The token flush and token rotate crontabs are re-written when the leader unit changes inline with Juju leadership management. Align contexts used to generate crontabs with Juju leadership status, rather than corosync/pacemaker. Correct use of OpenStackCompareReleases to ensure that releases between ocata and queens don't automatically enable fernet token behaviour. Change-Id: I6db8d006ceac7b61e69f547682c5a49d876cfec6 Closes-Bug: 1816807
		
			
				
	
	
		
			508 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			508 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# Copyright 2016 Canonical Ltd
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#  http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
 | 
						|
import collections
 | 
						|
import importlib
 | 
						|
import os
 | 
						|
 | 
						|
from mock import patch, MagicMock
 | 
						|
with patch('charmhelpers.contrib.openstack.'
 | 
						|
           'utils.snap_install_requested') as snap_install_requested:
 | 
						|
    snap_install_requested.return_value = False
 | 
						|
    import keystone_utils  # noqa
 | 
						|
    import keystone_context as context
 | 
						|
    importlib.reload(keystone_utils)
 | 
						|
 | 
						|
from test_utils import (
 | 
						|
    CharmTestCase
 | 
						|
)
 | 
						|
 | 
						|
TO_PATCH = [
 | 
						|
    'config',
 | 
						|
    'determine_apache_port',
 | 
						|
    'determine_api_port',
 | 
						|
    'os_release',
 | 
						|
]
 | 
						|
 | 
						|
 | 
						|
class TestKeystoneContexts(CharmTestCase):
 | 
						|
 | 
						|
    def setUp(self):
 | 
						|
        super(TestKeystoneContexts, self).setUp(context, TO_PATCH)
 | 
						|
        self.config.side_effect = self.test_config.get
 | 
						|
 | 
						|
    @patch('charmhelpers.contrib.hahelpers.cluster.relation_ids')
 | 
						|
    @patch('charmhelpers.contrib.openstack.ip.unit_get')
 | 
						|
    @patch('charmhelpers.contrib.openstack.ip.service_name')
 | 
						|
    @patch('charmhelpers.contrib.openstack.ip.config')
 | 
						|
    @patch('keystone_utils.determine_ports')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.config')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.is_clustered')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.determine_apache_port')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.determine_api_port')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.unit_get')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.relation_ids')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.https')
 | 
						|
    def test_apache_ssl_context_service_enabled(self, mock_https,
 | 
						|
                                                mock_relation_ids,
 | 
						|
                                                mock_unit_get,
 | 
						|
                                                mock_determine_api_port,
 | 
						|
                                                mock_determine_apache_port,
 | 
						|
                                                mock_is_clustered,
 | 
						|
                                                mock_config,
 | 
						|
                                                mock_determine_ports,
 | 
						|
                                                mock_ip_config,
 | 
						|
                                                mock_service_name,
 | 
						|
                                                mock_ip_unit_get,
 | 
						|
                                                mock_rel_ids,
 | 
						|
                                                ):
 | 
						|
        mock_https.return_value = True
 | 
						|
        mock_unit_get.return_value = '1.2.3.4'
 | 
						|
        mock_ip_unit_get.return_value = '1.2.3.4'
 | 
						|
        mock_determine_api_port.return_value = '12'
 | 
						|
        mock_determine_apache_port.return_value = '34'
 | 
						|
        mock_is_clustered.return_value = False
 | 
						|
        mock_config.return_value = None
 | 
						|
        mock_ip_config.return_value = None
 | 
						|
        mock_determine_ports.return_value = ['12']
 | 
						|
 | 
						|
        ctxt = context.ApacheSSLContext()
 | 
						|
        ctxt.enable_modules = MagicMock()
 | 
						|
        ctxt.configure_cert = MagicMock()
 | 
						|
        ctxt.configure_ca = MagicMock()
 | 
						|
        ctxt.canonical_names = MagicMock()
 | 
						|
        self.assertEqual(ctxt(), {'endpoints': [('1.2.3.4',
 | 
						|
                                                 '1.2.3.4',
 | 
						|
                                                 34, 12)],
 | 
						|
                                  'namespace': 'keystone',
 | 
						|
                                  'ext_ports': [34]})
 | 
						|
        self.assertTrue(mock_https.called)
 | 
						|
        mock_unit_get.assert_called_with('private-address')
 | 
						|
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.get_relation_ip')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.mkdir')
 | 
						|
    @patch('keystone_utils.api_port')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.get_netmask_for_address')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.get_address_in_network')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.config')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.relation_ids')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.unit_get')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.related_units')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.relation_get')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.log')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.kv')
 | 
						|
    @patch('builtins.open')
 | 
						|
    def test_haproxy_context_service_enabled(
 | 
						|
        self, mock_open, mock_kv, mock_log, mock_relation_get,
 | 
						|
            mock_related_units, mock_unit_get, mock_relation_ids, mock_config,
 | 
						|
            mock_get_address_in_network, mock_get_netmask_for_address,
 | 
						|
            mock_api_port, mock_mkdir, mock_get_relation_ip):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        mock_relation_ids.return_value = ['identity-service:0', ]
 | 
						|
        mock_unit_get.return_value = '1.2.3.4'
 | 
						|
        mock_get_relation_ip.return_value = '1.2.3.4'
 | 
						|
        mock_relation_get.return_value = '10.0.0.0'
 | 
						|
        mock_related_units.return_value = ['unit/0', ]
 | 
						|
        mock_config.return_value = None
 | 
						|
        mock_get_address_in_network.return_value = None
 | 
						|
        mock_get_netmask_for_address.return_value = '255.255.255.0'
 | 
						|
        self.determine_apache_port.return_value = '34'
 | 
						|
        mock_api_port.return_value = '12'
 | 
						|
        mock_kv().get.return_value = 'abcdefghijklmnopqrstuvwxyz123456'
 | 
						|
 | 
						|
        ctxt = context.HAProxyContext()
 | 
						|
 | 
						|
        self.maxDiff = None
 | 
						|
        _ctxt = ctxt()
 | 
						|
        test_ctxt = {
 | 
						|
            'listen_ports': {
 | 
						|
                'admin_port': '12',
 | 
						|
                'public_port': '12'
 | 
						|
            },
 | 
						|
            'ipv6_enabled': True,
 | 
						|
            'local_host': '127.0.0.1',
 | 
						|
            'haproxy_host': '0.0.0.0',
 | 
						|
            'stat_port': '8888',
 | 
						|
            'stat_password': 'abcdefghijklmnopqrstuvwxyz123456',
 | 
						|
            'service_ports': {
 | 
						|
                'admin-port': ['12', '34'],
 | 
						|
                'public-port': ['12', '34']
 | 
						|
            },
 | 
						|
            'default_backend': '1.2.3.4',
 | 
						|
            'frontends': {
 | 
						|
                '1.2.3.4': {
 | 
						|
                    'network': '1.2.3.4/255.255.255.0',
 | 
						|
                    'backends': collections.OrderedDict([
 | 
						|
                        ('keystone', '1.2.3.4'),
 | 
						|
                        ('unit-0', '10.0.0.0')
 | 
						|
                    ]),
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
        self.assertEqual(sorted(list(_ctxt.keys())),
 | 
						|
                         sorted(list(test_ctxt.keys())))
 | 
						|
        self.assertEqual(_ctxt, test_ctxt)
 | 
						|
 | 
						|
    @patch.object(context, 'config')
 | 
						|
    def test_keystone_logger_context(self, mock_config):
 | 
						|
        ctxt = context.KeystoneLoggingContext()
 | 
						|
 | 
						|
        mock_config.return_value = None
 | 
						|
        self.assertEqual({'log_level': None,
 | 
						|
                          'log_file': '/var/log/keystone/keystone.log'},
 | 
						|
                         ctxt())
 | 
						|
 | 
						|
    @patch.object(context, 'is_leader')
 | 
						|
    @patch.object(context, 'fernet_enabled')
 | 
						|
    def test_token_flush_context(
 | 
						|
            self, mock_fernet_enabled, mock_is_leader):
 | 
						|
        ctxt = context.TokenFlushContext()
 | 
						|
 | 
						|
        mock_fernet_enabled.return_value = False
 | 
						|
        mock_is_leader.return_value = False
 | 
						|
        self.assertEqual({'token_flush': False}, ctxt())
 | 
						|
 | 
						|
        mock_is_leader.return_value = True
 | 
						|
        self.assertEqual({'token_flush': True}, ctxt())
 | 
						|
 | 
						|
        mock_fernet_enabled.return_value = True
 | 
						|
        self.assertEqual({'token_flush': False}, ctxt())
 | 
						|
 | 
						|
    @patch.object(context, 'charm_dir')
 | 
						|
    @patch.object(context, 'local_unit')
 | 
						|
    @patch.object(context, 'is_leader')
 | 
						|
    @patch.object(context, 'fernet_enabled')
 | 
						|
    def test_fernet_cron_context(
 | 
						|
            self, mock_fernet_enabled, mock_is_leader, mock_local_unit,
 | 
						|
            mock_charm_dir):
 | 
						|
        ctxt = context.FernetCronContext()
 | 
						|
 | 
						|
        mock_charm_dir.return_value = "my-dir"
 | 
						|
        mock_local_unit.return_value = "the-local-unit"
 | 
						|
 | 
						|
        expected = {
 | 
						|
            'enabled': False,
 | 
						|
            'unit_name': 'the-local-unit',
 | 
						|
            'charm_dir': 'my-dir',
 | 
						|
            'minute': '*/5',
 | 
						|
        }
 | 
						|
 | 
						|
        mock_fernet_enabled.return_value = False
 | 
						|
        mock_is_leader.return_value = False
 | 
						|
        self.assertEqual(expected, ctxt())
 | 
						|
 | 
						|
        mock_is_leader.return_value = True
 | 
						|
        self.assertEqual(expected, ctxt())
 | 
						|
 | 
						|
        mock_fernet_enabled.return_value = True
 | 
						|
        expected['enabled'] = True
 | 
						|
        self.assertEqual(expected, ctxt())
 | 
						|
 | 
						|
    def test_fernet_enabled_no_config(self):
 | 
						|
        self.os_release.return_value = 'ocata'
 | 
						|
        self.test_config.set('token-provider', 'uuid')
 | 
						|
        result = context.fernet_enabled()
 | 
						|
        self.assertFalse(result)
 | 
						|
 | 
						|
    def test_fernet_enabled_yes_config(self):
 | 
						|
        self.os_release.return_value = 'ocata'
 | 
						|
        self.test_config.set('token-provider', 'fernet')
 | 
						|
        result = context.fernet_enabled()
 | 
						|
        self.assertTrue(result)
 | 
						|
 | 
						|
    def test_fernet_enabled_no_release_override_config(self):
 | 
						|
        self.os_release.return_value = 'mitaka'
 | 
						|
        self.test_config.set('token-provider', 'fernet')
 | 
						|
        result = context.fernet_enabled()
 | 
						|
        self.assertFalse(result)
 | 
						|
 | 
						|
    def test_fernet_enabled_yes_release(self):
 | 
						|
        self.os_release.return_value = 'rocky'
 | 
						|
        result = context.fernet_enabled()
 | 
						|
        self.assertTrue(result)
 | 
						|
 | 
						|
    def test_fernet_enabled_yes_release_override_config(self):
 | 
						|
        self.os_release.return_value = 'rocky'
 | 
						|
        self.test_config.set('token-provider', 'uuid')
 | 
						|
        result = context.fernet_enabled()
 | 
						|
        self.assertTrue(result)
 | 
						|
 | 
						|
    @patch.object(context, 'relation_ids')
 | 
						|
    @patch.object(context, 'related_units')
 | 
						|
    @patch.object(context, 'relation_get')
 | 
						|
    def test_keystone_fid_service_provider_rdata(
 | 
						|
            self, mock_relation_get, mock_related_units,
 | 
						|
            mock_relation_ids):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        def relation_ids_side_effect(rname):
 | 
						|
            return {
 | 
						|
                'keystone-fid-service-provider': {
 | 
						|
                    'keystone-fid-service-provider:0',
 | 
						|
                    'keystone-fid-service-provider:1',
 | 
						|
                    'keystone-fid-service-provider:2'
 | 
						|
                }
 | 
						|
            }[rname]
 | 
						|
 | 
						|
        mock_relation_ids.side_effect = relation_ids_side_effect
 | 
						|
 | 
						|
        def related_units_side_effect(rid):
 | 
						|
            return {
 | 
						|
                'keystone-fid-service-provider:0': ['sp-mellon/0'],
 | 
						|
                'keystone-fid-service-provider:1': ['sp-shib/0'],
 | 
						|
                'keystone-fid-service-provider:2': ['sp-oidc/0'],
 | 
						|
            }[rid]
 | 
						|
        mock_related_units.side_effect = related_units_side_effect
 | 
						|
 | 
						|
        def relation_get_side_effect(unit, rid):
 | 
						|
            # one unit only as the relation is container-scoped
 | 
						|
            return {
 | 
						|
                "keystone-fid-service-provider:0": {
 | 
						|
                    "sp-mellon/0": {
 | 
						|
                        "ingress-address": '10.0.0.10',
 | 
						|
                        "protocol-name": '"saml2"',
 | 
						|
                        "remote-id-attribute": '"MELLON_IDP"',
 | 
						|
                    },
 | 
						|
                },
 | 
						|
                "keystone-fid-service-provider:1": {
 | 
						|
                    "sp-shib/0": {
 | 
						|
                        "ingress-address": '10.0.0.10',
 | 
						|
                        "protocol-name": '"mapped"',
 | 
						|
                        "remote-id-attribute": '"Shib-Identity-Provider"',
 | 
						|
                    },
 | 
						|
                },
 | 
						|
                "keystone-fid-service-provider:2": {
 | 
						|
                    "sp-oidc/0": {
 | 
						|
                        "ingress-address": '10.0.0.10',
 | 
						|
                        "protocol-name": '"oidc"',
 | 
						|
                        "remote-id-attribute": '"HTTP_OIDC_ISS"',
 | 
						|
                    },
 | 
						|
                },
 | 
						|
            }[rid][unit]
 | 
						|
 | 
						|
        mock_relation_get.side_effect = relation_get_side_effect
 | 
						|
        ctxt = context.KeystoneFIDServiceProviderContext()
 | 
						|
 | 
						|
        self.maxDiff = None
 | 
						|
        self.assertCountEqual(
 | 
						|
            ctxt(),
 | 
						|
            {
 | 
						|
                "fid_sps": [
 | 
						|
                    {
 | 
						|
                        "protocol-name": "saml2",
 | 
						|
                        "remote-id-attribute": "MELLON_IDP",
 | 
						|
                    },
 | 
						|
                    {
 | 
						|
                        "protocol-name": "mapped",
 | 
						|
                        "remote-id-attribute": "Shib-Identity-Provider",
 | 
						|
                    },
 | 
						|
                    {
 | 
						|
                        "protocol-name": "oidc",
 | 
						|
                        "remote-id-attribute": "HTTP_OIDC_ISS",
 | 
						|
                    },
 | 
						|
                ]
 | 
						|
            }
 | 
						|
        )
 | 
						|
 | 
						|
    @patch.object(context, 'relation_ids')
 | 
						|
    def test_keystone_fid_service_provider_empty(
 | 
						|
            self, mock_relation_ids):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        def relation_ids_side_effect(rname):
 | 
						|
            return {
 | 
						|
                'keystone-fid-service-provider': {}
 | 
						|
            }[rname]
 | 
						|
 | 
						|
        mock_relation_ids.side_effect = relation_ids_side_effect
 | 
						|
        ctxt = context.KeystoneFIDServiceProviderContext()
 | 
						|
 | 
						|
        self.maxDiff = None
 | 
						|
        self.assertCountEqual(ctxt(), {})
 | 
						|
 | 
						|
    @patch.object(context, 'relation_ids')
 | 
						|
    @patch.object(context, 'related_units')
 | 
						|
    @patch.object(context, 'relation_get')
 | 
						|
    def test_websso_trusted_dashboard_urls_generated(
 | 
						|
            self, mock_relation_get, mock_related_units,
 | 
						|
            mock_relation_ids):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        def relation_ids_side_effect(rname):
 | 
						|
            return {
 | 
						|
                'websso-trusted-dashboard': {
 | 
						|
                    'websso-trusted-dashboard:0',
 | 
						|
                    'websso-trusted-dashboard:1',
 | 
						|
                    'websso-trusted-dashboard:2'
 | 
						|
                }
 | 
						|
            }[rname]
 | 
						|
 | 
						|
        mock_relation_ids.side_effect = relation_ids_side_effect
 | 
						|
 | 
						|
        def related_units_side_effect(rid):
 | 
						|
            return {
 | 
						|
                'websso-trusted-dashboard:0': ['dashboard-blue/0',
 | 
						|
                                               'dashboard-blue/1'],
 | 
						|
                'websso-trusted-dashboard:1': ['dashboard-red/0',
 | 
						|
                                               'dashboard-red/1'],
 | 
						|
                'websso-trusted-dashboard:2': ['dashboard-green/0',
 | 
						|
                                               'dashboard-green/1']
 | 
						|
            }[rid]
 | 
						|
        mock_related_units.side_effect = related_units_side_effect
 | 
						|
 | 
						|
        def relation_get_side_effect(unit, rid):
 | 
						|
            return {
 | 
						|
                "websso-trusted-dashboard:0": {
 | 
						|
                    "dashboard-blue/0": {  # dns-ha
 | 
						|
                        "ingress-address": '10.0.0.10',
 | 
						|
                        "scheme": "https://",
 | 
						|
                        "hostname": "horizon.intranet.test",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                    "dashboard-blue/1": {  # dns-ha
 | 
						|
                        "ingress-address": '10.0.0.11',
 | 
						|
                        "scheme": "https://",
 | 
						|
                        "hostname": "horizon.intranet.test",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                },
 | 
						|
                "websso-trusted-dashboard:1": {
 | 
						|
                    "dashboard-red/0": {  # vip
 | 
						|
                        "ingress-address": '10.0.0.12',
 | 
						|
                        "scheme": "https://",
 | 
						|
                        "hostname": "10.0.0.100",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                    "dashboard-red/1": {  # vip
 | 
						|
                        "ingress-address": '10.0.0.13',
 | 
						|
                        "scheme": "https://",
 | 
						|
                        "hostname": "10.0.0.100",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                },
 | 
						|
                "websso-trusted-dashboard:2": {
 | 
						|
                    "dashboard-green/0": {  # vip-less, dns-ha-less
 | 
						|
                        "ingress-address": '10.0.0.14',
 | 
						|
                        "scheme": "http://",
 | 
						|
                        "hostname": "10.0.0.14",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                    "dashboard-green/1": {
 | 
						|
                        "ingress-address": '10.0.0.15',
 | 
						|
                        "scheme": "http://",
 | 
						|
                        "hostname": "10.0.0.15",
 | 
						|
                        "path": "/auth/websso/",
 | 
						|
                    },
 | 
						|
                },
 | 
						|
            }[rid][unit]
 | 
						|
 | 
						|
        mock_relation_get.side_effect = relation_get_side_effect
 | 
						|
        ctxt = context.WebSSOTrustedDashboardContext()
 | 
						|
 | 
						|
        self.maxDiff = None
 | 
						|
        self.assertEqual(
 | 
						|
            ctxt(),
 | 
						|
            {
 | 
						|
                'trusted_dashboards': set([
 | 
						|
                    'https://horizon.intranet.test/auth/websso/',
 | 
						|
                    'https://10.0.0.100/auth/websso/',
 | 
						|
                    'http://10.0.0.14/auth/websso/',
 | 
						|
                    'http://10.0.0.15/auth/websso/',
 | 
						|
                ])
 | 
						|
            }
 | 
						|
        )
 | 
						|
 | 
						|
    @patch.object(context, 'relation_ids')
 | 
						|
    def test_websso_trusted_dashboard_empty(
 | 
						|
            self, mock_relation_ids):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        def relation_ids_side_effect(rname):
 | 
						|
            return {
 | 
						|
                'websso-trusted-dashboard': {}
 | 
						|
            }[rname]
 | 
						|
 | 
						|
        mock_relation_ids.side_effect = relation_ids_side_effect
 | 
						|
        ctxt = context.WebSSOTrustedDashboardContext()
 | 
						|
 | 
						|
        self.maxDiff = None
 | 
						|
        self.assertCountEqual(ctxt(), {})
 | 
						|
 | 
						|
    @patch.object(context, 'relation_ids')
 | 
						|
    def test_middleware_no_related_units(self, mock_relation_ids):
 | 
						|
        os.environ['JUJU_UNIT_NAME'] = 'keystone'
 | 
						|
 | 
						|
        def relation_ids_side_effect(rname):
 | 
						|
            return {
 | 
						|
                'keystone-middleware': {}
 | 
						|
            }[rname]
 | 
						|
 | 
						|
        mock_relation_ids.side_effect = relation_ids_side_effect
 | 
						|
        ctxt = context.MiddlewareContext()
 | 
						|
 | 
						|
        self.assertEqual(ctxt(), {'middlewares': ''})
 | 
						|
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.relation_ids')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.related_units')
 | 
						|
    @patch('charmhelpers.contrib.openstack.context.relation_get')
 | 
						|
    def test_middleware_related_units(
 | 
						|
            self, mock_relation_get, mock_related_units, mock_relation_ids):
 | 
						|
        mock_relation_ids.return_value = ['keystone-middleware:0']
 | 
						|
        mock_related_units.return_value = ['keystone-ico/0']
 | 
						|
        settings = \
 | 
						|
            {
 | 
						|
                'middleware_name': 'keystone-ico',
 | 
						|
                'subordinate_configuration':
 | 
						|
                    '{"keystone":'
 | 
						|
                    '{"/etc/keystone/keystone.conf":'
 | 
						|
                    '{"sections":'
 | 
						|
                    '{"authentication":'
 | 
						|
                    '[["simple_token_header", "SimpleToken"],'
 | 
						|
                    '["simple_token_secret", "foobar"]],'
 | 
						|
                    '"auth":'
 | 
						|
                    '[["methods", "external,password,token,oauth1"],'
 | 
						|
                    '["external", "keystone.auth.plugins.external.Domain"],'
 | 
						|
                    '["password", "keystone.auth.plugins.password.Password"],'
 | 
						|
                    '["token", "keystone.auth.plugins.token.Token"],'
 | 
						|
                    '["oauth1", "keystone.auth.plugins.oauth1.OAuth"]]'
 | 
						|
                    '}}}}'
 | 
						|
 | 
						|
            }
 | 
						|
 | 
						|
        def fake_rel_get(attribute=None, unit=None, rid=None):
 | 
						|
            return settings[attribute]
 | 
						|
 | 
						|
        mock_relation_get.side_effect = fake_rel_get
 | 
						|
        ctxt = context.context.SubordinateConfigContext(
 | 
						|
            interface=['keystone-middleware'],
 | 
						|
            service='keystone',
 | 
						|
            config_file='/etc/keystone/keystone.conf')
 | 
						|
 | 
						|
        exp = {'sections': {
 | 
						|
            u'auth': [[u'methods',
 | 
						|
                       u'external,password,token,oauth1'],
 | 
						|
                      [u'external',
 | 
						|
                       u'keystone.auth.plugins.external.Domain'],
 | 
						|
                      [u'password',
 | 
						|
                       u'keystone.auth.plugins.password.Password'],
 | 
						|
                      [u'token',
 | 
						|
                       u'keystone.auth.plugins.token.Token'],
 | 
						|
                      [u'oauth1',
 | 
						|
                       u'keystone.auth.plugins.oauth1.OAuth']],
 | 
						|
            u'authentication': [[u'simple_token_header', u'SimpleToken'],
 | 
						|
                                [u'simple_token_secret', u'foobar']]}}
 | 
						|
 | 
						|
        self.assertEqual(ctxt(), exp)
 |