Patrole borrows the following commandments from Tempest; refer to Tempest’s Commandments for more information:
Note
The original Tempest Commandments do not include Patrole-specific paths. Patrole-specific paths replace the Tempest-specific paths within Patrole’s hacking checks.
patrole_tempest_plugin/tests/api
decorators.skip_because
from tempest.lib
data_utils.rand_uuid()
instead of
uuid.uuid4()
The following are Patrole’s specific Commandments:
rbac_rule_validation.action
decorator must be applied to
all RBAC testsself.client
must not be used as a client alias; this allows for
code that is more maintainable and easier to readPatrole only offers in-tree integration testing coverage for the following components:
Patrole currently has no stable library, so reliance upon Patrole’s framework for external RBAC testing should be done with caution. Nonetheless, even when Patrole has a stable library, it will only offer in-tree RBAC testing for the components listed above.
Correct role overriding is vital to correct RBAC testing within Patrole. If a
test does not call self.override_role()
within the RBAC test, followed
by the API endpoint that enforces the expected policy action, then the test is
not a valid Patrole test: The API endpoint under test will be performed
with admin role, which is always wrong unless CONF.patrole.rbac_test_role
is also admin.
Like Tempest, Patrole is branchless. This is to better ensure API and RBAC consistency between releases because API and RBAC behavior should not change between releases. This means that the stable branches are also gated by the Patrole master branch, which also means that proposed commits to Patrole must work against both the master and all the currently supported stable branches of the projects. As such there are a few special considerations that have to be accounted for when pushing new changes to Patrole.
Patrole, like Tempest, implicitly tests new features because new policies oftentimes accompany new features. The same Tempest philosophy regarding feature flags and new features also applies to Patrole.
When adding tests for new policies that were not in previous releases of the
projects, the new test must be properly skipped with a feature flag. This
involves using the testtools.skip(Unless|If)
decorator above the test
to check if the required policy is enabled. Similarly, a feature flag must
be used whenever an OpenStack service covered by Patrole changes one of its
policies in a backwards-incompatible way. If there isn’t a method of selecting
the new policy from the config file then there won’t be a mechanism to disable
the test with older stable releases and the new test won’t be able to merge.
Introduction of a new feature flag requires specifying a default value for the corresponding config option that is appropriate in the latest OpenStack release. Because Patrole is branchless, the feature flag’s default value will need to be overridden to a value that is appropriate in earlier releases in which the feature isn’t available. In DevStack, this can be accomplished by modifying Patrole’s lib installation script for previous branches (because DevStack is branched).
When trying to land a bug fix which changes a tested API you’ll have to use the following procedure:
- Propose change to the project, get a +2 on the change even with the test failing Patrole side.
- Propose skip to the relevant Patrole test which will only be approved after the corresponding change in the project has a +2.
- Land project change in master and all open stable branches (if required).
- Land changed test in Patrole.
Otherwise the bug fix won’t be able to land in the project.
The same Tempest logic regarding new tests for existing features or policies also applies to Patrole.
Tempest is a black box testing framework, meaning that it is concerned with testing public API endpoints and doesn’t concern itself with testing internal implementation details. Patrole, as a Tempest plugin, also falls underneath the category of black box testing. However, even with policy in code documentation, some degree of white box testing is required in order to correctly write RBAC tests.
This is because Policy in Code documentation, while useful in many respects, is usually quite brief and its main purpose is to help operators understand how to customize policy configuration rather than to help developers understand complex policy authorization work flows. For example, policy in code documentation doesn’t make deriving multiple policies easy. Such documentation also doesn’t usually mention that a specific parameter needs to be set, or that a particular microversion must be enabled, or that a particular set of prerequisite API or policy actions must be executed, in order for the policy under test to be enforced by the server. This means that test writers must account for the internal RBAC implementation in API code in order to correctly understand the complete RBAC work flow within an API.
Besides, as mentioned elsewhere in this documentation, not all services currently implement policy in code, making some degree of white box testing a “necessary evil” for writing robust RBAC tests.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.