ranger/ranger-tempest-plugin/ranger_tempest_plugin/tests/api/test_groups.py

183 lines
7.6 KiB
Python
Executable File

# Copyright 2016 AT&T Corp
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the 'License'); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an 'AS IS' BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import random
from ranger_tempest_plugin.tests.api import grp_base
from tempest import config
from tempest.lib import decorators
from tempest.lib import exceptions
CONF = config.CONF
class TestTempestGrp(grp_base.GrpBaseOrmTest):
@classmethod
def resource_setup(cls):
cls.setup_customer_params = cls._get_customer_params()
cls.setup_customer_id = \
cls._create_cust_validate_creation_on_dcp_and_lcp(
**cls.setup_customer_params)
cls.setup_group = cls._get_group_params()
cls.setup_group_id = \
cls._create_grp_validate_creation_on_dcp_and_lcp(
**cls.setup_group)
super(TestTempestGrp, cls).resource_setup()
@classmethod
def resource_cleanup(cls):
cls._del_group_validate_deletion_on_dcp_and_lcp(cls.setup_group_id)
cls._del_cust_validate_deletion_on_dcp_and_lcp(
cls.setup_customer_id)
super(TestTempestGrp, cls).resource_cleanup()
@decorators.idempotent_id('deeb3b8a-fb38-46e1-97ba-c878b0ba890f')
def test_get_group(self):
""" Execute 'get_group' using the following options:
- get group by id
- get group by name
"""
# execute get_group using group id and group name
for identifier in [self.setup_group_id,
self.setup_group['name']]:
_, body = self.grp_client.get_group(identifier)
self.assertIn(self.setup_group_id, body['uuid'])
@decorators.idempotent_id('8068e33f-a6aa-416a-9505-048c6ad037b2')
def test_list_groups_with_filters(self):
""" This function executes 'list groups' with all available filters:
- no filter (i.e. list all groups)
- filter by region
- group name contains a substring
- group name starts_with a string
"""
# format filter parameter values
region_name = [
region['name'] for region in self.setup_group['regions']]
group_name = self.setup_group['name']
substr_name = random.randint(0, len(group_name))
# define the list groups filters to be used for this test
no_filter = None
region_filter = {'region': region_name[0]}
contains_filter = {'contains': group_name[substr_name:]}
startswith_filter = {'starts_with': group_name[:substr_name]}
# execute list_groups with the available filters
for list_filter in [no_filter, region_filter, contains_filter,
startswith_filter]:
_, body = self.grp_client.list_groups(list_filter)
groups = [grp['id'] for grp in body['groups']]
self.assertIn(self.setup_group_id, groups)
@decorators.idempotent_id('880f614f-6317-4973-a244-f2e44443f551')
def test_delete_regions(self):
# setup data for delete_region
post_body = self._get_group_params()
region_name = post_body["regions"][0]["name"]
test_group_id = self._create_grp_validate_creation_on_dcp_and_lcp(
**post_body)
self.addCleanup(self._del_group_validate_deletion_on_dcp_and_lcp,
test_group_id)
_, group = self.grp_client.get_group(test_group_id)
self.assertTrue(group["regions"])
_, body = self.grp_client.delete_groups_region(test_group_id,
region_name)
self._wait_for_group_status(test_group_id, 'no regions')
_, group = self.grp_client.get_group(test_group_id)
self.assertFalse(group["regions"])
@decorators.idempotent_id('bba25028-d962-47df-9566-557eec48f22d')
def test_create_group(self):
post_body = self._get_group_params()
test_group_name = post_body['name']
_, body = self.grp_client.create_group(**post_body)
test_group_id = body['group']['id']
self.addCleanup(self._del_group_validate_deletion_on_dcp_and_lcp,
test_group_id)
self._wait_for_group_status(test_group_id, 'Success')
_, body = self.grp_client.get_group(test_group_name)
self.assertIn(test_group_id, body['uuid'])
@decorators.idempotent_id('356633f0-c615-4bdc-8f0f-d97b6ca409e0')
def test_delete_group(self):
# setup data for test case
post_body = self._get_group_params()
test_group_id = self._create_grp_validate_creation_on_dcp_and_lcp(
**post_body)
# delete the data and do get_group to ensure 404-NotFound response
self._del_group_validate_deletion_on_dcp_and_lcp(test_group_id)
self.assertRaises(exceptions.NotFound, self.grp_client.get_group,
test_group_id)
@decorators.idempotent_id('afe5c72f-499b-493f-b61b-68bbaca12b7a')
def test_assign_unassign_role_to_group_on_domain(self):
role = {
'roles': ["admin"],
'domain_name': CONF.ranger.domain
}
post_body = [role]
_, body = self.grp_client.assign_group_roles(self.setup_group_id,
*post_body)
self._wait_for_group_status(self.setup_group_id, 'Success')
self.assertEqual(body['roles'][0]['domain_name'], role['domain_name'])
self.assertEqual(body['roles'][0]['roles'][0], role['roles'][0])
_, body = self.grp_client.unassign_group_roles(self.setup_group_id,
role['roles'][0],
'domain',
role['domain_name'])
self._wait_for_group_status(self.setup_group_id, 'Success')
# Once the get groups role function is implemented, it will be
# added here to retreive the role and call assert to verfify that
# the role has indeed been unassigned.
self.assertEqual(body, '')
@decorators.idempotent_id('67f5e46e-9267-4cbb-84d6-ee8521370e23')
def test_assign_unassign_role_to_group_on_project(self):
role = {
'roles': ["admin"],
'project': self.setup_customer_id
}
post_body = [role]
_, body = self.grp_client.assign_group_roles(self.setup_group_id,
*post_body)
self._wait_for_group_status(self.setup_group_id, 'Success')
self.assertEqual(body['roles'][0]['project'], role['project'])
self.assertEqual(body['roles'][0]['roles'][0], role['roles'][0])
_, body = self.grp_client.unassign_group_roles(self.setup_group_id,
role['roles'][0],
'customer',
role['project'])
self._wait_for_group_status(self.setup_group_id, 'Success')
# Once the get groups role function is implemented, it will be
# added here to retreive the role and call assert to verfify that
# the role has indeed been unassigned.
self.assertEqual(body, '')