keystoneauth1.tests.unit.identity package¶
Submodules¶
keystoneauth1.tests.unit.identity.test_access module¶
keystoneauth1.tests.unit.identity.test_identity_common module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_common.CatalogHackTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
BASE_URL= ‘http://keystone.server:5000/’¶
-
IDENTITY= ‘identity’¶
-
OTHER_URL= ‘http://other.server:5000/path’¶
-
TEST_URL= ‘http://keystone.server:5000/v2.0’¶
-
V2_URL= ‘http://keystone.server:5000/v2.0’¶
-
V3_URL= ‘http://keystone.server:5000/v3’¶
-
test_getting_endpoints()¶
-
test_getting_endpoints_on_auth_interface()¶
-
test_returns_original_when_discover_fails()¶
-
test_setting_no_discover_hack()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests¶ Bases:
object-
TEST_COMPUTE_ADMIN= ‘http://nova/novapi/admin’¶
-
TEST_COMPUTE_BASE= ‘http://nova’¶
-
TEST_COMPUTE_INTERNAL= ‘http://nova/novapi/internal’¶
-
TEST_COMPUTE_PUBLIC= ‘http://nova/novapi/public’¶
-
TEST_PASS= ‘62b0b55a17614d7593c95d9ae0a654b9’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
assertAccessInfoEqual(a, b)¶
-
create_auth_plugin(**kwargs)¶ Create an auth plugin that makes sense for the auth data.
It doesn’t really matter what auth mechanism is used but it should be appropriate to the API version.
-
get_auth_data(**kwargs)¶ Return fake authentication data.
This should register a valid token response and ensure that the compute endpoints are set to TEST_COMPUTE_PUBLIC, _INTERNAL and _ADMIN.
-
setUp()¶
-
stub_auth_data(**kwargs)¶
-
test_asking_for_auth_endpoint_ignores_checks()¶
-
test_check_cache_id_match()¶
-
test_check_cache_id_no_match()¶
-
test_discovering()¶
-
test_discovering_when_version_missing()¶
-
test_discovering_with_no_data()¶
-
test_discovering_with_protocol_relative()¶
-
test_discovering_with_relative_anchored_link()¶
-
test_discovering_with_relative_link()¶
-
test_discovery_uses_plugin_cache()¶
-
test_discovery_uses_session_cache()¶
-
test_get_auth_properties()¶
-
test_get_set_auth_state()¶
-
test_invalidate()¶
-
test_no_reauthenticate()¶
-
test_reauthenticate()¶
-
version¶ The API version being tested.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.GenericAuthPluginTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
ENDPOINT_FILTER= {‘5351d1747afb4043b00dc462469ca679’: ‘733c49d70cd6481e99c4899c3d8c432f’}¶
-
setUp()¶
-
test_setting_bad_connection_params()¶
-
test_setting_connection_params()¶
-
test_setting_headers()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.GenericPlugin¶ Bases:
keystoneauth1.plugin.BaseAuthPlugin-
BAD_TOKEN= ‘4317344b52524451b7dc77d5be92d3fe’¶
-
get_connection_params(session, **kwargs)¶
-
get_endpoint(session, **kwargs)¶
-
get_headers(session, **kwargs)¶
-
get_token(session, **kwargs)¶
-
url(prefix)¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.V2(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,keystoneauth1.tests.unit.utils.TestCase-
create_auth_plugin(**kwargs)¶
-
get_auth_data(**kwargs)¶
-
stub_auth(**kwargs)¶
-
version¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.V3(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,keystoneauth1.tests.unit.utils.TestCase-
create_auth_plugin(**kwargs)¶
-
get_auth_data(**kwargs)¶
-
stub_auth(subject_token=None, **kwargs)¶
-
version¶
-
keystoneauth1.tests.unit.identity.test_identity_v2 module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v2.V2IdentityPlugin(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_ADMIN_URL= ‘http://127.0.0.1:35357/v2.0’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_SERVICE_CATALOG= [{‘type’: ‘nova_compat’, ‘endpoints’: [{‘internalURL’: ‘http://127.0.0.1:8774/v1.0’, ‘region’: ‘RegionOne’, ‘publicURL’: ‘http://cdn.admin-nets.local:8774/v1.0/’, ‘adminURL’: ‘http://cdn.admin-nets.local:8774/v1.0’}], ‘name’: ‘nova_compat’}, {‘type’: ‘compute’, ‘endpoints’: [{‘internalURL’: ‘http://nova/novapi/internal’, ‘region’: ‘RegionOne’, ‘publicURL’: ‘http://nova/novapi/public’, ‘adminURL’: ‘http://nova/novapi/admin’}], ‘name’: ‘nova’}, {‘type’: ‘image’, ‘endpoints’: [{‘internalURL’: ‘http://glance/glanceapi/internal’, ‘region’: ‘RegionOne’, ‘publicURL’: ‘http://glance/glanceapi/public’, ‘adminURL’: ‘http://glance/glanceapi/admin’}], ‘name’: ‘glance’}, {‘type’: ‘identity’, ‘endpoints’: [{‘internalURL’: ‘http://127.0.0.1:5000/v2.0’, ‘region’: ‘RegionOne’, ‘publicURL’: ‘http://127.0.0.1:5000/v2.0’, ‘adminURL’: ‘http://127.0.0.1:35357/v2.0’}], ‘name’: ‘keystone’}, {‘type’: ‘object-store’, ‘endpoints’: [{‘internalURL’: ‘http://swift/swiftapi/internal’, ‘region’: ‘RegionOne’, ‘publicURL’: ‘http://swift/swiftapi/public’, ‘adminURL’: ‘http://swift/swiftapi/admin’}], ‘name’: ‘swift’}]¶
-
TEST_URL= ‘http://127.0.0.1:5000/v2.0’¶
-
setUp()¶
-
stub_auth(**kwargs)¶
-
test_authenticate_with_token()¶
-
test_authenticate_with_user_id_password()¶
-
test_authenticate_with_user_id_password_scoped()¶
-
test_authenticate_with_username_password()¶
-
test_authenticate_with_username_password_scoped()¶
-
test_doesnt_log_password()¶
-
test_endpoint_filter_without_service_type_fails()¶
-
test_full_url_overrides_endpoint_filter()¶
-
test_invalid_auth_response_dict()¶
-
test_invalid_auth_response_type()¶
-
test_invalidate_response()¶
-
test_password_cache_id()¶
-
test_password_change_auth_state()¶
-
test_password_with_no_user_id_or_name()¶
-
test_service_url()¶
-
test_service_url_defaults_to_public()¶
-
test_with_trust_id()¶
-
keystoneauth1.tests.unit.identity.test_identity_v3 module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3.V3IdentityPlugin(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_ADMIN_URL= ‘http://127.0.0.1:35357/v3’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_SERVICE_CATALOG= [{‘type’: ‘nova_compat’, ‘endpoints’: [{‘url’: ‘http://cdn.admin-nets.local:8774/v1.0/’, ‘region’: ‘RegionOne’, ‘interface’: ‘public’}, {‘url’: ‘http://127.0.0.1:8774/v1.0’, ‘region’: ‘RegionOne’, ‘interface’: ‘internal’}, {‘url’: ‘http://cdn.admin-nets.local:8774/v1.0’, ‘region’: ‘RegionOne’, ‘interface’: ‘admin’}]}, {‘type’: ‘compute’, ‘endpoints’: [{‘url’: ‘http://nova/novapi/public’, ‘region’: ‘RegionOne’, ‘interface’: ‘public’}, {‘url’: ‘http://nova/novapi/internal’, ‘region’: ‘RegionOne’, ‘interface’: ‘internal’}, {‘url’: ‘http://nova/novapi/admin’, ‘region’: ‘RegionOne’, ‘interface’: ‘admin’}], ‘name’: ‘nova’}, {‘type’: ‘image’, ‘endpoints’: [{‘url’: ‘http://glance/glanceapi/public’, ‘region’: ‘RegionOne’, ‘interface’: ‘public’}, {‘url’: ‘http://glance/glanceapi/internal’, ‘region’: ‘RegionOne’, ‘interface’: ‘internal’}, {‘url’: ‘http://glance/glanceapi/admin’, ‘region’: ‘RegionOne’, ‘interface’: ‘admin’}], ‘name’: ‘glance’}, {‘type’: ‘identity’, ‘endpoints’: [{‘url’: ‘http://127.0.0.1:5000/v3’, ‘region’: ‘RegionOne’, ‘interface’: ‘public’}, {‘url’: ‘http://127.0.0.1:5000/v3’, ‘region’: ‘RegionOne’, ‘interface’: ‘internal’}, {‘url’: ‘http://127.0.0.1:35357/v3’, ‘region’: ‘RegionOne’, ‘interface’: ‘admin’}]}, {‘type’: ‘object-store’, ‘endpoints’: [{‘url’: ‘http://swift/swiftapi/public’, ‘region’: ‘RegionOne’, ‘interface’: ‘public’}, {‘url’: ‘http://swift/swiftapi/internal’, ‘region’: ‘RegionOne’, ‘interface’: ‘internal’}, {‘url’: ‘http://swift/swiftapi/admin’, ‘region’: ‘RegionOne’, ‘interface’: ‘admin’}]}]¶
-
TEST_SERVICE_PROVIDERS= [{‘auth_url’: ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth’, ‘sp_url’: ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’, ‘id’: ‘sp1’}, {‘auth_url’: ‘https://sp2.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth’, ‘sp_url’: ‘https://sp2.com/Shibboleth.sso/SAML2/ECP’, ‘id’: ‘sp2’}]¶
-
TEST_URL= ‘http://127.0.0.1:5000/v3’¶
-
setUp()¶
-
stub_auth(subject_token=None, **kwargs)¶
-
test_authenticate_with_token()¶
-
test_authenticate_with_username_password()¶
-
test_authenticate_with_username_password_domain_scoped()¶
-
test_authenticate_with_username_password_project_scoped()¶
-
test_doesnt_log_password()¶
-
test_endpoint_filter_without_service_type_fails()¶
-
test_full_url_overrides_endpoint_filter()¶
-
test_handle_missing_service_provider()¶
-
test_invalid_auth_response_dict()¶
-
test_invalid_auth_response_type()¶
-
test_invalidate_response()¶
-
test_password_cache_id()¶
-
test_password_change_auth_state()¶
-
test_sends_nocatalog()¶
-
test_service_providers_urls()¶
-
test_service_url()¶
-
test_service_url_defaults_to_public()¶
-
test_symbols()¶
-
test_unscoped_request()¶
-
test_unscoped_with_scope_data()¶
-
test_with_domain_and_project_scoping()¶
-
test_with_expired()¶
-
test_with_multiple_mechanisms()¶
-
test_with_multiple_mechanisms_factory()¶
-
test_with_multiple_scopes()¶
-
test_with_trust_id()¶
-
keystoneauth1.tests.unit.identity.test_identity_v3_federation module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_federation.K2KAuthPluginTest(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
REQUEST_ECP_URL= ‘http://127.0.0.1:5000/v3/auth/OS-FEDERATION/saml2/ecp’¶
-
SERVICE_PROVIDER_DICT= {‘auth_url’: ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth’, ‘sp_url’: ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’, ‘id’: ‘sp1’}¶
-
SP_AUTH_URL= ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth’¶
-
SP_ID= ‘sp1’¶
-
SP_ROOT_URL= ‘https://sp1.com/v3’¶
-
SP_URL= ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_URL= ‘http://127.0.0.1:5000/v3’¶
-
get_plugin(**kwargs)¶
-
setUp()¶
-
test_end_to_end_with_generic_password()¶
-
test_end_to_end_workflow()¶
-
test_end_to_end_workflow_303_redirect()¶
-
test_fail_getting_ecp_assertion()¶
-
test_get_ecp_assertion_empty_response()¶
-
test_get_ecp_assertion_wrong_headers()¶
-
test_remote_url()¶
-
test_send_ecp_authn_response()¶
-
test_send_ecp_authn_response_303_redirect()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_federation.TesterFederationPlugin(auth_url, identity_provider, protocol, **kwargs)¶ Bases:
keystoneauth1.identity.v3.federation.FederationBaseAuth-
get_unscoped_auth_ref(sess, **kwargs)¶
-
keystoneauth1.tests.unit.identity.test_identity_v3_oidc module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests¶ Bases:
object-
setUp()¶
-
test_can_pass_grant_type_but_warning_is_issued()¶
-
test_discovery_not_found()¶
-
test_grant_type_and_plugin_missmatch()¶
-
test_invalid_discovery_document()¶
-
test_load_discovery()¶
-
test_load_discovery_override_by_endpoints()¶
-
test_no_access_token_endpoint()¶
-
test_no_discovery()¶
-
test_wrong_grant_type()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCAuthorizationGrantTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCClientCredentialsTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
test_second_call_to_protected_url()¶ Test subsequent call, expect Keystone token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCPasswordTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
test_second_call_to_protected_url()¶ Test subsequent call, expect Keystone token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCTokenTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
keystoneauth1.tests.unit.identity.test_password module¶
-
class
keystoneauth1.tests.unit.identity.test_password.PasswordTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase-
PLUGIN_CLASS¶ alias of
Password
-
V2_PLUGIN_CLASS¶ alias of
Password
-
V3_PLUGIN_CLASS¶ alias of
Password
-
new_plugin(**kwargs)¶
-
test_default_domain_id_with_v3()¶
-
test_default_domain_name_with_v3()¶
-
test_password_cache_id()¶
-
test_symbols()¶
-
test_v3_disocovery_failure_v2_url()¶
-
test_v3_domain_params_v2_url()¶
-
test_v3_user_params_v2_url()¶
-
test_with_user_domain_params()¶
-
keystoneauth1.tests.unit.identity.test_token module¶
-
class
keystoneauth1.tests.unit.identity.test_token.TokenTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase-
PLUGIN_CLASS¶ alias of
Token
-
V2_PLUGIN_CLASS¶ alias of
Token
-
V3_PLUGIN_CLASS¶ alias of
Token
-
new_plugin(**kwargs)¶
-
test_symbols()¶
-
test_token_cache_id()¶
-
keystoneauth1.tests.unit.identity.test_tokenless_auth module¶
-
class
keystoneauth1.tests.unit.identity.test_tokenless_auth.TokenlessAuthTest(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_URL= ‘http://server/prefix’¶
-
create(auth_url, domain_id=None, domain_name=None, project_id=None, project_name=None, project_domain_id=None, project_domain_name=None)¶
-
test_domain_id_scope_header_pass()¶
-
test_domain_name_scope_header_pass()¶
-
test_no_scope_header_fail()¶
-
test_project_id_scope_header_pass()¶
-
test_project_name_scope_only_header_fail()¶
-
test_project_of_domain__name_scope_header_pass()¶
-
test_project_of_domain_id_scope_header_pass()¶
-
keystoneauth1.tests.unit.identity.utils module¶
-
class
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
PLUGIN_CLASS= None¶
-
TEST_URL= ‘http://keystone.host:5000/’¶
-
V2_PLUGIN_CLASS= None¶
-
V3_PLUGIN_CLASS= None¶
-
assertCreateV2(**kwargs)¶
-
assertCreateV3(**kwargs)¶
-
assertDiscoveryFailure(**kwargs)¶
-
new_plugin(**kwargs)¶
-
setUp()¶
-
stub_discovery(base_url=None, **kwargs)¶
-
test_create_plugin_no_reauthenticate()¶
-
test_create_v2_if_no_domain_params()¶
-
test_create_v3_if_domain_params()¶
-
test_default_domain_id_no_v3()¶
-
test_default_domain_id_with_v3(**kwargs)¶
-
test_default_domain_name_no_v3()¶
-
test_default_domain_name_with_v3(**kwargs)¶
-
test_disc_error_for_failure()¶
-
test_no_urls()¶
-
test_path_based_url_v2()¶
-
test_path_based_url_v3()¶
-
test_unknown_discovery_version()¶
-
test_v2_params_v3_url()¶
-
test_v3_params_v2_url()¶
-
test_v3_plugin_from_failure()¶
-