summaryrefslogtreecommitdiff
path: root/keystoneclient/tests
diff options
context:
space:
mode:
authorJamie Lennox <jamielennox@redhat.com>2015-06-23 11:32:11 +0800
committerJamie Lennox <jamielennox@redhat.com>2015-07-15 22:01:14 +0000
commita4584c4ba7fa62c923d7da883e1cf8080e1275ad (patch)
tree17882464cf6703cd1cb8becb81d41bebc0f626c2 /keystoneclient/tests
parentf1d0b15bae728ce88627292b02911a0112e0ed20 (diff)
downloadpython-keystoneclient-a4584c4ba7fa62c923d7da883e1cf8080e1275ad.tar.gz
Add get_token_data to token CRUD
We already have the validate method that returns an AccessInfo object. For auth_token middleware it would be simpler if the client returned simply the token data so it presented the same way as other sources of token data. It would also help with the keystoneauth transition in auth_token as we could bypass the keystoneclient.AccessInfo objects. Closes-Bug: #1475041 Change-Id: Ifbe7a7004937d910739c325cc04ae7264a4498e0
Diffstat (limited to 'keystoneclient/tests')
-rw-r--r--keystoneclient/tests/unit/v2_0/test_tokens.py6
-rw-r--r--keystoneclient/tests/unit/v3/test_tokens.py17
2 files changed, 23 insertions, 0 deletions
diff --git a/keystoneclient/tests/unit/v2_0/test_tokens.py b/keystoneclient/tests/unit/v2_0/test_tokens.py
index 8a40f82..d60f0f8 100644
--- a/keystoneclient/tests/unit/v2_0/test_tokens.py
+++ b/keystoneclient/tests/unit/v2_0/test_tokens.py
@@ -168,6 +168,9 @@ class TokenTests(utils.TestCase):
token_fixture = fixture.V2Token(token_id=id_)
self.stub_url('GET', ['tokens', id_], json=token_fixture)
+ token_data = self.client.tokens.get_token_data(id_)
+ self.assertEqual(token_fixture, token_data)
+
token_ref = self.client.tokens.validate(id_)
self.assertIsInstance(token_ref, tokens.Token)
self.assertEqual(id_, token_ref.id)
@@ -178,6 +181,9 @@ class TokenTests(utils.TestCase):
id_ = uuid.uuid4().hex
# The server is expected to return 404 if the token is invalid.
self.stub_url('GET', ['tokens', id_], status_code=404)
+
+ self.assertRaises(exceptions.NotFound,
+ self.client.tokens.get_token_data, id_)
self.assertRaises(exceptions.NotFound,
self.client.tokens.validate, id_)
diff --git a/keystoneclient/tests/unit/v3/test_tokens.py b/keystoneclient/tests/unit/v3/test_tokens.py
index 2c27fd0..0363a61 100644
--- a/keystoneclient/tests/unit/v3/test_tokens.py
+++ b/keystoneclient/tests/unit/v3/test_tokens.py
@@ -53,6 +53,10 @@ class TokenTests(utils.TestCase, testresources.ResourcedTestCase):
self.examples.v3_UUID_TOKEN_DEFAULT]
self.stub_url('GET', ['auth', 'tokens'],
headers={'X-Subject-Token': token_id, }, json=token_ref)
+
+ token_data = self.client.tokens.get_token_data(token_id)
+ self.assertEqual(token_data, token_ref)
+
access_info = self.client.tokens.validate(token_id)
self.assertRequestHeaderEqual('X-Subject-Token', token_id)
@@ -77,6 +81,9 @@ class TokenTests(utils.TestCase, testresources.ResourcedTestCase):
# When the token is invalid the server typically returns a 404.
token_id = uuid.uuid4().hex
self.stub_url('GET', ['auth', 'tokens'], status_code=404)
+
+ self.assertRaises(exceptions.NotFound,
+ self.client.tokens.get_token_data, token_id)
self.assertRaises(exceptions.NotFound,
self.client.tokens.validate, token_id)
@@ -87,6 +94,11 @@ class TokenTests(utils.TestCase, testresources.ResourcedTestCase):
self.examples.v3_UUID_TOKEN_DEFAULT]
self.stub_url('GET', ['auth', 'tokens'],
headers={'X-Subject-Token': token_id, }, json=token_ref)
+
+ token_data = self.client.tokens.get_token_data(token_id)
+ self.assertQueryStringIs()
+ self.assertIn('catalog', token_data['token'])
+
access_info = self.client.tokens.validate(token_id)
self.assertQueryStringIs()
@@ -99,6 +111,11 @@ class TokenTests(utils.TestCase, testresources.ResourcedTestCase):
self.examples.v3_UUID_TOKEN_UNSCOPED]
self.stub_url('GET', ['auth', 'tokens'],
headers={'X-Subject-Token': token_id, }, json=token_ref)
+
+ token_data = self.client.tokens.get_token_data(token_id)
+ self.assertQueryStringIs()
+ self.assertNotIn('catalog', token_data['token'])
+
access_info = self.client.tokens.validate(token_id,
include_catalog=False)