def get_client(self, user_ref=None, tenant_ref=None): if user_ref is None: user_ref = self.user_foo if tenant_ref is None: for user in default_fixtures.USERS: if user['id'] == user_ref['id']: tenant_id = user['tenants'][0] else: tenant_id = tenant_ref['id'] cl = self._client(username=user_ref['name'], password=user_ref['password'], tenant_id=tenant_id) gen = self.cli.CommandLineGenerator( cmd=test.rootdir('bin', 'keystone-manage'), execute=True, auth_token=cl.auth_token, endpoint=cl.management_url) gen.auth_token = cl.auth_token gen.management_url = cl.management_url return gen
def get_client(self, user_ref=None, tenant_ref=None): if user_ref is None: user_ref = self.user_foo if tenant_ref is None: for user in default_fixtures.USERS: if user['id'] == user_ref['id']: tenant_id = user['tenants'][0] else: tenant_id = tenant_ref['id'] cl = self._client(username=user_ref['name'], password=user_ref['password'], tenant_id=tenant_id) gen = self.cli.CommandLineGenerator(cmd=test.rootdir( 'bin', 'keystone-manage'), execute=True, auth_token=cl.auth_token, endpoint=cl.management_url) gen.auth_token = cl.auth_token gen.management_url = cl.management_url return gen
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or # implied. # See the License for the specific language governing permissions and # limitations under the License. import os import httplib import ssl from keystone import test from keystone import config CONF = config.CONF CERTDIR = test.rootdir("examples/ssl/certs") KEYDIR = test.rootdir("examples/ssl/private") CERT = os.path.join(CERTDIR, 'keystone.pem') KEY = os.path.join(KEYDIR, 'keystonekey.pem') CA = os.path.join(CERTDIR, 'ca.pem') CLIENT = os.path.join(CERTDIR, 'middleware.pem') class SSLTestCase(test.TestCase): def setUp(self): super(SSLTestCase, self).setUp() self.load_backends() def test_1way_ssl_ok(self): """ Make sure both public and admin API work with 1-way SSL.
import iso8601 import os import string import tempfile import webob from keystone.common import cms from keystone.common import utils from keystone.middleware import auth_token from keystone.openstack.common import jsonutils from keystone.openstack.common import timeutils from keystone import test CERTDIR = test.rootdir("examples/pki/certs") KEYDIR = test.rootdir("examples/pki/private") CMSDIR = test.rootdir("examples/pki/cms") SIGNING_CERT = os.path.join(CERTDIR, 'signing_cert.pem') SIGNING_KEY = os.path.join(KEYDIR, 'signing_key.pem') CA = os.path.join(CERTDIR, 'ca.pem') REVOCATION_LIST = None REVOKED_TOKEN = None REVOKED_TOKEN_HASH = None SIGNED_REVOCATION_LIST = None SIGNED_TOKEN_SCOPED = None SIGNED_TOKEN_UNSCOPED = None SIGNED_TOKEN_SCOPED_KEY = None SIGNED_TOKEN_UNSCOPED_KEY = None
# distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or # implied. # See the License for the specific language governing permissions and # limitations under the License. import httplib import os import ssl from keystone import config from keystone import test CONF = config.CONF CERTDIR = test.rootdir("examples/pki/certs") KEYDIR = test.rootdir("examples/pki/private") CERT = os.path.join(CERTDIR, 'ssl_cert.pem') KEY = os.path.join(KEYDIR, 'ssl_key.pem') CA = os.path.join(CERTDIR, 'cacert.pem') CLIENT = os.path.join(CERTDIR, 'middleware.pem') class SSLTestCase(test.TestCase): def setUp(self): super(SSLTestCase, self).setUp() self.load_backends() def test_1way_ssl_ok(self): """ Make sure both public and admin API work with 1-way SSL.