summaryrefslogtreecommitdiffstats
path: root/tests/test_backend_ldap.py
diff options
context:
space:
mode:
authorHenry Nash <henryn@linux.vnet.ibm.com>2013-01-16 16:10:24 +0000
committerHenry Nash <henryn@linux.vnet.ibm.com>2013-02-12 16:09:15 +0000
commit8a89464d62e9c81a1ba15c0a3aa695456fc6fd33 (patch)
tree46c61fe10c2859fdeddd80379d15bc839d37cd3d /tests/test_backend_ldap.py
parentf1defe8f624e006a7562bc07cd471bdd176e303e (diff)
downloadkeystone-8a89464d62e9c81a1ba15c0a3aa695456fc6fd33.tar.gz
keystone-8a89464d62e9c81a1ba15c0a3aa695456fc6fd33.tar.xz
keystone-8a89464d62e9c81a1ba15c0a3aa695456fc6fd33.zip
Keystone backend preparation for domain-scoping
These changes lay the ground work for the implmentation of domain-scoping, but are benign in that they don't change the token. They include making domain_id a first-class attribute in the user and project entity (i.e. move it out of the 'extra' attribute), filling in domain grant and project support for the kvs backend and fixing a series of issues in the mirgation to make it work for both MySQL, Postgresql and sqlite. A further, separate, commit will actually provide the code to update the actual tokens once the v3 token support has been added. blueprint domain-scoping blueprint default-domain Change-Id: I55ab7947a6a1efbab003bd234856bd3805bb4a63
Diffstat (limited to 'tests/test_backend_ldap.py')
-rw-r--r--tests/test_backend_ldap.py42
1 files changed, 26 insertions, 16 deletions
diff --git a/tests/test_backend_ldap.py b/tests/test_backend_ldap.py
index 3b6d1e13..cc92b02f 100644
--- a/tests/test_backend_ldap.py
+++ b/tests/test_backend_ldap.py
@@ -15,6 +15,7 @@
# under the License.
import uuid
+import nose.exc
from keystone.common.ldap import fakeldap
from keystone import config
@@ -413,48 +414,57 @@ class LDAPIdentity(test.TestCase, test_backend.IdentityTests):
user_api.get_connection(user=None, password=None)
# TODO (henry-nash) These need to be removed when the full LDAP implementation
-# is submitted - see BugL #1092187
+# is submitted - see Bugs 1092187, 1101287, 1101276, 1101289
def test_group_crud(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_add_user_to_group(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_add_user_to_group_404(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_check_user_in_group(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_check_user_not_in_group(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_list_users_in_group(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_remove_user_from_group(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_remove_user_from_group_404(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1092187')
def test_get_role_grant_by_user_and_project(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_get_role_grants_for_user_and_project_404(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_add_role_grant_to_user_and_project_404(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_remove_role_grant_from_user_and_project(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_get_and_remove_role_grant_by_group_and_project(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_get_and_remove_role_grant_by_group_and_domain(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
def test_get_and_remove_role_grant_by_user_and_domain(self):
- pass
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
+
+ def test_get_and_remove_correct_role_grant_from_a_mix(self):
+ raise nose.exc.SkipTest('Blocked by bug 1101287')
+
+ def test_domain_crud(self):
+ raise nose.exc.SkipTest('Blocked by bug 1101276')
+
+ def test_project_crud(self):
+ raise nose.exc.SkipTest('Blocked by bug 1101289')