def setUp(self): super(PlanControllerTestCase, self).setUp() self.context = context.RequestContext(fake.USER_ID, fake.PROJECT_ID, is_admin=False) self.ext_mgr = extensions.ExtensionManager() self.ext_mgr.extensions = {} self.controller = plans.Controller(self.ext_mgr)
def setUp(self): super(SecGroupTestCase, self).setUp() self.context = context.RequestContext( fake_object.fake_user_id, fake_object.fake_project_id, is_admin=False) self.secgroup_resource = secgroup.SecGroup(self.context)
def __call__(self, req): if 'X-Auth-Token' not in req.headers: user_id = req.headers.get('X-Auth-User', 'admin') project_id = req.headers.get('X-Auth-Project-Id', 'admin') os_url = os.path.join(req.url, project_id) res = webob.Response() # NOTE(vish): This is expecting and returning Auth(1.1), whereas # keystone uses 2.0 auth. We should probably allow # 2.0 auth here as well. res.headers['X-Auth-Token'] = '%s:%s' % (user_id, project_id) res.headers['X-Server-Management-Url'] = os_url res.content_type = 'text/plain' res.status = '204' return res token = req.headers['X-Auth-Token'] user_id, _sep, project_id = token.partition(':') project_id = project_id or user_id remote_address = getattr(req, 'remote_address', '127.0.0.1') if CONF.use_forwarded_for: remote_address = req.headers.get('X-Forwarded-For', remote_address) ctx = context.RequestContext(user_id, project_id, is_admin=True, remote_address=remote_address) req.environ['conveyor.context'] = ctx return self.application
def __call__(self, req): user_id = req.headers.get('X_USER') user_id = req.headers.get('X_USER_ID', user_id) if user_id is None: LOG.debug("Neither X_USER_ID nor X_USER found in request") return webob.exc.HTTPUnauthorized() # get the roles roles = [r.strip() for r in req.headers.get('X_ROLE', '').split(',')] if 'X_TENANT_ID' in req.headers: # This is the new header since Keystone went to ID/Name project_id = req.headers['X_TENANT_ID'] else: # This is for legacy compatibility project_id = req.headers['X_TENANT'] project_name = req.headers.get('X_TENANT_NAME') req_id = req.environ.get(request_id.ENV_REQUEST_ID) # Get the auth token auth_token = req.headers.get('X_AUTH_TOKEN', req.headers.get('X_STORAGE_TOKEN')) # Build a context, including the auth_token... remote_address = req.remote_addr service_catalog = None if req.headers.get('X_SERVICE_CATALOG') is not None: try: catalog_header = req.headers.get('X_SERVICE_CATALOG') service_catalog = jsonutils.loads(catalog_header) except ValueError: raise webob.exc.HTTPInternalServerError( explanation=_('Invalid service catalog json.')) if CONF.use_forwarded_for: remote_address = req.headers.get('X-Forwarded-For', remote_address) token_info = req.environ['keystone.token_info'] try: user_name = token_info['access']['user']['username'] except KeyError: user_name = None ctx = context.RequestContext(user_id, project_id, project_name=project_name, roles=roles, auth_token=auth_token, remote_address=remote_address, service_catalog=service_catalog, request_id=req_id, auth_token_info=token_info, auth_url=CONF.keystone_authtoken.auth_url, tenant_id=project_id, user_name=user_name) req.environ['conveyor.context'] = ctx return self.application
def wsgi_app(inner_app_v2=None, fake_auth=True, fake_auth_context=None, use_no_auth=False, ext_mgr=None, inner_app_v3=None): if not inner_app_v2: inner_app_v2 = router.APIRouter(ext_mgr) if fake_auth: if fake_auth_context is not None: ctxt = fake_auth_context else: ctxt = context.RequestContext(fake.USER_ID, fake.PROJECT_ID, auth_token=True) api_v2 = fault.FaultWrapper(auth.InjectContext(ctxt, inner_app_v2)) elif use_no_auth: api_v2 = fault.FaultWrapper(auth.NoAuthMiddleware()) else: pass mapper = urlmap.URLMap() mapper['/v1'] = api_v2 mapper['/'] = fault.FaultWrapper(versions.Versions()) return mapper
def setUp(self): super(NetworkResourceTestCase, self).setUp() self.context = context.RequestContext(fake_object.fake_user_id, fake_object.fake_project_id, is_admin=False) self.fip_resource = float_ips.FloatIps(self.context)
def setUp(self): super(ResourceManagerTestCase, self).setUp() self.context = context.RequestContext(fake_object.fake_user_id, fake_object.fake_project_id, is_admin=False) self.plan_manager = manager.PlanManager()
def setUp(self): super(OpenstackDriverTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.manager = driver.OpenstackDriver()
def setUp(self): super(CloneManagerTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.clone_manager = manager.CloneManager()
def setUp(self): super(MigrateActionControllerTestCase, self).setUp() self.context = context.RequestContext(fake.USER_ID, fake.PROJECT_ID, is_admin=False)
def setUp(self): super(VolumeCloneDriverTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.manager = volume.VolumeCloneDriver()
def setUp(self): super(StackResourceTesetCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.stack_resource = stacks.StackResource(self.context)
def setUp(self): super(ResourceTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False)
def setUp(self): super(StackTemplateCloneDriverTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.manager = stack_template.StackTemplateCloneDriver()
def setUp(self): super(NetworkResourceTestCase, self).setUp() self.context = context.RequestContext(fake_object.fake_user_id, fake_object.fake_project_id, is_admin=False) self.net_resource = networks.NetworkResource(self.context)
def setUp(self): super(ResourceCommonTestCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.manager = resource_comm.ResourceCommon()
def setUp(self): super(InstanceResourceTesetCase, self).setUp() self.context = context.RequestContext('fake', 'fake', is_admin=False) self.instance_resource = instances.InstanceResource(self.context)