keystoneauth1.tests.unit.identity.test_identity_common.
CatalogHackTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
BASE_URL
= 'http://keystone.server:5000/'¶IDENTITY
= 'identity'¶OTHER_URL
= 'http://other.server:5000/path'¶TEST_URL
= 'http://keystone.server:5000/v2.0'¶V2_URL
= 'http://keystone.server:5000/v2.0'¶V3_URL
= 'http://keystone.server:5000/v3'¶test_endpoint_override_data_runs_discovery
()¶test_endpoint_override_skips_discovery
()¶test_forcing_discovery
()¶test_forcing_discovery_list_returns_url
()¶test_get_endpoint_data
()¶test_get_endpoint_data_compute
()¶test_getting_endpoints
()¶test_getting_endpoints_on_auth_interface
()¶test_latest_version_gets_latest_version
()¶test_returns_original_skipping_discovery
()¶test_returns_original_when_discover_fails
()¶test_setting_no_discover_hack
()¶test_version_range
()¶keystoneauth1.tests.unit.identity.test_identity_common.
CommonIdentityTests
¶Bases: object
PROJECT_ID
= 'bde0c80b676c400880b41ca06edac8b4'¶TEST_BAREMETAL_BASE
= 'https://baremetal.example.com'¶TEST_BAREMETAL_INTERNAL
= 'https://baremetal.example.com/internal'¶TEST_COMPUTE_ADMIN
= 'https://compute.example.com/nova/admin'¶TEST_COMPUTE_BASE
= 'https://compute.example.com'¶TEST_COMPUTE_INTERNAL
= 'https://compute.example.com/nova/internal'¶TEST_COMPUTE_PUBLIC
= 'https://compute.example.com/nova/public'¶TEST_PASS
= 'ca3c598b996246a8ad350e541bf906e5'¶TEST_ROOT_ADMIN_URL
= 'http://127.0.0.1:35357/'¶TEST_ROOT_URL
= 'http://127.0.0.1:5000/'¶TEST_VOLUME
= <keystoneauth1.tests.unit.identity.test_identity_common.FakeServiceEndpoints object>¶assertAccessInfoEqual
(a, b)¶create_auth_plugin
(**kwargs)¶Create an auth plugin that makes sense for the auth data.
It doesn’t really matter what auth mechanism is used but it should be appropriate to the API version.
get_auth_data
(**kwargs)¶Return fake authentication data.
This should register a valid token response and ensure that the compute endpoints are set to TEST_COMPUTE_PUBLIC, _INTERNAL and _ADMIN.
setUp
()¶stub_auth_data
(**kwargs)¶test_asking_for_auth_endpoint_ignores_checks
()¶test_check_cache_id_match
()¶test_check_cache_id_no_match
()¶test_direct_discovering
()¶test_direct_discovering_with_no_data
()¶test_direct_discovering_with_relative_link
()¶test_direct_discovery_provided_plugin_cache
()¶test_discovering
()¶test_discovering_when_version_missing
()¶test_discovering_with_no_data
()¶test_discovering_with_protocol_relative
()¶test_discovering_with_relative_anchored_link
()¶test_discovering_with_relative_link
()¶test_discovery_uses_plugin_cache
()¶test_discovery_uses_provided_session_cache
()¶test_discovery_uses_session_cache
()¶test_discovery_uses_session_plugin_cache
()¶test_endpoint_data_no_version
()¶test_endpoint_data_no_version_no_discovery
()¶test_endpoint_data_relative_version
()¶test_endpoint_no_version
()¶test_get_auth_properties
()¶test_get_set_auth_state
()¶test_get_versioned_data
()¶test_get_versioned_data_volume_project_id
()¶test_get_versioned_data_volume_project_id_unversioned_first
()¶test_interface_list
()¶test_invalidate
()¶test_no_reauthenticate
()¶test_reauthenticate
()¶version
¶The API version being tested.
keystoneauth1.tests.unit.identity.test_identity_common.
FakeServiceEndpoints
(base_url, versions=None, project_id=None, **kwargs)¶Bases: object
keystoneauth1.tests.unit.identity.test_identity_common.
GenericAuthPluginTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
ENDPOINT_FILTER
= {'4163ebe1608d46a6aecb1e26e6a761a6': '99a6b002be6d45b5a0852f57566bb569'}¶setUp
()¶test_setting_bad_connection_params
()¶test_setting_connection_params
()¶test_setting_headers
()¶keystoneauth1.tests.unit.identity.test_identity_common.
GenericPlugin
¶Bases: keystoneauth1.plugin.BaseAuthPlugin
BAD_TOKEN
= '1f16a66491ca4764865d8d7e45a70f07'¶get_connection_params
(session, **kwargs)¶get_endpoint
(session, **kwargs)¶get_headers
(session, **kwargs)¶get_token
(session, **kwargs)¶url
(prefix)¶keystoneauth1.tests.unit.identity.test_identity_common.
V2
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests
, keystoneauth1.tests.unit.utils.TestCase
create_auth_plugin
(**kwargs)¶get_auth_data
(**kwargs)¶stub_auth
(**kwargs)¶version
¶keystoneauth1.tests.unit.identity.test_identity_common.
V3
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests
, keystoneauth1.tests.unit.utils.TestCase
create_auth_plugin
(**kwargs)¶get_auth_data
(**kwargs)¶stub_auth
(subject_token=None, **kwargs)¶version
¶keystoneauth1.tests.unit.identity.test_identity_v2.
V2IdentityPlugin
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
TEST_ADMIN_URL
= 'http://127.0.0.1:35357/v2.0'¶TEST_PASS
= 'password'¶TEST_ROOT_ADMIN_URL
= 'http://127.0.0.1:35357/'¶TEST_ROOT_URL
= 'http://127.0.0.1:5000/'¶TEST_SERVICE_CATALOG
= [{'type': 'nova_compat', 'endpoints': [{'publicURL': 'http://cdn.admin-nets.local:8774/v1.0/', 'internalURL': 'http://127.0.0.1:8774/v1.0', 'region': 'RegionOne', 'adminURL': 'http://cdn.admin-nets.local:8774/v1.0'}], 'name': 'nova_compat'}, {'type': 'compute', 'endpoints': [{'publicURL': 'http://nova/novapi/public', 'internalURL': 'http://nova/novapi/internal', 'region': 'RegionOne', 'adminURL': 'http://nova/novapi/admin'}], 'name': 'nova'}, {'type': 'image', 'endpoints': [{'publicURL': 'http://glance/glanceapi/public', 'internalURL': 'http://glance/glanceapi/internal', 'region': 'RegionOne', 'adminURL': 'http://glance/glanceapi/admin'}], 'name': 'glance'}, {'type': 'identity', 'endpoints': [{'publicURL': 'http://127.0.0.1:5000/v2.0', 'internalURL': 'http://127.0.0.1:5000/v2.0', 'region': 'RegionOne', 'adminURL': 'http://127.0.0.1:35357/v2.0'}], 'name': 'keystone'}, {'type': 'object-store', 'endpoints': [{'publicURL': 'http://swift/swiftapi/public', 'internalURL': 'http://swift/swiftapi/internal', 'region': 'RegionOne', 'adminURL': 'http://swift/swiftapi/admin'}], 'name': 'swift'}]¶TEST_URL
= 'http://127.0.0.1:5000/v2.0'¶setUp
()¶stub_auth
(**kwargs)¶test_authenticate_with_token
()¶test_authenticate_with_user_id_password
()¶test_authenticate_with_user_id_password_scoped
()¶test_authenticate_with_username_password
()¶test_authenticate_with_username_password_scoped
()¶test_doesnt_log_password
()¶test_endpoint_filter_without_service_type_fails
()¶test_full_url_overrides_endpoint_filter
()¶test_invalid_auth_response_dict
()¶test_invalid_auth_response_type
()¶test_invalidate_response
()¶test_password_cache_id
()¶test_password_change_auth_state
()¶test_password_with_no_user_id_or_name
()¶test_service_url
()¶test_service_url_defaults_to_public
()¶test_with_trust_id
()¶keystoneauth1.tests.unit.identity.test_identity_v3.
V3IdentityPlugin
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
TEST_ADMIN_URL
= 'http://127.0.0.1:35357/v3'¶TEST_PASS
= 'password'¶TEST_ROOT_ADMIN_URL
= 'http://127.0.0.1:35357/'¶TEST_ROOT_URL
= 'http://127.0.0.1:5000/'¶TEST_SERVICE_CATALOG
= [{'type': 'nova_compat', 'endpoints': [{'url': 'http://cdn.admin-nets.local:8774/v1.0/', 'region': 'RegionOne', 'interface': 'public'}, {'url': 'http://127.0.0.1:8774/v1.0', 'region': 'RegionOne', 'interface': 'internal'}, {'url': 'http://cdn.admin-nets.local:8774/v1.0', 'region': 'RegionOne', 'interface': 'admin'}]}, {'type': 'compute', 'endpoints': [{'url': 'http://nova/novapi/public', 'region': 'RegionOne', 'interface': 'public'}, {'url': 'http://nova/novapi/internal', 'region': 'RegionOne', 'interface': 'internal'}, {'url': 'http://nova/novapi/admin', 'region': 'RegionOne', 'interface': 'admin'}], 'name': 'nova'}, {'type': 'image', 'endpoints': [{'url': 'http://glance/glanceapi/public', 'region': 'RegionOne', 'interface': 'public'}, {'url': 'http://glance/glanceapi/internal', 'region': 'RegionOne', 'interface': 'internal'}, {'url': 'http://glance/glanceapi/admin', 'region': 'RegionOne', 'interface': 'admin'}], 'name': 'glance'}, {'type': 'identity', 'endpoints': [{'url': 'http://127.0.0.1:5000/v3', 'region': 'RegionOne', 'interface': 'public'}, {'url': 'http://127.0.0.1:5000/v3', 'region': 'RegionOne', 'interface': 'internal'}, {'url': 'http://127.0.0.1:35357/v3', 'region': 'RegionOne', 'interface': 'admin'}]}, {'type': 'object-store', 'endpoints': [{'url': 'http://swift/swiftapi/public', 'region': 'RegionOne', 'interface': 'public'}, {'url': 'http://swift/swiftapi/internal', 'region': 'RegionOne', 'interface': 'internal'}, {'url': 'http://swift/swiftapi/admin', 'region': 'RegionOne', 'interface': 'admin'}]}]¶TEST_SERVICE_PROVIDERS
= [{'id': 'sp1', 'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP'}, {'id': 'sp2', 'auth_url': 'https://sp2.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'sp_url': 'https://sp2.com/Shibboleth.sso/SAML2/ECP'}]¶TEST_URL
= 'http://127.0.0.1:5000/v3'¶setUp
()¶stub_auth
(subject_token=None, **kwargs)¶test_authenticate_with_token
()¶test_authenticate_with_username_password
()¶test_authenticate_with_username_password_domain_scoped
()¶test_authenticate_with_username_password_project_scoped
()¶test_doesnt_log_password
()¶test_endpoint_filter_without_service_type_fails
()¶test_full_url_overrides_endpoint_filter
()¶test_handle_missing_service_provider
()¶test_invalid_auth_response_dict
()¶test_invalid_auth_response_type
()¶test_invalidate_response
()¶test_password_cache_id
()¶test_password_change_auth_state
()¶test_sends_nocatalog
()¶test_service_providers_urls
()¶test_service_url
()¶test_service_url_defaults_to_public
()¶test_symbols
()¶test_unscoped_request
()¶test_unscoped_with_scope_data
()¶test_with_domain_and_project_scoping
()¶test_with_expired
()¶test_with_multiple_mechanisms
()¶test_with_multiple_mechanisms_factory
()¶test_with_multiple_scopes
()¶test_with_trust_id
()¶keystoneauth1.tests.unit.identity.test_identity_v3_federation.
K2KAuthPluginTest
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
REQUEST_ECP_URL
= 'http://127.0.0.1:5000/v3/auth/OS-FEDERATION/saml2/ecp'¶SERVICE_PROVIDER_DICT
= {'id': 'sp1', 'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth', 'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP'}¶SP_AUTH_URL
= 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth'¶SP_ID
= 'sp1'¶SP_ROOT_URL
= 'https://sp1.com/v3'¶SP_URL
= 'https://sp1.com/Shibboleth.sso/SAML2/ECP'¶TEST_PASS
= 'password'¶TEST_ROOT_URL
= 'http://127.0.0.1:5000/'¶TEST_URL
= 'http://127.0.0.1:5000/v3'¶get_plugin
(**kwargs)¶setUp
()¶test_end_to_end_with_generic_password
()¶test_end_to_end_workflow
()¶test_end_to_end_workflow_303_redirect
()¶test_fail_getting_ecp_assertion
()¶test_get_ecp_assertion_empty_response
()¶test_get_ecp_assertion_wrong_headers
()¶test_remote_url
()¶test_send_ecp_authn_response
()¶test_send_ecp_authn_response_303_redirect
()¶keystoneauth1.tests.unit.identity.test_identity_v3_federation.
TesterFederationPlugin
(auth_url, identity_provider, protocol, **kwargs)¶Bases: keystoneauth1.identity.v3.federation.FederationBaseAuth
get_unscoped_auth_ref
(sess, **kwargs)¶keystoneauth1.tests.unit.identity.test_identity_v3_oidc.
BaseOIDCTests
¶Bases: object
setUp
()¶test_can_pass_grant_type_but_warning_is_issued
()¶test_discovery_not_found
()¶test_grant_type_and_plugin_missmatch
()¶test_invalid_discovery_document
()¶test_load_discovery
()¶test_load_discovery_override_by_endpoints
()¶test_no_access_token_endpoint
()¶test_no_discovery
()¶test_wrong_grant_type
()¶keystoneauth1.tests.unit.identity.test_identity_v3_oidc.
OIDCAuthorizationGrantTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests
, keystoneauth1.tests.unit.utils.TestCase
setUp
()¶test_initial_call_to_get_access_token
()¶Test initial call, expect JSON access token.
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.
OIDCClientCredentialsTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests
, keystoneauth1.tests.unit.utils.TestCase
setUp
()¶test_end_to_end_workflow
()¶Test full OpenID Connect workflow.
test_initial_call_to_get_access_token
()¶Test initial call, expect JSON access token.
test_second_call_to_protected_url
()¶Test subsequent call, expect Keystone token.
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.
OIDCPasswordTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests
, keystoneauth1.tests.unit.utils.TestCase
setUp
()¶test_end_to_end_workflow
()¶Test full OpenID Connect workflow.
test_initial_call_to_get_access_token
()¶Test initial call, expect JSON access token.
test_second_call_to_protected_url
()¶Test subsequent call, expect Keystone token.
keystoneauth1.tests.unit.identity.test_identity_v3_oidc.
OIDCTokenTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
setUp
()¶test_end_to_end_workflow
()¶Test full OpenID Connect workflow.
keystoneauth1.tests.unit.identity.test_password.
PasswordTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase
PLUGIN_CLASS
¶alias of Password
V2_PLUGIN_CLASS
¶alias of Password
V3_PLUGIN_CLASS
¶alias of Password
new_plugin
(**kwargs)¶test_default_domain_id_with_v3
()¶test_default_domain_name_with_v3
()¶test_password_cache_id
()¶test_symbols
()¶test_v3_disocovery_failure_v2_url
()¶test_v3_domain_params_v2_url
()¶test_v3_user_params_v2_url
()¶test_with_user_domain_params
()¶keystoneauth1.tests.unit.identity.test_token.
TokenTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase
PLUGIN_CLASS
¶alias of Token
V2_PLUGIN_CLASS
¶alias of Token
V3_PLUGIN_CLASS
¶alias of Token
new_plugin
(**kwargs)¶test_symbols
()¶test_token_cache_id
()¶keystoneauth1.tests.unit.identity.test_tokenless_auth.
TokenlessAuthTest
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
TEST_URL
= 'http://server/prefix'¶create
(auth_url, domain_id=None, domain_name=None, project_id=None, project_name=None, project_domain_id=None, project_domain_name=None)¶test_domain_id_scope_header_pass
()¶test_domain_name_scope_header_pass
()¶test_no_scope_header_fail
()¶test_project_id_scope_header_pass
()¶test_project_name_scope_only_header_fail
()¶test_project_of_domain__name_scope_header_pass
()¶test_project_of_domain_id_scope_header_pass
()¶keystoneauth1.tests.unit.identity.utils.
GenericPluginTestCase
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
PLUGIN_CLASS
= None¶TEST_URL
= 'http://keystone.host:5000/'¶V2_PLUGIN_CLASS
= None¶V3_PLUGIN_CLASS
= None¶assertCreateV2
(**kwargs)¶assertCreateV3
(**kwargs)¶assertDiscoveryFailure
(**kwargs)¶new_plugin
(**kwargs)¶setUp
()¶stub_discovery
(base_url=None, **kwargs)¶test_create_plugin_no_reauthenticate
()¶test_create_v2_if_no_domain_params
()¶test_create_v3_if_domain_params
()¶test_default_domain_id_no_v3
()¶test_default_domain_id_with_v3
(**kwargs)¶test_default_domain_name_no_v3
()¶test_default_domain_name_with_v3
(**kwargs)¶test_disc_error_for_failure
()¶test_no_urls
()¶test_path_based_url_v2
()¶test_path_based_url_v3
()¶test_unknown_discovery_version
()¶test_v2_params_v3_url
()¶test_v3_params_v2_url
()¶test_v3_plugin_from_failure
()¶Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.