diff options
author | Jenkins <jenkins@review.openstack.org> | 2014-03-02 22:17:37 +0000 |
---|---|---|
committer | Gerrit Code Review <review@openstack.org> | 2014-03-02 22:17:37 +0000 |
commit | ffe64b698718c311e4fe527c9163ec92de5524ee (patch) | |
tree | 40459186283a2c29cc4b6ec029f91d00a2b27384 | |
parent | d32e036bbf4a9eedda0a315714ef2ece5d93956d (diff) | |
parent | 73d5422768a7bdf145a4a97daceffdbd164b2b71 (diff) | |
download | keystone-ffe64b698718c311e4fe527c9163ec92de5524ee.tar.gz |
Merge "Fix assertEqual arguments order(backend_ldap, cache, v3_protection)"
-rw-r--r-- | keystone/tests/test_backend_ldap.py | 80 | ||||
-rw-r--r-- | keystone/tests/test_cache.py | 12 | ||||
-rw-r--r-- | keystone/tests/test_v3_protection.py | 6 |
3 files changed, 49 insertions, 49 deletions
diff --git a/keystone/tests/test_backend_ldap.py b/keystone/tests/test_backend_ldap.py index 461305588..416c2978a 100644 --- a/keystone/tests/test_backend_ldap.py +++ b/keystone/tests/test_backend_ldap.py @@ -63,7 +63,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): """ user_api = identity.backends.ldap.UserApi(CONF) self.assertTrue(user_api) - self.assertEqual(user_api.tree_dn, "ou=Users,%s" % CONF.ldap.suffix) + self.assertEqual("ou=Users,%s" % CONF.ldap.suffix, user_api.tree_dn) def test_configurable_allowed_user_actions(self): user = {'id': 'fake1', @@ -73,7 +73,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): 'tenants': ['bar']} self.identity_api.create_user('fake1', user) user_ref = self.identity_api.get_user('fake1') - self.assertEqual(user_ref['id'], 'fake1') + self.assertEqual('fake1', user_ref['id']) user['password'] = 'fakepass2' self.identity_api.update_user('fake1', user) @@ -147,7 +147,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): roles_ref = self.assignment_api.list_grants( user_id=self.user_foo['id'], project_id=self.tenant_baz['id']) - self.assertEqual(len(roles_ref), 0) + self.assertEqual(0, len(roles_ref)) self.assertRaises(exception.NotFound, self.assignment_api.delete_grant, user_id=self.user_foo['id'], @@ -169,8 +169,8 @@ class BaseLDAPIdentity(test_backend.IdentityTests): roles_ref = self.assignment_api.list_grants( group_id=new_group['id'], project_id=self.tenant_bar['id']) - self.assertEqual(roles_ref, []) - self.assertEqual(len(roles_ref), 0) + self.assertEqual([], roles_ref) + self.assertEqual(0, len(roles_ref)) self.assignment_api.create_grant(group_id=new_group['id'], project_id=self.tenant_bar['id'], @@ -187,7 +187,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): roles_ref = self.assignment_api.list_grants( group_id=new_group['id'], project_id=self.tenant_bar['id']) - self.assertEqual(len(roles_ref), 0) + self.assertEqual(0, len(roles_ref)) self.assertRaises(exception.NotFound, self.assignment_api.delete_grant, group_id=new_group['id'], @@ -240,7 +240,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): 'enabled': True} self.identity_api.create_user(user1['id'], user1) user_projects = self.assignment_api.list_projects_for_user(user1['id']) - self.assertEqual(len(user_projects), 0) + self.assertEqual(0, len(user_projects)) self.assignment_api.create_grant(user_id=user1['id'], project_id=self.tenant_bar['id'], role_id=self.role_member['id']) @@ -248,7 +248,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): project_id=self.tenant_baz['id'], role_id=self.role_member['id']) user_projects = self.assignment_api.list_projects_for_user(user1['id']) - self.assertEqual(len(user_projects), 2) + self.assertEqual(2, len(user_projects)) def test_list_projects_for_user_with_grants(self): domain = self._get_domain_fixture() @@ -288,7 +288,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): user_projects = self.assignment_api.list_projects_for_user( new_user['id']) - self.assertEqual(len(user_projects), 2) + self.assertEqual(2, len(user_projects)) def test_create_duplicate_user_name_in_different_domains(self): self.skipTest('Blocked by bug 1101276') @@ -349,7 +349,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): # Read back the list of assignments - check it is gone up by 2 after_assignments = len(self.assignment_api.list_role_assignments()) - self.assertEqual(after_assignments, existing_assignments + 2) + self.assertEqual(existing_assignments + 2, after_assignments) def test_list_role_assignments_bad_role(self): self.skipTest('Blocked by bug 1221805') @@ -396,8 +396,8 @@ class BaseLDAPIdentity(test_backend.IdentityTests): # List group users and verify only user 1. res = self.identity_api.list_users_in_group(group_id) - self.assertEqual(len(res), 1, "Expected 1 entry (user_1)") - self.assertEqual(res[0]['id'], user_1_id, "Expected user 1 id") + self.assertEqual(1, len(res), "Expected 1 entry (user_1)") + self.assertEqual(user_1_id, res[0]['id'], "Expected user 1 id") def test_list_group_members_when_no_members(self): # List group members when there is no member in the group. @@ -415,8 +415,8 @@ class BaseLDAPIdentity(test_backend.IdentityTests): def test_list_domains(self): domains = self.assignment_api.list_domains() self.assertEqual( - domains, - [assignment.calc_default_domain()]) + [assignment.calc_default_domain()], + domains) def test_list_domains_non_default_domain_id(self): # If change the default_domain_id, the ID of the default domain @@ -427,7 +427,7 @@ class BaseLDAPIdentity(test_backend.IdentityTests): domains = self.assignment_api.list_domains() - self.assertEqual(domains[0]['id'], new_domain_id) + self.assertEqual(new_domain_id, domains[0]['id']) def test_authenticate_requires_simple_bind(self): user = { @@ -530,7 +530,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): tenant = {'id': 'fake1', 'name': 'fake1', 'enabled': True} self.assignment_api.create_project('fake1', tenant) tenant_ref = self.assignment_api.get_project('fake1') - self.assertEqual(tenant_ref['id'], 'fake1') + self.assertEqual('fake1', tenant_ref['id']) tenant['enabled'] = False self.assignment_api.update_project('fake1', tenant) @@ -572,7 +572,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): list = self.assignment_api.get_roles_for_user_and_project( user1['id'], project1['id']) - self.assertEqual(len(list), 0) + self.assertEqual(0, len(list)) def test_configurable_forbidden_project_actions(self): CONF.ldap.tenant_allow_create = False @@ -599,7 +599,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): role = {'id': 'fake1', 'name': 'fake1'} self.assignment_api.create_role('fake1', role) role_ref = self.assignment_api.get_role('fake1') - self.assertEqual(role_ref['id'], 'fake1') + self.assertEqual('fake1', role_ref['id']) role['name'] = 'fake2' self.assignment_api.update_role('fake1', role) @@ -698,12 +698,12 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_project.invalidate(self.assignment_api, self.tenant_baz['id']) tenant_ref = self.assignment_api.get_project(self.tenant_baz['id']) - self.assertEqual(tenant_ref['id'], self.tenant_baz['id']) - self.assertEqual(tenant_ref['name'], self.tenant_baz['name']) + self.assertEqual(self.tenant_baz['id'], tenant_ref['id']) + self.assertEqual(self.tenant_baz['name'], tenant_ref['name']) self.assertEqual( - tenant_ref['description'], - self.tenant_baz['description']) - self.assertEqual(tenant_ref['enabled'], self.tenant_baz['enabled']) + self.tenant_baz['description'], + tenant_ref['description']) + self.assertEqual(self.tenant_baz['enabled'], tenant_ref['enabled']) CONF.ldap.tenant_name_attribute = 'description' CONF.ldap.tenant_desc_attribute = 'ou' @@ -719,10 +719,10 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_project.invalidate(self.assignment_api, self.tenant_baz['id']) tenant_ref = self.assignment_api.get_project(self.tenant_baz['id']) - self.assertEqual(tenant_ref['id'], self.tenant_baz['id']) - self.assertEqual(tenant_ref['name'], self.tenant_baz['description']) - self.assertEqual(tenant_ref['description'], self.tenant_baz['name']) - self.assertEqual(tenant_ref['enabled'], self.tenant_baz['enabled']) + self.assertEqual(self.tenant_baz['id'], tenant_ref['id']) + self.assertEqual(self.tenant_baz['description'], tenant_ref['name']) + self.assertEqual(self.tenant_baz['name'], tenant_ref['description']) + self.assertEqual(self.tenant_baz['enabled'], tenant_ref['enabled']) def test_project_attribute_ignore(self): CONF.ldap.tenant_attribute_ignore = ['name', @@ -740,7 +740,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_project.invalidate(self.assignment_api, self.tenant_baz['id']) tenant_ref = self.assignment_api.get_project(self.tenant_baz['id']) - self.assertEqual(tenant_ref['id'], self.tenant_baz['id']) + self.assertEqual(self.tenant_baz['id'], tenant_ref['id']) self.assertNotIn('name', tenant_ref) self.assertNotIn('description', tenant_ref) self.assertNotIn('enabled', tenant_ref) @@ -759,8 +759,8 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_role.invalidate(self.assignment_api, self.role_member['id']) role_ref = self.assignment_api.get_role(self.role_member['id']) - self.assertEqual(role_ref['id'], self.role_member['id']) - self.assertEqual(role_ref['name'], self.role_member['name']) + self.assertEqual(self.role_member['id'], role_ref['id']) + self.assertEqual(self.role_member['name'], role_ref['name']) CONF.ldap.role_name_attribute = 'sn' self.load_backends() @@ -773,7 +773,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_role.invalidate(self.assignment_api, self.role_member['id']) role_ref = self.assignment_api.get_role(self.role_member['id']) - self.assertEqual(role_ref['id'], self.role_member['id']) + self.assertEqual(self.role_member['id'], role_ref['id']) self.assertNotIn('name', role_ref) def test_role_attribute_ignore(self): @@ -790,7 +790,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assignment_api.get_role.invalidate(self.assignment_api, self.role_member['id']) role_ref = self.assignment_api.get_role(self.role_member['id']) - self.assertEqual(role_ref['id'], self.role_member['id']) + self.assertEqual(self.role_member['id'], role_ref['id']) self.assertNotIn('name', role_ref) def test_user_enable_attribute_mask(self): @@ -822,7 +822,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assertNotIn('enabled_nomask', user_ref) enabled_vals = get_enabled_vals() - self.assertEqual(enabled_vals, [512]) + self.assertEqual([512], enabled_vals) user_ref = self.identity_api.get_user('fake1') self.assertIs(user_ref['enabled'], True) @@ -834,7 +834,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assertNotIn('enabled_nomask', user_ref) enabled_vals = get_enabled_vals() - self.assertEqual(enabled_vals, [514]) + self.assertEqual([514], enabled_vals) user_ref = self.identity_api.get_user('fake1') self.assertIs(user_ref['enabled'], False) @@ -846,7 +846,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): self.assertNotIn('enabled_nomask', user_ref) enabled_vals = get_enabled_vals() - self.assertEqual(enabled_vals, [512]) + self.assertEqual([512], enabled_vals) user_ref = self.identity_api.get_user('fake1') self.assertIs(user_ref['enabled'], True) @@ -1081,7 +1081,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): combined_list = self.assignment_api.get_roles_for_user_and_project( user1['id'], project1['id']) - self.assertEqual(len(combined_list), 2) + self.assertEqual(2, len(combined_list)) self.assertIn(role_list[0]['id'], combined_list) self.assertIn(role_list[1]['id'], combined_list) @@ -1091,7 +1091,7 @@ class LDAPIdentity(tests.TestCase, BaseLDAPIdentity): combined_role_list = self.assignment_api.get_roles_for_user_and_domain( user1['id'], CONF.identity.default_domain_id) - self.assertEqual(len(combined_role_list), 0) + self.assertEqual(0, len(combined_role_list)) def test_list_projects_for_alternate_domain(self): self.skipTest( @@ -1219,7 +1219,7 @@ class LdapIdentitySqlAssignment(tests.TestCase, BaseLDAPIdentity): def test_list_domains(self): domains = self.assignment_api.list_domains() - self.assertEqual(domains, [assignment.calc_default_domain()]) + self.assertEqual([assignment.calc_default_domain()], domains) def test_list_domains_non_default_domain_id(self): # If change the default_domain_id, the ID of the default domain @@ -1234,7 +1234,7 @@ class LdapIdentitySqlAssignment(tests.TestCase, BaseLDAPIdentity): domains = self.assignment_api.list_domains() - self.assertEqual(domains[0]['id'], orig_default_domain_id) + self.assertEqual(orig_default_domain_id, domains[0]['id']) def test_project_filter(self): self.skipTest( @@ -1474,7 +1474,7 @@ class MultiLDAPandSQLIdentity(tests.TestCase, BaseLDAPIdentity): # set in the standard primary config file self.assertFalse(conf.identity.domain_specific_drivers_enabled) # ..and make sure a domain-specifc options is also set - self.assertEqual(conf.ldap.url, 'fake://memory1') + self.assertEqual('fake://memory1', conf.ldap.url) def test_add_role_grant_to_user_and_project_404(self): self.skipTest('Blocked by bug 1101287') diff --git a/keystone/tests/test_cache.py b/keystone/tests/test_cache.py index 9918f5866..e5fef666b 100644 --- a/keystone/tests/test_cache.py +++ b/keystone/tests/test_cache.py @@ -186,13 +186,13 @@ class CacheRegionTest(tests.TestCase): config_dict = cache.build_cache_config() self.assertEqual( - config_dict['test_prefix.backend'], CONF.cache.backend) + CONF.cache.backend, config_dict['test_prefix.backend']) self.assertEqual( - config_dict['test_prefix.expiration_time'], - CONF.cache.expiration_time) - self.assertEqual(config_dict['test_prefix.arguments.arg1'], 'test') - self.assertEqual(config_dict['test_prefix.arguments.arg2'], - 'test:test') + CONF.cache.expiration_time, + config_dict['test_prefix.expiration_time']) + self.assertEqual('test', config_dict['test_prefix.arguments.arg1']) + self.assertEqual('test:test', + config_dict['test_prefix.arguments.arg2']) self.assertFalse('test_prefix.arguments.arg3' in config_dict) def test_cache_debug_proxy(self): diff --git a/keystone/tests/test_v3_protection.py b/keystone/tests/test_v3_protection.py index 4d2ec535a..33e6b23c5 100644 --- a/keystone/tests/test_v3_protection.py +++ b/keystone/tests/test_v3_protection.py @@ -269,7 +269,7 @@ class IdentityTestProtectedCase(test_v3.RestfulTestCase): r = self.get(url_by_name, auth=self.auth) # We should only get back one user, the one in DomainA id_list = self._get_id_list_from_ref_list(r.result.get('users')) - self.assertEqual(len(id_list), 1) + self.assertEqual(1, len(id_list)) self.assertIn(self.user1['id'], id_list) # Now try for domainB, which should fail @@ -299,7 +299,7 @@ class IdentityTestProtectedCase(test_v3.RestfulTestCase): r = self.get(url_by_name, auth=self.auth) # We should only get back two groups, the ones in DomainA id_list = self._get_id_list_from_ref_list(r.result.get('groups')) - self.assertEqual(len(id_list), 2) + self.assertEqual(2, len(id_list)) self.assertIn(self.group1['id'], id_list) self.assertIn(self.group2['id'], id_list) @@ -332,7 +332,7 @@ class IdentityTestProtectedCase(test_v3.RestfulTestCase): # We should only get back one user, the one in DomainA that matches # the name supplied id_list = self._get_id_list_from_ref_list(r.result.get('groups')) - self.assertEqual(len(id_list), 1) + self.assertEqual(1, len(id_list)) self.assertIn(self.group2['id'], id_list) |