summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTushar Patil <tushar.vitthal.patil@gmail.com>2013-01-10 00:46:23 -0800
committerTushar Patil <tushar.vitthal.patil@gmail.com>2013-01-11 16:31:10 -0800
commit3a38ecfc8868c95ad3df43de22b29f08f2c9d4cf (patch)
tree1920564c51be16929b9d44a91c64a7c95393a150
parentcf3a3379c86415e8b2ecbefaa06da62570d768f0 (diff)
Validated URLs in v2 endpoint creation API
Fixed the 500 response when endpoint is created without specifying either adminurl, publicurl or internalurl empty. Added unit test coverage for v2 endpoint create API. Fixes LP: #1097747 Change-Id: I1875859bd7e197e985a5b5395c8caefff3c83b11
-rw-r--r--keystone/catalog/controllers.py6
-rw-r--r--keystone/common/controller.py13
-rw-r--r--tests/test_catalog.py80
3 files changed, 91 insertions, 8 deletions
diff --git a/keystone/catalog/controllers.py b/keystone/catalog/controllers.py
index 78afffe7..8dddf469 100644
--- a/keystone/catalog/controllers.py
+++ b/keystone/catalog/controllers.py
@@ -81,9 +81,13 @@ class Endpoint(controller.V2Controller):
"""Create three v3 endpoint refs based on a legacy ref."""
self.assert_admin(context)
+ # according to the v2 spec publicurl is mandatory
+ self._require_attribute(endpoint, 'publicurl')
+
legacy_endpoint_ref = endpoint.copy()
- urls = dict((i, endpoint.pop('%surl' % i)) for i in INTERFACES)
+ urls = dict((i, endpoint.pop('%surl' % i)) for i in INTERFACES
+ if endpoint.get('%surl' % i) is not None)
legacy_endpoint_id = uuid.uuid4().hex
for interface, url in urls.iteritems():
endpoint_ref = endpoint.copy()
diff --git a/keystone/common/controller.py b/keystone/common/controller.py
index 58164338..2a921bb2 100644
--- a/keystone/common/controller.py
+++ b/keystone/common/controller.py
@@ -59,7 +59,12 @@ def protected(f):
@dependency.requires('identity_api', 'policy_api', 'token_api')
class V2Controller(wsgi.Application):
"""Base controller class for Identity API v2."""
- pass
+
+ def _require_attribute(self, ref, attr):
+ """Ensures the reference contains the specified attribute."""
+ if ref.get(attr) is None or ref.get(attr) == '':
+ msg = '%s field is required and cannot be empty' % attr
+ raise exception.ValidationError(message=msg)
class V3Controller(V2Controller):
@@ -71,12 +76,6 @@ class V3Controller(V2Controller):
per_page = context['query_string'].get('per_page', 30)
return refs[per_page * (page - 1):per_page * page]
- def _require_attribute(self, ref, attr):
- """Ensures the reference contains the specified attribute."""
- if ref.get(attr) is None or ref.get(attr) == '':
- msg = '%s field is required and cannot be empty' % attr
- raise exception.ValidationError(message=msg)
-
def _require_matching_id(self, value, ref):
"""Ensures the value matches the reference's ID, if any."""
if 'id' in ref and ref['id'] != value:
diff --git a/tests/test_catalog.py b/tests/test_catalog.py
new file mode 100644
index 00000000..690dde35
--- /dev/null
+++ b/tests/test_catalog.py
@@ -0,0 +1,80 @@
+import uuid
+
+from keystone.common.sql import util as sql_util
+from keystone import test
+
+import test_content_types
+
+
+BASE_URL = 'http://127.0.0.1:35357/v2'
+
+
+class V2CatalogTestCase(test_content_types.RestfulTestCase):
+ def setUp(self):
+ super(V2CatalogTestCase, self).setUp()
+ self.service_id = uuid.uuid4().hex
+ self.service = self.new_service_ref()
+ self.service['id'] = self.service_id
+ self.catalog_api.create_service(
+ self.service_id,
+ self.service.copy())
+
+ def new_ref(self):
+ """Populates a ref with attributes common to all API entities."""
+ return {
+ 'id': uuid.uuid4().hex,
+ 'name': uuid.uuid4().hex,
+ 'description': uuid.uuid4().hex,
+ 'enabled': True}
+
+ def new_service_ref(self):
+ ref = self.new_ref()
+ ref['type'] = uuid.uuid4().hex
+ return ref
+
+ def _get_token_id(self, r):
+ """Applicable only to JSON."""
+ return r.body['access']['token']['id']
+
+ def assertValidErrorResponse(self, response):
+ self.assertEqual(response.status, 400)
+
+ def _endpoint_create(self, expected_status=200, missing_param=None):
+ path = '/v2.0/endpoints'
+ body = {
+ "endpoint": {
+ "adminurl": "http://localhost:8080",
+ "service_id": self.service_id,
+ "region": "regionOne",
+ "internalurl": "http://localhost:8080",
+ "publicurl": "http://localhost:8080"
+ }
+ }
+ if missing_param:
+ body['endpoint'][missing_param] = None
+ r = self.admin_request(method='POST', token=self.get_scoped_token(),
+ path=path, expected_status=expected_status,
+ body=body)
+ return body, r
+
+ def test_endpoint_create(self):
+ req_body, response = self._endpoint_create(expected_status=200)
+ self.assertTrue('endpoint' in response.body)
+ self.assertTrue('id' in response.body['endpoint'])
+ for field, value in req_body['endpoint'].iteritems():
+ self.assertEqual(response.body['endpoint'][field], value)
+
+ def test_endpoint_create_with_missing_adminurl(self):
+ req_body, response = self._endpoint_create(expected_status=200,
+ missing_param='adminurl')
+ self.assertEqual(response.status, 200)
+
+ def test_endpoint_create_with_missing_internalurl(self):
+ req_body, response = self._endpoint_create(expected_status=200,
+ missing_param='internalurl')
+ self.assertEqual(response.status, 200)
+
+ def test_endpoint_create_with_missing_publicurl(self):
+ req_body, response = self._endpoint_create(expected_status=400,
+ missing_param='publicurl')
+ self.assertValidErrorResponse(response)