blob: 2d4d189a6546cacf36b5125440bfb55fab27d182 [file] [log] [blame]
Rodrigo Duarte767d01e2016-03-24 15:08:44 -03001# Copyright 2016 Red Hat, Inc.
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Rodrigo Duarte767d01e2016-03-24 15:08:44 -030016from oslo_config import cfg
17
Colleen Murphya6d4cea2019-12-23 13:56:27 -080018identity_feature_options = [
Rodrigo Duartee508fe02016-06-02 16:08:39 -030019 cfg.BoolOpt('federation',
20 default=False,
21 help='Does the environment support the Federated Identity '
22 'feature?'),
Colleen Murphy8ec445b2019-10-17 10:02:31 -070023 cfg.BoolOpt('external_idp',
24 default=True,
25 help='Whether to test federated scenarios against an external '
26 'identity provider. If disabled, only '
27 'Keystone-to-Keystone tests will be enabled.'),
Colleen Murphya6d4cea2019-12-23 13:56:27 -080028 cfg.BoolOpt('enforce_scope',
29 default=False,
30 help='Does the keystone service enforce scope and use '
31 'scope-aware policies?'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030032]
33
34fed_scenario_group = cfg.OptGroup(name='fed_scenario',
35 title='Federation Scenario Tests Options')
36
37FedScenarioGroup = [
38 # Identity Provider
39 cfg.StrOpt('idp_id',
40 help='The Identity Provider ID'),
41 cfg.ListOpt('idp_remote_ids',
42 default=[],
43 help='The Identity Provider remote IDs list'),
44 cfg.StrOpt('idp_username',
45 help='Username used to login in the Identity Provider'),
46 cfg.StrOpt('idp_password',
47 help='Password used to login in the Identity Provider'),
48 cfg.StrOpt('idp_ecp_url',
49 help='Identity Provider SAML2/ECP URL'),
50
51 # Mapping rules
52 cfg.StrOpt('mapping_remote_type',
53 help='The assertion attribute to be used in the remote rules'),
54 cfg.StrOpt('mapping_user_name',
55 default='{0}',
56 help='The username to be used in the local rules.'),
57 cfg.StrOpt('mapping_group_name',
58 default='federated_users',
59 help='The group name to be used in the local rules. The group '
60 'must have at least one assignment in one project.'),
61 cfg.StrOpt('mapping_group_domain_name',
62 default='federated_domain',
63 help='The domain name where the "mapping_group_name" is '
64 'created.'),
Colleen Murphye105e8c2020-04-21 20:02:37 -070065 # TODO(cmurphy): remove this option and set to true when all supported
66 # branches support the openstack_groups feature
67 cfg.BoolOpt('enable_k2k_groups_mapping',
68 default=False,
69 help='Whether to test support for openstack_groups in the K2K '
70 'SAML assertion (lp#1687593)'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030071
72 # Protocol
73 cfg.StrOpt('protocol_id',
74 default='mapped',
75 help='The Protocol ID')
76]