326f57c271
* Region.description is declared as non-nullable in migration, so model nullable value changed to False too. * FederationProtocol.mapping_id must logically be not nullable. Provide a migration script to add the NOT NULL constraint to the column. Change-Id: I15a9e50b5461a112faca08f0ea68cbae2ce77d0d Partial-Bug: #1292591
226 lines
8.4 KiB
Python
226 lines
8.4 KiB
Python
# Copyright 2012 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
"""
|
|
To run these tests against a live database:
|
|
|
|
1. Modify the file `tests/backend_sql.conf` to use the connection for your
|
|
live database
|
|
2. Set up a blank, live database.
|
|
3. run the tests using
|
|
|
|
::
|
|
|
|
./run_tests.sh -N test_sql_upgrade
|
|
|
|
WARNING::
|
|
|
|
Your database will be wiped.
|
|
|
|
Do not do this against a Database with valuable data as
|
|
all data will be lost.
|
|
"""
|
|
|
|
|
|
from keystone.contrib import endpoint_filter
|
|
from keystone.contrib import example
|
|
from keystone.contrib import federation
|
|
from keystone.contrib import oauth1
|
|
from keystone.contrib import revoke
|
|
from keystone.openstack.common.db.sqlalchemy import utils
|
|
from keystone.tests import test_sql_upgrade
|
|
|
|
|
|
class SqlUpgradeExampleExtension(test_sql_upgrade.SqlMigrateBase):
|
|
def repo_package(self):
|
|
return example
|
|
|
|
def test_upgrade(self):
|
|
self.assertTableDoesNotExist('example')
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('example', ['id', 'type', 'extra'])
|
|
|
|
def test_downgrade(self):
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('example', ['id', 'type', 'extra'])
|
|
self.downgrade(0, repository=self.repo_path)
|
|
self.assertTableDoesNotExist('example')
|
|
|
|
|
|
class SqlUpgradeOAuth1Extension(test_sql_upgrade.SqlMigrateBase):
|
|
def repo_package(self):
|
|
return oauth1
|
|
|
|
def test_upgrade(self):
|
|
self.assertTableDoesNotExist('consumer')
|
|
self.assertTableDoesNotExist('request_token')
|
|
self.assertTableDoesNotExist('access_token')
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('consumer',
|
|
['id',
|
|
'description',
|
|
'secret',
|
|
'extra'])
|
|
self.assertTableColumns('request_token',
|
|
['id',
|
|
'request_secret',
|
|
'verifier',
|
|
'authorizing_user_id',
|
|
'requested_project_id',
|
|
'requested_roles',
|
|
'consumer_id',
|
|
'expires_at'])
|
|
self.assertTableColumns('access_token',
|
|
['id',
|
|
'access_secret',
|
|
'authorizing_user_id',
|
|
'project_id',
|
|
'requested_roles',
|
|
'consumer_id',
|
|
'expires_at'])
|
|
|
|
def test_downgrade(self):
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('consumer',
|
|
['id',
|
|
'description',
|
|
'secret',
|
|
'extra'])
|
|
self.assertTableColumns('request_token',
|
|
['id',
|
|
'request_secret',
|
|
'verifier',
|
|
'authorizing_user_id',
|
|
'requested_project_id',
|
|
'requested_roles',
|
|
'consumer_id',
|
|
'expires_at'])
|
|
self.assertTableColumns('access_token',
|
|
['id',
|
|
'access_secret',
|
|
'authorizing_user_id',
|
|
'project_id',
|
|
'requested_roles',
|
|
'consumer_id',
|
|
'expires_at'])
|
|
self.downgrade(0, repository=self.repo_path)
|
|
self.assertTableDoesNotExist('consumer')
|
|
self.assertTableDoesNotExist('request_token')
|
|
self.assertTableDoesNotExist('access_token')
|
|
|
|
|
|
class EndpointFilterExtension(test_sql_upgrade.SqlMigrateBase):
|
|
def repo_package(self):
|
|
return endpoint_filter
|
|
|
|
def test_upgrade(self):
|
|
self.assertTableDoesNotExist('project_endpoint')
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('project_endpoint',
|
|
['endpoint_id', 'project_id'])
|
|
|
|
def test_downgrade(self):
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('project_endpoint',
|
|
['endpoint_id', 'project_id'])
|
|
self.downgrade(0, repository=self.repo_path)
|
|
self.assertTableDoesNotExist('project_endpoint')
|
|
|
|
|
|
class FederationExtension(test_sql_upgrade.SqlMigrateBase):
|
|
"""Test class for ensuring the Federation SQL."""
|
|
|
|
def setUp(self):
|
|
super(FederationExtension, self).setUp()
|
|
self.identity_provider = 'identity_provider'
|
|
self.federation_protocol = 'federation_protocol'
|
|
self.mapping = 'mapping'
|
|
|
|
def repo_package(self):
|
|
return federation
|
|
|
|
def test_upgrade(self):
|
|
self.assertTableDoesNotExist(self.identity_provider)
|
|
self.assertTableDoesNotExist(self.federation_protocol)
|
|
self.assertTableDoesNotExist(self.mapping)
|
|
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns(self.identity_provider,
|
|
['id',
|
|
'enabled',
|
|
'description'])
|
|
|
|
self.assertTableColumns(self.federation_protocol,
|
|
['id',
|
|
'idp_id',
|
|
'mapping_id'])
|
|
|
|
self.upgrade(2, repository=self.repo_path)
|
|
self.assertTableColumns(self.mapping,
|
|
['id', 'rules'])
|
|
|
|
federation_protocol = utils.get_table(
|
|
self.engine,
|
|
'federation_protocol')
|
|
with self.engine.begin() as conn:
|
|
conn.execute(federation_protocol.insert(), id=0, idp_id=1)
|
|
self.upgrade(3, repository=self.repo_path)
|
|
federation_protocol = utils.get_table(
|
|
self.engine,
|
|
'federation_protocol')
|
|
self.assertFalse(federation_protocol.c.mapping_id.nullable)
|
|
|
|
def test_downgrade(self):
|
|
self.upgrade(3, repository=self.repo_path)
|
|
self.assertTableColumns(self.identity_provider,
|
|
['id', 'enabled', 'description'])
|
|
self.assertTableColumns(self.federation_protocol,
|
|
['id', 'idp_id', 'mapping_id'])
|
|
self.assertTableColumns(self.mapping,
|
|
['id', 'rules'])
|
|
|
|
self.downgrade(2, repository=self.repo_path)
|
|
federation_protocol = utils.get_table(
|
|
self.engine,
|
|
'federation_protocol')
|
|
self.assertTrue(federation_protocol.c.mapping_id.nullable)
|
|
|
|
self.downgrade(0, repository=self.repo_path)
|
|
self.assertTableDoesNotExist(self.identity_provider)
|
|
self.assertTableDoesNotExist(self.federation_protocol)
|
|
self.assertTableDoesNotExist(self.mapping)
|
|
|
|
|
|
_REVOKE_COLUMN_NAMES = ['id', 'domain_id', 'project_id', 'user_id', 'role_id',
|
|
'trust_id', 'consumer_id', 'access_token_id',
|
|
'issued_before', 'expires_at', 'revoked_at']
|
|
|
|
|
|
class RevokeExtension(test_sql_upgrade.SqlMigrateBase):
|
|
|
|
def repo_package(self):
|
|
return revoke
|
|
|
|
def test_upgrade(self):
|
|
self.assertTableDoesNotExist('revocation_event')
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('revocation_event',
|
|
_REVOKE_COLUMN_NAMES)
|
|
|
|
def test_downgrade(self):
|
|
self.upgrade(1, repository=self.repo_path)
|
|
self.assertTableColumns('revocation_event',
|
|
_REVOKE_COLUMN_NAMES)
|
|
self.downgrade(0, repository=self.repo_path)
|
|
self.assertTableDoesNotExist('revocation_event')
|