summaryrefslogtreecommitdiff
path: root/openstack_dashboard/test/test_data/keystone_data.py
diff options
context:
space:
mode:
Diffstat (limited to 'openstack_dashboard/test/test_data/keystone_data.py')
-rw-r--r--openstack_dashboard/test/test_data/keystone_data.py269
1 files changed, 0 insertions, 269 deletions
diff --git a/openstack_dashboard/test/test_data/keystone_data.py b/openstack_dashboard/test/test_data/keystone_data.py
deleted file mode 100644
index e92131b1..00000000
--- a/openstack_dashboard/test/test_data/keystone_data.py
+++ /dev/null
@@ -1,269 +0,0 @@
-# Copyright 2012 Nebula, Inc.
-#
-# Licensed under the Apache License, Version 2.0 (the "License"); you may
-# not use this file except in compliance with the License. You may obtain
-# a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
-# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
-# License for the specific language governing permissions and limitations
-# under the License.
-
-from datetime import timedelta
-
-from django.conf import settings
-from django.utils import datetime_safe
-
-from keystoneclient.access import AccessInfo
-from keystoneclient.v2_0 import ec2
-from keystoneclient.v2_0 import roles
-from keystoneclient.v2_0 import tenants
-from keystoneclient.v2_0 import users
-from keystoneclient.v3 import domains
-from keystoneclient.v3 import groups
-
-from openstack_auth.user import Token
-
-from openstack_dashboard.test.test_data.utils import TestDataContainer
-
-
-# Dummy service catalog with all service.
-# All endpoint URLs should point to example.com.
-# Try to keep them as accurate to real data as possible (ports, URIs, etc.)
-SERVICE_CATALOG = [
- {"type": "compute",
- "name": "nova",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.nova.example.com:8774/v2",
- "internalURL": "http://int.nova.example.com:8774/v2",
- "publicURL": "http://public.nova.example.com:8774/v2"},
- {"region": "RegionTwo",
- "adminURL": "http://admin.nova2.example.com:8774/v2",
- "internalURL": "http://int.nova2.example.com:8774/v2",
- "publicURL": "http://public.nova2.example.com:8774/v2"}]},
- {"type": "volume",
- "name": "nova",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.nova.example.com:8776/v1",
- "internalURL": "http://int.nova.example.com:8776/v1",
- "publicURL": "http://public.nova.example.com:8776/v1"},
- {"region": "RegionTwo",
- "adminURL": "http://admin.nova.example.com:8776/v1",
- "internalURL": "http://int.nova.example.com:8776/v1",
- "publicURL": "http://public.nova.example.com:8776/v1"}]},
- {"type": "image",
- "name": "glance",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.glance.example.com:9292/v1",
- "internalURL": "http://int.glance.example.com:9292/v1",
- "publicURL": "http://public.glance.example.com:9292/v1"}]},
- {"type": "identity",
- "name": "keystone",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.keystone.example.com:35357/v2.0",
- "internalURL": "http://int.keystone.example.com:5000/v2.0",
- "publicURL": "http://public.keystone.example.com:5000/v2.0"}]},
- {"type": "object-store",
- "name": "swift",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.swift.example.com:8080/",
- "internalURL": "http://int.swift.example.com:8080/",
- "publicURL": "http://public.swift.example.com:8080/"}]},
- {"type": "network",
- "name": "neutron",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.neutron.example.com:9696/",
- "internalURL": "http://int.neutron.example.com:9696/",
- "publicURL": "http://public.neutron.example.com:9696/"}]},
- {"type": "ec2",
- "name": "EC2 Service",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.nova.example.com:8773/services/Admin",
- "publicURL": "http://public.nova.example.com:8773/services/Cloud",
- "internalURL": "http://int.nova.example.com:8773/services/Cloud"}]},
- {"type": "orchestration",
- "name": "Heat",
- "endpoints_links": [],
- "endpoints": [
- {"region": "RegionOne",
- "adminURL": "http://admin.heat.example.com:8004/v1",
- "publicURL": "http://public.heat.example.com:8004/v1",
- "internalURL": "http://int.heat.example.com:8004/v1"}]}
-]
-
-
-def data(TEST):
- TEST.service_catalog = SERVICE_CATALOG
- TEST.tokens = TestDataContainer()
- TEST.domains = TestDataContainer()
- TEST.users = TestDataContainer()
- TEST.groups = TestDataContainer()
- TEST.tenants = TestDataContainer()
- TEST.roles = TestDataContainer()
- TEST.ec2 = TestDataContainer()
-
- admin_role_dict = {'id': '1',
- 'name': 'admin'}
- admin_role = roles.Role(roles.RoleManager, admin_role_dict)
- member_role_dict = {'id': "2",
- 'name': settings.OPENSTACK_KEYSTONE_DEFAULT_ROLE}
- member_role = roles.Role(roles.RoleManager, member_role_dict)
- TEST.roles.add(admin_role, member_role)
- TEST.roles.admin = admin_role
- TEST.roles.member = member_role
-
- domain_dict = {'id': "1",
- 'name': 'test_domain',
- 'description': "a test domain.",
- 'enabled': True}
- domain_dict_2 = {'id': "2",
- 'name': 'disabled_domain',
- 'description': "a disabled test domain.",
- 'enabled': False}
- domain = domains.Domain(domains.DomainManager, domain_dict)
- disabled_domain = domains.Domain(domains.DomainManager, domain_dict_2)
- TEST.domains.add(domain, disabled_domain)
- TEST.domain = domain # Your "current" domain
-
- user_dict = {'id': "1",
- 'name': 'test_user',
- 'email': 'test@example.com',
- 'password': 'password',
- 'token': 'test_token',
- 'project_id': '1',
- 'enabled': True,
- 'domain_id': "1"}
- user = users.User(users.UserManager(None), user_dict)
- user_dict = {'id': "2",
- 'name': 'user_two',
- 'email': 'two@example.com',
- 'password': 'password',
- 'token': 'test_token',
- 'project_id': '1',
- 'enabled': True,
- 'domain_id': "1"}
- user2 = users.User(users.UserManager(None), user_dict)
- user_dict = {'id': "3",
- 'name': 'user_three',
- 'email': 'three@example.com',
- 'password': 'password',
- 'token': 'test_token',
- 'project_id': '1',
- 'enabled': True,
- 'domain_id': "1"}
- user3 = users.User(users.UserManager(None), user_dict)
- user_dict = {'id': "4",
- 'name': 'user_four',
- 'email': 'four@example.com',
- 'password': 'password',
- 'token': 'test_token',
- 'project_id': '2',
- 'enabled': True,
- 'domain_id': "2"}
- user4 = users.User(users.UserManager(None), user_dict)
- TEST.users.add(user, user2, user3, user4)
- TEST.user = user # Your "current" user
- TEST.user.service_catalog = SERVICE_CATALOG
-
- group_dict = {'id': "1",
- 'name': 'group_one',
- 'description': 'group one description',
- 'domain_id': '1'}
- group = groups.Group(groups.GroupManager(None), group_dict)
- group_dict = {'id': "2",
- 'name': 'group_two',
- 'description': 'group two description',
- 'domain_id': '1'}
- group2 = groups.Group(groups.GroupManager(None), group_dict)
- group_dict = {'id': "3",
- 'name': 'group_three',
- 'description': 'group three description',
- 'domain_id': '2'}
- group3 = groups.Group(groups.GroupManager(None), group_dict)
- TEST.groups.add(group, group2, group3)
-
- tenant_dict = {'id': "1",
- 'name': 'test_tenant',
- 'description': "a test tenant.",
- 'enabled': True,
- 'domain_id': '1'}
- tenant_dict_2 = {'id': "2",
- 'name': 'disabled_tenant',
- 'description': "a disabled test tenant.",
- 'enabled': False,
- 'domain_id': '2'}
- tenant_dict_3 = {'id': "3",
- 'name': u'\u4e91\u89c4\u5219',
- 'description': "an unicode-named tenant.",
- 'enabled': True,
- 'domain_id': '2'}
- tenant = tenants.Tenant(tenants.TenantManager, tenant_dict)
- disabled_tenant = tenants.Tenant(tenants.TenantManager, tenant_dict_2)
- tenant_unicode = tenants.Tenant(tenants.TenantManager, tenant_dict_3)
-
- TEST.tenants.add(tenant, disabled_tenant, tenant_unicode)
- TEST.tenant = tenant # Your "current" tenant
-
- tomorrow = datetime_safe.datetime.now() + timedelta(days=1)
- expiration = datetime_safe.datetime.isoformat(tomorrow)
-
- scoped_token_dict = {
- 'access': {
- 'token': {
- 'id': "test_token_id",
- 'expires': expiration,
- 'tenant': tenant_dict,
- 'tenants': [tenant_dict]},
- 'user': {
- 'id': "test_user_id",
- 'name': "test_user",
- 'roles': [member_role_dict]},
- 'serviceCatalog': TEST.service_catalog
- }
- }
-
- scoped_access_info = AccessInfo.factory(resp=None,
- body=scoped_token_dict)
-
- unscoped_token_dict = {
- 'access': {
- 'token': {
- 'id': "test_token_id",
- 'expires': expiration},
- 'user': {
- 'id': "test_user_id",
- 'name': "test_user",
- 'roles': [member_role_dict]},
- 'serviceCatalog': TEST.service_catalog
- }
- }
- unscoped_access_info = AccessInfo.factory(resp=None,
- body=unscoped_token_dict)
-
- scoped_token = Token(scoped_access_info)
- unscoped_token = Token(unscoped_access_info)
- TEST.tokens.add(scoped_token, unscoped_token)
- TEST.token = scoped_token # your "current" token.
- TEST.tokens.scoped_token = scoped_token
- TEST.tokens.unscoped_token = unscoped_token
-
- access_secret = ec2.EC2(ec2.CredentialsManager, {"access": "access",
- "secret": "secret"})
- TEST.ec2.add(access_secret)