles[1]" |
| 289 | self._create_implied_role(self.roles[0]['id'], self.roles[1]['id'], |
| 290 | ignore_not_found=True) |
| 291 | |
| 292 | # In the effective list of role assignments, both prior role and |
| 293 | # implied role should be present. This means that a user can |
| 294 | # authenticate using both roles (both roles will be present |
| 295 | # in the token). |
| 296 | params = {'scope.project.id': self.project['id'], |
| 297 | 'user.id': self.user_body['id']} |
| 298 | role_assignments = self.role_assignments.list_role_assignments( |
| 299 | effective=True, **params)['role_assignments'] |
| 300 | self.assertEqual(2, len(role_assignments)) |
| 301 | |
| 302 | roles_ids = [assignment['role']['id'] |
| 303 | for assignment in role_assignments] |
| 304 | self.assertIn(self.roles[0]['id'], roles_ids) |
| 305 | self.assertIn(self.roles[1]['id'], roles_ids) |
| 306 | |
| 307 | # After deleting the implied role, only the assignment with "roles[0]" |
| 308 | # should be present. |
| 309 | self.roles_client.delete_role_inference_rule( |
| 310 | self.roles[0]['id'], self.roles[1]['id']) |
| 311 | |
| 312 | role_assignments = self.role_assignments.list_role_assignments( |
| 313 | effective=True, **params)['role_assignments'] |
| 314 | self.assertEqual(1, len(role_assignments)) |
| 315 | |
| 316 | roles_ids = [assignment['role']['id'] |
| 317 | for assignment in role_assignments] |
| 318 | self.assertIn(self.roles[0]['id'], roles_ids) |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 319 | |
| 320 | @decorators.idempotent_id('d92a41d2-5501-497a-84bb-6e294330e8f8') |
| 321 | def test_domain_roles_create_delete(self): |
| 322 | domain_role = self.roles_client.create_role( |
| 323 | name=data_utils.rand_name('domain_role'), |
| 324 | domain_id=self.domain['id'])['role'] |
| 325 | self.addCleanup( |
| 326 | test_utils.call_and_ignore_notfound_exc, |
| 327 | self.roles_client.delete_role, |
| 328 | domain_role['id']) |
| 329 | |
| 330 | domain_roles = self.roles_client.list_roles( |
| 331 | domain_id=self.domain['id'])['roles'] |
| 332 | self.assertEqual(1, len(domain_roles)) |
| 333 | self.assertIn(domain_role, domain_roles) |
| 334 | |
| 335 | self.roles_client.delete_role(domain_role['id']) |
| 336 | domain_roles = self.roles_client.list_roles( |
| 337 | domain_id=self.domain['id'])['roles'] |
| 338 | self.assertEmpty(domain_roles) |
| 339 | |
| 340 | @decorators.idempotent_id('eb1e1c24-1bc4-4d47-9748-e127a1852c82') |
| 341 | def test_implied_domain_roles(self): |
| 342 | # Create two roles in the same domain |
| 343 | domain_role1 = self.setup_test_role(domain_id=self.domain['id']) |
| 344 | domain_role2 = self.setup_test_role(domain_id=self.domain['id']) |
| 345 | |
| 346 | # Check if we can create an inference rule from roles in the same |
| 347 | # domain |
| 348 | self._create_implied_role(domain_role1['id'], domain_role2['id']) |
| 349 | |
| 350 | # Create another role in a different domain |
| 351 | domain2 = self.setup_test_domain() |
| 352 | domain_role3 = self.setup_test_role(domain_id=domain2['id']) |
| 353 | |
| 354 | # Check if we can create cross domain implied roles |
| 355 | self._create_implied_role(domain_role1['id'], domain_role3['id']) |
| 356 | |
| 357 | # Finally, we also should be able to create an implied from a |
| 358 | # domain role to a global one |
| 359 | self._create_implied_role(domain_role1['id'], self.role['id']) |
| 360 | |
Rodrigo Duarte Sousa | 592148c | 2017-01-31 15:26:16 -0300 | [diff] [blame] | 361 | if CONF.identity_feature_enabled.forbid_global_implied_dsr: |
| 362 | # The contrary is not true: we can't create an inference rule |
| 363 | # from a global role to a domain role |
| 364 | self.assertRaises( |
| 365 | lib_exc.Forbidden, |
| 366 | self.roles_client.create_role_inference_rule, |
| 367 | self.role['id'], |
| 368 | domain_role1['id']) |
| 369 | |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 370 | @decorators.idempotent_id('3859df7e-5b78-4e4d-b10e-214c8953842a') |
| 371 | def test_assignments_for_domain_roles(self): |
| 372 | domain_role = self.setup_test_role(domain_id=self.domain['id']) |
| 373 | |
| 374 | # Create a grant using "domain_role" |
| 375 | self.roles_client.create_user_role_on_project( |
| 376 | self.project['id'], self.user_body['id'], domain_role['id']) |
| 377 | self.addCleanup( |
| 378 | self.roles_client.delete_role_from_user_on_project, |
| 379 | self.project['id'], self.user_body['id'], domain_role['id']) |
| 380 | |
| 381 | # NOTE(rodrigods): Regular roles would appear in the effective |
| 382 | # list of role assignments (meaning the role would be returned in |
| 383 | # a token) as a result from the grant above. This is not the case |
| 384 | # for domain roles, they should not appear in the effective role |
| 385 | # assignments list. |
| 386 | params = {'scope.project.id': self.project['id'], |
| 387 | 'user.id': self.user_body['id']} |
| 388 | role_assignments = self.role_assignments.list_role_assignments( |
| 389 | effective=True, **params)['role_assignments'] |
| 390 | self.assertEmpty(role_assignments) |
Felipe Monteiro | fe96c26 | 2017-03-31 05:25:26 +0100 | [diff] [blame] | 391 | |
| 392 | @decorators.idempotent_id('3748c316-c18f-4b08-997b-c60567bc6235') |
| 393 | def test_list_all_implied_roles(self): |
| 394 | # Create inference rule from "roles[0]" to "roles[1]" |
| 395 | self._create_implied_role( |
| 396 | self.roles[0]['id'], self.roles[1]['id']) |
| 397 | |
| 398 | # Create inference rule from "roles[0]" to "roles[2]" |
| 399 | self._create_implied_role( |
| 400 | self.roles[0]['id'], self.roles[2]['id']) |
| 401 | |
| 402 | # Create inference rule from "roles[2]" to "role" |
| 403 | self._create_implied_role( |
| 404 | self.roles[2]['id'], self.role['id']) |
| 405 | |
| 406 | rules = self.roles_client.list_all_role_inference_rules()[ |
| 407 | 'role_inferences'] |
| 408 | # Sort the rules by the number of inferences, since there should be 1 |
| 409 | # inference between "roles[2]" and "role" and 2 inferences for |
| 410 | # "roles[0]": between "roles[1]" and "roles[2]". |
| 411 | sorted_rules = sorted(rules, key=lambda r: len(r['implies'])) |
| 412 | |
| 413 | # Check that 2 sets of rules are returned. |
| 414 | self.assertEqual(2, len(sorted_rules)) |
| 415 | # Check that only 1 inference rule exists between "roles[2]" and "role" |
| 416 | self.assertEqual(1, len(sorted_rules[0]['implies'])) |
| 417 | # Check that 2 inference rules exist for "roles[0]": one between |
| 418 | # "roles[1]" and one between "roles[2]". |
| 419 | self.assertEqual(2, len(sorted_rules[1]['implies'])) |
| 420 | |
| 421 | # Check that "roles[2]" is the "prior_role" and that "role" is the |
| 422 | # "implies" role. |
| 423 | self.assertEqual(self.roles[2]['id'], |
| 424 | sorted_rules[0]['prior_role']['id']) |
| 425 | self.assertEqual(self.role['id'], |
| 426 | sorted_rules[0]['implies'][0]['id']) |
| 427 | |
| 428 | # Check that "roles[0]" is the "prior_role" and that "roles[1]" and |
| 429 | # "roles[2]" are the "implies" roles. |
| 430 | self.assertEqual(self.roles[0]['id'], |
| 431 | sorted_rules[1]['prior_role']['id']) |
| 432 | |
| 433 | implies_ids = [r['id'] for r in sorted_rules[1]['implies']] |
| 434 | self.assertIn(self.roles[1]['id'], implies_ids) |
| 435 | self.assertIn(self.roles[2]['id'], implies_ids) |