puppet-cinder/spec/classes/cinder_keystone_auth_spec.rb
Takashi Kajinami 0e78a0faae Customize roles assigned to cinder user
This patch introduces a new hieradata cinder::keystone::auth::roles,
to configure customized role assigned to cinder user.

This is required to configure service token feature, as it requires
special role is assigned to the user who uses the feature.

Change-Id: I02786009cf59cc113c390aa59a9297575ceb328c
2019-07-16 19:23:06 +09:00

188 lines
6.2 KiB
Ruby

require 'spec_helper'
describe 'cinder::keystone::auth' do
let :params do
{
:password => 'pw'
}
end
shared_examples 'cinder::keystone::auth' do
context 'with required parameters' do
it { is_expected.to contain_keystone_user('cinder').with(
:ensure => 'present',
:password => 'pw',
:email => 'cinder@localhost',
)}
it { is_expected.to contain_keystone_user_role('cinder@services').with(
:ensure => 'present',
:roles => ['admin']
)}
it { is_expected.to contain_keystone_service('cinderv2::volumev2').with(
:ensure => 'present',
:description => 'Cinder Service v2'
)}
it { is_expected.to contain_keystone_service('cinderv3::volumev3').with(
:ensure => 'present',
:description => 'Cinder Service v3'
)}
it { is_expected.to contain_keystone_endpoint('RegionOne/cinderv2::volumev2').with(
:ensure => 'present',
:public_url => 'http://127.0.0.1:8776/v2/%(tenant_id)s',
:admin_url => 'http://127.0.0.1:8776/v2/%(tenant_id)s',
:internal_url => 'http://127.0.0.1:8776/v2/%(tenant_id)s'
)}
it { is_expected.to contain_keystone_endpoint('RegionOne/cinderv3::volumev3').with(
:ensure => 'present',
:public_url => 'http://127.0.0.1:8776/v3/%(tenant_id)s',
:admin_url => 'http://127.0.0.1:8776/v3/%(tenant_id)s',
:internal_url => 'http://127.0.0.1:8776/v3/%(tenant_id)s'
)}
end
context 'when overriding parameters' do
before do
params.merge!({
:roles => ['admin', 'service'],
:region => 'RegionThree',
:public_url_v2 => 'https://10.0.42.1:4242/v42/%(tenant_id)s',
:admin_url_v2 => 'https://10.0.42.2:4242/v42/%(tenant_id)s',
:internal_url_v2 => 'https://10.0.42.3:4242/v42/%(tenant_id)s',
:public_url_v3 => 'https://10.0.42.1:4242/v43/%(tenant_id)s',
:admin_url_v3 => 'https://10.0.42.2:4242/v43/%(tenant_id)s',
:internal_url_v3 => 'https://10.0.42.3:4242/v43/%(tenant_id)s'
})
end
it { is_expected.to contain_keystone_user_role('cinder@services').with(
:ensure => 'present',
:roles => ['admin', 'service']
)}
it { is_expected.to contain_keystone_endpoint('RegionThree/cinderv2::volumev2').with(
:ensure => 'present',
:public_url => 'https://10.0.42.1:4242/v42/%(tenant_id)s',
:admin_url => 'https://10.0.42.2:4242/v42/%(tenant_id)s',
:internal_url => 'https://10.0.42.3:4242/v42/%(tenant_id)s'
)}
it { is_expected.to contain_keystone_endpoint('RegionThree/cinderv3::volumev3').with(
:ensure => 'present',
:public_url => 'https://10.0.42.1:4242/v43/%(tenant_id)s',
:admin_url => 'https://10.0.42.2:4242/v43/%(tenant_id)s',
:internal_url => 'https://10.0.42.3:4242/v43/%(tenant_id)s'
)}
end
context 'when endpoint should not be configured' do
before do
params.merge!(
:configure_endpoint_v2 => false,
:configure_endpoint_v3 => false
)
end
it { is_expected.not_to contain_keystone_endpoint('RegionOne/cinderv2::volumev2') }
it { is_expected.not_to contain_keystone_endpoint('RegionOne/cinderv3::volumev3') }
end
context 'when user should not be configured' do
before do
params.merge!(
:configure_user => false
)
end
it { is_expected.not_to contain_keystone_user('cinder') }
it { is_expected.to contain_keystone_user_role('cinder@services') }
it { is_expected.to contain_keystone_service('cinderv3::volumev3').with(
:ensure => 'present',
:description => 'Cinder Service v3'
)}
end
context 'when user and user role should not be configured' do
before do
params.merge!(
:configure_user => false,
:configure_user_role => false
)
end
it { is_expected.not_to contain_keystone_user('cinder') }
it { is_expected.not_to contain_keystone_user_role('cinder@services') }
it { is_expected.to contain_keystone_service('cinderv3::volumev3').with(
:ensure => 'present',
:description => 'Cinder Service v3'
)}
end
context 'when user and user role for v2 should be configured' do
before do
params.merge!(
:configure_user_v2 => true,
:configure_user_role_v2 => true,
)
end
it { is_expected.to contain_keystone__resource__service_identity('cinderv2').with(
:configure_user => true,
:configure_user_role => true,
:email => 'cinderv2@localhost',
:tenant => 'services'
)}
end
context 'when user and user role for v3 should be configured' do
before do
params.merge!(
:configure_user_v3 => true,
:configure_user_role_v3 => true,
)
end
it { is_expected.to contain_keystone__resource__service_identity('cinderv3').with(
:configure_user => true,
:configure_user_role => true,
:email => 'cinderv3@localhost',
:tenant => 'services'
)}
end
context 'when overriding service names' do
before do
params.merge!(
:service_name_v2 => 'cinder_service_v2',
:service_name_v3 => 'cinder_service_v3',
)
end
it { is_expected.to contain_keystone_user('cinder') }
it { is_expected.to contain_keystone_user_role('cinder@services') }
it { is_expected.to contain_keystone_service('cinder_service_v2::volumev2') }
it { is_expected.to contain_keystone_service('cinder_service_v3::volumev3') }
it { is_expected.to contain_keystone_endpoint('RegionOne/cinder_service_v2::volumev2') }
it { is_expected.to contain_keystone_endpoint('RegionOne/cinder_service_v3::volumev3') }
end
end
on_supported_os({
:supported_os => OSDefaults.get_supported_os
}).each do |os,facts|
context "on #{os}" do
let (:facts) do
facts.merge!(OSDefaults.get_facts())
end
it_behaves_like 'cinder::keystone::auth'
end
end
end