With the out of tree federation plugins going on extract the basic federation workflow and required information that can be reused. Change-Id: I6fdb3a5c6d9f3e1d6fa3425fd05809155effed1f
		
			
				
	
	
		
			97 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			97 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# Licensed under the Apache License, Version 2.0 (the "License"); you may
 | 
						|
# not use this file except in compliance with the License. You may obtain
 | 
						|
# a copy of the License at
 | 
						|
#
 | 
						|
#      http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | 
						|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | 
						|
# License for the specific language governing permissions and limitations
 | 
						|
# under the License.
 | 
						|
 | 
						|
import copy
 | 
						|
import uuid
 | 
						|
 | 
						|
from keystoneclient import access
 | 
						|
from keystoneclient.auth.identity import v3
 | 
						|
from keystoneclient import fixture
 | 
						|
from keystoneclient import session
 | 
						|
from keystoneclient.tests.unit import utils
 | 
						|
 | 
						|
 | 
						|
class TesterFederationPlugin(v3.FederatedBaseAuth):
 | 
						|
 | 
						|
    def get_unscoped_auth_ref(self, sess, **kwargs):
 | 
						|
        # This would go and talk to an idp or something
 | 
						|
        resp = sess.post(self.federated_token_url, authenticated=False)
 | 
						|
        return access.AccessInfo.factory(resp=resp, body=resp.json())
 | 
						|
 | 
						|
 | 
						|
class V3FederatedPlugin(utils.TestCase):
 | 
						|
 | 
						|
    AUTH_URL = 'http://keystone/v3'
 | 
						|
 | 
						|
    def setUp(self):
 | 
						|
        super(V3FederatedPlugin, self).setUp()
 | 
						|
 | 
						|
        self.unscoped_token = fixture.V3Token()
 | 
						|
        self.unscoped_token_id = uuid.uuid4().hex
 | 
						|
        self.scoped_token = copy.deepcopy(self.unscoped_token)
 | 
						|
        self.scoped_token.set_project_scope()
 | 
						|
        self.scoped_token.methods.append('token')
 | 
						|
        self.scoped_token_id = uuid.uuid4().hex
 | 
						|
 | 
						|
        s = self.scoped_token.add_service('compute', name='nova')
 | 
						|
        s.add_standard_endpoints(public='http://nova/public',
 | 
						|
                                 admin='http://nova/admin',
 | 
						|
                                 internal='http://nova/internal')
 | 
						|
 | 
						|
        self.idp = uuid.uuid4().hex
 | 
						|
        self.protocol = uuid.uuid4().hex
 | 
						|
 | 
						|
        self.token_url = ('%s/OS-FEDERATION/identity_providers/%s/protocols/%s'
 | 
						|
                          '/auth' % (self.AUTH_URL, self.idp, self.protocol))
 | 
						|
 | 
						|
        headers = {'X-Subject-Token': self.unscoped_token_id}
 | 
						|
        self.unscoped_mock = self.requests_mock.post(self.token_url,
 | 
						|
                                                     json=self.unscoped_token,
 | 
						|
                                                     headers=headers)
 | 
						|
 | 
						|
        headers = {'X-Subject-Token': self.scoped_token_id}
 | 
						|
        auth_url = self.AUTH_URL + '/auth/tokens'
 | 
						|
        self.scoped_mock = self.requests_mock.post(auth_url,
 | 
						|
                                                   json=self.scoped_token,
 | 
						|
                                                   headers=headers)
 | 
						|
 | 
						|
    def get_plugin(self, **kwargs):
 | 
						|
        kwargs.setdefault('auth_url', self.AUTH_URL)
 | 
						|
        kwargs.setdefault('protocol', self.protocol)
 | 
						|
        kwargs.setdefault('identity_provider', self.idp)
 | 
						|
        return TesterFederationPlugin(**kwargs)
 | 
						|
 | 
						|
    def test_federated_url(self):
 | 
						|
        plugin = self.get_plugin()
 | 
						|
        self.assertEqual(self.token_url, plugin.federated_token_url)
 | 
						|
 | 
						|
    def test_unscoped_behaviour(self):
 | 
						|
        sess = session.Session(auth=self.get_plugin())
 | 
						|
        self.assertEqual(self.unscoped_token_id, sess.get_token())
 | 
						|
 | 
						|
        self.assertTrue(self.unscoped_mock.called)
 | 
						|
        self.assertFalse(self.scoped_mock.called)
 | 
						|
 | 
						|
    def test_scoped_behaviour(self):
 | 
						|
        auth = self.get_plugin(project_id=self.scoped_token.project_id)
 | 
						|
        sess = session.Session(auth=auth)
 | 
						|
        self.assertEqual(self.scoped_token_id, sess.get_token())
 | 
						|
 | 
						|
        self.assertTrue(self.unscoped_mock.called)
 | 
						|
        self.assertTrue(self.scoped_mock.called)
 | 
						|
 | 
						|
    def test_options(self):
 | 
						|
        opts = [o.name for o in v3.FederatedBaseAuth.get_options()]
 | 
						|
 | 
						|
        self.assertIn('protocol', opts)
 | 
						|
        self.assertIn('identity-provider', opts)
 |