
Renaming the isolated_creds module to dynamic_creds module, and rename the IsolatedCreds class to DynamicCredentialProvider in preparation to migration to tempest-lib. Partially implements bp tempest-library Change-Id: I78a4884e980ef7d0103639cb3792a54c69fb7761
94 lines
3.8 KiB
Python
94 lines
3.8 KiB
Python
# Copyright (c) 2014 Hewlett-Packard Development Company, L.P.
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import os
|
|
|
|
from tempest.common import accounts
|
|
from tempest.common import cred_provider
|
|
from tempest.common import dynamic_creds
|
|
from tempest import config
|
|
from tempest import exceptions
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
# Return the right implementation of CredentialProvider based on config
|
|
# Dropping interface and password, as they are never used anyways
|
|
# TODO(andreaf) Drop them from the CredentialsProvider interface completely
|
|
def get_credentials_provider(name, network_resources=None,
|
|
force_tenant_isolation=False,
|
|
identity_version=None):
|
|
# If a test requires a new account to work, it can have it via forcing
|
|
# dynamic credentials. A new account will be produced only for that test.
|
|
# In case admin credentials are not available for the account creation,
|
|
# the test should be skipped else it would fail.
|
|
if CONF.auth.use_dynamic_credentials or force_tenant_isolation:
|
|
return dynamic_creds.DynamicCredentialProvider(
|
|
name=name,
|
|
network_resources=network_resources,
|
|
identity_version=identity_version)
|
|
else:
|
|
if (CONF.auth.test_accounts_file and
|
|
os.path.isfile(CONF.auth.test_accounts_file)):
|
|
# Most params are not relevant for pre-created accounts
|
|
return accounts.Accounts(name=name,
|
|
identity_version=identity_version)
|
|
else:
|
|
return accounts.NotLockingAccounts(
|
|
name=name, identity_version=identity_version)
|
|
|
|
|
|
# We want a helper function here to check and see if admin credentials
|
|
# are available so we can do a single call from skip_checks if admin
|
|
# creds area vailable.
|
|
def is_admin_available():
|
|
is_admin = True
|
|
# If dynamic credentials is enabled admin will be available
|
|
if CONF.auth.use_dynamic_credentials:
|
|
return is_admin
|
|
# Check whether test accounts file has the admin specified or not
|
|
elif (CONF.auth.test_accounts_file and
|
|
os.path.isfile(CONF.auth.test_accounts_file)):
|
|
check_accounts = accounts.Accounts(name='check_admin')
|
|
if not check_accounts.admin_available():
|
|
is_admin = False
|
|
else:
|
|
try:
|
|
cred_provider.get_configured_credentials('identity_admin',
|
|
fill_in=False)
|
|
except exceptions.InvalidConfiguration:
|
|
is_admin = False
|
|
return is_admin
|
|
|
|
|
|
# We want a helper function here to check and see if alt credentials
|
|
# are available so we can do a single call from skip_checks if alt
|
|
# creds area vailable.
|
|
def is_alt_available():
|
|
# If dynamic credentials is enabled admin will be available
|
|
if CONF.auth.use_dynamic_credentials:
|
|
return True
|
|
# Check whether test accounts file has the admin specified or not
|
|
if (CONF.auth.test_accounts_file and
|
|
os.path.isfile(CONF.auth.test_accounts_file)):
|
|
check_accounts = accounts.Accounts(name='check_alt')
|
|
else:
|
|
check_accounts = accounts.NotLockingAccounts(name='check_alt')
|
|
try:
|
|
if not check_accounts.is_multi_user():
|
|
return False
|
|
else:
|
|
return True
|
|
except exceptions.InvalidConfiguration:
|
|
return False
|