
As keystoneclient and other services rely more on keystoneauth we should assume that keystoneauth is our base auth library, not keystoneclient and start to default to the objects provided from there. This will make it easier to remove these objects when the time comes. The easiest thing to move is the keystoneclient fixtures in favor of the keystoneauth fixtures. Change-Id: I5a784795536cec6c7ca5eead3f13b1e7a6e45346
100 lines
3.7 KiB
Python
100 lines
3.7 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import copy
|
|
import uuid
|
|
|
|
from keystoneauth1 import fixture
|
|
|
|
from keystoneclient import access
|
|
from keystoneclient.auth.identity import v3
|
|
from keystoneclient import session
|
|
from keystoneclient.tests.unit import utils
|
|
|
|
|
|
class TesterFederationPlugin(v3.FederatedBaseAuth):
|
|
|
|
def get_unscoped_auth_ref(self, sess, **kwargs):
|
|
# This would go and talk to an idp or something
|
|
resp = sess.post(self.federated_token_url, authenticated=False)
|
|
return access.AccessInfo.factory(resp=resp, body=resp.json())
|
|
|
|
|
|
class V3FederatedPlugin(utils.TestCase):
|
|
|
|
AUTH_URL = 'http://keystone/v3'
|
|
|
|
def setUp(self):
|
|
super(V3FederatedPlugin, self).setUp()
|
|
|
|
self.deprecations.expect_deprecations()
|
|
|
|
self.unscoped_token = fixture.V3Token()
|
|
self.unscoped_token_id = uuid.uuid4().hex
|
|
self.scoped_token = copy.deepcopy(self.unscoped_token)
|
|
self.scoped_token.set_project_scope()
|
|
self.scoped_token.methods.append('token')
|
|
self.scoped_token_id = uuid.uuid4().hex
|
|
|
|
s = self.scoped_token.add_service('compute', name='nova')
|
|
s.add_standard_endpoints(public='http://nova/public',
|
|
admin='http://nova/admin',
|
|
internal='http://nova/internal')
|
|
|
|
self.idp = uuid.uuid4().hex
|
|
self.protocol = uuid.uuid4().hex
|
|
|
|
self.token_url = ('%s/OS-FEDERATION/identity_providers/%s/protocols/%s'
|
|
'/auth' % (self.AUTH_URL, self.idp, self.protocol))
|
|
|
|
headers = {'X-Subject-Token': self.unscoped_token_id}
|
|
self.unscoped_mock = self.requests_mock.post(self.token_url,
|
|
json=self.unscoped_token,
|
|
headers=headers)
|
|
|
|
headers = {'X-Subject-Token': self.scoped_token_id}
|
|
auth_url = self.AUTH_URL + '/auth/tokens'
|
|
self.scoped_mock = self.requests_mock.post(auth_url,
|
|
json=self.scoped_token,
|
|
headers=headers)
|
|
|
|
def get_plugin(self, **kwargs):
|
|
kwargs.setdefault('auth_url', self.AUTH_URL)
|
|
kwargs.setdefault('protocol', self.protocol)
|
|
kwargs.setdefault('identity_provider', self.idp)
|
|
return TesterFederationPlugin(**kwargs)
|
|
|
|
def test_federated_url(self):
|
|
plugin = self.get_plugin()
|
|
self.assertEqual(self.token_url, plugin.federated_token_url)
|
|
|
|
def test_unscoped_behaviour(self):
|
|
sess = session.Session(auth=self.get_plugin())
|
|
self.assertEqual(self.unscoped_token_id, sess.get_token())
|
|
|
|
self.assertTrue(self.unscoped_mock.called)
|
|
self.assertFalse(self.scoped_mock.called)
|
|
|
|
def test_scoped_behaviour(self):
|
|
auth = self.get_plugin(project_id=self.scoped_token.project_id)
|
|
sess = session.Session(auth=auth)
|
|
self.assertEqual(self.scoped_token_id, sess.get_token())
|
|
|
|
self.assertTrue(self.unscoped_mock.called)
|
|
self.assertTrue(self.scoped_mock.called)
|
|
|
|
def test_options(self):
|
|
opts = [o.name for o in v3.FederatedBaseAuth.get_options()]
|
|
|
|
self.assertIn('protocol', opts)
|
|
self.assertIn('identity-provider', opts)
|