summaryrefslogtreecommitdiff
path: root/keystoneclient/tests
diff options
context:
space:
mode:
authorHenry Nash <henryn@linux.vnet.ibm.com>2015-03-24 17:57:25 +0000
committerSteve Martinelli <s.martinelli@gmail.com>2016-11-02 17:03:41 +0000
commitcb31a83888cd93fcb12a7ac9a3e678ee7bb8ceeb (patch)
treee7a71503a01a25ccbe17c72ef4678daee38784eb /keystoneclient/tests
parent96b8a1daa95a75ca0e26440b401f8964b4de60f0 (diff)
downloadpython-keystoneclient-cb31a83888cd93fcb12a7ac9a3e678ee7bb8ceeb.tar.gz
Support domain-specific configuration management
Provide support for the domain-specific configuration storage available via the REST API. Domain configs are JSON blobs and we have fine grained control on them via the Identity API. This fine grained control is not defined yet in the client, though - for now, we can manage everything like Python dictionaries and use operations like "update" whenever we want to delete a specific group or option. This approach is similar to what is done in the federation mapping API to handle mapping rules. Functional tests are also included, this is useful to check if the new feature works in an integration environment. Co-Auhtored-By: Henry Nash <henryn@linux.vnet.ibm.com> Co-Authored-By: Rodrigo Duarte <rduartes@redhat.com> Closes-Bug: 1433306 Partially Implements: blueprint domain-config-ext Change-Id: Ie6795b8633fed38c58b79250c11c9a045b7f95a4
Diffstat (limited to 'keystoneclient/tests')
-rw-r--r--keystoneclient/tests/functional/v3/client_fixtures.py17
-rw-r--r--keystoneclient/tests/functional/v3/test_domain_configs.py101
-rw-r--r--keystoneclient/tests/unit/v3/test_domain_configs.py96
3 files changed, 214 insertions, 0 deletions
diff --git a/keystoneclient/tests/functional/v3/client_fixtures.py b/keystoneclient/tests/functional/v3/client_fixtures.py
index 4b54b88..37da4a4 100644
--- a/keystoneclient/tests/functional/v3/client_fixtures.py
+++ b/keystoneclient/tests/functional/v3/client_fixtures.py
@@ -219,3 +219,20 @@ class EC2(Base):
self.addCleanup(self.client.ec2.delete,
self.user_id,
self.entity.access)
+
+
+class DomainConfig(Base):
+
+ def __init__(self, client, domain_id):
+ super(DomainConfig, self).__init__(client, domain_id=domain_id)
+ self.domain_id = domain_id
+
+ def setUp(self):
+ super(DomainConfig, self).setUp()
+
+ self.ref = {'identity': {'driver': uuid.uuid4().hex},
+ 'ldap': {'url': uuid.uuid4().hex}}
+ self.entity = self.client.domain_configs.create(
+ self.domain_id, self.ref)
+ self.addCleanup(self.client.domain_configs.delete,
+ self.domain_id)
diff --git a/keystoneclient/tests/functional/v3/test_domain_configs.py b/keystoneclient/tests/functional/v3/test_domain_configs.py
new file mode 100644
index 0000000..91112be
--- /dev/null
+++ b/keystoneclient/tests/functional/v3/test_domain_configs.py
@@ -0,0 +1,101 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import uuid
+
+from keystoneauth1.exceptions import http
+from keystoneclient.tests.functional import base
+from keystoneclient.tests.functional.v3 import client_fixtures as fixtures
+
+
+class DomainConfigsTestCase(base.V3ClientTestCase):
+
+ def check_domain_config(self, config, config_ref):
+ for attr in config_ref:
+ self.assertEqual(
+ getattr(config, attr),
+ config_ref[attr],
+ 'Expected different %s' % attr)
+
+ def _new_ref(self):
+ return {'identity': {'driver': uuid.uuid4().hex},
+ 'ldap': {'url': uuid.uuid4().hex}}
+
+ def test_create_domain_config(self):
+ config_ref = self._new_ref()
+ config = self.client.domain_configs.create(
+ self.project_domain_id, config_ref)
+ self.addCleanup(
+ self.client.domain_configs.delete, self.project_domain_id)
+ self.check_domain_config(config, config_ref)
+
+ def test_create_invalid_domain_config(self):
+ invalid_groups_ref = {
+ uuid.uuid4().hex: {uuid.uuid4().hex: uuid.uuid4().hex},
+ uuid.uuid4().hex: {uuid.uuid4().hex: uuid.uuid4().hex}}
+ self.assertRaises(http.Forbidden,
+ self.client.domain_configs.create,
+ self.project_domain_id,
+ invalid_groups_ref)
+
+ invalid_options_ref = {
+ 'identity': {uuid.uuid4().hex: uuid.uuid4().hex},
+ 'ldap': {uuid.uuid4().hex: uuid.uuid4().hex}}
+ self.assertRaises(http.Forbidden,
+ self.client.domain_configs.create,
+ self.project_domain_id,
+ invalid_options_ref)
+
+ def test_get_domain_config(self):
+ config = fixtures.DomainConfig(self.client, self.project_domain_id)
+ self.useFixture(config)
+
+ config_ret = self.client.domain_configs.get(self.project_domain_id)
+ self.check_domain_config(config_ret, config.ref)
+
+ def test_update_domain_config(self):
+ config = fixtures.DomainConfig(self.client, self.project_domain_id)
+ self.useFixture(config)
+
+ update_config_ref = self._new_ref()
+ config_ret = self.client.domain_configs.update(
+ self.project_domain_id, update_config_ref)
+ self.check_domain_config(config_ret, update_config_ref)
+
+ def test_update_invalid_domain_config(self):
+ config = fixtures.DomainConfig(self.client, self.project_domain_id)
+ self.useFixture(config)
+
+ invalid_groups_ref = {
+ uuid.uuid4().hex: {uuid.uuid4().hex: uuid.uuid4().hex},
+ uuid.uuid4().hex: {uuid.uuid4().hex: uuid.uuid4().hex}}
+ self.assertRaises(http.Forbidden,
+ self.client.domain_configs.update,
+ self.project_domain_id,
+ invalid_groups_ref)
+
+ invalid_options_ref = {
+ 'identity': {uuid.uuid4().hex: uuid.uuid4().hex},
+ 'ldap': {uuid.uuid4().hex: uuid.uuid4().hex}}
+ self.assertRaises(http.Forbidden,
+ self.client.domain_configs.update,
+ self.project_domain_id,
+ invalid_options_ref)
+
+ def test_domain_config_delete(self):
+ config_ref = self._new_ref()
+ self.client.domain_configs.create(self.project_domain_id, config_ref)
+
+ self.client.domain_configs.delete(self.project_domain_id)
+ self.assertRaises(http.NotFound,
+ self.client.domain_configs.get,
+ self.project_domain_id)
diff --git a/keystoneclient/tests/unit/v3/test_domain_configs.py b/keystoneclient/tests/unit/v3/test_domain_configs.py
new file mode 100644
index 0000000..2a7df09
--- /dev/null
+++ b/keystoneclient/tests/unit/v3/test_domain_configs.py
@@ -0,0 +1,96 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import uuid
+
+from keystoneclient import exceptions
+from keystoneclient.tests.unit.v3 import utils
+from keystoneclient.v3 import domain_configs
+
+
+class DomainConfigsTests(utils.ClientTestCase, utils.CrudTests):
+ """Test domain config database management."""
+
+ def setUp(self):
+ super(DomainConfigsTests, self).setUp()
+ self.key = 'config'
+ self.model = domain_configs.DomainConfig
+ self.manager = self.client.domain_configs
+
+ def new_ref(self, **kwargs):
+ config_groups = {'identity': {uuid.uuid4().hex: uuid.uuid4().hex},
+ 'ldap': {uuid.uuid4().hex: uuid.uuid4().hex}}
+ kwargs.setdefault('config', config_groups)
+ return kwargs
+
+ def _assert_resource_attributes(self, resource, req_ref):
+ for attr in req_ref:
+ self.assertEqual(
+ getattr(resource, attr),
+ req_ref[attr],
+ 'Expected different %s' % attr)
+
+ def test_create(self):
+ domain_id = uuid.uuid4().hex
+ config = self.new_ref()
+
+ self.stub_url('PUT',
+ parts=['domains', domain_id, 'config'],
+ json=config, status_code=201)
+ res = self.manager.create(domain_id, config)
+ self._assert_resource_attributes(res, config['config'])
+ self.assertEntityRequestBodyIs(config)
+
+ def test_update(self):
+ domain_id = uuid.uuid4().hex
+ config = self.new_ref()
+
+ self.stub_url('PATCH',
+ parts=['domains', domain_id, 'config'],
+ json=config, status_code=200)
+ res = self.manager.update(domain_id, config)
+ self._assert_resource_attributes(res, config['config'])
+ self.assertEntityRequestBodyIs(config)
+
+ def test_get(self):
+ domain_id = uuid.uuid4().hex
+ config = self.new_ref()
+ config = config['config']
+
+ self.stub_entity('GET',
+ parts=['domains', domain_id, 'config'],
+ entity=config)
+ res = self.manager.get(domain_id)
+ self._assert_resource_attributes(res, config)
+
+ def test_delete(self):
+ domain_id = uuid.uuid4().hex
+ self.stub_url('DELETE',
+ parts=['domains', domain_id, 'config'],
+ status_code=204)
+ self.manager.delete(domain_id)
+
+ def test_list(self):
+ # List not supported for domain config
+ self.assertRaises(exceptions.MethodNotImplemented, self.manager.list)
+
+ def test_list_by_id(self):
+ # List not supported for domain config
+ self.assertRaises(exceptions.MethodNotImplemented, self.manager.list)
+
+ def test_list_params(self):
+ # List not supported for domain config
+ self.assertRaises(exceptions.MethodNotImplemented, self.manager.list)
+
+ def test_find(self):
+ # Find not supported for domain config
+ self.assertRaises(exceptions.MethodNotImplemented, self.manager.find)