blob: a052100b67ddbbabfd1e4e9608d2523f918f5ebd [file] [log] [blame]
rootd8ab63c2017-07-25 07:19:31 +00001
2from runtest import conditions
3from runtest.tempest_sections import base_section
4
5class Auth(base_section.BaseSection):
6
7 name = "auth"
8 options = [
9 'admin_domain_name',
10 'admin_password',
11 'admin_project_name',
12 'admin_username',
13 'create_isolated_networks',
14 'default_credentials_domain_name',
15 'tempest_roles',
16 'test_accounts_file',
17 'use_dynamic_credentials',
18 ]
19
20
21 @property
22 def admin_domain_name(self):
sgarbuzd24e12f2018-02-27 18:34:00 +020023 return 'Default'
rootd8ab63c2017-07-25 07:19:31 +000024
25 @property
26 def admin_password(self):
27 c = conditions.BaseRule('keystone.server.enabled', 'eq', True)
28 return self.get_item_when_condition_match(
29 'keystone.server.admin_password', c)
30
31 @property
32 def admin_project_name(self):
33 c = conditions.BaseRule('keystone.server.enabled', 'eq', True)
34 return self.get_item_when_condition_match(
35 'keystone.server.admin_tenant', c)
36
37 @property
38 def admin_username(self):
39 c = conditions.BaseRule('keystone.server.enabled', 'eq', True)
40 return self.get_item_when_condition_match(
41 'keystone.server.admin_name', c)
42
43 @property
44 def create_isolated_networks(self):
45 pass
46
47 @property
48 def default_credentials_domain_name(self):
49 pass
50
51 @property
52 def tempest_roles(self):
53 pass
54
55 @property
56 def test_accounts_file(self):
57 pass
58
59 @property
60 def use_dynamic_credentials(self):
sgarbuzd24e12f2018-02-27 18:34:00 +020061 return True
rootd8ab63c2017-07-25 07:19:31 +000062