keystonemiddleware.tests.unit.auth_token package

keystonemiddleware.tests.unit.auth_token package

Submodules

keystonemiddleware.tests.unit.auth_token.base module

class keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.MiddlewareTestCase

call(middleware, method='GET', path='/', headers=None, expected_status=<HTTPStatus.OK: 200>)
create_middleware(cb, conf=None, use_global_conf=False)
setUp()

Hook method for setting up the test fixture before exercising it.

keystonemiddleware.tests.unit.auth_token.test_auth module

class keystonemiddleware.tests.unit.auth_token.test_auth.DefaultAuthPluginTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.BaseTestCase

new_plugin(auth_host=None, auth_port=None, auth_protocol=None, auth_admin_prefix=None, admin_user=None, admin_password=None, admin_tenant_name=None, admin_token=None, identity_uri=None, log=None)
setUp()

Hook method for setting up the test fixture before exercising it.

test_auth_uri_from_fragments()
test_identity_uri_overrides_fragments()
test_with_admin_token()
test_with_user_pass()

keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware module

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.AuthProtocolLoadingTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest

AUTH_URL = 'http://auth.url/prefix'
CRUD_URL = 'http://crud.url/prefix'
DISC_URL = 'http://disc.url/prefix'
KEYSTONE_BASE_URL = 'http://keystone.url/prefix'
KEYSTONE_URL = 'http://keystone.url/prefix/v2.0'
static get_plugin(app)
good_request(app)
setUp()

Hook method for setting up the test fixture before exercising it.

test_invalid_plugin_fails_to_initialize()
test_loading_password_plugin()
test_plugin_loading_mixed_opts()
test_plugin_loading_with_auth_section()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

Base test class for auth_token middleware.

All the tests allow for running with auth_token configured for receiving v2 or v3 tokens, with the choice being made by passing configuration data into setUp().

The base class will, by default, run all the tests expecting v2 token formats. Child classes can override this to specify, for instance, v3 format.

assertLastPath(path)
call_middleware(**kwargs)
purge_service_token_expected_env()
purge_token_expected_env()
setUp(expected_env=None, auth_version=None, fake_app=None)

Hook method for setting up the test fixture before exercising it.

set_middleware(expected_env=None, conf=None)

Configure the class ready to call the auth_token middleware.

Set up the various fake items needed to run the middleware. Individual tests that need to further refine these can call this function to override the class defaults.

update_expected_env(expected_env={})
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CachePoolTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest

test_multiple_context_managers_share_single_client()
test_nested_context_managers_create_multiple_clients()
test_not_use_cache_from_env()
test_use_cache_from_env()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonAuthTokenMiddlewareTest

Bases: object

These tests are run once using v2 tokens and again using v3 tokens.

assert_kerberos_bind(token, bind_level, use_kerberos=True, success=True)
assert_valid_request_200(token, with_catalog=True)
get_revocation_list_json(token_ids=None, mode=None)
test_auth_plugin()
test_auth_plugin_service_token()
test_auth_with_no_token_does_not_call_http()
test_cached_revoked_error()
test_cached_revoked_pki()
test_cached_revoked_pkiz()
test_cached_revoked_uuid()
test_caching_token_on_verify()
test_doesnt_auto_set_content_type()
test_expired()
test_fetch_revocation_list()
test_get_revocation_list_returns_current_list_from_disk()
test_get_revocation_list_returns_current_list_from_memory()
test_get_revocation_list_returns_fetched_list()
test_get_token_revocation_list_fetched_time_returns_min()
test_get_token_revocation_list_fetched_time_returns_mtime()
test_get_token_revocation_list_fetched_time_returns_utc()
test_get_token_revocation_list_fetched_time_returns_value()
test_http_error_not_cached_token()

Test to don’t cache token as invalid on network errors.

We use UUID tokens since they are the easiest one to reach get_http_connection.

test_http_request_max_retries()
test_init_by_ipv6Addr_auth_host()
test_init_does_not_call_http()
test_invalid_revocation_list_raises_error()
test_is_signed_token_revoked_returns_false()
test_is_signed_token_revoked_returns_true()
test_is_signed_token_revoked_returns_true_sha256()
test_memcache()
test_memcache_hit_invalid_token()
test_memcache_set_expired(extra_conf={}, extra_environ={})
test_memcache_set_invalid_uuid()
test_nocatalog()
test_request_blank_token()
test_request_invalid_signed_pkiz_token()
test_request_invalid_signed_token()
test_request_invalid_uuid_token()
test_request_no_token()
test_request_no_token_http()
test_revoked_hashed_pki_token()
test_revoked_hashed_pkiz_token()
test_revoked_pki_token_by_audit_id()
test_revoked_token_receives_401()
test_revoked_token_receives_401_md5_secondary()
test_revoked_token_receives_401_sha256()
test_service_token_with_invalid_service_role_not_required()
test_service_token_with_invalid_service_role_required()
test_service_token_with_valid_service_role_not_required()
test_service_token_with_valid_service_role_required()
test_swift_memcache_set_expired()
test_uuid_bind_token_disabled_with_incorrect_ticket()
test_uuid_bind_token_disabled_with_kerb_user()
test_uuid_bind_token_named_kerberos_with_incorrect_ticket()
test_uuid_bind_token_named_kerberos_with_kerb_user()
test_uuid_bind_token_named_kerberos_with_unknown_bind()
test_uuid_bind_token_named_kerberos_without_bind()
test_uuid_bind_token_named_kerberos_without_kerb_user()
test_uuid_bind_token_permissive_with_incorrect_ticket()
test_uuid_bind_token_permissive_with_kerb_user()
test_uuid_bind_token_permissive_with_unknown_bind()
test_uuid_bind_token_permissive_without_kerb_user()
test_uuid_bind_token_required_with_kerb_user()
test_uuid_bind_token_required_with_unknown_bind()
test_uuid_bind_token_required_without_bind()
test_uuid_bind_token_required_without_kerb_user()
test_uuid_bind_token_strict_with_kerb_user()
test_uuid_bind_token_strict_with_kerbout_user()
test_uuid_bind_token_strict_with_unknown_bind()
test_uuid_bind_token_with_unknown_named_FOO()
test_valid_signed_compressed_request()
test_valid_signed_request()
test_valid_uuid_request()
test_valid_uuid_request_with_auth_fragments()
test_validate_offline_raises_exception_for_revoked_pkiz_token()
test_validate_offline_raises_exception_for_revoked_token()
test_validate_offline_raises_exception_for_revoked_token_s256()
test_validate_offline_succeeds_for_unrevoked_token()
test_validate_offline_token_succeeds_for_unrevoked_token_sha256()
test_verify_signed_compressed_token_succeeds_for_unrevoked_token()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonCompositeAuthTests

Bases: object

Test Composite authentication.

Test the behaviour of adding a service-token.

assert_kerberos_composite_bind(user_token, service_token, bind_level)
test_composite_auth_delay_invalid_service_and_user_tokens()
test_composite_auth_delay_invalid_service_token()
test_composite_auth_delay_invalid_user_token()
test_composite_auth_delay_no_service_token()
test_composite_auth_delay_no_user_token()
test_composite_auth_delay_ok()
test_composite_auth_invalid_service_token()
test_composite_auth_invalid_user_token()
test_composite_auth_no_service_token()
test_composite_auth_no_user_token()
test_composite_auth_ok()
test_composite_auth_with_bind()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CompositeBase(expected_env=None)

Bases: object

Base composite auth object with common service token environment.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CompositeFakeApp(expected_env)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CompositeBase, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.FakeApp

A fake v2 WSGI app protected by composite auth_token middleware.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CrossVersionAuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, testresources.ResourcedTestCase

resources = [('examples', <testresources.FixtureResource object>)]
test_valid_uuid_request_forced_to_2_0()

Test forcing auth_token to use lower api version.

By installing the v3 http hander, auth_token will be get a version list that looks like a v3 server - from which it would normally chose v3.0 as the auth version. However, here we specify v2.0 in the configuration - which should force auth_token to use that version instead.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.DelayedAuthTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest

test_auth_plugin_with_no_tokens()
test_delayed_auth_values()
test_header_in_401()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.DiabloAuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, testresources.ResourcedTestCase

resources = [('examples', <testresources.FixtureResource object>)]

Auth Token middleware should understand Diablo keystone responses.

setUp()

Hook method for setting up the test fixture before exercising it.

test_valid_diablo_response()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.FakeApp(expected_env=None, need_service_token=False)

Bases: object

This represents a WSGI app protected by the auth_token middleware.

FORBIDDEN = b'FORBIDDEN'
SUCCESS = b'SUCCESS'
expected_env = {}
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.FakeOsloCache(*args, **kwargs)

Bases: keystonemiddleware.auth_token._cache._FakeClient

A fake oslo_cache object.

The memcache and oslo_cache interfaces are almost the same except we need to return NO_VALUE when not found.

get(key)

Retrieve the value for a key or None.

This expunges expired keys during each get.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.GeneralAuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, testresources.ResourcedTestCase

General Token Behavior tests.

These tests are not affected by the token format (see CommonAuthTokenMiddlewareTest).

resources = [('examples', <testresources.FixtureResource object>)]
test_auth_region_name()
test_conf_values_type_convert()
test_conf_values_type_convert_with_wrong_key()
test_conf_values_type_convert_with_wrong_value()
test_config_revocation_cache_timeout()
test_deprecated_conf_values()
test_fixed_cache_key_length()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.OtherTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest

setUp()

Hook method for setting up the test fixture before exercising it.

test_default_auth_version()
test_micro_version()
test_unknown_server_versions()
test_unsupported_auth_version()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.TestAuthPluginUserAgentGeneration(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest

setUp()

Hook method for setting up the test fixture before exercising it.

test_no_project_configured()
test_project_in_configuration()
test_project_in_oslo_configuration()
test_project_not_installed_results_in_unknown_version()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.TimeFixture(new_time, normalize=True)

Bases: fixtures.fixture.Fixture

setUp()

Prepare the Fixture for use.

This should not be overridden. Concrete fixtures should implement _setUp. Overriding of setUp is still supported, just not recommended.

After setUp has completed, the fixture will have one or more attributes which can be used (these depend totally on the concrete subclass).

Raises:MultipleExceptions if _setUp fails. The last exception captured within the MultipleExceptions will be a SetupError exception.
Returns:None.
Changed in 1.3:The recommendation to override setUp has been reversed - before 1.3, setUp() should be overridden, now it should not be.
Changed in 1.3.1:
 BaseException is now caught, and only subclasses of Exception are wrapped in MultipleExceptions.
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.TimezoneFixture(new_tz)

Bases: fixtures.fixture.Fixture

cleanup()
setUp()

Prepare the Fixture for use.

This should not be overridden. Concrete fixtures should implement _setUp. Overriding of setUp is still supported, just not recommended.

After setUp has completed, the fixture will have one or more attributes which can be used (these depend totally on the concrete subclass).

Raises:MultipleExceptions if _setUp fails. The last exception captured within the MultipleExceptions will be a SetupError exception.
Returns:None.
Changed in 1.3:The recommendation to override setUp has been reversed - before 1.3, setUp() should be overridden, now it should not be.
Changed in 1.3.1:
 BaseException is now caught, and only subclasses of Exception are wrapped in MultipleExceptions.
static supported()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.V2CertDownloadMiddlewareTest(*args, **kwargs)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, testresources.ResourcedTestCase

resources = [('examples', <testresources.FixtureResource object>)]
setUp()

Hook method for setting up the test fixture before exercising it.

test_fetch_signing_ca()
test_fetch_signing_cert()
test_prefix_trailing_slash()
test_request_no_token_dummy()
test_without_prefix()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.V3CertDownloadMiddlewareTest(*args, **kwargs)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.V2CertDownloadMiddlewareTest

keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.cleanup_revoked_file(filename)
keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.load_tests(loader, tests, pattern)
keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.network_error_response(request, context)
keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.strtime(at=None)
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v2AuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonAuthTokenMiddlewareTest, testresources.ResourcedTestCase

v2 token specific tests.

There are some differences between how the auth-token middleware handles v2 and v3 tokens over and above the token formats, namely:

  • A v3 keystone server will auto scope a token to a user’s default project if no scope is specified. A v2 server assumes that the auth-token middleware will do that.
  • A v2 keystone server may issue a token without a catalog, even with a tenant

The tests below were originally part of the generic AuthTokenMiddlewareTest class, but now, since they really are v2 specific, they are included here.

assert_unscoped_default_tenant_auto_scopes(token)

Unscoped v2 requests with a default tenant should auto-scope.

The implied scope is the user’s tenant ID.

assert_unscoped_token_receives_401(token)

Unscoped requests with no default tenant ID should be rejected.

assert_valid_last_url(token_id)
resources = [('examples', <testresources.FixtureResource object>)]
setUp()

Hook method for setting up the test fixture before exercising it.

test_default_tenant_signed_token()
test_default_tenant_uuid_token()
test_request_prevent_service_catalog_injection()
test_unscoped_pki_token_receives_401()
test_unscoped_uuid_token_receives_401()
test_user_plugin_token_properties()
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v2CompositeAuthTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonCompositeAuthTests, testresources.ResourcedTestCase

Test auth_token middleware with v2 token based composite auth.

Execute the Composite auth class tests, but with the auth_token middleware configured to expect v2 tokens back from a keystone server.

resources = [('examples', <testresources.FixtureResource object>)]
setUp()

Hook method for setting up the test fixture before exercising it.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v3AuthTokenMiddlewareTest(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonAuthTokenMiddlewareTest, testresources.ResourcedTestCase

Test auth_token middleware with v3 tokens.

Re-execute the AuthTokenMiddlewareTest class tests, but with the auth_token middleware configured to expect v3 tokens back from a keystone server.

This is done by configuring the AuthTokenMiddlewareTest class via its Setup(), passing in v3 style data that will then be used by the tests themselves. This approach has been used to ensure we really are running the same tests for both v2 and v3 tokens.

There a few additional specific test for v3 only:

  • We allow an unscoped token to be validated (as unscoped), where as for v2 tokens, the auth_token middleware is expected to try and auto-scope it (and fail if there is no default tenant)
  • Domain scoped tokens

Since we don’t specify an auth version for auth_token to use, by definition we are thefore implicitely testing that it will use the highest available auth version, i.e. v3.0

assert_valid_last_url(token_id)
resources = [('examples', <testresources.FixtureResource object>)]
setUp()

Hook method for setting up the test fixture before exercising it.

test_domain_scoped_uuid_request()
test_expire_stored_in_cache()
test_fallback_to_online_validation_with_ca_error()
test_fallback_to_online_validation_with_revocation_list_error()
test_fallback_to_online_validation_with_signing_error()
test_gives_v2_catalog()
test_not_is_admin_project()
test_service_token_with_invalid_service_role_not_required()
test_service_token_with_invalid_service_role_required()
test_service_token_with_valid_service_role_not_required()
test_service_token_with_valid_service_role_required()
test_user_plugin_token_properties()
test_valid_unscoped_uuid_request()
token_response(request, context)
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v3CompositeAuthTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.BaseAuthTokenMiddlewareTest, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CommonCompositeAuthTests, testresources.ResourcedTestCase

Test auth_token middleware with v3 token based composite auth.

Execute the Composite auth class tests, but with the auth_token middleware configured to expect v3 tokens back from a keystone server.

resources = [('examples', <testresources.FixtureResource object>)]
setUp()

Hook method for setting up the test fixture before exercising it.

token_response(request, context)
class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v3CompositeFakeApp(expected_env=None)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.CompositeBase, keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v3FakeApp

A fake v3 WSGI app protected by composite auth_token middleware.

class keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.v3FakeApp(expected_env=None, need_service_token=False)

Bases: keystonemiddleware.tests.unit.auth_token.test_auth_token_middleware.FakeApp

This represents a v3 WSGI app protected by the auth_token middleware.

keystonemiddleware.tests.unit.auth_token.test_base_middleware module

class keystonemiddleware.tests.unit.auth_token.test_base_middleware.BaseAuthProtocolTests(*args, **kwargs)

Bases: testtools.testcase.TestCase

classmethod call(middleware, method='GET', path='/', headers=None)
test_base_doesnt_block_project_id()
test_expired_service_token()
test_expired_user_token()
test_good_v3_service_token()
test_good_v3_user_token()
test_invalid_service_token()
test_invalid_user_token()
test_process_flow(process_request, process_response)
class keystonemiddleware.tests.unit.auth_token.test_base_middleware.FakeApp

Bases: object

class keystonemiddleware.tests.unit.auth_token.test_base_middleware.FetchingMiddleware(app, token_dict={}, **kwargs)

Bases: keystonemiddleware.auth_token.BaseAuthProtocol

fetch_token(token, **kwargs)

Fetch the token data based on the value in the header.

Retrieve the data associated with the token value that was in the header. This can be from PKI, contacting the identity server or whatever is required.

Parameters:
  • token (str) – The token present in the request header.
  • kwargs (dict) – Additional keyword arguments may be passed through here to support new features. If an implementation is not aware of how to use these arguments it should ignore them.
Raises:

exc.InvalidToken – if token is invalid.

Returns:

The token data

Return type:

dict

kwargs_to_fetch_token = True

keystonemiddleware.tests.unit.auth_token.test_cache module

class keystonemiddleware.tests.unit.auth_token.test_cache.NoMemcacheAuthToken(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

These tests will not have the memcache module available.

setUp()

Hook method for setting up the test fixture before exercising it.

test_nomemcache()
class keystonemiddleware.tests.unit.auth_token.test_cache.TestCacheSetup(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

test_assert_valid_memcache_protection_config()
class keystonemiddleware.tests.unit.auth_token.test_cache.TestLiveMemcache(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

setUp()

Hook method for setting up the test fixture before exercising it.

test_encrypt_cache_data()
test_no_memcache_protection()
test_sign_cache_data()

keystonemiddleware.tests.unit.auth_token.test_config module

class keystonemiddleware.tests.unit.auth_token.test_config.TestAuthPluginLocalOsloConfig(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

setUp()

Hook method for setting up the test fixture before exercising it.

test_passed_oslo_configuration()
test_passed_oslo_configuration_wins()

oslo_config_config has precedence over oslo_config_project.

test_project_in_local_oslo_configuration()
keystonemiddleware.tests.unit.auth_token.test_config.conf_get(app, *args, **kwargs)

keystonemiddleware.tests.unit.auth_token.test_connection_pool module

class keystonemiddleware.tests.unit.auth_token.test_connection_pool.TestConnectionPool(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.TestCase

setUp()

Hook method for setting up the test fixture before exercising it.

test_acquire_conn_exception_returns_acquired_count()
test_cleanup_pool()
test_connection_pool_limits_maximum_connections()
test_connection_pool_maximum_connection_get_timeout()
test_get_context_manager()

keystonemiddleware.tests.unit.auth_token.test_memcache_crypt module

class keystonemiddleware.tests.unit.auth_token.test_memcache_crypt.MemcacheCryptPositiveTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.BaseTestCase

test_derive_keys()
test_encryption()
test_key_strategy_diff()
test_no_cryptography()
test_protect_wrappers()
test_sign_data()

keystonemiddleware.tests.unit.auth_token.test_request module

class keystonemiddleware.tests.unit.auth_token.test_request.CatalogConversionTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.TestCase

ADMIN_URL = 'http://admin:35357/v2.0'
INTERNAL_URL = 'http://internal:5000/v2.0'
PUBLIC_URL = 'http://server:5000/v2.0'
REGION_ONE = 'RegionOne'
REGION_THREE = 'RegionThree'
REGION_TWO = 'RegionTwo'
test_basic_convert()
test_multi_region()
class keystonemiddleware.tests.unit.auth_token.test_request.RequestObjectTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.TestCase

setUp()

Hook method for setting up the test fixture before exercising it.

test_auth_type()
test_project_scoped_service_headers()
test_project_scoped_user_headers()
test_removing_headers()
test_service_token()
test_setting_service_token_valid()
test_setting_user_token_valid()
test_storage_token()
test_token_auth()
test_token_info()
test_token_without_catalog()
test_user_token()

keystonemiddleware.tests.unit.auth_token.test_revocations module

class keystonemiddleware.tests.unit.auth_token.test_revocations.RevocationsTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.BaseTestCase

test_check_by_audit_id_chain_revoked()
test_check_by_audit_id_no_audit_ids()
test_check_by_audit_id_not_revoked()
test_check_by_audit_id_revoked()
test_check_empty_list()
test_check_revoked()

keystonemiddleware.tests.unit.auth_token.test_signing_dir module

class keystonemiddleware.tests.unit.auth_token.test_signing_dir.SigningDirectoryTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.utils.BaseTestCase

test_calc_path()
test_directory_created_when_doesnt_exist()
test_read_file()
test_read_file_doesnt_exist()
test_recreate_directory()
test_replace_file()
test_use_directory_already_exists()
test_write_file()

keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin module

class keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin.BaseUserPluginTests

Bases: object

assertTokenDataEqual(token_id, token, token_data)
configure_middleware(auth_type, **kwargs)
get_plugin(token_id, service_token_id=None)
test_user_information()
test_with_service_information()
class keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin.V2UserPluginTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin.BaseUserPluginTests, keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

assertTokenDataEqual(token_id, token, token_data)
get_role_names(token)
get_token(service=False)
setUp()

Hook method for setting up the test fixture before exercising it.

test_trust_scope()
class keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin.V3UserPluginTests(*args, **kwds)

Bases: keystonemiddleware.tests.unit.auth_token.test_user_auth_plugin.BaseUserPluginTests, keystonemiddleware.tests.unit.auth_token.base.BaseAuthTokenTestCase

assertTokenDataEqual(token_id, token, token_data)
get_role_names(token)
get_token(project=True, service=False)
setUp()

Hook method for setting up the test fixture before exercising it.

test_domain_scope()
test_trust_scope()

Module contents

Creative Commons Attribution 3.0 License

Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.