ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | f38eaac | 2012-06-21 13:37:35 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 16 | from tempest import config |
Ken'ichi Ohmichi | 7bd2575 | 2017-03-10 10:45:39 -0800 | [diff] [blame] | 17 | from tempest.lib.common.utils import data_utils |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 18 | from tempest.lib.common.utils import test_utils |
Attila Fazekas | dc21642 | 2013-01-29 15:12:14 +0100 | [diff] [blame] | 19 | import tempest.test |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 20 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 21 | CONF = config.CONF |
| 22 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 23 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 24 | class BaseIdentityTest(tempest.test.BaseTestCase): |
Jay Pipes | f38eaac | 2012-06-21 13:37:35 -0400 | [diff] [blame] | 25 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 26 | @classmethod |
Jordan Pittier | f7da5e5 | 2016-09-06 18:00:52 +0200 | [diff] [blame] | 27 | def setup_credentials(cls): |
| 28 | # Create no network resources for these test. |
| 29 | cls.set_network_resources() |
| 30 | super(BaseIdentityTest, cls).setup_credentials() |
| 31 | |
| 32 | @classmethod |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 33 | def disable_user(cls, user_name): |
| 34 | user = cls.get_user_by_name(user_name) |
ghanshyam | 9c257a7 | 2016-06-21 10:15:10 +0900 | [diff] [blame] | 35 | cls.users_client.update_user_enabled(user['id'], enabled=False) |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 36 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 37 | @classmethod |
| 38 | def disable_tenant(cls, tenant_name): |
| 39 | tenant = cls.get_tenant_by_name(tenant_name) |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 40 | cls.tenants_client.update_tenant(tenant['id'], enabled=False) |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 41 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 42 | @classmethod |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 43 | def get_user_by_name(cls, name, domain_id=None): |
| 44 | if domain_id: |
| 45 | params = {'domain_id': domain_id} |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 46 | users = cls.users_client.list_users(**params)['users'] |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 47 | else: |
| 48 | users = cls.users_client.list_users()['users'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 49 | user = [u for u in users if u['name'] == name] |
Masayuki Igawa | 0c0f014 | 2017-04-10 17:22:02 +0900 | [diff] [blame] | 50 | if user: |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 51 | return user[0] |
| 52 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 53 | @classmethod |
| 54 | def get_tenant_by_name(cls, name): |
| 55 | try: |
Daniel Mellado | b04da90 | 2015-11-20 17:43:12 +0100 | [diff] [blame] | 56 | tenants = cls.tenants_client.list_tenants()['tenants'] |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 57 | except AttributeError: |
Yaroslav Lobankov | 47a93ab | 2016-02-07 16:32:49 -0600 | [diff] [blame] | 58 | tenants = cls.projects_client.list_projects()['projects'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 59 | tenant = [t for t in tenants if t['name'] == name] |
Masayuki Igawa | 0c0f014 | 2017-04-10 17:22:02 +0900 | [diff] [blame] | 60 | if tenant: |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 61 | return tenant[0] |
| 62 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 63 | @classmethod |
| 64 | def get_role_by_name(cls, name): |
Daniel Mellado | 6b16b92 | 2015-12-07 12:43:08 +0000 | [diff] [blame] | 65 | roles = cls.roles_client.list_roles()['roles'] |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 66 | role = [r for r in roles if r['name'] == name] |
Masayuki Igawa | 0c0f014 | 2017-04-10 17:22:02 +0900 | [diff] [blame] | 67 | if role: |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 68 | return role[0] |
| 69 | |
zhufl | 75d51a9 | 2017-04-11 16:02:39 +0800 | [diff] [blame] | 70 | def create_test_user(self, **kwargs): |
Nicolas Helgeson | dffb867 | 2017-01-26 14:43:06 -0800 | [diff] [blame] | 71 | if kwargs.get('password', None) is None: |
zhufl | 75d51a9 | 2017-04-11 16:02:39 +0800 | [diff] [blame] | 72 | kwargs['password'] = data_utils.rand_password() |
| 73 | if 'name' not in kwargs: |
| 74 | kwargs['name'] = data_utils.rand_name('test_user') |
| 75 | if 'email' not in kwargs: |
| 76 | kwargs['email'] = kwargs['name'] + '@testmail.tm' |
| 77 | |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 78 | user = self.users_client.create_user(**kwargs)['user'] |
| 79 | # Delete the user at the end of the test |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 80 | self.addCleanup( |
| 81 | test_utils.call_and_ignore_notfound_exc, |
| 82 | self.users_client.delete_user, user['id']) |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 83 | return user |
| 84 | |
zhufl | 66b616a | 2017-04-11 15:00:32 +0800 | [diff] [blame] | 85 | def setup_test_role(self, name=None, domain_id=None): |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 86 | """Set up a test role.""" |
zhufl | 66b616a | 2017-04-11 15:00:32 +0800 | [diff] [blame] | 87 | params = {'name': name or data_utils.rand_name('test_role')} |
Rodrigo Duarte | 34a6512 | 2017-01-27 11:28:26 -0300 | [diff] [blame] | 88 | if domain_id: |
| 89 | params['domain_id'] = domain_id |
| 90 | |
| 91 | role = self.roles_client.create_role(**params)['role'] |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 92 | # Delete the role at the end of the test |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 93 | self.addCleanup( |
| 94 | test_utils.call_and_ignore_notfound_exc, |
| 95 | self.roles_client.delete_role, role['id']) |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 96 | return role |
| 97 | |
Rohit Karajgi | 6b1e154 | 2012-05-14 05:55:54 -0700 | [diff] [blame] | 98 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 99 | class BaseIdentityV2Test(BaseIdentityTest): |
| 100 | |
Andrea Frittoli | b21de6c | 2015-02-06 20:12:38 +0000 | [diff] [blame] | 101 | credentials = ['primary'] |
| 102 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 103 | # identity v2 tests should obtain tokens and create accounts via v2 |
| 104 | # regardless of the configured CONF.identity.auth_version |
| 105 | identity_version = 'v2' |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 106 | |
| 107 | @classmethod |
| 108 | def setup_clients(cls): |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 109 | super(BaseIdentityV2Test, cls).setup_clients() |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 110 | cls.non_admin_client = cls.os_primary.identity_public_client |
| 111 | cls.non_admin_token_client = cls.os_primary.token_client |
| 112 | cls.non_admin_tenants_client = cls.os_primary.tenants_public_client |
| 113 | cls.non_admin_users_client = cls.os_primary.users_public_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 114 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 115 | |
| 116 | class BaseIdentityV2AdminTest(BaseIdentityV2Test): |
| 117 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 118 | credentials = ['primary', 'admin'] |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 119 | |
Andrea Frittoli | 00882b6 | 2016-12-19 23:22:44 +0000 | [diff] [blame] | 120 | # NOTE(andreaf) Identity tests work with credentials, so it is safer |
| 121 | # for them to always use disposable credentials. Forcing dynamic creds |
| 122 | # on regular identity tests would be however to restrictive, since it |
| 123 | # would prevent any identity test from being executed against clouds where |
| 124 | # admin credentials are not available. |
| 125 | # Since All admin tests require admin credentials to be |
| 126 | # executed, so this will not impact the ability to execute tests. |
| 127 | force_tenant_isolation = True |
| 128 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 129 | @classmethod |
Andrea Frittoli | 1413ba9 | 2017-04-21 14:33:23 +0100 | [diff] [blame] | 130 | def skip_checks(cls): |
| 131 | super(BaseIdentityV2AdminTest, cls).skip_checks() |
| 132 | if not CONF.identity_feature_enabled.api_v2_admin: |
| 133 | raise cls.skipException('Identity v2 admin not available') |
| 134 | |
| 135 | @classmethod |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 136 | def setup_clients(cls): |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 137 | super(BaseIdentityV2AdminTest, cls).setup_clients() |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 138 | cls.client = cls.os_admin.identity_client |
| 139 | cls.non_admin_client = cls.os_primary.identity_client |
| 140 | cls.token_client = cls.os_admin.token_client |
| 141 | cls.tenants_client = cls.os_admin.tenants_client |
| 142 | cls.non_admin_tenants_client = cls.os_primary.tenants_client |
| 143 | cls.roles_client = cls.os_admin.roles_client |
| 144 | cls.non_admin_roles_client = cls.os_primary.roles_client |
| 145 | cls.users_client = cls.os_admin.users_client |
| 146 | cls.non_admin_users_client = cls.os_primary.users_client |
| 147 | cls.services_client = cls.os_admin.identity_services_client |
| 148 | cls.endpoints_client = cls.os_admin.endpoints_client |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 149 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 150 | @classmethod |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 151 | def resource_setup(cls): |
| 152 | super(BaseIdentityV2AdminTest, cls).resource_setup() |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 153 | cls.projects_client = cls.tenants_client |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 154 | |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 155 | def setup_test_user(self, password=None): |
| 156 | """Set up a test user.""" |
| 157 | tenant = self.setup_test_tenant() |
zhufl | 75d51a9 | 2017-04-11 16:02:39 +0800 | [diff] [blame] | 158 | user = self.create_test_user(tenantId=tenant['id'], password=password) |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 159 | return user |
| 160 | |
zhufl | 963d2c3 | 2017-04-20 15:44:58 +0800 | [diff] [blame] | 161 | def setup_test_tenant(self, **kwargs): |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 162 | """Set up a test tenant.""" |
zhufl | 963d2c3 | 2017-04-20 15:44:58 +0800 | [diff] [blame] | 163 | if 'name' not in kwargs: |
| 164 | kwargs['name'] = data_utils.rand_name('test_tenant') |
| 165 | if 'description' not in kwargs: |
| 166 | kwargs['description'] = data_utils.rand_name('desc') |
| 167 | tenant = self.projects_client.create_tenant(**kwargs)['tenant'] |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 168 | # Delete the tenant at the end of the test |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 169 | self.addCleanup( |
| 170 | test_utils.call_and_ignore_notfound_exc, |
| 171 | self.tenants_client.delete_tenant, tenant['id']) |
Castulo J. Martinez | e3adee4 | 2016-07-14 10:40:08 -0700 | [diff] [blame] | 172 | return tenant |
| 173 | |
Matthew Treinish | db2c597 | 2014-01-31 22:18:59 +0000 | [diff] [blame] | 174 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 175 | class BaseIdentityV3Test(BaseIdentityTest): |
| 176 | |
Andrea Frittoli | b21de6c | 2015-02-06 20:12:38 +0000 | [diff] [blame] | 177 | credentials = ['primary'] |
| 178 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 179 | # identity v3 tests should obtain tokens and create accounts via v3 |
| 180 | # regardless of the configured CONF.identity.auth_version |
| 181 | identity_version = 'v3' |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 182 | |
| 183 | @classmethod |
| 184 | def setup_clients(cls): |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 185 | super(BaseIdentityV3Test, cls).setup_clients() |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 186 | cls.non_admin_client = cls.os_primary.identity_v3_client |
| 187 | cls.non_admin_users_client = cls.os_primary.users_v3_client |
| 188 | cls.non_admin_token = cls.os_primary.token_v3_client |
| 189 | cls.non_admin_projects_client = cls.os_primary.projects_client |
| 190 | cls.non_admin_versions_client =\ |
| 191 | cls.os_primary.identity_versions_v3_client |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 192 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 193 | |
| 194 | class BaseIdentityV3AdminTest(BaseIdentityV3Test): |
| 195 | |
Andrea Frittoli (andreaf) | 4160141 | 2015-05-12 16:39:03 +0100 | [diff] [blame] | 196 | credentials = ['primary', 'admin'] |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 197 | |
Andrea Frittoli | 00882b6 | 2016-12-19 23:22:44 +0000 | [diff] [blame] | 198 | # NOTE(andreaf) Identity tests work with credentials, so it is safer |
| 199 | # for them to always use disposable credentials. Forcing dynamic creds |
| 200 | # on regular identity tests would be however to restrictive, since it |
| 201 | # would prevent any identity test from being executed against clouds where |
| 202 | # admin credentials are not available. |
| 203 | # Since All admin tests require admin credentials to be |
| 204 | # executed, so this will not impact the ability to execute tests. |
| 205 | force_tenant_isolation = True |
| 206 | |
Chris Hoge | 4f6117a | 2015-03-20 12:39:33 -0500 | [diff] [blame] | 207 | @classmethod |
| 208 | def setup_clients(cls): |
Rohan Kanade | b645e17 | 2015-02-05 17:38:59 +0530 | [diff] [blame] | 209 | super(BaseIdentityV3AdminTest, cls).setup_clients() |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 210 | cls.client = cls.os_admin.identity_v3_client |
| 211 | cls.domains_client = cls.os_admin.domains_client |
| 212 | cls.users_client = cls.os_admin.users_v3_client |
| 213 | cls.trusts_client = cls.os_admin.trusts_client |
| 214 | cls.roles_client = cls.os_admin.roles_v3_client |
| 215 | cls.inherited_roles_client = cls.os_admin.inherited_roles_client |
| 216 | cls.token = cls.os_admin.token_v3_client |
| 217 | cls.endpoints_client = cls.os_admin.endpoints_v3_client |
| 218 | cls.regions_client = cls.os_admin.regions_client |
| 219 | cls.services_client = cls.os_admin.identity_services_v3_client |
| 220 | cls.policies_client = cls.os_admin.policies_client |
| 221 | cls.creds_client = cls.os_admin.credentials_client |
| 222 | cls.groups_client = cls.os_admin.groups_client |
| 223 | cls.projects_client = cls.os_admin.projects_client |
Rodrigo Duarte | 12f8d4a | 2016-07-08 11:53:53 -0300 | [diff] [blame] | 224 | cls.role_assignments = cls.os_admin.role_assignments_client |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 225 | cls.oauth_consumers_client = cls.os_admin.oauth_consumers_client |
| 226 | cls.domain_config_client = cls.os_admin.domain_config_client |
| 227 | cls.endpoint_filter_client = cls.os_admin.endpoint_filter_client |
| 228 | |
Andrea Frittoli (andreaf) | 100d18d | 2016-05-05 23:34:52 +0100 | [diff] [blame] | 229 | if CONF.identity.admin_domain_scope: |
| 230 | # NOTE(andreaf) When keystone policy requires it, the identity |
| 231 | # admin clients for these tests shall use 'domain' scoped tokens. |
| 232 | # As the client manager is already created by the base class, |
| 233 | # we set the scope for the inner auth provider. |
Jordan Pittier | 8160d31 | 2017-04-18 11:52:23 +0200 | [diff] [blame^] | 234 | cls.os_admin.auth_provider.scope = 'domain' |
Yaroslav Lobankov | 997a145 | 2015-11-19 17:11:37 +0300 | [diff] [blame] | 235 | |
Yaroslav Lobankov | 2c2f036 | 2016-01-13 18:07:22 +0300 | [diff] [blame] | 236 | @classmethod |
Tom Cocozzello | 5544c17 | 2016-02-23 17:50:28 -0600 | [diff] [blame] | 237 | def disable_user(cls, user_name, domain_id=None): |
| 238 | user = cls.get_user_by_name(user_name, domain_id) |
ghanshyam | 7f817db | 2016-08-01 18:37:13 +0900 | [diff] [blame] | 239 | cls.users_client.update_user(user['id'], name=user_name, enabled=False) |
BinBin Cong | c6e8ef5 | 2015-11-20 02:08:46 -0500 | [diff] [blame] | 240 | |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 241 | @classmethod |
zhufl | 2b33c1a | 2017-04-24 17:33:48 +0800 | [diff] [blame] | 242 | def create_domain(cls, **kwargs): |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 243 | """Create a domain.""" |
zhufl | 2b33c1a | 2017-04-24 17:33:48 +0800 | [diff] [blame] | 244 | if 'name' not in kwargs: |
| 245 | kwargs['name'] = data_utils.rand_name('test_domain') |
| 246 | if 'description' not in kwargs: |
| 247 | kwargs['description'] = data_utils.rand_name('desc') |
| 248 | domain = cls.domains_client.create_domain(**kwargs)['domain'] |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 249 | return domain |
| 250 | |
Martin Pavlasek | 4c3f2ab | 2014-04-15 17:15:15 +0200 | [diff] [blame] | 251 | def delete_domain(self, domain_id): |
| 252 | # NOTE(mpavlase) It is necessary to disable the domain before deleting |
| 253 | # otherwise it raises Forbidden exception |
Daniel Mellado | 91a26b6 | 2016-02-11 11:13:04 +0000 | [diff] [blame] | 254 | self.domains_client.update_domain(domain_id, enabled=False) |
| 255 | self.domains_client.delete_domain(domain_id) |
Martin Pavlasek | 4c3f2ab | 2014-04-15 17:15:15 +0200 | [diff] [blame] | 256 | |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 257 | def setup_test_user(self, password=None): |
| 258 | """Set up a test user.""" |
| 259 | project = self.setup_test_project() |
zhufl | 75d51a9 | 2017-04-11 16:02:39 +0800 | [diff] [blame] | 260 | user = self.create_test_user(project_id=project['id'], |
| 261 | password=password) |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 262 | return user |
| 263 | |
zhufl | f2f4705 | 2017-04-20 15:08:02 +0800 | [diff] [blame] | 264 | def setup_test_project(self, **kwargs): |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 265 | """Set up a test project.""" |
zhufl | f2f4705 | 2017-04-20 15:08:02 +0800 | [diff] [blame] | 266 | if 'name' not in kwargs: |
| 267 | kwargs['name'] = data_utils.rand_name('test_project') |
| 268 | if 'description' not in kwargs: |
| 269 | kwargs['description'] = data_utils.rand_name('test_description') |
| 270 | project = self.projects_client.create_project(**kwargs)['project'] |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 271 | # Delete the project at the end of the test |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 272 | self.addCleanup( |
| 273 | test_utils.call_and_ignore_notfound_exc, |
| 274 | self.projects_client.delete_project, project['id']) |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 275 | return project |
| 276 | |
| 277 | def setup_test_domain(self): |
| 278 | """Set up a test domain.""" |
| 279 | domain = self.create_domain() |
| 280 | # Delete the domain at the end of the test |
Samantha Blanco | df33c78 | 2017-03-06 14:29:52 -0500 | [diff] [blame] | 281 | self.addCleanup( |
| 282 | test_utils.call_and_ignore_notfound_exc, |
| 283 | self.delete_domain, domain['id']) |
Castulo J. Martinez | 19b81b2 | 2016-07-15 08:58:25 -0700 | [diff] [blame] | 284 | return domain |