blob: ae934716ff862de22b809e12ee8520f65dc50291 [file] [log] [blame]
Rodrigo Duarte767d01e2016-03-24 15:08:44 -03001# Copyright 2016 Red Hat, Inc.
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Rodrigo Duarte767d01e2016-03-24 15:08:44 -030016from oslo_config import cfg
17
Colleen Murphya6d4cea2019-12-23 13:56:27 -080018identity_feature_options = [
Rodrigo Duartee508fe02016-06-02 16:08:39 -030019 cfg.BoolOpt('federation',
20 default=False,
21 help='Does the environment support the Federated Identity '
22 'feature?'),
Colleen Murphy8ec445b2019-10-17 10:02:31 -070023 cfg.BoolOpt('external_idp',
24 default=True,
25 help='Whether to test federated scenarios against an external '
26 'identity provider. If disabled, only '
27 'Keystone-to-Keystone tests will be enabled.'),
Colleen Murphya6d4cea2019-12-23 13:56:27 -080028 cfg.BoolOpt('enforce_scope',
29 default=False,
30 help='Does the keystone service enforce scope and use '
31 'scope-aware policies?'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030032]
33
34fed_scenario_group = cfg.OptGroup(name='fed_scenario',
35 title='Federation Scenario Tests Options')
36
37FedScenarioGroup = [
38 # Identity Provider
39 cfg.StrOpt('idp_id',
40 help='The Identity Provider ID'),
41 cfg.ListOpt('idp_remote_ids',
42 default=[],
43 help='The Identity Provider remote IDs list'),
44 cfg.StrOpt('idp_username',
45 help='Username used to login in the Identity Provider'),
46 cfg.StrOpt('idp_password',
47 help='Password used to login in the Identity Provider'),
48 cfg.StrOpt('idp_ecp_url',
49 help='Identity Provider SAML2/ECP URL'),
Ade Lee47a5e982022-11-15 16:34:30 +000050 cfg.StrOpt('idp_oidc_url',
51 help='Identity Provider OIDC URL'),
52
53 # client id (oidc)
54 cfg.StrOpt('idp_client_id',
55 help='Identity Provider Client ID'),
56 cfg.StrOpt('idp_client_secret',
57 help='Identity Provider Client Secret'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030058
59 # Mapping rules
60 cfg.StrOpt('mapping_remote_type',
61 help='The assertion attribute to be used in the remote rules'),
62 cfg.StrOpt('mapping_user_name',
63 default='{0}',
64 help='The username to be used in the local rules.'),
65 cfg.StrOpt('mapping_group_name',
66 default='federated_users',
67 help='The group name to be used in the local rules. The group '
68 'must have at least one assignment in one project.'),
69 cfg.StrOpt('mapping_group_domain_name',
70 default='federated_domain',
71 help='The domain name where the "mapping_group_name" is '
72 'created.'),
Colleen Murphye105e8c2020-04-21 20:02:37 -070073 # TODO(cmurphy): remove this option and set to true when all supported
74 # branches support the openstack_groups feature
75 cfg.BoolOpt('enable_k2k_groups_mapping',
76 default=False,
77 help='Whether to test support for openstack_groups in the K2K '
78 'SAML assertion (lp#1687593)'),
Rodrigo Duartee508fe02016-06-02 16:08:39 -030079
80 # Protocol
81 cfg.StrOpt('protocol_id',
82 default='mapped',
Ade Lee47a5e982022-11-15 16:34:30 +000083 help='The Protocol ID'),
84
Rodrigo Duartee508fe02016-06-02 16:08:39 -030085]