Identity V3 Tests - Domain Configurations

Tests for identity v3 domain configurations

Co-Authored-By: Nicolas Helgeson <nh202b@att.com>

Depends-On: I2f6229076aa7d2939dd91c487085ea73de001403
Change-Id: I5122cf3459306577d152a420c46be9eabc060a3e
This commit is contained in:
Felipe Monteiro 2017-04-17 19:32:45 +01:00
parent 0854dedaec
commit 4cf2ffb432
3 changed files with 173 additions and 0 deletions

View File

@ -213,6 +213,7 @@ class BaseIdentityV3RbacTest(BaseIdentityRbacTest):
cls.creds_client = cls.os_primary.credentials_client
cls.consumers_client = cls.os_primary.oauth_consumers_client
cls.domains_client = cls.os_primary.domains_client
cls.domain_config_client = cls.os_primary.domain_config_client
cls.endpoints_client = cls.os_primary.endpoints_v3_client
cls.groups_client = cls.os_primary.groups_client
cls.projects_client = cls.os_primary.projects_client

View File

@ -0,0 +1,167 @@
# Copyright 2017 AT&T Corporation.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import decorators
from patrole_tempest_plugin import rbac_rule_validation
from patrole_tempest_plugin.tests.api.identity import rbac_base
CONF = config.CONF
class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
"""RBAC tests for domain configuration client.
Provides coverage for the following policy actions:
https://github.com/openstack/keystone/blob/master/keystone/common/policies/domain_config.py
"""
identity = {"driver": "ldap"}
ldap = {"url": "ldap://myldap.com:389/",
"user_tree_dn": "ou=Users,dc=my_new_root,dc=org"}
@classmethod
def setup_clients(cls):
super(DomainConfigurationV3RbacTest, cls).setup_clients()
cls.client = cls.domain_config_client
@classmethod
def resource_setup(cls):
super(DomainConfigurationV3RbacTest, cls).resource_setup()
cls.domain_id = cls.setup_test_domain()['id']
def setUp(self):
super(DomainConfigurationV3RbacTest, self).setUp()
self._create_domain_config(self.domain_id)
def _create_domain_config(self, domain_id):
domain_config = self.client.create_domain_config(
domain_id, identity=self.identity, ldap=self.ldap)['config']
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.client.delete_domain_config,
domain_id)
return domain_config
@rbac_rule_validation.action(service="keystone",
rule="identity:create_domain_config")
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd115')
def test_create_domain_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self._create_domain_config(self.domain_id)
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config")
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd118')
def test_show_domain_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_domain_config(self.domain_id)['config']
@decorators.idempotent_id('1b539f95-4991-4e09-960f-fa771e1007d7')
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config")
def test_show_domain_group_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_domain_group_config(self.domain_id, 'identity')[
'config']
@decorators.idempotent_id('590c774d-a294-44f8-866e-aac9f4ab3809')
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config")
def test_show_domain_group_option_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_domain_group_option_config(self.domain_id, 'identity',
'driver')['config']
@decorators.idempotent_id('21053885-1ce3-4167-b5e3-e470253481da')
@rbac_rule_validation.action(
service="keystone",
rule="identity:get_security_compliance_domain_config")
def test_show_security_compliance_domain_config(self):
# The "security_compliance" group can only be shown for the default
# domain.
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_domain_group_config(
CONF.identity.default_domain_id, 'security_compliance')
@decorators.idempotent_id('d1addd10-9ae4-4360-9961-47324fd22f23')
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config_default")
def test_show_default_config_settings(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_default_config_settings()['config']
@decorators.idempotent_id('63183377-251f-4622-81f0-6b58a8a285c9')
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config_default")
def test_show_default_group_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_default_group_config('identity')['config']
@decorators.idempotent_id('6440e9c1-e8da-474d-9118-89996fffe5f8')
@rbac_rule_validation.action(service="keystone",
rule="identity:get_domain_config_default")
def test_show_default_group_option(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.show_default_group_option('identity', 'driver')['config']
@rbac_rule_validation.action(service="keystone",
rule="identity:update_domain_config")
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd116')
def test_update_domain_config(self):
updated_config = {'ldap': {'url': data_utils.rand_url()}}
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.update_domain_config(
self.domain_id, **updated_config)['config']
@decorators.idempotent_id('6e32bf96-dbe9-4ac8-b814-0e79fa948285')
@rbac_rule_validation.action(service="keystone",
rule="identity:update_domain_config")
def test_update_domain_group_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.update_domain_group_config(
self.domain_id, 'identity', identity=self.identity)['config']
@decorators.idempotent_id('d2c510da-a077-4c67-9522-27745ef2812b')
@rbac_rule_validation.action(service="keystone",
rule="identity:update_domain_config")
def test_update_domain_group_option_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.update_domain_group_option_config(
self.domain_id, 'identity', 'driver', driver='ldap')['config']
@rbac_rule_validation.action(service="keystone",
rule="identity:delete_domain_config")
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd117')
def test_delete_domain_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.delete_domain_config(self.domain_id)
@decorators.idempotent_id('f479694b-df02-4d5a-88b6-c8b52f9341eb')
@rbac_rule_validation.action(service="keystone",
rule="identity:delete_domain_config")
def test_delete_domain_group_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.delete_domain_group_config(self.domain_id, 'identity')
@decorators.idempotent_id('f594bde3-31c9-414f-922d-0ddafdc0ca40')
@rbac_rule_validation.action(service="keystone",
rule="identity:delete_domain_config")
def test_delete_domain_group_option_config(self):
self.rbac_utils.switch_role(self, toggle_rbac_role=True)
self.client.delete_domain_group_option_config(
self.domain_id, 'identity', 'driver')

View File

@ -0,0 +1,5 @@
---
features:
- |
Adds RBAC tests for the domain configuration Keystone v3 extension
API.