blob: 969bf983db25ed6378833e9618c0260a7eda188e [file] [log] [blame]
Maru Newbyb096d9f2015-03-09 18:54:54 +00001# Copyright 2012 OpenStack Foundation
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
16from neutron.tests.tempest import auth
17from neutron.tests.tempest.common import cred_provider
18from neutron.tests.tempest import config
19from neutron.tests.tempest import exceptions
20
21CONF = config.CONF
22
23
24class Manager(object):
25
26 """
27 Base manager class
28
29 Manager objects are responsible for providing a configuration object
30 and a client object for a test case to use in performing actions.
31 """
32
33 def __init__(self, credentials=None):
34 """
35 We allow overriding of the credentials used within the various
36 client classes managed by the Manager object. Left as None, the
37 standard username/password/tenant_name[/domain_name] is used.
38
39 :param credentials: Override of the credentials
40 """
41 self.auth_version = CONF.identity.auth_version
42 if credentials is None:
43 self.credentials = cred_provider.get_configured_credentials('user')
44 else:
45 self.credentials = credentials
46 # Check if passed or default credentials are valid
47 if not self.credentials.is_valid():
48 raise exceptions.InvalidCredentials()
49 # Creates an auth provider for the credentials
50 self.auth_provider = get_auth_provider(self.credentials)
51 # FIXME(andreaf) unused
52 self.client_attr_names = []
53
54
55def get_auth_provider_class(credentials):
56 if isinstance(credentials, auth.KeystoneV3Credentials):
57 return auth.KeystoneV3AuthProvider, CONF.identity.uri_v3
58 else:
59 return auth.KeystoneV2AuthProvider, CONF.identity.uri
60
61
62def get_auth_provider(credentials):
63 default_params = {
64 'disable_ssl_certificate_validation':
65 CONF.identity.disable_ssl_certificate_validation,
66 'ca_certs': CONF.identity.ca_certificates_file,
67 'trace_requests': CONF.debug.trace_requests
68 }
69 if credentials is None:
70 raise exceptions.InvalidCredentials(
71 'Credentials must be specified')
72 auth_provider_class, auth_url = get_auth_provider_class(
73 credentials)
74 return auth_provider_class(credentials, auth_url, **default_params)