2019-02-18 06:47:16 +01:00
from __future__ import absolute_import
2020-12-16 11:06:41 +01:00
import sys
2019-02-18 06:47:16 +01:00
import unittest
2023-02-16 11:11:05 +01:00
from testutils import ADMIN_CLIENT , TEARDOWN , harbor_server , harbor_url , suppress_urllib3_warning
2020-12-16 11:06:41 +01:00
from testutils import created_user , created_project
2019-02-18 06:47:16 +01:00
from library . user import User
from library . project import Project
2020-11-20 06:13:12 +01:00
from library . robot import Robot
2019-02-18 06:47:16 +01:00
from library . repository import Repository
2020-12-16 11:06:41 +01:00
from library . artifact import Artifact
2019-02-18 06:47:16 +01:00
from library . repository import pull_harbor_image
2020-12-04 11:28:29 +01:00
from library . repository import push_self_build_image_to_project
2019-02-18 06:47:16 +01:00
from library . base import _assert_status_code
2020-12-16 11:06:41 +01:00
from library . scan import Scan
from library . label import Label
import base
import v2_swagger_client
class TestRobotAccount ( unittest . TestCase ) :
2020-11-04 03:13:12 +01:00
@suppress_urllib3_warning
2019-02-18 06:47:16 +01:00
def setUp ( self ) :
2020-02-25 03:40:29 +01:00
self . project = Project ( )
self . user = User ( )
2020-03-16 03:13:28 +01:00
self . repo = Repository ( )
2020-12-16 11:06:41 +01:00
self . artifact = Artifact ( )
2020-11-20 06:13:12 +01:00
self . robot = Robot ( )
2020-12-16 11:06:41 +01:00
self . scan = Scan ( )
self . label = Label ( )
2019-02-18 06:47:16 +01:00
2020-12-16 11:06:41 +01:00
TestRobotAccount . url = ADMIN_CLIENT [ " endpoint " ]
TestRobotAccount . user_ra_password = " Aa123456 "
print ( " setup " )
@unittest.skipIf ( TEARDOWN == True , " Test data won ' t be erased. " )
def do_01_tearDown ( self ) :
2019-02-18 06:47:16 +01:00
#1. Delete repository(RA) by user(UA);
2021-01-16 12:34:43 +01:00
self . repo . delete_repository ( self . project_ra_name_a , self . repo_name_in_project_a . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_b , self . repo_name_in_project_b . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_c , self . repo_name_in_project_c . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_a , self . repo_name_pa . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
#2. Delete project(PA);
2020-12-16 11:06:41 +01:00
self . project . delete_project ( self . project_ra_id_a , * * self . USER_RA_CLIENT )
self . project . delete_project ( self . project_ra_id_b , * * self . USER_RA_CLIENT )
self . project . delete_project ( self . project_ra_id_c , * * self . USER_RA_CLIENT )
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
self . project . delete_project ( self . project_ra_id_d , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-02-03 03:24:28 +01:00
#3. Delete user(UA).
2020-12-16 11:06:41 +01:00
self . user . delete_user ( self . user_ra_id , * * ADMIN_CLIENT )
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
self . user . delete_user ( self . user_ra_id_b , * * ADMIN_CLIENT )
2019-02-18 06:47:16 +01:00
2020-12-16 11:06:41 +01:00
def test_01_ProjectlevelRobotAccount ( self ) :
2019-02-18 06:47:16 +01:00
"""
Test case :
Robot Account
Test step and expected result :
1. Create user ( UA ) ;
2. Create private project ( PA ) , private project ( PB ) and public project ( PC ) by user ( UA ) ;
3. Push image ( ImagePA ) to project ( PA ) , image ( ImagePB ) to project ( PB ) and image ( ImagePC ) to project ( PC ) by user ( UA ) ;
4. Create a new robot account ( RA ) with pull and push privilige in project ( PA ) by user ( UA ) ;
5. Check robot account info , it should has both pull and push priviliges ;
6. Pull image ( ImagePA ) from project ( PA ) by robot account ( RA ) , it must be successful ;
7. Push image ( ImageRA ) to project ( PA ) by robot account ( RA ) , it must be successful ;
8. Push image ( ImageRA ) to project ( PB ) by robot account ( RA ) , it must be not successful ;
9. Pull image ( ImagePB ) from project ( PB ) by robot account ( RA ) , it must be not successful ;
10. Pull image from project ( PC ) , it must be successful ;
11. Push image ( ImageRA ) to project ( PC ) by robot account ( RA ) , it must be not successful ;
12. Update action property of robot account ( RA ) ;
13. Pull image ( ImagePA ) from project ( PA ) by robot account ( RA ) , it must be not successful ;
14. Push image ( ImageRA ) to project ( PA ) by robot account ( RA ) , it must be not successful ;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
15. Delete robot account ( RA ) .
16. Create user ( UB ) , Create public project ( PD ) by user ( UB ) , user ( UA ) can ' t create robot account for project(PD).
2019-02-18 06:47:16 +01:00
Tear down :
2020-02-03 03:24:28 +01:00
1. Delete repository ( RA ) by user ( UA ) ;
2. Delete project ( PA ) ;
3. Delete user ( UA ) .
2019-02-18 06:47:16 +01:00
"""
2020-01-15 07:39:25 +01:00
image_project_a = " haproxy "
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
image_project_b = " image_project_b "
2020-01-15 07:39:25 +01:00
image_project_c = " httpd "
2020-04-20 11:16:02 +02:00
image_robot_account = " alpine "
2019-02-18 06:47:16 +01:00
tag = " latest "
2020-07-30 10:04:14 +02:00
#1. Create user(UA);"
2020-12-16 11:06:41 +01:00
self . user_ra_id , user_ra_name = self . user . create_user ( user_password = TestRobotAccount . user_ra_password , * * ADMIN_CLIENT )
self . USER_RA_CLIENT = dict ( endpoint = TestRobotAccount . url , username = user_ra_name , password = TestRobotAccount . user_ra_password )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#2. Create private project(PA), private project(PB) and public project(PC) by user(UA);
2020-12-16 11:06:41 +01:00
self . project_ra_id_a , self . project_ra_name_a = self . project . create_project ( metadata = { " public " : " false " } , * * self . USER_RA_CLIENT )
self . project_ra_id_b , self . project_ra_name_b = self . project . create_project ( metadata = { " public " : " false " } , * * self . USER_RA_CLIENT )
self . project_ra_id_c , self . project_ra_name_c = self . project . create_project ( metadata = { " public " : " true " } , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#3. Push image(ImagePA) to project(PA), image(ImagePB) to project(PB) and image(ImagePC) to project(PC) by user(UA);
2020-12-16 11:06:41 +01:00
self . repo_name_in_project_a , tag_a = push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_a , tag )
self . repo_name_in_project_b , tag_b = push_self_build_image_to_project ( self . project_ra_name_b , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_b , tag )
self . repo_name_in_project_c , tag_c = push_self_build_image_to_project ( self . project_ra_name_c , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_c , tag )
2019-02-18 06:47:16 +01:00
2020-11-20 06:13:12 +01:00
#4. Create a new robot account(RA) with pull and push privilege in project(PA) by user(UA);
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
robot_id_a , robot_account_a = self . robot . create_project_robot ( self . project_ra_name_a ,
30 , * * self . USER_RA_CLIENT )
robot_id_b , robot_account_b = self . robot . create_project_robot ( self . project_ra_name_b ,
2020-12-16 11:06:41 +01:00
30 , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-11-20 06:13:12 +01:00
#5. Check robot account info, it should has both pull and push privilege;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
data = self . robot . get_robot_account_by_id ( robot_id_a , * * self . USER_RA_CLIENT )
_assert_status_code ( robot_account_a . name , data . name )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#6. Pull image(ImagePA) from project(PA) by robot account(RA), it must be successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
pull_harbor_image ( harbor_server , robot_account_a . name , robot_account_a . secret , self . repo_name_in_project_a , tag_a )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#7. Push image(ImageRA) to project(PA) by robot account(RA), it must be successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
self . repo_name_pa , _ = push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , robot_account_a . name , robot_account_a . secret , image_robot_account , tag )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#8. Push image(ImageRA) to project(PB) by robot account(RA), it must be not successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
push_self_build_image_to_project ( self . project_ra_name_b , harbor_server , robot_account_a . name , robot_account_a . secret , image_robot_account , tag , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#9. Pull image(ImagePB) from project(PB) by robot account(RA), it must be not successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
pull_harbor_image ( harbor_server , robot_account_a . name , robot_account_a . secret , self . repo_name_in_project_b , tag_b , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#10. Pull image from project(PC), it must be successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
pull_harbor_image ( harbor_server , robot_account_a . name , robot_account_a . secret , self . repo_name_in_project_c , tag_c )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#11. Push image(ImageRA) to project(PC) by robot account(RA), it must be not successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
push_self_build_image_to_project ( self . project_ra_name_c , harbor_server , robot_account_a . name , robot_account_a . secret , image_robot_account , tag , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#12. Update action property of robot account(RA);"
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
self . robot . disable_robot_account ( robot_id_a , True , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#13. Pull image(ImagePA) from project(PA) by robot account(RA), it must be not successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
pull_harbor_image ( harbor_server , robot_account_a . name , robot_account_a . secret , self . repo_name_in_project_a , tag_a , expected_login_error_message = " unauthorized: authentication required " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#14. Push image(ImageRA) to project(PA) by robot account(RA), it must be not successful;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , robot_account_a . name , robot_account_a . secret , image_robot_account , tag , expected_login_error_message = " unauthorized: authentication required " )
#15. Delete robot account(RA).
self . robot . delete_robot_account ( robot_id_a , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
#16. Create user(UB), Create public project(PD) by user(UB), user(UA) can't create robot account for project(PD).
self . user_ra_id_b , user_ra_name_b = self . user . create_user ( user_password = TestRobotAccount . user_ra_password , * * ADMIN_CLIENT )
self . USER_RA_CLIENT_B = dict ( endpoint = TestRobotAccount . url , username = user_ra_name_b , password = TestRobotAccount . user_ra_password )
self . project_ra_id_d , self . project_ra_name_d = self . project . create_project ( metadata = { " public " : " true " } , * * self . USER_RA_CLIENT_B )
self . robot . create_project_robot ( self . project_ra_name_d , 30 , expect_status_code = 403 , * * self . USER_RA_CLIENT )
2020-12-16 11:06:41 +01:00
self . do_01_tearDown ( )
def verify_repository_pushable ( self , project_access_list , system_ra_client ) :
for project_access in project_access_list :
print ( r " project_access: " , project_access )
if project_access [ " check_list " ] [ 1 ] : #---repository:push---
repo = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] , " test_pushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) )
else :
push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] , " test_unpushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) , expected_error_message = " unauthorized to access repository " )
2021-01-04 12:17:51 +01:00
def verify_repository_unpushable ( self , project_access_list , system_ra_client , expected_login_error_message = " unauthorized: authentication required " , expected_error_message = " " ) :
2020-12-16 11:06:41 +01:00
for project_access in project_access_list : #---repository:push---
push_self_build_image_to_project (
project_access [ " project_name " ] ,
harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] ,
" test_unpushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) ,
2021-01-04 12:17:51 +01:00
expected_login_error_message = expected_login_error_message ,
expected_error_message = expected_error_message
2020-12-16 11:06:41 +01:00
)
def test_02_SystemlevelRobotAccount ( self ) :
"""
Test case :
Robot Account
Test step and expected result :
1. Define a number of access lists ;
2. Create the same number of private projects ;
3. Create a system robot account has permission for those projects ;
2021-01-04 12:17:51 +01:00
4. Verify the system robot account has all the corresponding rights ;
2020-12-16 11:06:41 +01:00
5. Disable the system robot account ;
6. Verify the system robot account has no the corresponding rights ;
7. Enable the system robot account ;
8. Verify the system robot account has the corresponding rights ;
9. Refresh secret for the system robot account ;
10. Verify the system robot account has no the corresponding right with the old secret already ;
11. Verify the system robot account still has the corresponding right with the new secret ;
12. List system robot account , then add a new project to the system robot account project permission list ;
2021-01-04 12:17:51 +01:00
13. Verify the system robot account has the corresponding right for this new project ;
14. Edit the system robot account as removing this new project from it ;
15. Verify the system robot account has no the corresponding right for this new project ;
16. Delete this project ;
17. List system robot account successfully ;
2021-01-19 11:12:23 +01:00
18. Delete the system robot account ;
2021-01-04 12:17:51 +01:00
19. Verify the system robot account has no the corresponding right ;
2021-01-19 11:12:23 +01:00
20. Add a system robot account with all projects coverd ;
2021-01-04 12:17:51 +01:00
21. Verify the system robot account has no the corresponding right ;
2020-12-16 11:06:41 +01:00
"""
#1. Define a number of access lists;
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
# In this priviledge check list, make sure that each of lines and rows must
# contains both True and False value.
2020-12-16 11:06:41 +01:00
check_list = [
[ True , True , True , True , True , True , False , True , False , True ] ,
[ False , False , False , False , True , True , False , True , True , False ] ,
[ True , False , True , False , True , False , True , False , True , True ] ,
[ False , False , False , True , False , True , False , True , True , False ]
]
access_list_list = [ ]
for i in range ( len ( check_list ) ) :
access_list_list . append ( self . robot . create_access_list ( check_list [ i ] ) )
#2. Create the same number of private projects;
robot_account_Permissions_list = [ ]
project_access_list = [ ]
for i in range ( len ( check_list ) ) :
with created_user ( TestRobotAccount . user_ra_password , _teardown = False ) as ( user_id , username ) :
with created_project ( metadata = { " public " : " false " } , user_id = user_id , _teardown = False ) as ( project_id , project_name ) :
project_access_list . append ( dict ( project_name = project_name , project_id = project_id , check_list = check_list [ i ] ) )
2021-02-04 08:32:44 +01:00
robot_account_Permissions = v2_swagger_client . RobotPermission ( kind = " project " , namespace = project_name , access = access_list_list [ i ] )
2020-12-16 11:06:41 +01:00
robot_account_Permissions_list . append ( robot_account_Permissions )
#3. Create a system robot account has permission for those projects;
system_robot_account_id , system_robot_account = self . robot . create_system_robot ( robot_account_Permissions_list , 300 )
print ( " system_robot_account: " , system_robot_account )
SYSTEM_RA_CLIENT = dict ( endpoint = TestRobotAccount . url , username = system_robot_account . name , password = system_robot_account . secret )
2021-01-04 12:17:51 +01:00
#4. Verify the system robot account has all the corresponding rights;
2020-12-16 11:06:41 +01:00
for project_access in project_access_list :
print ( r " project_access: " , project_access )
if project_access [ " check_list " ] [ 1 ] : #---repository:push---
repo = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , " test_pushable " , " v6.8.1 " )
else :
push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , " test_unpushable " , " v6.8.1 " , expected_error_message = " unauthorized to access repository " )
tag_for_del = " v1.0.0 "
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_del_artifact " , tag_for_del )
if project_access [ " check_list " ] [ 0 ] : #---repository:pull---
pull_harbor_image ( harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , repo_name , tag_for_del )
else :
pull_harbor_image ( harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , repo_name , tag_for_del , expected_error_message = " action: pull: unauthorized to access repository " )
if project_access [ " check_list " ] [ 2 ] : #---artifact:delete---
self . artifact . delete_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag_for_del , * * SYSTEM_RA_CLIENT )
else :
self . artifact . delete_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag_for_del , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_create_tag " , " latest_1 " )
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , * * ADMIN_CLIENT )
if project_access [ " check_list " ] [ 6 ] : #---tag:create---
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " 1.0 " , * * SYSTEM_RA_CLIENT )
else :
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " 1.0 " , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
if project_access [ " check_list " ] [ 7 ] : #---tag:delete---
self . artifact . delete_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , * * SYSTEM_RA_CLIENT )
else :
self . artifact . delete_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_create_artifact_label " , " latest_1 " )
#Add project level label to artifact
label_id , _ = self . label . create_label ( project_id = project_access [ " project_id " ] , scope = " p " , * * ADMIN_CLIENT )
if project_access [ " check_list " ] [ 8 ] : #---artifact-label:create---
self . artifact . add_label_to_reference ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , int ( label_id ) , * * SYSTEM_RA_CLIENT )
else :
self . artifact . add_label_to_reference ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , int ( label_id ) , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
if project_access [ " check_list " ] [ 9 ] : #---scan:create---
self . scan . scan_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , * * SYSTEM_RA_CLIENT )
else :
self . scan . scan_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
#5. Disable the system robot account;
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , disable = True , * * ADMIN_CLIENT )
#6. Verify the system robot account has no the corresponding rights;
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
#7. Enable the system robot account;
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , disable = False , * * ADMIN_CLIENT )
#8. Verify the system robot account has the corresponding rights;
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT )
#9. Refresh secret for the system robot account;
new_secret = " new_secret_At_321 "
self . robot . refresh_robot_account_secret ( system_robot_account_id , new_secret , * * ADMIN_CLIENT )
#10. Verify the system robot account has no the corresponding right with the old secret already;
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
#11. Verify the system robot account still has the corresponding right with the new secret;
SYSTEM_RA_CLIENT [ " password " ] = new_secret
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT )
#12. List system robot account, then add a new project to the system robot account project permission list;
self . robot . list_robot ( * * ADMIN_CLIENT )
project_for_del_id , project_for_del_name = self . project . create_project ( metadata = { " public " : " true " } , * * ADMIN_CLIENT )
2021-02-04 08:32:44 +01:00
robot_account_Permissions = v2_swagger_client . RobotPermission ( kind = " project " , namespace = project_for_del_name , access = access_list_list [ 0 ] )
2020-12-16 11:06:41 +01:00
robot_account_Permissions_list . append ( robot_account_Permissions )
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , * * ADMIN_CLIENT )
self . robot . list_robot ( * * ADMIN_CLIENT )
2021-01-04 12:17:51 +01:00
#13. Verify the system robot account has the corresponding right for this new project;
project_access_list . append ( dict ( project_name = project_for_del_name , project_id = project_for_del_id , check_list = [ True ] * 10 ) )
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT )
#14. Edit the system robot account as removing this new project from it;
robot_account_Permissions_list . remove ( robot_account_Permissions )
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , * * ADMIN_CLIENT )
self . robot . list_robot ( * * ADMIN_CLIENT )
#15. Verify the system robot account has no the corresponding right for this new project;
project_access_list_for_del = [ dict ( project_name = project_for_del_name , project_id = project_for_del_id , check_list = [ True ] * 10 ) ]
self . verify_repository_unpushable (
project_access_list_for_del , SYSTEM_RA_CLIENT ,
expected_login_error_message = " " ,
expected_error_message = " action: push: unauthorized to access repository "
)
#16. Delete this project;
self . repo . clear_repositories ( project_for_del_name , * * ADMIN_CLIENT )
2020-12-16 11:06:41 +01:00
self . project . delete_project ( project_for_del_id , * * ADMIN_CLIENT )
2021-01-04 12:17:51 +01:00
#17. List system robot account successfully;
2020-12-16 11:06:41 +01:00
self . robot . list_robot ( * * ADMIN_CLIENT )
2021-01-04 12:17:51 +01:00
#18. Delete the system robot account;
2020-12-16 11:06:41 +01:00
self . robot . delete_robot_account ( system_robot_account_id , * * ADMIN_CLIENT )
2021-01-04 12:17:51 +01:00
#19. Verify the system robot account has no the corresponding right;
2020-12-16 11:06:41 +01:00
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
2021-01-19 11:12:23 +01:00
#20. Add a system robot account with all projects coverd;
2020-12-16 11:06:41 +01:00
all_true_access_list = self . robot . create_access_list ( [ True ] * 10 )
robot_account_Permissions_list = [ ]
2021-02-04 08:32:44 +01:00
robot_account_Permissions = v2_swagger_client . RobotPermission ( kind = " project " , namespace = " * " , access = all_true_access_list )
2020-12-16 11:06:41 +01:00
robot_account_Permissions_list . append ( robot_account_Permissions )
_ , system_robot_account_cover_all = self . robot . create_system_robot ( robot_account_Permissions_list , 300 )
2021-01-04 12:17:51 +01:00
#21. Verify the system robot account has no the corresponding right;
2020-12-16 11:06:41 +01:00
print ( " system_robot_account_cover_all: " , system_robot_account_cover_all )
SYSTEM_RA_CLIENT_COVER_ALL = dict ( endpoint = TestRobotAccount . url , username = system_robot_account_cover_all . name , password = system_robot_account_cover_all . secret )
projects = self . project . get_projects ( dict ( ) , * * ADMIN_CLIENT )
print ( " All projects: " , projects )
project_access_list = [ ]
for i in range ( len ( projects ) ) :
project_access_list . append ( dict ( project_name = projects [ i ] . name , project_id = projects [ i ] . project_id , check_list = all_true_access_list ) )
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT_COVER_ALL )
2019-02-18 06:47:16 +01:00
if __name__ == ' __main__ ' :
2020-12-16 11:06:41 +01:00
suite = unittest . TestSuite ( unittest . makeSuite ( TestRobotAccount ) )
result = unittest . TextTestRunner ( sys . stdout , verbosity = 2 , failfast = True ) . run ( suite )
if not result . wasSuccessful ( ) :
2021-01-16 12:34:43 +01:00
raise Exception ( r " Robot account test failed: {} " . format ( result ) )