sg481n | bd890c5 | 2017-08-28 12:11:35 -0400 | [diff] [blame] | 1 | set testid@aaf.att.com <pass> |
| 2 | set testunused@aaf.att.com <pass> |
| 3 | set bogus@aaf.att.com boguspass |
| 4 | #delay 10 |
| 5 | set NFR 0 |
| 6 | as testid@aaf.att.com |
| 7 | # TC_NS1.01.0.POS Expect Clean Namespace to start |
| 8 | ns list name com.test.TC_NS1.@[user.name] |
| 9 | ** Expect 200 ** |
| 10 | |
| 11 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 12 | -------------------------------------------------------------------------------- |
| 13 | *** Namespace Not Found *** |
| 14 | |
| 15 | # TC_NS1.01.1.NEG Create Namespace with mechID as Responsible Party |
| 16 | ns create com.test.TC_NS1.@[user.name] testunused@aaf.att.com testid@aaf.att.com,XX@NS |
| 17 | ** Expect 403 ** |
| 18 | Failed [SVC3403]: Forbidden - testunused@aaf.att.com does not have permission to assume test status at AT&T |
| 19 | |
| 20 | # TC_NS1.01.2.NEG Create Namespace with Bad ID for Admin |
| 21 | ns create com.test.TC_NS1.@[user.name] @[user.name] bogus@aaf.att.com,XX@NS |
| 22 | ** Expect 403 ** |
| 23 | Failed [SVC2403]: Forbidden - bogus@aaf.att.com is not a valid AAF Credential |
| 24 | |
| 25 | as testid@aaf.att.com |
| 26 | # TC_NS1.10.0.POS Check for Existing Data |
| 27 | ns list name com.test.TC_NS1.@[user.name] |
| 28 | ** Expect 200 ** |
| 29 | |
| 30 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 31 | -------------------------------------------------------------------------------- |
| 32 | *** Namespace Not Found *** |
| 33 | |
| 34 | # TC_NS1.10.1.POS Create Namespace with valid IDs and Responsible Parties |
| 35 | ns create com.test.TC_NS1.@[user.name] @[user.name] testid@aaf.att.com |
| 36 | ** Expect 201 ** |
| 37 | Created Namespace |
| 38 | |
| 39 | # TC_NS1.10.40.POS Expect Namespace to be created |
| 40 | ns list name com.test.TC_NS1.@[user.name] |
| 41 | ** Expect 200 ** |
| 42 | |
| 43 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 44 | -------------------------------------------------------------------------------- |
| 45 | com.test.TC_NS1.@[THE_USER] |
| 46 | Administrators |
| 47 | testid@aaf.att.com |
| 48 | Responsible Parties |
| 49 | @[THE_USER]@csp.att.com |
| 50 | Roles |
| 51 | com.test.TC_NS1.@[THE_USER].admin |
| 52 | com.test.TC_NS1.@[THE_USER].owner |
| 53 | Permissions |
| 54 | com.test.TC_NS1.@[THE_USER].access * * |
| 55 | com.test.TC_NS1.@[THE_USER].access * read |
| 56 | |
| 57 | # TC_NS1.10.41.POS Expect Namespace to be created |
| 58 | perm list role com.test.TC_NS1.@[user.name].admin |
| 59 | ** Expect 200 ** |
| 60 | |
| 61 | List Perms by Role [com.test.TC_NS1.@[THE_USER].admin] |
| 62 | -------------------------------------------------------------------------------- |
| 63 | PERM Type Instance Action |
| 64 | -------------------------------------------------------------------------------- |
| 65 | com.test.TC_NS1.@[THE_USER].access * * |
| 66 | |
| 67 | |
| 68 | # TC_NS1.10.42.POS Expect Namespace to be created |
| 69 | perm list role com.test.TC_NS1.@[user.name].owner |
| 70 | ** Expect 200 ** |
| 71 | |
| 72 | List Perms by Role [com.test.TC_NS1.@[THE_USER].owner] |
| 73 | -------------------------------------------------------------------------------- |
| 74 | PERM Type Instance Action |
| 75 | -------------------------------------------------------------------------------- |
| 76 | com.test.TC_NS1.@[THE_USER].access * read |
| 77 | |
| 78 | |
| 79 | # TC_NS1.10.43.POS Expect Namespace to be created |
| 80 | role list perm com.test.TC_NS1.@[user.name].access * * |
| 81 | ** Expect 200 ** |
| 82 | |
| 83 | List Roles by Perm com.test.TC_NS1.@[THE_USER].access|*|* |
| 84 | -------------------------------------------------------------------------------- |
| 85 | ROLE Name |
| 86 | PERM Type Instance Action |
| 87 | -------------------------------------------------------------------------------- |
| 88 | com.test.TC_NS1.@[THE_USER].admin |
| 89 | com.test.TC_NS1.@[THE_USER].access * * |
| 90 | |
| 91 | # TC_NS1.10.44.POS Expect Namespace to be created |
| 92 | role list perm com.test.TC_NS1.@[user.name].access * read |
| 93 | ** Expect 200 ** |
| 94 | |
| 95 | List Roles by Perm com.test.TC_NS1.@[THE_USER].access|*|read |
| 96 | -------------------------------------------------------------------------------- |
| 97 | ROLE Name |
| 98 | PERM Type Instance Action |
| 99 | -------------------------------------------------------------------------------- |
| 100 | com.test.TC_NS1.@[THE_USER].owner |
| 101 | com.test.TC_NS1.@[THE_USER].access * read |
| 102 | |
| 103 | # TC_NS1.11.1.NEG Create Namespace when exists |
| 104 | ns create com.test.TC_NS1.@[user.name] @[user.name] testid@aaf.att.com |
| 105 | ** Expect 409 ** |
| 106 | Failed [SVC1409]: Conflict Already Exists - Target Namespace already exists |
| 107 | |
| 108 | # TC_NS1.20.1.NEG Too Few Args for Create 1 |
| 109 | ns create |
| 110 | ** Expect -1 ** |
| 111 | Too few args: create <name> <responsible (id[,id]*)> [admin (id[,id]*)] |
| 112 | |
| 113 | # TC_NS1.20.2.NEG Too Few Args for Create 2 |
| 114 | ns create bogus |
| 115 | ** Expect -1 ** |
| 116 | Too few args: create <name> <responsible (id[,id]*)> [admin (id[,id]*)] |
| 117 | |
| 118 | # TC_NS1.30.10.NEG Non-admins can't change description |
| 119 | as testunused@aaf.att.com |
| 120 | ns describe com.test.TC_NS1.@[user.name] Description for my Namespace |
| 121 | ** Expect 403 ** |
| 122 | Failed [SVC1403]: Forbidden - You do not have approval to change com.test.TC_NS1.@[THE_USER] |
| 123 | |
| 124 | # TC_NS1.30.11.NEG Namespace must exist to change description |
| 125 | as testid@aaf.att.com |
| 126 | ns describe com.test.TC_NS1.@[user.name].project1 Description for my project |
| 127 | ** Expect 404 ** |
| 128 | Failed [SVC1404]: Not Found - Namespace [com.test.TC_NS1.@[THE_USER].project1] does not exist |
| 129 | |
| 130 | # TC_NS1.30.12.POS Admin can change description |
| 131 | ns describe com.test.TC_NS1.@[user.name] Description for my Namespace |
| 132 | ** Expect 200 ** |
| 133 | Description added to Namespace |
| 134 | |
| 135 | # TC_NS1.50.1.NEG Adding a Bogus ID |
| 136 | ns admin add com.test.TC_NS1.@[user.name] bogus |
| 137 | ** Expect 403 ** |
| 138 | Failed [SVC1403]: Forbidden - AT&T reports that bogus@csp.att.com is a faulty ID |
| 139 | |
| 140 | # TC_NS1.50.2.NEG Adding a Bogus ID, full Domain |
| 141 | ns admin add com.test.TC_NS1.@[user.name] bogus@csp.att.com |
| 142 | ** Expect 403 ** |
| 143 | Failed [SVC1403]: Forbidden - AT&T reports that bogus@csp.att.com is a faulty ID |
| 144 | |
| 145 | # TC_NS1.50.3.NEG Adding an OK ID, bad domain |
| 146 | ns admin add com.test.TC_NS1.@[user.name] xz9914@bogus.test.com |
| 147 | ** Expect 403 ** |
| 148 | Failed [SVC2403]: Forbidden - xz9914@bogus.test.com is not a valid AAF Credential |
| 149 | |
| 150 | # TC_NS1.50.4.NEG Deleting an OK ID, but not an admin |
| 151 | ns admin del com.test.TC_NS1.@[user.name] XX@NS |
| 152 | ** Expect 404 ** |
| 153 | Failed [SVC6404]: Not Found - UserRole [XX@NS] [com.test.TC_NS1.@[THE_USER].admin] |
| 154 | |
| 155 | sleep 0 |
| 156 | # TC_NS1.50.10.POS Adding an OK ID |
| 157 | ns admin add com.test.TC_NS1.@[user.name] XX@NS |
| 158 | ** Expect 201 ** |
| 159 | Admin XX@NS added to com.test.TC_NS1.@[THE_USER] |
| 160 | |
| 161 | # TC_NS1.50.11.POS Deleting One of Two |
| 162 | ns admin del com.test.TC_NS1.@[user.name] testid@aaf.att.com |
| 163 | ** Expect 200 ** |
| 164 | Admin testid@aaf.att.com deleted from com.test.TC_NS1.@[THE_USER] |
| 165 | |
| 166 | # TC_NS1.50.12.NEG testid@aaf.att.com no longer Admin |
| 167 | ns admin del com.test.TC_NS1.@[user.name] testid@aaf.att.com |
| 168 | ** Expect 404 ** |
| 169 | Failed [SVC6404]: Not Found - UserRole [testid@aaf.att.com] [com.test.TC_NS1.@[THE_USER].admin] |
| 170 | |
| 171 | # TC_NS1.50.13.POS Add ID back in |
| 172 | ns admin add com.test.TC_NS1.@[user.name] testid@aaf.att.com |
| 173 | ** Expect 201 ** |
| 174 | Admin testid@aaf.att.com added to com.test.TC_NS1.@[THE_USER] |
| 175 | |
| 176 | # TC_NS1.50.14.POS Deleting original |
| 177 | ns admin del com.test.TC_NS1.@[user.name] XX@NS |
| 178 | ** Expect 200 ** |
| 179 | Admin XX@NS deleted from com.test.TC_NS1.@[THE_USER] |
| 180 | |
| 181 | # TC_NS1.50.15.NEG Can't remove twice |
| 182 | ns admin del com.test.TC_NS1.@[user.name] XX@NS |
| 183 | ** Expect 404 ** |
| 184 | Failed [SVC6404]: Not Found - UserRole [XX@NS] [com.test.TC_NS1.@[THE_USER].admin] |
| 185 | |
| 186 | # TC_NS1.50.20.NEG User Role Add should obey same "addAdmin" restrictions |
| 187 | role user add com.test.TC_NS1.@[user.name].admin m88888@i.have.no.domain |
| 188 | ** Expect 403 ** |
| 189 | Failed [SVC2403]: Forbidden - m88888@i.have.no.domain is not a valid AAF Credential |
| 190 | |
| 191 | # TC_NS1.50.21.NEG Role User Add should obey same "addAdmin" restrictions |
| 192 | user role add m88888@i.have.no.domain com.test.TC_NS1.@[user.name].admin |
| 193 | ** Expect 403 ** |
| 194 | Failed [SVC2403]: Forbidden - m88888@i.have.no.domain is not a valid AAF Credential |
| 195 | |
| 196 | # TC_NS1.60.1.NEG Adding a Bogus ID |
| 197 | ns responsible add com.test.TC_NS1.@[user.name] bogus |
| 198 | ** Expect 403 ** |
| 199 | Failed [SVC3403]: Forbidden - AT&T reports that this is not a valid credential |
| 200 | |
| 201 | # TC_NS1.60.2.NEG Adding a Bogus ID, full Domain |
| 202 | ns responsible add com.test.TC_NS1.@[user.name] bogus@csp.att.com |
| 203 | ** Expect 403 ** |
| 204 | Failed [SVC3403]: Forbidden - AT&T reports that this is not a valid credential |
| 205 | |
| 206 | # TC_NS1.60.3.NEG Adding an OK ID, bad domain |
| 207 | ns responsible add com.test.TC_NS1.@[user.name] xz9914@bogus.test.com |
| 208 | ** Expect 403 ** |
| 209 | Failed [SVC3403]: Forbidden - AT&T reports that this is not a valid credential |
| 210 | |
| 211 | # TC_NS1.60.4.NEG Deleting an OK ID, short, but not existent |
| 212 | ns responsible del com.test.TC_NS1.@[user.name] testid |
| 213 | ** Expect 404 ** |
| 214 | Failed [SVC6404]: Not Found - UserRole [testid@csp.att.com] [com.test.TC_NS1.@[THE_USER].owner] |
| 215 | |
| 216 | # TC_NS1.60.5.NEG Deleting an OK ID, long, but not existent |
| 217 | ns responsible del com.test.TC_NS1.@[user.name] testid@aaf.att.com |
| 218 | ** Expect 404 ** |
| 219 | Failed [SVC6404]: Not Found - UserRole [testid@aaf.att.com] [com.test.TC_NS1.@[THE_USER].owner] |
| 220 | |
| 221 | sleep 0 |
| 222 | # TC_NS1.60.10.POS Adding an OK ID |
| 223 | # Note: mw9749 used because we must have employee as responsible |
| 224 | ns responsible add com.test.TC_NS1.@[user.name] mw9749 |
| 225 | ** Expect 201 ** |
| 226 | mw9749@csp.att.com is now responsible for com.test.TC_NS1.@[THE_USER] |
| 227 | |
| 228 | # TC_NS1.60.11.POS Deleting One of Two |
| 229 | ns responsible del com.test.TC_NS1.@[user.name] mw9749 |
| 230 | ** Expect 200 ** |
| 231 | mw9749@csp.att.com is no longer responsible for com.test.TC_NS1.@[THE_USER] |
| 232 | |
| 233 | # TC_NS1.60.12.NEG mw9749 no longer Admin |
| 234 | ns responsible del com.test.TC_NS1.@[user.name] mw9749 |
| 235 | ** Expect 404 ** |
| 236 | Failed [SVC6404]: Not Found - UserRole [mw9749@csp.att.com] [com.test.TC_NS1.@[THE_USER].owner] |
| 237 | |
| 238 | # TC_NS1.60.20.NEG User Role Add should obey same "addResponsible" restrictions |
| 239 | role user add com.test.TC_NS1.@[user.name].owner m88888@i.have.no.domain |
| 240 | ** Expect 403 ** |
| 241 | Failed [SVC3403]: Forbidden - AT&T reports that this is not a valid credential |
| 242 | |
| 243 | # TC_NS1.60.21.NEG Role User Add should obey same "addResponsible" restrictions |
| 244 | user role add m88888@i.have.no.domain com.test.TC_NS1.@[user.name].owner |
| 245 | ** Expect 403 ** |
| 246 | Failed [SVC3403]: Forbidden - AT&T reports that this is not a valid credential |
| 247 | |
| 248 | sleep 0 |
| 249 | # TC_NS1.80.1.POS List Data on Empty NS |
| 250 | as testid@aaf.att.com |
| 251 | ns list name com.test.TC_NS1.@[user.name] |
| 252 | ** Expect 200 ** |
| 253 | |
| 254 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 255 | -------------------------------------------------------------------------------- |
| 256 | com.test.TC_NS1.@[THE_USER] |
| 257 | Administrators |
| 258 | testid@aaf.att.com |
| 259 | Responsible Parties |
| 260 | @[THE_USER]@csp.att.com |
| 261 | Roles |
| 262 | com.test.TC_NS1.@[THE_USER].admin |
| 263 | com.test.TC_NS1.@[THE_USER].owner |
| 264 | Permissions |
| 265 | com.test.TC_NS1.@[THE_USER].access * * |
| 266 | com.test.TC_NS1.@[THE_USER].access * read |
| 267 | |
| 268 | # TC_NS1.80.2.POS Add Roles to NS for Listing |
| 269 | role create com.test.TC_NS1.@[user.name].r.A |
| 270 | ** Expect 201 ** |
| 271 | Created Role |
| 272 | |
| 273 | role create com.test.TC_NS1.@[user.name].r.B |
| 274 | ** Expect 201 ** |
| 275 | Created Role |
| 276 | |
| 277 | # TC_NS1.80.3.POS List Data on non-Empty NS |
| 278 | ns list name com.test.TC_NS1.@[user.name] |
| 279 | ** Expect 200 ** |
| 280 | |
| 281 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 282 | -------------------------------------------------------------------------------- |
| 283 | com.test.TC_NS1.@[THE_USER] |
| 284 | Administrators |
| 285 | testid@aaf.att.com |
| 286 | Responsible Parties |
| 287 | @[THE_USER]@csp.att.com |
| 288 | Roles |
| 289 | com.test.TC_NS1.@[THE_USER].admin |
| 290 | com.test.TC_NS1.@[THE_USER].owner |
| 291 | com.test.TC_NS1.@[THE_USER].r.A |
| 292 | com.test.TC_NS1.@[THE_USER].r.B |
| 293 | Permissions |
| 294 | com.test.TC_NS1.@[THE_USER].access * * |
| 295 | com.test.TC_NS1.@[THE_USER].access * read |
| 296 | |
| 297 | # TC_NS1.90.1.NEG Non Namespace Admin Delete Namespace |
| 298 | as testunused@aaf.att.com |
| 299 | ns delete com.test.TC_NS1.@[user.name] |
| 300 | ** Expect 403 ** |
| 301 | Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not write in NS [com.test.TC_NS1.@[THE_USER]] |
| 302 | |
| 303 | sleep 0 |
| 304 | as testid@aaf.att.com |
| 305 | # TC_NS1.99.1.POS Namespace Admin can delete Namepace defined Roles |
| 306 | role delete com.test.TC_NS1.@[user.name].r.A |
| 307 | ** Expect 200,404 ** |
| 308 | Deleted Role |
| 309 | |
| 310 | role delete com.test.TC_NS1.@[user.name].r.B |
| 311 | ** Expect 200,404 ** |
| 312 | Deleted Role |
| 313 | |
| 314 | # TC_NS1.99.2.POS Namespace Admin can delete Namespace |
| 315 | ns delete com.test.TC_NS1.@[user.name] |
| 316 | ** Expect 200,404 ** |
| 317 | Deleted Namespace |
| 318 | |
| 319 | sleep 0 |
| 320 | # TC_NS1.99.99.POS Check Clean Namespace |
| 321 | ns list name com.test.TC_NS1.@[user.name] |
| 322 | ** Expect 200,404 ** |
| 323 | |
| 324 | List Namespaces by Name[com.test.TC_NS1.@[THE_USER]] |
| 325 | -------------------------------------------------------------------------------- |
| 326 | *** Namespace Not Found *** |
| 327 | |