From ef9496a4fc9b8600dac88666b7159119e663642c Mon Sep 17 00:00:00 2001 From: Marek Denis <marek.denis@cern.ch> Date: Wed, 9 Apr 2014 19:05:36 +0200 Subject: [PATCH] Implement CRUD operations for Identity Providers Operations for: * adding Identity Provider * listing Identity Providers * showing Identity Provider * updating Identity Provider * deleting Identity Provider Change-Id: I4557168309f93e4670116b5c3c0e29252ff0c40f Implements: bp/add-openstackclient-federation-crud --- .../identity/v3/identity_provider.py | 180 +++++++++ openstackclient/tests/identity/v3/fakes.py | 27 ++ .../identity/v3/test_identity_provider.py | 368 ++++++++++++++++++ setup.cfg | 6 + 4 files changed, 581 insertions(+) create mode 100644 openstackclient/identity/v3/identity_provider.py create mode 100644 openstackclient/tests/identity/v3/test_identity_provider.py diff --git a/openstackclient/identity/v3/identity_provider.py b/openstackclient/identity/v3/identity_provider.py new file mode 100644 index 0000000000..f577c31432 --- /dev/null +++ b/openstackclient/identity/v3/identity_provider.py @@ -0,0 +1,180 @@ +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. +# + +"""Identity v3 IdentityProvider action implementations""" + +import logging +import six +import sys + +from cliff import command +from cliff import lister +from cliff import show + +from openstackclient.common import utils + + +class CreateIdentityProvider(show.ShowOne): + """Create identity_provider command""" + + log = logging.getLogger(__name__ + '.CreateIdentityProvider') + + def get_parser(self, prog_name): + parser = super(CreateIdentityProvider, self).get_parser(prog_name) + parser.add_argument( + 'identity_provider_id', + metavar='<identity_provider_id>', + help='New identity provider ID (must be unique)' + ) + parser.add_argument( + '--description', + metavar='<description>', + help='New identity provider description', + ) + + enable_identity_provider = parser.add_mutually_exclusive_group() + enable_identity_provider.add_argument( + '--enable', + dest='enabled', + action='store_true', + default=True, + help='Enable identity provider', + ) + enable_identity_provider.add_argument( + '--disable', + dest='enabled', + action='store_false', + help='Disable the identity provider', + ) + return parser + + def take_action(self, parsed_args): + self.log.debug('take_action(%s)' % parsed_args) + identity_client = self.app.client_manager.identity + idp = identity_client.identity_providers.create( + parsed_args.identity_provider_id, + description=parsed_args.description, + enabled=parsed_args.enabled) + info = {} + info.update(idp._info) + return zip(*sorted(six.iteritems(info))) + + +class DeleteIdentityProvider(command.Command): + """Delete identity provider""" + + log = logging.getLogger(__name__ + '.DeleteIdentityProvider') + + def get_parser(self, prog_name): + parser = super(DeleteIdentityProvider, self).get_parser(prog_name) + parser.add_argument( + 'identity_provider', + metavar='<identity_provider>', + help='ID of the identity provider to be deleted', + ) + return parser + + def take_action(self, parsed_args): + self.log.debug('take_action(%s)' % parsed_args) + identity_client = self.app.client_manager.identity + identity_client.identity_providers.delete( + parsed_args.identity_provider) + return + + +class ListIdentityProvider(lister.Lister): + """List identity providers""" + + log = logging.getLogger(__name__ + '.ListIdentityProvider') + + def take_action(self, parsed_args): + self.log.debug('take_action(%s)' % parsed_args) + columns = ('ID', 'Enabled', 'Description') + data = self.app.client_manager.identity.identity_providers.list() + return (columns, + (utils.get_item_properties( + s, columns, + formatters={}, + ) for s in data)) + + +class SetIdentityProvider(command.Command): + """Set identity provider""" + + log = logging.getLogger(__name__ + '.SetIdentityProvider') + + def get_parser(self, prog_name): + parser = super(SetIdentityProvider, self).get_parser(prog_name) + parser.add_argument( + 'identity_provider', + metavar='<identity_provider>', + help='ID of the identity provider to be changed', + ) + + enable_identity_provider = parser.add_mutually_exclusive_group() + enable_identity_provider.add_argument( + '--enable', + action='store_true', + help='Enable the identity provider', + ) + enable_identity_provider.add_argument( + '--disable', + action='store_true', + help='Disable the identity provider', + ) + return parser + + def take_action(self, parsed_args): + self.log.debug('take_action(%s)' % parsed_args) + identity_client = self.app.client_manager.identity + + if parsed_args.enable is True: + enabled = True + elif parsed_args.disable is True: + enabled = False + else: + sys.stdout.write("Identity Provider not updated, " + "no arguments present") + return (None, None) + + identity_provider = identity_client.identity_providers.update( + parsed_args.identity_provider, enabled=enabled) + info = {} + info.update(identity_provider._info) + return zip(*sorted(six.iteritems(info))) + + +class ShowIdentityProvider(show.ShowOne): + """Show identity provider""" + + log = logging.getLogger(__name__ + '.ShowIdentityProvider') + + def get_parser(self, prog_name): + parser = super(ShowIdentityProvider, self).get_parser(prog_name) + parser.add_argument( + 'identity_provider', + metavar='<identity_provider>', + help='ID of the identity provider to be displayed', + ) + return parser + + def take_action(self, parsed_args): + self.log.debug('take_action(%s)' % parsed_args) + identity_client = self.app.client_manager.identity + identity_provider = utils.find_resource( + identity_client.identity_providers, + parsed_args.identity_provider) + + info = {} + info.update(identity_provider._info) + return zip(*sorted(six.iteritems(info))) diff --git a/openstackclient/tests/identity/v3/fakes.py b/openstackclient/tests/identity/v3/fakes.py index f2696ef8c7..ffa89a5f46 100644 --- a/openstackclient/tests/identity/v3/fakes.py +++ b/openstackclient/tests/identity/v3/fakes.py @@ -105,6 +105,15 @@ TOKEN_WITH_DOMAIN_ID = { 'user_id': user_id, } +idp_id = 'test_idp' +idp_description = 'super exciting IdP description' + +IDENTITY_PROVIDER = { + 'id': idp_id, + 'enabled': True, + 'description': idp_description +} + class FakeIdentityv3Client(object): def __init__(self, **kwargs): @@ -125,6 +134,14 @@ class FakeIdentityv3Client(object): self.management_url = kwargs['endpoint'] +class FakeFederatedClient(FakeIdentityv3Client): + def __init__(self, **kwargs): + super(FakeFederatedClient, self).__init__(**kwargs) + + self.identity_providers = mock.Mock() + self.identity_providers.resource_class = fakes.FakeResource(None, {}) + + class TestIdentityv3(utils.TestCommand): def setUp(self): super(TestIdentityv3, self).setUp() @@ -133,3 +150,13 @@ class TestIdentityv3(utils.TestCommand): endpoint=fakes.AUTH_URL, token=fakes.AUTH_TOKEN, ) + + +class TestFederatedIdentity(utils.TestCommand): + def setUp(self): + super(TestFederatedIdentity, self).setUp() + + self.app.client_manager.identity = FakeFederatedClient( + endpoint=fakes.AUTH_URL, + token=fakes.AUTH_TOKEN + ) diff --git a/openstackclient/tests/identity/v3/test_identity_provider.py b/openstackclient/tests/identity/v3/test_identity_provider.py new file mode 100644 index 0000000000..41015b69ab --- /dev/null +++ b/openstackclient/tests/identity/v3/test_identity_provider.py @@ -0,0 +1,368 @@ +# Copyright 2014 CERN. +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. + +import copy + +from openstackclient.identity.v3 import identity_provider +from openstackclient.tests import fakes +from openstackclient.tests.identity.v3 import fakes as identity_fakes + + +class TestIdentityProvider(identity_fakes.TestFederatedIdentity): + + def setUp(self): + super(TestIdentityProvider, self).setUp() + + self.identity_providers_mock = self.app.client_manager.\ + identity.identity_providers + + self.identity_providers_mock.reset_mock() + + +class TestIdentityProviderCreate(TestIdentityProvider): + + def setUp(self): + super(TestIdentityProviderCreate, self).setUp() + + self.identity_providers_mock.create.return_value = \ + fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True + ) + + self.cmd = identity_provider.CreateIdentityProvider( + self.app, None) + + def test_create_identity_provider_no_options(self): + arglist = [ + identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider_id', identity_fakes.idp_id) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + columns, data = self.cmd.take_action(parsed_args) + + # Set expected values + kwargs = { + 'enabled': True, + 'description': None, + } + + self.identity_providers_mock.create.assert_called_with( + identity_fakes.idp_id, **kwargs) + + collist = ('description', 'enabled', 'id') + self.assertEqual(columns, collist) + datalist = ( + identity_fakes.idp_description, + True, + identity_fakes.idp_id, + ) + self.assertEqual(data, datalist) + + def test_create_identity_provider_description(self): + arglist = ['--description', identity_fakes.idp_description, + identity_fakes.idp_id] + verifylist = [ + ('identity_provider_id', identity_fakes.idp_id), + ('description', identity_fakes.idp_description) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + columns, data = self.cmd.take_action(parsed_args) + + # Set expected values + kwargs = { + 'description': identity_fakes.idp_description, + 'enabled': True, + } + + self.identity_providers_mock.create.assert_called_with( + identity_fakes.idp_id, **kwargs) + + collist = ('description', 'enabled', 'id') + self.assertEqual(columns, collist) + datalist = ( + identity_fakes.idp_description, True, identity_fakes.idp_id, + ) + self.assertEqual(data, datalist) + + def test_create_identity_provider_disabled(self): + + # Prepare FakeResource object + IDENTITY_PROVIDER = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) + IDENTITY_PROVIDER['enabled'] = False + IDENTITY_PROVIDER['description'] = None + + self.identity_providers_mock.create.return_value = \ + fakes.FakeResource( + None, + IDENTITY_PROVIDER, + loaded=True + ) + arglist = ['--disable', + identity_fakes.idp_id] + verifylist = [ + ('identity_provider_id', identity_fakes.idp_id), + + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + columns, data = self.cmd.take_action(parsed_args) + + # Set expected values + kwargs = { + 'enabled': False, + 'description': None + } + + self.identity_providers_mock.create.assert_called_with( + identity_fakes.idp_id, **kwargs) + + collist = ('description', 'enabled', 'id') + self.assertEqual(columns, collist) + datalist = ( + None, + False, + identity_fakes.idp_id, + ) + self.assertEqual(data, datalist) + + +class TestIdentityProviderDelete(TestIdentityProvider): + + def setUp(self): + super(TestIdentityProviderDelete, self).setUp() + + # This is the return value for utils.find_resource() + self.identity_providers_mock.get.return_value = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True) + + self.identity_providers_mock.delete.return_value = None + self.cmd = identity_provider.DeleteIdentityProvider( + self.app, None) + + def test_delete_identity_provider(self): + arglist = [ + identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + self.cmd.take_action(parsed_args) + self.identity_providers_mock.delete.assert_called_with( + identity_fakes.idp_id, + ) + + +class TestIdentityProviderList(TestIdentityProvider): + + def setUp(self): + super(TestIdentityProviderList, self).setUp() + + self.identity_providers_mock.get.return_value = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True, + ) + self.identity_providers_mock.list.return_value = [ + fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True, + ), + ] + + # Get the command object to test + self.cmd = identity_provider.ListIdentityProvider(self.app, None) + + def test_identity_provider_list_no_options(self): + arglist = [] + verifylist = [] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + + # DisplayCommandBase.take_action() returns two tuples + columns, data = self.cmd.take_action(parsed_args) + + self.identity_providers_mock.list.assert_called_with() + + collist = ('ID', 'Enabled', 'Description') + self.assertEqual(columns, collist) + datalist = (( + identity_fakes.idp_id, + True, + identity_fakes.idp_description + + ), ) + self.assertEqual(tuple(data), datalist) + + +class TestIdentityProviderShow(TestIdentityProvider): + + def setUp(self): + super(TestIdentityProviderShow, self).setUp() + + self.identity_providers_mock.get.return_value = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True + ) + + # Get the command object to test + self.cmd = identity_provider.ShowIdentityProvider(self.app, None) + + def test_identity_provider_show(self): + arglist = [ + identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + + columns, data = self.cmd.take_action(parsed_args) + + self.identity_providers_mock.get.assert_called_with( + identity_fakes.idp_id) + + collist = ('description', 'enabled', 'id' ) + self.assertEqual(columns, collist) + datalist = ( + identity_fakes.idp_description, + True, + identity_fakes.idp_id + ) + self.assertEqual(data, datalist) + + +class TestIdentityProviderSet(TestIdentityProvider): + + def setUp(self): + super(TestIdentityProviderSet, self).setUp() + self.cmd = identity_provider.SetIdentityProvider(self.app, None) + + def test_identity_provider_disable(self): + """Disable Identity Provider + + Set Identity Provider's ``enabled`` attribute to False. + + """ + def prepare(self): + """Prepare fake return objects before the test is executed""" + updated_idp = copy.deepcopy(identity_fakes.IDENTITY_PROVIDER) + updated_idp['enabled'] = False + resources = fakes.FakeResource( + None, + updated_idp, + loaded=True + ) + self.identity_providers_mock.update.return_value = resources + + prepare(self) + arglist = [ + '--disable', identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id), + ('enable', False), + ('disable', True) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + columns, data = self.cmd.take_action(parsed_args) + self.identity_providers_mock.update.assert_called_with( + identity_fakes.idp_id, enabled=False) + collist = ('description', 'enabled', 'id' ) + self.assertEqual(columns, collist) + datalist = ( + identity_fakes.idp_description, + False, + identity_fakes.idp_id + ) + self.assertEqual(datalist, data) + + def test_identity_provider_enable(self): + """Enable Identity Provider. + + Set Identity Provider's ``enabled`` attribute to True. + + """ + def prepare(self): + """Prepare fake return objects before the test is executed""" + resources = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True + ) + self.identity_providers_mock.update.return_value = resources + + prepare(self) + arglist = [ + '--enable', identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id), + ('enable', True), + ('disable', False) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + + columns, data = self.cmd.take_action(parsed_args) + self.identity_providers_mock.update.assert_called_with( + identity_fakes.idp_id, enabled=True) + collist = ('description', 'enabled', 'id' ) + self.assertEqual(columns, collist) + datalist = ( + identity_fakes.idp_description, + True, + identity_fakes.idp_id + ) + self.assertEqual(data, datalist) + + def test_identity_provider_no_options(self): + def prepare(self): + """Prepare fake return objects before the test is executed""" + resources = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True + ) + self.identity_providers_mock.get.return_value = resources + + resources = fakes.FakeResource( + None, + copy.deepcopy(identity_fakes.IDENTITY_PROVIDER), + loaded=True + ) + self.identity_providers_mock.update.return_value = resources + + prepare(self) + arglist = [ + identity_fakes.idp_id + ] + verifylist = [ + ('identity_provider', identity_fakes.idp_id), + ('enable', False), + ('disable', False) + ] + parsed_args = self.check_parser(self.cmd, arglist, verifylist) + + columns, data = self.cmd.take_action(parsed_args) + + # expect take_action() to return (None, None) as + # neither --enable nor --disable was specified + self.assertEqual(columns, None) + self.assertEqual(data, None) diff --git a/setup.cfg b/setup.cfg index a2c34e145a..d2a404afe9 100644 --- a/setup.cfg +++ b/setup.cfg @@ -200,6 +200,12 @@ openstack.identity.v3 = group_set = openstackclient.identity.v3.group:SetGroup group_show = openstackclient.identity.v3.group:ShowGroup + identity_provider_create = openstackclient.identity.v3.identity_provider:CreateIdentityProvider + identity_provider_delete = openstackclient.identity.v3.identity_provider:DeleteIdentityProvider + identity_provider_list = openstackclient.identity.v3.identity_provider:ListIdentityProvider + identity_provider_set = openstackclient.identity.v3.identity_provider:SetIdentityProvider + identity_provider_show = openstackclient.identity.v3.identity_provider:ShowIdentityProvider + policy_create = openstackclient.identity.v3.policy:CreatePolicy policy_delete = openstackclient.identity.v3.policy:DeletePolicy policy_list = openstackclient.identity.v3.policy:ListPolicy