23ca656927
The goal is to move the responsibility of reference checks away from controllers and into the underlying managers & drivers, which can handle the task with equal or greater efficiency. - Tenant references from create_user/update_user are NOT tested due to inconsistencies between backends - Additional test coverage improvements Also fixes bug 999209, bug 999608, bug 1006029, bug 1006055, bug 1006287, bug 1006334, and bug 1006344. Change-Id: I7de592e7dd4518038436b9a9fdaab559b00a0537
94 lines
3.8 KiB
Python
94 lines
3.8 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2012 OpenStack LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import uuid
|
|
|
|
from keystone import config
|
|
from keystone import test
|
|
from keystone.common.sql import util as sql_util
|
|
|
|
import test_keystoneclient
|
|
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class KcMasterSqlTestCase(test_keystoneclient.KcMasterTestCase):
|
|
def config(self, config_files):
|
|
super(KcMasterSqlTestCase, self).config([
|
|
test.etcdir('keystone.conf.sample'),
|
|
test.testsdir('test_overrides.conf'),
|
|
test.testsdir('backend_sql.conf')])
|
|
sql_util.setup_test_database()
|
|
|
|
def test_endpoint_crud(self):
|
|
from keystoneclient import exceptions as client_exceptions
|
|
|
|
client = self.get_client(admin=True)
|
|
|
|
service = client.services.create(name=uuid.uuid4().hex,
|
|
service_type=uuid.uuid4().hex,
|
|
description=uuid.uuid4().hex)
|
|
|
|
endpoint_region = uuid.uuid4().hex
|
|
invalid_service_id = uuid.uuid4().hex
|
|
endpoint_publicurl = uuid.uuid4().hex
|
|
endpoint_internalurl = uuid.uuid4().hex
|
|
endpoint_adminurl = uuid.uuid4().hex
|
|
|
|
# a non-existant service ID should trigger a 404
|
|
self.assertRaises(client_exceptions.NotFound,
|
|
client.endpoints.create,
|
|
region=endpoint_region,
|
|
service_id=invalid_service_id,
|
|
publicurl=endpoint_publicurl,
|
|
adminurl=endpoint_adminurl,
|
|
internalurl=endpoint_internalurl)
|
|
|
|
endpoint = client.endpoints.create(region=endpoint_region,
|
|
service_id=service.id,
|
|
publicurl=endpoint_publicurl,
|
|
adminurl=endpoint_adminurl,
|
|
internalurl=endpoint_internalurl)
|
|
|
|
self.assertEquals(endpoint.region, endpoint_region)
|
|
self.assertEquals(endpoint.service_id, service.id)
|
|
self.assertEquals(endpoint.publicurl, endpoint_publicurl)
|
|
self.assertEquals(endpoint.internalurl, endpoint_internalurl)
|
|
self.assertEquals(endpoint.adminurl, endpoint_adminurl)
|
|
|
|
client.endpoints.delete(id=endpoint.id)
|
|
self.assertRaises(client_exceptions.NotFound, client.endpoints.delete,
|
|
id=endpoint.id)
|
|
|
|
def test_endpoint_create_404(self):
|
|
from keystoneclient import exceptions as client_exceptions
|
|
client = self.get_client(admin=True)
|
|
self.assertRaises(client_exceptions.NotFound,
|
|
client.endpoints.create,
|
|
region=uuid.uuid4().hex,
|
|
service_id=uuid.uuid4().hex,
|
|
publicurl=uuid.uuid4().hex,
|
|
adminurl=uuid.uuid4().hex,
|
|
internalurl=uuid.uuid4().hex)
|
|
|
|
def test_endpoint_delete_404(self):
|
|
from keystoneclient import exceptions as client_exceptions
|
|
client = self.get_client(admin=True)
|
|
self.assertRaises(client_exceptions.NotFound,
|
|
client.endpoints.delete,
|
|
id=uuid.uuid4().hex)
|