tempest/tempest/api/compute/admin/test_keypairs_v210.py
Martin Kopec 213d0a4c68 Pass resource_name_prefix from tests
The resource_name_prefix was introduced by [1] and in order
to allow users to fully customize the prefix of all resources
created by tempest, it needs to be used in tests.

[1] https://review.opendev.org/c/openstack/tempest/+/897231

Change-Id: I1e23d7a276b32e236fc8897d265c037773eca79d
2023-12-07 11:47:00 +01:00

91 lines
4.0 KiB
Python

# Copyright 2016 NEC Corporation.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api.compute.keypairs import base
from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib import decorators
CONF = config.CONF
class KeyPairsV210TestJSON(base.BaseKeypairTest):
"""Tests KeyPairs API with microversion higher than 2.9"""
credentials = ['primary', 'admin']
min_microversion = '2.10'
@classmethod
def setup_clients(cls):
super(KeyPairsV210TestJSON, cls).setup_clients()
cls.client = cls.os_admin.keypairs_client
cls.non_admin_client = cls.os_primary.keypairs_client
def _create_and_check_keypairs(self, user_id):
key_list = list()
for _ in range(2):
k_name = data_utils.rand_name(
prefix=CONF.resource_name_prefix, name='keypair')
keypair = self.create_keypair(k_name,
keypair_type='ssh',
user_id=user_id,
client=self.client)
self.assertEqual(k_name, keypair['name'],
"The created keypair name is not equal "
"to the requested name!")
self.assertEqual(user_id, keypair['user_id'],
"The created keypair is not for requested user!")
keypair.pop('private_key', None)
keypair.pop('user_id')
key_list.append(keypair)
return key_list
@decorators.idempotent_id('3c8484af-cfb3-48f6-b8ba-d5d58bbf3eac')
def test_admin_manage_keypairs_for_other_users(self):
"""Test admin managing keypairs for other users
First admin creates a keypair for an other user, then admin lists
keypairs filtered by that user, and keypairs created for that user
should appear in the result and keypairs not created for that user
should not appear in the result.
"""
user_id = self.non_admin_client.user_id
key_list = self._create_and_check_keypairs(user_id)
first_keyname = key_list[0]['name']
keypair_detail = self.client.show_keypair(first_keyname,
user_id=user_id)['keypair']
self.assertEqual(first_keyname, keypair_detail['name'])
self.assertEqual(user_id, keypair_detail['user_id'],
"The fetched keypair is not for requested user!")
# Create an admin keypair
admin_keypair = self.create_keypair(keypair_type='ssh',
client=self.client)
admin_keypair.pop('private_key', None)
admin_keypair.pop('user_id')
# Admin fetch keypairs list of non admin user
keypairs = self.client.list_keypairs(user_id=user_id)['keypairs']
fetched_list = [keypair['keypair'] for keypair in keypairs]
# Check admin keypair is not present in non admin user keypairs list
self.assertNotIn(admin_keypair, fetched_list,
"The fetched user keypairs has admin keypair!")
# Now check if all the created keypairs are in the fetched list
missing_kps = [kp for kp in key_list if kp not in fetched_list]
self.assertFalse(missing_kps,
"Failed to find keypairs %s in fetched list"
% ', '.join(m_key['name'] for m_key in missing_kps))