| # Copyright 2015 Red Hat, Inc. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| # not use this file except in compliance with the License. You may obtain |
| # a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| # License for the specific language governing permissions and limitations |
| # under the License. |
| |
| from oslo_config import cfg |
| from oslotest import mockpatch |
| |
| from tempest.common import credentials_factory as credentials |
| from tempest import config |
| from tempest.tests import base |
| from tempest.tests import fake_config |
| |
| |
| class TestAdminAvailable(base.TestCase): |
| |
| identity_version = 'v2' |
| |
| def setUp(self): |
| super(TestAdminAvailable, self).setUp() |
| self.useFixture(fake_config.ConfigFixture()) |
| self.stubs.Set(config, 'TempestConfigPrivate', fake_config.FakePrivate) |
| |
| def run_test(self, dynamic_creds, use_accounts_file, admin_creds): |
| |
| cfg.CONF.set_default('use_dynamic_credentials', |
| dynamic_creds, group='auth') |
| if use_accounts_file: |
| accounts = [{'username': 'u1', |
| 'tenant_name': 't1', |
| 'password': 'p'}, |
| {'username': 'u2', |
| 'tenant_name': 't2', |
| 'password': 'p'}] |
| if admin_creds == 'role': |
| accounts.append({'username': 'admin', |
| 'tenant_name': 'admin', |
| 'password': 'p', |
| 'roles': ['admin']}) |
| elif admin_creds == 'type': |
| accounts.append({'username': 'admin', |
| 'tenant_name': 'admin', |
| 'password': 'p', |
| 'types': ['admin']}) |
| self.useFixture(mockpatch.Patch( |
| 'tempest.common.preprov_creds.read_accounts_yaml', |
| return_value=accounts)) |
| cfg.CONF.set_default('test_accounts_file', |
| use_accounts_file, group='auth') |
| self.useFixture(mockpatch.Patch('os.path.isfile', |
| return_value=True)) |
| else: |
| self.useFixture(mockpatch.Patch('os.path.isfile', |
| return_value=False)) |
| if admin_creds: |
| username = 'u' |
| tenant = 't' |
| password = 'p' |
| domain = 'd' |
| else: |
| username = None |
| tenant = None |
| password = None |
| domain = None |
| |
| cfg.CONF.set_default('admin_username', username, group='auth') |
| cfg.CONF.set_default('admin_tenant_name', tenant, group='auth') |
| cfg.CONF.set_default('admin_password', password, group='auth') |
| cfg.CONF.set_default('admin_domain_name', domain, group='auth') |
| |
| expected = admin_creds is not None or dynamic_creds |
| observed = credentials.is_admin_available( |
| identity_version=self.identity_version) |
| self.assertEqual(expected, observed) |
| |
| # Dynamic credentials implies admin so only one test case for True |
| def test__dynamic_creds__accounts_file__no_admin(self): |
| self.run_test(dynamic_creds=True, |
| use_accounts_file=True, |
| admin_creds=None) |
| |
| def test__no_dynamic_creds__accounts_file__no_admin(self): |
| self.run_test(dynamic_creds=False, |
| use_accounts_file=True, |
| admin_creds=None) |
| |
| def test__no_dynamic_creds__accounts_file__admin_role(self): |
| self.run_test(dynamic_creds=False, |
| use_accounts_file=True, |
| admin_creds='role') |
| |
| def test__no_dynamic_creds__accounts_file__admin_type(self): |
| self.run_test(dynamic_creds=False, |
| use_accounts_file=True, |
| admin_creds='type') |
| |
| def test__no_dynamic_creds__no_accounts_file__no_admin(self): |
| self.run_test(dynamic_creds=False, |
| use_accounts_file=False, |
| admin_creds=None) |
| |
| def test__no_dynamic_creds__no_accounts_file__admin(self): |
| self.run_test(dynamic_creds=False, |
| use_accounts_file=False, |
| admin_creds='role') |
| |
| |
| class TestAdminAvailableV3(TestAdminAvailable): |
| |
| identity_version = 'v3' |