keystoneauth1.tests.unit package¶
Subpackages¶
- keystoneauth1.tests.unit.access package
- keystoneauth1.tests.unit.extras package
- Subpackages
- keystoneauth1.tests.unit.extras.kerberos package
- Submodules
- keystoneauth1.tests.unit.extras.kerberos.base module
- keystoneauth1.tests.unit.extras.kerberos.test_fedkerb_loading module
- keystoneauth1.tests.unit.extras.kerberos.test_kerberos_loading module
- keystoneauth1.tests.unit.extras.kerberos.test_mapped module
- keystoneauth1.tests.unit.extras.kerberos.test_v3 module
- keystoneauth1.tests.unit.extras.kerberos.utils module
- Module contents
- keystoneauth1.tests.unit.extras.oauth1 package
- keystoneauth1.tests.unit.extras.saml2 package
- keystoneauth1.tests.unit.extras.kerberos package
- Module contents
- Subpackages
- keystoneauth1.tests.unit.identity package
- Submodules
- keystoneauth1.tests.unit.identity.test_access module
- keystoneauth1.tests.unit.identity.test_identity_common module
- keystoneauth1.tests.unit.identity.test_identity_v2 module
- keystoneauth1.tests.unit.identity.test_identity_v3 module
- keystoneauth1.tests.unit.identity.test_identity_v3_federation module
- keystoneauth1.tests.unit.identity.test_identity_v3_oidc module
- keystoneauth1.tests.unit.identity.test_password module
- keystoneauth1.tests.unit.identity.test_token module
- keystoneauth1.tests.unit.identity.test_tokenless_auth module
- keystoneauth1.tests.unit.identity.utils module
- Module contents
- keystoneauth1.tests.unit.loading package
- Submodules
- keystoneauth1.tests.unit.loading.test_cli module
- keystoneauth1.tests.unit.loading.test_conf module
- keystoneauth1.tests.unit.loading.test_entry_points module
- keystoneauth1.tests.unit.loading.test_generic module
- keystoneauth1.tests.unit.loading.test_loading module
- keystoneauth1.tests.unit.loading.test_session module
- keystoneauth1.tests.unit.loading.test_v3 module
- keystoneauth1.tests.unit.loading.utils module
- Module contents
Submodules¶
keystoneauth1.tests.unit.client_fixtures module¶
-
keystoneauth1.tests.unit.client_fixtures.
domain_scoped_token
()¶
-
keystoneauth1.tests.unit.client_fixtures.
project_scoped_token
()¶
keystoneauth1.tests.unit.k2k_fixtures module¶
keystoneauth1.tests.unit.keystoneauth_fixtures module¶
-
class
keystoneauth1.tests.unit.keystoneauth_fixtures.
HackingCode
¶ Bases:
fixtures.fixture.Fixture
A fixture to house the various code examples.
Examples contains various keystoneauth hacking style checks.
-
oslo_namespace_imports
= {'expected_errors': [(1, 0, 'K333'), (3, 0, 'K333'), (5, 0, 'K333'), (6, 0, 'K333'), (9, 0, 'K333'), (11, 0, 'K333'), (13, 0, 'K333'), (14, 0, 'K333'), (17, 0, 'K333'), (19, 0, 'K333'), (21, 0, 'K333'), (22, 0, 'K333'), (25, 0, 'K333'), (27, 0, 'K333'), (29, 0, 'K333'), (30, 0, 'K333')], 'code': '\n import oslo.utils\n import oslo_utils\n import oslo.utils.encodeutils\n import oslo_utils.encodeutils\n from oslo import utils\n from oslo.utils import encodeutils\n from oslo_utils import encodeutils\n\n import oslo.serialization\n import oslo_serialization\n import oslo.serialization.jsonutils\n import oslo_serialization.jsonutils\n from oslo import serialization\n from oslo.serialization import jsonutils\n from oslo_serialization import jsonutils\n\n import oslo.config\n import oslo_config\n import oslo.config.cfg\n import oslo_config.cfg\n from oslo import config\n from oslo.config import cfg\n from oslo_config import cfg\n\n import oslo.i18n\n import oslo_i18n\n import oslo.i18n.log\n import oslo_i18n.log\n from oslo import i18n\n from oslo.i18n import log\n from oslo_i18n import log\n '}¶
-
keystoneauth1.tests.unit.matchers module¶
keystoneauth1.tests.unit.oidc_fixtures module¶
keystoneauth1.tests.unit.test_betamax_fixture module¶
-
class
keystoneauth1.tests.unit.test_betamax_fixture.
TestBetamaxFixture
(*args, **kwargs)¶ Bases:
testtools.testcase.TestCase
-
TEST_AUTH_URL
= 'http://keystoneauth.betamax_test/v2.0/'¶
-
TEST_PASSWORD
= 'test_password'¶
-
TEST_TENANT_NAME
= 'test_tenant_name'¶
-
TEST_USERNAME
= 'test_user_name'¶
-
V2_TOKEN
= {'access': {'user': {'id': 'd14c4951f8a443c597e44edda378922f', 'name': 'test_user_name'}, 'token': {'issued_at': '2016-10-10T13:23:30.405440', 'id': 'c585c21ee4c54aa3a9b249654f663290', 'expires': '2016-10-10T14:23:30.405440', 'tenant': {'id': '92e7afa7d2df4eedbb50d5d146f58452', 'name': 'test_tenant_name'}, 'audit_ids': ['d6c284ee997c4983942014ec59b2b66f', None]}}}¶
-
setUp
()¶
-
test_keystoneauth_betamax_fixture
()¶
-
test_replay_of_bad_url_fails
()¶
-
keystoneauth1.tests.unit.test_betamax_hooks module¶
keystoneauth1.tests.unit.test_betamax_serializer module¶
-
class
keystoneauth1.tests.unit.test_betamax_serializer.
TestBetamaxSerializer
(*args, **kwargs)¶ Bases:
testtools.testcase.TestCase
-
TEST_FILE
= '/home/jenkins/workspace/keystoneauth-docs-ubuntu-xenial/keystoneauth1/tests/unit/data/ksa_betamax_test_cassette.yaml'¶
-
TEST_JSON
= '/home/jenkins/workspace/keystoneauth-docs-ubuntu-xenial/keystoneauth1/tests/unit/data/ksa_serializer_data.json'¶
-
setUp
()¶
-
test_deserialize
()¶
-
test_serialize
()¶
-
keystoneauth1.tests.unit.test_discovery module¶
-
class
keystoneauth1.tests.unit.test_discovery.
CatalogHackTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
BASE_URL
= 'http://keystone.server:5000/'¶
-
IDENTITY
= 'identity'¶
-
OTHER_URL
= 'http://other.server:5000/path'¶
-
TEST_URL
= 'http://keystone.server:5000/v2.0'¶
-
V2_URL
= 'http://keystone.server:5000/v2.0'¶
-
V3_URL
= 'http://keystone.server:5000/v3'¶
-
setUp
()¶
-
test_ignored_non_service_type
()¶
-
test_version_hacks
()¶
-
-
class
keystoneauth1.tests.unit.test_discovery.
DiscoverUtils
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
test_version_number
()¶
-
keystoneauth1.tests.unit.test_fixtures module¶
-
class
keystoneauth1.tests.unit.test_fixtures.
V2TokenTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
test_roles
()¶
-
test_services
()¶
-
test_tenant_scoped
()¶
-
test_token_bind
()¶
-
test_trust_scoped
()¶
-
test_unscoped
()¶
-
-
class
keystoneauth1.tests.unit.test_fixtures.
V3TokenTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
test_catalog
()¶
-
test_domain_scoped
()¶
-
test_empty_default_service_providers
()¶
-
test_is_admin_project
()¶
-
test_oauth_scoped
()¶
-
test_project_as_domain_scoped
()¶
-
test_project_scoped
()¶
-
test_roles
()¶
-
test_service_providers
()¶
-
test_token_bind
()¶
-
test_trust_scoped
()¶
-
test_unscoped
()¶
-
keystoneauth1.tests.unit.test_hacking_checks module¶
keystoneauth1.tests.unit.test_matchers module¶
-
class
keystoneauth1.tests.unit.test_matchers.
TestXMLEquals
(*args, **kwargs)¶ Bases:
testtools.testcase.TestCase
,testtools.tests.matchers.helpers.TestMatchersInterface
-
describe_examples
= [('expected =\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <first z="0" y="1" x="2"/>\n <second a="a" b="b"/>\n</test>\n\nactual =\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <nope_it_fails/>\n</test>\n', '<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <nope_it_fails/>\n</test>\n', <keystoneauth1.tests.unit.matchers.XMLEquals object at 0x7f9558457810>)]¶
-
equivalent_xml
= '<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <second a="a" b="b"/>\n <first z="0" y="1" x="2"></first>\n</test>\n'¶
-
matches_matcher
= <keystoneauth1.tests.unit.matchers.XMLEquals object>¶
-
matches_matches
= ['<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <first z="0" y="1" x="2"/>\n <second a="a" b="b"></second>\n</test>\n', '<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <second a="a" b="b"/>\n <first z="0" y="1" x="2"></first>\n</test>\n']¶
-
matches_mismatches
= ['<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <nope_it_fails/>\n</test>\n']¶
-
matches_xml
= '<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <first z="0" y="1" x="2"/>\n <second a="a" b="b"></second>\n</test>\n'¶
-
mismatches_description
= 'expected =\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <first z="0" y="1" x="2"/>\n <second a="a" b="b"/>\n</test>\n\nactual =\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <nope_it_fails/>\n</test>\n'¶
-
mismatches_xml
= '<?xml version="1.0" encoding="UTF-8"?>\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\n <nope_it_fails/>\n</test>\n'¶
-
str_examples
= [('XMLEquals(\'<?xml version="1.0" encoding="UTF-8"?>\\n<test xmlns="http://docs.openstack.org/identity/api/v2.0">\\n <first z="0" y="1" x="2"/>\\n <second a="a" b="b"></second>\\n</test>\\n\')', <keystoneauth1.tests.unit.matchers.XMLEquals object at 0x7f9558457810>)]¶
-
keystoneauth1.tests.unit.test_session module¶
-
class
keystoneauth1.tests.unit.test_session.
AdapterTest
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
ALLOW
= {'allow_deprecated': False, 'allow_experimental': True, 'allow_unknown': True}¶
-
INTERFACE
= '6997425a57f34c51b71df5cb1a194580'¶
-
REGION_NAME
= '399acd0f24174243b690357209c0ee2d'¶
-
SERVICE_NAME
= 'ed2c53b8cb79497cb2b14f257ad94459'¶
-
SERVICE_TYPE
= 'e154fbbb79a9447daecd86a11c48b673'¶
-
TEST_URL
= 'http://fakeendpoint/'¶
-
USER_AGENT
= '9c411e392d8745ecbc50f644d059a58c'¶
-
VERSION
= 'a4c5c164a28d405285959205d32cfab9'¶
-
test_adapter_connect_retries
()¶
-
test_adapter_get_token
()¶
-
test_adapter_invalidate
()¶
-
test_additional_headers
()¶
-
test_additional_headers_overrides
()¶
-
test_legacy_binding
()¶
-
test_legacy_binding_non_json_resp
()¶
-
test_logger_object_passed
()¶
-
test_methods
()¶
-
test_setting_endpoint_override
()¶
-
test_setting_variables_on_get_endpoint
()¶
-
test_setting_variables_on_request
()¶
-
test_unknown_connection_error
()¶
-
test_user_and_project_id
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
AuthPlugin
(token='d14c7d7c341145d4bf54e6c02c9952d7', invalidate=True)¶ Bases:
keystoneauth1.plugin.BaseAuthPlugin
Very simple debug authentication plugin.
Takes Parameters such that it can throw exceptions at the right times.
-
SERVICE_URLS
= {'compute': {'admin': 'http://compute-admin:2222/v1.0', 'public': 'http://compute-public:2222/v1.0'}, 'image': {'admin': 'http://image-admin:3333/v2.0', 'public': 'http://image-public:3333/v2.0'}, 'identity': {'admin': 'http://identity-admin:1111/v2.0', 'public': 'http://identity-public:1111/v2.0'}}¶
-
TEST_PROJECT_ID
= 'aProject'¶
-
TEST_TOKEN
= 'd14c7d7c341145d4bf54e6c02c9952d7'¶
-
TEST_USER_ID
= 'aUser'¶
-
get_endpoint
(session, service_type=None, interface=None, **kwargs)¶
-
get_project_id
(session)¶
-
get_token
(session)¶
-
get_user_id
(session)¶
-
invalidate
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
CalledAuthPlugin
(invalidate=True)¶ Bases:
keystoneauth1.plugin.BaseAuthPlugin
-
ENDPOINT
= 'http://fakeendpoint/'¶
-
PROJECT_ID
= '25aa668be91946b7b5f1e10b93924de3'¶
-
USER_ID
= '8d8c025f585b49258fda9aa9d727445b'¶
-
get_endpoint
(session, **kwargs)¶
-
get_project_id
(session, **kwargs)¶
-
get_token
(session)¶
-
get_user_id
(session, **kwargs)¶
-
invalidate
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
RedirectTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
DEFAULT_REDIRECT_BODY
= 'Redirect'¶
-
DEFAULT_RESP_BODY
= 'Found'¶
-
REDIRECT_CHAIN
= ['http://myhost:3445/', 'http://anotherhost:6555/', 'http://thirdhost/', 'http://finaldestination:55/']¶
-
assertResponse
(resp)¶
-
setup_redirects
(method='GET', status_code=305, redirect_kwargs={}, final_kwargs={})¶
-
test_basic_get
()¶
-
test_basic_post_keeps_correct_method
()¶
-
test_history_matches_requests
()¶
-
test_no_redirect
()¶
-
test_permanent_redirect_308
()¶
-
test_redirect_forever
()¶
-
test_redirect_limit
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
RequestsAuth
(*args, **kwargs)¶ Bases:
requests.auth.AuthBase
-
class
keystoneauth1.tests.unit.test_session.
SessionAuthTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
TEST_JSON
= {'hello': 'world'}¶
-
TEST_URL
= 'http://127.0.0.1:5000/'¶
-
stub_service_url
(service_type, interface, path, method='GET', **kwargs)¶
-
test_auth_plugin_default_with_plugin
()¶
-
test_auth_plugin_disable
()¶
-
test_endpoint_override_does_id_replacement
()¶
-
test_endpoint_override_fails_to_do_unknown_replacement
()¶
-
test_endpoint_override_fails_to_replace_if_none
()¶
-
test_endpoint_override_ignore_full_url
()¶
-
test_endpoint_override_overrides_filter
()¶
-
test_logger_object_passed
()¶
-
test_passed_auth_plugin
()¶
-
test_passed_auth_plugin_overrides
()¶
-
test_raises_exc_only_when_asked
()¶
-
test_reauth_called
()¶
-
test_reauth_not_called
()¶
-
test_requests_auth_plugin
()¶
-
test_service_type_urls
()¶
-
test_service_url_raises_if_no_auth_plugin
()¶
-
test_service_url_raises_if_no_url_returned
()¶
-
test_user_and_project_id
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
SessionTests
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
TEST_URL
= 'http://127.0.0.1:5000/'¶
-
test_connect_retries
()¶
-
test_delete
()¶
-
test_does_not_set_tcp_keepalive_on_custom_sessions
()¶
-
test_get
()¶
-
test_head
()¶
-
test_http_session_opts
()¶
-
test_logging_cacerts
()¶
-
test_logs_failed_output
()¶ Test that output is logged even for failed requests.
-
test_not_found
()¶
-
test_patch
()¶
-
test_post
()¶
-
test_put
()¶
-
test_server_error
()¶
-
test_session_debug_output
()¶ Test request and response headers in debug logs.
in order to redact secure headers while debug is true.
-
test_ssl_error_message
()¶
-
test_user_agent
()¶
-
test_uses_tcp_keepalive_by_default
()¶
-
-
class
keystoneauth1.tests.unit.test_session.
TCPKeepAliveAdapterTest
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
patch
(target, name, *args, **kwargs)¶
-
patch_socket_with_options
(option_names)¶
-
setUp
()¶
-
test_init_poolmanager_with_basic_options
()¶
-
test_init_poolmanager_with_given_optionsl
()¶
-
test_init_poolmanager_with_requests_lesser_than_2_4_1
()¶
-
test_init_poolmanager_with_tcp_keepcnt
()¶
-
test_init_poolmanager_with_tcp_keepcnt_on_windows
()¶
-
test_init_poolmanager_with_tcp_keepidle
()¶
-
test_init_poolmanager_with_tcp_keepintvl
()¶
-
keystoneauth1.tests.unit.test_token_endpoint module¶
-
class
keystoneauth1.tests.unit.test_token_endpoint.
AdminTokenTest
(*args, **kwargs)¶ Bases:
keystoneauth1.tests.unit.utils.TestCase
-
test_token_endpoint_deprecated_options
()¶
-
test_token_endpoint_options
()¶
-
keystoneauth1.tests.unit.test_utils module¶
keystoneauth1.tests.unit.utils module¶
-
class
keystoneauth1.tests.unit.utils.
TestCase
(*args, **kwargs)¶ Bases:
testtools.testcase.TestCase
-
TEST_DOMAIN_ID
= '104002edcc1c4903b12acc312de499c6'¶
-
TEST_DOMAIN_NAME
= 'f3d1825975844d728a8187a40d1e5c2a'¶
-
TEST_GROUP_ID
= 'f47c12e246324b86b9f201eaa49dc1c4'¶
-
TEST_ROLE_ID
= 'b86ceaef2eaa4be5a0bd10d20caa127e'¶
-
TEST_ROOT_URL
= 'http://127.0.0.1:5000/'¶
-
TEST_TENANT_ID
= '12dbcffccca94184ab0ed7e12c705f58'¶
-
TEST_TENANT_NAME
= '8766748c94ca414a831e0b0f40eb20fa'¶
-
TEST_TOKEN
= 'd14c7d7c341145d4bf54e6c02c9952d7'¶
-
TEST_TRUST_ID
= '061baeb4a75b4774879b8de7713b521c'¶
-
TEST_USER
= '518b93ed919a4854b7d24a1de2bb1b96'¶
-
TEST_USER_ID
= 'f92833fc43a545b98c540abccc4ab22d'¶
-
assertQueryStringContains
(**kwargs)¶ Verify the query string contains the expected parameters.
This method is used to verify that the query string for the most recent request made contains all the parameters provided as
kwargs
, and that the value of each parameter contains the value for the kwarg. If the value for the kwarg is an empty string (‘’), then all that’s verified is that the parameter is present.
-
assertQueryStringIs
(qs='')¶ Verify the QueryString matches what is expected.
The qs parameter should be of the format ‘foo=bar&abc=xyz’
-
assertRequestBodyIs
(body=None, json=None)¶
-
assertRequestHeaderEqual
(name, val)¶ Verify that the last request made contains a header and its value.
The request must have already been made.
-
setUp
()¶
-
stub_url
(method, parts=None, base_url=None, json=None, **kwargs)¶
-