blob: b040fead44b8bc0d09c71411e779103a1a6a7793 [file] [log] [blame]
Rodrigo Duarte767d01e2016-03-24 15:08:44 -03001# Copyright 2016 Red Hat, Inc.
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Rodrigo Duarte767d01e2016-03-24 15:08:44 -030016from oslo_config import cfg
17
Colleen Murphya6d4cea2019-12-23 13:56:27 -080018identity_feature_options = [
Rodrigo Duartee508fe02016-06-02 16:08:39 -030019 cfg.BoolOpt('federation',
20 default=False,
21 help='Does the environment support the Federated Identity '
22 'feature?'),
Colleen Murphy8ec445b2019-10-17 10:02:31 -070023 cfg.BoolOpt('external_idp',
24 default=True,
25 help='Whether to test federated scenarios against an external '
26 'identity provider. If disabled, only '
27 'Keystone-to-Keystone tests will be enabled.'),
Colleen Murphya6d4cea2019-12-23 13:56:27 -080028 cfg.BoolOpt('enforce_scope',
29 default=False,
30 help='Does the keystone service enforce scope and use '
31 'scope-aware policies?'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030032]
33
34fed_scenario_group = cfg.OptGroup(name='fed_scenario',
35 title='Federation Scenario Tests Options')
36
37FedScenarioGroup = [
38 # Identity Provider
39 cfg.StrOpt('idp_id',
40 help='The Identity Provider ID'),
41 cfg.ListOpt('idp_remote_ids',
42 default=[],
43 help='The Identity Provider remote IDs list'),
44 cfg.StrOpt('idp_username',
45 help='Username used to login in the Identity Provider'),
46 cfg.StrOpt('idp_password',
Dave Wildedbe56f02023-03-20 21:03:47 -050047 help='Password used to login in the Identity Provider',
48 secret=True),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030049 cfg.StrOpt('idp_ecp_url',
50 help='Identity Provider SAML2/ECP URL'),
Ade Lee47a5e982022-11-15 16:34:30 +000051 cfg.StrOpt('idp_oidc_url',
52 help='Identity Provider OIDC URL'),
53
54 # client id (oidc)
55 cfg.StrOpt('idp_client_id',
56 help='Identity Provider Client ID'),
57 cfg.StrOpt('idp_client_secret',
58 help='Identity Provider Client Secret'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030059
Dave Wildedbe56f02023-03-20 21:03:47 -050060 # existing user (oidc)
61 cfg.StrOpt('idp_test_user_name',
62 help='Identity Provider Test User Name'),
63 cfg.StrOpt('idp_test_user_password',
64 help='Identity Provider Test User Password',
65 secret=True),
66
Rodrigo Duartee508fe02016-06-02 16:08:39 -030067 # Mapping rules
68 cfg.StrOpt('mapping_remote_type',
69 help='The assertion attribute to be used in the remote rules'),
70 cfg.StrOpt('mapping_user_name',
71 default='{0}',
72 help='The username to be used in the local rules.'),
73 cfg.StrOpt('mapping_group_name',
74 default='federated_users',
75 help='The group name to be used in the local rules. The group '
76 'must have at least one assignment in one project.'),
77 cfg.StrOpt('mapping_group_domain_name',
78 default='federated_domain',
79 help='The domain name where the "mapping_group_name" is '
80 'created.'),
Colleen Murphye105e8c2020-04-21 20:02:37 -070081 # TODO(cmurphy): remove this option and set to true when all supported
82 # branches support the openstack_groups feature
83 cfg.BoolOpt('enable_k2k_groups_mapping',
84 default=False,
85 help='Whether to test support for openstack_groups in the K2K '
86 'SAML assertion (lp#1687593)'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030087
88 # Protocol
89 cfg.StrOpt('protocol_id',
90 default='mapped',
Ade Lee47a5e982022-11-15 16:34:30 +000091 help='The Protocol ID'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030092]