summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorJenkins <jenkins@review.openstack.org>2012-03-20 23:17:30 +0000
committerGerrit Code Review <review@openstack.org>2012-03-20 23:17:30 +0000
commitf98cd4f27d68c47a003b529bbcfeffa9140e090d (patch)
tree33bf0b77a411435df16394581b49232bf0465967 /tests
parent53b3d4498848ae2fff58751f9a791a9ebc00b742 (diff)
parent3a296a458c4e2f9465ddc0330d03c3e7ec0e3c50 (diff)
downloadkeystone-f98cd4f27d68c47a003b529bbcfeffa9140e090d.tar.gz
keystone-f98cd4f27d68c47a003b529bbcfeffa9140e090d.tar.xz
keystone-f98cd4f27d68c47a003b529bbcfeffa9140e090d.zip
Merge "Spring cleaning, fix PEP8 violations."
Diffstat (limited to 'tests')
-rw-r--r--tests/default_fixtures.py6
-rw-r--r--tests/test_auth_token_middleware.py6
-rw-r--r--tests/test_backend.py61
-rw-r--r--tests/test_backend_kvs.py58
-rw-r--r--tests/test_backend_sql.py30
-rw-r--r--tests/test_content_types.py6
-rw-r--r--tests/test_import_legacy.py2
-rw-r--r--tests/test_keystoneclient.py6
-rw-r--r--tests/test_middleware.py3
9 files changed, 89 insertions, 89 deletions
diff --git a/tests/default_fixtures.py b/tests/default_fixtures.py
index 177d6824..84c38f5d 100644
--- a/tests/default_fixtures.py
+++ b/tests/default_fixtures.py
@@ -22,12 +22,12 @@ TENANTS = [
# NOTE(ja): a role of keystone_admin and attribute "is_admin" is done in setUp
USERS = [
- {'id': 'foo', 'name': 'FOO', 'password': 'foo2', 'tenants': ['bar',]},
- {'id': 'two', 'name': 'TWO', 'password': 'two2', 'tenants': ['baz',]},
+ {'id': 'foo', 'name': 'FOO', 'password': 'foo2', 'tenants': ['bar']},
+ {'id': 'two', 'name': 'TWO', 'password': 'two2', 'tenants': ['baz']},
{'id': 'no_meta',
'name': 'NO_META',
'password': 'no_meta2',
- 'tenants': ['baz',]},
+ 'tenants': ['baz']},
]
METADATA = [
diff --git a/tests/test_auth_token_middleware.py b/tests/test_auth_token_middleware.py
index b966d833..3ba1c57b 100644
--- a/tests/test_auth_token_middleware.py
+++ b/tests/test_auth_token_middleware.py
@@ -169,10 +169,9 @@ class FakeHTTPConnection(object):
def close(self):
pass
-class FakeApp(object):
- """This represents a WSGI app protected by the auth_token middleware.
- """
+class FakeApp(object):
+ """This represents a WSGI app protected by the auth_token middleware."""
def __init__(self, expected_env=None):
expected_env = expected_env or {}
self.expected_env = {
@@ -238,6 +237,7 @@ class DiabloAuthTokenMiddlewareTest(BaseAuthTokenMiddlewareTest):
self.assertEqual(self.response_status, 200)
self.assertEqual(body, ['SUCCESS'])
+
class AuthTokenMiddlewareTest(BaseAuthTokenMiddlewareTest):
def test_valid_request(self):
req = webob.Request.blank('/')
diff --git a/tests/test_backend.py b/tests/test_backend.py
index 658f864d..7ccb12f0 100644
--- a/tests/test_backend.py
+++ b/tests/test_backend.py
@@ -46,9 +46,9 @@ class IdentityTests(object):
user_ref, tenant_ref, metadata_ref = self.identity_api.authenticate(
user_id=self.user_foo['id'],
password=self.user_foo['password'])
- # NOTE(termie): the password field is left in user_foo to make it easier
- # to authenticate in tests, but should not be returned by
- # the api
+ # NOTE(termie): the password field is left in user_foo to make
+ # it easier to authenticate in tests, but should
+ # not be returned by the api
self.user_foo.pop('password')
self.assertDictEquals(user_ref, self.user_foo)
self.assert_(tenant_ref is None)
@@ -59,9 +59,9 @@ class IdentityTests(object):
user_id=self.user_foo['id'],
tenant_id=self.tenant_bar['id'],
password=self.user_foo['password'])
- # NOTE(termie): the password field is left in user_foo to make it easier
- # to authenticate in tests, but should not be returned by
- # the api
+ # NOTE(termie): the password field is left in user_foo to make
+ # it easier to authenticate in tests, but should
+ # not be returned by the api
self.user_foo.pop('password')
self.assertDictEquals(user_ref, self.user_foo)
self.assertDictEquals(tenant_ref, self.tenant_bar)
@@ -74,9 +74,9 @@ class IdentityTests(object):
user_id=user['id'],
tenant_id=tenant['id'],
password=user['password'])
- # NOTE(termie): the password field is left in user_foo to make it easier
- # to authenticate in tests, but should not be returned by
- # the api
+ # NOTE(termie): the password field is left in user_foo to make
+ # it easier to authenticate in tests, but should
+ # not be returned by the api
user.pop('password')
self.assertEquals(metadata_ref, {})
self.assertDictEquals(user_ref, user)
@@ -113,18 +113,18 @@ class IdentityTests(object):
def test_get_user(self):
user_ref = self.identity_api.get_user(user_id=self.user_foo['id'])
- # NOTE(termie): the password field is left in user_foo to make it easier
- # to authenticate in tests, but should not be returned by
- # the api
+ # NOTE(termie): the password field is left in user_foo to make
+ # it easier to authenticate in tests, but should
+ # not be returned by the api
self.user_foo.pop('password')
self.assertDictEquals(user_ref, self.user_foo)
def test_get_user_by_name(self):
user_ref = self.identity_api.get_user_by_name(
user_name=self.user_foo['name'])
- # NOTE(termie): the password field is left in user_foo to make it easier
- # to authenticate in tests, but should not be returned by
- # the api
+ # NOTE(termie): the password field is left in user_foo to make
+ # it easier to authenticate in tests, but should
+ # not be returned by the api
self.user_foo.pop('password')
self.assertDictEquals(user_ref, self.user_foo)
@@ -155,7 +155,7 @@ class IdentityTests(object):
user = {'id': 'fake1',
'name': 'fake1',
'password': 'fakepass',
- 'tenants': ['bar',]}
+ 'tenants': ['bar']}
self.identity_api.create_user('fake1', user)
user['name'] = 'fake2'
self.assertRaises(Exception,
@@ -167,7 +167,7 @@ class IdentityTests(object):
user = {'id': 'fake1',
'name': 'fake1',
'password': 'fakepass',
- 'tenants': ['bar',]}
+ 'tenants': ['bar']}
self.identity_api.create_user('fake1', user)
user['id'] = 'fake2'
self.assertRaises(Exception,
@@ -179,11 +179,11 @@ class IdentityTests(object):
user1 = {'id': 'fake1',
'name': 'fake1',
'password': 'fakepass',
- 'tenants': ['bar',]}
+ 'tenants': ['bar']}
user2 = {'id': 'fake2',
'name': 'fake2',
'password': 'fakepass',
- 'tenants': ['bar',]}
+ 'tenants': ['bar']}
self.identity_api.create_user('fake1', user1)
self.identity_api.create_user('fake2', user2)
user2['name'] = 'fake1'
@@ -196,7 +196,7 @@ class IdentityTests(object):
user = {'id': 'fake1',
'name': 'fake1',
'password': 'fakepass',
- 'tenants': ['bar',]}
+ 'tenants': ['bar']}
self.identity_api.create_user('fake1', user)
user['id'] = 'fake2'
self.identity_api.update_user('fake1', user)
@@ -244,29 +244,28 @@ class IdentityTests(object):
tenant_ref = self.identity_api.get_tenant('fake2')
self.assert_(tenant_ref is None)
-
def test_get_role_by_user_and_tenant(self):
roles_ref = self.identity_api.get_roles_for_user_and_tenant(
- self.user_foo['id'],self.tenant_bar['id'])
+ self.user_foo['id'], self.tenant_bar['id'])
self.assertNotIn('keystone_admin', roles_ref)
self.identity_api.add_role_to_user_and_tenant(
- self.user_foo['id'],self.tenant_bar['id'], 'keystone_admin')
+ self.user_foo['id'], self.tenant_bar['id'], 'keystone_admin')
roles_ref = self.identity_api.get_roles_for_user_and_tenant(
- self.user_foo['id'],self.tenant_bar['id'])
+ self.user_foo['id'], self.tenant_bar['id'])
self.assertIn('keystone_admin', roles_ref)
- self.assertNotIn('useless',roles_ref)
+ self.assertNotIn('useless', roles_ref)
self.identity_api.add_role_to_user_and_tenant(
- self.user_foo['id'],self.tenant_bar['id'], 'useless')
+ self.user_foo['id'], self.tenant_bar['id'], 'useless')
roles_ref = self.identity_api.get_roles_for_user_and_tenant(
- self.user_foo['id'],self.tenant_bar['id'])
+ self.user_foo['id'], self.tenant_bar['id'])
self.assertIn('keystone_admin', roles_ref)
- self.assertIn('useless',roles_ref)
+ self.assertIn('useless', roles_ref)
def test_delete_role(self):
role_id = 'test_role_delete'
new_role = {'id': role_id, 'name': 'Role to Delete'}
- self.identity_api.create_role(role_id , new_role)
+ self.identity_api.create_role(role_id, new_role)
role_ref = self.identity_api.get_role(role_id)
self.assertDictEquals(role_ref, new_role)
self.identity_api.delete_role(role_id)
@@ -277,7 +276,7 @@ class IdentityTests(object):
def test_add_user_to_tenant(self):
tenant_id = 'tenent4add'
self.identity_api.add_user_to_tenant(tenant_id, 'foo')
- tenants = self.identity_api.get_tenants_for_user('foo')
+ tenants = self.identity_api.get_tenants_for_user('foo')
self.assertIn(tenant_id, tenants)
@@ -303,7 +302,7 @@ class TokenTests(object):
def test_expired_token(self):
token_id = uuid.uuid4().hex
- expire_time = datetime.datetime.now() - datetime.timedelta(minutes=1)
+ expire_time = datetime.datetime.now() - datetime.timedelta(minutes=1)
data = {'id': token_id, 'a': 'b', 'expires': expire_time}
data_ref = self.token_api.create_token(token_id, data)
self.assertDictEquals(data_ref, data)
diff --git a/tests/test_backend_kvs.py b/tests/test_backend_kvs.py
index 6dc626e5..1357f39a 100644
--- a/tests/test_backend_kvs.py
+++ b/tests/test_backend_kvs.py
@@ -23,38 +23,38 @@ import default_fixtures
class KvsIdentity(test.TestCase, test_backend.IdentityTests):
- def setUp(self):
- super(KvsIdentity, self).setUp()
- self.identity_api = identity_kvs.Identity(db={})
- self.load_fixtures(default_fixtures)
+ def setUp(self):
+ super(KvsIdentity, self).setUp()
+ self.identity_api = identity_kvs.Identity(db={})
+ self.load_fixtures(default_fixtures)
class KvsToken(test.TestCase, test_backend.TokenTests):
- def setUp(self):
- super(KvsToken, self).setUp()
- self.token_api = token_kvs.Token(db={})
+ def setUp(self):
+ super(KvsToken, self).setUp()
+ self.token_api = token_kvs.Token(db={})
class KvsCatalog(test.TestCase, test_backend.CatalogTests):
- def setUp(self):
- super(KvsCatalog, self).setUp()
- self.catalog_api = catalog_kvs.Catalog(db={})
- self.load_fixtures(default_fixtures)
- self._load_fake_catalog()
-
- def _load_fake_catalog(self):
- self.catalog_foobar = self.catalog_api._create_catalog(
- 'foo', 'bar',
- {'RegionFoo': {'service_bar': {'foo': 'bar'}}})
-
- def test_get_catalog_bad_user(self):
- catalog_ref = self.catalog_api.get_catalog('foo' + 'WRONG', 'bar')
- self.assert_(catalog_ref is None)
-
- def test_get_catalog_bad_tenant(self):
- catalog_ref = self.catalog_api.get_catalog('foo', 'bar' + 'WRONG')
- self.assert_(catalog_ref is None)
-
- def test_get_catalog(self):
- catalog_ref = self.catalog_api.get_catalog('foo', 'bar')
- self.assertDictEquals(catalog_ref, self.catalog_foobar)
+ def setUp(self):
+ super(KvsCatalog, self).setUp()
+ self.catalog_api = catalog_kvs.Catalog(db={})
+ self.load_fixtures(default_fixtures)
+ self._load_fake_catalog()
+
+ def _load_fake_catalog(self):
+ self.catalog_foobar = self.catalog_api._create_catalog(
+ 'foo', 'bar',
+ {'RegionFoo': {'service_bar': {'foo': 'bar'}}})
+
+ def test_get_catalog_bad_user(self):
+ catalog_ref = self.catalog_api.get_catalog('foo' + 'WRONG', 'bar')
+ self.assert_(catalog_ref is None)
+
+ def test_get_catalog_bad_tenant(self):
+ catalog_ref = self.catalog_api.get_catalog('foo', 'bar' + 'WRONG')
+ self.assert_(catalog_ref is None)
+
+ def test_get_catalog(self):
+ catalog_ref = self.catalog_api.get_catalog('foo', 'bar')
+ self.assertDictEquals(catalog_ref, self.catalog_foobar)
diff --git a/tests/test_backend_sql.py b/tests/test_backend_sql.py
index e8ecb06f..a8951512 100644
--- a/tests/test_backend_sql.py
+++ b/tests/test_backend_sql.py
@@ -28,24 +28,24 @@ CONF = config.CONF
class SqlIdentity(test.TestCase, test_backend.IdentityTests):
- def setUp(self):
- super(SqlIdentity, self).setUp()
- CONF(config_files=[test.etcdir('keystone.conf'),
- test.testsdir('test_overrides.conf'),
- test.testsdir('backend_sql.conf')])
- sql_util.setup_test_database()
- self.identity_api = identity_sql.Identity()
- self.load_fixtures(default_fixtures)
+ def setUp(self):
+ super(SqlIdentity, self).setUp()
+ CONF(config_files=[test.etcdir('keystone.conf'),
+ test.testsdir('test_overrides.conf'),
+ test.testsdir('backend_sql.conf')])
+ sql_util.setup_test_database()
+ self.identity_api = identity_sql.Identity()
+ self.load_fixtures(default_fixtures)
class SqlToken(test.TestCase, test_backend.TokenTests):
- def setUp(self):
- super(SqlToken, self).setUp()
- CONF(config_files=[test.etcdir('keystone.conf'),
- test.testsdir('test_overrides.conf'),
- test.testsdir('backend_sql.conf')])
- sql_util.setup_test_database()
- self.token_api = token_sql.Token()
+ def setUp(self):
+ super(SqlToken, self).setUp()
+ CONF(config_files=[test.etcdir('keystone.conf'),
+ test.testsdir('test_overrides.conf'),
+ test.testsdir('backend_sql.conf')])
+ sql_util.setup_test_database()
+ self.token_api = token_sql.Token()
#class SqlCatalog(test_backend_kvs.KvsCatalog):
diff --git a/tests/test_content_types.py b/tests/test_content_types.py
index 64599ef6..639a03dc 100644
--- a/tests/test_content_types.py
+++ b/tests/test_content_types.py
@@ -368,9 +368,9 @@ class CoreApiTests(object):
def test_validate_token_belongs_to(self):
token = self.get_scoped_token()
- path = ('/v2.0/tokens/%s?belongsTo=%s'
- % (token, self.tenant_bar['id']))
- r = self.admin_request(path=path,token=token)
+ path = ('/v2.0/tokens/%s?belongsTo=%s' % (token,
+ self.tenant_bar['id']))
+ r = self.admin_request(path=path, token=token)
self.assertValidAuthenticationResponse(r,
require_service_catalog=True)
diff --git a/tests/test_import_legacy.py b/tests/test_import_legacy.py
index 1d11e6ab..aa3c517e 100644
--- a/tests/test_import_legacy.py
+++ b/tests/test_import_legacy.py
@@ -24,11 +24,9 @@ from keystone import test
from keystone.common.sql import legacy
from keystone.common.sql import util as sql_util
from keystone.identity.backends import sql as identity_sql
-from keystone.token.backends import sql as token_sql
from keystone.catalog.backends import templated as catalog_templated
-
CONF = config.CONF
diff --git a/tests/test_keystoneclient.py b/tests/test_keystoneclient.py
index 7241ca6b..d070fd64 100644
--- a/tests/test_keystoneclient.py
+++ b/tests/test_keystoneclient.py
@@ -510,7 +510,8 @@ class KcMasterTestCase(CompatTestCase, KeystoneClientTests):
tenant_id = uuid.uuid4().hex
tenant = {'name': 'tenant-%s' % tenant_id, 'id': tenant_id}
self.identity_api.create_tenant(tenant_id, tenant)
- self.identity_api.add_user_to_tenant(tenant_id, self.user_foo['id'])
+ self.identity_api.add_user_to_tenant(tenant_id,
+ self.user_foo['id'])
tenants = client.tenants.list()
self.assertEqual(len(tenants), 3)
@@ -535,7 +536,8 @@ class KcMasterTestCase(CompatTestCase, KeystoneClientTests):
tenant_id = uuid.uuid4().hex
tenant = {'name': 'tenant-%s' % tenant_id, 'id': tenant_id}
self.identity_api.create_tenant(tenant_id, tenant)
- self.identity_api.add_user_to_tenant(tenant_id, self.user_foo['id'])
+ self.identity_api.add_user_to_tenant(tenant_id,
+ self.user_foo['id'])
tenants = client.tenants.list()
self.assertEqual(len(tenants), 3)
diff --git a/tests/test_middleware.py b/tests/test_middleware.py
index d46348a4..a5740acd 100644
--- a/tests/test_middleware.py
+++ b/tests/test_middleware.py
@@ -95,7 +95,8 @@ class JsonBodyMiddlewareTest(test.TestCase):
_middleware.process_request, req)
def test_no_content_type(self):
- req = make_request(body='{"arg1": "one", "arg2": ["a"]}', method='POST')
+ req = make_request(body='{"arg1": "one", "arg2": ["a"]}',
+ method='POST')
middleware.JsonBodyMiddleware(None).process_request(req)
params = req.environ[middleware.PARAMS_ENV]
self.assertEqual(params, {"arg1": "one", "arg2": ["a"]})