blob: 2f7fb73917779189670a548bbee9fe58e9cf7b1c [file] [log] [blame]
Andrea Frittoli8283b4e2014-07-17 13:28:58 +01001# Copyright (c) 2014 Hewlett-Packard Development Company, L.P.
2# Licensed under the Apache License, Version 2.0 (the "License");
3# you may not use this file except in compliance with the License.
4# You may obtain a copy of the License at
5#
6# http://www.apache.org/licenses/LICENSE-2.0
7#
8# Unless required by applicable law or agreed to in writing, software
9# distributed under the License is distributed on an "AS IS" BASIS,
10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
Matthew Treinish976e8df2014-12-19 14:21:54 -050014import os
15
Andrea Frittoli8283b4e2014-07-17 13:28:58 +010016from tempest.common import accounts
Emily Hugenbruche7991d92014-12-12 16:53:36 +000017from tempest.common import cred_provider
Andrea Frittoli8283b4e2014-07-17 13:28:58 +010018from tempest.common import isolated_creds
19from tempest import config
Matthew Treinishfda37652015-02-20 15:14:53 -050020from tempest import exceptions
Andrea Frittoli8283b4e2014-07-17 13:28:58 +010021
22CONF = config.CONF
23
24
25# Return the right implementation of CredentialProvider based on config
26# Dropping interface and password, as they are never used anyways
27# TODO(andreaf) Drop them from the CredentialsProvider interface completely
28def get_isolated_credentials(name, network_resources=None,
29 force_tenant_isolation=False):
30 # If a test requires a new account to work, it can have it via forcing
31 # tenant isolation. A new account will be produced only for that test.
32 # In case admin credentials are not available for the account creation,
33 # the test should be skipped else it would fail.
34 if CONF.auth.allow_tenant_isolation or force_tenant_isolation:
35 return isolated_creds.IsolatedCreds(
36 name=name,
37 network_resources=network_resources)
38 else:
39 if CONF.auth.locking_credentials_provider:
40 # Most params are not relevant for pre-created accounts
41 return accounts.Accounts(name=name)
42 else:
43 return accounts.NotLockingAccounts(name=name)
Emily Hugenbruche7991d92014-12-12 16:53:36 +000044
45
46# We want a helper function here to check and see if admin credentials
47# are available so we can do a single call from skip_checks if admin
48# creds area vailable.
49def is_admin_available():
50 is_admin = True
Matthew Treinish976e8df2014-12-19 14:21:54 -050051 # If tenant isolation is enabled admin will be available
52 if CONF.auth.allow_tenant_isolation:
53 return is_admin
54 # Check whether test accounts file has the admin specified or not
55 elif os.path.isfile(CONF.auth.test_accounts_file):
56 check_accounts = accounts.Accounts(name='check_admin')
57 if not check_accounts.admin_available():
58 is_admin = False
Emily Hugenbruche7991d92014-12-12 16:53:36 +000059 else:
60 try:
David Kranz8d557c72015-03-11 11:51:07 -040061 cred_provider.get_configured_credentials('identity_admin',
62 fill_in=False)
Matthew Treinishfda37652015-02-20 15:14:53 -050063 except exceptions.InvalidConfiguration:
64 is_admin = False
Emily Hugenbruche7991d92014-12-12 16:53:36 +000065 return is_admin