Add users functional tests
Adds initial set of functional tests for users. For now, all the tests are created under a single class. Once we have a gate that runs against LDAP, we will create a class that only contains readonly tests and a tox call for it (e.g tox -e functional-readonly). Change-Id: Ie41872a1ad86db6219dd0af47dbc3e2db46bd878
This commit is contained in:
55
keystoneclient/tests/functional/v3/client_fixtures.py
Normal file
55
keystoneclient/tests/functional/v3/client_fixtures.py
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
|
||||||
|
import fixtures
|
||||||
|
import uuid
|
||||||
|
|
||||||
|
|
||||||
|
RESOURCE_NAME_PREFIX = 'keystoneclient-functional-'
|
||||||
|
|
||||||
|
|
||||||
|
class Base(fixtures.Fixture):
|
||||||
|
|
||||||
|
def __init__(self, client, domain_id):
|
||||||
|
super(Base, self).__init__()
|
||||||
|
|
||||||
|
self.client = client
|
||||||
|
self.domain_id = domain_id
|
||||||
|
|
||||||
|
self.ref = None
|
||||||
|
self.entity = None
|
||||||
|
|
||||||
|
def __getattr__(self, name):
|
||||||
|
"""Return the attribute from the represented entity."""
|
||||||
|
return getattr(self.entity, name)
|
||||||
|
|
||||||
|
|
||||||
|
class User(Base):
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
super(User, self).setUp()
|
||||||
|
|
||||||
|
self.ref = {'name': RESOURCE_NAME_PREFIX + uuid.uuid4().hex,
|
||||||
|
'domain': self.domain_id}
|
||||||
|
self.entity = self.client.users.create(**self.ref)
|
||||||
|
self.addCleanup(self.client.users.delete, self.entity)
|
||||||
|
|
||||||
|
|
||||||
|
class Group(Base):
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
super(Group, self).setUp()
|
||||||
|
|
||||||
|
self.ref = {'name': RESOURCE_NAME_PREFIX + uuid.uuid4().hex,
|
||||||
|
'domain': self.domain_id}
|
||||||
|
self.entity = self.client.groups.create(**self.ref)
|
||||||
|
self.addCleanup(self.client.groups.delete, self.entity)
|
117
keystoneclient/tests/functional/v3/test_users.py
Normal file
117
keystoneclient/tests/functional/v3/test_users.py
Normal file
@@ -0,0 +1,117 @@
|
|||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
|
||||||
|
from keystoneauth1.exceptions import http
|
||||||
|
from keystoneclient.tests.functional import base
|
||||||
|
from keystoneclient.tests.functional.v3 import client_fixtures as fixtures
|
||||||
|
|
||||||
|
|
||||||
|
class UsersTestCase(base.V3ClientTestCase):
|
||||||
|
|
||||||
|
def check_user(self, user, user_ref=None):
|
||||||
|
self.assertIsNotNone(user.id)
|
||||||
|
self.assertIsNotNone(user.enabled)
|
||||||
|
self.assertIn('self', user.links)
|
||||||
|
self.assertIn('/users/' + user.id, user.links['self'])
|
||||||
|
|
||||||
|
if user_ref:
|
||||||
|
self.assertEqual(user_ref['name'], user.name)
|
||||||
|
self.assertEqual(user_ref['domain'], user.domain_id)
|
||||||
|
# There is no guarantee the attributes below are present in user
|
||||||
|
if hasattr(user_ref, 'description'):
|
||||||
|
self.assertEqual(user_ref['description'], user.description)
|
||||||
|
if hasattr(user_ref, 'email'):
|
||||||
|
self.assertEqual(user_ref['email'], user.email)
|
||||||
|
if hasattr(user_ref, 'default_project'):
|
||||||
|
self.assertEqual(user_ref['default_project'],
|
||||||
|
user.default_project_id)
|
||||||
|
else:
|
||||||
|
# Only check remaining mandatory attributes
|
||||||
|
self.assertIsNotNone(user.name)
|
||||||
|
self.assertIsNotNone(user.domain_id)
|
||||||
|
|
||||||
|
def test_create_user(self):
|
||||||
|
user_ref = {
|
||||||
|
'name': fixtures.RESOURCE_NAME_PREFIX + uuid.uuid4().hex,
|
||||||
|
'domain': self.project_domain_id,
|
||||||
|
'default_project': self.project_id,
|
||||||
|
'password': uuid.uuid4().hex,
|
||||||
|
'description': uuid.uuid4().hex}
|
||||||
|
|
||||||
|
user = self.client.users.create(**user_ref)
|
||||||
|
self.addCleanup(self.client.users.delete, user)
|
||||||
|
self.check_user(user, user_ref)
|
||||||
|
|
||||||
|
def test_get_user(self):
|
||||||
|
user = fixtures.User(self.client, self.project_domain_id)
|
||||||
|
self.useFixture(user)
|
||||||
|
|
||||||
|
user_ret = self.client.users.get(user.id)
|
||||||
|
self.check_user(user_ret, user.ref)
|
||||||
|
|
||||||
|
def test_list_users(self):
|
||||||
|
user_one = fixtures.User(self.client, self.project_domain_id)
|
||||||
|
self.useFixture(user_one)
|
||||||
|
|
||||||
|
user_two = fixtures.User(self.client, self.project_domain_id)
|
||||||
|
self.useFixture(user_two)
|
||||||
|
|
||||||
|
users = self.client.users.list()
|
||||||
|
|
||||||
|
# All users are valid
|
||||||
|
for user in users:
|
||||||
|
self.check_user(user)
|
||||||
|
|
||||||
|
self.assertIn(user_one.entity, users)
|
||||||
|
self.assertIn(user_two.entity, users)
|
||||||
|
|
||||||
|
def test_update_user(self):
|
||||||
|
user = fixtures.User(self.client, self.project_domain_id)
|
||||||
|
self.useFixture(user)
|
||||||
|
|
||||||
|
new_description = uuid.uuid4().hex
|
||||||
|
user_ret = self.client.users.update(user.id,
|
||||||
|
description=new_description)
|
||||||
|
|
||||||
|
user.ref.update({'description': new_description})
|
||||||
|
self.check_user(user_ret, user.ref)
|
||||||
|
|
||||||
|
def test_user_grouping(self):
|
||||||
|
# keystoneclient.v3.users owns user grouping operations, this is why
|
||||||
|
# this test case belongs to this class
|
||||||
|
user = fixtures.User(self.client, self.project_domain_id)
|
||||||
|
group = fixtures.Group(self.client, self.project_domain_id)
|
||||||
|
self.useFixture(user)
|
||||||
|
self.useFixture(group)
|
||||||
|
|
||||||
|
self.assertRaises(http.NotFound,
|
||||||
|
self.client.users.check_in_group,
|
||||||
|
user.id, group.id)
|
||||||
|
|
||||||
|
self.client.users.add_to_group(user.id, group.id)
|
||||||
|
self.client.users.check_in_group(user.id, group.id)
|
||||||
|
self.client.users.remove_from_group(user.id, group.id)
|
||||||
|
|
||||||
|
self.assertRaises(http.NotFound,
|
||||||
|
self.client.users.check_in_group,
|
||||||
|
user.id, group.id)
|
||||||
|
|
||||||
|
def test_delete_user(self):
|
||||||
|
user = self.client.users.create(name=uuid.uuid4().hex,
|
||||||
|
domain=self.project_domain_id)
|
||||||
|
|
||||||
|
self.client.users.delete(user.id)
|
||||||
|
self.assertRaises(http.NotFound,
|
||||||
|
self.client.users.get,
|
||||||
|
user.id)
|
Reference in New Issue
Block a user