tempest/tempest/api/compute/admin/test_keypairs_v210.py
zhufl a0e87dc582 Adding description for testcases - compute part3
When Tempest is used in customer site, often we are required to
provide a testcase list including testcase names and descriptions.
Now no this kind of doc is available, so we can add descriptions
with the format of doc string for every testcase, so later we
can generata such a testcase description list.

There are hundreds of testcases missing descriptions, so we can
add them gradually, and limit the modified files in one patch
for the convenience of reviewing.

Change-Id: I3726f5df4afd23366a5a34de9c9da8b69287d30e
partially-implements: blueprint testcase-description
2020-05-29 07:53:33 +08:00

87 lines
3.9 KiB
Python

# Copyright 2016 NEC Corporation.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api.compute.keypairs import base
from tempest.lib.common.utils import data_utils
from tempest.lib import decorators
class KeyPairsV210TestJSON(base.BaseKeypairTest):
"""Tests KeyPairs API with microversion higher than 2.9"""
credentials = ['primary', 'admin']
min_microversion = '2.10'
@classmethod
def setup_clients(cls):
super(KeyPairsV210TestJSON, cls).setup_clients()
cls.client = cls.os_admin.keypairs_client
cls.non_admin_client = cls.os_primary.keypairs_client
def _create_and_check_keypairs(self, user_id):
key_list = list()
for _ in range(2):
k_name = data_utils.rand_name('keypair')
keypair = self.create_keypair(k_name,
keypair_type='ssh',
user_id=user_id,
client=self.client)
self.assertEqual(k_name, keypair['name'],
"The created keypair name is not equal "
"to the requested name!")
self.assertEqual(user_id, keypair['user_id'],
"The created keypair is not for requested user!")
keypair.pop('private_key', None)
keypair.pop('user_id')
key_list.append(keypair)
return key_list
@decorators.idempotent_id('3c8484af-cfb3-48f6-b8ba-d5d58bbf3eac')
def test_admin_manage_keypairs_for_other_users(self):
"""Test admin managing keypairs for other users
First admin creates a keypair for an other user, then admin lists
keypairs filtered by that user, and keypairs created for that user
should appear in the result and keypairs not created for that user
should not appear in the result.
"""
user_id = self.non_admin_client.user_id
key_list = self._create_and_check_keypairs(user_id)
first_keyname = key_list[0]['name']
keypair_detail = self.client.show_keypair(first_keyname,
user_id=user_id)['keypair']
self.assertEqual(first_keyname, keypair_detail['name'])
self.assertEqual(user_id, keypair_detail['user_id'],
"The fetched keypair is not for requested user!")
# Create an admin keypair
admin_keypair = self.create_keypair(keypair_type='ssh',
client=self.client)
admin_keypair.pop('private_key', None)
admin_keypair.pop('user_id')
# Admin fetch keypairs list of non admin user
keypairs = self.client.list_keypairs(user_id=user_id)['keypairs']
fetched_list = [keypair['keypair'] for keypair in keypairs]
# Check admin keypair is not present in non admin user keypairs list
self.assertNotIn(admin_keypair, fetched_list,
"The fetched user keypairs has admin keypair!")
# Now check if all the created keypairs are in the fetched list
missing_kps = [kp for kp in key_list if kp not in fetched_list]
self.assertFalse(missing_kps,
"Failed to find keypairs %s in fetched list"
% ', '.join(m_key['name'] for m_key in missing_kps))