Fix for authorization issue for Grafana and Gibana dashboards when deployed with LDAP. Change-Id: I3ee3031d374e56a965273f42865e37e66254933f Closes-Bug: #1621414
		
			
				
	
	
		
			221 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			221 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
#    Copyright 2016 Mirantis, Inc.
 | 
						|
#
 | 
						|
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
 | 
						|
#    not use this file except in compliance with the License. You may obtain
 | 
						|
#    a copy of the License at
 | 
						|
#
 | 
						|
#         http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
#    Unless required by applicable law or agreed to in writing, software
 | 
						|
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | 
						|
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | 
						|
#    License for the specific language governing permissions and limitations
 | 
						|
#    under the License.
 | 
						|
from fuelweb_test.helpers.decorators import log_snapshot_after_test
 | 
						|
from fuelweb_test import logger
 | 
						|
from proboscis import test
 | 
						|
 | 
						|
from stacklight_tests.helpers import helpers
 | 
						|
from stacklight_tests.toolchain import api
 | 
						|
 | 
						|
 | 
						|
@test(groups=["ldap"])
 | 
						|
class TestToolchainLDAP(api.ToolchainApi):
 | 
						|
    """Class testing the LMA Toolchain plugins with LDAP(S) for authentication.
 | 
						|
    """
 | 
						|
 | 
						|
    @test(depends_on_groups=['prepare_slaves_3'],
 | 
						|
          groups=["ldap", "deploy_toolchain_with_ldap", "toolchain", "deploy"])
 | 
						|
    @log_snapshot_after_test
 | 
						|
    def deploy_toolchain_with_ldap(self):
 | 
						|
        """Install the LMA Toolchain plugins with LDAP integration for
 | 
						|
        authentication
 | 
						|
 | 
						|
        Scenario:
 | 
						|
            1. Upload the LMA Toolchain plugins to the master node
 | 
						|
            2. Install the plugins
 | 
						|
            3. Create the cluster
 | 
						|
            4. Enable and configure LDAP for plugin authentication
 | 
						|
            5. Deploy the cluster
 | 
						|
            6. Upload install_slapd.sh script on controller node
 | 
						|
            7. On controller node open the firewall for ports 389 and 636
 | 
						|
            8. Install and configure the LDAP server
 | 
						|
            9. Check that LMA Toolchain plugins are running
 | 
						|
            10. Check plugins are available with LDAP for authentication
 | 
						|
 | 
						|
        Duration 120m
 | 
						|
        """
 | 
						|
        self._create_ldap_toolchain()
 | 
						|
 | 
						|
        self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
 | 
						|
 | 
						|
    @test(depends_on_groups=['prepare_slaves_3'],
 | 
						|
          groups=["ldap", "deploy_toolchain_with_ldap_authz", "toolchain",
 | 
						|
                  "deploy"])
 | 
						|
    @log_snapshot_after_test
 | 
						|
    def deploy_toolchain_with_ldap_authz(self):
 | 
						|
        """Install the LMA Toolchain plugins with LDAP integration for
 | 
						|
        authentication and authorization
 | 
						|
 | 
						|
        Scenario:
 | 
						|
            1. Upload the LMA Toolchain plugins to the master node
 | 
						|
            2. Install the plugins
 | 
						|
            3. Create the cluster
 | 
						|
            4. Enable and configure LDAP for plugin authentication and
 | 
						|
               authorization
 | 
						|
            5. Deploy the cluster
 | 
						|
            6. Upload install_slapd.sh script on controller node
 | 
						|
            7. On controller node open the firewall for ports 389 and 636
 | 
						|
            8. Install and configure the LDAP server
 | 
						|
            9. Check that LMA Toolchain plugins are running
 | 
						|
            10. Check plugins are available with LDAP for authentication and
 | 
						|
               authorization
 | 
						|
 | 
						|
        Duration 120m
 | 
						|
        """
 | 
						|
        self._create_ldap_toolchain(authz=True)
 | 
						|
 | 
						|
        self.env.make_snapshot("deploy_toolchain_with_ldap_authz",
 | 
						|
                               is_make=True)
 | 
						|
 | 
						|
    @test(depends_on_groups=['prepare_slaves_3'],
 | 
						|
          groups=["ldap", "deploy_toolchain_with_ldaps_authz", "toolchain",
 | 
						|
                  "deploy"])
 | 
						|
    @log_snapshot_after_test
 | 
						|
    def deploy_toolchain_with_ldaps_authz(self):
 | 
						|
        """Install the LMA Toolchain plugins with LDAPS integration for
 | 
						|
        authentication and authorization
 | 
						|
 | 
						|
        Scenario:
 | 
						|
            1. Upload the LMA Toolchain plugins to the master node
 | 
						|
            2. Install the plugins
 | 
						|
            3. Create the cluster
 | 
						|
            4. Enable and configure LDAPS for plugin authentication and
 | 
						|
               authorization
 | 
						|
            5. Deploy the cluster
 | 
						|
            6. Upload install_slapd.sh script on controller node
 | 
						|
            7. On controller node open the firewall for ports 389 and 636
 | 
						|
            8. Install and configure the LDAPS server
 | 
						|
            9. Check that LMA Toolchain plugins are running
 | 
						|
            10. Check plugins are available with LDAPS for authentication and
 | 
						|
               authorization
 | 
						|
 | 
						|
        Duration 120m
 | 
						|
        """
 | 
						|
 | 
						|
        self._create_ldap_toolchain(authz=True, protocol='ldaps')
 | 
						|
 | 
						|
        self.env.make_snapshot("deploy_toolchain_with_ldaps_authz",
 | 
						|
                               is_make=True)
 | 
						|
 | 
						|
    def _create_ldap_toolchain(self, authz=False, protocol='ldap'):
 | 
						|
        """Create generic toolchain for LDAP test
 | 
						|
 | 
						|
        :param authz: configures LDAP server for plugin authorisation and adds
 | 
						|
        authorisation checking
 | 
						|
        :type authz: boolean
 | 
						|
        :param protocol: configures LDAP or LDAPS protocol to be used on LDAP
 | 
						|
        server
 | 
						|
        :type protocol: str
 | 
						|
        """
 | 
						|
        fuel_web = self.helpers.fuel_web
 | 
						|
 | 
						|
        self.env.revert_snapshot("ready_with_3_slaves")
 | 
						|
 | 
						|
        self.prepare_plugins()
 | 
						|
 | 
						|
        self.helpers.create_cluster(name=self.__class__.__name__)
 | 
						|
 | 
						|
        self.activate_plugins()
 | 
						|
 | 
						|
        fuel_web.update_nodes(self.helpers.cluster_id,
 | 
						|
                              self.settings.base_nodes, update_interfaces=True)
 | 
						|
 | 
						|
        plugins_ldap = {
 | 
						|
            "kibana": (self.ELASTICSEARCH_KIBANA, "(objectClass=*)"),
 | 
						|
            "grafana": (self.INFLUXDB_GRAFANA, "(uid=%s)"),
 | 
						|
            "nagios": (self.LMA_INFRASTRUCTURE_ALERTING, "(objectClass=*)")
 | 
						|
        }
 | 
						|
 | 
						|
        ldap_server = fuel_web.get_nailgun_cluster_nodes_by_roles(
 | 
						|
            self.helpers.cluster_id, roles=["controller", ],
 | 
						|
            role_status='pending_roles')[0]['hostname']
 | 
						|
 | 
						|
        for name, plugin in plugins_ldap.iteritems():
 | 
						|
            self._activate_ldap_plugin(plugin[0], plugin[1], name, ldap_server,
 | 
						|
                                       authz=authz, protocol=protocol)
 | 
						|
 | 
						|
        self.helpers.deploy_cluster(self.settings.base_nodes)
 | 
						|
 | 
						|
        ldap_node = fuel_web.get_nailgun_cluster_nodes_by_roles(
 | 
						|
            self.helpers.cluster_id, roles=["controller", ])[0]
 | 
						|
 | 
						|
        with fuel_web.get_ssh_for_nailgun_node(ldap_node) as remote:
 | 
						|
            remote.upload(
 | 
						|
                helpers.get_fixture("ldap/install_slapd.sh"),
 | 
						|
                "/tmp"
 | 
						|
            )
 | 
						|
            remote.check_call(
 | 
						|
                "bash -x /tmp/install_slapd.sh && iptables -I INPUT "
 | 
						|
                "-p tcp -m multiport --ports 389,636 -m comment --comment "
 | 
						|
                "'ldap server' -j ACCEPT", verbose=True
 | 
						|
            )
 | 
						|
 | 
						|
        self.check_plugins_online()
 | 
						|
 | 
						|
        for plugin in plugins_ldap.values():
 | 
						|
            plugin[0].check_plugin_ldap(authz=authz)
 | 
						|
 | 
						|
        self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
 | 
						|
 | 
						|
    @staticmethod
 | 
						|
    def _activate_ldap_plugin(plugin, ufilter, dashboard_name, ldap_server,
 | 
						|
                              authz=False, protocol="ldap"):
 | 
						|
        """Activate LDAP option for a plugin."""
 | 
						|
        name = plugin.get_plugin_settings().name
 | 
						|
        logger.info(
 | 
						|
            "Enable LDAP for plugin {0}, authorization {1}, protocol: {2}, "
 | 
						|
            "user search filter: {3}, ldap server node: {4}".format(
 | 
						|
                name, authz, protocol, ufilter, ldap_server
 | 
						|
            )
 | 
						|
        )
 | 
						|
 | 
						|
        options = {
 | 
						|
            "ldap_enabled/value": True,
 | 
						|
            "ldap_protocol_for_{}/value".format(dashboard_name): protocol,
 | 
						|
            "ldap_servers/value": ldap_server,
 | 
						|
            "ldap_bind_dn/value": "cn=admin,dc=stacklight,dc=ci",
 | 
						|
            "ldap_bind_password/value": "admin",
 | 
						|
            "ldap_user_search_base_dns/value": "dc=stacklight,dc=ci",
 | 
						|
            "ldap_user_search_filter/value": ufilter,
 | 
						|
        }
 | 
						|
 | 
						|
        if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
 | 
						|
            options.update({"ldap_user_attribute/value": "uid"})
 | 
						|
 | 
						|
        if authz:
 | 
						|
            options.update({
 | 
						|
                "ldap_authorization_enabled/value": True,
 | 
						|
            })
 | 
						|
            if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
 | 
						|
                options.update({
 | 
						|
                    "ldap_admin_group_dn/value":
 | 
						|
                        "cn=plugin_admins,ou=groups,dc=stacklight,dc=ci"
 | 
						|
                })
 | 
						|
                if name == "elasticsearch_kibana":
 | 
						|
                    options.update({
 | 
						|
                        "ldap_viewer_group_dn/value":
 | 
						|
                            "cn=plugin_viewers,ou=groups,dc=stacklight,dc=ci"
 | 
						|
                    })
 | 
						|
            else:
 | 
						|
                options.update({
 | 
						|
                    "ldap_group_search_base_dns/value":
 | 
						|
                        "ou=groups,dc=stacklight,dc=ci",
 | 
						|
                    "ldap_group_search_filter/value":
 | 
						|
                        "(&(objectClass=posixGroup)(memberUid=%s)",
 | 
						|
                    "ldap_admin_group_dn/value": "plugin_admins",
 | 
						|
                    "ldap_viewer_group_dn/value": "plugin_viewers"
 | 
						|
                })
 | 
						|
 | 
						|
        plugin.activate_plugin(options=options)
 |