Currently ironicclient does not pass OS_REGION_NAME to Keystone client. That will cause problems in multiregion deployments. Modified ironicclient to consider using OS_REGION_NAME if provided. Closes-Bug: #1314159 Change-Id: I885e57973ccec64471fe2ba5fecfab2224829787
143 lines
5.6 KiB
Python
143 lines
5.6 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import fixtures
|
|
|
|
from ironicclient.client import get_client
|
|
from ironicclient import exc
|
|
from ironicclient.tests import utils
|
|
|
|
|
|
def fake_get_ksclient(**kwargs):
|
|
return utils.FakeKeystone('KSCLIENT_AUTH_TOKEN')
|
|
|
|
|
|
class ClientTest(utils.BaseTestCase):
|
|
|
|
def test_get_client_with_auth_token_ironic_url(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'ironic_url': 'http://ironic.example.org:6385/',
|
|
'os_auth_token': 'USER_AUTH_TOKEN',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual('USER_AUTH_TOKEN', client.http_client.auth_token)
|
|
self.assertEqual('http://ironic.example.org:6385/',
|
|
client.http_client.endpoint)
|
|
|
|
def test_get_client_no_auth_token(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_auth_url': 'http://localhost:35357/v2.0',
|
|
'os_auth_token': '',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual('KSCLIENT_AUTH_TOKEN', client.http_client.auth_token)
|
|
self.assertEqual('http://localhost:6385/v1/f14b41234',
|
|
client.http_client.endpoint)
|
|
self.assertEqual(fake_get_ksclient().auth_ref,
|
|
client.http_client.auth_ref)
|
|
|
|
def test_get_client_with_region_no_auth_token(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_region_name': 'REGIONONE',
|
|
'os_auth_url': 'http://localhost:35357/v2.0',
|
|
'os_auth_token': '',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual('KSCLIENT_AUTH_TOKEN', client.http_client.auth_token)
|
|
self.assertEqual('http://regionhost:6385/v1/f14b41234',
|
|
client.http_client.endpoint)
|
|
self.assertEqual(fake_get_ksclient().auth_ref,
|
|
client.http_client.auth_ref)
|
|
|
|
def test_get_client_with_auth_token(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_auth_url': 'http://localhost:35357/v2.0',
|
|
'os_auth_token': 'USER_AUTH_TOKEN',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual('USER_AUTH_TOKEN', client.http_client.auth_token)
|
|
self.assertEqual('http://localhost:6385/v1/f14b41234',
|
|
client.http_client.endpoint)
|
|
self.assertEqual(fake_get_ksclient().auth_ref,
|
|
client.http_client.auth_ref)
|
|
|
|
def test_get_client_with_region_name_auth_token(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_auth_url': 'http://localhost:35357/v2.0',
|
|
'os_region_name': 'REGIONONE',
|
|
'os_auth_token': 'USER_AUTH_TOKEN',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual('USER_AUTH_TOKEN', client.http_client.auth_token)
|
|
self.assertEqual('http://regionhost:6385/v1/f14b41234',
|
|
client.http_client.endpoint)
|
|
self.assertEqual(fake_get_ksclient().auth_ref,
|
|
client.http_client.auth_ref)
|
|
|
|
def test_get_client_no_url_and_no_token(self):
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', fake_get_ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_auth_url': '',
|
|
'os_auth_token': '',
|
|
}
|
|
self.assertRaises(exc.AmbiguousAuthSystem, get_client, '1', **kwargs)
|
|
# test the alias as well to ensure backwards compatibility
|
|
self.assertRaises(exc.AmbigiousAuthSystem, get_client, '1', **kwargs)
|
|
|
|
def test_ensure_auth_ref_propagated(self):
|
|
ksclient = fake_get_ksclient
|
|
self.useFixture(fixtures.MonkeyPatch(
|
|
'ironicclient.client._get_ksclient', ksclient))
|
|
kwargs = {
|
|
'os_tenant_name': 'TENANT_NAME',
|
|
'os_username': 'USERNAME',
|
|
'os_password': 'PASSWORD',
|
|
'os_auth_url': 'http://localhost:35357/v2.0',
|
|
'os_auth_token': '',
|
|
}
|
|
client = get_client('1', **kwargs)
|
|
|
|
self.assertEqual(ksclient().auth_ref, client.http_client.auth_ref)
|