# Copyright (c) 2014 Hewlett-Packard Development Company, L.P. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. from tempest.common import accounts from tempest.common import cred_provider from tempest.common import isolated_creds from tempest import config from tempest import exceptions CONF = config.CONF # Return the right implementation of CredentialProvider based on config # Dropping interface and password, as they are never used anyways # TODO(andreaf) Drop them from the CredentialsProvider interface completely def get_isolated_credentials(name, network_resources=None, force_tenant_isolation=False): # If a test requires a new account to work, it can have it via forcing # tenant isolation. A new account will be produced only for that test. # In case admin credentials are not available for the account creation, # the test should be skipped else it would fail. if CONF.auth.allow_tenant_isolation or force_tenant_isolation: return isolated_creds.IsolatedCreds( name=name, network_resources=network_resources) else: if CONF.auth.locking_credentials_provider: # Most params are not relevant for pre-created accounts return accounts.Accounts(name=name) else: return accounts.NotLockingAccounts(name=name) # We want a helper function here to check and see if admin credentials # are available so we can do a single call from skip_checks if admin # creds area vailable. def is_admin_available(): is_admin = True # In the case of a pre-provisioned account, if even if creds were # configured, the admin credentials won't be available if (CONF.auth.locking_credentials_provider and not CONF.auth.allow_tenant_isolation): is_admin = False else: try: cred_provider.get_configured_credentials('identity_admin') # NOTE(mtreinish) This should never be caught because of the if above. # NotImplementedError is only raised if admin credentials are requested # and the locking test accounts cred provider is being used. except NotImplementedError: is_admin = False # NOTE(mtreinish): This will be raised by the non-locking accounts # provider if there aren't admin credentials provided in the config # file. This exception originates from the auth call to get configured # credentials except exceptions.InvalidConfiguration: is_admin = False return is_admin