Loading services/nginx/nginx.conf +1 −1 Original line number Diff line number Diff line Loading @@ -14,7 +14,7 @@ http { } map "$request_method:$uri:$ssl_client_s_dn_cn" $helper_error_message { default 'SUCCESS'; "~*(GET|DELETE|POST):.*:(?!(superadmin))(.*)" '{"status":401, "title":"Unauthorized" ,"detail":"Role not authorized for this API route", "cause":"User role must be superadmin"}'; "~*(GET|DELETE|POST):.*:(?!(superadmin|AMF))(.*)" '{"status":401, "title":"Unauthorized" ,"detail":"Role not authorized for this API route", "cause":"User role must be superadmin"}'; } map "$request_method:$uri:$ssl_client_s_dn_cn" $invoker_error_message { default 'SUCCESS'; Loading tests/features/Helper/visibility_control.robot +25 −2 Original line number Diff line number Diff line Loading @@ -42,7 +42,7 @@ Create Visibility Control Rule Invalid Dates as Superadmin ... username=${SUPERADMIN_USERNAME} ... json=${body} Status Should Be ${resp} 400 Status Should Be 400 ${resp} Create Visibility Control Rule [Tags] visibility_control_3 Loading Loading @@ -79,11 +79,24 @@ Create Visibility Control Rule Length Should Be ${resp.json()['rules']} 0 Create Visibility Control Rule by Provider Get Visibility Control Rule by AMF Provider [Tags] visibility_control_4 ${register_user_info}= Provider Default Registration ${resp}= Get Request Capif ... /helper/visibility-control/rules ... server=${CAPIF_HTTPS_URL} ... verify=ca.crt ... username=${AMF_PROVIDER_USERNAME} Status Should Be 200 ${resp} Create Visibility Control Rule by AMF Provider [Tags] visibility_control_5 ${register_user_info}= Provider Default Registration ${body}= Create Visibility Control Rule Body ${resp}= Post Request Capif Loading @@ -93,4 +106,14 @@ Create Visibility Control Rule by Provider ... username=${AMF_PROVIDER_USERNAME} ... json=${body} Status Should Be 201 ${resp} ${rule_id}= Set Variable ${resp.json()['ruleId']} ${resp}= Delete Request Capif ... /helper/visibility-control/rules/${rule_id} ... server=${CAPIF_HTTPS_URL} ... verify=ca.crt ... username=${SUPERADMIN_USERNAME} Loading
services/nginx/nginx.conf +1 −1 Original line number Diff line number Diff line Loading @@ -14,7 +14,7 @@ http { } map "$request_method:$uri:$ssl_client_s_dn_cn" $helper_error_message { default 'SUCCESS'; "~*(GET|DELETE|POST):.*:(?!(superadmin))(.*)" '{"status":401, "title":"Unauthorized" ,"detail":"Role not authorized for this API route", "cause":"User role must be superadmin"}'; "~*(GET|DELETE|POST):.*:(?!(superadmin|AMF))(.*)" '{"status":401, "title":"Unauthorized" ,"detail":"Role not authorized for this API route", "cause":"User role must be superadmin"}'; } map "$request_method:$uri:$ssl_client_s_dn_cn" $invoker_error_message { default 'SUCCESS'; Loading
tests/features/Helper/visibility_control.robot +25 −2 Original line number Diff line number Diff line Loading @@ -42,7 +42,7 @@ Create Visibility Control Rule Invalid Dates as Superadmin ... username=${SUPERADMIN_USERNAME} ... json=${body} Status Should Be ${resp} 400 Status Should Be 400 ${resp} Create Visibility Control Rule [Tags] visibility_control_3 Loading Loading @@ -79,11 +79,24 @@ Create Visibility Control Rule Length Should Be ${resp.json()['rules']} 0 Create Visibility Control Rule by Provider Get Visibility Control Rule by AMF Provider [Tags] visibility_control_4 ${register_user_info}= Provider Default Registration ${resp}= Get Request Capif ... /helper/visibility-control/rules ... server=${CAPIF_HTTPS_URL} ... verify=ca.crt ... username=${AMF_PROVIDER_USERNAME} Status Should Be 200 ${resp} Create Visibility Control Rule by AMF Provider [Tags] visibility_control_5 ${register_user_info}= Provider Default Registration ${body}= Create Visibility Control Rule Body ${resp}= Post Request Capif Loading @@ -93,4 +106,14 @@ Create Visibility Control Rule by Provider ... username=${AMF_PROVIDER_USERNAME} ... json=${body} Status Should Be 201 ${resp} ${rule_id}= Set Variable ${resp.json()['ruleId']} ${resp}= Delete Request Capif ... /helper/visibility-control/rules/${rule_id} ... server=${CAPIF_HTTPS_URL} ... verify=ca.crt ... username=${SUPERADMIN_USERNAME}