def configure_ldap_auth_mode(browser, available_auth_modes): """Configure LDAP authentication mode""" if 'ldap' in available_auth_modes: server_data = cfme_data['auth_modes']['ldap'] configuration.set_auth_mode(**server_data) yield configuration.set_auth_mode(mode='database') else: yield
def configure_aws_iam_auth_mode(): """Configure AWS IAM authentication mode""" aws_iam_data = dict(cfme_data['auth_modes']['aws_iam']) aws_iam_creds = credentials[aws_iam_data.pop('credentials')] aws_iam_data['access_key'] = aws_iam_creds['username'] aws_iam_data['secret_key'] = aws_iam_creds['password'] configuration.set_auth_mode(**aws_iam_data) yield configuration.set_auth_mode(mode='database')
def configure_openldap_auth_mode(browser, available_auth_modes): """Configure LDAP authentication mode""" if 'miq_openldap' in available_auth_modes: server_data = cfme_data.get('auth_modes', {})['miq_openldap'] configuration.set_auth_mode(**server_data) yield current_appliance.server.login_admin() configuration.set_auth_mode(mode='database') else: yield
def configure_ldap_auth_mode(browser, available_auth_modes): """Configure LDAP authentication mode""" if 'ldap' in available_auth_modes: server_data = cfme_data['auth_modes']['ldap'] configuration.set_auth_mode(**server_data) yield login_admin() configuration.set_auth_mode(mode='database') else: yield
def configure_openldap_auth_mode_default_groups(browser, available_auth_modes): """Configure LDAP authentication mode""" if 'miq_openldap' in available_auth_modes: server_data = cfme_data.get('auth_modes', {})['miq_openldap'] server_data['get_groups'] = False server_data['default_groups'] = 'EvmRole-user' configuration.set_auth_mode(**server_data) yield current_appliance.server.login_admin() configuration.set_auth_mode(mode='database') else: yield
def configure_aws_iam_auth_mode(browser, available_auth_modes): """Configure AWS IAM authentication mode""" if 'miq_aws_iam' in available_auth_modes: aws_iam_data = dict(cfme_data.get('auth_modes', {})['miq_aws_iam']) aws_iam_creds = credentials[aws_iam_data.pop('credentials')] aws_iam_data['access_key'] = aws_iam_creds['username'] aws_iam_data['secret_key'] = aws_iam_creds['password'] configuration.set_auth_mode(**aws_iam_data) yield current_appliance.server.login_admin() configuration.set_auth_mode(mode='database') else: yield
def configure_auth(request, auth_mode): data = cfme_data['auth_modes'].get(auth_mode, {}) if auth_mode == 'ext_ipa': request.addfinalizer(disable_external_auth_ipa) setup_external_auth_ipa(**data) elif auth_mode == 'ext_openldap': request.addfinalizer(disable_external_auth_openldap) setup_external_auth_openldap(**data) elif auth_mode in ['miq_openldap', 'miq_ldap']: configuration.set_auth_mode(**data) request.addfinalizer(current_appliance.server.login_admin) request.addfinalizer(configuration.setup_authmode_database) elif auth_mode == 'miq_aws_iam': aws_iam_creds = credentials[data.pop('credentials')] data['access_key'] = aws_iam_creds['username'] data['secret_key'] = aws_iam_creds['password'] configuration.set_auth_mode(**data) request.addfinalizer(current_appliance.server.login_admin) request.addfinalizer(configuration.setup_authmode_database) else: pytest.skip("auth_mode specified is not a expected value for cfme_auth tests")
def configure_ldap_auth_mode(): """Configure LDAP authentication mode""" server_data = cfme_data['auth_modes']['ldap_server'] configuration.set_auth_mode(**server_data) yield configuration.set_auth_mode(mode='database')