keystoneauth1.tests.unit.identity package¶
Submodules¶
keystoneauth1.tests.unit.identity.test_access module¶
keystoneauth1.tests.unit.identity.test_identity_common module¶
- 
class keystoneauth1.tests.unit.identity.test_identity_common.CatalogHackTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
BASE_URL= 'http://keystone.server:5000/'¶
 - 
IDENTITY= 'identity'¶
 - 
OTHER_URL= 'http://other.server:5000/path'¶
 - 
TEST_URL= 'http://keystone.server:5000/v2.0'¶
 - 
V2_URL= 'http://keystone.server:5000/v2.0'¶
 - 
V3_URL= 'http://keystone.server:5000/v3'¶
 - 
test_getting_endpoints()¶
 - 
test_getting_endpoints_on_auth_interface()¶
 - 
test_returns_original_when_discover_fails()¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests¶
- Bases: - object- 
TEST_COMPUTE_ADMIN= 'http://nova/novapi/admin'¶
 - 
TEST_COMPUTE_BASE= 'http://nova'¶
 - 
TEST_COMPUTE_INTERNAL= 'http://nova/novapi/internal'¶
 - 
TEST_COMPUTE_PUBLIC= 'http://nova/novapi/public'¶
 - 
TEST_PASS= '155a0a80e44341a2b49605e2fc95966b'¶
 - 
TEST_ROOT_ADMIN_URL= 'http://127.0.0.1:35357/'¶
 - 
TEST_ROOT_URL= 'http://127.0.0.1:5000/'¶
 - 
assertAccessInfoEqual(a, b)¶
 - 
create_auth_plugin(**kwargs)¶
- Create an auth plugin that makes sense for the auth data. - It doesn’t really matter what auth mechanism is used but it should be appropriate to the API version. 
 - 
get_auth_data(**kwargs)¶
- Return fake authentication data. - This should register a valid token response and ensure that the compute endpoints are set to TEST_COMPUTE_PUBLIC, _INTERNAL and _ADMIN. 
 - 
setUp()¶
 - 
stub_auth_data(**kwargs)¶
 - 
test_asking_for_auth_endpoint_ignores_checks()¶
 - 
test_check_cache_id_match()¶
 - 
test_check_cache_id_no_match()¶
 - 
test_discovering()¶
 - 
test_discovering_when_version_missing()¶
 - 
test_discovering_with_no_data()¶
 - 
test_discovering_with_protocol_relative()¶
 - 
test_discovering_with_relative_anchored_link()¶
 - 
test_discovering_with_relative_link()¶
 - 
test_discovery_uses_plugin_cache()¶
 - 
test_discovery_uses_session_cache()¶
 - 
test_get_auth_properties()¶
 - 
test_get_set_auth_state()¶
 - 
test_invalidate()¶
 - 
test_no_reauthenticate()¶
 - 
test_reauthenticate()¶
 - 
version¶
- The API version being tested. 
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_common.GenericAuthPluginTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
ENDPOINT_FILTER= {'05bb4fbd8a604e04bf9f0baac34d9daa': 'eac7bd11dd704d25adb372869941ed88'}¶
 - 
setUp()¶
 - 
test_setting_bad_connection_params()¶
 - 
test_setting_connection_params()¶
 - 
test_setting_headers()¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_common.GenericPlugin¶
- Bases: - keystoneauth1.plugin.BaseAuthPlugin- 
BAD_TOKEN= '8c87cbe0254c4f92b101b61acf4b795e'¶
 - 
get_connection_params(session, **kwargs)¶
 - 
get_endpoint(session, **kwargs)¶
 - 
get_headers(session, **kwargs)¶
 - 
get_token(session, **kwargs)¶
 - 
url(prefix)¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_common.V2(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,- keystoneauth1.tests.unit.utils.TestCase- 
create_auth_plugin(**kwargs)¶
 - 
get_auth_data(**kwargs)¶
 - 
stub_auth(**kwargs)¶
 - 
version¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_common.V3(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.test_identity_common.CommonIdentityTests,- keystoneauth1.tests.unit.utils.TestCase- 
create_auth_plugin(**kwargs)¶
 - 
get_auth_data(**kwargs)¶
 - 
stub_auth(subject_token=None, **kwargs)¶
 - 
version¶
 
- 
keystoneauth1.tests.unit.identity.test_identity_v2 module¶
- 
class keystoneauth1.tests.unit.identity.test_identity_v2.V2IdentityPlugin(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
TEST_ADMIN_URL= 'http://127.0.0.1:35357/v2.0'¶
 - 
TEST_PASS= 'password'¶
 - 
TEST_ROOT_ADMIN_URL= 'http://127.0.0.1:35357/'¶
 - 
TEST_ROOT_URL= 'http://127.0.0.1:5000/'¶
 - 
TEST_SERVICE_CATALOG= [{'type': 'nova_compat', 'endpoints': [{'publicURL': 'http://cdn.admin-nets.local:8774/v1.0/', 'region': 'RegionOne', 'adminURL': 'http://cdn.admin-nets.local:8774/v1.0', 'internalURL': 'http://127.0.0.1:8774/v1.0'}], 'name': 'nova_compat'}, {'type': 'compute', 'endpoints': [{'publicURL': 'http://nova/novapi/public', 'region': 'RegionOne', 'adminURL': 'http://nova/novapi/admin', 'internalURL': 'http://nova/novapi/internal'}], 'name': 'nova'}, {'type': 'image', 'endpoints': [{'publicURL': 'http://glance/glanceapi/public', 'region': 'RegionOne', 'adminURL': 'http://glance/glanceapi/admin', 'internalURL': 'http://glance/glanceapi/internal'}], 'name': 'glance'}, {'type': 'identity', 'endpoints': [{'publicURL': 'http://127.0.0.1:5000/v2.0', 'region': 'RegionOne', 'adminURL': 'http://127.0.0.1:35357/v2.0', 'internalURL': 'http://127.0.0.1:5000/v2.0'}], 'name': 'keystone'}, {'type': 'object-store', 'endpoints': [{'publicURL': 'http://swift/swiftapi/public', 'region': 'RegionOne', 'adminURL': 'http://swift/swiftapi/admin', 'internalURL': 'http://swift/swiftapi/internal'}], 'name': 'swift'}]¶
 - 
TEST_URL= 'http://127.0.0.1:5000/v2.0'¶
 - 
setUp()¶
 - 
stub_auth(**kwargs)¶
 - 
test_authenticate_with_token()¶
 - 
test_authenticate_with_user_id_password()¶
 - 
test_authenticate_with_user_id_password_scoped()¶
 - 
test_authenticate_with_username_password()¶
 - 
test_authenticate_with_username_password_scoped()¶
 - 
test_doesnt_log_password()¶
 - 
test_endpoint_filter_without_service_type_fails()¶
 - 
test_full_url_overrides_endpoint_filter()¶
 - 
test_invalid_auth_response_dict()¶
 - 
test_invalid_auth_response_type()¶
 - 
test_invalidate_response()¶
 - 
test_password_cache_id()¶
 - 
test_password_change_auth_state()¶
 - 
test_password_with_no_user_id_or_name()¶
 - 
test_service_url()¶
 - 
test_service_url_defaults_to_public()¶
 - 
test_with_trust_id()¶
 
- 
keystoneauth1.tests.unit.identity.test_identity_v3 module¶
- 
class keystoneauth1.tests.unit.identity.test_identity_v3.V3IdentityPlugin(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
TEST_ADMIN_URL= 'http://127.0.0.1:35357/v3'¶
 - 
TEST_PASS= 'password'¶
 - 
TEST_ROOT_ADMIN_URL= 'http://127.0.0.1:35357/'¶
 - 
TEST_ROOT_URL= 'http://127.0.0.1:5000/'¶
 - 
TEST_SERVICE_CATALOG= [{'type': 'nova_compat', 'endpoints': [{'url': 'http://cdn.admin-nets.local:8774/v1.0/', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:8774/v1.0', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://cdn.admin-nets.local:8774/v1.0', 'interface': 'admin', 'region': 'RegionOne'}]}, {'type': 'compute', 'endpoints': [{'url': 'http://nova/novapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://nova/novapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://nova/novapi/admin', 'interface': 'admin', 'region': 'RegionOne'}], 'name': 'nova'}, {'type': 'image', 'endpoints': [{'url': 'http://glance/glanceapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://glance/glanceapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://glance/glanceapi/admin', 'interface': 'admin', 'region': 'RegionOne'}], 'name': 'glance'}, {'type': 'identity', 'endpoints': [{'url': 'http://127.0.0.1:5000/v3', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:5000/v3', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://127.0.0.1:35357/v3', 'interface': 'admin', 'region': 'RegionOne'}]}, {'type': 'object-store', 'endpoints': [{'url': 'http://swift/swiftapi/public', 'interface': 'public', 'region': 'RegionOne'}, {'url': 'http://swift/swiftapi/internal', 'interface': 'internal', 'region': 'RegionOne'}, {'url': 'http://swift/swiftapi/admin', 'interface': 'admin', 'region': 'RegionOne'}]}]¶
 - 
TEST_SERVICE_PROVIDERS= [{'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP', 'id': 'sp1'}, {'auth_url': 'https://sp2.com/v3/OS-FEDERATION/identity_providers/acme/protocols/saml2/auth', 'sp_url': 'https://sp2.com/Shibboleth.sso/SAML2/ECP', 'id': 'sp2'}]¶
 - 
TEST_URL= 'http://127.0.0.1:5000/v3'¶
 - 
setUp()¶
 - 
stub_auth(subject_token=None, **kwargs)¶
 - 
test_authenticate_with_token()¶
 - 
test_authenticate_with_username_password()¶
 - 
test_authenticate_with_username_password_domain_scoped()¶
 - 
test_authenticate_with_username_password_project_scoped()¶
 - 
test_doesnt_log_password()¶
 - 
test_endpoint_filter_without_service_type_fails()¶
 - 
test_full_url_overrides_endpoint_filter()¶
 - 
test_handle_missing_service_provider()¶
 - 
test_invalid_auth_response_dict()¶
 - 
test_invalid_auth_response_type()¶
 - 
test_invalidate_response()¶
 - 
test_password_cache_id()¶
 - 
test_password_change_auth_state()¶
 - 
test_sends_nocatalog()¶
 - 
test_service_providers_urls()¶
 - 
test_service_url()¶
 - 
test_service_url_defaults_to_public()¶
 - 
test_symbols()¶
 - 
test_unscoped_request()¶
 - 
test_unscoped_with_scope_data()¶
 - 
test_with_domain_and_project_scoping()¶
 - 
test_with_expired()¶
 - 
test_with_multiple_mechanisms()¶
 - 
test_with_multiple_mechanisms_factory()¶
 - 
test_with_multiple_scopes()¶
 - 
test_with_trust_id()¶
 
- 
keystoneauth1.tests.unit.identity.test_identity_v3_federation module¶
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_federation.K2KAuthPluginTest(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
REQUEST_ECP_URL= 'http://127.0.0.1:5000/v3/auth/OS-FEDERATION/saml2/ecp'¶
 - 
SERVICE_PROVIDER_DICT= {'auth_url': 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth', 'sp_url': 'https://sp1.com/Shibboleth.sso/SAML2/ECP', 'id': 'sp1'}¶
 - 
SP_AUTH_URL= 'https://sp1.com/v3/OS-FEDERATION/identity_providers/testidp/protocols/saml2/auth'¶
 - 
SP_ID= 'sp1'¶
 - 
SP_ROOT_URL= 'https://sp1.com/v3'¶
 - 
SP_URL= 'https://sp1.com/Shibboleth.sso/SAML2/ECP'¶
 - 
TEST_PASS= 'password'¶
 - 
TEST_ROOT_URL= 'http://127.0.0.1:5000/'¶
 - 
TEST_URL= 'http://127.0.0.1:5000/v3'¶
 - 
get_plugin(**kwargs)¶
 - 
setUp()¶
 - 
test_end_to_end_with_generic_password()¶
 - 
test_end_to_end_workflow()¶
 - 
test_end_to_end_workflow_303_redirect()¶
 - 
test_fail_getting_ecp_assertion()¶
 - 
test_get_ecp_assertion_empty_response()¶
 - 
test_get_ecp_assertion_wrong_headers()¶
 - 
test_remote_url()¶
 - 
test_send_ecp_authn_response()¶
 - 
test_send_ecp_authn_response_303_redirect()¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_federation.TesterFederationPlugin(auth_url, identity_provider, protocol, **kwargs)¶
- Bases: - keystoneauth1.identity.v3.federation.FederationBaseAuth- 
get_unscoped_auth_ref(sess, **kwargs)¶
 
- 
keystoneauth1.tests.unit.identity.test_identity_v3_oidc module¶
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests¶
- Bases: - object- 
setUp()¶
 - 
test_can_pass_grant_type_but_warning_is_issued()¶
 - 
test_discovery_not_found()¶
 - 
test_grant_type_and_plugin_missmatch()¶
 - 
test_invalid_discovery_document()¶
 - 
test_load_discovery()¶
 - 
test_load_discovery_override_by_endpoints()¶
 - 
test_no_access_token_endpoint()¶
 - 
test_no_discovery()¶
 - 
test_wrong_grant_type()¶
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCAuthorizationGrantTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,- keystoneauth1.tests.unit.utils.TestCase- 
setUp()¶
 - 
test_initial_call_to_get_access_token()¶
- Test initial call, expect JSON access token. 
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCClientCredentialsTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,- keystoneauth1.tests.unit.utils.TestCase- 
setUp()¶
 - 
test_end_to_end_workflow()¶
- Test full OpenID Connect workflow. 
 - 
test_initial_call_to_get_access_token()¶
- Test initial call, expect JSON access token. 
 - 
test_second_call_to_protected_url()¶
- Test subsequent call, expect Keystone token. 
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCPasswordTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.test_identity_v3_oidc.BaseOIDCTests,- keystoneauth1.tests.unit.utils.TestCase- 
setUp()¶
 - 
test_end_to_end_workflow()¶
- Test full OpenID Connect workflow. 
 - 
test_initial_call_to_get_access_token()¶
- Test initial call, expect JSON access token. 
 - 
test_second_call_to_protected_url()¶
- Test subsequent call, expect Keystone token. 
 
- 
- 
class keystoneauth1.tests.unit.identity.test_identity_v3_oidc.OIDCTokenTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
setUp()¶
 - 
test_end_to_end_workflow()¶
- Test full OpenID Connect workflow. 
 
- 
keystoneauth1.tests.unit.identity.test_password module¶
- 
class keystoneauth1.tests.unit.identity.test_password.PasswordTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase- 
PLUGIN_CLASS¶
- alias of - Password
 - 
V2_PLUGIN_CLASS¶
- alias of - Password
 - 
V3_PLUGIN_CLASS¶
- alias of - Password
 - 
new_plugin(**kwargs)¶
 - 
test_default_domain_id_with_v3()¶
 - 
test_default_domain_name_with_v3()¶
 - 
test_password_cache_id()¶
 - 
test_symbols()¶
 - 
test_v3_disocovery_failure_v2_url()¶
 - 
test_v3_domain_params_v2_url()¶
 - 
test_v3_user_params_v2_url()¶
 - 
test_with_user_domain_params()¶
 
- 
keystoneauth1.tests.unit.identity.test_token module¶
- 
class keystoneauth1.tests.unit.identity.test_token.TokenTests(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase- 
PLUGIN_CLASS¶
- alias of - Token
 - 
V2_PLUGIN_CLASS¶
- alias of - Token
 - 
V3_PLUGIN_CLASS¶
- alias of - Token
 - 
new_plugin(**kwargs)¶
 - 
test_symbols()¶
 - 
test_token_cache_id()¶
 
- 
keystoneauth1.tests.unit.identity.test_tokenless_auth module¶
- 
class keystoneauth1.tests.unit.identity.test_tokenless_auth.TokenlessAuthTest(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
TEST_URL= 'http://server/prefix'¶
 - 
create(auth_url, domain_id=None, domain_name=None, project_id=None, project_name=None, project_domain_id=None, project_domain_name=None)¶
 - 
test_domain_id_scope_header_pass()¶
 - 
test_domain_name_scope_header_pass()¶
 - 
test_no_scope_header_fail()¶
 - 
test_project_id_scope_header_pass()¶
 - 
test_project_name_scope_only_header_fail()¶
 - 
test_project_of_domain__name_scope_header_pass()¶
 - 
test_project_of_domain_id_scope_header_pass()¶
 
- 
keystoneauth1.tests.unit.identity.utils module¶
- 
class keystoneauth1.tests.unit.identity.utils.GenericPluginTestCase(*args, **kwargs)¶
- Bases: - keystoneauth1.tests.unit.utils.TestCase- 
PLUGIN_CLASS= None¶
 - 
TEST_URL= 'http://keystone.host:5000/'¶
 - 
V2_PLUGIN_CLASS= None¶
 - 
V3_PLUGIN_CLASS= None¶
 - 
assertCreateV2(**kwargs)¶
 - 
assertCreateV3(**kwargs)¶
 - 
assertDiscoveryFailure(**kwargs)¶
 - 
new_plugin(**kwargs)¶
 - 
setUp()¶
 - 
stub_discovery(base_url=None, **kwargs)¶
 - 
test_create_plugin_no_reauthenticate()¶
 - 
test_create_v2_if_no_domain_params()¶
 - 
test_create_v3_if_domain_params()¶
 - 
test_default_domain_id_no_v3()¶
 - 
test_default_domain_id_with_v3(**kwargs)¶
 - 
test_default_domain_name_no_v3()¶
 - 
test_default_domain_name_with_v3(**kwargs)¶
 - 
test_disc_error_for_failure()¶
 - 
test_no_urls()¶
 - 
test_path_based_url_v2()¶
 - 
test_path_based_url_v3()¶
 - 
test_unknown_discovery_version()¶
 - 
test_v2_params_v3_url()¶
 - 
test_v3_params_v2_url()¶
 - 
test_v3_plugin_from_failure()¶
 
-