2 set testid@aaf.att.com <pass>
3 set testunused@aaf.att.com <pass>
4 set bogus@aaf.att.com boguspass
8 # TC_NS2.10.0.POS Check for Existing Data
9 ns list name com.test.TC_NS2.@[user.name]
12 List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
13 --------------------------------------------------------------------------------
14 *** Namespace Not Found ***
16 # TC_NS2.10.1.POS Create Namespace with valid IDs and Responsible Parties
17 ns create com.test.TC_NS2.@[user.name] @[user.name] testid@aaf.att.com
21 ns create com.test.TC_NS2.@[user.name].project @[user.name] testunused@aaf.att.com
25 # TC_NS2.10.10.POS Create role to assign mechid perm to
26 role create com.test.TC_NS2.@[user.name].cred_admin testid@aaf.att.com
29 Added User [testid@aaf.att.com] to Role [com.test.TC_NS2.@[THE_USER].cred_admin]
32 # TC_NS2.10.11.POS Assign role to mechid perm
33 perm grant com.att.aaf.mechid com.att create com.test.TC_NS2.@[user.name].cred_admin
35 Granted Permission [com.att.aaf.mechid|com.att|create] to Role [com.test.TC_NS2.@[THE_USER].cred_admin]
38 # TC_NS2.10.70.POS Expect Namespace to be created
39 ns list name com.test.TC_NS2.@[user.name]
42 List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
43 --------------------------------------------------------------------------------
44 com.test.TC_NS2.@[THE_USER]
48 @[THE_USER]@csp.att.com
50 com.test.TC_NS2.@[THE_USER].admin
51 com.test.TC_NS2.@[THE_USER].cred_admin
52 com.test.TC_NS2.@[THE_USER].owner
54 com.test.TC_NS2.@[THE_USER].access * *
55 com.test.TC_NS2.@[THE_USER].access * read
58 # TC_NS2.10.70.POS Expect Namespace to be created
59 perm list role com.test.TC_NS2.@[user.name].admin
62 List Perms by Role [com.test.TC_NS2.@[THE_USER].admin]
63 --------------------------------------------------------------------------------
64 PERM Type Instance Action
65 --------------------------------------------------------------------------------
66 com.test.TC_NS2.@[THE_USER].access * *
70 # TC_NS2.10.70.POS Expect Namespace to be created
71 perm list role com.test.TC_NS2.@[user.name].owner
74 List Perms by Role [com.test.TC_NS2.@[THE_USER].owner]
75 --------------------------------------------------------------------------------
76 PERM Type Instance Action
77 --------------------------------------------------------------------------------
78 com.test.TC_NS2.@[THE_USER].access * read
82 # TC_NS2.10.70.POS Expect Namespace to be created
83 role list perm com.test.TC_NS2.@[user.name].access * *
86 List Roles by Perm com.test.TC_NS2.@[THE_USER].access|*|*
87 --------------------------------------------------------------------------------
89 PERM Type Instance Action
90 --------------------------------------------------------------------------------
91 com.test.TC_NS2.@[THE_USER].admin
92 com.test.TC_NS2.@[THE_USER].access * *
95 # TC_NS2.10.70.POS Expect Namespace to be created
96 role list perm com.test.TC_NS2.@[user.name].access * read
99 List Roles by Perm com.test.TC_NS2.@[THE_USER].access|*|read
100 --------------------------------------------------------------------------------
102 PERM Type Instance Action
103 --------------------------------------------------------------------------------
104 com.test.TC_NS2.@[THE_USER].owner
105 com.test.TC_NS2.@[THE_USER].access * read
107 as testid@aaf.att.com
108 # TC_NS2.10.80.POS Expect Namespace to be created
109 ns list name com.test.TC_NS2.@[user.name].project
112 List Namespaces by Name[com.test.TC_NS2.@[THE_USER].project]
113 --------------------------------------------------------------------------------
114 com.test.TC_NS2.@[THE_USER].project
116 testunused@aaf.att.com
118 @[THE_USER]@csp.att.com
120 com.test.TC_NS2.@[THE_USER].project.admin
121 com.test.TC_NS2.@[THE_USER].project.owner
123 com.test.TC_NS2.@[THE_USER].project.access * *
124 com.test.TC_NS2.@[THE_USER].project.access * read
126 as testid@aaf.att.com
127 # TC_NS2.10.80.POS Expect Namespace to be created
128 perm list role com.test.TC_NS2.@[user.name].project.admin
131 List Perms by Role [com.test.TC_NS2.@[THE_USER].project.admin]
132 --------------------------------------------------------------------------------
133 PERM Type Instance Action
134 --------------------------------------------------------------------------------
135 com.test.TC_NS2.@[THE_USER].project.access * *
138 as testid@aaf.att.com
139 # TC_NS2.10.80.POS Expect Namespace to be created
140 perm list role com.test.TC_NS2.@[user.name].project.owner
143 List Perms by Role [com.test.TC_NS2.@[THE_USER].project.owner]
144 --------------------------------------------------------------------------------
145 PERM Type Instance Action
146 --------------------------------------------------------------------------------
147 com.test.TC_NS2.@[THE_USER].project.access * read
150 as testid@aaf.att.com
151 # TC_NS2.10.80.POS Expect Namespace to be created
152 role list perm com.test.TC_NS2.@[user.name].project.access * *
155 List Roles by Perm com.test.TC_NS2.@[THE_USER].project.access|*|*
156 --------------------------------------------------------------------------------
158 PERM Type Instance Action
159 --------------------------------------------------------------------------------
160 com.test.TC_NS2.@[THE_USER].project.admin
161 com.test.TC_NS2.@[THE_USER].project.access * *
163 as testid@aaf.att.com
164 # TC_NS2.10.80.POS Expect Namespace to be created
165 role list perm com.test.TC_NS2.@[user.name].project.access * read
168 List Roles by Perm com.test.TC_NS2.@[THE_USER].project.access|*|read
169 --------------------------------------------------------------------------------
171 PERM Type Instance Action
172 --------------------------------------------------------------------------------
173 com.test.TC_NS2.@[THE_USER].project.owner
174 com.test.TC_NS2.@[THE_USER].project.access * read
176 as testid@aaf.att.com
177 # TC_NS2.20.1.POS Create roles
178 role create com.test.TC_NS2.@[user.name].watcher
182 role create com.test.TC_NS2.@[user.name].myRole
186 # TC_NS2.20.2.POS Create permissions
187 perm create com.test.TC_NS2.@[user.name].myType myInstance myAction
191 perm create com.test.TC_NS2.@[user.name].myType * *
195 # TC_NS2.20.3.POS Create mechid
196 user cred add m99990@@[user.name].TC_NS2.test.com password123
198 Added Credential [m99990@@[THE_USER].TC_NS2.test.com]
201 # TC_NS2.20.10.POS Grant view perms to watcher role
202 perm create com.att.aaf.ns :com.test.TC_NS2.@[user.name]:ns read com.test.TC_NS2.@[user.name].watcher
205 Granted Permission [com.att.aaf.ns|:com.test.TC_NS2.@[THE_USER]:ns|read] to Role [com.test.TC_NS2.@[THE_USER].watcher]
207 as testunused@aaf.att.com
208 # TC_NS2.40.1.NEG Non-admin, not granted user should not view
209 ns list name com.test.TC_NS2.@[user.name]
211 Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read in NS [com.test.TC_NS2.@[THE_USER]]
213 as testid@aaf.att.com
214 # Tens test user granted to permission
215 # TC_NS2.40.10.POS Add user to watcher role
216 user role add testunused@aaf.att.com com.test.TC_NS2.@[user.name].watcher
218 Added Role [com.test.TC_NS2.@[THE_USER].watcher] to User [testunused@aaf.att.com]
220 as testunused@aaf.att.com
221 # TC_NS2.40.11.POS Non-admin, granted user should view
222 ns list name com.test.TC_NS2.@[user.name]
225 List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
226 --------------------------------------------------------------------------------
227 com.test.TC_NS2.@[THE_USER]
231 @[THE_USER]@csp.att.com
233 com.test.TC_NS2.@[THE_USER].admin
234 com.test.TC_NS2.@[THE_USER].cred_admin
235 com.test.TC_NS2.@[THE_USER].myRole
236 com.test.TC_NS2.@[THE_USER].owner
237 com.test.TC_NS2.@[THE_USER].watcher
239 com.test.TC_NS2.@[THE_USER].access * *
240 com.test.TC_NS2.@[THE_USER].access * read
241 com.test.TC_NS2.@[THE_USER].myType * *
242 com.test.TC_NS2.@[THE_USER].myType myInstance myAction
244 m99990@@[THE_USER].TC_NS2.test.com
246 as testid@aaf.att.com
247 # TC_NS2.40.19.POS Remove user from watcher role
248 user role del testunused@aaf.att.com com.test.TC_NS2.@[user.name].watcher
250 Removed Role [com.test.TC_NS2.@[THE_USER].watcher] from User [testunused@aaf.att.com]
252 # Thirties test admin user
253 # TC_NS2.40.20.POS Admin should be able to view
254 ns list name com.test.TC_NS2.@[user.name]
257 List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
258 --------------------------------------------------------------------------------
259 com.test.TC_NS2.@[THE_USER]
263 @[THE_USER]@csp.att.com
265 com.test.TC_NS2.@[THE_USER].admin
266 com.test.TC_NS2.@[THE_USER].cred_admin
267 com.test.TC_NS2.@[THE_USER].myRole
268 com.test.TC_NS2.@[THE_USER].owner
269 com.test.TC_NS2.@[THE_USER].watcher
271 com.test.TC_NS2.@[THE_USER].access * *
272 com.test.TC_NS2.@[THE_USER].access * read
273 com.test.TC_NS2.@[THE_USER].myType * *
274 com.test.TC_NS2.@[THE_USER].myType myInstance myAction
276 m99990@@[THE_USER].TC_NS2.test.com
278 # TC_NS2.40.21.POS Admin of parent NS should be able to view
279 ns list name com.test.TC_NS2.@[user.name].project
282 List Namespaces by Name[com.test.TC_NS2.@[THE_USER].project]
283 --------------------------------------------------------------------------------
284 com.test.TC_NS2.@[THE_USER].project
286 testunused@aaf.att.com
288 @[THE_USER]@csp.att.com
290 com.test.TC_NS2.@[THE_USER].project.admin
291 com.test.TC_NS2.@[THE_USER].project.owner
293 com.test.TC_NS2.@[THE_USER].project.access * *
294 com.test.TC_NS2.@[THE_USER].project.access * read
296 # TC_NS2.41.10.POS List by User when Same as Caller
297 as testunused@aaf.att.com
298 ns list admin testunused@aaf.att.com
301 List Namespaces with admin privileges for [testunused@aaf.att.com]
302 --------------------------------------------------------------------------------
303 com.test.TC_NS2.@[THE_USER].project
305 # TC_NS2.41.15.POS List by User when not same as Caller, but own/admin namespace of Roles
306 as testid@aaf.att.com
307 ns list admin testunused@aaf.att.com
310 List Namespaces with admin privileges for [testunused@aaf.att.com]
311 --------------------------------------------------------------------------------
312 com.test.TC_NS2.@[THE_USER].project
314 # TC_NS2.41.20.POS List by User when not same as Caller, but parent owner of Namespace
316 ns list admin testunused@aaf.att.com
319 List Namespaces with admin privileges for [testunused@aaf.att.com]
320 --------------------------------------------------------------------------------
321 com.test.TC_NS2.@[THE_USER].project
323 # TC_NS2.41.80.NEG List by User when not Caller nor associated to Namespace
324 as testunused@aaf.att.com
328 List Namespaces with admin privileges for [XX@NS]
329 --------------------------------------------------------------------------------
335 as testid@aaf.att.com
336 # TC_NS2.99.1.POS Namespace Admin can delete Namepace defined Roles & Perms
337 role delete com.test.TC_NS2.@[user.name].myRole
341 role delete com.test.TC_NS2.@[user.name].watcher
345 perm delete com.test.TC_NS2.@[user.name].myType myInstance myAction
349 perm delete com.test.TC_NS2.@[user.name].myType * *
353 user cred del m99990@@[user.name].TC_NS2.test.com
355 Deleted Credential [m99990@@[THE_USER].TC_NS2.test.com]
358 force perm delete com.att.aaf.ns :com.test.TC_NS2.@[user.name]:ns read
362 # TC_NS2.99.15.POS Remove ability to create creds
363 perm ungrant com.att.aaf.mechid com.att create com.test.TC_NS2.@[user.name].cred_admin
365 UnGranted Permission [com.att.aaf.mechid|com.att|create] from Role [com.test.TC_NS2.@[THE_USER].cred_admin]
367 as testid@aaf.att.com
368 force role delete com.test.TC_NS2.@[user.name].cred_admin
372 # TC_NS2.99.90.POS Namespace Admin can delete Namespace
373 force ns delete com.test.TC_NS2.@[user.name].project
377 force ns delete com.test.TC_NS2.@[user.name]
382 # TC_NS2.99.99.POS Check Clean Namespace
383 ns list name com.test.TC_NS2.@[user.name]
386 List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
387 --------------------------------------------------------------------------------
388 *** Namespace Not Found ***