def test_delete_roles_using_invalid_tokens(self): resp, content = utils.delete_role('test_role', self.disabled_token) self.assertEqual(403, int(resp['status'])) resp, content = utils.delete_role('test_role', self.missing_token) self.assertEqual(401, int(resp['status'])) resp, content = utils.delete_role('test_role', self.exp_auth_token) self.assertEqual(403, int(resp['status'])) resp, content = utils.delete_role('test_role', self.invalid_token) self.assertEqual(404, int(resp['status']))
def test_create_role_mapped_to_a_service(self): resp, content = utils.create_role_mapped_to_service( self.service_role, self.auth_token, self.service_id) self.assertEqual(201, int(resp['status'])) resp, content = utils.get_role(self.service_role, self.auth_token) self.assertEqual(200, int(resp['status'])) #verify content obj = json.loads(content) if not "role" in obj: raise fault.BadRequestFault("Expecting Role") role = obj["role"] if not "id" in role: role_id = None else: role_id = role["id"] if role_id != self.service_role: self.fail("Not the expected Role") if not "serviceId" in role: service_id = None else: service_id = role["serviceId"] if service_id != self.service_id: self.fail("Not the expected service") resp, content = utils.delete_role(self.service_role, self.auth_token) self.assertEqual(204, int(resp['status']))
def test_create_and_delete_role_that_has_references(self): resp, content = utils.create_role('test_role', self.auth_token) self.assertEqual(201, int(resp['status'])) utils.create_role_ref( self.user, "test_role", self.tenant, self.auth_token) resp, content = utils.delete_role('test_role', self.auth_token) self.assertEqual(204, int(resp['status']))
def test_create_role_mapped_to_a_service_xml(self): resp, content = utils.create_role_mapped_to_service_xml(self.service_role, self.auth_token, self.service_id) self.assertEqual(201, int(resp["status"])) resp, content = utils.get_role_xml(self.service_role, self.auth_token) self.assertEqual(200, int(resp["status"])) # verify content dom = etree.Element("root") dom.append(etree.fromstring(content)) role = dom.find("{http://docs.openstack.org/identity/api/v2.0}" "role") if role == None: self.fail("Expecting Role") role_id = role.get("id") if role_id != self.service_role: self.fail("Not the expected Role") service_id = role.get("serviceId") if service_id != self.service_id: self.fail("Not the expected service") resp, content = utils.delete_role(self.service_role, self.auth_token) self.assertEqual(204, int(resp["status"]))
def test_create_role_using_service_token(self): resp, content = utils.create_role('test_role', self.service_token) self.assertEqual(201, int(resp['status'])) resp, content = utils.delete_role('test_role', self.service_token) self.assertEqual(204, int(resp['status']))
def test_create_role(self): resp, content = utils.create_role("test_role", self.auth_token) self.assertEqual(201, int(resp["status"])) resp, content = utils.delete_role("test_role", self.auth_token) self.assertEqual(204, int(resp["status"]))