mirror of
https://github.com/apache/cloudstack.git
synced 2025-10-26 08:42:29 +01:00
* Added configuration and Integration test to restrict public template access. * Move settings to domain. * Updated integration test. * Changed Config key's name and description. * Justified the variable names and removed white spaces. * Added configuration and Integration test to restrict public template access. * Move settings to domain. * Changed Config key's name and description. * Justified the variable names and removed white spaces. * Moved configuration to domain scope. * Added integration test to travis. * Updated the configuration's name and description. * Extracted public template check to a separate method. * Fixed rebase issue. * Apply tear down changes. * Update .travis.yml to remove the component test The test needs to be updated to use the new configuration name Co-authored-by: Wei Zhou <weizhou@apache.org>
627 lines
27 KiB
Python
627 lines
27 KiB
Python
# Licensed to the Apache Software Foundation (ASF) under one
|
|
# or more contributor license agreements. See the NOTICE file
|
|
# distributed with this work for additional information
|
|
# regarding copyright ownership. The ASF licenses this file
|
|
# to you under the Apache License, Version 2.0 (the
|
|
# "License"); you may not use this file except in compliance
|
|
# with the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing,
|
|
# software distributed under the License is distributed on an
|
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
# KIND, either express or implied. See the License for the
|
|
# specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
# Import Local Modules
|
|
from nose.plugins.attrib import attr
|
|
from marvin.cloudstackTestCase import cloudstackTestCase, unittest
|
|
from marvin.cloudstackAPI import (listZones,
|
|
deleteTemplate,
|
|
listConfigurations,
|
|
updateConfiguration)
|
|
from marvin.lib.utils import (cleanup_resources)
|
|
from marvin.lib.base import (Account,
|
|
Domain,
|
|
Network,
|
|
NetworkOffering,
|
|
Template,
|
|
ServiceOffering,
|
|
VirtualMachine,
|
|
Snapshot,
|
|
Volume)
|
|
from marvin.lib.common import (get_domain,
|
|
get_zone,
|
|
get_template,
|
|
get_builtin_template_info)
|
|
# Import System modules
|
|
import time
|
|
import logging
|
|
|
|
class TestTemplateAccessAcrossDomains(cloudstackTestCase):
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
cls.testClient = super(TestTemplateAccessAcrossDomains, cls).getClsTestClient()
|
|
cls.apiclient = cls.testClient.getApiClient()
|
|
|
|
cls.services = cls.testClient.getParsedTestDataConfig()
|
|
# Get Zone, Domain and templates
|
|
cls.domain = get_domain(cls.apiclient)
|
|
cls.zone = get_zone(cls.apiclient, cls.testClient.getZoneForTests())
|
|
cls.services['mode'] = cls.zone.networktype
|
|
cls.logger = logging.getLogger("TestRouterResources")
|
|
cls._cleanup = []
|
|
cls.unsupportedHypervisor = False
|
|
cls.hypervisor = cls.testClient.getHypervisorInfo()
|
|
if cls.hypervisor.lower() in ['lxc']:
|
|
cls.unsupportedHypervisor = True
|
|
return
|
|
cls.services["virtual_machine"]["zoneid"] = cls.zone.id
|
|
|
|
# Create new domain1
|
|
cls.domain1 = Domain.create(
|
|
cls.apiclient,
|
|
services=cls.services["acl"]["domain1"],
|
|
parentdomainid=cls.domain.id)
|
|
cls._cleanup.append(cls.domain1)
|
|
|
|
# Create account1
|
|
cls.account1 = Account.create(
|
|
cls.apiclient,
|
|
cls.services["acl"]["accountD1"],
|
|
domainid=cls.domain1.id
|
|
)
|
|
cls._cleanup.append(cls.account1)
|
|
|
|
# Create new sub-domain
|
|
cls.sub_domain = Domain.create(
|
|
cls.apiclient,
|
|
services=cls.services["acl"]["domain11"],
|
|
parentdomainid=cls.domain1.id)
|
|
cls._cleanup.append(cls.sub_domain)
|
|
|
|
# Create account for sub-domain
|
|
cls.sub_account = Account.create(
|
|
cls.apiclient,
|
|
cls.services["acl"]["accountD11"],
|
|
domainid=cls.sub_domain.id
|
|
)
|
|
cls._cleanup.append(cls.sub_account)
|
|
|
|
# Create new domain2
|
|
cls.domain2 = Domain.create(
|
|
cls.apiclient,
|
|
services=cls.services["acl"]["domain2"],
|
|
parentdomainid=cls.domain.id)
|
|
cls._cleanup.append(cls.domain2)
|
|
|
|
# Create account2
|
|
cls.account2 = Account.create(
|
|
cls.apiclient,
|
|
cls.services["acl"]["accountD2"],
|
|
domainid=cls.domain2.id
|
|
)
|
|
cls._cleanup.append(cls.account2)
|
|
|
|
cls.service_offering = ServiceOffering.create(
|
|
cls.apiclient,
|
|
cls.services["service_offering"]
|
|
)
|
|
cls._cleanup.append(cls.service_offering)
|
|
if cls.hypervisor.lower() in ['kvm']:
|
|
# register template under ROOT domain
|
|
cls.root_template = Template.register(cls.apiclient,
|
|
cls.services["test_templates"]["kvm"],
|
|
zoneid=cls.zone.id,
|
|
domainid=cls.domain.id,
|
|
hypervisor=cls.hypervisor.lower())
|
|
cls.root_template.download(cls.apiclient)
|
|
cls._cleanup.append(cls.root_template)
|
|
cls.services["test_templates"]["kvm"]["name"] = cls.account1.name
|
|
cls.template1 = Template.register(cls.apiclient,
|
|
cls.services["test_templates"]["kvm"],
|
|
zoneid=cls.zone.id,
|
|
account=cls.account1.name,
|
|
domainid=cls.domain1.id,
|
|
hypervisor=cls.hypervisor.lower())
|
|
cls.template1.download(cls.apiclient)
|
|
cls._cleanup.append(cls.template1)
|
|
cls.services["test_templates"]["kvm"]["name"] = cls.sub_account.name
|
|
cls.sub_template = Template.register(cls.apiclient,
|
|
cls.services["test_templates"]["kvm"],
|
|
zoneid=cls.zone.id,
|
|
account=cls.sub_account.name,
|
|
domainid=cls.sub_domain.id,
|
|
hypervisor=cls.hypervisor.lower())
|
|
cls.sub_template.download(cls.apiclient)
|
|
cls._cleanup.append(cls.sub_template)
|
|
cls.template2 = Template.register(cls.apiclient,
|
|
cls.services["test_templates"]["kvm"],
|
|
zoneid=cls.zone.id,
|
|
account=cls.account2.name,
|
|
domainid=cls.domain2.id,
|
|
hypervisor=cls.hypervisor.lower())
|
|
cls.template2.download(cls.apiclient)
|
|
cls._cleanup.append(cls.template2)
|
|
else:
|
|
return
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
super(TestTemplateAccessAcrossDomains, cls).tearDownClass()
|
|
|
|
def setUp(self):
|
|
self.apiclient = self.testClient.getApiClient()
|
|
self.domain1_config = self.get_restrict_template_configuration(self.domain1.id)
|
|
self.domain2_config = self.get_restrict_template_configuration(self.domain2.id)
|
|
self.sub_domain_config = self.get_restrict_template_configuration(self.sub_domain.id)
|
|
self.cleanup = []
|
|
return
|
|
|
|
def tearDown(self):
|
|
try:
|
|
self.update_restrict_template_configuration(self.domain1.id, self.domain1_config)
|
|
self.update_restrict_template_configuration(self.domain2.id, self.domain2_config)
|
|
self.update_restrict_template_configuration(self.sub_domain.id, self.sub_domain_config)
|
|
super(TestTemplateAccessAcrossDomains, self).tearDown()
|
|
except Exception as e:
|
|
raise Exception("Warning: Exception during cleanup : %s" % e)
|
|
return
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_01_check_cross_domain_template_access(self):
|
|
"""
|
|
Verify that templates belonging to one domain should not be accessible
|
|
by other domains except for parent and ROOT domains
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Make sure template of domain2 should not be accessible by domain1
|
|
3. Make sure template of domain1 should not be accessible by domain2
|
|
4. Make sure parent and ROOT domain can still access above templates
|
|
:return:
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
self.validate_uploaded_template(self.apiclient, self.template1.id)
|
|
|
|
# Step 2
|
|
self.validate_template_ownership(self.template2, self.domain1, self.domain2, False)
|
|
|
|
self.validate_uploaded_template(self.apiclient, self.template2.id)
|
|
|
|
# Step 3
|
|
self.validate_template_ownership(self.template1, self.domain2, self.domain1, False)
|
|
|
|
# Make sure root domain can still access all subdomain templates
|
|
# Step 4
|
|
self.validate_template_ownership(self.template1, self.domain, self.domain1, True)
|
|
self.validate_template_ownership(self.template2, self.domain, self.domain2, True)
|
|
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_02_create_template(self):
|
|
"""
|
|
Verify that templates belonging to one domain can be accessible
|
|
by other domains by default
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to false (default behavior)
|
|
2. Make sure template of domain2 can be accessible by domain1
|
|
3. Make sure template of domain1 can be accessible by domain2
|
|
4. Make sure parent and ROOT domain can still access above templates
|
|
5. Deploy virtual machine in domain1 using template from domain2
|
|
6. Make sure that virtual machine can be deployed and is in running state
|
|
:return:
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "false")
|
|
self.update_restrict_template_configuration(self.domain2.id, "false")
|
|
|
|
# Step 2
|
|
self.validate_template_ownership(self.template2, self.domain1, self.domain2, True)
|
|
|
|
# Step 3
|
|
self.validate_template_ownership(self.template1, self.domain2, self.domain1, True)
|
|
|
|
# Step 4
|
|
# Make sure root domain can still access all subdomain templates
|
|
self.validate_template_ownership(self.template1, self.domain, self.domain1, True)
|
|
self.validate_template_ownership(self.template2, self.domain, self.domain2, True)
|
|
|
|
# Step 5
|
|
# Deploy new virtual machine using template
|
|
self.virtual_machine = VirtualMachine.create(
|
|
self.apiclient,
|
|
self.services["virtual_machine"],
|
|
templateid=self.template2.id,
|
|
accountid=self.account1.name,
|
|
domainid=self.account1.domainid,
|
|
serviceofferingid=self.service_offering.id,
|
|
)
|
|
self.cleanup.append(self.virtual_machine)
|
|
self.debug("creating an instance with template ID: %s" % self.template2.id)
|
|
vm_response = VirtualMachine.list(self.apiclient,
|
|
id=self.virtual_machine.id,
|
|
account=self.account1.name,
|
|
domainid=self.account1.domainid)
|
|
self.assertEqual(
|
|
isinstance(vm_response, list),
|
|
True,
|
|
"Check for list VMs response after VM deployment"
|
|
)
|
|
# Verify VM response to check whether VM deployment was successful
|
|
self.assertNotEqual(
|
|
len(vm_response),
|
|
0,
|
|
"Check VMs available in List VMs response"
|
|
)
|
|
|
|
# Step 6
|
|
vm = vm_response[0]
|
|
self.assertEqual(
|
|
vm.state,
|
|
'Running',
|
|
"Check the state of VM created from Template"
|
|
)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_03_check_subdomain_template_access(self):
|
|
"""
|
|
Verify that templates belonging to parent domain can be accessible
|
|
by sub domains
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Make sure template of ROOT domain can be accessible by domain1
|
|
3. Make sure template of ROOT domain can be accessible by domain2
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
# Make sure child domains can still access parent domain templates
|
|
self.validate_uploaded_template(self.apiclient, self.root_template.id)
|
|
|
|
# Step 2
|
|
self.validate_template_ownership(self.root_template, self.domain1, self.domain, True)
|
|
|
|
# Step 3
|
|
self.validate_template_ownership(self.root_template, self.domain2, self.domain, True)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_04_check_non_public_template_access(self):
|
|
"""
|
|
Verify that non public templates belonging to one domain
|
|
should not be accessible by other domains by default
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Change the permission level of "ispublic" of template to false
|
|
3. Make sure other domains should not be able to access the template
|
|
4. Make sure that ONLY ROOT domain can access the non public template
|
|
5. Set global setting restrict.public.access.to.templates to false
|
|
6. Repeat the steps 3 and 4
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
|
|
# Step 2
|
|
self.template2.updatePermissions(self.apiclient,
|
|
ispublic="False")
|
|
|
|
list_template_response = self.list_templates('all', self.domain2)
|
|
self.assertEqual(
|
|
isinstance(list_template_response, list),
|
|
True,
|
|
"Check list response returns a valid list"
|
|
)
|
|
for template_response in list_template_response:
|
|
if template_response.id == self.template2.id:
|
|
break
|
|
|
|
self.assertIsNotNone(
|
|
template_response,
|
|
"Check template %s failed" % self.template2.id
|
|
)
|
|
self.assertEqual(
|
|
template_response.ispublic,
|
|
int(False),
|
|
"Check ispublic permission of template"
|
|
)
|
|
|
|
# Step 3
|
|
# Other domains should not access non public template
|
|
self.validate_template_ownership(self.template2, self.domain1, self.domain2, False)
|
|
|
|
# Step 4
|
|
# Only ROOT domain can access non public templates of child domain
|
|
self.validate_template_ownership(self.template2, self.domain, self.domain2, True)
|
|
|
|
# Step 5
|
|
self.update_restrict_template_configuration(self.domain1.id, "false")
|
|
self.update_restrict_template_configuration(self.domain2.id, "false")
|
|
|
|
# Step 6
|
|
self.validate_template_ownership(self.template2, self.domain1, self.domain2, False)
|
|
self.validate_template_ownership(self.template2, self.domain, self.domain2, True)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_05_check_non_public_template_subdomain_access(self):
|
|
"""
|
|
Verify that non public templates belonging to ROOT domain
|
|
should not be accessible by sub domains by default
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Change the permission level of "ispublic" of template to false
|
|
3. Make sure other domains should not be able to access the template
|
|
4. Make sure that ONLY ROOT domain can access the non public template
|
|
5. Set global setting restrict.public.access.to.templates to false
|
|
6. Repeat the steps 3 and 4
|
|
"""
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
self.root_template.updatePermissions(self.apiclient,
|
|
ispublic="False")
|
|
|
|
list_template_response = self.list_templates('all', self.domain)
|
|
self.assertEqual(
|
|
isinstance(list_template_response, list),
|
|
True,
|
|
"Check list response returns a valid list"
|
|
)
|
|
for template_response in list_template_response:
|
|
if template_response.id == self.root_template.id:
|
|
break
|
|
|
|
self.assertIsNotNone(
|
|
template_response,
|
|
"Check template %s failed" % self.root_template.id
|
|
)
|
|
self.assertEqual(
|
|
template_response.ispublic,
|
|
int(False),
|
|
"Check ispublic permission of template"
|
|
)
|
|
|
|
# Other domains should not access non public template
|
|
self.validate_template_ownership(self.root_template, self.domain1, self.domain, False)
|
|
# Only ROOT domain can access non public templates of child domain
|
|
self.validate_template_ownership(self.root_template, self.domain2, self.domain, False)
|
|
|
|
self.update_restrict_template_configuration(self.domain1.id, "false")
|
|
self.update_restrict_template_configuration(self.domain2.id, "false")
|
|
self.validate_template_ownership(self.root_template, self.domain1, self.domain2, False)
|
|
self.validate_template_ownership(self.root_template, self.domain2, self.domain2, False)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_06_check_sub_public_template_sub_domain_access(self):
|
|
"""
|
|
Verify that non root admin sub-domains can access parents templates
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Make sure that sub-domain account can access root templates
|
|
3. Make sure that sub-domain account can access parent templates
|
|
4. Make sure that ROOT domain can access the sub-domain template
|
|
5. Make sure that sibling domain cannot access templates of sub-domain
|
|
"""
|
|
|
|
self.root_template.updatePermissions(self.apiclient,
|
|
ispublic="True")
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
# Make sure child domains can still access parent domain templates
|
|
self.validate_uploaded_template(self.apiclient, self.sub_template.id)
|
|
|
|
# Step 2
|
|
self.validate_template_ownership(self.root_template, self.sub_domain, self.domain, True)
|
|
|
|
# Step 3
|
|
self.validate_template_ownership(self.template1, self.sub_domain, self.domain1, True)
|
|
|
|
# Step 4
|
|
self.validate_template_ownership(self.sub_template, self.domain, self.sub_domain, True)
|
|
|
|
# Step 5
|
|
self.validate_template_ownership(self.sub_template, self.domain2, self.sub_domain, False)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_07_check_default_public_template_sub_domain_access(self):
|
|
"""
|
|
Verify that non root admin sub-domains can access parents templates by default
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to false
|
|
2. Make sure that sub-domain account can access root templates
|
|
3. Make sure that sub-domain account can access parent templates
|
|
4. Make sure that ROOT domain can access the sub-domain template
|
|
5. Make sure that sibling domain cannot access templates of sub-domain
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "false")
|
|
self.update_restrict_template_configuration(self.domain2.id, "false")
|
|
# Make sure child domains can still access parent domain templates
|
|
self.validate_uploaded_template(self.apiclient, self.sub_template.id)
|
|
|
|
# Step 2
|
|
self.validate_template_ownership(self.root_template, self.sub_domain, self.domain, True)
|
|
|
|
# Step 3
|
|
self.validate_template_ownership(self.template1, self.sub_domain, self.domain1, True)
|
|
|
|
# Step 4
|
|
self.validate_template_ownership(self.sub_template, self.domain, self.sub_domain, True)
|
|
|
|
# Step 5
|
|
self.validate_template_ownership(self.sub_template, self.domain2, self.sub_domain, True)
|
|
|
|
@attr(tags=["advanced", "basic", "sg"], required_hardware="false")
|
|
def test_08_check_non_public_template_sub_domain_access(self):
|
|
"""
|
|
Verify that non public templates belonging to one domain
|
|
should not be accessible by other domains by default except ROOT domain
|
|
|
|
Steps:
|
|
1. Set global setting restrict.public.access.to.templates to true
|
|
2. Change the permission level of "ispublic" of template1 to false
|
|
3. Make sure other domains should not be able to access the template
|
|
4. Make sure that ONLY ROOT domain can access the non public template
|
|
5. Set global setting restrict.public.access.to.templates to false
|
|
6. Repeat the steps 3 and 4
|
|
"""
|
|
|
|
# Step 1
|
|
self.update_restrict_template_configuration(self.domain1.id, "true")
|
|
self.update_restrict_template_configuration(self.domain2.id, "true")
|
|
|
|
# Step 2
|
|
self.template1.updatePermissions(self.apiclient,
|
|
ispublic="False")
|
|
|
|
list_template_response = self.list_templates('all', self.domain1)
|
|
for template_response in list_template_response:
|
|
if template_response.id == self.template1.id:
|
|
break
|
|
|
|
self.assertEqual(
|
|
isinstance(list_template_response, list),
|
|
True,
|
|
"Check list response returns a valid list"
|
|
)
|
|
self.assertIsNotNone(
|
|
template_response,
|
|
"Check template %s failed" % self.template1.id
|
|
)
|
|
self.assertEqual(
|
|
template_response.ispublic,
|
|
int(False),
|
|
"Check ispublic permission of template"
|
|
)
|
|
|
|
# Step 3
|
|
# Other domains should not access non public template
|
|
self.validate_template_ownership(self.template1, self.domain2, self.domain1, False)
|
|
|
|
# Even child domain should not access non public template
|
|
self.validate_template_ownership(self.template1, self.sub_domain, self.domain1, False)
|
|
|
|
# Step 4
|
|
# Only ROOT domain can access non public templates of child domain
|
|
self.validate_template_ownership(self.template1, self.domain, self.domain1, True)
|
|
|
|
# Step 5
|
|
self.update_restrict_template_configuration(self.domain1.id, "false")
|
|
self.update_restrict_template_configuration(self.domain2.id, "false")
|
|
|
|
# Step 6
|
|
self.validate_template_ownership(self.template1, self.domain2, self.domain1, False)
|
|
self.validate_template_ownership(self.template1, self.sub_domain, self.domain1, False)
|
|
self.validate_template_ownership(self.template1, self.domain, self.domain1, True)
|
|
|
|
def validate_uploaded_template(self, apiclient, template_id, retries=70, interval=5):
|
|
"""Check if template download will finish in 1 minute"""
|
|
while retries > -1:
|
|
time.sleep(interval)
|
|
template_response = Template.list(
|
|
apiclient,
|
|
id=template_id,
|
|
zoneid=self.zone.id,
|
|
templatefilter='self'
|
|
)
|
|
|
|
if isinstance(template_response, list):
|
|
template = template_response[0]
|
|
if not hasattr(template, 'status') or not template or not template.status:
|
|
retries = retries - 1
|
|
continue
|
|
if 'Failed' in template.status:
|
|
raise Exception(
|
|
"Failed to download template: status - %s" %
|
|
template.status)
|
|
|
|
elif template.status == 'Download Complete' and template.isready:
|
|
return
|
|
|
|
elif 'Downloaded' in template.status:
|
|
retries = retries - 1
|
|
continue
|
|
|
|
elif 'Installing' not in template.status:
|
|
if retries >= 0:
|
|
retries = retries - 1
|
|
continue
|
|
raise Exception(
|
|
"Error in downloading template: status - %s" %
|
|
template.status)
|
|
|
|
else:
|
|
retries = retries - 1
|
|
raise Exception("Template download failed exception.")
|
|
|
|
def list_templates(self, templatefilter, domain):
|
|
return Template.list(
|
|
self.apiclient,
|
|
templatefilter=templatefilter,
|
|
zoneid=self.zone.id,
|
|
domainid=domain.id)
|
|
|
|
def validate_template_ownership(self, template, owner, nonowner, include_cross_domain_template):
|
|
"""List the template belonging to domain which created it
|
|
Make sure that other domain can't access it.
|
|
"""
|
|
list_template_response = self.list_templates('all', owner)
|
|
if list_template_response is not None:
|
|
"""If global setting is false then public templates of any domain should
|
|
be accessible by any other domain
|
|
"""
|
|
if include_cross_domain_template:
|
|
for temp in list_template_response:
|
|
if template.name == temp.name:
|
|
return
|
|
|
|
raise Exception("Template %s belonging to domain %s should "
|
|
"be accessible by domain %s"
|
|
% (template.name, nonowner.name, owner.name))
|
|
else:
|
|
"""If global setting is true then public templates of any domain should not
|
|
be accessible by any other domain except for root domain
|
|
"""
|
|
for temp in list_template_response:
|
|
if template.name == temp.name:
|
|
raise Exception("Template %s belonging to domain %s should "
|
|
"not be accessible by domain %s"
|
|
% (template.name, nonowner.name, owner.name))
|
|
|
|
def get_restrict_template_configuration(self, domain_id):
|
|
"""
|
|
Function to get the global setting "restrict.public.access.to.templates" for domain
|
|
"""
|
|
list_configurations_cmd = listConfigurations.listConfigurationsCmd()
|
|
list_configurations_cmd.name = "restrict.public.template.access.to.domain"
|
|
list_configurations_cmd.scopename = "domain"
|
|
list_configurations_cmd.scopeid = domain_id
|
|
response = self.apiclient.listConfigurations(list_configurations_cmd)
|
|
return response[0].value
|
|
|
|
def update_restrict_template_configuration(self, domain_id, value):
|
|
"""
|
|
Function to update the global setting "restrict.public.access.to.templates" for domain
|
|
"""
|
|
update_configuration_cmd = updateConfiguration.updateConfigurationCmd()
|
|
update_configuration_cmd.name = "restrict.public.template.access.to.domain"
|
|
update_configuration_cmd.value = value
|
|
update_configuration_cmd.scopename = "domain"
|
|
update_configuration_cmd.scopeid = domain_id
|
|
return self.apiclient.updateConfiguration(update_configuration_cmd)
|