cba109872b
It seems we've missed to override client() methods for some keystone resource plugins. This also fixes the tests for all keystone resources. Change-Id: I97e4d4f0bbc9575109d9c8f59fe4795313d2f525 Closes-Bug: #1614400
239 lines
7.3 KiB
Python
239 lines
7.3 KiB
Python
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
"""A fake server that "responds" to API methods with pre-canned responses.
|
|
|
|
All of these responses come from the spec, so if for some reason the spec's
|
|
wrong the tests might raise AssertionError. I've indicated in comments the
|
|
places where actual behavior differs from the spec.
|
|
"""
|
|
|
|
from keystoneauth1 import plugin
|
|
from keystoneauth1 import session
|
|
import mock
|
|
|
|
from heat.common import context
|
|
|
|
|
|
class FakeClient(object):
|
|
|
|
def assert_called(self, method, url, body=None, pos=-1):
|
|
"""Assert that an API method was just called."""
|
|
expected = (method, url)
|
|
called = self.client.callstack[pos][0:2]
|
|
|
|
assert self.client.callstack, ("Expected %s %s "
|
|
"but no calls were made." % expected)
|
|
|
|
assert expected == called, 'Expected %s %s; got %s %s' % (
|
|
expected + called)
|
|
|
|
if body is not None:
|
|
assert self.client.callstack[pos][2] == body
|
|
|
|
def assert_called_anytime(self, method, url, body=None):
|
|
"""Assert that an API method was called anytime in the test."""
|
|
expected = (method, url)
|
|
|
|
assert self.client.callstack, ("Expected %s %s but no calls "
|
|
"were made." % expected)
|
|
|
|
found = False
|
|
for entry in self.client.callstack:
|
|
if expected == entry[0:2]:
|
|
found = True
|
|
break
|
|
|
|
assert found, 'Expected %s %s; got %s' % (expected,
|
|
self.client.callstack)
|
|
if body is not None:
|
|
try:
|
|
assert entry[2] == body
|
|
except AssertionError:
|
|
print(entry[2])
|
|
print("!=")
|
|
print(body)
|
|
raise
|
|
|
|
self.client.callstack = []
|
|
|
|
def clear_callstack(self):
|
|
self.client.callstack = []
|
|
|
|
def authenticate(self):
|
|
pass
|
|
|
|
|
|
class FakeAuth(plugin.BaseAuthPlugin):
|
|
|
|
def __init__(self, auth_token='abcd1234', only_services=None):
|
|
self.auth_token = auth_token
|
|
self.only_services = only_services
|
|
|
|
def get_token(self, session, **kwargs):
|
|
return self.auth_token
|
|
|
|
def get_endpoint(self, session, service_type=None, **kwargs):
|
|
if (self.only_services is not None and
|
|
service_type not in self.only_services):
|
|
return None
|
|
|
|
return 'http://example.com:1234/v1'
|
|
|
|
def get_auth_ref(self, session):
|
|
auth_ref = mock.Mock()
|
|
return auth_ref
|
|
|
|
|
|
class FakeKeystoneClient(object):
|
|
def __init__(self, username='test_username', password='password',
|
|
user_id='1234', access='4567', secret='8901',
|
|
credential_id='abcdxyz', auth_token='abcd1234',
|
|
context=None, stack_domain_id='4321', roles=None,
|
|
user_domain_id=None, project_domain_id=None, client=None):
|
|
self.username = username
|
|
self.password = password
|
|
self.user_id = user_id
|
|
self.access = access
|
|
self.secret = secret
|
|
self.session = session.Session()
|
|
self.credential_id = credential_id
|
|
self.token = auth_token
|
|
self.context = context
|
|
self.v3_endpoint = 'http://localhost:5000/v3'
|
|
self.stack_domain_id = stack_domain_id
|
|
self.roles = roles or []
|
|
self.user_domain_id = user_domain_id
|
|
self.project_domain_id = project_domain_id
|
|
self.client = client
|
|
|
|
class FakeCred(object):
|
|
id = self.credential_id
|
|
access = self.access
|
|
secret = self.secret
|
|
self.creds = FakeCred()
|
|
|
|
def create_stack_user(self, username, password=''):
|
|
self.username = username
|
|
return self.user_id
|
|
|
|
def delete_stack_user(self, user_id):
|
|
self.user_id = None
|
|
|
|
def get_ec2_keypair(self, access, user_id):
|
|
if user_id == self.user_id:
|
|
if access == self.access:
|
|
return self.creds
|
|
else:
|
|
raise ValueError("Unexpected access %s" % access)
|
|
else:
|
|
raise ValueError("Unexpected user_id %s" % user_id)
|
|
|
|
def create_ec2_keypair(self, user_id):
|
|
if user_id == self.user_id:
|
|
return self.creds
|
|
|
|
def delete_ec2_keypair(self, credential_id=None, user_id=None,
|
|
access=None):
|
|
if user_id == self.user_id and access == self.creds.access:
|
|
self.creds = None
|
|
else:
|
|
raise Exception('Incorrect user_id or access')
|
|
|
|
def enable_stack_user(self, user_id):
|
|
pass
|
|
|
|
def disable_stack_user(self, user_id):
|
|
pass
|
|
|
|
def create_trust_context(self):
|
|
return context.RequestContext(username=self.username,
|
|
password=self.password,
|
|
is_admin=False,
|
|
trust_id='atrust',
|
|
trustor_user_id=self.user_id)
|
|
|
|
def delete_trust(self, trust_id):
|
|
pass
|
|
|
|
def delete_stack_domain_project(self, project_id):
|
|
pass
|
|
|
|
def create_stack_domain_project(self, stack_id):
|
|
return 'aprojectid'
|
|
|
|
def create_stack_domain_user(self, username, project_id, password=None):
|
|
return self.user_id
|
|
|
|
def delete_stack_domain_user(self, user_id, project_id):
|
|
pass
|
|
|
|
def create_stack_domain_user_keypair(self, user_id, project_id):
|
|
return self.creds
|
|
|
|
def enable_stack_domain_user(self, user_id, project_id):
|
|
pass
|
|
|
|
def disable_stack_domain_user(self, user_id, project_id):
|
|
pass
|
|
|
|
def delete_stack_domain_user_keypair(self, user_id, project_id,
|
|
credential_id):
|
|
pass
|
|
|
|
def stack_domain_user_token(self, user_id, project_id, password):
|
|
return 'adomainusertoken'
|
|
|
|
@property
|
|
def auth_token(self):
|
|
if self.context is not None:
|
|
return self.context.auth_plugin.get_token(self.session)
|
|
else:
|
|
return self.token
|
|
|
|
@property
|
|
def auth_ref(self):
|
|
return FakeAccessInfo(roles=self.roles,
|
|
user_domain=self.user_domain_id,
|
|
project_domain=self.project_domain_id)
|
|
|
|
|
|
class FakeAccessInfo(object):
|
|
def __init__(self, roles, user_domain, project_domain):
|
|
self.roles = roles
|
|
self.user_domain = user_domain
|
|
self.project_domain = project_domain
|
|
|
|
@property
|
|
def role_names(self):
|
|
return self.roles
|
|
|
|
@property
|
|
def user_domain_id(self):
|
|
return self.user_domain
|
|
|
|
@property
|
|
def project_domain_id(self):
|
|
return self.project_domain
|
|
|
|
|
|
class FakeEventSink(object):
|
|
|
|
def __init__(self, evt):
|
|
self.events = []
|
|
self.evt = evt
|
|
|
|
def consume(self, stack, event):
|
|
self.events.append(event)
|
|
self.evt.send(None)
|