Identity V3 Tests - Policies

Tests for identity v3 policies

Partially-Implements bp: initial-tests-identity

Change-Id: Ib695baf4cbe4c69f70e90eebe3b13db2460c80d7
Co-Authored-By: Nishant Kumar <nk776q@att.com>
diff --git a/patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py b/patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py
index 1e29023..62a5acf 100644
--- a/patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py
+++ b/patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py
@@ -44,6 +44,7 @@
         cls.services_client = cls.os.identity_services_v3_client
         cls.endpoints_client = cls.os.endpoints_v3_client
         cls.groups_client = cls.os.groups_client
+        cls.policies_client = cls.os.policies_client
 
     def _create_service(self):
         """Creates a service for test."""
diff --git a/patrole_tempest_plugin/tests/api/identity/v3/test_policies_rbac.py b/patrole_tempest_plugin/tests/api/identity/v3/test_policies_rbac.py
new file mode 100644
index 0000000..9341fcb
--- /dev/null
+++ b/patrole_tempest_plugin/tests/api/identity/v3/test_policies_rbac.py
@@ -0,0 +1,89 @@
+# Copyright 2017 AT&T Corporation.
+# All Rights Reserved.
+#
+#    Licensed under the Apache License, Version 2.0 (the "License"); you may
+#    not use this file except in compliance with the License. You may obtain
+#    a copy of the License at
+#
+#         http://www.apache.org/licenses/LICENSE-2.0
+#
+#    Unless required by applicable law or agreed to in writing, software
+#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+#    License for the specific language governing permissions and limitations
+#    under the License.
+
+from tempest import config
+from tempest.lib.common.utils import data_utils
+from tempest.lib.common.utils import test_utils
+from tempest.lib import decorators
+
+from patrole_tempest_plugin import rbac_rule_validation
+from patrole_tempest_plugin.rbac_utils import rbac_utils
+from patrole_tempest_plugin.tests.api.identity.v3 import rbac_base
+
+CONF = config.CONF
+
+
+class IdentityPoliciesV3AdminRbacTest(rbac_base.BaseIdentityV3RbacAdminTest):
+
+    def tearDown(self):
+        """Reverts user back to admin for cleanup."""
+        rbac_utils.switch_role(self, switchToRbacRole=False)
+        super(IdentityPoliciesV3AdminRbacTest, self).tearDown()
+
+    def _create_policy(self):
+        """Creates a policy for test."""
+        blob = data_utils.rand_name('BlobName')
+        policy_type = data_utils.rand_name('PolicyType')
+        policy = self.policies_client.create_policy(
+            blob=blob,
+            policy=policy_type,
+            type="application/json")['policy']
+
+        self.addCleanup(test_utils.call_and_ignore_notfound_exc,
+                        self.policies_client.delete_policy, policy['id'])
+        return policy
+
+    @rbac_rule_validation.action(service="keystone",
+                                 rule="identity:create_policy")
+    @decorators.idempotent_id('de2f7ecb-fbf0-41f3-abf4-b97b5e082fd5')
+    def test_create_policy(self):
+        rbac_utils.switch_role(self, switchToRbacRole=True)
+        self._create_policy()
+
+    @rbac_rule_validation.action(service="keystone",
+                                 rule="identity:update_policy")
+    @decorators.idempotent_id('9cfed3c6-0b27-4d15-be67-e06e0cfb01b9')
+    def test_update_policy(self):
+        policy = self._create_policy()
+        update_type = data_utils.rand_name('UpdatedPolicyType')
+
+        rbac_utils.switch_role(self, switchToRbacRole=True)
+        self.policies_client.update_policy(policy['id'],
+                                           type=update_type)
+
+    @rbac_rule_validation.action(service="keystone",
+                                 rule="identity:delete_policy")
+    @decorators.idempotent_id('dcd93f75-1e1b-4fbe-bee0-9c4c7b201735')
+    def test_delete_policy(self):
+        policy = self._create_policy()
+
+        rbac_utils.switch_role(self, switchToRbacRole=True)
+        self.policies_client.delete_policy(policy['id'])
+
+    @rbac_rule_validation.action(service="keystone",
+                                 rule="identity:get_policy")
+    @decorators.idempotent_id('d7e415c2-945a-4504-9571-0e2d0dd8594b')
+    def test_show_policy(self):
+        policy = self._create_policy()
+
+        rbac_utils.switch_role(self, switchToRbacRole=True)
+        self.policies_client.show_policy(policy['id'])
+
+    @rbac_rule_validation.action(service="keystone",
+                                 rule="identity:list_policies")
+    @decorators.idempotent_id('35a56161-4054-4237-8a78-7ce805dce202')
+    def test_list_policies(self):
+        rbac_utils.switch_role(self, switchToRbacRole=True)
+        self.policies_client.list_policies()['policies']