summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
Diffstat (limited to 'test')
-rw-r--r--test/unit/test_BaseURLs.py136
-rw-r--r--test/unit/test_common.py1
-rw-r--r--test/unit/test_roles.py388
3 files changed, 515 insertions, 10 deletions
diff --git a/test/unit/test_BaseURLs.py b/test/unit/test_BaseURLs.py
new file mode 100644
index 00000000..8d3f7ea7
--- /dev/null
+++ b/test/unit/test_BaseURLs.py
@@ -0,0 +1,136 @@
+# vim: tabstop=4 shiftwidth=4 softtabstop=4
+# Copyright (c) 2010-2011 OpenStack, LLC.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+# implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+
+import httplib2
+import json
+from lxml import etree
+import os
+import sys
+sys.path.append(os.path.abspath(os.path.join(os.path.abspath(__file__),
+ '..', '..', '..', '..', 'keystone')))
+import unittest
+
+import test_common as utils
+from test_common import URL
+
+class BaseURLsTest(unittest.TestCase):
+ def setUp(self):
+ self.tenant = utils.get_tenant()
+ self.password = utils.get_password()
+ self.email = utils.get_email()
+ self.user = utils.get_user()
+ self.userdisabled = utils.get_userdisabled()
+ self.auth_token = utils.get_auth_token()
+ self.exp_auth_token = utils.get_exp_auth_token()
+ self.disabled_token = utils.get_disabled_token()
+ self.missing_token = utils.get_none_token()
+ self.invalid_token = utils.get_non_existing_token()
+ utils.create_tenant(self.tenant, str(self.auth_token))
+ utils.create_user(self.tenant, self.user, self.auth_token)
+ self.token = utils.get_token(self.user, 'secrete', self.tenant,
+ 'token')
+
+ def tearDown(self):
+ utils.delete_user(self.tenant, self.user, self.auth_token)
+ utils.delete_tenant(self.tenant, self.auth_token)
+
+class GetBaseURLsTest(BaseURLsTest):
+ def test_get_baseURLs(self):
+ header = httplib2.Http(".cache")
+ url = '%sbaseURLs' % (utils.URL)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.auth_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(200, int(resp['status']))
+
+ #verify content
+ obj = json.loads(content)
+ if not "baseURLs" in obj:
+ raise self.fail("Expecting BaseURLs")
+
+ def test_get_baseURLs_xml(self):
+ header = httplib2.Http(".cache")
+ url = '%sbaseURLs' % (utils.URL)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": self.auth_token,
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(200, int(resp['status']))
+
+ #verify content
+ dom = etree.Element("root")
+ dom.append(etree.fromstring(content))
+ baseURLs = dom.find("{http://docs.openstack.org/identity/api/v2.0}" \
+ "baseURLs")
+ if baseURLs == None:
+ self.fail("Expecting BaseURLs")
+
+class GetBaseURLTest(BaseURLsTest):
+ def test_get_baseURL(self):
+ header = httplib2.Http(".cache")
+ url = '%sbaseURLs/%s' % (utils.URL, '1')
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.auth_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(200, int(resp['status']))
+
+ #verify content
+ obj = json.loads(content)
+ if not "baseURL" in obj:
+ raise self.fail("Expecting BaseURL")
+
+ def test_get_baseURL_xml(self):
+ header = httplib2.Http(".cache")
+ url = '%sbaseURLs/%s' % (utils.URL,'1')
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": self.auth_token,
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(200, int(resp['status']))
+
+ #verify content
+ dom = etree.Element("root")
+ dom.append(etree.fromstring(content))
+ baseURL = dom.find("{http://docs.openstack.org/identity/api/v2.0}" \
+ "baseURL")
+ if baseURL == None:
+ self.fail("Expecting BaseURL")
+
+
+
+if __name__ == '__main__':
+ unittest.main() \ No newline at end of file
diff --git a/test/unit/test_common.py b/test/unit/test_common.py
index 126a3f62..beba7dfa 100644
--- a/test/unit/test_common.py
+++ b/test/unit/test_common.py
@@ -725,7 +725,6 @@ def create_role_ref(user_id, role_id, tenant_id, auth_token):
resp, content = header.request(url, "POST", body=json.dumps(body),
headers={"Content-Type": "application/json",
"X-Auth-Token": auth_token})
- print url, resp, content
return (resp, content)
def create_role_ref_xml(user_id, role_id, tenant_id, auth_token):
diff --git a/test/unit/test_roles.py b/test/unit/test_roles.py
index fa736f6a..10b16d27 100644
--- a/test/unit/test_roles.py
+++ b/test/unit/test_roles.py
@@ -164,8 +164,6 @@ class GetRoleTest(RolesTest):
if role_id != 'Admin':
self.fail("Not the expected Role")
-
-
def test_get_role_xml(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
@@ -204,21 +202,136 @@ class GetRoleTest(RolesTest):
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
+
+ def test_get_role_xml_bad(self):
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, 'tenant_bad')
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.auth_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(404, int(resp['status']))
+
+ def test_get_role_expired_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.exp_auth_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
- def test_get_role_bad_xml(self):
+ def test_get_role_xml_using_expired_token(self):
+ self.role = 'Admin'
header = httplib2.Http(".cache")
- resp, content = utils.create_tenant(self.tenant, str(self.auth_token))
- url = '%sroles/%s' % (utils.URL, 'role_bad')
+ url = '%sroles/%s' % (utils.URL, self.role)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
- "X-Auth-Token": self.auth_token,
+ "X-Auth-Token": self.exp_auth_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_role_using_disabled_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.disabled_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_role_xml_using_disabled_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": self.disabled_token,
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_role_using_missing_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.missing_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(401, int(resp['status']))
+
+ def test_get_role_xml_using_missing_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": self.missing_token,
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(401, int(resp['status']))
+
+ def test_get_role_using_invalid_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": self.invalid_token})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
+
+ def test_get_role_xml_using_invalid_token(self):
+ self.role = 'Admin'
+ header = httplib2.Http(".cache")
+ url = '%sroles/%s' % (utils.URL, self.role)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": self.invalid_token,
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(404, int(resp['status']))
+
class CreateRoleRefTest(RolesTest):
def test_role_ref_create_json(self):
@@ -233,7 +346,36 @@ class CreateRoleRefTest(RolesTest):
resp, content = utils.create_role_ref_xml(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
- self.assertEqual(201, resp_val)
+ self.assertEqual(201, resp_val)
+
+ def test_role_ref_create_json_using_expired_token(self):
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.exp_auth_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(403, resp_val)
+
+ def test_role_ref_create_json_using_disabled_token(self):
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.disabled_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(403, resp_val)
+
+ def test_role_ref_create_json_using_missing_token(self):
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.missing_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(401, resp_val)
+
+ def test_role_ref_create_json_using_invalid_token(self):
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.invalid_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(404, resp_val)
+
class GetRoleRefsTest(RolesTest):
def test_get_rolerefs(self):
@@ -280,7 +422,140 @@ class GetRoleRefsTest(RolesTest):
"roleRefs")
if roles == None:
self.fail("Expecting Role Refs")
-
+
+ def test_get_rolerefs_using_expired_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.exp_auth_token)})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_rolerefs_xml_using_expired_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/xml
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": str(self.exp_auth_token),
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_rolerefs_using_disabled_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.disabled_token)})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_rolerefs_xml_using_disabled_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/xml
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": str(self.disabled_token),
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(403, int(resp['status']))
+
+ def test_get_rolerefs_using_missing_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.missing_token)})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(401, int(resp['status']))
+
+ def test_get_rolerefs_xml_using_missing_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/xml
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": str(self.missing_token),
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(401, int(resp['status']))
+
+ def test_get_rolerefs_using_invalid_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/json
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.invalid_token)})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(404, int(resp['status']))
+
+ def test_get_rolerefs_xml_using_missing_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ url = '%susers/%s/roleRefs' % (URL, self.user)
+ #test for Content-Type = application/xml
+ resp, content = header.request(url, "GET", body='{}',
+ headers={"Content-Type": "application/xml",
+ "X-Auth-Token": str(self.invalid_token),
+ "ACCEPT": "application/xml"})
+ if int(resp['status']) == 500:
+ self.fail('Identity Fault')
+ elif int(resp['status']) == 503:
+ self.fail('Service Not Available')
+ self.assertEqual(404, int(resp['status']))
+
+
class DeleteRoleRefTest(RolesTest):
def test_delete_roleref(self):
header = httplib2.Http(".cache")
@@ -305,7 +580,102 @@ class DeleteRoleRefTest(RolesTest):
"X-Auth-Token": str(self.auth_token)})
resp_val = int(resp['status'])
self.assertEqual(204, resp_val)
- return (resp, content)
+
+ def test_delete_roleref_using_expired_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(201, resp_val)
+ obj = json.loads(content)
+ if not "roleRef" in obj:
+ raise fault.BadRequestFault("Expecting RoleRef")
+ roleRef = obj["roleRef"]
+ if not "id" in roleRef:
+ role_ref_id = None
+ else:
+ role_ref_id = roleRef["id"]
+ if role_ref_id is None:
+ raise fault.BadRequestFault("Expecting RoleRefId")
+ url = '%susers/%s/roleRefs/%s' % (URL, self.user, role_ref_id)
+ resp, content = header.request(url, "DELETE", body='',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.exp_auth_token)})
+ resp_val = int(resp['status'])
+ self.assertEqual(403, resp_val)
+
+ def test_delete_roleref_using_disabled_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(201, resp_val)
+ obj = json.loads(content)
+ if not "roleRef" in obj:
+ raise fault.BadRequestFault("Expecting RoleRef")
+ roleRef = obj["roleRef"]
+ if not "id" in roleRef:
+ role_ref_id = None
+ else:
+ role_ref_id = roleRef["id"]
+ if role_ref_id is None:
+ raise fault.BadRequestFault("Expecting RoleRefId")
+ url = '%susers/%s/roleRefs/%s' % (URL, self.user, role_ref_id)
+ resp, content = header.request(url, "DELETE", body='',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.disabled_token)})
+ resp_val = int(resp['status'])
+ self.assertEqual(403, resp_val)
+
+ def test_delete_roleref_using_missing_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(201, resp_val)
+ obj = json.loads(content)
+ if not "roleRef" in obj:
+ raise fault.BadRequestFault("Expecting RoleRef")
+ roleRef = obj["roleRef"]
+ if not "id" in roleRef:
+ role_ref_id = None
+ else:
+ role_ref_id = roleRef["id"]
+ if role_ref_id is None:
+ raise fault.BadRequestFault("Expecting RoleRefId")
+ url = '%susers/%s/roleRefs/%s' % (URL, self.user, role_ref_id)
+ resp, content = header.request(url, "DELETE", body='',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.missing_token)})
+ resp_val = int(resp['status'])
+ self.assertEqual(401, resp_val)
+
+ def test_delete_roleref_using_invalid_token(self):
+ header = httplib2.Http(".cache")
+ utils.add_user_json(self.tenant, self.user, self.auth_token)
+ resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
+ str(self.auth_token))
+ resp_val = int(resp['status'])
+ self.assertEqual(201, resp_val)
+ obj = json.loads(content)
+ if not "roleRef" in obj:
+ raise fault.BadRequestFault("Expecting RoleRef")
+ roleRef = obj["roleRef"]
+ if not "id" in roleRef:
+ role_ref_id = None
+ else:
+ role_ref_id = roleRef["id"]
+ if role_ref_id is None:
+ raise fault.BadRequestFault("Expecting RoleRefId")
+ url = '%susers/%s/roleRefs/%s' % (URL, self.user, role_ref_id)
+ resp, content = header.request(url, "DELETE", body='',
+ headers={"Content-Type": "application/json",
+ "X-Auth-Token": str(self.invalid_token)})
+ resp_val = int(resp['status'])
+ self.assertEqual(404, resp_val)
if __name__ == '__main__':