def __call__(self, req): if 'X-Auth-Token' not in req.headers: user_id = req.headers.get('X-Auth-User', 'admin') project_id = req.headers.get('X-Auth-Project-Id', 'admin') os_url = os.path.join(req.url, project_id) res = webob.Response() # NOTE(vish): This is expecting and returning Auth(1.1), whereas # keystone uses 2.0 auth. We should probably allow # 2.0 auth here as well. res.headers['X-Auth-Token'] = '%s:%s' % (user_id, project_id) res.headers['X-Server-Management-Url'] = os_url res.content_type = 'text/plain' res.status = '204' return res token = req.headers['X-Auth-Token'] user_id, _sep, project_id = token.partition(':') project_id = project_id or user_id remote_address = getattr(req, 'remote_address', '127.0.0.1') if CONF.use_forwarded_for: remote_address = req.headers.get('X-Forwarded-For', remote_address) ctx = context.RequestContext(user_id, project_id, is_admin=True, remote_address=remote_address) req.environ['smaug.context'] = ctx return self.application
def test_user_identity(self): ctx = context.RequestContext("user", "tenant", domain="domain", user_domain="user-domain", project_domain="project-domain") self.assertEqual('user tenant domain user-domain project-domain', ctx.to_dict()["user_identity"])
def test_request_context_read_deleted_invalid(self): self.assertRaises(ValueError, context.RequestContext, '111', '222', read_deleted=True) ctxt = context.RequestContext('111', '222') self.assertRaises(ValueError, setattr, ctxt, 'read_deleted', True)
def setUp(self): super(BaseObjectsTestCase, self).setUp() self.user_id = 'fake-user' self.project_id = 'fake-project' self.context = context.RequestContext(self.user_id, self.project_id, is_admin=False) # We only test local right now. self.assertIsNone(obj_base.SmaugObject.indirection_api)
def test_request_context_elevated(self): user_context = context.RequestContext('fake_user', 'fake_project', admin=False) self.assertFalse(user_context.is_admin) admin_context = user_context.elevated() self.assertFalse(user_context.is_admin) self.assertTrue(admin_context.is_admin) self.assertFalse('admin' in user_context.roles) self.assertTrue('admin' in admin_context.roles)
def setUp(self): super(TriggerApiTest, self).setUp() self.controller = trigger_api.TriggersController() self.controller.operationengine_api = FakeRemoteOperationApi() self.ctxt = context.RequestContext('admin', 'fakeproject', True) self.req = fakes.HTTPRequest.blank('/v1/triggers') self.default_create_trigger_param = { "name": "123", "type": "time", "properties": { "format": "crontab", "pattern": "* * * * *" }, }
def __call__(self, req): user_id = req.headers.get('X_USER') user_id = req.headers.get('X_USER_ID', user_id) if user_id is None: LOG.debug("Neither X_USER_ID nor X_USER found in request") return webob.exc.HTTPUnauthorized() # get the roles roles = [r.strip() for r in req.headers.get('X_ROLE', '').split(',')] if 'X_TENANT_ID' in req.headers: # This is the new header since Keystone went to ID/Name project_id = req.headers['X_TENANT_ID'] else: # This is for legacy compatibility project_id = req.headers['X_TENANT'] project_name = req.headers.get('X_TENANT_NAME') req_id = req.environ.get(request_id.ENV_REQUEST_ID) # Get the auth token auth_token = req.headers.get('X_AUTH_TOKEN', req.headers.get('X_STORAGE_TOKEN')) # Build a context, including the auth_token... remote_address = req.remote_addr service_catalog = None if req.headers.get('X_SERVICE_CATALOG') is not None: try: catalog_header = req.headers.get('X_SERVICE_CATALOG') service_catalog = jsonutils.loads(catalog_header) except ValueError: raise webob.exc.HTTPInternalServerError( explanation=_('Invalid service catalog json.')) if CONF.use_forwarded_for: remote_address = req.headers.get('X-Forwarded-For', remote_address) ctx = context.RequestContext(user_id, project_id, project_name=project_name, roles=roles, auth_token=auth_token, remote_address=remote_address, service_catalog=service_catalog, request_id=req_id) req.environ['smaug.context'] = ctx return self.application
def test_service_catalog_nova_and_swift(self): service_catalog = [{ u'type': u'compute', u'name': u'nova' }, { u'type': u's3', u'name': u's3' }, { u'type': u'image', u'name': u'glance' }, { u'type': u'volume', u'name': u'cinder' }, { u'type': u'ec2', u'name': u'ec2' }, { u'type': u'object-store', u'name': u'swift' }, { u'type': u'identity', u'name': u'keystone' }, { u'type': None, u'name': u'S_withtypeNone' }, { u'type': u'co', u'name': u'S_partofcompute' }] compute_catalog = [{u'type': u'compute', u'name': u'nova'}] object_catalog = [{u'name': u'swift', u'type': u'object-store'}] ctxt = context.RequestContext('111', '222', service_catalog=service_catalog) self.assertEqual(5, len(ctxt.service_catalog)) return_compute = [ v for v in ctxt.service_catalog if v['type'] == u'compute' ] return_object = [ v for v in ctxt.service_catalog if v['type'] == u'object-store' ] self.assertEqual(compute_catalog, return_compute) self.assertEqual(object_catalog, return_object)
def setUp(self): super(ScheduledOperationApiTest, self).setUp() self.remote_operation_api = FakeRemoteOperationApi() self.controller = operation_api.ScheduledOperationController() self.controller.operationengine_api = self.remote_operation_api self.ctxt = context.RequestContext('admin', 'fakeproject', True) self.req = fakes.HTTPRequest.blank('/v1/scheduled_operations') trigger = self._create_trigger() self.default_create_operation_param = { "name": "123", "operation_type": "protect", "trigger_id": trigger['trigger_info']['id'], "operation_definition": { "plan_id": "" }, }
def setUp(self): super(RestoreApiTest, self).setUp() self.controller = restores.RestoresController() self.ctxt = context.RequestContext('admin', 'fakeproject', True)
def setUp(self): super(PlanApiTest, self).setUp() self.controller = plans.PlansController() self.ctxt = context.RequestContext('admin', 'fakeproject', True)
def setUp(self): super(ProtectablesApiTest, self).setUp() self.controller = protectables.ProtectablesController() self.ctxt = context.RequestContext('admin', 'fakeproject', True)
def setUp(self): super(ServicesDbTestCase, self).setUp() self.ctxt = context.RequestContext(user_id='user_id', project_id='project_id', is_admin=True)
def setUp(self): super(ScheduledOperationTestCase, self).setUp() self.ctxt = context.RequestContext(user_id='user_id', project_id='project_id')
def setUp(self): super(TriggerTestCase, self).setUp() self.ctxt = context.RequestContext(user_id='user_id', project_id='project_id')
def test_request_context_sets_is_admin_upcase(self): ctxt = context.RequestContext('111', '222', roles=['Admin', 'weasel']) self.assertEqual(True, ctxt.is_admin)
def test_request_context_read_deleted(self): ctxt = context.RequestContext('111', '222', read_deleted='yes') self.assertEqual('yes', ctxt.read_deleted) ctxt.read_deleted = 'no' self.assertEqual('no', ctxt.read_deleted)