
Most OpenStack clients support a common set of SSL options, such as os-cacert, os-cert, and os-key. This change uses keystoneclient.session.register_cli_opts to add those to the argument parser and passes the resulting values to the Keystone client so they take effect. Change-Id: I24c2c2fa5be51590cc2d8a9278563dd4f7ba091d
123 lines
4.6 KiB
Python
123 lines
4.6 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import mock
|
|
|
|
from tuskarclient.common import auth
|
|
from tuskarclient.openstack.common.apiclient import client
|
|
from tuskarclient.openstack.common.apiclient import exceptions as exc
|
|
from tuskarclient.tests import utils as test_utils
|
|
|
|
|
|
@mock.patch.object(auth.ksclient, 'Client')
|
|
class KeystoneAuthPluginTest(test_utils.TestCase):
|
|
def setUp(self):
|
|
super(KeystoneAuthPluginTest, self).setUp()
|
|
plugin = auth.KeystoneAuthPlugin(
|
|
username="fake-username",
|
|
password="fake-password",
|
|
tenant_id="fake-tenant-id",
|
|
tenant_name="fake-tenant-name",
|
|
auth_url="http://auth",
|
|
endpoint="http://tuskar")
|
|
self.cs = client.HTTPClient(auth_plugin=plugin)
|
|
|
|
def test_authenticate(self, mock_ksclient):
|
|
self.cs.authenticate()
|
|
mock_ksclient.assert_called_with(
|
|
username="fake-username",
|
|
password="fake-password",
|
|
tenant_id="fake-tenant-id",
|
|
tenant_name="fake-tenant-name",
|
|
auth_url="http://auth",
|
|
cacert=None,
|
|
cert=None,
|
|
key=None)
|
|
|
|
def test_authenticate_with_ssl(self, mock_ksclient):
|
|
plugin = auth.KeystoneAuthPlugin(
|
|
username="fake-username",
|
|
password="fake-password",
|
|
tenant_id="fake-tenant-id",
|
|
tenant_name="fake-tenant-name",
|
|
auth_url="http://auth",
|
|
endpoint="http://tuskar",
|
|
cacert="/fake/cacert.pem",
|
|
cert="/fake/cert.pem",
|
|
key="/fake/key.pem")
|
|
self.cs = client.HTTPClient(auth_plugin=plugin)
|
|
self.cs.authenticate()
|
|
mock_ksclient.assert_called_with(
|
|
username="fake-username",
|
|
password="fake-password",
|
|
tenant_id="fake-tenant-id",
|
|
tenant_name="fake-tenant-name",
|
|
auth_url="http://auth",
|
|
cacert="/fake/cacert.pem",
|
|
cert="/fake/cert.pem",
|
|
key="/fake/key.pem")
|
|
|
|
def test_token_and_endpoint(self, mock_ksclient):
|
|
self.cs.authenticate()
|
|
(token, endpoint) = self.cs.auth_plugin.token_and_endpoint(
|
|
"fake-endpoint-type", "fake-service-type")
|
|
self.assertIsInstance(token, mock.MagicMock)
|
|
self.assertEqual("http://tuskar", endpoint)
|
|
|
|
def test_token_and_endpoint_before_auth(self, mock_ksclient):
|
|
(token, endpoint) = self.cs.auth_plugin.token_and_endpoint(
|
|
"fake-endpoint-type", "fake-service-type")
|
|
self.assertIsNone(token, None)
|
|
self.assertIsNone(endpoint, None)
|
|
|
|
|
|
@mock.patch.object(auth.ksclient, 'Client')
|
|
class KeystoneAuthPluginTokenTest(test_utils.TestCase):
|
|
def test_token_and_endpoint(self, mock_ksclient):
|
|
plugin = auth.KeystoneAuthPlugin(
|
|
token="fake-token",
|
|
endpoint="http://tuskar")
|
|
cs = client.HTTPClient(auth_plugin=plugin)
|
|
|
|
cs.authenticate()
|
|
(token, endpoint) = cs.auth_plugin.token_and_endpoint(
|
|
"fake-endpoint-type", "fake-service-type")
|
|
self.assertEqual('fake-token', token)
|
|
self.assertEqual('http://tuskar', endpoint)
|
|
|
|
|
|
class KeystoneAuthPluginOptionsTest(test_utils.TestCase):
|
|
def setUp(self):
|
|
super(KeystoneAuthPluginOptionsTest, self).setUp()
|
|
self.kwargs = {
|
|
'username': "fake-username",
|
|
'password': "fake-password",
|
|
'tenant_id': "fake-tenant-id",
|
|
'tenant_name': "fake-tenant-name",
|
|
'auth_url': "http://auth",
|
|
'endpoint': "http://tuskar"
|
|
}
|
|
|
|
def test_it_raises_error_without_tenant_id_and_name(self):
|
|
kwargs = self.kwargs.copy()
|
|
del kwargs['tenant_id']
|
|
del kwargs['tenant_name']
|
|
auth_plugin = auth.KeystoneAuthPlugin(**kwargs)
|
|
self.assertRaises(exc.AuthPluginOptionsMissing,
|
|
auth_plugin.sufficient_options)
|
|
|
|
def test_it_raises_error_withtout_username(self):
|
|
kwargs = self.kwargs.copy()
|
|
del kwargs['username']
|
|
auth_plugin = auth.KeystoneAuthPlugin(**kwargs)
|
|
self.assertRaises(exc.AuthPluginOptionsMissing,
|
|
auth_plugin.sufficient_options) |