Vladimir Ushakov 4163866b5c Fix for toolchain ldap tests
Fix for authorization issue for Grafana and
Gibana dashboards when deployed with LDAP.

Change-Id: I3ee3031d374e56a965273f42865e37e66254933f
Closes-Bug: #1621414
2016-09-14 15:01:42 +03:00

221 lines
8.6 KiB
Python

# Copyright 2016 Mirantis, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from fuelweb_test.helpers.decorators import log_snapshot_after_test
from fuelweb_test import logger
from proboscis import test
from stacklight_tests.helpers import helpers
from stacklight_tests.toolchain import api
@test(groups=["ldap"])
class TestToolchainLDAP(api.ToolchainApi):
"""Class testing the LMA Toolchain plugins with LDAP(S) for authentication.
"""
@test(depends_on_groups=['prepare_slaves_3'],
groups=["ldap", "deploy_toolchain_with_ldap", "toolchain", "deploy"])
@log_snapshot_after_test
def deploy_toolchain_with_ldap(self):
"""Install the LMA Toolchain plugins with LDAP integration for
authentication
Scenario:
1. Upload the LMA Toolchain plugins to the master node
2. Install the plugins
3. Create the cluster
4. Enable and configure LDAP for plugin authentication
5. Deploy the cluster
6. Upload install_slapd.sh script on controller node
7. On controller node open the firewall for ports 389 and 636
8. Install and configure the LDAP server
9. Check that LMA Toolchain plugins are running
10. Check plugins are available with LDAP for authentication
Duration 120m
"""
self._create_ldap_toolchain()
self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
@test(depends_on_groups=['prepare_slaves_3'],
groups=["ldap", "deploy_toolchain_with_ldap_authz", "toolchain",
"deploy"])
@log_snapshot_after_test
def deploy_toolchain_with_ldap_authz(self):
"""Install the LMA Toolchain plugins with LDAP integration for
authentication and authorization
Scenario:
1. Upload the LMA Toolchain plugins to the master node
2. Install the plugins
3. Create the cluster
4. Enable and configure LDAP for plugin authentication and
authorization
5. Deploy the cluster
6. Upload install_slapd.sh script on controller node
7. On controller node open the firewall for ports 389 and 636
8. Install and configure the LDAP server
9. Check that LMA Toolchain plugins are running
10. Check plugins are available with LDAP for authentication and
authorization
Duration 120m
"""
self._create_ldap_toolchain(authz=True)
self.env.make_snapshot("deploy_toolchain_with_ldap_authz",
is_make=True)
@test(depends_on_groups=['prepare_slaves_3'],
groups=["ldap", "deploy_toolchain_with_ldaps_authz", "toolchain",
"deploy"])
@log_snapshot_after_test
def deploy_toolchain_with_ldaps_authz(self):
"""Install the LMA Toolchain plugins with LDAPS integration for
authentication and authorization
Scenario:
1. Upload the LMA Toolchain plugins to the master node
2. Install the plugins
3. Create the cluster
4. Enable and configure LDAPS for plugin authentication and
authorization
5. Deploy the cluster
6. Upload install_slapd.sh script on controller node
7. On controller node open the firewall for ports 389 and 636
8. Install and configure the LDAPS server
9. Check that LMA Toolchain plugins are running
10. Check plugins are available with LDAPS for authentication and
authorization
Duration 120m
"""
self._create_ldap_toolchain(authz=True, protocol='ldaps')
self.env.make_snapshot("deploy_toolchain_with_ldaps_authz",
is_make=True)
def _create_ldap_toolchain(self, authz=False, protocol='ldap'):
"""Create generic toolchain for LDAP test
:param authz: configures LDAP server for plugin authorisation and adds
authorisation checking
:type authz: boolean
:param protocol: configures LDAP or LDAPS protocol to be used on LDAP
server
:type protocol: str
"""
fuel_web = self.helpers.fuel_web
self.env.revert_snapshot("ready_with_3_slaves")
self.prepare_plugins()
self.helpers.create_cluster(name=self.__class__.__name__)
self.activate_plugins()
fuel_web.update_nodes(self.helpers.cluster_id,
self.settings.base_nodes, update_interfaces=True)
plugins_ldap = {
"kibana": (self.ELASTICSEARCH_KIBANA, "(objectClass=*)"),
"grafana": (self.INFLUXDB_GRAFANA, "(uid=%s)"),
"nagios": (self.LMA_INFRASTRUCTURE_ALERTING, "(objectClass=*)")
}
ldap_server = fuel_web.get_nailgun_cluster_nodes_by_roles(
self.helpers.cluster_id, roles=["controller", ],
role_status='pending_roles')[0]['hostname']
for name, plugin in plugins_ldap.iteritems():
self._activate_ldap_plugin(plugin[0], plugin[1], name, ldap_server,
authz=authz, protocol=protocol)
self.helpers.deploy_cluster(self.settings.base_nodes)
ldap_node = fuel_web.get_nailgun_cluster_nodes_by_roles(
self.helpers.cluster_id, roles=["controller", ])[0]
with fuel_web.get_ssh_for_nailgun_node(ldap_node) as remote:
remote.upload(
helpers.get_fixture("ldap/install_slapd.sh"),
"/tmp"
)
remote.check_call(
"bash -x /tmp/install_slapd.sh && iptables -I INPUT "
"-p tcp -m multiport --ports 389,636 -m comment --comment "
"'ldap server' -j ACCEPT", verbose=True
)
self.check_plugins_online()
for plugin in plugins_ldap.values():
plugin[0].check_plugin_ldap(authz=authz)
self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
@staticmethod
def _activate_ldap_plugin(plugin, ufilter, dashboard_name, ldap_server,
authz=False, protocol="ldap"):
"""Activate LDAP option for a plugin."""
name = plugin.get_plugin_settings().name
logger.info(
"Enable LDAP for plugin {0}, authorization {1}, protocol: {2}, "
"user search filter: {3}, ldap server node: {4}".format(
name, authz, protocol, ufilter, ldap_server
)
)
options = {
"ldap_enabled/value": True,
"ldap_protocol_for_{}/value".format(dashboard_name): protocol,
"ldap_servers/value": ldap_server,
"ldap_bind_dn/value": "cn=admin,dc=stacklight,dc=ci",
"ldap_bind_password/value": "admin",
"ldap_user_search_base_dns/value": "dc=stacklight,dc=ci",
"ldap_user_search_filter/value": ufilter,
}
if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
options.update({"ldap_user_attribute/value": "uid"})
if authz:
options.update({
"ldap_authorization_enabled/value": True,
})
if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
options.update({
"ldap_admin_group_dn/value":
"cn=plugin_admins,ou=groups,dc=stacklight,dc=ci"
})
if name == "elasticsearch_kibana":
options.update({
"ldap_viewer_group_dn/value":
"cn=plugin_viewers,ou=groups,dc=stacklight,dc=ci"
})
else:
options.update({
"ldap_group_search_base_dns/value":
"ou=groups,dc=stacklight,dc=ci",
"ldap_group_search_filter/value":
"(&(objectClass=posixGroup)(memberUid=%s)",
"ldap_admin_group_dn/value": "plugin_admins",
"ldap_viewer_group_dn/value": "plugin_viewers"
})
plugin.activate_plugin(options=options)