blob: 35759982ff7a9422852ab12cdf00aa6df0f310fe [file] [log] [blame]
Andrea Frittoli8283b4e2014-07-17 13:28:58 +01001# Copyright (c) 2014 Deutsche Telekom AG
2# Copyright (c) 2014 Hewlett-Packard Development Company, L.P.
Marc Kodererd2690fe2014-07-16 14:17:47 +02003# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
14
15import abc
Matthew Treinish96e9e882014-06-09 18:37:19 -040016
Doug Hellmann583ce2c2015-03-11 14:55:46 +000017from oslo_log import log as logging
Marc Kodererd2690fe2014-07-16 14:17:47 +020018import six
andreafb8a52282015-03-19 22:21:54 +000019from tempest_lib import auth
Marc Kodererd2690fe2014-07-16 14:17:47 +020020
21from tempest import config
Andrea Frittoli9efbe952015-01-29 12:43:09 +000022from tempest import exceptions
Marc Kodererd2690fe2014-07-16 14:17:47 +020023
24CONF = config.CONF
25LOG = logging.getLogger(__name__)
26
Andrea Frittoli9efbe952015-01-29 12:43:09 +000027# Type of credentials available from configuration
28CREDENTIAL_TYPES = {
Matthew Treinish16cf1e52015-08-11 10:39:23 -040029 'identity_admin': ('auth', 'admin'),
Andrea Frittoli9efbe952015-01-29 12:43:09 +000030 'user': ('identity', None),
31 'alt_user': ('identity', 'alt')
32}
33
Andrea Frittoli7c4ed9c2015-03-09 15:27:50 +000034DEFAULT_PARAMS = {
35 'disable_ssl_certificate_validation':
36 CONF.identity.disable_ssl_certificate_validation,
37 'ca_certs': CONF.identity.ca_certificates_file,
38 'trace_requests': CONF.debug.trace_requests
39}
40
Andrea Frittoli9efbe952015-01-29 12:43:09 +000041
42# Read credentials from configuration, builds a Credentials object
43# based on the specified or configured version
44def get_configured_credentials(credential_type, fill_in=True,
45 identity_version=None):
46 identity_version = identity_version or CONF.identity.auth_version
47 if identity_version not in ('v2', 'v3'):
48 raise exceptions.InvalidConfiguration(
49 'Unsupported auth version: %s' % identity_version)
50 if credential_type not in CREDENTIAL_TYPES:
51 raise exceptions.InvalidCredentials()
52 conf_attributes = ['username', 'password', 'tenant_name']
53 if identity_version == 'v3':
54 conf_attributes.append('domain_name')
55 # Read the parts of credentials from config
Andrea Frittoli64896292015-03-12 16:29:59 +000056 params = DEFAULT_PARAMS.copy()
Andrea Frittoli9efbe952015-01-29 12:43:09 +000057 section, prefix = CREDENTIAL_TYPES[credential_type]
58 for attr in conf_attributes:
59 _section = getattr(CONF, section)
60 if prefix is None:
61 params[attr] = getattr(_section, attr)
62 else:
63 params[attr] = getattr(_section, prefix + "_" + attr)
64 # Build and validate credentials. We are reading configured credentials,
65 # so validate them even if fill_in is False
Andrea Frittoli (andreaf)484ba662015-03-25 16:25:29 -040066 credentials = get_credentials(fill_in=fill_in,
67 identity_version=identity_version, **params)
Andrea Frittoli9efbe952015-01-29 12:43:09 +000068 if not fill_in:
69 if not credentials.is_valid():
70 msg = ("The %s credentials are incorrectly set in the config file."
71 " Double check that all required values are assigned" %
72 credential_type)
73 raise exceptions.InvalidConfiguration(msg)
74 return credentials
75
Marc Kodererd2690fe2014-07-16 14:17:47 +020076
Andrea Frittoli878d5ab2015-01-30 13:22:50 +000077# Wrapper around auth.get_credentials to use the configured identity version
78# is none is specified
79def get_credentials(fill_in=True, identity_version=None, **kwargs):
Andrea Frittoli7c4ed9c2015-03-09 15:27:50 +000080 params = dict(DEFAULT_PARAMS, **kwargs)
Andrea Frittoli878d5ab2015-01-30 13:22:50 +000081 identity_version = identity_version or CONF.identity.auth_version
Andrea Frittoli5c05d592015-01-30 13:42:32 +000082 # In case of "v3" add the domain from config if not specified
83 if identity_version == 'v3':
84 domain_fields = set(x for x in auth.KeystoneV3Credentials.ATTRIBUTES
85 if 'domain' in x)
86 if not domain_fields.intersection(kwargs.keys()):
David Kranz87fc7e92015-07-28 14:05:20 -040087 domain_name = CONF.auth.default_credentials_domain_name
88 params['user_domain_name'] = domain_name
89
ghanshyam5ff763f2015-02-18 16:15:58 +090090 auth_url = CONF.identity.uri_v3
91 else:
92 auth_url = CONF.identity.uri
93 return auth.get_credentials(auth_url,
94 fill_in=fill_in,
Andrea Frittoli878d5ab2015-01-30 13:22:50 +000095 identity_version=identity_version,
Andrea Frittoli7c4ed9c2015-03-09 15:27:50 +000096 **params)
Andrea Frittoli878d5ab2015-01-30 13:22:50 +000097
98
Marc Kodererd2690fe2014-07-16 14:17:47 +020099@six.add_metaclass(abc.ABCMeta)
100class CredentialProvider(object):
Andrea Frittoli (andreaf)1eb04962015-10-09 14:48:06 +0100101 def __init__(self, identity_version, name=None, network_resources=None,
Andrea Frittoli (andreaf)29491a72015-10-13 11:24:17 +0100102 credentials_domain=None, admin_role=None):
Andrea Frittolic3280152015-02-26 12:42:34 +0000103 """A CredentialProvider supplies credentials to test classes.
Andrea Frittoli (andreaf)32d0de12015-10-09 14:43:53 +0100104 :param identity_version: Identity version of the credentials provided
Ken'ichi Ohmichi592eb132015-07-01 04:08:30 +0000105 :param name: Name of the calling test. Included in provisioned
106 credentials when credentials are provisioned on the fly
107 :param network_resources: Network resources required for the
108 credentials
Andrea Frittoli (andreaf)1eb04962015-10-09 14:48:06 +0100109 :param credentials_domain: Domain credentials belong to
Andrea Frittoli (andreaf)29491a72015-10-13 11:24:17 +0100110 :param admin_role: Name of the role of the admin account
Andrea Frittolic3280152015-02-26 12:42:34 +0000111 """
Andrea Frittoli (andreaf)32d0de12015-10-09 14:43:53 +0100112 self.identity_version = identity_version
Andrea Frittoli (andreaf)1eb04962015-10-09 14:48:06 +0100113 self.name = name or "test_creds"
114 self.network_resources = network_resources
115 self.credentials_domain = credentials_domain or 'Default'
Andrea Frittoli (andreaf)29491a72015-10-13 11:24:17 +0100116 self.admin_role = admin_role
Andrea Frittolic3280152015-02-26 12:42:34 +0000117 if not auth.is_identity_version_supported(self.identity_version):
118 raise exceptions.InvalidIdentityVersion(
119 identity_version=self.identity_version)
Marc Kodererd2690fe2014-07-16 14:17:47 +0200120
121 @abc.abstractmethod
122 def get_primary_creds(self):
123 return
124
125 @abc.abstractmethod
126 def get_admin_creds(self):
127 return
128
129 @abc.abstractmethod
130 def get_alt_creds(self):
131 return
132
133 @abc.abstractmethod
Andrea Frittoli (andreaf)17209bb2015-05-22 10:16:57 -0700134 def clear_creds(self):
Marc Kodererd2690fe2014-07-16 14:17:47 +0200135 return
Andrea Frittoli8283b4e2014-07-17 13:28:58 +0100136
137 @abc.abstractmethod
138 def is_multi_user(self):
139 return
Yair Fried76488d72014-10-21 10:13:19 +0300140
141 @abc.abstractmethod
142 def is_multi_tenant(self):
143 return
Matthew Treinish976e8df2014-12-19 14:21:54 -0500144
145 @abc.abstractmethod
146 def get_creds_by_roles(self, roles, force_new=False):
147 return
Matthew Treinish4a596932015-03-06 20:37:01 -0500148
149 @abc.abstractmethod
150 def is_role_available(self, role):
151 return
Andrea Frittoli (andreaf)9540dfd2015-03-25 17:06:50 -0400152
153
154class TestResources(object):
155 """Readonly Credentials, with network resources added."""
156
157 def __init__(self, credentials):
158 self._credentials = credentials
159 self.network = None
160 self.subnet = None
161 self.router = None
162
163 def __getattr__(self, item):
164 return getattr(self._credentials, item)
165
166 def set_resources(self, **kwargs):
167 for key in kwargs.keys():
168 if hasattr(self, key):
169 setattr(self, key, kwargs[key])
170
171 @property
172 def credentials(self):
173 return self._credentials