334 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			334 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# vim: tabstop=4 shiftwidth=4 softtabstop=4
 | 
						|
 | 
						|
# Copyright 2010 United States Government as represented by the
 | 
						|
# Administrator of the National Aeronautics and Space Administration.
 | 
						|
# All Rights Reserved.
 | 
						|
#
 | 
						|
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
 | 
						|
#    not use this file except in compliance with the License. You may obtain
 | 
						|
#    a copy of the License at
 | 
						|
#
 | 
						|
#         http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
#    Unless required by applicable law or agreed to in writing, software
 | 
						|
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | 
						|
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | 
						|
#    License for the specific language governing permissions and limitations
 | 
						|
#    under the License.
 | 
						|
 | 
						|
import logging
 | 
						|
from M2Crypto import X509
 | 
						|
import unittest
 | 
						|
 | 
						|
from nova import crypto
 | 
						|
from nova import flags
 | 
						|
from nova import test
 | 
						|
from nova.auth import manager
 | 
						|
from nova.api.ec2 import cloud
 | 
						|
 | 
						|
FLAGS = flags.FLAGS
 | 
						|
 | 
						|
class user_generator(object):
 | 
						|
    def __init__(self, manager, **user_state):
 | 
						|
        if 'name' not in user_state:
 | 
						|
            user_state['name'] = 'test1'
 | 
						|
        self.manager = manager
 | 
						|
        self.user = manager.create_user(**user_state)
 | 
						|
 | 
						|
    def __enter__(self):
 | 
						|
        return self.user
 | 
						|
 | 
						|
    def __exit__(self, value, type, trace):
 | 
						|
        self.manager.delete_user(self.user)
 | 
						|
 | 
						|
class project_generator(object):
 | 
						|
    def __init__(self, manager, **project_state):
 | 
						|
        if 'name' not in project_state:
 | 
						|
            project_state['name'] = 'testproj'
 | 
						|
        if 'manager_user' not in project_state:
 | 
						|
            project_state['manager_user'] = 'test1'
 | 
						|
        self.manager = manager
 | 
						|
        self.project = manager.create_project(**project_state)
 | 
						|
 | 
						|
    def __enter__(self):
 | 
						|
        return self.project
 | 
						|
 | 
						|
    def __exit__(self, value, type, trace):
 | 
						|
        self.manager.delete_project(self.project)
 | 
						|
 | 
						|
class user_and_project_generator(object):
 | 
						|
    def __init__(self, manager, user_state={}, project_state={}):
 | 
						|
        self.manager = manager
 | 
						|
        if 'name' not in user_state:
 | 
						|
            user_state['name'] = 'test1'
 | 
						|
        if 'name' not in project_state:
 | 
						|
            project_state['name'] = 'testproj'
 | 
						|
        if 'manager_user' not in project_state:
 | 
						|
            project_state['manager_user'] = 'test1'
 | 
						|
        self.user = manager.create_user(**user_state)
 | 
						|
        self.project = manager.create_project(**project_state)
 | 
						|
 | 
						|
    def __enter__(self):
 | 
						|
        return (self.user, self.project)
 | 
						|
 | 
						|
    def __exit__(self, value, type, trace):
 | 
						|
        self.manager.delete_user(self.user)
 | 
						|
        self.manager.delete_project(self.project)
 | 
						|
 | 
						|
class AuthManagerTestCase(object):
 | 
						|
    def setUp(self):
 | 
						|
        FLAGS.auth_driver = self.auth_driver
 | 
						|
        super(AuthManagerTestCase, self).setUp()
 | 
						|
        self.flags(connection_type='fake')
 | 
						|
        self.manager = manager.AuthManager()
 | 
						|
 | 
						|
    def test_create_and_find_user(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            self.assert_(self.manager.get_user('test1'))
 | 
						|
 | 
						|
    def test_create_and_find_with_properties(self):
 | 
						|
        with user_generator(self.manager, name="herbert", secret="classified",
 | 
						|
                        access="private-party"):
 | 
						|
            u = self.manager.get_user('herbert')
 | 
						|
            self.assertEqual('herbert', u.id)
 | 
						|
            self.assertEqual('herbert', u.name)
 | 
						|
            self.assertEqual('classified', u.secret)
 | 
						|
            self.assertEqual('private-party', u.access)
 | 
						|
 | 
						|
    def test_004_signature_is_valid(self):
 | 
						|
        #self.assertTrue(self.manager.authenticate( **boto.generate_url ... ? ? ? ))
 | 
						|
        pass
 | 
						|
        #raise NotImplementedError
 | 
						|
 | 
						|
    def test_005_can_get_credentials(self):
 | 
						|
        return
 | 
						|
        credentials = self.manager.get_user('test1').get_credentials()
 | 
						|
        self.assertEqual(credentials,
 | 
						|
        'export EC2_ACCESS_KEY="access"\n' +
 | 
						|
        'export EC2_SECRET_KEY="secret"\n' +
 | 
						|
        'export EC2_URL="http://127.0.0.1:8773/services/Cloud"\n' +
 | 
						|
        'export S3_URL="http://127.0.0.1:3333/"\n' +
 | 
						|
        'export EC2_USER_ID="test1"\n')
 | 
						|
 | 
						|
    def test_can_list_users(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            with user_generator(self.manager, name="test2"):
 | 
						|
                users = self.manager.get_users()
 | 
						|
                self.assert_(filter(lambda u: u.id == 'test1', users))
 | 
						|
                self.assert_(filter(lambda u: u.id == 'test2', users))
 | 
						|
                self.assert_(not filter(lambda u: u.id == 'test3', users))
 | 
						|
        
 | 
						|
    def test_can_add_and_remove_user_role(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            self.assertFalse(self.manager.has_role('test1', 'itsec'))
 | 
						|
            self.manager.add_role('test1', 'itsec')
 | 
						|
            self.assertTrue(self.manager.has_role('test1', 'itsec'))
 | 
						|
            self.manager.remove_role('test1', 'itsec')
 | 
						|
            self.assertFalse(self.manager.has_role('test1', 'itsec'))
 | 
						|
 | 
						|
    def test_can_create_and_get_project(self):
 | 
						|
        with user_and_project_generator(self.manager) as (u,p):
 | 
						|
            self.assert_(self.manager.get_user('test1'))
 | 
						|
            self.assert_(self.manager.get_user('test1'))
 | 
						|
            self.assert_(self.manager.get_project('testproj'))
 | 
						|
 | 
						|
    def test_can_list_projects(self):
 | 
						|
        with user_and_project_generator(self.manager):
 | 
						|
            with project_generator(self.manager, name="testproj2"):
 | 
						|
                projects = self.manager.get_projects()
 | 
						|
                self.assert_(filter(lambda p: p.name == 'testproj', projects))
 | 
						|
                self.assert_(filter(lambda p: p.name == 'testproj2', projects))
 | 
						|
                self.assert_(not filter(lambda p: p.name == 'testproj3',
 | 
						|
                                        projects))
 | 
						|
 | 
						|
    def test_can_create_and_get_project_with_attributes(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            with project_generator(self.manager, description='A test project'):
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertEqual('A test project', project.description)
 | 
						|
 | 
						|
    def test_can_create_project_with_manager(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.assertEqual('test1', project.project_manager_id)
 | 
						|
            self.assertTrue(self.manager.is_project_manager(user, project))
 | 
						|
 | 
						|
    def test_create_project_assigns_manager_to_members(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.assertTrue(self.manager.is_project_member(user, project))
 | 
						|
 | 
						|
    def test_no_extra_project_members(self):
 | 
						|
        with user_generator(self.manager, name='test2') as baduser:
 | 
						|
            with user_and_project_generator(self.manager) as (user, project):
 | 
						|
                self.assertFalse(self.manager.is_project_member(baduser,
 | 
						|
                                                                 project))
 | 
						|
 | 
						|
    def test_no_extra_project_managers(self):
 | 
						|
        with user_generator(self.manager, name='test2') as baduser:
 | 
						|
            with user_and_project_generator(self.manager) as (user, project):
 | 
						|
                self.assertFalse(self.manager.is_project_manager(baduser,
 | 
						|
                                                                 project))
 | 
						|
 | 
						|
    def test_can_add_user_to_project(self):
 | 
						|
        with user_generator(self.manager, name='test2') as user:
 | 
						|
            with user_and_project_generator(self.manager) as (_user, project):
 | 
						|
                self.manager.add_to_project(user, project)
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertTrue(self.manager.is_project_member(user, project))
 | 
						|
 | 
						|
    def test_can_remove_user_from_project(self):
 | 
						|
        with user_generator(self.manager, name='test2') as user:
 | 
						|
            with user_and_project_generator(self.manager) as (_user, project):
 | 
						|
                self.manager.add_to_project(user, project)
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertTrue(self.manager.is_project_member(user, project))
 | 
						|
                self.manager.remove_from_project(user, project)
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertFalse(self.manager.is_project_member(user, project))
 | 
						|
 | 
						|
    def test_can_add_remove_user_with_role(self):
 | 
						|
        with user_generator(self.manager, name='test2') as user:
 | 
						|
            with user_and_project_generator(self.manager) as (_user, project):
 | 
						|
                # NOTE(todd): after modifying users you must reload project
 | 
						|
                self.manager.add_to_project(user, project)
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.manager.add_role(user, 'developer', project)
 | 
						|
                self.assertTrue(self.manager.is_project_member(user, project))
 | 
						|
                self.manager.remove_from_project(user, project)
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertFalse(self.manager.has_role(user, 'developer',
 | 
						|
                                                       project))
 | 
						|
                self.assertFalse(self.manager.is_project_member(user, project))
 | 
						|
 | 
						|
    def test_can_generate_x509(self):
 | 
						|
        # NOTE(todd): this doesn't assert against the auth manager
 | 
						|
        #             so it probably belongs in crypto_unittest
 | 
						|
        #             but I'm leaving it where I found it.
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            # NOTE(todd): Should mention why we must setup controller first
 | 
						|
            #             (somebody please clue me in)
 | 
						|
            cloud_controller = cloud.CloudController()
 | 
						|
            cloud_controller.setup()
 | 
						|
            _key, cert_str = self.manager._generate_x509_cert('test1',
 | 
						|
                                                              'testproj')
 | 
						|
            logging.debug(cert_str)
 | 
						|
 | 
						|
            # Need to verify that it's signed by the right intermediate CA
 | 
						|
            full_chain = crypto.fetch_ca(project_id='testproj', chain=True)
 | 
						|
            int_cert = crypto.fetch_ca(project_id='testproj', chain=False)
 | 
						|
            cloud_cert = crypto.fetch_ca()
 | 
						|
            logging.debug("CA chain:\n\n =====\n%s\n\n=====" % full_chain)
 | 
						|
            signed_cert = X509.load_cert_string(cert_str)
 | 
						|
            chain_cert = X509.load_cert_string(full_chain)
 | 
						|
            int_cert = X509.load_cert_string(int_cert)
 | 
						|
            cloud_cert = X509.load_cert_string(cloud_cert)
 | 
						|
            self.assertTrue(signed_cert.verify(chain_cert.get_pubkey()))
 | 
						|
            self.assertTrue(signed_cert.verify(int_cert.get_pubkey()))
 | 
						|
            if not FLAGS.use_intermediate_ca:
 | 
						|
                self.assertTrue(signed_cert.verify(cloud_cert.get_pubkey()))
 | 
						|
            else:
 | 
						|
                self.assertFalse(signed_cert.verify(cloud_cert.get_pubkey()))
 | 
						|
 | 
						|
    def test_adding_role_to_project_is_ignored_unless_added_to_user(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
            self.manager.add_role(user, 'sysadmin', project)
 | 
						|
            # NOTE(todd): it will still show up in get_user_roles(u, project)
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.assertTrue(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
 | 
						|
    def test_add_user_role_doesnt_infect_project_roles(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
 | 
						|
    def test_can_list_user_roles(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            roles = self.manager.get_user_roles(user)
 | 
						|
            self.assertTrue('sysadmin' in roles)
 | 
						|
            self.assertFalse('netadmin' in roles)
 | 
						|
 | 
						|
    def test_can_list_project_roles(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.manager.add_role(user, 'sysadmin', project)
 | 
						|
            self.manager.add_role(user, 'netadmin', project)
 | 
						|
            project_roles = self.manager.get_user_roles(user, project)
 | 
						|
            self.assertTrue('sysadmin' in project_roles)
 | 
						|
            self.assertTrue('netadmin' in project_roles)
 | 
						|
            # has role should be false user-level role is missing
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'netadmin', project))
 | 
						|
 | 
						|
    def test_can_remove_user_roles(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.assertTrue(self.manager.has_role(user, 'sysadmin'))
 | 
						|
            self.manager.remove_role(user, 'sysadmin')
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin'))
 | 
						|
 | 
						|
    def test_removing_user_role_hides_it_from_project(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.manager.add_role(user, 'sysadmin', project)
 | 
						|
            self.assertTrue(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
            self.manager.remove_role(user, 'sysadmin')
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
 | 
						|
    def test_can_remove_project_role_but_keep_user_role(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.manager.add_role(user, 'sysadmin')
 | 
						|
            self.manager.add_role(user, 'sysadmin', project)
 | 
						|
            self.assertTrue(self.manager.has_role(user, 'sysadmin'))
 | 
						|
            self.manager.remove_role(user, 'sysadmin', project)
 | 
						|
            self.assertFalse(self.manager.has_role(user, 'sysadmin', project))
 | 
						|
            self.assertTrue(self.manager.has_role(user, 'sysadmin'))
 | 
						|
 | 
						|
    def test_can_retrieve_project_by_user(self):
 | 
						|
        with user_and_project_generator(self.manager) as (user, project):
 | 
						|
            self.assertEqual(1, len(self.manager.get_projects('test1')))
 | 
						|
 | 
						|
    def test_can_modify_project(self):
 | 
						|
        with user_and_project_generator(self.manager):
 | 
						|
            with user_generator(self.manager, name='test2'):
 | 
						|
                self.manager.modify_project('testproj', 'test2', 'new desc')
 | 
						|
                project = self.manager.get_project('testproj')
 | 
						|
                self.assertEqual('test2', project.project_manager_id)
 | 
						|
                self.assertEqual('new desc', project.description)
 | 
						|
 | 
						|
    def test_can_delete_project(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            self.manager.create_project('testproj', 'test1')
 | 
						|
            self.assert_(self.manager.get_project('testproj'))
 | 
						|
            self.manager.delete_project('testproj')
 | 
						|
            projectlist = self.manager.get_projects()
 | 
						|
            self.assert_(not filter(lambda p: p.name == 'testproj',
 | 
						|
                         projectlist))
 | 
						|
 | 
						|
    def test_can_delete_user(self):
 | 
						|
        self.manager.create_user('test1')
 | 
						|
        self.assert_(self.manager.get_user('test1'))
 | 
						|
        self.manager.delete_user('test1')
 | 
						|
        userlist = self.manager.get_users()
 | 
						|
        self.assert_(not filter(lambda u: u.id == 'test1', userlist))
 | 
						|
 | 
						|
    def test_can_modify_users(self):
 | 
						|
        with user_generator(self.manager):
 | 
						|
            self.manager.modify_user('test1', 'access', 'secret', True)
 | 
						|
            user = self.manager.get_user('test1')
 | 
						|
            self.assertEqual('access', user.access)
 | 
						|
            self.assertEqual('secret', user.secret)
 | 
						|
            self.assertTrue(user.is_admin())
 | 
						|
 | 
						|
class AuthManagerLdapTestCase(AuthManagerTestCase, test.TrialTestCase):
 | 
						|
    auth_driver = 'nova.auth.ldapdriver.FakeLdapDriver'
 | 
						|
 | 
						|
class AuthManagerDbTestCase(AuthManagerTestCase, test.TrialTestCase):
 | 
						|
    auth_driver = 'nova.auth.dbdriver.DbDriver'
 | 
						|
 | 
						|
 | 
						|
if __name__ == "__main__":
 | 
						|
    # TODO: Implement use_fake as an option
 | 
						|
    unittest.main()
 |