Пример #1
0
def test_check_ui_after_changing_setting(core_session, pas_setup,
                                         clean_up_collections):
    """
    Test case: C2206  Check permission for set
    :param core_session: Authenticated centrify session
    :param pas_setup: Creating a new system with accounts

    """
    # Adding Systems for test execution
    created_system_id, created_account_id, system_details = pas_setup
    user_details = core_session.__dict__
    collection_name = "testManualCollection" + guid()

    # Get list of permission
    get_sys_result, get_sys_success = ResourceManager.get_system_permissions(
        core_session, created_system_id)
    assert get_sys_success, f"Failed to get system permissions for resource, API result:{get_sys_result}"
    permission = get_sys_result[0]['Rights']
    permission_list = list(chain(*zip(permission.split())))[:-1]
    permission_index_value = [
        list((i, permission_list[i])) for i in range(len(permission_list))
    ]
    assert (permission_index_value[3][0] < permission_index_value[4][0]
            ), f"Failed to get permission 'Grant' is in front of 'View'"
    logger.info(
        f'Grant is successfully shows in front of View. as Grant index is {permission_index_value[3][0]} and View index is {permission_index_value[4][0]}'
    )

    # Create set
    add_set_success, new_set_id = SetsManager.create_manual_collection(
        core_session, collection_name, "Server")
    assert add_set_success, "Collection " + new_set_id + " Failed to Create"

    # Set cleanup list
    clean_up_collections.append(new_set_id)

    # Assign permission to the set
    set_permissions_result = SetsManager.set_collection_permissions(
        core_session, "Grant,View,Edit,Delete",
        user_details["auth_details"]["User"],
        user_details['auth_details']['UserId'], new_set_id)
    logger.info(
        f'Successfully set collection Permissions for the set page :{set_permissions_result}'
    )

    # Get collection permission rights
    get_permissions_result = SetsManager.get_collection_rights(
        core_session, new_set_id)
    set_permission = get_permissions_result['Result']

    # Actual set permission rights list
    actual_set_permission_list = 'View, Edit, Delete, Grant'
    assert set_permission == actual_set_permission_list, f'Failed to verify permissions:{actual_set_permission_list}'
    logger.info(
        f'Successfully verify Permissions for the set page created:{actual_set_permission_list}'
    )
Пример #2
0
def test_check_ui_after_changing_setting(core_session, users_and_roles,
                                         create_resources):
    """
    Test case: C2199  Check UI after changing settings
    :param core_session: Authenticated centrify session
    :param core_admin_ui: Authenticated Centrify browser session
    :param users_and_roles Gets user and role on demand.

    """
    # adding Systems for test execution
    sys_info = create_resources(core_session, 1, 'Windows')
    sys_name = sys_info[0]['Name']
    sys_id = sys_info[0]['ID']

    # Cloud user session with "Privileged Access Service Administrator"
    cloud_user_session = users_and_roles.get_session_for_user(
        'Privileged Access Service Administrator')
    cloud_user = cloud_user_session.auth_details['User']
    user_id = cloud_user_session.auth_details['UserId']

    # Assigning permissions to system excluding "View" Permission
    result, status = ResourceManager.assign_system_permissions(core_session,
                                                               "View",
                                                               cloud_user,
                                                               user_id,
                                                               pvid=sys_id)
    assert status, f'failed to assign rights of system to user {cloud_user}'
    logger.info(
        f'successfully assigned rights to user {cloud_user} excluding "View" permission'
    )

    # Get list of permission
    get_sys_result, get_sys_success = ResourceManager.get_system_permissions(
        cloud_user_session, sys_id)
    assert get_sys_success, f"Getting System Permissions Failed for resource {sys_name} with user {cloud_user}"
    user_permission = ""
    for user in get_sys_result:
        if user['Principal'] == cloud_user:
            user_permission = user['Rights']
            break
    assert user_permission == "View", f"Rights Did not match user {cloud_user} it was assigned to"
    logger.info(
        f"Update permission are saved successfully in the system {user_permission}"
    )