keystoneauth1.tests.unit.identity package

keystoneauth1.tests.unit.identity package

Submodules

keystoneauth1.tests.unit.identity.test_access module

class keystoneauth1.tests.unit.identity.test_access.AccessInfoPluginTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

setUp()
test_auth_ref()
test_auth_url()
test_domain_auth_properties()
test_invalidate()
test_project_auth_properties()

keystoneauth1.tests.unit.identity.test_identity_common module

class keystoneauth1.tests.unit.identity.test_identity_common.CatalogHackTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

BASE_URL = 'http://keystone.server:5000/'
IDENTITY = 'identity'
OTHER_URL = 'http://other.server:5000/path'
TEST_URL = 'http://keystone.server:5000/v2.0'
V2_URL = 'http://keystone.server:5000/v2.0'
V3_URL = 'http://keystone.server:5000/v3'
test_endpoint_override_data_runs_discovery()
test_endpoint_override_skips_discovery()
test_forcing_discovery()
test_forcing_discovery_list_returns_url()
test_get_endpoint_data()
test_get_endpoint_data_compute()
test_getting_endpoints()
test_getting_endpoints_on_auth_interface()
test_latest_version_gets_latest_version()
test_returns_original_skipping_discovery()
test_returns_original_when_discover_fails()
test_setting_no_discover_hack()
test_version_range()
class keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests

Bases: object

PROJECT_ID = 'cdf2cbb8afbe4925ac0c5ef9ed83a19a'
TEST_BAREMETAL_BASE = 'https://baremetal.example.com'
TEST_BAREMETAL_INTERNAL = 'https://baremetal.example.com/internal'
TEST_COMPUTE_ADMIN = 'https://compute.example.com/nova/admin'
TEST_COMPUTE_BASE = 'https://compute.example.com'
TEST_COMPUTE_INTERNAL = 'https://compute.example.com/nova/internal'
TEST_COMPUTE_PUBLIC = 'https://compute.example.com/nova/public'
TEST_PASS = '5cc56759fe1e44c09f208df382f3e692'
TEST_ROOT_ADMIN_URL = 'http://127.0.0.1:35357/'
TEST_ROOT_URL = 'http://127.0.0.1:5000/'
TEST_VOLUME = <keystoneauth1.tests.unit.identity.test_identity_common.FakeServiceEndpoints object>
assertAccessInfoEqual(a, b)
create_auth_plugin(**kwargs)

Create an auth plugin that makes sense for the auth data.

It doesn’t really matter what auth mechanism is used but it should be appropriate to the API version.

get_auth_data(**kwargs)

Return fake authentication data.

This should register a valid token response and ensure that the compute endpoints are set to TEST_COMPUTE_PUBLIC, _INTERNAL and _ADMIN.

setUp()
stub_auth_data(**kwargs)
test_asking_for_auth_endpoint_ignores_checks()
test_check_cache_id_match()
test_check_cache_id_no_match()
test_direct_discovering()
test_direct_discovering_with_no_data()
test_direct_discovery_provided_plugin_cache()
test_discovering()
test_discovering_when_version_missing()
test_discovering_with_no_data()
test_discovering_with_protocol_relative()
test_discovery_uses_plugin_cache()
test_discovery_uses_provided_session_cache()
test_discovery_uses_session_cache()
test_discovery_uses_session_plugin_cache()
test_endpoint_data_no_version()
test_endpoint_data_no_version_no_discovery()
test_endpoint_data_relative_version()
test_endpoint_no_version()
test_get_auth_properties()
test_get_set_auth_state()
test_get_versioned_data()
test_get_versioned_data_volume_project_id()
test_get_versioned_data_volume_project_id_unversioned_first()
test_interface_list()
test_invalidate()
test_no_reauthenticate()
test_pathless_url()
test_reauthenticate()
version

The API version being tested.

class keystoneauth1.tests.unit.identity.test_identity_common.FakeServiceEndpoints(base_url, versions=None, project_id=None, **kwargs)

Bases: object

class keystoneauth1.tests.unit.identity.test_identity_common.GenericAuthPluginTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

ENDPOINT_FILTER = {'db5e5885cecc43df99b5e262bd46c8a1': '2aa865a8adf44368bd3e949245737dab'}
setUp()
test_setting_bad_connection_params()
test_setting_connection_params()
test_setting_headers()
class keystoneauth1.tests.unit.identity.test_identity_common.GenericPlugin

Bases: keystoneauth1.plugin.BaseAuthPlugin

BAD_TOKEN = '9b7b7f27b3b04b3fb307eb9d1198ce49'
get_connection_params(session, **kwargs)
get_endpoint(session, **kwargs)
get_headers(session, **kwargs)
get_token(session, **kwargs)
url(prefix)
class keystoneauth1.tests.unit.identity.test_identity_common.V2(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests, keystoneauth1.tests.unit.utils.TestCase

create_auth_plugin(**kwargs)
get_auth_data(**kwargs)
stub_auth(**kwargs)
version
class keystoneauth1.tests.unit.identity.test_identity_common.V3(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests, keystoneauth1.tests.unit.utils.TestCase

create_auth_plugin(**kwargs)
get_auth_data(**kwargs)
stub_auth(subject_token=None, **kwargs)
version

keystoneauth1.tests.unit.identity.test_identity_v2 module

class keystoneauth1.tests.unit.identity.test_identity_v2.V2IdentityPlugin(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

TEST_ADMIN_URL = 'http://127.0.0.1:35357/v2.0'
TEST_PASS = 'password'
TEST_ROOT_ADMIN_URL = 'http://127.0.0.1:35357/'
TEST_ROOT_URL = 'http://127.0.0.1:5000/'
TEST_SERVICE_CATALOG = [{'endpoints': [{'adminURL': 'http://cdn.admin-nets.local:8774/v1.0', 'region': 'RegionOne', 'internalURL': 'http://127.0.0.1:8774/v1.0', 'publicURL': 'http://cdn.admin-nets.local:8774/v1.0/'}], 'type': 'nova_compat', 'name': 'nova_compat'}, {'endpoints': [{'adminURL': 'http://nova/novapi/admin', 'region': 'RegionOne', 'internalURL': 'http://nova/novapi/internal', 'publicURL': 'http://nova/novapi/public'}], 'type': 'compute', 'name': 'nova'}, {'endpoints': [{'adminURL': 'http://glance/glanceapi/admin', 'region': 'RegionOne', 'internalURL': 'http://glance/glanceapi/internal', 'publicURL': 'http://glance/glanceapi/public'}], 'type': 'image', 'name': 'glance'}, {'endpoints': [{'adminURL': 'http://127.0.0.1:35357/v2.0', 'region': 'RegionOne', 'internalURL': 'http://127.0.0.1:5000/v2.0', 'publicURL': 'http://127.0.0.1:5000/v2.0'}], 'type': 'identity', 'name': 'keystone'}, {'endpoints': [{'adminURL': 'http://swift/swiftapi/admin', 'region': 'RegionOne', 'internalURL': 'http://swift/swiftapi/internal', 'publicURL': 'http://swift/swiftapi/public'}], 'type': 'object-store', 'name': 'swift'}]
TEST_URL = 'http://127.0.0.1:5000/v2.0'
setUp()
stub_auth(**kwargs)
test_authenticate_with_token()
test_authenticate_with_user_id_password()
test_authenticate_with_user_id_password_scoped()
test_authenticate_with_username_password()
test_authenticate_with_username_password_scoped()
test_doesnt_log_password()
test_endpoint_filter_without_service_type_fails()
test_full_url_overrides_endpoint_filter()
test_invalid_auth_response_dict()
test_invalid_auth_response_type()
test_invalidate_response()
test_password_cache_id()
test_password_change_auth_state()
test_password_with_no_user_id_or_name()
test_service_url()
test_service_url_defaults_to_public()
test_with_trust_id()

keystoneauth1.tests.unit.identity.test_identity_v3 module

class keystoneauth1.tests.unit.identity.test_identity_v3.V3IdentityPlugin(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

TEST_ADMIN_URL = 'http://127.0.0.1:35357/v3'
TEST_PASS = 'password'
TEST_ROOT_ADMIN_URL = 'http://127.0.0.1:35357/'
TEST_ROOT_URL = 'http://127.0.0.1:5000/'
TEST_SERVICE_CATALOG = [{'endpoints': [{'url': 'http://cdn.admin-nets.local:8774/v1.0/', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:8774/v1.0', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://cdn.admin-nets.local:8774/v1.0', 'interface': 'admin', 'region': 'RegionOne'}], 'type': 'nova_compat'}, {'endpoints': [{'url': 'http://nova/novapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://nova/novapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://nova/novapi/admin', 'interface': 'admin', 'region': 'RegionOne'}], 'type': 'compute', 'name': 'nova'}, {'endpoints': [{'url': 'http://glance/glanceapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://glance/glanceapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://glance/glanceapi/admin', 'interface': 'admin', 'region': 'RegionOne'}], 'type': 'image', 'name': 'glance'}, {'endpoints': [{'url': 'http://127.0.0.1:5000/v3', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:5000/v3', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:35357/v3', 'interface': 'admin', 'region': 'RegionOne'}], 'type': 'identity'}, {'endpoints': [{'url': 'http://swift/swiftapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://swift/swiftapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://swift/swiftapi/admin', 'interface': 'admin', 'region': 'RegionOne'}], 'type': 'object-store'}]
TEST_SERVICE_PROVIDERS = [{'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP', 'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'id': 'sp1'}, {'sp_url': 'https://sp2.com/Shibboleth.sso/SAML2/ECP', 'auth_url': 'https://sp2.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'id': 'sp2'}]
TEST_URL = 'http://127.0.0.1:5000/v3'
setUp()
stub_auth(subject_token=None, **kwargs)
test_authenticate_with_token()
test_authenticate_with_username_password()
test_authenticate_with_username_password_domain_scoped()
test_authenticate_with_username_password_project_scoped()
test_doesnt_log_password()
test_endpoint_filter_without_service_type_fails()
test_full_url_overrides_endpoint_filter()
test_handle_missing_service_provider()
test_invalid_auth_response_dict()
test_invalid_auth_response_type()
test_invalidate_response()
test_password_cache_id()
test_password_change_auth_state()
test_sends_nocatalog()
test_service_providers_urls()
test_service_url()
test_service_url_defaults_to_public()
test_symbols()
test_unscoped_request()
test_unscoped_with_scope_data()
test_with_domain_and_project_scoping()
test_with_expired()
test_with_multiple_mechanisms()
test_with_multiple_mechanisms_factory()
test_with_multiple_scopes()
test_with_trust_id()

keystoneauth1.tests.unit.identity.test_identity_v3_federation module

class keystoneauth1.tests.unit.identity.test_identity_v3_federation.K2KAuthPluginTest(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

REQUEST_ECP_URL = 'http://127.0.0.1:5000/v3/auth/OS-FEDERATION/saml2/ecp'
SERVICE_PROVIDER_DICT = {'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP', 'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth', 'id': 'sp1'}
SP_AUTH_URL = 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth'
SP_ID = 'sp1'
SP_ROOT_URL = 'https://sp1.com/v3'
SP_URL = 'https://sp1.com/Shibboleth.sso/SAML2/ECP'
TEST_PASS = 'password'
TEST_ROOT_URL = 'http://127.0.0.1:5000/'
TEST_URL = 'http://127.0.0.1:5000/v3'
get_plugin(**kwargs)
setUp()
test_end_to_end_with_generic_password()
test_end_to_end_workflow()
test_end_to_end_workflow_303_redirect()
test_fail_getting_ecp_assertion()
test_get_ecp_assertion_empty_response()
test_get_ecp_assertion_wrong_headers()
test_remote_url()
test_send_ecp_authn_response()
test_send_ecp_authn_response_303_redirect()
class keystoneauth1.tests.unit.identity.test_identity_v3_federation.TesterFederationPlugin(auth_url, identity_provider, protocol, **kwargs)

Bases: keystoneauth1.identity.v3.federation.FederationBaseAuth

get_unscoped_auth_ref(sess, **kwargs)
class keystoneauth1.tests.unit.identity.test_identity_v3_federation.V3FederatedPlugin(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

AUTH_URL = 'http://keystone/v3'
get_plugin(**kwargs)
setUp()
test_federated_url()
test_scoped_behaviour()
test_unscoped_behaviour()

keystoneauth1.tests.unit.identity.test_identity_v3_oidc module

class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests

Bases: object

setUp()
test_can_pass_grant_type_but_warning_is_issued()
test_discovery_not_found()
test_grant_type_and_plugin_missmatch()
test_invalid_discovery_document()
test_load_discovery()
test_load_discovery_override_by_endpoints()
test_no_access_token_endpoint()
test_no_discovery()
test_wrong_grant_type()
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCAuthorizationGrantTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests, keystoneauth1.tests.unit.utils.TestCase

setUp()
test_initial_call_to_get_access_token()

Test initial call, expect JSON access token.

class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCClientCredentialsTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests, keystoneauth1.tests.unit.utils.TestCase

setUp()
test_end_to_end_workflow()

Test full OpenID Connect workflow.

test_initial_call_to_get_access_token()

Test initial call, expect JSON access token.

test_second_call_to_protected_url()

Test subsequent call, expect Keystone token.

class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCPasswordTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests, keystoneauth1.tests.unit.utils.TestCase

setUp()
test_end_to_end_workflow()

Test full OpenID Connect workflow.

test_initial_call_to_get_access_token()

Test initial call, expect JSON access token.

test_second_call_to_protected_url()

Test subsequent call, expect Keystone token.

class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCTokenTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

setUp()
test_end_to_end_workflow()

Test full OpenID Connect workflow.

keystoneauth1.tests.unit.identity.test_password module

class keystoneauth1.tests.unit.identity.test_password.PasswordTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase

PLUGIN_CLASS

alias of Password

V2_PLUGIN_CLASS

alias of Password

V3_PLUGIN_CLASS

alias of Password

new_plugin(**kwargs)
test_default_domain_id_with_v3()
test_default_domain_name_with_v3()
test_password_cache_id()
test_symbols()
test_v3_disocovery_failure_v2_url()
test_v3_domain_params_v2_url()
test_v3_user_params_v2_url()
test_with_user_domain_params()

keystoneauth1.tests.unit.identity.test_token module

class keystoneauth1.tests.unit.identity.test_token.TokenTests(*args, **kwargs)

Bases: keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase

PLUGIN_CLASS

alias of Token

V2_PLUGIN_CLASS

alias of Token

V3_PLUGIN_CLASS

alias of Token

new_plugin(**kwargs)
test_symbols()
test_token_cache_id()

keystoneauth1.tests.unit.identity.test_tokenless_auth module

class keystoneauth1.tests.unit.identity.test_tokenless_auth.TokenlessAuthTest(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

TEST_URL = 'http://server/prefix'
create(auth_url, domain_id=None, domain_name=None, project_id=None, project_name=None, project_domain_id=None, project_domain_name=None)
test_domain_id_scope_header_pass()
test_domain_name_scope_header_pass()
test_no_scope_header_fail()
test_project_id_scope_header_pass()
test_project_name_scope_only_header_fail()
test_project_of_domain__name_scope_header_pass()
test_project_of_domain_id_scope_header_pass()

keystoneauth1.tests.unit.identity.utils module

class keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase(*args, **kwargs)

Bases: keystoneauth1.tests.unit.utils.TestCase

PLUGIN_CLASS = None
TEST_URL = 'http://keystone.host:5000/'
V2_PLUGIN_CLASS = None
V3_PLUGIN_CLASS = None
assertCreateV2(**kwargs)
assertCreateV3(**kwargs)
assertDiscoveryFailure(**kwargs)
new_plugin(**kwargs)
setUp()
stub_discovery(base_url=None, **kwargs)
test_create_plugin_no_reauthenticate()
test_create_v2_if_no_domain_params()
test_create_v3_if_domain_params()
test_default_domain_id_no_v3()
test_default_domain_id_with_v3(**kwargs)
test_default_domain_name_no_v3()
test_default_domain_name_with_v3(**kwargs)
test_disc_error_for_failure()
test_no_urls()
test_path_based_url_v2()
test_path_based_url_v3()
test_unknown_discovery_version()
test_v2_params_v3_url()
test_v3_params_v2_url()
test_v3_plugin_from_failure()

Module contents

Creative Commons Attribution 3.0 License

Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.