本文整理汇总了Python中security.rbacmain.rbacmain函数的典型用法代码示例。如果您正苦于以下问题:Python rbacmain函数的具体用法?Python rbacmain怎么用?Python rbacmain使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了rbacmain函数的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。
示例1: test_role_assignment_audit
def test_role_assignment_audit(self):
ops = self.input.param("ops",'assign')
if ops in ['assign','edit']:
eventID=rbacmain.AUDIT_ROLE_ASSIGN
elif ops == 'remove':
eventID=rbacmain.AUDIT_REMOVE_ROLE
Audit = audit(eventID=eventID, host=self.master)
currentState = Audit.getAuditStatus()
self.log.info ("Current status of audit on ip - {0} is {1}".format(self.master.ip, currentState))
if currentState:
Audit.setAuditEnable('false')
self.log.info ("Enabling Audit ")
Audit.setAuditEnable('true')
self.sleep(30)
user_name = self.input.param("user_name")
final_roles = rbacmain()._return_roles(self.user_role)
payload = "name=" + user_name + "&roles=" + final_roles
status, content, header = rbacmain(self.master)._set_user_roles(user_name=self.user_id,payload=payload)
expectedResults = {"full_name":"RitamSharma","roles":["admin"],"identity:source":"saslauthd","identity:user":self.user_id,
"real_userid:source":"ns_server","real_userid:user":"Administrator",
"ip":self.ipAddress, "port":123456}
if ops == 'edit':
payload = "name=" + user_name + "&roles=" + 'admin,cluster_admin'
status, content, header = rbacmain(self.master)._set_user_roles(user_name=self.user_id,payload=payload)
expectedResults = {"full_name":"RitamSharma","roles":["admin","cluster_admin"],"identity:source":"saslauthd","identity:user":self.user_id,
"real_userid:source":"ns_server","real_userid:user":"Administrator",
"ip":self.ipAddress, "port":123456}
elif ops == 'remove':
status, content, header = rbacmain(self.master)._delete_user(self.user_id)
expectedResults = {"identity:source":"saslauthd","identity:user":self.user_id,
"real_userid:source":"ns_server","real_userid:user":"Administrator",
"ip":self.ipAddress, "port":123456}
fieldVerification, valueVerification = Audit.validateEvents(expectedResults)
self.assertTrue(fieldVerification, "One of the fields is not matching")
self.assertTrue(valueVerification, "Values for one of the fields is not matching")
示例2: test_ldapDeleteUser
def test_ldapDeleteUser(self):
rbacmain(self.master)._check_role_permission_validate_multiple(self.user_id,self.user_role,self.bucket_name,self.role_map)
user_name = rbacmain().returnUserList(self.user_id)
self._removeLdapUserRemote(user_name)
print user_name
status, content, header = rbacmain(self.master)._check_user_permission(user_name[0][0],user_name[0][1],self.user_role)
self.assertFalse(status,"Not getting 401 for users that are deleted in LDAP")
示例3: test_change_role
def test_change_role(self):
rbacmain(self.master)._check_role_permission_validate_multiple(
self.user_id, self.user_role, self.bucket_name, self.role_map
)
result = rbacmain(self.master)._check_role_permission_validate_multiple(
self.user_id, self.new_role, self.bucket_name, self.new_role_map
)
self.assertTrue(result, "Issue with role assignment and comparision with permission set")
示例4: setup_user_roles
def setup_user_roles(self):
final_user_id = rbacmain().returnUserList(self.user_id)
final_roles = rbacmain()._return_roles(self.user_role)
payload = "name=" + self.user_name + "&roles=" + final_roles
for final_user in final_user_id:
status, content, header = rbacmain(self.master)._set_user_roles(user_name=final_user[0],payload=payload)
self.assertTrue(status,"Issue with setting role")
status = rbacmain()._parse_get_user_response(json.loads(content),final_user[0],self.user_name,final_roles)
self.assertTrue(status,"Role assignment not matching")
示例5: test_checkPasswordChange
def test_checkPasswordChange(self):
result = rbacmain(self.master, self.auth_type)._check_role_permission_validate_multiple(self.user_id,self.user_role,self.bucket_name,self.role_map)
self.assertTrue(result,"Issue with role assignment and comparision with permission set")
user_list = self.returnUserList(self.user_id)
temp_id = ""
for i in range(len(user_list)):
self._changeLdapPassRemote(user_list[i][0], 'password1')
temp_id = str(user_list[i][0]) + ":" + str('password1?')
result = rbacmain(self.master,self.auth_type)._check_role_permission_validate_multiple(temp_id[:-1],self.user_role,self.bucket_name,self.role_map)
self.assertTrue(result,"Issue with role assignment and comparision with permission set")
示例6: test_user_role_cluster
def test_user_role_cluster(self):
servers_count = self.servers[:self.nodes_init]
user_list = self.returnUserList(self.user_id)
final_roles = rbacmain()._return_roles(self.user_role)
for user_id in user_list:
payload = "name=" + user_id[0] + "&roles=" + final_roles
status, content, header = rbacmain(self.master)._set_user_roles(user_name=user_id[0],payload=payload)
for server in servers_count:
status, content, header = rbacmain(server)._retrieve_user_roles()
content = json.loads(content)
temp = rbacmain()._parse_get_user_response(content,user_id[0],user_id[0],self.user_role)
self.assertTrue(temp,"Roles are not matching for user")
示例7: test_role_permission_noaccess_bucket
def test_role_permission_noaccess_bucket(self):
rest=RestConnection(self.master)
rest.create_bucket(bucket='default', ramQuotaMB=100)
#rest1=RestConnection(self.master)
#rest1.create_bucket(bucket='default1', ramQuotaMB=100,proxyPort=11212)
bucket_name = self.bucket_name.split(":")
for server in self.servers[:self.nodes_init]:
if (len(bucket_name) > 1):
for bucket in bucket_name:
rbacmain(server)._check_role_permission_validate_multiple(self.user_id,self.user_role,bucket,self.role_map,self.incorrect_bucket)
else:
rbacmain(server)._check_role_permission_validate_multiple(self.user_id,self.user_role,self.bucket_name,self.role_map,no_bucket_access=self.no_bucket_access,no_access_bucket_name=self.no_access_bucket_name)
示例8: test_role_assign_check_rest_api
def test_role_assign_check_rest_api(self):
user_name = self.input.param("user_name")
final_test_role_assign_check_end_to_end = self.user_id.split("?")
final_roles = rbacmain()._return_roles(self.user_role)
payload = "name=" + user_name + "&roles=" + final_roles
if len(final_user_id) == 1:
status, content, header = rbacmain(self.master)._set_user_roles(user_name=self.user_id,payload=payload)
self.assertTrue(status,"Issue with setting role")
else:
for final_user in final_user_id:
status, content, header = rbacmain(self.master)._set_user_roles(user_name=final_user[0],payload=payload)
self.assertTrue(status,"Issue with setting role")
示例9: test_user_role_cluster_rebalance_out
def test_user_role_cluster_rebalance_out(self):
user_list = self.returnUserList(self.user_id)
final_roles = rbacmain()._return_roles(self.user_role)
for user_id in user_list:
payload = "name=" + user_id[0] + "&roles=" + final_roles
status, content, header = rbacmain(self.master, self.auth_type)._set_user_roles(user_name=user_id[0],payload=payload)
servers_out = self.servers[2:]
self.cluster.rebalance(self.servers, [], servers_out)
for server in self.servers[:2]:
status, content, header = rbacmain(server)._retrieve_user_roles()
content = json.loads(content)
for user_id in user_list:
temp = rbacmain()._parse_get_user_response(content,user_id[0],user_id[0],self.user_role)
self.assertTrue(temp,"Roles are not matching for user")
示例10: test_checkInvalidISASLPW
def test_checkInvalidISASLPW(self):
shell = RemoteMachineShellConnection(self.master)
try:
result = rbacmain(self.master)._check_role_permission_validate_multiple(self.user_id,self.user_role,self.bucket_name,self.role_map)
self.assertTrue(result,"Issue with role assignment and comparision with permission set")
command = "mv /opt/couchbase/var/lib/couchbase/isasl.pw /tmp"
o, r = shell.execute_command(command)
shell.log_command_output(o, r)
result = rbacmain(self.master)._check_role_permission_validate_multiple(self.user_id,self.user_role,self.bucket_name,self.role_map)
self.assertTrue(result,"Issue with role assignment and comparision with permission set")
finally:
command = "mv /tmp/isasl.pw /opt/couchbase/var/lib/couchbase"
o, r = shell.execute_command(command)
shell.log_command_output(o, r)
shell.disconnect()
示例11: test_set_roles
def test_set_roles(self):
final_user_id = rbacmain().returnUserList(self.user_id)
print final_user_id
user_list = ""
if len(final_user_id) == 1:
user_list = str(final_user_id[0])
else:
for final_user in final_user_id:
user_list = user_list + "," + str(final_user[0])
user_list = user_list[1:]
final_roles = rbacmain()._return_roles(self.user_role)
options = "--set-users=" + user_list + " --roles=" + final_roles
output, error = self.execute_admin_role_manage(options)
self.check_role_assignment(final_user_id,self.user_role,output)
示例12: test_compare_orig_roles
def test_compare_orig_roles(self):
status, content, header = rbacmain(self.master)._retrive_all_user_role(self.user_id)
orig_role_list = [
{"role": "admin", "name": "Admin", "desc": "Can manage ALL cluster features including security."},
{"role": "ro_admin", "name": "Read Only Admin", "desc": "Can view ALL cluster features."},
{
"role": "cluster_admin",
"name": "Cluster Admin",
"desc": "Can manage all cluster features EXCEPT security.",
},
{
"role": "bucket_admin",
"bucket_name": "*",
"name": "Bucket Admin",
"desc": "Can manage ALL bucket features for specified buckets (incl. start/stop XDCR)",
},
{
"role": "views_admin",
"bucket_name": "*",
"name": "Views Admin",
"desc": "Can manage views for specified buckets",
},
{
"role": "replication_admin",
"name": "Replication Admin",
"desc": "Can manage ONLY XDCR features (cluster AND bucket level)",
},
]
content = json.loads(content)
if orig_role_list == content:
self.assertTrue(True, "Issue in comparison of original roles with expected")
示例13: test_role_permission_validate_multiple_rest_api
def test_role_permission_validate_multiple_rest_api(self):
result = rbacmain(
self.master, servers=self.servers, cluster=self.cluster
)._check_role_permission_validate_multiple_rest_api(
self.user_id, self.user_role, self.bucket_name, self.role_map
)
self.assertTrue(result, "Issue with role assignment and comparision with permission set")
示例14: test_role_assign_incorrect_bucket_name
def test_role_assign_incorrect_bucket_name(self):
msg = self.input.param("msg", None)
payload = "name=" + self.user_id + "&roles=" + self.user_role
status, content, header = rbacmain(self.master)._set_user_roles(user_name=self.user_id, payload=payload)
self.assertFalse(status, "Incorrect status for incorrect role name")
if msg != content:
self.assertFalse(True, "Message shown is incorrect")
示例15: test_add_remove_users
def test_add_remove_users(self):
final_roles=""
user_list = self.returnUserList(self.user_id)
user_role_param = self.user_role.split(":")
if len(user_role_param) == 1:
final_roles = user_role_param[0]
else:
for role in user_role_param:
final_roles = role + "," + final_roles
for user_id in user_list:
payload = "name=" + user_id[0] + "&roles=" + final_roles
status, content, header = rbacmain(self.master)._set_user_roles(user_name=user_id[0],payload=payload)
delete_user = user_list[1:]
for user in delete_user:
status, content, header = rbacmain(self.master)._delete_user(user[0])
self.assertTrue(status,"Issue with deleting users")