summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKevin L. Mitchell <kevin.mitchell@rackspace.com>2011-06-01 14:12:19 -0500
committerKevin L. Mitchell <kevin.mitchell@rackspace.com>2011-06-01 14:12:19 -0500
commitd79104e4d2cea3f39fc17cedbf98824daa7018ca (patch)
tree1f060f3c12d2cbe6abd248d19a7086ba1ded7231
parent268d5245c566bfec4ac375ee3eee47abd10b4b61 (diff)
downloadkeystone-d79104e4d2cea3f39fc17cedbf98824daa7018ca.tar.gz
keystone-d79104e4d2cea3f39fc17cedbf98824daa7018ca.tar.xz
keystone-d79104e4d2cea3f39fc17cedbf98824daa7018ca.zip
Don't need to fiddle around with user tokens here, just admin tokens
-rw-r--r--test/functional/test_tokens.py13
1 files changed, 1 insertions, 12 deletions
diff --git a/test/functional/test_tokens.py b/test/functional/test_tokens.py
index 36316c0a..a84eed02 100644
--- a/test/functional/test_tokens.py
+++ b/test/functional/test_tokens.py
@@ -40,19 +40,8 @@ class AuthenticateTest(base.BaseKeystoneTest):
# Squirrel away the admin token ID
admin_tok = resp.obj['auth']['token']['id']
- # Now, issue a secondary authentication request
- resp = self.ks.authenticate(base.options.username,
- base.options.password)
-
- # Verify that resp is correct
- util.assert_equal(resp.status, 200)
- util.assert_in('auth', resp.obj)
- util.assert_in('token', resp.obj['auth'])
- util.assert_in('id', resp.obj['auth']['token'])
-
# Now ensure we can revoke an authentication token
- auth_tok = resp.obj['auth']['token']['id']
- resp = self.ks_admin.revoke_token(admin_tok, auth_tok)
+ resp = self.ks_admin.revoke_token(admin_tok, admin_tok)
util.assert_equal(resp.status, 204)