Commit Graph

9 Commits

Author SHA1 Message Date
millevy 46edcc5b05 Introduce a new test for "cve_2022_3100"
The exploit is that a malicious user with a Keystone account is able to decrypt
any secret as long as they know the secret's ID by using a specifically crafted
query string:
GET /v1/secrets/{secret-id}/payload?target.secret.read=read

Change-Id: I5e00a188268ef1c25eed8bf3a37197918e529427
2022-12-07 08:01:02 +00:00
Douglas Mendizábal b7ba9d0ccf Add secure-rbac tests for Secret ACL
This patch test RBAC acces for the Secret ACL API.

Change-Id: I8d88cbf556e9d750c150262f0834bc64a7a726ac
2021-10-07 21:14:27 +00:00
Douglas Mendizábal 62baff3fcc Refactor secret cleanup
This patch is the first in a refactor of the cleanup logic in our
tests.

This patch adds a new `cleanup()` method to the SecretClient that
attempts to delete all the secrets it creates.

Moving the responsibility of tracking which secrets to clean up down
to the client allows us more flexibility when cleaning up the resources.
e.g.  it should be fairly easy to clean up secrets across multiple projects
by just calling the new `cleanup()` method on each client used.

This patch will also allow us to get rid of the overloaded `do_request()`
method that is currently used as a proxy to the client to be able to track
entities.

The change also makes the test code more explicit and easier to read.

Change-Id: Id9be832a0f255410bd955d94c32001fec500f32f
2021-08-17 18:14:36 +00:00
Douglas Mendizábal 1febf40838 Add secure-rbac tests for Orders
This patch adds basic RBAC tests for the Orders resource for
the reader, member, and admin personas with project scope.

Change-Id: Ie5b7b6f7df20ec96e916232e70e9f61c7771f9d2
2021-04-01 16:59:53 -05:00
Douglas Mendizábal d013596f3d Add secure-rbac gate
This patch adds a gate to test the new secure-rbac policy.

Currently, Tempest is unable to create system admin credentials
when the isolated networks option is set to true, so we disable
that option for this gate.

This patch also includes fixes needed to get the existing tests
to pass, as well as some skips for scenario tests that require
isolated networks.

We should be able to remove the skips once Tempest is fixed to
work with system admin.

Depends-On: I584f7b67f2f95caa7c4db3d9d9222d0a9d38442d
Change-Id: I0129ab6d15bc42d98a19e3551b8d009f9ad05e10
2021-03-24 17:26:01 -05:00
wangzihao 0525790271 Remove six
Remove six Replace the following items with Python 3 style code.
- six.moves.urllib
- six.binary_type

Change-Id: I234c3b205ee21b59953aa6ce7af5c2a1e4a6cfa6
2020-11-03 13:42:27 +08:00
Kaitlin Farr 5bd7b76bd1 Fixes for py35
Decodes the bytes in a string type in a few places to get the
py35 version of the gate to pass.

Change-Id: Ifc66bdeacb09060e3ef699bc15e20f636bf84916
2017-06-19 13:19:01 -04:00
dane-fichter 28652f5ebf Fill in remaining Secrets API and tests
This change adds all remaining methods of Barbican's
Secrets API resource to the Tempest plugin and
adds API tests for these methods.

Change-Id: Ia653de1221648ff5f028ebc22add423d0b7c2fe5
Depends-On: I930455c6ae1e1127706480f24c0ea46f5cc81e85
Implements: bp tempest-plugin
2017-01-11 13:10:07 -08:00
Marc Koderer c832c613fa Register client and add first test
Add first API test and register the client with
the new tempest.lib client interface.

Change-Id: I27f15375c46faa48cd56c8d52ecfd585fb325239
Implements: bp tempest-plugin
2016-12-11 19:26:27 -08:00