![Vladimir Ushakov](/assets/img/avatar_default.png)
Fix for authorization issue for Grafana and Gibana dashboards when deployed with LDAP. Change-Id: I3ee3031d374e56a965273f42865e37e66254933f Closes-Bug: #1621414
221 lines
8.6 KiB
Python
221 lines
8.6 KiB
Python
# Copyright 2016 Mirantis, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
from fuelweb_test.helpers.decorators import log_snapshot_after_test
|
|
from fuelweb_test import logger
|
|
from proboscis import test
|
|
|
|
from stacklight_tests.helpers import helpers
|
|
from stacklight_tests.toolchain import api
|
|
|
|
|
|
@test(groups=["ldap"])
|
|
class TestToolchainLDAP(api.ToolchainApi):
|
|
"""Class testing the LMA Toolchain plugins with LDAP(S) for authentication.
|
|
"""
|
|
|
|
@test(depends_on_groups=['prepare_slaves_3'],
|
|
groups=["ldap", "deploy_toolchain_with_ldap", "toolchain", "deploy"])
|
|
@log_snapshot_after_test
|
|
def deploy_toolchain_with_ldap(self):
|
|
"""Install the LMA Toolchain plugins with LDAP integration for
|
|
authentication
|
|
|
|
Scenario:
|
|
1. Upload the LMA Toolchain plugins to the master node
|
|
2. Install the plugins
|
|
3. Create the cluster
|
|
4. Enable and configure LDAP for plugin authentication
|
|
5. Deploy the cluster
|
|
6. Upload install_slapd.sh script on controller node
|
|
7. On controller node open the firewall for ports 389 and 636
|
|
8. Install and configure the LDAP server
|
|
9. Check that LMA Toolchain plugins are running
|
|
10. Check plugins are available with LDAP for authentication
|
|
|
|
Duration 120m
|
|
"""
|
|
self._create_ldap_toolchain()
|
|
|
|
self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
|
|
|
|
@test(depends_on_groups=['prepare_slaves_3'],
|
|
groups=["ldap", "deploy_toolchain_with_ldap_authz", "toolchain",
|
|
"deploy"])
|
|
@log_snapshot_after_test
|
|
def deploy_toolchain_with_ldap_authz(self):
|
|
"""Install the LMA Toolchain plugins with LDAP integration for
|
|
authentication and authorization
|
|
|
|
Scenario:
|
|
1. Upload the LMA Toolchain plugins to the master node
|
|
2. Install the plugins
|
|
3. Create the cluster
|
|
4. Enable and configure LDAP for plugin authentication and
|
|
authorization
|
|
5. Deploy the cluster
|
|
6. Upload install_slapd.sh script on controller node
|
|
7. On controller node open the firewall for ports 389 and 636
|
|
8. Install and configure the LDAP server
|
|
9. Check that LMA Toolchain plugins are running
|
|
10. Check plugins are available with LDAP for authentication and
|
|
authorization
|
|
|
|
Duration 120m
|
|
"""
|
|
self._create_ldap_toolchain(authz=True)
|
|
|
|
self.env.make_snapshot("deploy_toolchain_with_ldap_authz",
|
|
is_make=True)
|
|
|
|
@test(depends_on_groups=['prepare_slaves_3'],
|
|
groups=["ldap", "deploy_toolchain_with_ldaps_authz", "toolchain",
|
|
"deploy"])
|
|
@log_snapshot_after_test
|
|
def deploy_toolchain_with_ldaps_authz(self):
|
|
"""Install the LMA Toolchain plugins with LDAPS integration for
|
|
authentication and authorization
|
|
|
|
Scenario:
|
|
1. Upload the LMA Toolchain plugins to the master node
|
|
2. Install the plugins
|
|
3. Create the cluster
|
|
4. Enable and configure LDAPS for plugin authentication and
|
|
authorization
|
|
5. Deploy the cluster
|
|
6. Upload install_slapd.sh script on controller node
|
|
7. On controller node open the firewall for ports 389 and 636
|
|
8. Install and configure the LDAPS server
|
|
9. Check that LMA Toolchain plugins are running
|
|
10. Check plugins are available with LDAPS for authentication and
|
|
authorization
|
|
|
|
Duration 120m
|
|
"""
|
|
|
|
self._create_ldap_toolchain(authz=True, protocol='ldaps')
|
|
|
|
self.env.make_snapshot("deploy_toolchain_with_ldaps_authz",
|
|
is_make=True)
|
|
|
|
def _create_ldap_toolchain(self, authz=False, protocol='ldap'):
|
|
"""Create generic toolchain for LDAP test
|
|
|
|
:param authz: configures LDAP server for plugin authorisation and adds
|
|
authorisation checking
|
|
:type authz: boolean
|
|
:param protocol: configures LDAP or LDAPS protocol to be used on LDAP
|
|
server
|
|
:type protocol: str
|
|
"""
|
|
fuel_web = self.helpers.fuel_web
|
|
|
|
self.env.revert_snapshot("ready_with_3_slaves")
|
|
|
|
self.prepare_plugins()
|
|
|
|
self.helpers.create_cluster(name=self.__class__.__name__)
|
|
|
|
self.activate_plugins()
|
|
|
|
fuel_web.update_nodes(self.helpers.cluster_id,
|
|
self.settings.base_nodes, update_interfaces=True)
|
|
|
|
plugins_ldap = {
|
|
"kibana": (self.ELASTICSEARCH_KIBANA, "(objectClass=*)"),
|
|
"grafana": (self.INFLUXDB_GRAFANA, "(uid=%s)"),
|
|
"nagios": (self.LMA_INFRASTRUCTURE_ALERTING, "(objectClass=*)")
|
|
}
|
|
|
|
ldap_server = fuel_web.get_nailgun_cluster_nodes_by_roles(
|
|
self.helpers.cluster_id, roles=["controller", ],
|
|
role_status='pending_roles')[0]['hostname']
|
|
|
|
for name, plugin in plugins_ldap.iteritems():
|
|
self._activate_ldap_plugin(plugin[0], plugin[1], name, ldap_server,
|
|
authz=authz, protocol=protocol)
|
|
|
|
self.helpers.deploy_cluster(self.settings.base_nodes)
|
|
|
|
ldap_node = fuel_web.get_nailgun_cluster_nodes_by_roles(
|
|
self.helpers.cluster_id, roles=["controller", ])[0]
|
|
|
|
with fuel_web.get_ssh_for_nailgun_node(ldap_node) as remote:
|
|
remote.upload(
|
|
helpers.get_fixture("ldap/install_slapd.sh"),
|
|
"/tmp"
|
|
)
|
|
remote.check_call(
|
|
"bash -x /tmp/install_slapd.sh && iptables -I INPUT "
|
|
"-p tcp -m multiport --ports 389,636 -m comment --comment "
|
|
"'ldap server' -j ACCEPT", verbose=True
|
|
)
|
|
|
|
self.check_plugins_online()
|
|
|
|
for plugin in plugins_ldap.values():
|
|
plugin[0].check_plugin_ldap(authz=authz)
|
|
|
|
self.env.make_snapshot("deploy_toolchain_with_ldap", is_make=True)
|
|
|
|
@staticmethod
|
|
def _activate_ldap_plugin(plugin, ufilter, dashboard_name, ldap_server,
|
|
authz=False, protocol="ldap"):
|
|
"""Activate LDAP option for a plugin."""
|
|
name = plugin.get_plugin_settings().name
|
|
logger.info(
|
|
"Enable LDAP for plugin {0}, authorization {1}, protocol: {2}, "
|
|
"user search filter: {3}, ldap server node: {4}".format(
|
|
name, authz, protocol, ufilter, ldap_server
|
|
)
|
|
)
|
|
|
|
options = {
|
|
"ldap_enabled/value": True,
|
|
"ldap_protocol_for_{}/value".format(dashboard_name): protocol,
|
|
"ldap_servers/value": ldap_server,
|
|
"ldap_bind_dn/value": "cn=admin,dc=stacklight,dc=ci",
|
|
"ldap_bind_password/value": "admin",
|
|
"ldap_user_search_base_dns/value": "dc=stacklight,dc=ci",
|
|
"ldap_user_search_filter/value": ufilter,
|
|
}
|
|
|
|
if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
|
|
options.update({"ldap_user_attribute/value": "uid"})
|
|
|
|
if authz:
|
|
options.update({
|
|
"ldap_authorization_enabled/value": True,
|
|
})
|
|
if name in ["elasticsearch_kibana", "lma_infrastructure_alerting"]:
|
|
options.update({
|
|
"ldap_admin_group_dn/value":
|
|
"cn=plugin_admins,ou=groups,dc=stacklight,dc=ci"
|
|
})
|
|
if name == "elasticsearch_kibana":
|
|
options.update({
|
|
"ldap_viewer_group_dn/value":
|
|
"cn=plugin_viewers,ou=groups,dc=stacklight,dc=ci"
|
|
})
|
|
else:
|
|
options.update({
|
|
"ldap_group_search_base_dns/value":
|
|
"ou=groups,dc=stacklight,dc=ci",
|
|
"ldap_group_search_filter/value":
|
|
"(&(objectClass=posixGroup)(memberUid=%s)",
|
|
"ldap_admin_group_dn/value": "plugin_admins",
|
|
"ldap_viewer_group_dn/value": "plugin_viewers"
|
|
})
|
|
|
|
plugin.activate_plugin(options=options)
|