cc8f89b41c
This patch adds the Designate hacking checks to also run against the Designate tempest plugin code to maintain consistent style checking across the Designate repositories. Change-Id: I8f41bb8188ba8442dbf493dac39b8601f5208938
99 lines
3.6 KiB
Python
99 lines
3.6 KiB
Python
# Copyright 2016 Hewlett Packard Enterprise Development Company, L.P.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
from tempest import clients
|
|
from tempest import config
|
|
from tempest.lib import auth
|
|
|
|
from designate_tempest_plugin.services.dns.v2.json.blacklists_client import (
|
|
BlacklistsClient)
|
|
from designate_tempest_plugin.services.dns.v2.json.pool_client import (
|
|
PoolClient)
|
|
from designate_tempest_plugin.services.dns.v2.json.recordset_client import (
|
|
RecordsetClient)
|
|
from designate_tempest_plugin.services.dns.v2.json.tld_client import (
|
|
TldClient)
|
|
from designate_tempest_plugin.services.dns.v2.json.zones_client import (
|
|
ZonesClient)
|
|
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class ManagerV2Unauthed(clients.Manager):
|
|
|
|
def __init__(self, credentials=None):
|
|
super(ManagerV2Unauthed, self).__init__(credentials)
|
|
self.auth_provider = self._auth_provider_class()(
|
|
credentials=self.auth_provider.credentials,
|
|
auth_url=self.auth_provider.auth_client.auth_url,
|
|
disable_ssl_certificate_validation=self.auth_provider.dscv,
|
|
ca_certs=self.auth_provider.ca_certs,
|
|
trace_requests=self.auth_provider.trace_requests,
|
|
)
|
|
self._init_clients(self._get_params())
|
|
|
|
def _init_clients(self, params):
|
|
self.zones_client = ZonesClient(**params)
|
|
self.blacklists_client = BlacklistsClient(**params)
|
|
self.recordset_client = RecordsetClient(**params)
|
|
self.pool_client = PoolClient(**params)
|
|
self.tld_client = TldClient(**params)
|
|
|
|
def _auth_provider_class(self):
|
|
if CONF.identity.auth_version == 'v3':
|
|
return KeystoneV3UnauthedProvider
|
|
else:
|
|
return KeystoneV2UnauthedProvider
|
|
|
|
def _get_params(self):
|
|
params = dict(self.default_params)
|
|
params.update({
|
|
'auth_provider': self.auth_provider,
|
|
'service': CONF.dns.catalog_type,
|
|
'region': CONF.identity.region,
|
|
'endpoint_type': CONF.dns.endpoint_type,
|
|
'build_interval': CONF.dns.build_interval,
|
|
'build_timeout': CONF.dns.build_timeout
|
|
})
|
|
return params
|
|
|
|
|
|
class BaseUnauthedProvider(auth.KeystoneAuthProvider):
|
|
|
|
def _decorate_request(self, filters, method, url, headers=None, body=None,
|
|
auth_data=None):
|
|
result = super(BaseUnauthedProvider, self)._decorate_request(
|
|
filters, method, url, headers=headers, body=body,
|
|
auth_data=auth_data)
|
|
url, headers, body = result
|
|
try:
|
|
del headers['X-Auth-Token']
|
|
except KeyError:
|
|
pass
|
|
return url, headers, body
|
|
|
|
|
|
class KeystoneV2UnauthedProvider(auth.KeystoneV2AuthProvider,
|
|
BaseUnauthedProvider):
|
|
|
|
def _decorate_request(self, *args, **kwargs):
|
|
return BaseUnauthedProvider._decorate_request(self, *args, **kwargs)
|
|
|
|
|
|
class KeystoneV3UnauthedProvider(auth.KeystoneV3AuthProvider,
|
|
BaseUnauthedProvider):
|
|
|
|
def _decorate_request(self, *args, **kwargs):
|
|
return BaseUnauthedProvider._decorate_request(self, *args, **kwargs)
|