2019-02-18 06:47:16 +01:00
from __future__ import absolute_import
2020-12-16 11:06:41 +01:00
import sys
2019-02-18 06:47:16 +01:00
import unittest
2020-12-16 11:06:41 +01:00
from testutils import ADMIN_CLIENT , CHART_API_CLIENT , TEARDOWN , harbor_server , harbor_url , suppress_urllib3_warning
from testutils import created_user , created_project
2019-02-18 06:47:16 +01:00
from library . user import User
from library . project import Project
2020-11-20 06:13:12 +01:00
from library . robot import Robot
2019-02-18 06:47:16 +01:00
from library . repository import Repository
2020-12-16 11:06:41 +01:00
from library . artifact import Artifact
2019-02-18 06:47:16 +01:00
from library . repository import pull_harbor_image
2020-12-04 11:28:29 +01:00
from library . repository import push_self_build_image_to_project
2019-02-18 06:47:16 +01:00
from library . base import _assert_status_code
2020-12-16 11:06:41 +01:00
from library . scan import Scan
from library . label import Label
from library . chart import Chart
import library . helm
import base
import v2_swagger_client
2019-02-18 06:47:16 +01:00
2020-12-16 11:06:41 +01:00
class TestRobotAccount ( unittest . TestCase ) :
2020-11-04 03:13:12 +01:00
@suppress_urllib3_warning
2019-02-18 06:47:16 +01:00
def setUp ( self ) :
2020-02-25 03:40:29 +01:00
self . project = Project ( )
self . user = User ( )
2020-03-16 03:13:28 +01:00
self . repo = Repository ( )
2020-12-16 11:06:41 +01:00
self . artifact = Artifact ( )
2020-11-20 06:13:12 +01:00
self . robot = Robot ( )
2020-12-16 11:06:41 +01:00
self . scan = Scan ( )
self . label = Label ( )
self . chart = Chart ( )
2019-02-18 06:47:16 +01:00
2020-12-16 11:06:41 +01:00
TestRobotAccount . url = ADMIN_CLIENT [ " endpoint " ]
TestRobotAccount . user_ra_password = " Aa123456 "
print ( " setup " )
@unittest.skipIf ( TEARDOWN == True , " Test data won ' t be erased. " )
def do_01_tearDown ( self ) :
2019-02-18 06:47:16 +01:00
#1. Delete repository(RA) by user(UA);
2021-01-16 12:34:43 +01:00
self . repo . delete_repository ( self . project_ra_name_a , self . repo_name_in_project_a . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_b , self . repo_name_in_project_b . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_c , self . repo_name_in_project_c . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
self . repo . delete_repository ( self . project_ra_name_a , self . repo_name_pa . split ( ' / ' ) [ 1 ] , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
#2. Delete project(PA);
2020-12-16 11:06:41 +01:00
self . project . delete_project ( self . project_ra_id_a , * * self . USER_RA_CLIENT )
self . project . delete_project ( self . project_ra_id_b , * * self . USER_RA_CLIENT )
self . project . delete_project ( self . project_ra_id_c , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-02-03 03:24:28 +01:00
#3. Delete user(UA).
2020-12-16 11:06:41 +01:00
self . user . delete_user ( self . user_ra_id , * * ADMIN_CLIENT )
2019-02-18 06:47:16 +01:00
2020-12-16 11:06:41 +01:00
def test_01_ProjectlevelRobotAccount ( self ) :
2019-02-18 06:47:16 +01:00
"""
Test case :
Robot Account
Test step and expected result :
1. Create user ( UA ) ;
2. Create private project ( PA ) , private project ( PB ) and public project ( PC ) by user ( UA ) ;
3. Push image ( ImagePA ) to project ( PA ) , image ( ImagePB ) to project ( PB ) and image ( ImagePC ) to project ( PC ) by user ( UA ) ;
4. Create a new robot account ( RA ) with pull and push privilige in project ( PA ) by user ( UA ) ;
5. Check robot account info , it should has both pull and push priviliges ;
6. Pull image ( ImagePA ) from project ( PA ) by robot account ( RA ) , it must be successful ;
7. Push image ( ImageRA ) to project ( PA ) by robot account ( RA ) , it must be successful ;
8. Push image ( ImageRA ) to project ( PB ) by robot account ( RA ) , it must be not successful ;
9. Pull image ( ImagePB ) from project ( PB ) by robot account ( RA ) , it must be not successful ;
10. Pull image from project ( PC ) , it must be successful ;
11. Push image ( ImageRA ) to project ( PC ) by robot account ( RA ) , it must be not successful ;
12. Update action property of robot account ( RA ) ;
13. Pull image ( ImagePA ) from project ( PA ) by robot account ( RA ) , it must be not successful ;
14. Push image ( ImageRA ) to project ( PA ) by robot account ( RA ) , it must be not successful ;
2020-02-03 03:24:28 +01:00
15. Delete robot account ( RA ) , it must be not successful .
2019-02-18 06:47:16 +01:00
Tear down :
2020-02-03 03:24:28 +01:00
1. Delete repository ( RA ) by user ( UA ) ;
2. Delete project ( PA ) ;
3. Delete user ( UA ) .
2019-02-18 06:47:16 +01:00
"""
2020-01-15 07:39:25 +01:00
image_project_a = " haproxy "
2019-02-18 06:47:16 +01:00
image_project_b = " hello-world "
2020-01-15 07:39:25 +01:00
image_project_c = " httpd "
2020-04-20 11:16:02 +02:00
image_robot_account = " alpine "
2019-02-18 06:47:16 +01:00
tag = " latest "
2020-07-30 10:04:14 +02:00
#1. Create user(UA);"
2020-12-16 11:06:41 +01:00
self . user_ra_id , user_ra_name = self . user . create_user ( user_password = TestRobotAccount . user_ra_password , * * ADMIN_CLIENT )
self . USER_RA_CLIENT = dict ( endpoint = TestRobotAccount . url , username = user_ra_name , password = TestRobotAccount . user_ra_password )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#2. Create private project(PA), private project(PB) and public project(PC) by user(UA);
2020-12-16 11:06:41 +01:00
self . project_ra_id_a , self . project_ra_name_a = self . project . create_project ( metadata = { " public " : " false " } , * * self . USER_RA_CLIENT )
self . project_ra_id_b , self . project_ra_name_b = self . project . create_project ( metadata = { " public " : " false " } , * * self . USER_RA_CLIENT )
self . project_ra_id_c , self . project_ra_name_c = self . project . create_project ( metadata = { " public " : " true " } , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#3. Push image(ImagePA) to project(PA), image(ImagePB) to project(PB) and image(ImagePC) to project(PC) by user(UA);
2020-12-16 11:06:41 +01:00
self . repo_name_in_project_a , tag_a = push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_a , tag )
self . repo_name_in_project_b , tag_b = push_self_build_image_to_project ( self . project_ra_name_b , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_b , tag )
self . repo_name_in_project_c , tag_c = push_self_build_image_to_project ( self . project_ra_name_c , harbor_server , user_ra_name , TestRobotAccount . user_ra_password , image_project_c , tag )
2019-02-18 06:47:16 +01:00
2020-11-20 06:13:12 +01:00
#4. Create a new robot account(RA) with pull and push privilege in project(PA) by user(UA);
2020-12-16 11:06:41 +01:00
robot_id , robot_account = self . robot . create_project_robot ( self . project_ra_name_a ,
30 , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-11-20 06:13:12 +01:00
#5. Check robot account info, it should has both pull and push privilege;
2020-12-16 11:06:41 +01:00
data = self . robot . get_robot_account_by_id ( robot_id , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
_assert_status_code ( robot_account . name , data . name )
2020-07-30 10:04:14 +02:00
#6. Pull image(ImagePA) from project(PA) by robot account(RA), it must be successful;
2020-12-16 11:06:41 +01:00
pull_harbor_image ( harbor_server , robot_account . name , robot_account . secret , self . repo_name_in_project_a , tag_a )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#7. Push image(ImageRA) to project(PA) by robot account(RA), it must be successful;
2020-12-16 11:06:41 +01:00
self . repo_name_pa , _ = push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , robot_account . name , robot_account . secret , image_robot_account , tag )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#8. Push image(ImageRA) to project(PB) by robot account(RA), it must be not successful;
2020-12-16 11:06:41 +01:00
push_self_build_image_to_project ( self . project_ra_name_b , harbor_server , robot_account . name , robot_account . secret , image_robot_account , tag , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#9. Pull image(ImagePB) from project(PB) by robot account(RA), it must be not successful;
2020-12-16 11:06:41 +01:00
pull_harbor_image ( harbor_server , robot_account . name , robot_account . secret , self . repo_name_in_project_b , tag_b , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#10. Pull image from project(PC), it must be successful;
2020-12-16 11:06:41 +01:00
pull_harbor_image ( harbor_server , robot_account . name , robot_account . secret , self . repo_name_in_project_c , tag_c )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#11. Push image(ImageRA) to project(PC) by robot account(RA), it must be not successful;
2020-12-16 11:06:41 +01:00
push_self_build_image_to_project ( self . project_ra_name_c , harbor_server , robot_account . name , robot_account . secret , image_robot_account , tag , expected_error_message = " unauthorized to access repository " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#12. Update action property of robot account(RA);"
2020-12-16 11:06:41 +01:00
self . robot . disable_robot_account ( robot_id , True , * * self . USER_RA_CLIENT )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#13. Pull image(ImagePA) from project(PA) by robot account(RA), it must be not successful;
2020-12-16 11:06:41 +01:00
pull_harbor_image ( harbor_server , robot_account . name , robot_account . secret , self . repo_name_in_project_a , tag_a , expected_login_error_message = " unauthorized: authentication required " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#14. Push image(ImageRA) to project(PA) by robot account(RA), it must be not successful;
2020-12-16 11:06:41 +01:00
push_self_build_image_to_project ( self . project_ra_name_a , harbor_server , robot_account . name , robot_account . secret , image_robot_account , tag , expected_login_error_message = " unauthorized: authentication required " )
2019-02-18 06:47:16 +01:00
2020-07-30 10:04:14 +02:00
#15. Delete robot account(RA), it must be not successful.
2020-12-16 11:06:41 +01:00
self . robot . delete_robot_account ( robot_id , * * self . USER_RA_CLIENT )
self . do_01_tearDown ( )
def verify_repository_pushable ( self , project_access_list , system_ra_client ) :
for project_access in project_access_list :
print ( r " project_access: " , project_access )
if project_access [ " check_list " ] [ 1 ] : #---repository:push---
repo = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] , " test_pushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) )
else :
push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] , " test_unpushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) , expected_error_message = " unauthorized to access repository " )
def verify_repository_unpushable ( self , project_access_list , system_ra_client , expected_login_error_message = " unauthorized: authentication required " ) :
for project_access in project_access_list : #---repository:push---
push_self_build_image_to_project (
project_access [ " project_name " ] ,
harbor_server , system_ra_client [ " username " ] , system_ra_client [ " password " ] ,
" test_unpushable " + base . _random_name ( " repo " ) , " v6.8.1 " + base . _random_name ( " tag " ) ,
expected_login_error_message = expected_login_error_message
)
def test_02_SystemlevelRobotAccount ( self ) :
"""
Test case :
Robot Account
Test step and expected result :
1. Define a number of access lists ;
2. Create the same number of private projects ;
3. Create a system robot account has permission for those projects ;
4. Verify the system robot account has the corresponding rights ;
5. Disable the system robot account ;
6. Verify the system robot account has no the corresponding rights ;
7. Enable the system robot account ;
8. Verify the system robot account has the corresponding rights ;
9. Refresh secret for the system robot account ;
10. Verify the system robot account has no the corresponding right with the old secret already ;
11. Verify the system robot account still has the corresponding right with the new secret ;
12. List system robot account , then add a new project to the system robot account project permission list ;
13. Delete this project ;
14. List system robot account successfully ;
15. Delete the system robot account ;
16. Verify the system robot account has no the corresponding right ;
17. Add a system robot account with all project coverd ;
18. Verify the system robot account has no the corresponding right ;
"""
#1. Define a number of access lists;
CHART_FILE_LIST = [ dict ( name = ' prometheus ' , version = ' 7.0.2 ' ) , dict ( name = ' harbor ' , version = ' 0.2.0 ' ) ]
for i in range ( 2 ) :
base . run_command ( [ " curl " , r " -o " , " ./tests/apitests/python/ {} - {} .tgz " . format ( CHART_FILE_LIST [ i ] [ " name " ] , CHART_FILE_LIST [ i ] [ " version " ] ) , " https://storage.googleapis.com/harbor-builds/helm-chart-test-files/ {} - {} .tgz " . format ( CHART_FILE_LIST [ i ] [ " name " ] , CHART_FILE_LIST [ i ] [ " version " ] ) ] )
#Make sure that whether 'True' or 'False' must be included in each line or row.
check_list = [
[ True , True , True , True , True , True , False , True , False , True ] ,
[ False , False , False , False , True , True , False , True , True , False ] ,
[ True , False , True , False , True , False , True , False , True , True ] ,
[ False , False , False , True , False , True , False , True , True , False ]
]
access_list_list = [ ]
for i in range ( len ( check_list ) ) :
access_list_list . append ( self . robot . create_access_list ( check_list [ i ] ) )
#2. Create the same number of private projects;
robot_account_Permissions_list = [ ]
project_access_list = [ ]
for i in range ( len ( check_list ) ) :
with created_user ( TestRobotAccount . user_ra_password , _teardown = False ) as ( user_id , username ) :
with created_project ( metadata = { " public " : " false " } , user_id = user_id , _teardown = False ) as ( project_id , project_name ) :
project_access_list . append ( dict ( project_name = project_name , project_id = project_id , check_list = check_list [ i ] ) )
robot_account_Permissions = v2_swagger_client . Permission ( kind = " project " , namespace = project_name , access = access_list_list [ i ] )
robot_account_Permissions_list . append ( robot_account_Permissions )
#3. Create a system robot account has permission for those projects;
system_robot_account_id , system_robot_account = self . robot . create_system_robot ( robot_account_Permissions_list , 300 )
print ( " system_robot_account: " , system_robot_account )
SYSTEM_RA_CLIENT = dict ( endpoint = TestRobotAccount . url , username = system_robot_account . name , password = system_robot_account . secret )
SYSTEM_RA_CHART_CLIENT = dict ( endpoint = CHART_API_CLIENT [ " endpoint " ] , username = SYSTEM_RA_CLIENT [ " username " ] , password = SYSTEM_RA_CLIENT [ " password " ] )
#4. Verify the system robot account has the corresponding rights;
for project_access in project_access_list :
print ( r " project_access: " , project_access )
if project_access [ " check_list " ] [ 1 ] : #---repository:push---
repo = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , " test_pushable " , " v6.8.1 " )
else :
push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , " test_unpushable " , " v6.8.1 " , expected_error_message = " unauthorized to access repository " )
tag_for_del = " v1.0.0 "
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_del_artifact " , tag_for_del )
if project_access [ " check_list " ] [ 0 ] : #---repository:pull---
pull_harbor_image ( harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , repo_name , tag_for_del )
else :
pull_harbor_image ( harbor_server , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , repo_name , tag_for_del , expected_error_message = " action: pull: unauthorized to access repository " )
if project_access [ " check_list " ] [ 2 ] : #---artifact:delete---
self . artifact . delete_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag_for_del , * * SYSTEM_RA_CLIENT )
else :
self . artifact . delete_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag_for_del , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
#Prepare for chart read and delete
self . chart . upload_chart ( project_access [ " project_name " ] , r ' ./tests/apitests/python/ {} - {} .tgz ' . format ( CHART_FILE_LIST [ 1 ] [ " name " ] , CHART_FILE_LIST [ 1 ] [ " version " ] ) , * * CHART_API_CLIENT )
if project_access [ " check_list " ] [ 3 ] : #---helm-chart:read---
library . helm . helm2_fetch_chart_file ( " chart_repo_ " + base . _random_name ( " repo " ) , harbor_url , project_access [ " project_name " ] , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , CHART_FILE_LIST [ 1 ] [ " name " ] )
else :
library . helm . helm2_fetch_chart_file ( " chart_repo_ " + base . _random_name ( " repo " ) , harbor_url , project_access [ " project_name " ] , SYSTEM_RA_CLIENT [ " username " ] , SYSTEM_RA_CLIENT [ " password " ] , CHART_FILE_LIST [ 1 ] [ " name " ] , expected_add_repo_error_message = " 403 Forbidden " )
if project_access [ " check_list " ] [ 4 ] : #---helm-chart-version:create---
self . chart . upload_chart ( project_access [ " project_name " ] , r ' ./tests/apitests/python/ {} - {} .tgz ' . format ( CHART_FILE_LIST [ 0 ] [ " name " ] , CHART_FILE_LIST [ 0 ] [ " version " ] ) , * * SYSTEM_RA_CHART_CLIENT )
else :
self . chart . upload_chart ( project_access [ " project_name " ] , r ' ./tests/apitests/python/ {} - {} .tgz ' . format ( CHART_FILE_LIST [ 0 ] [ " name " ] , CHART_FILE_LIST [ 0 ] [ " version " ] ) , expect_status_code = 403 , * * SYSTEM_RA_CHART_CLIENT )
if project_access [ " check_list " ] [ 5 ] : #---helm-chart-version:delete---
self . chart . delete_chart_with_version ( project_access [ " project_name " ] , CHART_FILE_LIST [ 1 ] [ " name " ] , CHART_FILE_LIST [ 1 ] [ " version " ] , * * SYSTEM_RA_CHART_CLIENT )
else :
self . chart . delete_chart_with_version ( project_access [ " project_name " ] , CHART_FILE_LIST [ 1 ] [ " name " ] , CHART_FILE_LIST [ 1 ] [ " version " ] , expect_status_code = 403 , * * SYSTEM_RA_CHART_CLIENT )
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_create_tag " , " latest_1 " )
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , * * ADMIN_CLIENT )
if project_access [ " check_list " ] [ 6 ] : #---tag:create---
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " 1.0 " , * * SYSTEM_RA_CLIENT )
else :
self . artifact . create_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " 1.0 " , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
if project_access [ " check_list " ] [ 7 ] : #---tag:delete---
self . artifact . delete_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , * * SYSTEM_RA_CLIENT )
else :
self . artifact . delete_tag ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , " for_delete " , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
repo_name , tag = push_self_build_image_to_project ( project_access [ " project_name " ] , harbor_server , ADMIN_CLIENT [ " username " ] , ADMIN_CLIENT [ " password " ] , " test_create_artifact_label " , " latest_1 " )
#Add project level label to artifact
label_id , _ = self . label . create_label ( project_id = project_access [ " project_id " ] , scope = " p " , * * ADMIN_CLIENT )
if project_access [ " check_list " ] [ 8 ] : #---artifact-label:create---
self . artifact . add_label_to_reference ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , int ( label_id ) , * * SYSTEM_RA_CLIENT )
else :
self . artifact . add_label_to_reference ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , int ( label_id ) , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
if project_access [ " check_list " ] [ 9 ] : #---scan:create---
self . scan . scan_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , * * SYSTEM_RA_CLIENT )
else :
self . scan . scan_artifact ( project_access [ " project_name " ] , repo_name . split ( ' / ' ) [ 1 ] , tag , expect_status_code = 403 , * * SYSTEM_RA_CLIENT )
#5. Disable the system robot account;
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , disable = True , * * ADMIN_CLIENT )
#6. Verify the system robot account has no the corresponding rights;
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
#7. Enable the system robot account;
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , disable = False , * * ADMIN_CLIENT )
#8. Verify the system robot account has the corresponding rights;
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT )
#9. Refresh secret for the system robot account;
new_secret = " new_secret_At_321 "
self . robot . refresh_robot_account_secret ( system_robot_account_id , new_secret , * * ADMIN_CLIENT )
#10. Verify the system robot account has no the corresponding right with the old secret already;
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
#11. Verify the system robot account still has the corresponding right with the new secret;
SYSTEM_RA_CLIENT [ " password " ] = new_secret
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT )
#12. List system robot account, then add a new project to the system robot account project permission list;
self . robot . list_robot ( * * ADMIN_CLIENT )
project_for_del_id , project_for_del_name = self . project . create_project ( metadata = { " public " : " true " } , * * ADMIN_CLIENT )
robot_account_Permissions = v2_swagger_client . Permission ( kind = " project " , namespace = project_for_del_name , access = access_list_list [ 0 ] )
robot_account_Permissions_list . append ( robot_account_Permissions )
self . robot . update_system_robot_account ( system_robot_account_id , system_robot_account . name , robot_account_Permissions_list , * * ADMIN_CLIENT )
self . robot . list_robot ( * * ADMIN_CLIENT )
#13. Delete this project;
self . project . delete_project ( project_for_del_id , * * ADMIN_CLIENT )
#14. List system robot account successfully;
self . robot . list_robot ( * * ADMIN_CLIENT )
#15. Delete the system robot account;
self . robot . delete_robot_account ( system_robot_account_id , * * ADMIN_CLIENT )
#16. Verify the system robot account has no the corresponding right;
self . verify_repository_unpushable ( project_access_list , SYSTEM_RA_CLIENT )
#17. Add a system robot account with all project coverd;
all_true_access_list = self . robot . create_access_list ( [ True ] * 10 )
robot_account_Permissions_list = [ ]
robot_account_Permissions = v2_swagger_client . Permission ( kind = " project " , namespace = " * " , access = all_true_access_list )
robot_account_Permissions_list . append ( robot_account_Permissions )
_ , system_robot_account_cover_all = self . robot . create_system_robot ( robot_account_Permissions_list , 300 )
#18. Verify the system robot account has no the corresponding right;
print ( " system_robot_account_cover_all: " , system_robot_account_cover_all )
SYSTEM_RA_CLIENT_COVER_ALL = dict ( endpoint = TestRobotAccount . url , username = system_robot_account_cover_all . name , password = system_robot_account_cover_all . secret )
projects = self . project . get_projects ( dict ( ) , * * ADMIN_CLIENT )
print ( " All projects: " , projects )
project_access_list = [ ]
for i in range ( len ( projects ) ) :
project_access_list . append ( dict ( project_name = projects [ i ] . name , project_id = projects [ i ] . project_id , check_list = all_true_access_list ) )
self . verify_repository_pushable ( project_access_list , SYSTEM_RA_CLIENT_COVER_ALL )
2019-02-18 06:47:16 +01:00
if __name__ == ' __main__ ' :
2020-12-16 11:06:41 +01:00
suite = unittest . TestSuite ( unittest . makeSuite ( TestRobotAccount ) )
result = unittest . TextTestRunner ( sys . stdout , verbosity = 2 , failfast = True ) . run ( suite )
if not result . wasSuccessful ( ) :
2021-01-16 12:34:43 +01:00
raise Exception ( r " Robot account test failed: {} " . format ( result ) )