-
Notifications
You must be signed in to change notification settings - Fork 59
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update testcases for permissions for user/group
- Loading branch information
1 parent
4a3c2a3
commit f87c7f6
Showing
6 changed files
with
60 additions
and
43 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
27 changes: 16 additions & 11 deletions
27
...UI/Role_Based_Access_Control/3751_allow_to_grant_permissions_to_group/3751_2.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,36 +1,41 @@ | ||
# User Group's Write grant permissions to group | ||
# WRITE grant permissions to User Group | ||
|
||
Test verifies that | ||
- User as member of User Group with WRITE permission is allowed to modify group metadata | ||
- User as member of User Group with WRITE permission to User Group is allowed to modify group metadata | ||
- secured metadata keys defined by preference `misc.metadata.sensitive.keys` couldn't be modified | ||
- List of Users can be modified | ||
|
||
|
||
**Prerequisites**: | ||
- User Group (`UserGroup2`) | ||
- Perform [3751_1](3751_1.md), [3229_1](3229_1.md) cases | ||
- Perform [3751_1](3751_1.md) case | ||
|
||
**Preparations**: | ||
1. Login as the admin user from the prerequisites of [3751_1](3751_1.md) case | ||
2. Open the **Settings** page and select **User management** tab. Navigate to the ***Groups*** tab. | ||
3. Add non-admin user from the prerequisites of [3751_1](3751_1.md) case to the `UserGroup2` | ||
4. Click on **Edit** icon opposite the `UserGroup1` name from the prerequisites of [3751_1](3751_1.md) case | ||
5. In an appeared pop-up select **Permissions** tab | ||
6. Add `UserGroup2` from the prerequisites and give it allow `Write` permission | ||
7. Click **Apply** button and close ***Edit Group*** pop-up | ||
8. Select **Preferences** tab | ||
9. Set value `["key1"]` for `misc.metadata.sensitive.keys` preference. Click **Save** button. | ||
3. Add non-admin user from the prerequisites of [3751_1](3751_1.md) case to the _Permissions_ list of admin user from the prerequisites of [3751_1](3751_1.md) case. | ||
4. Add non-admin user from the prerequisites of [3751_1](3751_1.md) case to the `UserGroup2` from the prerequisites. | ||
5. Click on **Edit** icon opposite the `UserGroup1` name from the prerequisites of [3751_1](3751_1.md) case. | ||
6. In an appeared pop-up select **Permissions** tab | ||
7. Add `UserGroup2` and give it allow `WRITE` permission | ||
8. Click **Apply** button and close ***Edit Group*** pop-up | ||
9. Select **Preferences** tab | ||
10. Set value `["key1"]` for `misc.metadata.sensitive.keys` preference. Click **Save** button. | ||
|
||
| Steps | Actions | Expected results | | ||
| :---: |--- | --- | | ||
| 1 | Logout and login as the non-admin user from the prerequisites of [3751_1](3751_1.md) case | | | ||
| 2 | Open the **Settings** page | **User management** tab is shown | | ||
| 3 | Open the **User management** tab. Navigate to the ***Groups*** tab | Groups list contains at least 1 User Group: the `UserGroup1` from the prerequisites of [3751_1](3751_1.md) case | | ||
| 4 | Click on **Edit** icon opposite the `UserGroup1` name from the prerequisites of [3751_1](3751_1.md) case | ***Edit Group*** pop-up opens that contains: <li> **Block** button isn't visible <li> List of Users is visible and editabled <li> Specified Launch options aren't visible <li> Attribute `key1` isn't visible, attributes `key2` and `key3` are visible and editable | | ||
| 4 | Click on **Edit** icon opposite the `UserGroup1` name from the prerequisites of [3751_1](3751_1.md) case | ***Edit Group*** pop-up opens that contains: <li> **Block** button isn't visible <li> List of Users is visible and editabled <li> Launch option specified at the step 8 of Preparations of [3751_1](3751_1.md) case isn't visible <li> Attribute `key1` isn't visible, attributes `key2` and `key3` are visible and editable | | ||
| 5 | In the **Attributes** section click ***Remove*** button for `key2` attribute. Confirm deletion | | | ||
| 6 | Change `key3` and `value3` values for attribute `key3` to `key3_new`/`value3_new` | | | ||
| 7 | Add attribute `key4` with `value4` | | | ||
| 8 | Input the admin user name from the prerequisites of [3229_1](3229_1.md) case into the _Search User_ field and select it from drop-down list | | ||
| 9 | Click **+Add user** button | | | ||
| 10 | Click **OK** button | | | ||
| 11 | Click on **Edit** icon opposite the admin user name from the prerequisites of [3751_1](3751_1.md) case | ***Edit Group*** pop-up opens and all changes made at steps 5-10 are kept | | ||
|
||
**After:** | ||
- Restore the value of the `misc.metadata.sensitive.keys` preference to the initial value. | ||
- Remove the changes made in the [3751_1](3751_1.md) - [3751_2](3751_2.md) cases for the admin user from the prerequisites of [3751_1](3751_1.md) case. |
10 changes: 10 additions & 0 deletions
10
docs/testcases/UI/Role_Based_Access_Control/Role_Based_Access_Control.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
# Role Based Access Control testcases | ||
|
||
| Case ID | Description/name | | ||
|---|---| | ||
| [**2144_impersonate_admin_as_general_user**](2144_impersonate_admin_as_general_user.md) | Allow to "impersonate" administrator as a general user | | ||
| [**3229_1**](3229_grant_permissions_to_user_account/3229_1.md) | READ grant permissions to user account | | ||
| [**3229_2**](3229_grant_permissions_to_user_account/3229_2.md) | WRITE grant permissions to user account | | ||
| [**3229_3**](3229_grant_permissions_to_user_account/3229_3.md) | EXECUTE grant permissions to user account | | ||
| [**3751_1**](3751_allow_to_grant_permissions_to_group/3751_1.md) | READ grant permissions to User Group | | ||
| [**3751_2**](3751_allow_to_grant_permissions_to_group/3751_2.md) | WRITE grant permissions to User Group | |