mirror of
https://github.com/goharbor/harbor.git
synced 2025-02-20 14:01:40 +01:00
LDAP group has different role, user in group has the same role, as groups with different roles were added in project member list, user should act like in different roles. for admin and dev role, there should be checkpoints to verify priviledges of each own. Signed-off-by: danfengliu <danfengl@vmware.com>
49 lines
1.6 KiB
Python
49 lines
1.6 KiB
Python
from __future__ import absolute_import
|
|
import unittest
|
|
|
|
from testutils import harbor_server
|
|
from testutils import TEARDOWN
|
|
from testutils import ADMIN_CLIENT
|
|
from library.user import User
|
|
from library.project import Project
|
|
from library.configurations import Configurations
|
|
|
|
|
|
class TestLdapAdminRole(unittest.TestCase):
|
|
@classmethod
|
|
def setUp(self):
|
|
url = ADMIN_CLIENT["endpoint"]
|
|
self.conf= Configurations()
|
|
self.user = User()
|
|
self.project = Project()
|
|
self.USER_MIKE=dict(endpoint = url, username = "mike", password = "zhu88jie")
|
|
|
|
@classmethod
|
|
def tearDown(self):
|
|
self.project.delete_project(TestLdapAdminRole.project_id, **self.USER_MIKE)
|
|
print("Case completed")
|
|
|
|
def testLdapAdminRole(self):
|
|
"""
|
|
Test case:
|
|
LDAP Admin Role
|
|
Test step and expected result:
|
|
1. Set LDAP Auth configurations;
|
|
2. Create a new public project(PA) by LDAP user mike;
|
|
3. Check project is created successfully;
|
|
4. Check mike is not admin;
|
|
5. Delete project(PA);
|
|
"""
|
|
|
|
|
|
self.conf.set_configurations_of_ldap(ldap_group_admin_dn="cn=harbor_users,ou=groups,dc=example,dc=com", **ADMIN_CLIENT)
|
|
|
|
TestLdapAdminRole.project_id, project_name = self.project.create_project(metadata = {"public": "false"}, **self.USER_MIKE)
|
|
self.project.check_project_name_exist(name=project_name, **self.USER_MIKE)
|
|
|
|
_user = self.user.get_user_by_name(self.USER_MIKE["username"], **ADMIN_CLIENT)
|
|
self.assertFalse(_user.sysadmin_flag)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main() |