Files
python-barbicanclient/functionaltests/client/v1/functional/test_containers.py
Arun Kant af771fecf4 Part 3: Adding ACL functional tests.
Added functional tests for CLI commands.
Added functional tests for client API.

Modified ACL client API functional test not to use behavior class
as per recent change in secrets, containers, and orders.

Change-Id: Ibacf33e834daa2c70ef1b0032495bbe443957cac
2015-10-06 08:41:40 -07:00

342 lines
12 KiB
Python

# Copyright (c) 2015 Rackspace, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
# implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from testtools import testcase
from functionaltests import utils
from functionaltests.client import base
from functionaltests.common import cleanup
from barbicanclient import exceptions
create_secret_defaults_data = {
"name": "AES key",
"expiration": "2018-02-28T19:14:44.180394",
"algorithm": "aes",
"bit_length": 256,
"mode": "cbc",
"payload": "gF6+lLoF3ohA9aPRpt+6bQ==",
"payload_content_type": "application/octet-stream",
"payload_content_encoding": "base64",
}
create_container_defaults_data = {
"name": "containername",
"secrets": {}
}
create_container_rsa_data = {
"name": "rsacontainer",
}
create_container_empty_data = {
"name": None,
"secrets": {}
}
accepted_str_values = {
'alphanumeric': ['a2j3j6ll9'],
'punctuation': ['~!@#$%^&*()_+`-={}[]|:;<>,.?'],
'len_255': [str(bytearray().zfill(255))],
'uuid': ['54262d9d-4bc7-4821-8df0-dc2ca8e112bb'],
'empty': ['']
}
@utils.parameterized_test_case
class BaseContainersTestCase(base.TestCase):
def setUp(self):
super(BaseContainersTestCase, self).setUp()
self.cleanup = cleanup.CleanUp(self.barbicanclient)
# Set up three secrets
self.secret_ref_1, self.secret_1 = self._create_a_secret()
self.secret_ref_2, self.secret_2 = self._create_a_secret()
self.secret_ref_3, self.secret_3 = self._create_a_secret()
self.secret_list = [self.secret_ref_1, self.secret_ref_2,
self.secret_ref_3]
secrets_dict = {'secret_1': self.secret_1, 'secret_2': self.secret_2,
'secret_3': self.secret_3}
create_container_defaults_data['secrets'] = secrets_dict
create_container_rsa_data['public_key'] = self.secret_1
create_container_rsa_data['private_key'] = self.secret_2
create_container_rsa_data['private_key_passphrase'] = self.secret_3
def tearDown(self):
"""Handles test cleanup.
It should be noted that delete all secrets must be called before
delete containers.
"""
self.cleanup.delete_all_entities()
super(BaseContainersTestCase, self).tearDown()
def _create_a_secret(self):
secret = self.barbicanclient.secrets.create(
**create_secret_defaults_data)
secret_ref = self.cleanup.add_entity(secret)
return secret_ref, secret
@utils.parameterized_test_case
class GenericContainersTestCase(BaseContainersTestCase):
@testcase.attr('positive')
def test_create_container_defaults_none_secret_name(self):
"""Covers creating a container with None as a secret name."""
container = self.barbicanclient.containers.create(
**create_container_defaults_data)
container.name = None
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
@testcase.attr('negative')
def test_create_defaults_duplicate_secret_refs(self):
"""Covers creating a container with a duplicated secret ref."""
secrets = {'secret_1': self.secret_1,
'secret_2': self.secret_1,
'secret_3': self.secret_1}
create_container_defaults_data['secrets'] = secrets
container = self.barbicanclient.containers.create(
**create_container_defaults_data)
e = self.assertRaises(
exceptions.HTTPClientError,
container.store
)
self.assertEqual(e.status_code, 400)
@testcase.attr('negative')
def test_get_non_existent_container(self):
"""A get on a container that does not exist.
This should return a container incorrectly specified error since
the container does not have a correctly formatted UUID
"""
base_url = self.barbicanclient.containers._api.endpoint_override
url = base_url + '/containers/notauuid'
e = self.assertRaises(ValueError, self.barbicanclient.containers.get,
url)
self.assertEqual(e.message, 'Container incorrectly specified.')
@testcase.attr('negative')
def test_get_non_existent_container_valid_uuid(self):
"""A get on a container that does not exist with valid UUID
This should return a 404.
"""
base_url = self.barbicanclient.containers._api.endpoint_override
uuid = 'de305d54-75b4-431b-cccc-eb6b9e546013'
url = base_url + '/containers/' + uuid
e = self.assertRaises(
exceptions.HTTPClientError,
self.barbicanclient.containers.get,
url
)
self.assertEqual(e.status_code, 404)
@testcase.attr('negative')
def test_delete_non_existent_container(self):
"""A delete on a container that does not exist.
This should return a container incorrectly specified error since
the container does not have a correctly formatted UUID
"""
base_url = self.barbicanclient.containers._api.endpoint_override
url = base_url + '/containers/notauuid'
e = self.assertRaises(ValueError, self.barbicanclient.containers.get,
url)
self.assertEqual(e.message, 'Container incorrectly specified.')
@testcase.attr('negative')
def test_delete_non_existent_container_valid_uuid(self):
"""A delete on a container that does not exist with valid UUID
This should return a 404.
"""
uuid = 'de305d54-75b4-431b-cccc-eb6b9e546013'
base_url = self.barbicanclient.containers._api.endpoint_override
url = base_url + '/containers/' + uuid
e = self.assertRaises(
exceptions.HTTPClientError,
self.barbicanclient.containers.get,
url
)
self.assertEqual(e.status_code, 404)
@utils.parameterized_dataset({'0': [0], '1': [1], '50': [50]})
@testcase.attr('positive')
def test_create_container_defaults_size(self, num_secrets):
"""Covers creating containers of various sizes."""
secrets = {}
for i in range(0, num_secrets):
secret_ref, secret = self._create_a_secret()
secrets['other_secret{0}'.format(i)] = secret
create_container_defaults_data['secrets'] = secrets
container = self.barbicanclient.containers.create(
**create_container_defaults_data)
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
@utils.parameterized_dataset(accepted_str_values)
@testcase.attr('positive')
def test_create_container_defaults_name(self, name):
"""Covers creating generic containers with various names."""
container = self.barbicanclient.containers.create(
**create_container_defaults_data)
container.name = name
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
@utils.parameterized_dataset(accepted_str_values)
@testcase.attr('positive')
def test_create_container_defaults_secret_name(self, name=None):
"""Covers creating containers with various secret ref names."""
secrets = {name: self.secret_1}
create_container_defaults_data['secrets'] = secrets
container = self.barbicanclient.containers.create(
**create_container_defaults_data)
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
container_resp = self.barbicanclient.containers.get(container_ref)
self.assertIsNotNone(container_resp.secret_refs.get(name))
@testcase.attr('positive')
def test_container_read_with_acls(self):
"""Access default ACL settings data on recently created container.
By default, 'read' ACL settings are there for a container.
"""
test_model = self.barbicanclient.containers.create(
**create_container_defaults_data)
container_ref = self.cleanup.add_entity(test_model)
self.assertIsNotNone(container_ref)
container_entity = self.barbicanclient.containers.get(container_ref)
self.assertIsNotNone(container_entity.acls)
self.assertIsNotNone(container_entity.acls.read)
self.assertEqual([], container_entity.acls.read.users)
@utils.parameterized_test_case
class RSAContainersTestCase(BaseContainersTestCase):
@testcase.attr('positive')
def test_create_containers_rsa_no_passphrase(self):
"""Covers creating an rsa container without a passphrase."""
create_container_rsa_data['private_key_passphrase'] = None
container = self.barbicanclient.containers.create_rsa(
**create_container_rsa_data)
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
container_resp = self.barbicanclient.containers.get(container_ref)
self.assertIsNone(container_resp.private_key_passphrase)
self.assertEqual(len(container_resp.secrets), 2)
@utils.parameterized_dataset(accepted_str_values)
@testcase.attr('positive')
def test_create_container_rsa_name(self, name):
"""Covers creating rsa containers with various names."""
container = self.barbicanclient.containers.create_rsa(
**create_container_rsa_data)
container.name = name
container_ref = self.cleanup.add_entity(container)
self.assertIsNotNone(container_ref)
container_resp = self.barbicanclient.containers.get(container_ref)
self.assertEqual(container_resp.name, name)
@testcase.attr('negative')
def test_create_rsa_invalid_key_names(self):
"""Covers creating an RSA container with incorrect names."""
incorrect_names_rsa_container = {
"name": "bad_container",
"secret1": self.secret_ref_1,
"secret2": self.secret_ref_2,
"secret3": self.secret_ref_3
}
e = self.assertRaises(TypeError,
self.barbicanclient.containers.create_rsa,
**incorrect_names_rsa_container)
self.assertIn('got an unexpected keyword argument', e.message)
@testcase.attr('negative')
def test_create_rsa_no_public_key(self):
"""Creating an rsa container without a public key should fail.
RSA containers must have at least a public key and private key.
"""
no_public_key_rsa_container = {"name": "no_pub_key",
"private_key": self.secret_1,
"private_key_passphrase": self.secret_2,
}
container = self.barbicanclient.containers.create_rsa(
**no_public_key_rsa_container)
e = self.assertRaises(
exceptions.HTTPClientError,
container.store
)
self.assertEqual(e.status_code, 400)
@testcase.attr('negative')
def test_create_rsa_no_private_key(self):
"""Creating an rsa container without a private key should fail.
RSA containers must have at least a public key and private key.
"""
no_private_key_rsa_container = {
"name": "no_pub_key",
"public_key": self.secret_1,
"private_key_passphrase": self.secret_2}
container = self.barbicanclient.containers.create_rsa(
**no_private_key_rsa_container)
e = self.assertRaises(
exceptions.HTTPClientError,
container.store
)
self.assertEqual(e.status_code, 400)