ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | f38eaac | 2012-06-21 13:37:35 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Fei Long Wang | d39431f | 2015-05-14 11:30:48 +1200 | [diff] [blame] | 16 | from tempest.common.utils import data_utils |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 17 | from tempest import config |
Attila Fazekas | dc21642 | 2013-01-29 15:12:14 +0100 | [diff] [blame] | 18 | import tempest.test |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 19 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 20 | CONF = config.CONF |
| 21 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 22 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 23 | class BaseIdentityTest(tempest.test.BaseTestCase): |
Jay Pipes | f38eaac | 2012-06-21 13:37:35 -0400 | [diff] [blame] | 24 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 25 | @classmethod |
Jordan Pittier | f7da5e5 | 2016-09-06 18:00:52 +0200 | [diff] [blame] | 26 | def setup_credentials(cls): |
| 27 | # Create no network resources for these test. |
| 28 | cls.set_network_resources() |
| 29 | super(BaseIdentityTest, cls).setup_credentials() |
| 30 | |
| 31 | @classmethod |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 32 | def disable_user(cls, user_name): |
| 33 | user = cls.get_user_by_name(user_name) |
ghanshyam | 9c257a7 | 2016-06-21 10:15:10 +0900 | [diff] [blame] | 34 | cls.users_client.update_user_enabled(user['id'], enabled=False) |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 35 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 36 | @classmethod |
| 37 | def disable_tenant(cls, tenant_name): |
| 38 | tenant = cls.get_tenant_by_name(tenant_name) |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 39 | cls.tenants_client.update_tenant(tenant['id'], enabled=False) |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 40 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 41 | @classmethod |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 42 | def get_user_by_name(cls, name, domain_id=None): |
| 43 | if domain_id: |
| 44 | params = {'domain_id': domain_id} |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 45 | users = cls.users_client.list_users(**params)['users'] |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 46 | else: |
| 47 | users = cls.users_client.list_users()['users'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 48 | user = [u for u in users if u['name'] == name] |
| 49 | if len(user) > 0: |
| 50 | return user[0] |
| 51 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 52 | @classmethod |
| 53 | def get_tenant_by_name(cls, name): |
| 54 | try: |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 55 | tenants = cls.tenants_client.list_tenants()['tenants'] |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 56 | except AttributeError: |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 57 | tenants = cls.projects_client.list_projects()['projects'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 58 | tenant = [t for t in tenants if t['name'] == name] |
| 59 | if len(tenant) > 0: |
| 60 | return tenant[0] |
| 61 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 62 | @classmethod |
| 63 | def get_role_by_name(cls, name): |
Daniel Mellado | 6b16b92 | 2015-12-07 12:43:08 +0000 | [diff] [blame] | 64 | roles = cls.roles_client.list_roles()['roles'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 65 | role = [r for r in roles if r['name'] == name] |
| 66 | if len(role) > 0: |
| 67 | return role[0] |
| 68 | |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 69 | def _create_test_user(self, **kwargs): |
| 70 | if kwargs['password'] is None: |
| 71 | user_password = data_utils.rand_password() |
| 72 | kwargs['password'] = user_password |
| 73 | user = self.users_client.create_user(**kwargs)['user'] |
| 74 | # Delete the user at the end of the test |
| 75 | self.addCleanup(self.users_client.delete_user, user['id']) |
| 76 | return user |
| 77 | |
| 78 | def setup_test_role(self): |
| 79 | """Set up a test role.""" |
| 80 | role = self.roles_client.create_role( |
| 81 | name=data_utils.rand_name('test_role'))['role'] |
| 82 | # Delete the role at the end of the test |
| 83 | self.addCleanup(self.roles_client.delete_role, role['id']) |
| 84 | return role |
| 85 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 86 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 87 | class BaseIdentityV2Test(BaseIdentityTest): |
| 88 | |
Andrea Frittoli | b21de6c | 2015-02-06 20:12:38 +0000 | [diff] [blame] | 89 | credentials = ['primary'] |
| 90 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 91 | # identity v2 tests should obtain tokens and create accounts via v2 |
| 92 | # regardless of the configured CONF.identity.auth_version |
| 93 | identity_version = 'v2' |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 94 | |
| 95 | @classmethod |
| 96 | def setup_clients(cls): |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 97 | super(BaseIdentityV2Test, cls).setup_clients() |
Jane Zadorozhna | bfc7237 | 2015-06-16 17:32:59 +0300 | [diff] [blame] | 98 | cls.non_admin_client = cls.os.identity_public_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 99 | cls.non_admin_token_client = cls.os.token_client |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 100 | cls.non_admin_tenants_client = cls.os.tenants_public_client |
Daniel Mellado | 82c83a5 | 2015-12-09 15:16:49 +0000 | [diff] [blame] | 101 | cls.non_admin_users_client = cls.os.users_public_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 102 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 103 | |
| 104 | class BaseIdentityV2AdminTest(BaseIdentityV2Test): |
| 105 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 106 | credentials = ['primary', 'admin'] |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 107 | |
Andrea Frittoli | 00882b6 | 2016-12-19 23:22:44 +0000 | [diff] [blame] | 108 | # NOTE(andreaf) Identity tests work with credentials, so it is safer |
| 109 | # for them to always use disposable credentials. Forcing dynamic creds |
| 110 | # on regular identity tests would be however to restrictive, since it |
| 111 | # would prevent any identity test from being executed against clouds where |
| 112 | # admin credentials are not available. |
| 113 | # Since All admin tests require admin credentials to be |
| 114 | # executed, so this will not impact the ability to execute tests. |
| 115 | force_tenant_isolation = True |
| 116 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 117 | @classmethod |
| 118 | def setup_clients(cls): |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 119 | super(BaseIdentityV2AdminTest, cls).setup_clients() |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 120 | cls.client = cls.os_adm.identity_client |
Jane Zadorozhna | bfc7237 | 2015-06-16 17:32:59 +0300 | [diff] [blame] | 121 | cls.non_admin_client = cls.os.identity_client |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 122 | cls.token_client = cls.os_adm.token_client |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 123 | cls.tenants_client = cls.os_adm.tenants_client |
| 124 | cls.non_admin_tenants_client = cls.os.tenants_client |
Daniel Mellado | 6b16b92 | 2015-12-07 12:43:08 +0000 | [diff] [blame] | 125 | cls.roles_client = cls.os_adm.roles_client |
| 126 | cls.non_admin_roles_client = cls.os.roles_client |
Daniel Mellado | 82c83a5 | 2015-12-09 15:16:49 +0000 | [diff] [blame] | 127 | cls.users_client = cls.os_adm.users_client |
| 128 | cls.non_admin_users_client = cls.os.users_client |
Yaroslav Lobankov | f6906e1 | 2016-02-26 19:44:53 -0600 | [diff] [blame] | 129 | cls.services_client = cls.os_adm.identity_services_client |
| 130 | cls.endpoints_client = cls.os_adm.endpoints_client |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 131 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 132 | @classmethod |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 133 | def resource_setup(cls): |
| 134 | super(BaseIdentityV2AdminTest, cls).resource_setup() |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 135 | cls.projects_client = cls.tenants_client |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 136 | |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 137 | def setup_test_user(self, password=None): |
| 138 | """Set up a test user.""" |
| 139 | tenant = self.setup_test_tenant() |
| 140 | username = data_utils.rand_name('test_user') |
| 141 | email = username + '@testmail.tm' |
| 142 | user = self._create_test_user(name=username, email=email, |
| 143 | tenantId=tenant['id'], password=password) |
| 144 | return user |
| 145 | |
| 146 | def setup_test_tenant(self): |
| 147 | """Set up a test tenant.""" |
| 148 | tenant = self.projects_client.create_tenant( |
| 149 | name=data_utils.rand_name('test_tenant'), |
| 150 | description=data_utils.rand_name('desc'))['tenant'] |
| 151 | # Delete the tenant at the end of the test |
| 152 | self.addCleanup(self.tenants_client.delete_tenant, tenant['id']) |
| 153 | return tenant |
| 154 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 155 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 156 | class BaseIdentityV3Test(BaseIdentityTest): |
| 157 | |
Andrea Frittoli | b21de6c | 2015-02-06 20:12:38 +0000 | [diff] [blame] | 158 | credentials = ['primary'] |
| 159 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 160 | # identity v3 tests should obtain tokens and create accounts via v3 |
| 161 | # regardless of the configured CONF.identity.auth_version |
| 162 | identity_version = 'v3' |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 163 | |
| 164 | @classmethod |
| 165 | def setup_clients(cls): |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 166 | super(BaseIdentityV3Test, cls).setup_clients() |
| 167 | cls.non_admin_client = cls.os.identity_v3_client |
Daniel Mellado | 7aea534 | 2016-02-09 09:10:12 +0000 | [diff] [blame] | 168 | cls.non_admin_users_client = cls.os.users_v3_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 169 | cls.non_admin_token = cls.os.token_v3_client |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 170 | cls.non_admin_projects_client = cls.os.projects_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 171 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 172 | |
| 173 | class BaseIdentityV3AdminTest(BaseIdentityV3Test): |
| 174 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 175 | credentials = ['primary', 'admin'] |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 176 | |
Andrea Frittoli | 00882b6 | 2016-12-19 23:22:44 +0000 | [diff] [blame] | 177 | # NOTE(andreaf) Identity tests work with credentials, so it is safer |
| 178 | # for them to always use disposable credentials. Forcing dynamic creds |
| 179 | # on regular identity tests would be however to restrictive, since it |
| 180 | # would prevent any identity test from being executed against clouds where |
| 181 | # admin credentials are not available. |
| 182 | # Since All admin tests require admin credentials to be |
| 183 | # executed, so this will not impact the ability to execute tests. |
| 184 | force_tenant_isolation = True |
| 185 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 186 | @classmethod |
| 187 | def setup_clients(cls): |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 188 | super(BaseIdentityV3AdminTest, cls).setup_clients() |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 189 | cls.client = cls.os_adm.identity_v3_client |
Daniel Mellado | 91a26b6 | 2016-02-11 11:13:04 +0000 | [diff] [blame] | 190 | cls.domains_client = cls.os_adm.domains_client |
Daniel Mellado | 7aea534 | 2016-02-09 09:10:12 +0000 | [diff] [blame] | 191 | cls.users_client = cls.os_adm.users_v3_client |
Daniel Mellado | 7640539 | 2016-02-11 12:47:12 +0000 | [diff] [blame] | 192 | cls.trusts_client = cls.os_adm.trusts_client |
Arx Cruz | 24bcb88 | 2016-02-10 15:20:16 +0100 | [diff] [blame] | 193 | cls.roles_client = cls.os_adm.roles_v3_client |
ghanshyam | ad55eb8 | 2016-09-06 13:58:29 +0900 | [diff] [blame] | 194 | cls.inherited_roles_client = cls.os_adm.inherited_roles_client |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 195 | cls.token = cls.os_adm.token_v3_client |
Yaroslav Lobankov | f6906e1 | 2016-02-26 19:44:53 -0600 | [diff] [blame] | 196 | cls.endpoints_client = cls.os_adm.endpoints_v3_client |
Yaroslav Lobankov | 757d1a2 | 2015-12-18 11:43:02 +0300 | [diff] [blame] | 197 | cls.regions_client = cls.os_adm.regions_client |
Yaroslav Lobankov | f6906e1 | 2016-02-26 19:44:53 -0600 | [diff] [blame] | 198 | cls.services_client = cls.os_adm.identity_services_v3_client |
Yaroslav Lobankov | ed4d15c | 2015-12-18 11:30:10 +0300 | [diff] [blame] | 199 | cls.policies_client = cls.os_adm.policies_client |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 200 | cls.creds_client = cls.os_adm.credentials_client |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 201 | cls.groups_client = cls.os_adm.groups_client |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 202 | cls.projects_client = cls.os_adm.projects_client |
Rodrigo Duarte | 12f8d4a | 2016-07-08 11:53:53 -0300 | [diff] [blame] | 203 | cls.role_assignments = cls.os_admin.role_assignments_client |
Andrea Frittoli (andreaf) | 100d18d | 2016-05-05 23:34:52 +0100 | [diff] [blame] | 204 | if CONF.identity.admin_domain_scope: |
| 205 | # NOTE(andreaf) When keystone policy requires it, the identity |
| 206 | # admin clients for these tests shall use 'domain' scoped tokens. |
| 207 | # As the client manager is already created by the base class, |
| 208 | # we set the scope for the inner auth provider. |
| 209 | cls.os_adm.auth_provider.scope = 'domain' |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 210 | |
Yaroslav Lobankov | 2c2f036 | 2016-01-13 18:07:22 +0300 | [diff] [blame] | 211 | @classmethod |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 212 | def disable_user(cls, user_name, domain_id=None): |
| 213 | user = cls.get_user_by_name(user_name, domain_id) |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 214 | cls.users_client.update_user(user['id'], name=user_name, enabled=False) |
BinBin Cong | c6e8ef5 | 2015-11-20 02:08:46 -0500 | [diff] [blame] | 215 | |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 216 | @classmethod |
| 217 | def create_domain(cls): |
| 218 | """Create a domain.""" |
| 219 | domain = cls.domains_client.create_domain( |
| 220 | name=data_utils.rand_name('test_domain'), |
| 221 | description=data_utils.rand_name('desc'))['domain'] |
| 222 | return domain |
| 223 | |
Martin Pavlasek | 4c3f2ab | 2014-04-15 17:15:15 +0200 | [diff] [blame] | 224 | def delete_domain(self, domain_id): |
| 225 | # NOTE(mpavlase) It is necessary to disable the domain before deleting |
| 226 | # otherwise it raises Forbidden exception |
Daniel Mellado | 91a26b6 | 2016-02-11 11:13:04 +0000 | [diff] [blame] | 227 | self.domains_client.update_domain(domain_id, enabled=False) |
| 228 | self.domains_client.delete_domain(domain_id) |
Martin Pavlasek | 4c3f2ab | 2014-04-15 17:15:15 +0200 | [diff] [blame] | 229 | |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 230 | def setup_test_user(self, password=None): |
| 231 | """Set up a test user.""" |
| 232 | project = self.setup_test_project() |
| 233 | username = data_utils.rand_name('test_user') |
| 234 | email = username + '@testmail.tm' |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 235 | user = self._create_test_user(name=username, email=email, |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 236 | project_id=project['id'], |
| 237 | password=password) |
| 238 | return user |
| 239 | |
| 240 | def setup_test_project(self): |
| 241 | """Set up a test project.""" |
| 242 | project = self.projects_client.create_project( |
| 243 | name=data_utils.rand_name('test_project'), |
| 244 | description=data_utils.rand_name('desc'))['project'] |
| 245 | # Delete the project at the end of the test |
| 246 | self.addCleanup(self.projects_client.delete_project, project['id']) |
| 247 | return project |
| 248 | |
| 249 | def setup_test_domain(self): |
| 250 | """Set up a test domain.""" |
| 251 | domain = self.create_domain() |
| 252 | # Delete the domain at the end of the test |
| 253 | self.addCleanup(self.delete_domain, domain['id']) |
| 254 | return domain |