iam: add tests for account-based IAM apis#537
Conversation
5ce3342 to
1f14eda
Compare
b9484d5 to
513c1b2
Compare
afc402d to
ac893c5
Compare
6645cbb to
69492d4
Compare
b38849a to
12615b1
Compare
|
@pritha-srivastava thanks for the review! i updated the pr description with a TODO list of test cases to add |
fa13161 to
9fd2f28
Compare
0aa5442 to
8d2a47a
Compare
|
hey @alimaredia, i'm close to getting account stuff passing in teuthology. just wanted to get this on your radar |
682d9b2 to
2a18f9b
Compare
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
adds test cases for the following iam actions: * PutUserPolicy * GetUserPolicy * DeleteUserPolicy * ListUserPolicies verified to pass against aws when an account root user's credentials are provided in the [iam] section of s3tests.conf Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
adds test cases for the following iam actions: * CreateRole * GetRole * ListRoles * DeleteRole * UpdateRole verified to pass against aws when an account root user's credentials are provided in the [iam] section of s3tests.conf Signed-off-by: Casey Bodley <cbodley@redhat.com>
adds test cases for the following iam actions: * PutRolePolicy * GetRolePolicy * DeleteRolePolicy * ListRolePolicies verified to pass against aws when an account root user's credentials are provided in the [iam] section of s3tests.conf Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
test the [iam alt root] user's access to buckets owned by [iam root] using various policy principals and acl grantees Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
aws doesn't consult acls for same-account access. rgw doesn't for account users either Fixes: ceph#184 Signed-off-by: Casey Bodley <cbodley@redhat.com>
a14065a to
96d6584
Compare
|
@cbodley are these still underdevelopment? I see you force pushed just a couple hours ago and I don't see a run linked yet. Have these only been run locally? |
|
@alimaredia this is ready for review. i'm still iterating on ceph/ceph#54333 to get a clean run. all tests pass locally but i'm working through differences in configuration between rgw/verify rgw/sts etc |
Signed-off-by: Casey Bodley <cbodley@redhat.com>
Signed-off-by: Casey Bodley <cbodley@redhat.com>
|
ping @alimaredia https://pulpito.ceph.com/cbodley-2024-03-13_12:14:22-rgw-wip-rgw-account-v3-distro-default-smithi/ has a clean run against this s3-tests branch |
|
pulled in sns commits from cbodley#1 accounts pr passed qa against this in https://pulpito.ceph.com/cbodley-2024-04-12_12:44:47-rgw-wip-rgw-account-v3-distro-default-smithi/ |
|
haven't cherry-picked for master or squid yet. for squid, i still have one batch pending qa. for main, i'll wait til later in the week |
|
cherry-picked for ceph-squid |
|
cherry-picked for ceph-master too |
renames the
test_of_iamlabel toiam_tenantfor the existing tenant-based iam testsadds new
[iam root]and[iam alt root]config sections for account root users, and a new set ofiam_accountandiam_cross_accounttest cases that use themadds pytest fixtures
iam_rootandiam_alt_rootthat return the corresponding boto client, with cleanup logic to nuke any created users/roles/etc. all iam resources created by the tests have names starting withiam name prefix = s3-tests-and paths starting withiam path prefix = /s3-tests/so this cleanup logic doesn't nuke anything else in the aws accountadds account-based test cases for the following iam api categories:
verified to pass against aws when an account root user's credentials are provided in the [iam] section of s3tests.conf (haven't tested iam_cross_account tests yet)
TODO: