153 lines
6.4 KiB
Python
153 lines
6.4 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import copy
|
|
import json
|
|
|
|
import httpretty
|
|
|
|
from keystoneclient import exceptions
|
|
from keystoneclient.tests.v2_0 import client_fixtures
|
|
from keystoneclient.tests.v2_0 import utils
|
|
from keystoneclient.v2_0 import client
|
|
|
|
|
|
class KeystoneClientTest(utils.TestCase):
|
|
|
|
@httpretty.activate
|
|
def test_unscoped_init(self):
|
|
self.stub_auth(json=client_fixtures.UNSCOPED_TOKEN)
|
|
|
|
c = client.Client(username='exampleuser',
|
|
password='password',
|
|
auth_url=self.TEST_URL)
|
|
self.assertIsNotNone(c.auth_ref)
|
|
self.assertFalse(c.auth_ref.scoped)
|
|
self.assertFalse(c.auth_ref.domain_scoped)
|
|
self.assertFalse(c.auth_ref.project_scoped)
|
|
self.assertIsNone(c.auth_ref.trust_id)
|
|
self.assertFalse(c.auth_ref.trust_scoped)
|
|
|
|
@httpretty.activate
|
|
def test_scoped_init(self):
|
|
self.stub_auth(json=client_fixtures.PROJECT_SCOPED_TOKEN)
|
|
|
|
c = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL)
|
|
self.assertIsNotNone(c.auth_ref)
|
|
self.assertTrue(c.auth_ref.scoped)
|
|
self.assertTrue(c.auth_ref.project_scoped)
|
|
self.assertFalse(c.auth_ref.domain_scoped)
|
|
self.assertIsNone(c.auth_ref.trust_id)
|
|
self.assertFalse(c.auth_ref.trust_scoped)
|
|
|
|
@httpretty.activate
|
|
def test_auth_ref_load(self):
|
|
self.stub_auth(json=client_fixtures.PROJECT_SCOPED_TOKEN)
|
|
|
|
cl = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL)
|
|
cache = json.dumps(cl.auth_ref)
|
|
new_client = client.Client(auth_ref=json.loads(cache))
|
|
self.assertIsNotNone(new_client.auth_ref)
|
|
self.assertTrue(new_client.auth_ref.scoped)
|
|
self.assertTrue(new_client.auth_ref.project_scoped)
|
|
self.assertFalse(new_client.auth_ref.domain_scoped)
|
|
self.assertIsNone(new_client.auth_ref.trust_id)
|
|
self.assertFalse(new_client.auth_ref.trust_scoped)
|
|
self.assertEqual(new_client.username, 'exampleuser')
|
|
self.assertIsNone(new_client.password)
|
|
self.assertEqual(new_client.management_url,
|
|
'http://admin:35357/v2.0')
|
|
|
|
@httpretty.activate
|
|
def test_auth_ref_load_with_overridden_arguments(self):
|
|
self.stub_auth(json=client_fixtures.PROJECT_SCOPED_TOKEN)
|
|
|
|
cl = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL)
|
|
cache = json.dumps(cl.auth_ref)
|
|
new_auth_url = "http://new-public:5000/v2.0"
|
|
new_client = client.Client(auth_ref=json.loads(cache),
|
|
auth_url=new_auth_url)
|
|
self.assertIsNotNone(new_client.auth_ref)
|
|
self.assertTrue(new_client.auth_ref.scoped)
|
|
self.assertTrue(new_client.auth_ref.scoped)
|
|
self.assertTrue(new_client.auth_ref.project_scoped)
|
|
self.assertFalse(new_client.auth_ref.domain_scoped)
|
|
self.assertIsNone(new_client.auth_ref.trust_id)
|
|
self.assertFalse(new_client.auth_ref.trust_scoped)
|
|
self.assertEqual(new_client.auth_url, new_auth_url)
|
|
self.assertEqual(new_client.username, 'exampleuser')
|
|
self.assertIsNone(new_client.password)
|
|
self.assertEqual(new_client.management_url,
|
|
'http://admin:35357/v2.0')
|
|
|
|
def test_init_err_no_auth_url(self):
|
|
self.assertRaises(exceptions.AuthorizationFailure,
|
|
client.Client,
|
|
username='exampleuser',
|
|
password='password')
|
|
|
|
@httpretty.activate
|
|
def test_management_url_is_updated(self):
|
|
second = copy.deepcopy(client_fixtures.PROJECT_SCOPED_TOKEN)
|
|
first_url = 'http://admin:35357/v2.0'
|
|
second_url = "http://secondurl:%d/v2.0'"
|
|
|
|
for entry in second['access']['serviceCatalog']:
|
|
if entry['type'] == 'identity':
|
|
entry['endpoints'] = [{'adminURL': second_url % 35357,
|
|
'internalURL': second_url % 5000,
|
|
'publicURL': second_url % 6000,
|
|
'region': 'RegionOne'}]
|
|
|
|
self.stub_auth(json=client_fixtures.PROJECT_SCOPED_TOKEN)
|
|
cl = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL)
|
|
|
|
self.assertEqual(cl.management_url, first_url)
|
|
|
|
self.stub_auth(json=second)
|
|
cl.authenticate()
|
|
self.assertEqual(cl.management_url, second_url % 35357)
|
|
|
|
@httpretty.activate
|
|
def test_client_with_region_name_passes_to_service_catalog(self):
|
|
# NOTE(jamielennox): this is deprecated behaviour that should be
|
|
# removed ASAP, however must remain compatible.
|
|
self.stub_auth(json=client_fixtures.AUTH_RESPONSE_BODY)
|
|
|
|
cl = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL,
|
|
region_name='North')
|
|
self.assertEqual(cl.service_catalog.url_for(service_type='image'),
|
|
'https://image.north.host/v1/')
|
|
|
|
cl = client.Client(username='exampleuser',
|
|
password='password',
|
|
tenant_name='exampleproject',
|
|
auth_url=self.TEST_URL,
|
|
region_name='South')
|
|
self.assertEqual(cl.service_catalog.url_for(service_type='image'),
|
|
'https://image.south.host/v1/')
|