@

Home 

OpenStack Study:

OpenStack Index

Previous

Next

    def test_user_revokes_own_token(self):

    def test_adminA_revokes_userA_token(self):

    def test_adminB_fails_revoking_userA_token(self):

class TestTokenRevokeById(test_v3.RestfulTestCase):

    def config_overrides(self):

    def setUp(self):

    def test_unscoped_token_remains_valid_after_role_assignment(self):

    def test_deleting_user_grant_revokes_token(self):

    def role_data_fixtures(self):

    def test_deleting_role_revokes_token(self):

    def test_domain_user_role_assignment_maintains_token(self):

    def test_disabling_project_revokes_token(self):

    def test_deleting_project_revokes_token(self):

    def test_deleting_group_grant_revokes_tokens(self):

    def test_domain_group_role_assignment_maintains_token(self):

    def test_group_membership_changes_revokes_token(self):

    def test_removing_role_assignment_does_not_affect_other_users(self):

    def test_deleting_project_deletes_grants(self):

class TestTokenRevokeApi(TestTokenRevokeById):

    def config_overrides(self):

    def assertValidDeletedProjectResponse(self, events_response, project_id):

    def assertDomainInList(self, events_response, domain_id):

    def assertValidRevokedTokenResponse(self, events_response, user_id):

    def test_revoke_token(self):

    def get_v2_token(self):

    def test_revoke_v2_token(self):

    def test_revoke_by_id_false_410(self):

    def test_list_delete_project_shows_in_event_list(self):

    def test_disable_domain_shows_in_event_list(self):

    def assertUserAndExpiryInList(self, events, user_id, expires_at):

    def test_list_delete_token_shows_in_event_list(self):

    def test_list_with_filter(self):

class TestAuthExternalDisabled(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_remote_user_disabled(self):

class TestAuthExternalLegacyDefaultDomain(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_remote_user_no_realm(self):

    def test_remote_user_no_domain(self):

class TestAuthExternalLegacyDomain(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_remote_user_with_realm(self):

    def test_project_id_scoped_with_remote_user(self):

    def test_unscoped_bind_with_remote_user(self):

class TestAuthExternalDomain(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_remote_user_with_realm(self):

    def test_project_id_scoped_with_remote_user(self):

    def test_unscoped_bind_with_remote_user(self):

class TestAuthJSON(test_v3.RestfulTestCase):

    def test_unscoped_token_with_user_id(self):

    def test_unscoped_token_with_user_domain_id(self):

    def test_unscoped_token_with_user_domain_name(self):

    def test_project_id_scoped_token_with_user_id(self):

    def test_default_project_id_scoped_token_with_user_id(self):

    def test_default_project_id_scoped_token_with_user_id_no_catalog(self):

    def test_implicit_project_id_scoped_token_with_user_id_no_catalog(self):

    def _check_disabled_endpoint_result(self, catalog, disabled_endpoint_id):

    def test_auth_catalog_disabled_service(self):

    def test_auth_catalog_disabled_endpoint(self):

    def test_project_id_scoped_token_with_user_id_401(self):

    def test_user_and_group_roles_scoped_token(self):

    def test_project_id_scoped_token_with_user_domain_id(self):

    def test_project_id_scoped_token_with_user_domain_name(self):

    def test_domain_id_scoped_token_with_user_id(self):

    def test_domain_id_scoped_token_with_user_domain_id(self):

    def test_domain_id_scoped_token_with_user_domain_name(self):

    def test_domain_name_scoped_token_with_user_id(self):

    def test_domain_name_scoped_token_with_user_domain_id(self):

    def test_domain_name_scoped_token_with_user_domain_name(self):

    def test_domain_scope_token_with_group_role(self):

    def test_domain_scope_token_with_name(self):

    def test_domain_scope_failed(self):

    def test_auth_with_id(self):

    def get_v2_token(self, tenant_id=None):

    def test_validate_v2_unscoped_token_with_v3_api(self):

    def test_validate_v2_scoped_token_with_v3_api(self):

    def test_invalid_user_id(self):

    def test_invalid_user_name(self):

    def test_invalid_domain_id(self):

    def test_invalid_domain_name(self):

    def test_invalid_password(self):

    def test_remote_user_no_realm(self):

    def test_remote_user_no_domain(self):

    def test_remote_user_and_password(self):

    def test_remote_user_and_explicit_external(self):

    def test_remote_user_bad_password(self):

    def test_bind_not_set_with_remote_user(self):

    def test_verify_with_bound_token(self):

    def test_auth_with_bind_token(self):

    def test_v2_v3_bind_token_intermix(self):

    def test_authenticating_a_user_with_no_password(self):

    def test_disabled_default_project_result_in_unscoped_token(self):

    def test_disabled_default_project_domain_result_in_unscoped_token(self):

    def test_no_access_to_default_project_result_in_unscoped_token(self):

class TestAuthXML(TestAuthJSON):

    def _check_disabled_endpoint_result(self, catalog, disabled_endpoint_id):

class TestTrustOptional(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_trusts_404(self):

    def test_auth_with_scope_in_trust_403(self):

class TestTrustAuth(TestAuthInfo):

    def config_overrides(self):

    def setUp(self):

    def test_create_trust_400(self):

    def test_create_unscoped_trust(self):

    def test_create_trust_no_roles(self):

    def _initialize_test_consume_trust(self, count):

    def test_consume_trust_once(self):

    def test_create_one_time_use_trust(self):

    def test_create_trust_with_bad_values_for_remaining_uses(self):

    def _create_trust_with_bad_remaining_use(self, bad_value):

    def test_create_unlimited_use_trust(self):

    def test_trust_crud(self):

    def test_create_trust_trustee_404(self):

    def test_create_trust_trustor_trustee_backwards(self):

    def test_create_trust_project_404(self):

    def test_create_trust_role_id_404(self):

    def test_create_trust_role_name_404(self):

    def test_create_expired_trust(self):

    def test_v3_v2_intermix_trustor_not_in_default_domain_failed(self):

    def test_v3_v2_intermix_trustor_not_in_default_domaini_failed(self):

    def test_v3_v2_intermix_project_not_in_default_domaini_failed(self):

    def test_v3_v2_intermix(self):

    def test_exercise_trust_scoped_token_without_impersonation(self):

    def test_exercise_trust_scoped_token_with_impersonation(self):

    def assertTrustTokensRevoked(self, trust_id):

    def test_delete_trust_revokes_tokens(self):

    def test_delete_trust(self):

    def test_list_trusts(self):

    def test_change_password_invalidates_trust_tokens(self):

    def test_trustee_can_do_role_ops(self):

class TestAPIProtectionWithoutAuthContextMiddleware(test_v3.RestfulTestCase):

    def test_api_protection_with_no_auth_context_in_env(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_catalog.py

class CatalogTestCase(test_v3.RestfulTestCase):

    def test_create_region_with_id(self):

    def test_create_region_with_matching_ids(self):

    def test_create_region_with_duplicate_id(self):

    def test_create_region(self):

    def test_create_region_without_id(self):

    def test_create_region_with_conflicting_ids(self):

    def test_list_regions(self):

    def test_list_regions_xml(self):

    def test_get_region(self):

    def test_update_region(self):

    def test_delete_region(self):

    def test_create_service(self):

    def test_create_service_no_enabled(self):

    def test_create_service_enabled_false(self):

    def test_create_service_enabled_true(self):

    def test_create_service_enabled_str_true(self):

    def test_create_service_enabled_str_false(self):

    def test_create_service_enabled_str_random(self):

    def test_list_services(self):

    def test_list_services_xml(self):

    def test_get_service(self):

    def test_update_service(self):

    def test_delete_service(self):

    def test_list_endpoints(self):

    def test_list_endpoints_xml(self):

    def test_create_endpoint_no_enabled(self):

    def test_create_endpoint_enabled_true(self):

    def test_create_endpoint_enabled_false(self):

    def test_create_endpoint_enabled_str_true(self):

    def test_create_endpoint_enabled_str_false(self):

    def test_create_endpoint_enabled_str_random(self):

    def assertValidErrorResponse(self, response):

    def test_create_endpoint_400(self):

    def test_create_endpoint_with_empty_url(self):

    def test_get_endpoint(self):

    def test_update_endpoint(self):

    def test_update_endpoint_enabled_true(self):

    def test_update_endpoint_enabled_false(self):

    def test_update_endpoint_enabled_str_true(self):

    def test_update_endpoint_enabled_str_false(self):

    def test_update_endpoint_enabled_str_random(self):

    def test_delete_endpoint(self):

    def test_create_endpoint_on_v2(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_credential.py

class CredentialBaseTestCase(test_v3.RestfulTestCase):

    def _create_dict_blob_credential(self):

class CredentialTestCase(CredentialBaseTestCase):

    def setUp(self):

    def test_credential_api_delete_credentials_for_project(self):

    def test_credential_api_delete_credentials_for_user(self):

    def test_list_credentials(self):

    def test_list_credentials_xml(self):

    def test_create_credential(self):

    def test_get_credential(self):

    def test_update_credential(self):

    def test_delete_credential(self):

    def test_create_ec2_credential(self):

    def test_get_ec2_dict_blob(self):

    def test_list_ec2_dict_blob(self):

    def test_create_non_ec2_credential(self):

    def test_create_ec2_credential_with_invalid_blob(self):

    def test_create_credential_with_admin_token(self):

class TestCredentialTrustScoped(test_v3.RestfulTestCase):

    def setUp(self):

    def config_overrides(self):

    def test_trust_scoped_ec2_credential(self):

class TestCredentialEc2(CredentialBaseTestCase):

    def setUp(self):

    def _validate_signature(self, access, secret):

    def test_ec2_credential_signature_validate(self):

    def test_ec2_credential_signature_validate_legacy(self):

    def _get_ec2_cred_uri(self):

    def _get_ec2_cred(self):

    def test_ec2_create_credential(self):

    def test_ec2_get_credential(self):

    def test_ec2_list_credentials(self):

    def test_ec2_delete_credential(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_federation.py

def dummy_validator(*args, **kwargs):

class FederationTests(test_v3.RestfulTestCase):

    def setup_database(self):

class FederatedIdentityProviderTests(FederationTests):

    def base_url(self, suffix=None):

    def _fetch_attribute_from_response(self, resp, parameter, assert_is_not_none=True):

    def _create_and_decapsulate_response(self, body=None):

    def _get_idp(self, idp_id):

    def _create_default_idp(self, body=None):

    def _http_idp_input(self, **kwargs):

    def _assign_protocol_to_idp(self, idp_id=None, proto=None, url=None, mapping_id=None, validate=True, **kwargs):

    def _get_protocol(self, idp_id, protocol_id):

    def test_create_idp(self):

    def test_list_idps(self, iterations=5):

        def get_id(resp):

    def test_check_idp_uniqueness(self):

    def test_get_idp(self):

    def test_get_nonexisting_idp(self):

    def test_delete_existing_idp(self):

    def test_delete_nonexisting_idp(self):

    def test_update_idp_mutable_attributes(self):

    def test_update_idp_immutable_attributes(self):

    def test_update_nonexistent_idp(self):

    def test_assign_protocol_to_idp(self):

    def test_protocol_composite_pk(self):

    def test_protocol_idp_pk_uniqueness(self):

    def test_assign_protocol_to_nonexistent_idp(self):

    def test_get_protocol(self):

    def test_list_protocols(self):

    def test_update_protocols_attribute(self):

    def test_delete_protocol(self):

class MappingCRUDTests(FederationTests):

    def assertValidMappingListResponse(self, resp, *args, **kwargs):

    def assertValidMappingResponse(self, resp, *args, **kwargs):

    def assertValidMapping(self, entity, ref=None):

    def _create_default_mapping_entry(self):

    def _get_id_from_response(self, resp):

    def test_mapping_create(self):

    def test_mapping_list(self):

    def test_mapping_delete(self):

    def test_mapping_get(self):

    def test_mapping_update(self):

    def test_delete_mapping_dne(self):

    def test_get_mapping_dne(self):

    def test_create_mapping_bad_requirements(self):

    def test_create_mapping_no_rules(self):

    def test_create_mapping_no_remote_objects(self):

    def test_create_mapping_bad_value(self):

    def test_create_mapping_missing_local(self):

    def test_create_mapping_missing_type(self):

    def test_create_mapping_wrong_type(self):

    def test_create_mapping_extra_remote_properties_not_any_of(self):

    def test_create_mapping_extra_remote_properties_any_one_of(self):

    def test_create_mapping_extra_remote_properties_just_type(self):

    def test_create_mapping_empty_map(self):

    def test_create_mapping_extra_rules_properties(self):

class MappingRuleEngineTests(FederationTests):

    def test_rule_engine_any_one_of_and_direct_mapping(self):

    def test_rule_engine_no_regex_match(self):

    def test_rule_engine_any_one_of_many_rules(self):

    def test_rule_engine_not_any_of_and_direct_mapping(self):

    def test_rule_engine_not_any_of_many_rules(self):

    def _rule_engine_regex_match_and_many_groups(self, assertion):

    def test_rule_engine_regex_match_and_many_groups(self):

    def test_rule_engine_discards_nonstring_objects(self):

    def test_rule_engine_fails_after_discarding_nonstring(self):

class FederatedTokenTests(FederationTests):

    def setUp(self):

    def idp_ref(self, id=None):

    def proto_ref(self, mapping_id=None):

    def mapping_ref(self, rules=None):

    def _assertSerializeToXML(self, json_body):

    def _scope_request(self, unscoped_token_id, scope, scope_id):

    def _project(self, project):

    def _roles(self, roles):

    def _check_projects_and_roles(self, token, roles, projects):

    def _check_scoped_token_attributes(self, token):

        def xor_project_domain(iterable):

    def _issue_unscoped_token(self, assertion='EMPLOYEE_ASSERTION'):

    def test_issue_unscoped_token(self):

    def test_issue_unscoped_token_serialize_to_xml(self):

    def test_issue_unscoped_token_no_groups(self):

    def test_issue_unscoped_token_malformed_environment(self):

    def test_scope_to_project_once(self):

    def test_scope_to_bad_project(self):

    def test_scope_to_project_multiple_times(self):

    def test_scope_token_from_nonexistent_unscoped_token(self):

    def test_issue_token_from_rules_without_user(self):

    def test_issue_token_with_nonexistent_group(self):

    def test_scope_to_domain_once(self):

    def test_scope_to_domain_multiple_tokens(self):

    def test_list_projects(self):

    def test_list_domains(self):

    def test_full_workflow(self):

    def test_workflow_with_groups_deletion(self):

    def test_assertion_prefix_parameter(self):

    def test_assertion_prefix_parameter_expect_fail(self):

    def load_federation_sample_data(self):

    def _inject_assertion(self, context, variant):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_filters.py

class IdentityTestFilteredCase(filtering.FilterTests, test_v3.RestfulTestCase):

    def setUp(self):

    def load_sample_data(self):

    def _get_id_list_from_ref_list(self, ref_list):

    def _set_policy(self, new_policy):

    def test_list_users_filtered_by_domain(self):

    def test_list_filtered_domains(self):

    def test_multiple_filters(self):

    def test_list_users_filtered_by_funny_name(self):

    def test_inexact_filters(self):

    def test_filter_sql_injection_attack(self):

class IdentityTestListLimitCase(IdentityTestFilteredCase):

    def setUp(self):

    def clean_up_entity(self, entity):

    def clean_up_service(self):

    def clean_up_policy(self):

    def _test_entity_list_limit(self, entity, driver):

    def test_users_list_limit(self):

    def test_groups_list_limit(self):

    def test_projects_list_limit(self):

    def test_services_list_limit(self):

    def test_non_driver_list_limit(self):

    def test_no_limit(self):

    def test_at_limit(self):

class IdentityTestFilteredCaseXML(IdentityTestFilteredCase):

class IdentityTestListLimitCaseXML(IdentityTestListLimitCase):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_identity.py

def _build_role_assignment_url_and_entity( role_id, user_id=None, group_id=None, domain_id=None, project_id=None, inherited_to_projects=False, effective=False):

class IdentityTestCase(test_v3.RestfulTestCase):

    def setUp(self):

    def test_create_domain(self):

    def test_create_domain_case_sensitivity(self):

    def test_create_domain_400(self):

    def test_list_domains(self):

    def test_list_domains_xml(self):

    def test_get_domain(self):

    def test_update_domain(self):

    def test_disable_domain(self):

    def test_delete_enabled_domain_fails(self):

    def test_delete_domain(self):

    def test_delete_default_domain_fails(self):

    def test_delete_new_default_domain_fails(self):

    def test_delete_old_default_domain(self):

    def test_list_projects(self):

    def test_list_projects_xml(self):

    def test_create_project(self):

    def test_create_project_400(self):

    def test_get_project(self):

    def test_update_project(self):

    def test_update_project_domain_id(self):

    def test_delete_project(self):

    def test_create_user(self):

    def test_create_user_400(self):

    def test_list_users(self):

    def test_list_users_no_default_project(self):

    def test_list_users_xml(self):

    def test_get_user(self):

    def test_get_user_with_default_project(self):

    def test_add_user_to_group(self):

    def test_list_groups_for_user(self):

    def test_check_user_in_group(self):

    def test_list_users_in_group(self):

    def test_remove_user_from_group(self):

    def test_update_user(self):

    def test_update_user_domain_id(self):

    def test_delete_user(self):

    def test_create_group(self):

    def test_create_group_400(self):

    def test_list_groups(self):

    def test_list_groups_xml(self):

    def test_get_group(self):

    def test_update_group(self):

    def test_update_group_domain_id(self):

    def test_delete_group(self):

    def test_create_role(self):

    def test_create_role_400(self):

    def test_list_roles(self):

    def test_list_roles_xml(self):

    def test_get_role(self):

    def test_update_role(self):

    def test_delete_role(self):

    def test_crud_user_project_role_grants(self):

    def test_crud_user_project_role_grants_no_user(self):

    def test_crud_user_domain_role_grants(self):

    def test_crud_user_domain_role_grants_no_user(self):

    def test_crud_group_project_role_grants(self):

    def test_crud_group_project_role_grants_no_group(self):

    def test_crud_group_domain_role_grants(self):

    def test_crud_group_domain_role_grants_no_group(self):

    def test_get_role_assignments(self):

    def test_get_effective_role_assignments(self):

    def test_check_effective_values_for_role_assignments(self):

    def test_filtered_role_assignments(self):

class IdentityInheritanceTestCase(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_crud_user_inherited_domain_role_grants(self):

    def test_list_role_assignments_for_inherited_domain_grants(self):

    def test_list_role_assignments_for_disabled_inheritance_extension(self):

    def test_list_role_assignments_for_inherited_group_domain_grants(self):

    def test_filtered_role_assignments_for_inherited_grants(self):

class IdentityInheritanceDisabledTestCase(test_v3.RestfulTestCase):

    def config_overrides(self):

    def test_crud_inherited_role_grants_failed_if_disabled(self):

class TestV3toV2Methods(tests.TestCase):

    def setUp(self):

    def test_v3_to_v2_user_method(self):

    def test_v3_to_v2_user_method_list(self):

    def test_v2controller_filter_domain_id(self):

    def test_v3controller_filter_domain_id(self):

class UserSelfServiceChangingPasswordsTestCase(test_v3.RestfulTestCase):

    def setUp(self):

    def get_request_token(self, password, expected_status):

    def change_password(self, expected_status, **kwargs):

    def test_changing_password(self):

    def test_changing_password_with_missing_original_password_fails(self):

    def test_changing_password_with_missing_password_fails(self):

    def test_changing_password_with_incorrect_password_fails(self):

    def test_changing_password_with_disabled_user_fails(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_oauth1.py

class OAuth1Tests(test_v3.RestfulTestCase):

    def setup_database(self):

    def setUp(self):

    def _create_single_consumer(self):

    def _create_request_token(self, consumer, project_id):

    def _create_access_token(self, consumer, token):

    def _get_oauth_token(self, consumer, token):

    def _authorize_request_token(self, request_id):

class ConsumerCRUDTests(OAuth1Tests):

    def _consumer_create(self, description=None, description_flag=True, **kwargs):

    def test_consumer_create(self):

    def test_consumer_create_none_desc_1(self):

    def test_consumer_create_none_desc_2(self):

    def test_consumer_create_normalize_field(self):

    def test_consumer_delete(self):

    def test_consumer_get(self):

    def test_consumer_list(self):

    def test_consumer_update(self):

    def test_consumer_update_bad_secret(self):

    def test_consumer_update_bad_id(self):

    def test_consumer_update_normalize_field(self):

    def test_consumer_create_no_description(self):

    def test_consumer_get_bad_id(self):

class OAuthFlowTests(OAuth1Tests):

    def test_oauth_flow(self):

class AccessTokenCRUDTests(OAuthFlowTests):

    def test_delete_access_token_dne(self):

    def test_list_no_access_tokens(self):

    def test_get_single_access_token(self):

    def test_get_access_token_dne(self):

    def test_list_all_roles_in_access_token(self):

    def test_get_role_in_access_token(self):

    def test_get_role_in_access_token_dne(self):

    def test_list_and_delete_access_tokens(self):

class AuthTokenTests(OAuthFlowTests):

    def test_keystone_token_is_valid(self):

    def test_delete_access_token_also_revokes_token(self):

    def test_deleting_consumer_also_deletes_tokens(self):

    def test_change_user_password_also_deletes_tokens(self):

    def test_deleting_project_also_invalidates_tokens(self):

    def test_token_chaining_is_not_allowed(self):

    def test_delete_keystone_tokens_by_consumer_id(self):

class MaliciousOAuth1Tests(OAuth1Tests):

    def test_bad_consumer_secret(self):

    def test_bad_request_token_key(self):

    def test_bad_verifier(self):

    def test_bad_authorizing_roles(self):

    def test_expired_authorizing_request_token(self):

    def test_expired_creating_keystone_token(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_os_revoke.py

def _future_time_string():

class OSRevokeTests(test_v3.RestfulTestCase):

    def test_get_empty_list(self):

    def _blank_event(self):

    def assertReportedEventMatchesRecorded(self, event, sample, before_time):

    def test_revoked_token_in_list(self):

    def test_disabled_project_in_list(self):

    def test_disabled_domain_in_list(self):

    def test_list_since_invalid(self):

    def test_list_since_valid(self):

    def test_since_future_time_no_events(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_policy.py

class PolicyTestCase(test_v3.RestfulTestCase):

    def setUp(self):

    def test_create_policy(self):

    def test_list_policies(self):

    def test_list_policies_xml(self):

    def test_get_policy(self):

    def test_update_policy(self):

    def test_delete_policy(self):

\OpenStack\keystone-2014.1\keystone\tests\test_v3_protection.py

class IdentityTestProtectedCase(test_v3.RestfulTestCase):

    def setUp(self):

    def load_sample_data(self):

    def _get_id_list_from_ref_list(self, ref_list):

    def _set_policy(self, new_policy):

    def test_list_users_unprotected(self):

    def test_list_users_filtered_by_domain(self):

    def test_get_user_protected_match_id(self):

    def test_get_user_protected_match_target(self):

    def test_revoke_grant_protected_match_target(self):

    def test_list_users_protected_by_domain(self):

    def test_list_groups_protected_by_domain(self):

    def test_list_groups_protected_by_domain_and_filtered(self):

class IdentityTestv3CloudPolicySample(test_v3.RestfulTestCase):

    def setUp(self):

    def load_sample_data(self):

    def _stati(self, expected_status):

    def _test_user_management(self, domain_id, expected=None):

    def _test_project_management(self, domain_id, expected=None):

    def _test_domain_management(self, expected=None):

    def _test_grants(self, target, entity_id, expected=None):

    def test_user_management(self):

    def test_user_management_by_cloud_admin(self):

    def test_project_management(self):

    def test_domain_grants(self):

    def test_domain_grants_by_cloud_admin(self):

    def test_project_grants(self):

    def test_project_grants_by_domain_admin(self):

    def test_cloud_admin(self):

\OpenStack\keystone-2014.1\keystone\tests\test_versions.py

class VersionTestCase(tests.TestCase):

    def setUp(self):

    def config_overrides(self):

    def _paste_in_port(self, response, port):

    def test_public_versions(self):

    def test_admin_versions(self):

    def test_use_site_url_if_endpoint_unset(self):

    def test_public_version_v2(self):

    def test_admin_version_v2(self):

    def test_use_site_url_if_endpoint_unset_v2(self):

    def test_public_version_v3(self):

    def test_admin_version_v3(self):

    def test_use_site_url_if_endpoint_unset_v3(self):

    def test_v2_disabled(self):

    def test_v3_disabled(self):

class XmlVersionTestCase(tests.TestCase):

    def setUp(self):

    def config_overrides(self):

    def test_public_versions(self):

    def test_admin_versions(self):

    def test_use_site_url_if_endpoint_unset(self):

    def test_public_version_v2(self):

    def test_admin_version_v2(self):

    def test_public_version_v3(self):

    def test_admin_version_v3(self):

    def test_v2_disabled(self):

    def test_v3_disabled(self):

\OpenStack\keystone-2014.1\keystone\tests\test_wsgi.py

class FakeApp(wsgi.Application):

    def index(self, context):

class BaseWSGITest(tests.TestCase):

    def setUp(self):

    def _make_request(self, url='/'):

class ApplicationTest(BaseWSGITest):

    def test_response_content_type(self):

    def test_query_string_available(self):

    def test_headers_available(self):

    def test_render_response(self):

    def test_render_response_custom_status(self):

    def test_render_response_custom_headers(self):

    def test_render_response_no_body(self):

    def test_application_local_config(self):

    def test_render_exception(self):

    def test_render_exception_host(self):

class ExtensionRouterTest(BaseWSGITest):

    def test_extensionrouter_local_config(self):

class MiddlewareTest(BaseWSGITest):

    def test_middleware_request(self):

    def test_middleware_response(self):

    def test_middleware_bad_request(self):

    def test_middleware_type_error(self):

    def test_middleware_exception_error(self):

        def do_request():

    def test_middleware_local_config(self):

class LocalizedResponseTest(tests.TestCase):

    def setUp(self):

    def _set_expected_languages(self, all_locales=[], avail_locales=None):

        def returns_some_locales(*args, **kwargs):

        def fake_gettext_find(lang_id, *args, **kwargs):

    def test_request_match_default(self):

    def test_request_match_language_expected(self):

    def test_request_match_language_unexpected(self):

    def test_static_translated_string_is_Message(self):

    def test_dynamic_translated_string_is_Message(self):

class ServerTest(tests.TestCase):

    def setUp(self):

    def test_keepalive_unset(self, mock_getaddrinfo, mock_listen):

    def test_keepalive_set(self, mock_getaddrinfo, mock_listen):

    def test_keepalive_and_keepidle_set(self, mock_getaddrinfo, mock_listen):

\OpenStack\keystone-2014.1\keystone\tests\unit\common\test_sql_core.py

class TestModel(ModelBase, sql.ModelDictMixin):

class TestModelDictMixin(testtools.TestCase):

    def test_creating_a_model_instance_from_a_dict(self):

    def test_creating_a_dict_from_a_model_instance(self):

    def test_creating_a_model_instance_from_an_invalid_dict(self):

    def test_creating_a_dict_from_a_model_instance_that_has_extra_attrs(self):

\OpenStack\keystone-2014.1\keystone\tests\unit\common\test_utils.py

class TestPasswordHashing(testtools.TestCase):

    def setUp(self):

    def test_that_we_can_verify_a_password_against_a_hash(self):

    def test_that_an_incorrect_password_fails_to_validate(self):

    def test_that_a_hash_can_not_be_validated_against_a_hash(self):

\OpenStack\keystone-2014.1\keystone\tests\unit\common\__init__.py

\OpenStack\keystone-2014.1\keystone\tests\unit\identity\test_core.py

class TestDomainConfigs(testtools.TestCase):

    def setUp(self):

    def test_config_for_nonexistent_domain(self):

\OpenStack\keystone-2014.1\keystone\tests\unit\identity\__init__.py

\OpenStack\keystone-2014.1\keystone\tests\unit\__init__.py

\OpenStack\keystone-2014.1\keystone\tests\utils.py

def new_uuid():

\OpenStack\keystone-2014.1\keystone\tests\__init__.py

\OpenStack\keystone-2014.1\keystone\token\backends\kvs.py

class Token(token.Driver):

    def __init__(self, backing_store=None, **kwargs):

    def _prefix_token_id(self, token_id):

    def _prefix_user_id(self, user_id):

    def _get_key_or_default(self, key, default=None):

    def _get_key(self, key):

    def _set_key(self, key, value, lock=None):

    def _delete_key(self, key):

    def get_token(self, token_id):

    def create_token(self, token_id, data):

    def _get_user_token_list_with_expiry(self, user_key):

    def _get_user_token_list(self, user_key):

    def _update_user_token_list(self, user_key, token_id, expires_isotime_str):

    def _get_current_time(self):

    def _add_to_revocation_list(self, data, lock):

    def delete_token(self, token_id):

    def delete_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def _format_token_index_item(self, item):

    def _token_match_tenant(self, token_ref, tenant_id):

    def _token_match_trust(self, token_ref, trust_id):

    def _token_match_consumer(self, token_ref, consumer_id):

    def _list_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def list_revoked_tokens(self):

    def flush_expired_tokens(self):

\OpenStack\keystone-2014.1\keystone\token\backends\memcache.py

class Token(kvs.Token):

    def __init__(self, *args, **kwargs):

\OpenStack\keystone-2014.1\keystone\token\backends\sql.py

class TokenModel(sql.ModelBase, sql.DictBase):

class Token(token.Driver):

    def get_token(self, token_id):

    def create_token(self, token_id, data):

    def delete_token(self, token_id):

    def delete_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def _tenant_matches(self, tenant_id, token_ref_dict):

    def _consumer_matches(self, consumer_id, ref):

    def _list_tokens_for_trust(self, trust_id):

    def _list_tokens_for_user(self, user_id, tenant_id=None):

    def _list_tokens_for_consumer(self, user_id, consumer_id):

    def _list_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def list_revoked_tokens(self):

    def token_flush_batch_size(self, dialect):

    def flush_expired_tokens(self):

\OpenStack\keystone-2014.1\keystone\token\backends\__init__.py

\OpenStack\keystone-2014.1\keystone\token\controllers.py

class ExternalAuthNotApplicable(Exception):

class Auth(controller.V2Controller):

    def ca_cert(self, context, auth=None):

    def signing_cert(self, context, auth=None):

    def authenticate(self, context, auth=None):

    def _authenticate_token(self, context, auth):

    def _authenticate_local(self, context, auth):

    def _authenticate_external(self, context, auth):

    def _get_auth_token_data(self, user, tenant, metadata, expiry):

    def _get_project_id_from_auth(self, auth):

    def _get_project_roles_and_ref(self, user_id, tenant_id):

    def _get_token_ref(self, token_id, belongs_to=None):

    def validate_token_head(self, context, token_id):

    def validate_token(self, context, token_id):

    def delete_token(self, context, token_id):

    def revocation_list(self, context, auth=None):

    def endpoints(self, context, token_id):

    def format_endpoint_list(cls, catalog_ref):

\OpenStack\keystone-2014.1\keystone\token\core.py

def default_expire_time():

def validate_auth_info(self, user_ref, tenant_ref):

class Manager(manager.Manager):

    def __init__(self):

    def unique_id(self, token_id):

    def _assert_valid(self, token_id, token_ref):

    def get_token(self, token_id):

    def _get_token(self, token_id):

    def create_token(self, token_id, data):

    def delete_token(self, token_id):

    def delete_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def list_revoked_tokens(self):

    def invalidate_revocation_list(self):

    def delete_tokens_for_domain(self, domain_id):

    def delete_tokens_for_user(self, user_id, project_id=None):

    def delete_tokens_for_users(self, user_ids, project_id=None):

    def _invalidate_individual_token_cache(self, token_id):

    def list_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

class Driver(object):

    def get_token(self, token_id):

    def create_token(self, token_id, data):

    def delete_token(self, token_id):

    def delete_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def _list_tokens(self, user_id, tenant_id=None, trust_id=None, consumer_id=None):

    def list_revoked_tokens(self):

    def flush_expired_tokens(self):

\OpenStack\keystone-2014.1\keystone\token\provider.py

class UnsupportedTokenVersionException(Exception):

class Manager(manager.Manager):

    def get_token_provider(cls):

    def __init__(self):

    def validate_token(self, token_id, belongs_to=None):

    def check_revocation_v2(self, token):

    def validate_v2_token(self, token_id, belongs_to=None):

    def check_revocation_v3(self, token):

    def check_revocation(self, token):

    def validate_v3_token(self, token_id):

    def check_v2_token(self, token_id, belongs_to=None):

    def check_v3_token(self, token_id):

    def _validate_token(self, token_id):

    def _validate_v2_token(self, token_id):

    def _validate_v3_token(self, token_id):

    def _is_valid_token(self, token):

    def _token_belongs_to(self, token, belongs_to):

    def invalidate_individual_token_cache(self, token_id):

class Provider(object):

    def get_token_version(self, token_data):

    def issue_v2_token(self, token_ref, roles_ref=None, catalog_ref=None):

    def issue_v3_token(self, user_id, method_names, expires_at=None, project_id=None, domain_id=None, auth_context=None, metadata_ref=None, include_catalog=True):

    def revoke_token(self, token_id):

    def validate_token(self, token_id):

    def validate_v2_token(self, token_id):

    def validate_v3_token(self, token_id):

    def _get_token_id(self, token_data):

\OpenStack\keystone-2014.1\keystone\token\providers\common.py

class V2TokenDataHelper(object):

    def format_token(cls, token_ref, roles_ref=None, catalog_ref=None):

    def format_catalog(cls, catalog_ref):

class V3TokenDataHelper(object):

    def __init__(self):

    def _get_filtered_domain(self, domain_id):

    def _get_filtered_project(self, project_id):

    def _populate_scope(self, token_data, domain_id, project_id):

    def _get_roles_for_user(self, user_id, domain_id, project_id):

    def _populate_roles_for_groups(self, group_ids, project_id=None, domain_id=None, user_id=None):

        def _check_roles(roles, user_id, project_id, domain_id):

    def _populate_user(self, token_data, user_id, trust):

    def _populate_oauth_section(self, token_data, access_token):

    def _populate_roles(self, token_data, user_id, domain_id, project_id, trust, access_token):

    def _populate_service_catalog(self, token_data, user_id, domain_id, project_id, trust):

    def _populate_token_dates(self, token_data, expires=None, trust=None):

    def get_token_data(self, user_id, method_names, extras, domain_id=None, project_id=None, expires=None, trust=None, token=None, include_catalog=True, bind=None, access_token=None):

class BaseProvider(provider.Provider):

    def __init__(self, *args, **kwargs):

    def get_token_version(self, token_data):

    def issue_v2_token(self, token_ref, roles_ref=None, catalog_ref=None):

    def issue_v3_token(self, user_id, method_names, expires_at=None, project_id=None, domain_id=None, auth_context=None, trust=None, metadata_ref=None, include_catalog=True):

    def _handle_saml2_tokens(self, auth_context, project_id, domain_id):

    def _verify_token(self, token_id):

    def _verify_token_ref(self, token_ref):

    def revoke_token(self, token_id):

    def _assert_default_domain(self, token_ref):

    def validate_v2_token(self, token_id):

    def _validate_v2_token_ref(self, token_ref):

    def validate_v3_token(self, token_id):

    def _validate_v3_token_ref(self, token_ref):

    def validate_token(self, token_id):

\OpenStack\keystone-2014.1\keystone\token\providers\pki.py

class Provider(common.BaseProvider):

    def _get_token_id(self, token_data):

\OpenStack\keystone-2014.1\keystone\token\providers\uuid.py

class Provider(common.BaseProvider):

    def __init__(self, *args, **kwargs):

    def _get_token_id(self, token_data):

\OpenStack\keystone-2014.1\keystone\token\providers\__init__.py

\OpenStack\keystone-2014.1\keystone\token\routers.py

class Router(wsgi.ComposableRouter):

    def add_routes(self, mapper):

\OpenStack\keystone-2014.1\keystone\token\__init__.py

\OpenStack\keystone-2014.1\keystone\trust\backends\kvs.py

def _filter_trust(ref):

class Trust(kvs.Base, trust.Driver):

    def create_trust(self, trust_id, trust, roles):

    def consume_use(self, trust_id):

    def get_trust(self, trust_id):

    def delete_trust(self, trust_id):

    def list_trusts(self):

    def list_trusts_for_trustee(self, trustee_user_id):

    def list_trusts_for_trustor(self, trustor_user_id):

\OpenStack\keystone-2014.1\keystone\trust\backends\sql.py

class TrustModel(sql.ModelBase, sql.DictBase):

class TrustRole(sql.ModelBase):

class Trust(trust.Driver):

    def create_trust(self, trust_id, trust, roles):

    def _add_roles(self, trust_id, session, trust_dict):

    def consume_use(self, trust_id):

    def get_trust(self, trust_id):

    def list_trusts(self):

    def list_trusts_for_trustee(self, trustee_user_id):

    def list_trusts_for_trustor(self, trustor_user_id):

    def delete_trust(self, trust_id):

\OpenStack\keystone-2014.1\keystone\trust\backends\__init__.py

\OpenStack\keystone-2014.1\keystone\trust\controllers.py

def _trustor_only(context, trust, user_id):

def _trustor_trustee_only(trust, user_id):

def _admin_trustor_only(context, trust, user_id):

class TrustV3(controller.V3Controller):

    def base_url(cls, context, path=None):

    def _get_user_id(self, context):

    def get_trust(self, context, trust_id):

    def _fill_in_roles(self, context, trust, all_roles):

    def _clean_role_list(self, context, trust, all_roles):

    def create_trust(self, context, trust=None):

    def list_trusts(self, context):

    def delete_trust(self, context, trust_id):

    def list_roles_for_trust(self, context, trust_id):

    def check_role_for_trust(self, context, trust_id, role_id):

    def get_role_for_trust(self, context, trust_id, role_id):

\OpenStack\keystone-2014.1\keystone\trust\core.py

class Manager(manager.Manager):

    def __init__(self):

    def create_trust(self, trust_id, trust, roles):

    def delete_trust(self, trust_id):

class Driver(object):

    def create_trust(self, trust_id, trust, roles):

    def get_trust(self, trust_id):

    def list_trusts(self):

    def list_trusts_for_trustee(self, trustee):

    def list_trusts_for_trustor(self, trustor):

    def delete_trust(self, trust_id):

    def consume_use(self, trust_id):

\OpenStack\keystone-2014.1\keystone\trust\routers.py

def append_v3_routers(mapper, routers):

\OpenStack\keystone-2014.1\keystone\trust\__init__.py

\OpenStack\keystone-2014.1\keystone\__init__.py