keystoneauth1.tests.unit.identity package¶
Submodules¶
keystoneauth1.tests.unit.identity.test_access module¶
keystoneauth1.tests.unit.identity.test_identity_common module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_common.CatalogHackTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
BASE_URL= ‘http://keystone.server:5000/’¶
-
IDENTITY= ‘identity’¶
-
OTHER_URL= ‘http://other.server:5000/path’¶
-
TEST_URL= ‘http://keystone.server:5000/v2.0’¶
-
V2_URL= ‘http://keystone.server:5000/v2.0’¶
-
V3_URL= ‘http://keystone.server:5000/v3’¶
-
test_endpoint_override_data_runs_discovery()¶
-
test_endpoint_override_skips_discovery()¶
-
test_forcing_discovery()¶
-
test_forcing_discovery_list_returns_url()¶
-
test_get_endpoint_data()¶
-
test_get_endpoint_data_compute()¶
-
test_getting_endpoints()¶
-
test_getting_endpoints_on_auth_interface()¶
-
test_latest_version_gets_latest_version()¶
-
test_returns_original_skipping_discovery()¶
-
test_returns_original_when_discover_fails()¶
-
test_setting_no_discover_hack()¶
-
test_version_range()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests¶ Bases:
object-
PROJECT_ID= ‘d0713e6f35b842a68a875fefcc6cac4c’¶
-
TEST_BAREMETAL_BASE= ‘https://baremetal.example.com’¶
-
TEST_BAREMETAL_INTERNAL= ‘https://baremetal.example.com/internal’¶
-
TEST_COMPUTE_ADMIN= ‘https://compute.example.com/nova/admin’¶
-
TEST_COMPUTE_BASE= ‘https://compute.example.com’¶
-
TEST_COMPUTE_INTERNAL= ‘https://compute.example.com/nova/internal’¶
-
TEST_COMPUTE_PUBLIC= ‘https://compute.example.com/nova/public’¶
-
TEST_PASS= ‘83779ed604784affbdc7d685b4062f6b’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_VOLUME= <keystoneauth1.tests.unit.identity.test_identity_common.FakeServiceEndpoints object>¶
-
assertAccessInfoEqual(a, b)¶
-
create_auth_plugin(**kwargs)¶ Create an auth plugin that makes sense for the auth data.
It doesn’t really matter what auth mechanism is used but it should be appropriate to the API version.
-
get_auth_data(**kwargs)¶ Return fake authentication data.
This should register a valid token response and ensure that the compute endpoints are set to TEST_COMPUTE_PUBLIC, _INTERNAL and _ADMIN.
-
setUp()¶
-
stub_auth_data(**kwargs)¶
-
test_asking_for_auth_endpoint_ignores_checks()¶
-
test_check_cache_id_match()¶
-
test_check_cache_id_no_match()¶
-
test_direct_discovering()¶
-
test_direct_discovering_with_no_data()¶
-
test_direct_discovering_with_relative_link()¶
-
test_direct_discovery_provided_plugin_cache()¶
-
test_discovering()¶
-
test_discovering_when_version_missing()¶
-
test_discovering_with_no_data()¶
-
test_discovering_with_protocol_relative()¶
-
test_discovering_with_relative_anchored_link()¶
-
test_discovering_with_relative_link()¶
-
test_discovery_uses_plugin_cache()¶
-
test_discovery_uses_provided_session_cache()¶
-
test_discovery_uses_session_cache()¶
-
test_discovery_uses_session_plugin_cache()¶
-
test_endpoint_data_no_version()¶
-
test_endpoint_data_no_version_no_discovery()¶
-
test_endpoint_data_relative_version()¶
-
test_endpoint_no_version()¶
-
test_get_auth_properties()¶
-
test_get_set_auth_state()¶
-
test_get_versioned_data()¶
-
test_get_versioned_data_volume_project_id()¶
-
test_get_versioned_data_volume_project_id_unversioned_first()¶
-
test_interface_list()¶
-
test_invalidate()¶
-
test_no_reauthenticate()¶
-
test_reauthenticate()¶
-
version¶ The API version being tested.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.FakeServiceEndpoints(base_url, versions=None, project_id=None, **kwargs)¶ Bases:
object
-
class
keystoneauth1.tests.unit.identity.test_identity_common.GenericAuthPluginTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
ENDPOINT_FILTER= {‘99abf1f3152d460e9b6c6071c6acb00f’: ‘b9eb3761420646b59cba3b8dc4fea6f2’}¶
-
setUp()¶
-
test_setting_bad_connection_params()¶
-
test_setting_connection_params()¶
-
test_setting_headers()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.GenericPlugin¶ Bases:
keystoneauth1.plugin.BaseAuthPlugin-
BAD_TOKEN= ‘9ac2bfe985f14a11a20a7d6953f6642a’¶
-
get_connection_params(session, **kwargs)¶
-
get_endpoint(session, **kwargs)¶
-
get_headers(session, **kwargs)¶
-
get_token(session, **kwargs)¶
-
url(prefix)¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.V2(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,keystoneauth1.tests.unit.utils.TestCase-
create_auth_plugin(**kwargs)¶
-
get_auth_data(**kwargs)¶
-
stub_auth(**kwargs)¶
-
version¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_common.V3(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,keystoneauth1.tests.unit.utils.TestCase-
create_auth_plugin(**kwargs)¶
-
get_auth_data(**kwargs)¶
-
stub_auth(subject_token=None, **kwargs)¶
-
version¶
-
keystoneauth1.tests.unit.identity.test_identity_v2 module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v2.V2IdentityPlugin(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_ADMIN_URL= ‘http://127.0.0.1:35357/v2.0’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_SERVICE_CATALOG= [{‘endpoints’: [{‘region’: ‘RegionOne’, ‘publicURL’: ‘http://cdn.admin-nets.local:8774/v1.0/’, ‘adminURL’: ‘http://cdn.admin-nets.local:8774/v1.0’, ‘internalURL’: ‘http://127.0.0.1:8774/v1.0’}], ‘name’: ‘nova_compat’, ‘type’: ‘nova_compat’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘publicURL’: ‘http://nova/novapi/public’, ‘adminURL’: ‘http://nova/novapi/admin’, ‘internalURL’: ‘http://nova/novapi/internal’}], ‘name’: ‘nova’, ‘type’: ‘compute’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘publicURL’: ‘http://glance/glanceapi/public’, ‘adminURL’: ‘http://glance/glanceapi/admin’, ‘internalURL’: ‘http://glance/glanceapi/internal’}], ‘name’: ‘glance’, ‘type’: ‘image’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘publicURL’: ‘http://127.0.0.1:5000/v2.0’, ‘adminURL’: ‘http://127.0.0.1:35357/v2.0’, ‘internalURL’: ‘http://127.0.0.1:5000/v2.0’}], ‘name’: ‘keystone’, ‘type’: ‘identity’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘publicURL’: ‘http://swift/swiftapi/public’, ‘adminURL’: ‘http://swift/swiftapi/admin’, ‘internalURL’: ‘http://swift/swiftapi/internal’}], ‘name’: ‘swift’, ‘type’: ‘object-store’}]¶
-
TEST_URL= ‘http://127.0.0.1:5000/v2.0’¶
-
setUp()¶
-
stub_auth(**kwargs)¶
-
test_authenticate_with_token()¶
-
test_authenticate_with_user_id_password()¶
-
test_authenticate_with_user_id_password_scoped()¶
-
test_authenticate_with_username_password()¶
-
test_authenticate_with_username_password_scoped()¶
-
test_doesnt_log_password()¶
-
test_endpoint_filter_without_service_type_fails()¶
-
test_full_url_overrides_endpoint_filter()¶
-
test_invalid_auth_response_dict()¶
-
test_invalid_auth_response_type()¶
-
test_invalidate_response()¶
-
test_password_cache_id()¶
-
test_password_change_auth_state()¶
-
test_password_with_no_user_id_or_name()¶
-
test_service_url()¶
-
test_service_url_defaults_to_public()¶
-
test_with_trust_id()¶
-
keystoneauth1.tests.unit.identity.test_identity_v3 module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3.V3IdentityPlugin(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_ADMIN_URL= ‘http://127.0.0.1:35357/v3’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_ADMIN_URL= ‘http://127.0.0.1:35357/’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_SERVICE_CATALOG= [{‘endpoints’: [{‘region’: ‘RegionOne’, ‘interface’: ‘public’, ‘url’: ‘http://cdn.admin-nets.local:8774/v1.0/’}, {‘region’: ‘RegionOne’, ‘interface’: ‘internal’, ‘url’: ‘http://127.0.0.1:8774/v1.0’}, {‘region’: ‘RegionOne’, ‘interface’: ‘admin’, ‘url’: ‘http://cdn.admin-nets.local:8774/v1.0’}], ‘type’: ‘nova_compat’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘interface’: ‘public’, ‘url’: ‘http://nova/novapi/public’}, {‘region’: ‘RegionOne’, ‘interface’: ‘internal’, ‘url’: ‘http://nova/novapi/internal’}, {‘region’: ‘RegionOne’, ‘interface’: ‘admin’, ‘url’: ‘http://nova/novapi/admin’}], ‘name’: ‘nova’, ‘type’: ‘compute’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘interface’: ‘public’, ‘url’: ‘http://glance/glanceapi/public’}, {‘region’: ‘RegionOne’, ‘interface’: ‘internal’, ‘url’: ‘http://glance/glanceapi/internal’}, {‘region’: ‘RegionOne’, ‘interface’: ‘admin’, ‘url’: ‘http://glance/glanceapi/admin’}], ‘name’: ‘glance’, ‘type’: ‘image’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘interface’: ‘public’, ‘url’: ‘http://127.0.0.1:5000/v3’}, {‘region’: ‘RegionOne’, ‘interface’: ‘internal’, ‘url’: ‘http://127.0.0.1:5000/v3’}, {‘region’: ‘RegionOne’, ‘interface’: ‘admin’, ‘url’: ‘http://127.0.0.1:35357/v3’}], ‘type’: ‘identity’}, {‘endpoints’: [{‘region’: ‘RegionOne’, ‘interface’: ‘public’, ‘url’: ‘http://swift/swiftapi/public’}, {‘region’: ‘RegionOne’, ‘interface’: ‘internal’, ‘url’: ‘http://swift/swiftapi/internal’}, {‘region’: ‘RegionOne’, ‘interface’: ‘admin’, ‘url’: ‘http://swift/swiftapi/admin’}], ‘type’: ‘object-store’}]¶
-
TEST_SERVICE_PROVIDERS= [{‘id’: ‘sp1’, ‘sp_url’: ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’, ‘auth_url’: ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth’}, {‘id’: ‘sp2’, ‘sp_url’: ‘https://sp2.com/Shibboleth.sso/SAML2/ECP’, ‘auth_url’: ‘https://sp2.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth’}]¶
-
TEST_URL= ‘http://127.0.0.1:5000/v3’¶
-
setUp()¶
-
stub_auth(subject_token=None, **kwargs)¶
-
test_authenticate_with_token()¶
-
test_authenticate_with_username_password()¶
-
test_authenticate_with_username_password_domain_scoped()¶
-
test_authenticate_with_username_password_project_scoped()¶
-
test_doesnt_log_password()¶
-
test_endpoint_filter_without_service_type_fails()¶
-
test_full_url_overrides_endpoint_filter()¶
-
test_handle_missing_service_provider()¶
-
test_invalid_auth_response_dict()¶
-
test_invalid_auth_response_type()¶
-
test_invalidate_response()¶
-
test_password_cache_id()¶
-
test_password_change_auth_state()¶
-
test_sends_nocatalog()¶
-
test_service_providers_urls()¶
-
test_service_url()¶
-
test_service_url_defaults_to_public()¶
-
test_symbols()¶
-
test_unscoped_request()¶
-
test_unscoped_with_scope_data()¶
-
test_with_domain_and_project_scoping()¶
-
test_with_expired()¶
-
test_with_multiple_mechanisms()¶
-
test_with_multiple_mechanisms_factory()¶
-
test_with_multiple_scopes()¶
-
test_with_trust_id()¶
-
keystoneauth1.tests.unit.identity.test_identity_v3_federation module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_federation.K2KAuthPluginTest(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
REQUEST_ECP_URL= ‘http://127.0.0.1:5000/v3/auth/OS-FEDERATION/saml2/ecp’¶
-
SERVICE_PROVIDER_DICT= {‘id’: ‘sp1’, ‘sp_url’: ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’, ‘auth_url’: ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth’}¶
-
SP_AUTH_URL= ‘https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth’¶
-
SP_ID= ‘sp1’¶
-
SP_ROOT_URL= ‘https://sp1.com/v3’¶
-
SP_URL= ‘https://sp1.com/Shibboleth.sso/SAML2/ECP’¶
-
TEST_PASS= ‘password’¶
-
TEST_ROOT_URL= ‘http://127.0.0.1:5000/’¶
-
TEST_URL= ‘http://127.0.0.1:5000/v3’¶
-
get_plugin(**kwargs)¶
-
setUp()¶
-
test_end_to_end_with_generic_password()¶
-
test_end_to_end_workflow()¶
-
test_end_to_end_workflow_303_redirect()¶
-
test_fail_getting_ecp_assertion()¶
-
test_get_ecp_assertion_empty_response()¶
-
test_get_ecp_assertion_wrong_headers()¶
-
test_remote_url()¶
-
test_send_ecp_authn_response()¶
-
test_send_ecp_authn_response_303_redirect()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_federation.TesterFederationPlugin(auth_url, identity_provider, protocol, **kwargs)¶ Bases:
keystoneauth1.identity.v3.federation.FederationBaseAuth-
get_unscoped_auth_ref(sess, **kwargs)¶
-
keystoneauth1.tests.unit.identity.test_identity_v3_oidc module¶
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests¶ Bases:
object-
setUp()¶
-
test_can_pass_grant_type_but_warning_is_issued()¶
-
test_discovery_not_found()¶
-
test_grant_type_and_plugin_missmatch()¶
-
test_invalid_discovery_document()¶
-
test_load_discovery()¶
-
test_load_discovery_override_by_endpoints()¶
-
test_no_access_token_endpoint()¶
-
test_no_discovery()¶
-
test_wrong_grant_type()¶
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCAuthorizationGrantTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCClientCredentialsTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
test_second_call_to_protected_url()¶ Test subsequent call, expect Keystone token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCPasswordTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
test_initial_call_to_get_access_token()¶ Test initial call, expect JSON access token.
-
test_second_call_to_protected_url()¶ Test subsequent call, expect Keystone token.
-
-
class
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCTokenTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
setUp()¶
-
test_end_to_end_workflow()¶ Test full OpenID Connect workflow.
-
keystoneauth1.tests.unit.identity.test_password module¶
-
class
keystoneauth1.tests.unit.identity.test_password.PasswordTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase-
PLUGIN_CLASS¶ alias of
Password
-
V2_PLUGIN_CLASS¶ alias of
Password
-
V3_PLUGIN_CLASS¶ alias of
Password
-
new_plugin(**kwargs)¶
-
test_default_domain_id_with_v3()¶
-
test_default_domain_name_with_v3()¶
-
test_password_cache_id()¶
-
test_symbols()¶
-
test_v3_disocovery_failure_v2_url()¶
-
test_v3_domain_params_v2_url()¶
-
test_v3_user_params_v2_url()¶
-
test_with_user_domain_params()¶
-
keystoneauth1.tests.unit.identity.test_token module¶
-
class
keystoneauth1.tests.unit.identity.test_token.TokenTests(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase-
PLUGIN_CLASS¶ alias of
Token
-
V2_PLUGIN_CLASS¶ alias of
Token
-
V3_PLUGIN_CLASS¶ alias of
Token
-
new_plugin(**kwargs)¶
-
test_symbols()¶
-
test_token_cache_id()¶
-
keystoneauth1.tests.unit.identity.test_tokenless_auth module¶
-
class
keystoneauth1.tests.unit.identity.test_tokenless_auth.TokenlessAuthTest(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
TEST_URL= ‘http://server/prefix’¶
-
create(auth_url, domain_id=None, domain_name=None, project_id=None, project_name=None, project_domain_id=None, project_domain_name=None)¶
-
test_domain_id_scope_header_pass()¶
-
test_domain_name_scope_header_pass()¶
-
test_no_scope_header_fail()¶
-
test_project_id_scope_header_pass()¶
-
test_project_name_scope_only_header_fail()¶
-
test_project_of_domain__name_scope_header_pass()¶
-
test_project_of_domain_id_scope_header_pass()¶
-
keystoneauth1.tests.unit.identity.utils module¶
-
class
keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase-
PLUGIN_CLASS= None¶
-
TEST_URL= ‘http://keystone.host:5000/’¶
-
V2_PLUGIN_CLASS= None¶
-
V3_PLUGIN_CLASS= None¶
-
assertCreateV2(**kwargs)¶
-
assertCreateV3(**kwargs)¶
-
assertDiscoveryFailure(**kwargs)¶
-
new_plugin(**kwargs)¶
-
setUp()¶
-
stub_discovery(base_url=None, **kwargs)¶
-
test_create_plugin_no_reauthenticate()¶
-
test_create_v2_if_no_domain_params()¶
-
test_create_v3_if_domain_params()¶
-
test_default_domain_id_no_v3()¶
-
test_default_domain_id_with_v3(**kwargs)¶
-
test_default_domain_name_no_v3()¶
-
test_default_domain_name_with_v3(**kwargs)¶
-
test_disc_error_for_failure()¶
-
test_no_urls()¶
-
test_path_based_url_v2()¶
-
test_path_based_url_v3()¶
-
test_unknown_discovery_version()¶
-
test_v2_params_v3_url()¶
-
test_v3_params_v2_url()¶
-
test_v3_plugin_from_failure()¶
-