
Previously, Swift3 used client-facing HTTP headers to pass the S3 access key, signature, and normalized request through the WSGI pipeline. However, swauth did not validate that Swift3 actually set the headers; as a result, an attacker who has captured a single valid request through the S3 API may impersonate the user that issued the request indefinitely through the Swift API. Now, the S3 authentication information will be taken from a separate, client-inaccessible namespace in the WSGI environment as defined in the related change. UpgradeImpact This addresses a breaking API change in Swift3. No currently deployed version of Swift3 will work with this. When upgrading swauth, operators will need to upgrade Swift3 as well. Change-Id: Ie5481a316397f46734e9dd0e77a8a87197ceec16 Related-Change: Ia3fbb4938f0daa8845cba4137a01cc43bc1a713c
4198 lines
195 KiB
Python
4198 lines
195 KiB
Python
# Copyright (c) 2010-2011 OpenStack, LLC.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import base64
|
|
from contextlib import contextmanager
|
|
import hashlib
|
|
import json
|
|
import mock
|
|
from time import time
|
|
import unittest
|
|
from urllib import quote
|
|
|
|
from swift.common.swob import Request
|
|
from swift.common.swob import Response
|
|
|
|
from swauth.authtypes import MAX_TOKEN_LENGTH
|
|
from swauth import middleware as auth
|
|
|
|
|
|
CONTENT_TYPE_JSON = 'application/json'
|
|
DEFAULT_TOKEN_LIFE = 86400
|
|
MAX_TOKEN_LIFE = 100000
|
|
|
|
|
|
class FakeMemcache(object):
|
|
|
|
def __init__(self):
|
|
self.store = {}
|
|
|
|
def get(self, key):
|
|
return self.store.get(key)
|
|
|
|
def set(self, key, value, time=0):
|
|
self.store[key] = value
|
|
return True
|
|
|
|
def incr(self, key, time=0):
|
|
self.store[key] = self.store.setdefault(key, 0) + 1
|
|
return self.store[key]
|
|
|
|
@contextmanager
|
|
def soft_lock(self, key, retries=5, time=0):
|
|
yield True
|
|
|
|
def delete(self, key):
|
|
try:
|
|
del self.store[key]
|
|
except Exception:
|
|
pass
|
|
return True
|
|
|
|
|
|
class FakeApp(object):
|
|
|
|
def __init__(self, status_headers_body_iter=None, acl=None, sync_key=None):
|
|
self.calls = 0
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
if not self.status_headers_body_iter:
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
|
self.acl = acl
|
|
self.sync_key = sync_key
|
|
|
|
def __call__(self, env, start_response):
|
|
self.calls += 1
|
|
self.request = Request.blank('', environ=env)
|
|
if self.acl:
|
|
self.request.acl = self.acl
|
|
if self.sync_key:
|
|
self.request.environ['swift_sync_key'] = self.sync_key
|
|
if 'swift.authorize' in env:
|
|
resp = env['swift.authorize'](self.request)
|
|
if resp:
|
|
return resp(env, start_response)
|
|
status, headers, body = self.status_headers_body_iter.next()
|
|
return Response(status=status, headers=headers,
|
|
body=body)(env, start_response)
|
|
|
|
|
|
class FakeConn(object):
|
|
|
|
def __init__(self, status_headers_body_iter=None):
|
|
self.calls = 0
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
if not self.status_headers_body_iter:
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
|
|
|
def request(self, method, path, headers):
|
|
self.calls += 1
|
|
self.request_path = path
|
|
self.status, self.headers, self.body = \
|
|
self.status_headers_body_iter.next()
|
|
self.status, self.reason = self.status.split(' ', 1)
|
|
self.status = int(self.status)
|
|
|
|
def getresponse(self):
|
|
return self
|
|
|
|
def read(self):
|
|
body = self.body
|
|
self.body = ''
|
|
return body
|
|
|
|
|
|
class TestAuth(unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
self.test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
'token_life': str(DEFAULT_TOKEN_LIFE),
|
|
'max_token_life': str(MAX_TOKEN_LIFE)})(FakeApp())
|
|
|
|
def test_salt(self):
|
|
for auth_type in ('sha1', 'sha512'):
|
|
# Salt not manually set
|
|
test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
'token_life': str(DEFAULT_TOKEN_LIFE),
|
|
'max_token_life': str(MAX_TOKEN_LIFE),
|
|
'auth_type': auth_type})(FakeApp())
|
|
self.assertEqual(test_auth.auth_encoder.salt, None)
|
|
mock_urandom = mock.Mock(return_value="abc")
|
|
with mock.patch("os.urandom", mock_urandom):
|
|
h_key = test_auth.auth_encoder().encode("key")
|
|
self.assertTrue(mock_urandom.called)
|
|
prefix = auth_type + ":" + "abc".encode('base64').rstrip() + '$'
|
|
self.assertTrue(h_key.startswith(prefix))
|
|
|
|
# Salt manually set
|
|
test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
'token_life': str(DEFAULT_TOKEN_LIFE),
|
|
'max_token_life': str(MAX_TOKEN_LIFE),
|
|
'auth_type': auth_type,
|
|
'auth_type_salt': "mysalt"})(FakeApp())
|
|
self.assertEqual(test_auth.auth_encoder.salt, "mysalt")
|
|
mock_urandom = mock.Mock()
|
|
with mock.patch("os.urandom", mock_urandom):
|
|
h_key = test_auth.auth_encoder().encode("key")
|
|
self.assertFalse(mock_urandom.called)
|
|
prefix = auth_type + ":" + "mysalt" + '$'
|
|
self.assertTrue(h_key.startswith(prefix))
|
|
|
|
def test_swift_version(self):
|
|
app = FakeApp()
|
|
|
|
with mock.patch('swauth.swift_version.at_least') as mock_at_least:
|
|
mock_at_least.return_value = False
|
|
self.assertRaises(ValueError, auth.filter_factory({}), app)
|
|
|
|
def test_super_admin_key_not_required(self):
|
|
auth.filter_factory({})(FakeApp())
|
|
|
|
def test_reseller_prefix_init(self):
|
|
app = FakeApp()
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest'})(app)
|
|
self.assertEqual(ath.reseller_prefix, 'AUTH_')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': 'TEST'})(app)
|
|
self.assertEqual(ath.reseller_prefix, 'TEST_')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': 'TEST_'})(app)
|
|
self.assertEqual(ath.reseller_prefix, 'TEST_')
|
|
|
|
def test_auth_prefix_init(self):
|
|
app = FakeApp()
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest'})(app)
|
|
self.assertEqual(ath.auth_prefix, '/auth/')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'auth_prefix': ''})(app)
|
|
self.assertEqual(ath.auth_prefix, '/auth/')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'auth_prefix': '/test/'})(app)
|
|
self.assertEqual(ath.auth_prefix, '/test/')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'auth_prefix': '/test'})(app)
|
|
self.assertEqual(ath.auth_prefix, '/test/')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'auth_prefix': 'test/'})(app)
|
|
self.assertEqual(ath.auth_prefix, '/test/')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'auth_prefix': 'test'})(app)
|
|
self.assertEqual(ath.auth_prefix, '/test/')
|
|
|
|
def test_no_auth_type_init(self):
|
|
app = FakeApp()
|
|
ath = auth.filter_factory({})(app)
|
|
self.assertEqual(ath.auth_type, 'Plaintext')
|
|
|
|
def test_valid_auth_type_init(self):
|
|
app = FakeApp()
|
|
ath = auth.filter_factory({'auth_type': 'sha1'})(app)
|
|
self.assertEqual(ath.auth_type, 'Sha1')
|
|
ath = auth.filter_factory({'auth_type': 'plaintext'})(app)
|
|
self.assertEqual(ath.auth_type, 'Plaintext')
|
|
|
|
def test_invalid_auth_type_init(self):
|
|
app = FakeApp()
|
|
exc = None
|
|
try:
|
|
auth.filter_factory({'auth_type': 'NONEXISTANT'})(app)
|
|
except Exception as err:
|
|
exc = err
|
|
self.assertEqual(str(exc),
|
|
'Invalid auth_type in config file: %s' %
|
|
'Nonexistant')
|
|
|
|
def test_default_swift_cluster_init(self):
|
|
app = FakeApp()
|
|
self.assertRaises(ValueError, auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#badscheme://host/path'}), app)
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest'})(app)
|
|
self.assertEqual(ath.default_swift_cluster,
|
|
'local#http://127.0.0.1:8080/v1')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#http://host/path'})(app)
|
|
self.assertEqual(ath.default_swift_cluster,
|
|
'local#http://host/path')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#https://host/path/'})(app)
|
|
self.assertEqual(ath.dsc_url, 'https://host/path')
|
|
self.assertEqual(ath.dsc_url2, 'https://host/path')
|
|
ath = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster':
|
|
'local#https://host/path/#http://host2/path2/'})(app)
|
|
self.assertEqual(ath.dsc_url, 'https://host/path')
|
|
self.assertEqual(ath.dsc_url2, 'http://host2/path2')
|
|
|
|
def test_credentials_match_auth_encoder_type(self):
|
|
plaintext_auth = {'auth': 'plaintext:key'}
|
|
sha1_key = ("sha1:T0YFdhqN4uDRWiYLxWa7H2T8AewG4fEYQyJFRLsgcfk=$46c58"
|
|
"07eb8a32e8f404fea9eaaeb60b7e1207ff1")
|
|
sha1_auth = {'auth': sha1_key}
|
|
sha512_key = ("sha512:aSm0jEeqIp46T5YLZy1r8+cXs/Xzs1S4VUwVauhBs44=$ef"
|
|
"7332ec1288bf69c75682eb8d459d5a84baa7e43f45949c242a9af9"
|
|
"7130ef16ac361fe1aa33a789e218122b83c54ef1923fc015080741"
|
|
"ca21f6187329f6cb7a")
|
|
sha512_auth = {'auth': sha512_key}
|
|
|
|
# test all possible config settings work with all possible auth types
|
|
for auth_type in ('plaintext', 'sha1', 'sha512'):
|
|
test_auth = auth.filter_factory({'super_admin_key': 'superkey',
|
|
'auth_type': auth_type})(FakeApp())
|
|
for detail in (plaintext_auth, sha1_auth, sha512_auth):
|
|
self.assertTrue(test_auth.credentials_match(detail, 'key'))
|
|
# test invalid auth type stored
|
|
invalid_detail = {'auth': 'Junk:key'}
|
|
test_auth.logger = mock.Mock()
|
|
self.assertFalse(test_auth.credentials_match(invalid_detail,
|
|
'key'))
|
|
# make sure error is logged
|
|
test_auth.logger.called_once_with('Invalid auth_type Junk')
|
|
|
|
def test_top_level_denied(self):
|
|
resp = Request.blank('/').get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_anon(self):
|
|
resp = Request.blank('/v1/AUTH_account').get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
self.test_auth.authorize)
|
|
|
|
def test_auth_deny_non_reseller_prefix(self):
|
|
resp = Request.blank('/v1/BLAH_account',
|
|
headers={'X-Auth-Token': 'BLAH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
self.test_auth.denied_response)
|
|
|
|
def test_auth_deny_non_reseller_prefix_no_override(self):
|
|
fake_authorize = lambda x: Response(status='500 Fake')
|
|
resp = Request.blank('/v1/BLAH_account',
|
|
headers={'X-Auth-Token': 'BLAH_t'},
|
|
environ={'swift.authorize': fake_authorize}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(resp.environ['swift.authorize'], fake_authorize)
|
|
|
|
def test_auth_no_reseller_prefix_deny(self):
|
|
# Ensures that when we have no reseller prefix, we don't deny a request
|
|
# outright but set up a denial swift.authorize and pass the request on
|
|
# down the chain.
|
|
local_app = FakeApp()
|
|
local_auth = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': ''})(local_app)
|
|
resp = Request.blank('/v1/account',
|
|
headers={'X-Auth-Token': 't'}).get_response(local_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
# one for checking auth, two for request passed along
|
|
self.assertEqual(local_app.calls, 2)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
local_auth.denied_response)
|
|
|
|
def test_auth_no_reseller_prefix_allow(self):
|
|
# Ensures that when we have no reseller prefix, we can still allow
|
|
# access if our auth server accepts requests
|
|
local_app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
local_auth = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': ''})(local_app)
|
|
resp = Request.blank('/v1/act',
|
|
headers={'X-Auth-Token': 't'}).get_response(local_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(local_app.calls, 2)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
local_auth.authorize)
|
|
|
|
def test_auth_no_reseller_prefix_no_token(self):
|
|
# Check that normally we set up a call back to our authorize.
|
|
local_auth = \
|
|
auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': ''})(FakeApp(iter([])))
|
|
resp = Request.blank('/v1/account').get_response(local_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
local_auth.authorize)
|
|
# Now make sure we don't override an existing swift.authorize when we
|
|
# have no reseller prefix.
|
|
local_auth = \
|
|
auth.filter_factory({'super_admin_key': 'supertest',
|
|
'reseller_prefix': ''})(FakeApp())
|
|
local_authorize = lambda req: Response('test')
|
|
resp = Request.blank('/v1/account', environ={'swift.authorize':
|
|
local_authorize}).get_response(local_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.environ['swift.authorize'], local_authorize)
|
|
|
|
def test_auth_fail(self):
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_auth_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_auth_memcache(self):
|
|
# First run our test without memcache, showing we need to return the
|
|
# token contents twice.
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, ''),
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
# Now run our test with memcache, showing we no longer need to return
|
|
# the token contents twice.
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, ''),
|
|
# Don't need a second token object returned if memcache is used
|
|
('204 No Content', {}, '')]))
|
|
fake_memcache = FakeMemcache()
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'},
|
|
environ={'swift.cache': fake_memcache}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'},
|
|
environ={'swift.cache': fake_memcache}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_auth_just_expired(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Request for token (which will have expired)
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() - 1})),
|
|
# Request to delete token
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_middleware_storage_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/v1/AUTH_cfa',
|
|
headers={'X-Storage-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_authorize_bad_path(self):
|
|
req = Request.blank('/badpath')
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 401)
|
|
req = Request.blank('/badpath')
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_authorize_account_access(self):
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_authorize_acl_group_access(self):
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = 'act'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = 'act:usr'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = 'act2'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
req = Request.blank('/v1/AUTH_cfa')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = 'act:usr2'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_deny_cross_reseller(self):
|
|
# Tests that cross-reseller is denied, even if ACLs/group names match
|
|
req = Request.blank('/v1/OTHER_cfa')
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
req.acl = 'act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_authorize_acl_referrer_access(self):
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.remote_user = 'act:usr,act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = '.r:*,.rlistings'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = '.r:*' # No listings allowed
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.remote_user = 'act:usr,act'
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.remote_user = 'act:usr,act'
|
|
req.referer = 'http://www.example.com/index.html'
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 401)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.acl = '.r:*,.rlistings'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.acl = '.r:*' # No listings allowed
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 401)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 401)
|
|
req = Request.blank('/v1/AUTH_cfa/c')
|
|
req.referer = 'http://www.example.com/index.html'
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
self.assertEqual(self.test_auth.authorize(req), None)
|
|
|
|
def test_detect_reseller_request(self):
|
|
req = self._make_request('/v1/AUTH_admin',
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
cache_key = 'AUTH_/auth/AUTH_t'
|
|
cache_entry = (time() + 3600, '.reseller_admin')
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
|
req.get_response(self.test_auth)
|
|
self.assertTrue(req.environ.get('reseller_request'))
|
|
|
|
def test_account_put_permissions(self):
|
|
req = Request.blank('/v1/AUTH_new', environ={'REQUEST_METHOD': 'PUT'})
|
|
req.remote_user = 'act:usr,act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
req = Request.blank('/v1/AUTH_new', environ={'REQUEST_METHOD': 'PUT'})
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
# Even PUTs to your own account as account admin should fail
|
|
req = Request.blank('/v1/AUTH_old', environ={'REQUEST_METHOD': 'PUT'})
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
req = Request.blank('/v1/AUTH_new', environ={'REQUEST_METHOD': 'PUT'})
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp, None)
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
# about
|
|
req = Request.blank('/v1/AUTH_new', environ={'REQUEST_METHOD': 'PUT'})
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_account_delete_permissions(self):
|
|
req = Request.blank('/v1/AUTH_new',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
req.remote_user = 'act:usr,act'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
req = Request.blank('/v1/AUTH_new',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
# Even DELETEs to your own account as account admin should fail
|
|
req = Request.blank('/v1/AUTH_old',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
req = Request.blank('/v1/AUTH_new',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp, None)
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
# about
|
|
req = Request.blank('/v1/AUTH_new',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_get_token_fail(self):
|
|
resp = Request.blank('/auth/v1.0').get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_get_token_fail_invalid_key(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'invalid'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_token_fail_invalid_x_auth_user_format(self):
|
|
resp = Request.blank('/auth/v1/act/auth',
|
|
headers={'X-Auth-User': 'usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_get_token_fail_non_matching_account_in_request(self):
|
|
resp = Request.blank('/auth/v1/act/auth',
|
|
headers={'X-Auth-User': 'act2:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_get_token_fail_bad_path(self):
|
|
resp = Request.blank('/auth/v1/act/auth/invalid',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_get_token_fail_missing_key(self):
|
|
resp = Request.blank('/auth/v1/act/auth',
|
|
headers={'X-Auth-User': 'act:usr'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_get_token_fail_get_user_details(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_token_fail_get_account(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_token_fail_put_new_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_get_token_fail_post_to_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_get_token_fail_get_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_fail_get_existing_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tktest'},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of token
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_token_success_v1_0(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_v1_0_with_user_token_life(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key',
|
|
'X-Auth-Token-Lifetime': 10}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
left = int(resp.headers['x-auth-token-expires'])
|
|
self.assertTrue(left > 0, '%d > 0' % left)
|
|
self.assertTrue(left <= 10, '%d <= 10' % left)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_v1_0_with_user_token_life_past_max(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
req = Request.blank(
|
|
'/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key',
|
|
'X-Auth-Token-Lifetime': MAX_TOKEN_LIFE * 10})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
left = int(resp.headers['x-auth-token-expires'])
|
|
self.assertTrue(left > DEFAULT_TOKEN_LIFE,
|
|
'%d > %d' % (left, DEFAULT_TOKEN_LIFE))
|
|
self.assertTrue(left <= MAX_TOKEN_LIFE,
|
|
'%d <= %d' % (left, MAX_TOKEN_LIFE))
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_v1_act_auth(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1/act/auth',
|
|
headers={'X-Storage-User': 'usr',
|
|
'X-Storage-Pass': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_storage_instead_of_auth(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Storage-User': 'act:usr',
|
|
'X-Storage-Pass': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_v1_act_auth_auth_instead_of_storage(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1/act/auth',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_existing_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tktest'},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of token
|
|
('200 Ok', {}, json.dumps({"account": "act", "user": "usr",
|
|
"account_id": "AUTH_cfa", "groups": [{'name': "act:usr"},
|
|
{'name': "key"}, {'name': ".admin"}],
|
|
"expires": 9999999999.9999999})),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.headers.get('x-auth-token'), 'AUTH_tktest')
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_get_token_success_existing_token_but_request_new_one(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tktest'},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# DELETE of expired token
|
|
('204 No Content', {}, ''),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key',
|
|
'X-Auth-New-Token': 'true'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertNotEqual(resp.headers.get('x-auth-token'), 'AUTH_tktest')
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
|
|
def test_get_token_success_existing_token_expired(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tktest'},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of token
|
|
('200 Ok', {}, json.dumps({"account": "act", "user": "usr",
|
|
"account_id": "AUTH_cfa", "groups": [{'name': "act:usr"},
|
|
{'name': "key"}, {'name': ".admin"}],
|
|
"expires": 0.0})),
|
|
# DELETE of expired token
|
|
('204 No Content', {}, ''),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertNotEqual(resp.headers.get('x-auth-token'), 'AUTH_tktest')
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 7)
|
|
|
|
def test_get_token_success_existing_token_expired_fail_deleting_old(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tktest'},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of token
|
|
('200 Ok', {}, json.dumps({"account": "act", "user": "usr",
|
|
"account_id": "AUTH_cfa", "groups": [{'name': "act:usr"},
|
|
{'name': "key"}, {'name': ".admin"}],
|
|
"expires": 0.0})),
|
|
# DELETE of expired token
|
|
('503 Service Unavailable', {}, ''),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': 'act:usr',
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertNotEqual(resp.headers.get('x-auth-token'), 'AUTH_tktest')
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 7)
|
|
|
|
def test_prep_success(self):
|
|
list_to_iter = [
|
|
# PUT of .auth account
|
|
('201 Created', {}, ''),
|
|
# PUT of .account_id container
|
|
('201 Created', {}, '')]
|
|
# PUT of .token* containers
|
|
for x in xrange(16):
|
|
list_to_iter.append(('201 Created', {}, ''))
|
|
self.test_auth.app = FakeApp(iter(list_to_iter))
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 18)
|
|
|
|
def test_prep_bad_method(self):
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_prep_bad_creds(self):
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': 'super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'upertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_prep_fail_account_create(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# PUT of .auth account
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_prep_fail_token_container_create(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# PUT of .auth account
|
|
('201 Created', {}, ''),
|
|
# PUT of .token container
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_prep_fail_account_id_container_create(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# PUT of .auth account
|
|
('201 Created', {}, ''),
|
|
# PUT of .token container
|
|
('201 Created', {}, ''),
|
|
# PUT of .account_id container
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/.prep',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_get_reseller_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .auth account (list containers)
|
|
('200 Ok', {}, json.dumps([
|
|
{"name": ".token", "count": 0, "bytes": 0},
|
|
{"name": ".account_id", "count": 0, "bytes": 0},
|
|
{"name": "act", "count": 0, "bytes": 0}])),
|
|
# GET of .auth account (list containers continuation)
|
|
('200 Ok', {}, '[]')]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"accounts": [{"name": "act"}]})
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"},
|
|
{"name": ".reseller_admin"}], "auth": "plaintext:key"})),
|
|
# GET of .auth account (list containers)
|
|
('200 Ok', {}, json.dumps([
|
|
{"name": ".token", "count": 0, "bytes": 0},
|
|
{"name": ".account_id", "count": 0, "bytes": 0},
|
|
{"name": "act", "count": 0, "bytes": 0}])),
|
|
# GET of .auth account (list containers continuation)
|
|
('200 Ok', {}, '[]')]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"accounts": [{"name": "act"}]})
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_get_reseller_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but not reseller admin)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_reseller_fail_listing(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .auth account (list containers)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .auth account (list containers)
|
|
('200 Ok', {}, json.dumps([
|
|
{"name": ".token", "count": 0, "bytes": 0},
|
|
{"name": ".account_id", "count": 0, "bytes": 0},
|
|
{"name": "act", "count": 0, "bytes": 0}])),
|
|
# GET of .auth account (list containers continuation)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_account_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"},
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of account container (list objects continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{'account_id': 'AUTH_cfa',
|
|
'services': {'storage':
|
|
{'default': 'local',
|
|
'local': 'http://127.0.0.1:8080/v1/AUTH_cfa'}},
|
|
'users': [{'name': 'tester'}, {'name': 'tester3'}]})
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"},
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of account container (list objects continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{'account_id': 'AUTH_cfa',
|
|
'services': {'storage':
|
|
{'default': 'local',
|
|
'local': 'http://127.0.0.1:8080/v1/AUTH_cfa'}},
|
|
'users': [{'name': 'tester'}, {'name': 'tester3'}]})
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_get_account_fail_bad_account_name(self):
|
|
resp = Request.blank('/auth/v2/.token',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
resp = Request.blank('/auth/v2/.anything',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_get_account_fail_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but wrong account)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': 'act2:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_account_fail_get_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_account_fail_listing(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# GET of account container (list objects)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# GET of account container (list objects)
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"},
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of account container (list objects continuation)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_set_services_new_service(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# PUT of new .services object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'new_service': {'new_endpoint': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{'storage': {'default': 'local',
|
|
'local': 'http://127.0.0.1:8080/v1/AUTH_cfa'},
|
|
'new_service': {'new_endpoint': 'new_value'}})
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_set_services_new_endpoint(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# PUT of new .services object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'storage': {'new_endpoint': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{'storage': {'default': 'local',
|
|
'local': 'http://127.0.0.1:8080/v1/AUTH_cfa',
|
|
'new_endpoint': 'new_value'}})
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_set_services_update_endpoint(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# PUT of new .services object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'storage': {'local': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(json.loads(resp.body),
|
|
{'storage': {'default': 'local',
|
|
'local': 'new_value'}})
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_set_services_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'storage': {'local': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but not reseller admin)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
body=json.dumps({'storage': {'local': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
body=json.dumps({'storage': {'local': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_set_services_fail_bad_account_name(self):
|
|
resp = Request.blank('/auth/v2/.act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'storage': {'local': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_set_services_fail_bad_json(self):
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body='garbage'
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=''
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_set_services_fail_get_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('503 Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'new_service': {'new_endpoint': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'new_service': {'new_endpoint': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_set_services_fail_put_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# PUT of new .services object
|
|
('503 Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.services',
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
body=json.dumps({'new_service': {'new_endpoint': 'new_value'}})
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_put_account_success(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('204 No Content', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# PUT of .services object
|
|
('204 No Content', {}, ''),
|
|
# POST to account container updating X-Container-Meta-Account-Id
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_put_account_success_preexist_but_not_completed(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
# We're going to show it as existing this time, but with no
|
|
# X-Container-Meta-Account-Id, indicating a failed previous attempt
|
|
('200 Ok', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# PUT of .services object
|
|
('204 No Content', {}, ''),
|
|
# POST to account container updating X-Container-Meta-Account-Id
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_put_account_success_preexist_and_completed(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
# We're going to show it as existing this time, and with an
|
|
# X-Container-Meta-Account-Id, indicating it already exists
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 202)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_account_success_with_given_suffix(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('204 No Content', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# PUT of .services object
|
|
('204 No Content', {}, ''),
|
|
# POST to account container updating X-Container-Meta-Account-Id
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Account-Suffix': 'test-suffix'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(conn.request_path, '/v1/AUTH_test-suffix')
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_put_account_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but not reseller admin)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_account_fail_invalid_account_name(self):
|
|
resp = Request.blank('/auth/v2/.act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_put_account_fail_on_storage_account_put(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('503 Service Unavailable', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(conn.calls, 1)
|
|
self.assertEqual(self.test_auth.app.calls, 0)
|
|
|
|
def test_put_account_fail_on_initial_account_head(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_account_fail_on_account_marker_put(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_put_account_fail_on_account_id_mapping(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('204 No Content', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(conn.calls, 1)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_put_account_fail_on_services_object(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('204 No Content', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# PUT of .services object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(conn.calls, 1)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_put_account_fail_on_post_mapping(self):
|
|
conn = FakeConn(iter([
|
|
# PUT of storage account itself
|
|
('201 Created', {}, '')]))
|
|
self.test_auth.get_conn = lambda: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Initial HEAD of account container to check for pre-existence
|
|
('404 Not Found', {}, ''),
|
|
# PUT of account container
|
|
('204 No Content', {}, ''),
|
|
# PUT of .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# PUT of .services object
|
|
('204 No Content', {}, ''),
|
|
# POST to account container updating X-Container-Meta-Account-Id
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(conn.calls, 1)
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_delete_account_success(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the account container
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_success_missing_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('404 Not Found', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the account container
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_delete_account_success_missing_storage_account(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('404 Not Found', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the account container
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_success_missing_account_id_mapping(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('404 Not Found', {}, ''),
|
|
# DELETE the account container
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_success_missing_account_container_at_end(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the account container
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but not reseller admin)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_account_fail_invalid_account_name(self):
|
|
resp = Request.blank('/auth/v2/.act',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_delete_account_fail_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_account_fail_not_found_concurrency(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_delete_account_fail_list_account(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_account_fail_list_account_concurrency(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_delete_account_fail_has_users(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"}]))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 409)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_account_fail_has_users2(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"}]))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 409)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_delete_account_fail_get_services(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_delete_account_fail_delete_storage_account(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('409 Conflict', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 409)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_fail_delete_storage_account2(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, ''),
|
|
# DELETE of storage account itself
|
|
('409 Conflict', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa",
|
|
"other": "http://127.0.0.1:8080/v1/AUTH_cfa2"}}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
self.assertEqual(conn.calls, 2)
|
|
|
|
def test_delete_account_fail_delete_storage_account3(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('503 Service Unavailable', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_fail_delete_storage_account4(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, ''),
|
|
# DELETE of storage account itself
|
|
('503 Service Unavailable', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa",
|
|
"other": "http://127.0.0.1:8080/v1/AUTH_cfa2"}}))]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
self.assertEqual(conn.calls, 2)
|
|
|
|
def test_delete_account_fail_delete_services(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_fail_delete_account_id_mapping(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_delete_account_fail_delete_account_container(self):
|
|
conn = FakeConn(iter([
|
|
# DELETE of storage account itself
|
|
('204 No Content', {}, '')]))
|
|
self.test_auth.get_conn = lambda x: conn
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Account's container listing, checking for users
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"}])),
|
|
# Account's container listing, checking for users (continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]'),
|
|
# GET the .services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})),
|
|
# DELETE the .services object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the .account_id mapping object
|
|
('204 No Content', {}, ''),
|
|
# DELETE the account container
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'swift.cache': FakeMemcache()},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 6)
|
|
self.assertEqual(conn.calls, 1)
|
|
|
|
def test_get_user_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.body, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"}))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_fail_no_super_admin_key(self):
|
|
local_auth = auth.filter_factory({})(FakeApp(iter([
|
|
# GET of user object (but we should never get here)
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"}))])))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(local_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(local_auth.app.calls, 0)
|
|
|
|
def test_get_user_groups_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"},
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:tester"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:tester3"}, {"name": "act"}],
|
|
"auth": "plaintext:key3"})),
|
|
# GET of account container (list objects continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]')]))
|
|
resp = Request.blank('/auth/v2/act/.groups',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.body, json.dumps(
|
|
{"groups": [{"name": ".admin"}, {"name": "act"},
|
|
{"name": "act:tester"}, {"name": "act:tester3"}]}))
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_get_user_groups_success2(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"}])),
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:tester"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of account container (list objects continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:tester3"}, {"name": "act"}],
|
|
"auth": "plaintext:key3"})),
|
|
# GET of account container (list objects continuation)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, '[]')]))
|
|
resp = Request.blank('/auth/v2/act/.groups',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.body, json.dumps(
|
|
{"groups": [{"name": ".admin"}, {"name": "act"},
|
|
{"name": "act:tester"}, {"name": "act:tester3"}]}))
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_user_fail_invalid_account(self):
|
|
resp = Request.blank('/auth/v2/.invalid/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_get_user_fail_invalid_user(self):
|
|
resp = Request.blank('/auth/v2/act/.invalid',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_get_user_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'super:admin',
|
|
'X-Auth-Admin-Key': 'supertest'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'},
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_account_admin_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but not reseller admin)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of requested user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.body, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"}],
|
|
"auth": "plaintext:key"}))
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_user_account_admin_fail_getting_account_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin check)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of requested user object [who is an .admin as well]
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of user object (reseller admin check [and fail here])
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_get_user_account_admin_fail_getting_reseller_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin check)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of requested user object [who is a .reseller_admin]
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_user_reseller_admin_fail_getting_reseller_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin check)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of requested user object [who also is a .reseller_admin]
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_user_super_admin_succeed_getting_reseller_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of requested user object
|
|
('200 Ok', {}, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertEqual(resp.body, json.dumps(
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"}))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_groups_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of account container (list objects)
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.groups',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_groups_fail_listing(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of account container (list objects)
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.groups',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_groups_fail_get_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of account container (list objects)
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'},
|
|
json.dumps([
|
|
{"name": ".services", "hash": "etag", "bytes": 112,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.618110"},
|
|
{"name": "tester", "hash": "etag", "bytes": 104,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:27.736680"},
|
|
{"name": "tester3", "hash": "etag", "bytes": 86,
|
|
"content_type": "application/octet-stream",
|
|
"last_modified": "2010-12-03T17:16:28.135530"}])),
|
|
# GET of user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/.groups',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_get_user_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_user_fail(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_user_fail_invalid_account(self):
|
|
resp = Request.blank('/auth/v2/.invalid/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_put_user_fail_invalid_user(self):
|
|
resp = Request.blank('/auth/v2/act/.usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_put_user_fail_no_user_key(self):
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_put_user_reseller_admin_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Checking if user is changing his own key. This is called.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:rdm"},
|
|
{"name": "test"}, {"name": ".admin"},
|
|
{"name": ".reseller_admin"}], "auth": "plaintext:key"})),
|
|
# GET of user object (reseller admin)
|
|
# This shouldn't actually get called, checked
|
|
# below
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:rdm"},
|
|
{"name": "test"}, {"name": ".admin"},
|
|
{"name": ".reseller_admin"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act:rdm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Reseller-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Checking if user is changing his own key. This is called.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of user object (account admin, but not reseller admin)
|
|
# This shouldn't actually get called, checked
|
|
# below
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Reseller-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# Checking if user is changing his own key. This is called.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# GET of user object (regular user)
|
|
# This shouldn't actually get called, checked
|
|
# below
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Reseller-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_user_account_admin_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but wrong account)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# Checking if user is changing his own key.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act2:adm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# Checking if user is changing his own key.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_put_user_regular_fail_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (account admin, but wrong
|
|
# account)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# Checking if user is changing his own key.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act2:adm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# Checking if user is changing his own key.
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act2/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_put_user_regular_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
self.assertEqual(json.loads(self.test_auth.app.request.body),
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"}],
|
|
"auth": "plaintext:key"})
|
|
|
|
def test_put_user_special_chars_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/u_s-r',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
self.assertEqual(json.loads(self.test_auth.app.request.body),
|
|
{"groups": [{"name": "act:u_s-r"}, {"name": "act"}],
|
|
"auth": "plaintext:key"})
|
|
|
|
def test_put_user_account_admin_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
self.assertEqual(json.loads(self.test_auth.app.request.body),
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}],
|
|
"auth": "plaintext:key"})
|
|
|
|
def test_put_user_reseller_admin_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Reseller-Admin': 'true'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
self.assertEqual(json.loads(self.test_auth.app.request.body),
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"},
|
|
{"name": ".admin"}, {"name": ".reseller_admin"}],
|
|
"auth": "plaintext:key"})
|
|
|
|
def test_put_user_fail_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_put_user_fail(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# PUT of user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_put_user_key_hash(self):
|
|
key_hash = ("sha512:aSm0jEeqIp46T5YLZy1r8+cXs/Xzs1S4VUwVauhBs44=$ef"
|
|
"7332ec1288bf69c75682eb8d459d5a84baa7e43f45949c242a9af9"
|
|
"7130ef16ac361fe1aa33a789e218122b83c54ef1923fc015080741"
|
|
"ca21f6187329f6cb7a")
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key-Hash': quote(key_hash)}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 201)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
self.assertEqual(json.loads(self.test_auth.app.request.body),
|
|
{"groups": [{"name": "act:usr"}, {"name": "act"}],
|
|
"auth": key_hash})
|
|
|
|
def test_put_user_key_hash_wrong_type(self):
|
|
key_hash = "wrong_auth_type:1234"
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key-Hash': quote(key_hash)}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
self.assertEqual(self.test_auth.app.calls, 0)
|
|
|
|
def test_put_user_key_hash_wrong_format(self):
|
|
key_hash = "1234"
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of user object
|
|
('201 Created', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest',
|
|
'X-Auth-User-Key-Hash': quote(key_hash)}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
self.assertEqual(self.test_auth.app.calls, 0)
|
|
|
|
def test_delete_user_bad_creds(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"})),
|
|
# GET of user object (account admin, but wrong account)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': 'act2:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# GET of user object (regular user)
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_delete_reseller_admin_user_fail(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user being deleted a reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:re_adm"},
|
|
{"name": "act2"}, {"name": ".admin"},
|
|
{"name": ".reseller_admin"}], "auth": "plaintext:key"})),
|
|
# GET of user object
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:adm"},
|
|
{"name": "act2"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
|
|
resp = Request.blank('/auth/v2/act2/re_adm',
|
|
environ={
|
|
'REQUEST_METHOD': 'DELETE'},
|
|
headers={
|
|
'X-Auth-Admin-User':
|
|
'act2:adm',
|
|
'X-Auth-Admin-Key': 'key'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 403)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_reseller_admin_user_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user being deleted a reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act2:re_adm"},
|
|
{"name": "act2"}, {"name": ".admin"},
|
|
{"name": ".reseller_admin"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok',
|
|
{'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('204 No Content', {}, ''),
|
|
# DELETE of user object
|
|
('204 No Content', {}, '')]))
|
|
|
|
resp = Request.blank('/auth/v2/act2/re_adm',
|
|
environ={
|
|
'REQUEST_METHOD': 'DELETE'},
|
|
headers={
|
|
'X-Auth-Admin-User':
|
|
'.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_delete_user_invalid_account(self):
|
|
resp = Request.blank('/auth/v2/.invalid/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_delete_user_invalid_user(self):
|
|
resp = Request.blank('/auth/v2/act/.invalid',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_delete_user_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# HEAD of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_user_fail_head_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# HEAD of user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_delete_user_fail_delete_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_delete_user_fail_delete_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('204 No Content', {}, ''),
|
|
# DELETE of user object
|
|
('503 Service Unavailable', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_delete_user_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('204 No Content', {}, ''),
|
|
# DELETE of user object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_delete_user_success_missing_user_at_end(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('204 No Content', {}, ''),
|
|
# DELETE of user object
|
|
('404 Not Found', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_delete_user_success_missing_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {'X-Object-Meta-Auth-Token': 'AUTH_tk'}, ''),
|
|
# DELETE of token
|
|
('404 Not Found', {}, ''),
|
|
# DELETE of user object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 4)
|
|
|
|
def test_delete_user_success_no_token(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# is user reseller_admin
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"})),
|
|
# HEAD of user object
|
|
('200 Ok', {}, ''),
|
|
# DELETE of user object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/act/usr',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 3)
|
|
|
|
def test_validate_token_bad_prefix(self):
|
|
resp = Request.blank('/auth/v2/.token/BAD_token') \
|
|
.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_validate_token_tmi(self):
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token/tmi') \
|
|
.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
|
|
def test_validate_token_bad_memcache(self):
|
|
fake_memcache = FakeMemcache()
|
|
fake_memcache.set('AUTH_/auth/AUTH_token', 'bogus')
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token',
|
|
environ={'swift.cache':
|
|
fake_memcache}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 500)
|
|
|
|
def test_validate_token_from_memcache(self):
|
|
fake_memcache = FakeMemcache()
|
|
fake_memcache.set('AUTH_/auth/AUTH_token', (time() + 1, 'act:usr,act'))
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token',
|
|
environ={'swift.cache':
|
|
fake_memcache}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(resp.headers.get('x-auth-groups'), 'act:usr,act')
|
|
self.assertTrue(float(resp.headers['x-auth-ttl']) < 1,
|
|
resp.headers['x-auth-ttl'])
|
|
|
|
def test_validate_token_from_memcache_expired(self):
|
|
fake_memcache = FakeMemcache()
|
|
fake_memcache.set('AUTH_/auth/AUTH_token', (time() - 1, 'act:usr,act'))
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token',
|
|
environ={'swift.cache':
|
|
fake_memcache}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertTrue('x-auth-groups' not in resp.headers)
|
|
self.assertTrue('x-auth-ttl' not in resp.headers)
|
|
|
|
def test_validate_token_from_object(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of token object
|
|
('200 Ok', {}, json.dumps({'groups': [{'name': 'act:usr'},
|
|
{'name': 'act'}], 'expires': time() + 1}))]))
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token'
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertEqual(resp.headers.get('x-auth-groups'), 'act:usr,act')
|
|
self.assertTrue(float(resp.headers['x-auth-ttl']) < 1,
|
|
resp.headers['x-auth-ttl'])
|
|
|
|
def test_validate_token_from_object_expired(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of token object
|
|
('200 Ok', {}, json.dumps({'groups': 'act:usr,act',
|
|
'expires': time() - 1})),
|
|
# DELETE of expired token object
|
|
('204 No Content', {}, '')]))
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token'
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertEqual(self.test_auth.app.calls, 2)
|
|
|
|
def test_validate_token_from_object_with_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of token object
|
|
('200 Ok', {}, json.dumps({'account_id': 'AUTH_cfa', 'groups':
|
|
[{'name': 'act:usr'}, {'name': 'act'}, {'name': '.admin'}],
|
|
'expires': time() + 1}))]))
|
|
resp = Request.blank('/auth/v2/.token/AUTH_token'
|
|
).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertEqual(resp.headers.get('x-auth-groups'),
|
|
'act:usr,act,AUTH_cfa')
|
|
self.assertTrue(float(resp.headers['x-auth-ttl']) < 1,
|
|
resp.headers['x-auth-ttl'])
|
|
|
|
def test_get_conn_default(self):
|
|
conn = self.test_auth.get_conn()
|
|
self.assertEqual(conn.__class__, auth.HTTPConnection)
|
|
self.assertEqual(conn.host, '127.0.0.1')
|
|
self.assertEqual(conn.port, 8080)
|
|
|
|
def test_get_conn_default_https(self):
|
|
local_auth = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#https://1.2.3.4/v1'})(FakeApp())
|
|
conn = local_auth.get_conn()
|
|
self.assertEqual(conn.__class__, auth.HTTPSConnection)
|
|
self.assertEqual(conn.host, '1.2.3.4')
|
|
self.assertEqual(conn.port, 443)
|
|
|
|
def test_get_conn_overridden(self):
|
|
local_auth = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#https://1.2.3.4/v1'})(FakeApp())
|
|
conn = \
|
|
local_auth.get_conn(urlparsed=auth.urlparse('http://5.6.7.8/v1'))
|
|
self.assertEqual(conn.__class__, auth.HTTPConnection)
|
|
self.assertEqual(conn.host, '5.6.7.8')
|
|
self.assertEqual(conn.port, 80)
|
|
|
|
def test_get_conn_overridden_https(self):
|
|
local_auth = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'default_swift_cluster': 'local#http://1.2.3.4/v1'})(FakeApp())
|
|
conn = \
|
|
local_auth.get_conn(urlparsed=auth.urlparse('https://5.6.7.8/v1'))
|
|
self.assertEqual(conn.__class__, auth.HTTPSConnection)
|
|
self.assertEqual(conn.host, '5.6.7.8')
|
|
self.assertEqual(conn.port, 443)
|
|
|
|
def test_get_itoken_fail_no_memcache(self):
|
|
exc = None
|
|
try:
|
|
self.test_auth.get_itoken({})
|
|
except Exception as err:
|
|
exc = err
|
|
self.assertEqual(str(exc),
|
|
'No memcache set up; required for Swauth middleware')
|
|
|
|
def test_get_itoken_success(self):
|
|
fmc = FakeMemcache()
|
|
itk = self.test_auth.get_itoken({'swift.cache': fmc})
|
|
self.assertTrue(itk.startswith('AUTH_itk'), itk)
|
|
expires, groups = fmc.get('AUTH_/auth/%s' % itk)
|
|
self.assertTrue(expires > time(), expires)
|
|
self.assertEqual(groups, '.auth,.reseller_admin,AUTH_.auth')
|
|
|
|
def test_get_admin_detail_fail_no_colon(self):
|
|
self.test_auth.app = FakeApp(iter([]))
|
|
self.assertEqual(self.test_auth.get_admin_detail(Request.blank('/')),
|
|
None)
|
|
self.assertEqual(self.test_auth.get_admin_detail(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'usr'})), None)
|
|
self.assertRaises(StopIteration, self.test_auth.get_admin_detail,
|
|
Request.blank('/', headers={'X-Auth-Admin-User': 'act:usr'}))
|
|
|
|
def test_get_admin_detail_fail_user_not_found(self):
|
|
self.test_auth.app = FakeApp(iter([('404 Not Found', {}, '')]))
|
|
self.assertEqual(self.test_auth.get_admin_detail(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'})), None)
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_admin_detail_fail_get_user_error(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('503 Service Unavailable', {}, '')]))
|
|
exc = None
|
|
try:
|
|
self.test_auth.get_admin_detail(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}))
|
|
except Exception as err:
|
|
exc = err
|
|
self.assertEqual(str(exc), 'Could not get user object: '
|
|
'/v1/AUTH_.auth/act/usr 503 Service Unavailable')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_get_admin_detail_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]}))]))
|
|
detail = self.test_auth.get_admin_detail(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertEqual(detail, {'account': 'act',
|
|
'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}]})
|
|
|
|
def test_get_user_detail_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]}))]))
|
|
detail = self.test_auth.get_user_detail(
|
|
Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}),
|
|
'act', 'usr')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
detail_json = json.loads(detail)
|
|
self.assertEqual("plaintext:key", detail_json['auth'])
|
|
|
|
def test_get_user_detail_fail_user_doesnt_exist(self):
|
|
self.test_auth.app = FakeApp(
|
|
iter([('404 Not Found', {}, '')]))
|
|
detail = self.test_auth.get_user_detail(
|
|
Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}),
|
|
'act', 'usr')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertEqual(detail, None)
|
|
|
|
def test_get_user_detail_fail_exception(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('503 Service Unavailable', {}, '')]))
|
|
exc = None
|
|
try:
|
|
self.test_auth.get_user_detail(
|
|
Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}),
|
|
'act', 'usr')
|
|
except Exception as err:
|
|
exc = err
|
|
self.assertEqual(str(exc), 'Could not get user object: '
|
|
'/v1/AUTH_.auth/act/usr 503 Service Unavailable')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_is_user_reseller_admin_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".reseller_admin"}]}))]))
|
|
result = self.test_auth.is_user_reseller_admin(
|
|
Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}),
|
|
'act', 'usr')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertTrue(result)
|
|
|
|
def test_is_user_reseller_admin_fail(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:key",
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]}))]))
|
|
result = self.test_auth.is_user_reseller_admin(
|
|
Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr'}),
|
|
'act', 'usr')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertFalse(result)
|
|
|
|
def test_is_user_reseller_admin_fail_user_doesnt_exist(self):
|
|
self.test_auth.app = FakeApp(
|
|
iter([('404 Not Found', {}, '')]))
|
|
req = Request.blank('/', headers={'X-Auth-Admin-User': 'act:usr'})
|
|
result = self.test_auth.is_user_reseller_admin(req, 'act', 'usr')
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
self.assertFalse(result)
|
|
self.assertFalse(req.credentials_valid)
|
|
|
|
def test_credentials_match_success(self):
|
|
self.assertTrue(self.test_auth.credentials_match(
|
|
{'auth': 'plaintext:key'}, 'key'))
|
|
|
|
def test_credentials_match_fail_no_details(self):
|
|
self.assertTrue(not self.test_auth.credentials_match(None, 'notkey'))
|
|
|
|
def test_credentials_match_fail_plaintext(self):
|
|
self.assertTrue(not self.test_auth.credentials_match(
|
|
{'auth': 'plaintext:key'}, 'notkey'))
|
|
|
|
def test_is_user_changing_own_key_err(self):
|
|
# User does not exist
|
|
self.test_auth.app = FakeApp(
|
|
iter([('404 Not Found', {}, '')]))
|
|
req = Request.blank('/auth/v2/act/usr',
|
|
environ={
|
|
'REQUEST_METHOD': 'PUT'},
|
|
headers={
|
|
'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key'})
|
|
self.assertTrue(
|
|
not self.test_auth.is_user_changing_own_key(req, 'act:usr'))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
# user attempting to escalate himself as admin
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
req = Request.blank('/auth/v2/act/usr',
|
|
environ={
|
|
'REQUEST_METHOD': 'PUT'},
|
|
headers={
|
|
'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Admin': 'true'})
|
|
self.assertTrue(
|
|
not self.test_auth.is_user_changing_own_key(req, 'act:usr'))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
# admin attempting to escalate himself as reseller_admin
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:adm"},
|
|
{"name": "test"}, {"name": ".admin"}],
|
|
"auth": "plaintext:key"}))]))
|
|
req = Request.blank('/auth/v2/act/adm',
|
|
environ={
|
|
'REQUEST_METHOD': 'PUT'},
|
|
headers={
|
|
'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key',
|
|
'X-Auth-User-Reseller-Admin': 'true'})
|
|
self.assertTrue(
|
|
not self.test_auth.is_user_changing_own_key(req, 'act:adm'))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
# different user
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
req = Request.blank('/auth/v2/act/usr2',
|
|
environ={
|
|
'REQUEST_METHOD': 'PUT'},
|
|
headers={
|
|
'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key',
|
|
'X-Auth-User-Key': 'key'})
|
|
self.assertTrue(
|
|
not self.test_auth.is_user_changing_own_key(req, 'act:usr2'))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
# wrong key
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {}, json.dumps({"groups": [{"name": "act:usr"},
|
|
{"name": "test"}], "auth": "plaintext:key"}))]))
|
|
req = Request.blank('/auth/v2/act/usr',
|
|
environ={
|
|
'REQUEST_METHOD': 'PUT'},
|
|
headers={
|
|
'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'wrongkey',
|
|
'X-Auth-User-Key': 'newkey'})
|
|
self.assertTrue(
|
|
not self.test_auth.is_user_changing_own_key(req, 'act:usr'))
|
|
self.assertEqual(self.test_auth.app.calls, 1)
|
|
|
|
def test_is_super_admin_success(self):
|
|
self.assertTrue(self.test_auth.is_super_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'})))
|
|
|
|
def test_is_super_admin_fail_bad_key(self):
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'bad'})))
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': '.super_admin'})))
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/')))
|
|
|
|
def test_is_super_admin_fail_bad_user(self):
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'bad',
|
|
'X-Auth-Admin-Key': 'supertest'})))
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-Key': 'supertest'})))
|
|
self.assertTrue(not self.test_auth.is_super_admin(Request.blank('/')))
|
|
|
|
def test_is_reseller_admin_success_is_super_admin(self):
|
|
self.assertTrue(self.test_auth.is_reseller_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'})))
|
|
|
|
def test_is_reseller_admin_success_called_get_admin_detail(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:rdm'}, {'name': 'act'},
|
|
{'name': '.admin'},
|
|
{'name': '.reseller_admin'}]}))]))
|
|
self.assertTrue(self.test_auth.is_reseller_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:rdm',
|
|
'X-Auth-Admin-Key': 'key'})))
|
|
|
|
def test_is_reseller_admin_fail_only_account_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:adm'}, {'name': 'act'},
|
|
{'name': '.admin'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_reseller_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'})))
|
|
|
|
def test_is_reseller_admin_fail_regular_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_reseller_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'})))
|
|
|
|
def test_is_reseller_admin_fail_bad_key(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:rdm'}, {'name': 'act'},
|
|
{'name': '.admin'},
|
|
{'name': '.reseller_admin'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_reseller_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:rdm',
|
|
'X-Auth-Admin-Key': 'bad'})))
|
|
|
|
def test_is_account_admin_success_is_super_admin(self):
|
|
self.assertTrue(self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': '.super_admin',
|
|
'X-Auth-Admin-Key': 'supertest'}), 'act'))
|
|
|
|
def test_is_account_admin_success_is_reseller_admin(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:rdm'}, {'name': 'act'},
|
|
{'name': '.admin'},
|
|
{'name': '.reseller_admin'}]}))]))
|
|
self.assertTrue(self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:rdm',
|
|
'X-Auth-Admin-Key': 'key'}), 'act'))
|
|
|
|
def test_is_account_admin_success(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:adm'}, {'name': 'act'},
|
|
{'name': '.admin'}]}))]))
|
|
self.assertTrue(self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:adm',
|
|
'X-Auth-Admin-Key': 'key'}), 'act'))
|
|
|
|
def test_is_account_admin_fail_account_admin_different_account(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act2:adm'}, {'name': 'act2'},
|
|
{'name': '.admin'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act2:adm',
|
|
'X-Auth-Admin-Key': 'key'}), 'act'))
|
|
|
|
def test_is_account_admin_fail_regular_user(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:usr',
|
|
'X-Auth-Admin-Key': 'key'}), 'act'))
|
|
|
|
def test_is_account_admin_fail_bad_key(self):
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'auth': 'plaintext:key',
|
|
'groups': [{'name': 'act:rdm'}, {'name': 'act'},
|
|
{'name': '.admin'},
|
|
{'name': '.reseller_admin'}]}))]))
|
|
self.assertTrue(not self.test_auth.is_account_admin(Request.blank('/',
|
|
headers={'X-Auth-Admin-User': 'act:rdm',
|
|
'X-Auth-Admin-Key': 'bad'}), 'act'))
|
|
|
|
def test_reseller_admin_but_account_is_internal_use_only(self):
|
|
req = Request.blank('/v1/AUTH_.auth',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def test_reseller_admin_but_account_is_exactly_reseller_prefix(self):
|
|
req = Request.blank('/v1/AUTH_', environ={'REQUEST_METHOD': 'GET'})
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
resp = self.test_auth.authorize(req)
|
|
self.assertEqual(resp.status_int, 403)
|
|
|
|
def _get_token_success_v1_0_encoded(self, saved_user, saved_key, sent_user,
|
|
sent_key):
|
|
self.test_auth.app = FakeApp(iter([
|
|
# GET of user object
|
|
('200 Ok', {},
|
|
json.dumps({"auth": "plaintext:%s" % saved_key,
|
|
"groups": [{'name': saved_user}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
# GET of account
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_cfa'}, ''),
|
|
# PUT of new token
|
|
('201 Created', {}, ''),
|
|
# POST of token to user object
|
|
('204 No Content', {}, ''),
|
|
# GET of services object
|
|
('200 Ok', {}, json.dumps({"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}}))]))
|
|
resp = Request.blank('/auth/v1.0',
|
|
headers={'X-Auth-User': sent_user,
|
|
'X-Auth-Key': sent_key}).get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 200)
|
|
self.assertEqual(resp.content_type, CONTENT_TYPE_JSON)
|
|
self.assertTrue(resp.headers.get('x-auth-token',
|
|
'').startswith('AUTH_tk'), resp.headers.get('x-auth-token'))
|
|
self.assertEqual(resp.headers.get('x-auth-token'),
|
|
resp.headers.get('x-storage-token'))
|
|
self.assertEqual(resp.headers.get('x-storage-url'),
|
|
'http://127.0.0.1:8080/v1/AUTH_cfa')
|
|
self.assertEqual(json.loads(resp.body),
|
|
{"storage": {"default": "local",
|
|
"local": "http://127.0.0.1:8080/v1/AUTH_cfa"}})
|
|
self.assertEqual(self.test_auth.app.calls, 5)
|
|
|
|
def test_get_token_success_v1_0_encoded1(self):
|
|
self._get_token_success_v1_0_encoded(
|
|
'act:usr', 'key', 'act%3ausr', 'key')
|
|
|
|
def test_get_token_success_v1_0_encoded2(self):
|
|
self._get_token_success_v1_0_encoded(
|
|
'act:u s r', 'key', 'act%3au%20s%20r', 'key')
|
|
|
|
def test_get_token_success_v1_0_encoded3(self):
|
|
self._get_token_success_v1_0_encoded(
|
|
'act:u s r', 'k:e:y', 'act%3au%20s%20r', 'k%3Ae%3ay')
|
|
|
|
def test_allowed_sync_hosts(self):
|
|
a = auth.filter_factory({'super_admin_key': 'supertest'})(FakeApp())
|
|
self.assertEqual(a.allowed_sync_hosts, ['127.0.0.1'])
|
|
a = auth.filter_factory({'super_admin_key': 'supertest',
|
|
'allowed_sync_hosts':
|
|
'1.1.1.1,2.1.1.1, 3.1.1.1 , 4.1.1.1,, , 5.1.1.1'})(FakeApp())
|
|
self.assertEqual(a.allowed_sync_hosts,
|
|
['1.1.1.1', '2.1.1.1', '3.1.1.1', '4.1.1.1', '5.1.1.1'])
|
|
|
|
def test_reseller_admin_is_owner(self):
|
|
orig_authorize = self.test_auth.authorize
|
|
owner_values = []
|
|
|
|
def mitm_authorize(req):
|
|
rv = orig_authorize(req)
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
return rv
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'other', 'user': 'other:usr',
|
|
'account_id': 'AUTH_other',
|
|
'groups': [{'name': 'other:usr'}, {'name': 'other'},
|
|
{'name': '.reseller_admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
req = Request.blank('/v1/AUTH_cfa', headers={'X-Auth-Token': 'AUTH_t'})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(owner_values, [True])
|
|
|
|
def test_admin_is_owner(self):
|
|
orig_authorize = self.test_auth.authorize
|
|
owner_values = []
|
|
|
|
def mitm_authorize(req):
|
|
rv = orig_authorize(req)
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
return rv
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'},
|
|
{'name': '.admin'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]))
|
|
req = Request.blank('/v1/AUTH_cfa', headers={'X-Auth-Token': 'AUTH_t'})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(owner_values, [True])
|
|
|
|
def test_regular_is_not_owner(self):
|
|
orig_authorize = self.test_auth.authorize
|
|
owner_values = []
|
|
|
|
def mitm_authorize(req):
|
|
rv = orig_authorize(req)
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
return rv
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({'account': 'act', 'user': 'act:usr',
|
|
'account_id': 'AUTH_cfa',
|
|
'groups': [{'name': 'act:usr'}, {'name': 'act'}],
|
|
'expires': time() + 60})),
|
|
('204 No Content', {}, '')]), acl='act:usr')
|
|
req = Request.blank('/v1/AUTH_cfa/c',
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
self.assertEqual(owner_values, [False])
|
|
|
|
def test_sync_request_success(self):
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456'})
|
|
req.remote_addr = '127.0.0.1'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
|
|
def test_sync_request_fail_key(self):
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'wrongsecret',
|
|
'x-timestamp': '123.456'})
|
|
req.remote_addr = '127.0.0.1'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='othersecret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456'})
|
|
req.remote_addr = '127.0.0.1'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key=None)
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456'})
|
|
req.remote_addr = '127.0.0.1'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_sync_request_fail_no_timestamp(self):
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret'})
|
|
req.remote_addr = '127.0.0.1'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_sync_request_fail_sync_host(self):
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456'})
|
|
req.remote_addr = '127.0.0.2'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
|
|
def test_sync_request_success_lb_sync_host(self):
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456',
|
|
'x-forwarded-for': '127.0.0.1'})
|
|
req.remote_addr = '127.0.0.2'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
sync_key='secret')
|
|
req = Request.blank('/v1/AUTH_cfa/c/o',
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
headers={'x-container-sync-key': 'secret',
|
|
'x-timestamp': '123.456',
|
|
'x-cluster-client-ip': '127.0.0.1'})
|
|
req.remote_addr = '127.0.0.2'
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 204)
|
|
|
|
def _make_request(self, path, **kwargs):
|
|
req = Request.blank(path, **kwargs)
|
|
req.environ['swift.cache'] = FakeMemcache()
|
|
return req
|
|
|
|
def test_override_asked_for_but_not_allowed(self):
|
|
self.test_auth = \
|
|
auth.filter_factory({'allow_overrides': 'false'})(FakeApp())
|
|
req = self._make_request('/v1/AUTH_account',
|
|
environ={'swift.authorize_override': True})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertEqual(resp.environ['swift.authorize'],
|
|
self.test_auth.authorize)
|
|
|
|
def test_override_asked_for_and_allowed(self):
|
|
self.test_auth = \
|
|
auth.filter_factory({'allow_overrides': 'true'})(FakeApp())
|
|
req = self._make_request('/v1/AUTH_account',
|
|
environ={'swift.authorize_override': True})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertTrue('swift.authorize' not in resp.environ)
|
|
|
|
def test_override_default_allowed(self):
|
|
req = self._make_request('/v1/AUTH_account',
|
|
environ={'swift.authorize_override': True})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 404)
|
|
self.assertTrue('swift.authorize' not in resp.environ)
|
|
|
|
def test_token_too_long(self):
|
|
req = self._make_request('/v1/AUTH_account', headers={
|
|
'x-auth-token': 'a' * MAX_TOKEN_LENGTH})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 401)
|
|
self.assertNotEqual(resp.body, 'Token exceeds maximum length.')
|
|
req = self._make_request('/v1/AUTH_account', headers={
|
|
'x-auth-token': 'a' * (MAX_TOKEN_LENGTH + 1)})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400)
|
|
self.assertEqual(resp.body, 'Token exceeds maximum length.')
|
|
|
|
def test_s3_enabled_when_conditions_are_met(self):
|
|
# auth_type_salt needs to be set
|
|
for atype in ('Sha1', 'Sha512'):
|
|
test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
's3_support': 'on',
|
|
'auth_type_salt': 'blah',
|
|
'auth_type': atype})(FakeApp())
|
|
self.assertTrue(test_auth.s3_support)
|
|
# auth_type_salt need not be set for Plaintext
|
|
test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
's3_support': 'on',
|
|
'auth_type': 'Plaintext'})(FakeApp())
|
|
self.assertTrue(test_auth.s3_support)
|
|
|
|
def test_s3_disabled_when_conditions_not_met(self):
|
|
# Conf says that it wants s3 support but other conditions are not met
|
|
# In that case s3 support should be disabled.
|
|
for atype in ('Sha1', 'Sha512'):
|
|
# auth_type_salt is not set
|
|
test_auth = \
|
|
auth.filter_factory({
|
|
'super_admin_key': 'supertest',
|
|
's3_support': 'on',
|
|
'auth_type': atype})(FakeApp())
|
|
self.assertFalse(test_auth.s3_support)
|
|
|
|
def test_s3_authorization_default_off(self):
|
|
self.assertFalse(self.test_auth.s3_support)
|
|
req = self._make_request('/v1/AUTH_account', environ={
|
|
'swift3.auth_details': {'unused': 'stuff'}})
|
|
resp = req.get_response(self.test_auth)
|
|
self.assertEqual(resp.status_int, 400) # HTTPBadRequest
|
|
self.assertTrue(resp.environ.get('swift.authorize') is None)
|
|
|
|
def test_s3_turned_off_get_groups(self):
|
|
env = {
|
|
'swift3.auth_details': {'unused': 'stuff'}}
|
|
token = 'whatever'
|
|
self.test_auth.logger = mock.Mock()
|
|
self.assertEqual(self.test_auth.get_groups(env, token), None)
|
|
|
|
def test_default_storage_policy(self):
|
|
ath = auth.filter_factory({})(FakeApp())
|
|
self.assertEqual(ath.default_storage_policy, None)
|
|
|
|
ath = \
|
|
auth.filter_factory({'default_storage_policy': 'ssd'})(FakeApp())
|
|
self.assertEqual(ath.default_storage_policy, 'ssd')
|
|
|
|
def test_s3_creds_unicode_bad(self):
|
|
self.test_auth.s3_support = True
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": unicode("plaintext:key)"),
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_act'}, '')]))
|
|
env = \
|
|
{'swift3.auth_details': {
|
|
'access_key': 'act:user',
|
|
# NOTE: signature uses password of 'key', not 'key)'
|
|
'signature': '3yW7oFFWOn+fhHMu7E47RKotL1Q=',
|
|
'string_to_sign': base64.urlsafe_b64decode(
|
|
'UFVUCgoKRnJpLCAyNiBGZWIgMjAxNiAwNjo0NT'
|
|
'ozNCArMDAwMAovY29udGFpbmVyMw==')},
|
|
'PATH_INFO': '/v1/AUTH_act/c1'}
|
|
token = 'not used'
|
|
self.assertEqual(self.test_auth.get_groups(env, token), None)
|
|
|
|
def test_s3_creds_unicode_good(self):
|
|
self.test_auth.s3_support = True
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": unicode("plaintext:key)"),
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_act'}, '')]))
|
|
env = \
|
|
{'swift3.auth_details': {
|
|
'access_key': 'act:user',
|
|
'signature': 'dElf49mbXP8t7F+P1qXZzaf3a50=',
|
|
'string_to_sign': base64.urlsafe_b64decode(
|
|
'UFVUCgoKRnJpLCAyNiBGZWIgMjAxNiAwNjo0NT'
|
|
'ozNCArMDAwMAovY29udGFpbmVyMw==')},
|
|
'PATH_INFO': '/v1/AUTH_act/c1'}
|
|
token = 'UFVUCgoKRnJpLCAyNiBGZWIgMjAxNiAwNjo0NT'\
|
|
'ozNCArMDAwMAovY29udGFpbmVyMw=='
|
|
self.assertEqual(self.test_auth.get_groups(env, token),
|
|
'act:usr,act,AUTH_act')
|
|
|
|
def test_s3_only_hash_passed_to_hmac(self):
|
|
self.test_auth.s3_support = True
|
|
key = 'dadada'
|
|
salt = 'zuck'
|
|
key_hash = hashlib.sha1('%s%s' % (salt, key)).hexdigest()
|
|
auth_stored = "sha1:%s$%s" % (salt, key_hash)
|
|
self.test_auth.app = FakeApp(iter([
|
|
('200 Ok', {},
|
|
json.dumps({"auth": auth_stored,
|
|
"groups": [{'name': "act:usr"}, {'name': "act"},
|
|
{'name': ".admin"}]})),
|
|
('204 Ok', {'X-Container-Meta-Account-Id': 'AUTH_act'}, '')]))
|
|
env = \
|
|
{'swift3.auth_details': {
|
|
'access_key': 'act:user',
|
|
'signature': 'whatever',
|
|
'string_to_sign': base64.urlsafe_b64decode(
|
|
'UFVUCgoKRnJpLCAyNiBGZWIgMjAxNiAwNjo0NT'
|
|
'ozNCArMDAwMAovY29udGFpbmVyMw==')},
|
|
'PATH_INFO': '/v1/AUTH_act/c1'}
|
|
token = 'not used'
|
|
mock_hmac_new = mock.MagicMock()
|
|
with mock.patch('hmac.new', mock_hmac_new):
|
|
self.test_auth.get_groups(env, token)
|
|
self.assertTrue(mock_hmac_new.called)
|
|
# Assert that string passed to hmac.new is only the hash
|
|
self.assertEqual(mock_hmac_new.call_args[0][0], key_hash)
|
|
|
|
def test_get_concealed_token(self):
|
|
auth.HASH_PATH_PREFIX = 'start'
|
|
auth.HASH_PATH_SUFFIX = 'end'
|
|
token = 'token'
|
|
|
|
# Check sha512 of "start:token:end"
|
|
hashed_token = self.test_auth._get_concealed_token(token)
|
|
self.assertEqual(hashed_token,
|
|
'cb320540b0b4c69eb83de2ffb80714cb6766e2d06b5579d1a35a9c4c3fb62'
|
|
'981ec50bcc3fb94521133e69a87d1efcb83efd78f35a06b6375e410201476'
|
|
'0722f6')
|
|
|
|
# Check sha512 of "start:token2:end"
|
|
token = 'token2'
|
|
hashed_token = self.test_auth._get_concealed_token(token)
|
|
self.assertEqual(hashed_token,
|
|
'ca400a6f884c168357f6af0609fda66aecd5aa613147167487495dd9f39fd'
|
|
'8a77288568e65857294f01e398d7f14328e855f18517ccf94185d849e7f34'
|
|
'f4259d')
|
|
|
|
# Check sha512 of "start2:token2:end"
|
|
auth.HASH_PATH_PREFIX = 'start2'
|
|
hashed_token = self.test_auth._get_concealed_token(token)
|
|
self.assertEqual(hashed_token,
|
|
'ad594a69f44dd6e0aad54e360b01f15bd4833ccb4dcd9116d7aba0c25fb95'
|
|
'670155b8cc7175def7aeeb4624a0f2bb7da5f0b204a4680ea7947d3d6a045'
|
|
'22bdde')
|
|
|
|
# Check sha512 of "start2:token2:end2"
|
|
auth.HASH_PATH_SUFFIX = 'end2'
|
|
hashed_token = self.test_auth._get_concealed_token(token)
|
|
self.assertEqual(hashed_token,
|
|
'446af2473ad6b28319a0fe02719a9d715b9941d12e0709851aedb4f53b890'
|
|
'693e7f1328e68d870fe114f35f4ed9648b16a5013182db50d3d1f79a660f2'
|
|
'0e078e')
|
|
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main()
|