Iterating over a dict results in the keys. Using the 'in' operator on a dict checks if it's a key. Change-Id: I6affbfa1a79a9e8c0b5b304078a7a8e4e792eecd
		
			
				
	
	
		
			144 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			144 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
 | 
						|
# Copyright 2013 OpenStack Foundation
 | 
						|
# All Rights Reserved.
 | 
						|
#
 | 
						|
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
 | 
						|
#    not use this file except in compliance with the License. You may obtain
 | 
						|
#    a copy of the License at
 | 
						|
#
 | 
						|
#         http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
#    Unless required by applicable law or agreed to in writing, software
 | 
						|
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | 
						|
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | 
						|
#    License for the specific language governing permissions and limitations
 | 
						|
#    under the License.
 | 
						|
 | 
						|
import os
 | 
						|
import re
 | 
						|
 | 
						|
from tempest_lib.cli import base
 | 
						|
from tempest_lib import exceptions
 | 
						|
 | 
						|
 | 
						|
class SimpleReadOnlyKeystoneClientTest(base.ClientTestBase):
 | 
						|
    """Basic, read-only tests for Keystone CLI client.
 | 
						|
 | 
						|
    Checks return values and output of read-only commands.
 | 
						|
    These tests do not presume any content, nor do they create
 | 
						|
    their own. They only verify the structure of output if present.
 | 
						|
    """
 | 
						|
 | 
						|
    def _get_clients(self):
 | 
						|
        path = os.path.join(os.path.abspath('.'), '.tox/functional/bin')
 | 
						|
        cli_dir = os.environ.get('OS_KEYSTONECLIENT_EXEC_DIR', path)
 | 
						|
 | 
						|
        return base.CLIClient(
 | 
						|
            username=os.environ.get('OS_USERNAME'),
 | 
						|
            password=os.environ.get('OS_PASSWORD'),
 | 
						|
            tenant_name=os.environ.get('OS_TENANT_NAME'),
 | 
						|
            uri=os.environ.get('OS_AUTH_URL'),
 | 
						|
            cli_dir=cli_dir)
 | 
						|
 | 
						|
    def keystone(self, *args, **kwargs):
 | 
						|
        return self.clients.keystone(*args, **kwargs)
 | 
						|
 | 
						|
    def test_admin_fake_action(self):
 | 
						|
        self.assertRaises(exceptions.CommandFailed,
 | 
						|
                          self.keystone,
 | 
						|
                          'this-does-not-exist')
 | 
						|
 | 
						|
    def test_admin_catalog_list(self):
 | 
						|
        out = self.keystone('catalog')
 | 
						|
        catalog = self.parser.details_multiple(out, with_label=True)
 | 
						|
        for svc in catalog:
 | 
						|
            if svc.get('__label'):
 | 
						|
                self.assertTrue(svc['__label'].startswith('Service:'),
 | 
						|
                                msg=('Invalid beginning of service block: '
 | 
						|
                                     '%s' % svc['__label']))
 | 
						|
            # check that region and publicURL exists. One might also
 | 
						|
            # check for adminURL and internalURL. id seems to be optional
 | 
						|
            # and is missing in the catalog backend
 | 
						|
            self.assertIn('publicURL', svc)
 | 
						|
            self.assertIn('region', svc)
 | 
						|
 | 
						|
    def test_admin_endpoint_list(self):
 | 
						|
        out = self.keystone('endpoint-list')
 | 
						|
        endpoints = self.parser.listing(out)
 | 
						|
        self.assertTableStruct(endpoints, [
 | 
						|
            'id', 'region', 'publicurl', 'internalurl',
 | 
						|
            'adminurl', 'service_id'])
 | 
						|
 | 
						|
    def test_admin_endpoint_service_match(self):
 | 
						|
        endpoints = self.parser.listing(self.keystone('endpoint-list'))
 | 
						|
        services = self.parser.listing(self.keystone('service-list'))
 | 
						|
        svc_by_id = {}
 | 
						|
        for svc in services:
 | 
						|
            svc_by_id[svc['id']] = svc
 | 
						|
        for endpoint in endpoints:
 | 
						|
            self.assertIn(endpoint['service_id'], svc_by_id)
 | 
						|
 | 
						|
    def test_admin_role_list(self):
 | 
						|
        roles = self.parser.listing(self.keystone('role-list'))
 | 
						|
        self.assertTableStruct(roles, ['id', 'name'])
 | 
						|
 | 
						|
    def test_admin_service_list(self):
 | 
						|
        services = self.parser.listing(self.keystone('service-list'))
 | 
						|
        self.assertTableStruct(services, ['id', 'name', 'type', 'description'])
 | 
						|
 | 
						|
    def test_admin_tenant_list(self):
 | 
						|
        tenants = self.parser.listing(self.keystone('tenant-list'))
 | 
						|
        self.assertTableStruct(tenants, ['id', 'name', 'enabled'])
 | 
						|
 | 
						|
    def test_admin_user_list(self):
 | 
						|
        users = self.parser.listing(self.keystone('user-list'))
 | 
						|
        self.assertTableStruct(users, [
 | 
						|
            'id', 'name', 'enabled', 'email'])
 | 
						|
 | 
						|
    def test_admin_user_role_list(self):
 | 
						|
        user_roles = self.parser.listing(self.keystone('user-role-list'))
 | 
						|
        self.assertTableStruct(user_roles, [
 | 
						|
            'id', 'name', 'user_id', 'tenant_id'])
 | 
						|
 | 
						|
    def test_admin_discover(self):
 | 
						|
        discovered = self.keystone('discover')
 | 
						|
        self.assertIn('Keystone found at http', discovered)
 | 
						|
        self.assertIn('supports version', discovered)
 | 
						|
 | 
						|
    def test_admin_help(self):
 | 
						|
        help_text = self.keystone('help')
 | 
						|
        lines = help_text.split('\n')
 | 
						|
        self.assertFirstLineStartsWith(lines, 'usage: keystone')
 | 
						|
 | 
						|
        commands = []
 | 
						|
        cmds_start = lines.index('Positional arguments:')
 | 
						|
        cmds_end = lines.index('Optional arguments:')
 | 
						|
        command_pattern = re.compile('^ {4}([a-z0-9\-\_]+)')
 | 
						|
        for line in lines[cmds_start:cmds_end]:
 | 
						|
            match = command_pattern.match(line)
 | 
						|
            if match:
 | 
						|
                commands.append(match.group(1))
 | 
						|
        commands = set(commands)
 | 
						|
        wanted_commands = set(('catalog', 'endpoint-list', 'help',
 | 
						|
                               'token-get', 'discover', 'bootstrap'))
 | 
						|
        self.assertFalse(wanted_commands - commands)
 | 
						|
 | 
						|
    def test_admin_bashcompletion(self):
 | 
						|
        self.keystone('bash-completion')
 | 
						|
 | 
						|
    def test_admin_ec2_credentials_list(self):
 | 
						|
        creds = self.keystone('ec2-credentials-list')
 | 
						|
        creds = self.parser.listing(creds)
 | 
						|
        self.assertTableStruct(creds, ['tenant', 'access', 'secret'])
 | 
						|
 | 
						|
    # Optional arguments:
 | 
						|
 | 
						|
    def test_admin_version(self):
 | 
						|
        self.keystone('', flags='--version')
 | 
						|
 | 
						|
    def test_admin_debug_list(self):
 | 
						|
        self.keystone('catalog', flags='--debug')
 | 
						|
 | 
						|
    def test_admin_timeout(self):
 | 
						|
        self.keystone('catalog', flags='--timeout %d' % 15)
 |