diff options
Diffstat (limited to 'openstackclient/tests/identity/v3/fakes.py')
| -rw-r--r-- | openstackclient/tests/identity/v3/fakes.py | 914 |
1 files changed, 0 insertions, 914 deletions
diff --git a/openstackclient/tests/identity/v3/fakes.py b/openstackclient/tests/identity/v3/fakes.py deleted file mode 100644 index 38f6724e..00000000 --- a/openstackclient/tests/identity/v3/fakes.py +++ /dev/null @@ -1,914 +0,0 @@ -# Copyright 2013 Nebula Inc. -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may -# not use this file except in compliance with the License. You may obtain -# a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT -# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the -# License for the specific language governing permissions and limitations -# under the License. -# - -import copy -import mock -import uuid - -from keystoneauth1 import access -from keystoneauth1 import fixture - -from openstackclient.tests import fakes -from openstackclient.tests import utils - -base_url = 'http://identity:5000/v3/' - -domain_id = 'd1' -domain_name = 'oftheking' -domain_description = 'domain description' - -DOMAIN = { - 'id': domain_id, - 'name': domain_name, - 'description': domain_description, - 'enabled': True, - 'links': base_url + 'domains/' + domain_id, -} - -group_id = 'gr-010' -group_name = 'spencer davis' - -GROUP = { - 'id': group_id, - 'name': group_name, - 'links': base_url + 'groups/' + group_id, -} - -mapping_id = 'test_mapping' -mapping_rules_file_path = '/tmp/path/to/file' -# Copied from -# (https://github.com/openstack/keystone/blob\ -# master/keystone/tests/mapping_fixtures.py -EMPLOYEE_GROUP_ID = "0cd5e9" -DEVELOPER_GROUP_ID = "xyz" -MAPPING_RULES = [ - { - "local": [ - { - "group": { - "id": EMPLOYEE_GROUP_ID - } - } - ], - "remote": [ - { - "type": "orgPersonType", - "not_any_of": [ - "Contractor", - "Guest" - ] - } - ] - } -] - -MAPPING_RULES_2 = [ - { - "local": [ - { - "group": { - "id": DEVELOPER_GROUP_ID - } - } - ], - "remote": [ - { - "type": "orgPersonType", - "any_one_of": [ - "Contractor" - ] - } - ] - } -] - - -MAPPING_RESPONSE = { - "id": mapping_id, - "rules": MAPPING_RULES -} - -MAPPING_RESPONSE_2 = { - "id": mapping_id, - "rules": MAPPING_RULES_2 -} - -project_id = '8-9-64' -project_name = 'beatles' -project_description = 'Fab Four' - -PROJECT = { - 'id': project_id, - 'name': project_name, - 'description': project_description, - 'enabled': True, - 'domain_id': domain_id, - 'links': base_url + 'projects/' + project_id, -} - -PROJECT_2 = { - 'id': project_id + '-2222', - 'name': project_name + ' reprise', - 'description': project_description + 'plus four more', - 'enabled': True, - 'domain_id': domain_id, - 'links': base_url + 'projects/' + project_id, -} - -region_id = 'region_one' -region_parent_region_id = 'region_two' -region_description = 'region one' - -REGION = { - 'id': region_id, - 'description': region_description, - 'parent_region_id': region_parent_region_id, - 'links': base_url + 'regions/' + region_id, -} - -PROJECT_WITH_PARENT = { - 'id': project_id + '-with-parent', - 'name': project_name + ' and their parents', - 'description': project_description + ' plus another four', - 'enabled': True, - 'domain_id': domain_id, - 'parent_id': project_id, - 'links': base_url + 'projects/' + (project_id + '-with-parent'), -} - -PROJECT_WITH_GRANDPARENT = { - 'id': project_id + '-with-grandparent', - 'name': project_name + ', granny and grandpa', - 'description': project_description + ' plus another eight?', - 'enabled': True, - 'domain_id': domain_id, - 'parent_id': PROJECT_WITH_PARENT['id'], - 'links': base_url + 'projects/' + (project_id + '-with-grandparent'), -} - -parents = [{'project': PROJECT}] -grandparents = [{'project': PROJECT}, {'project': PROJECT_WITH_PARENT}] -ids_for_parents = [PROJECT['id']] -ids_for_parents_and_grandparents = [PROJECT['id'], PROJECT_WITH_PARENT['id']] - -children = [{'project': PROJECT_WITH_GRANDPARENT}] -ids_for_children = [PROJECT_WITH_GRANDPARENT['id']] - - -role_id = 'r1' -role_name = 'roller' - -ROLE = { - 'id': role_id, - 'name': role_name, - 'domain': None, - 'links': base_url + 'roles/' + role_id, -} - -ROLE_2 = { - 'id': 'r2', - 'name': 'Rolls Royce', - 'domain': domain_id, - 'links': base_url + 'roles/' + 'r2', -} - -service_id = 's-123' -service_name = 'Texaco' -service_type = 'gas' -service_description = 'oil brand' - -SERVICE = { - 'id': service_id, - 'name': service_name, - 'type': service_type, - 'description': service_description, - 'enabled': True, - 'links': base_url + 'services/' + service_id, -} - -SERVICE_WITHOUT_NAME = { - 'id': service_id, - 'type': service_type, - 'description': service_description, - 'enabled': True, - 'links': base_url + 'services/' + service_id, -} - -endpoint_id = 'e-123' -endpoint_url = 'http://127.0.0.1:35357' -endpoint_region = 'RegionOne' -endpoint_interface = 'admin' - -ENDPOINT = { - 'id': endpoint_id, - 'url': endpoint_url, - 'region': endpoint_region, - 'interface': endpoint_interface, - 'service_id': service_id, - 'enabled': True, - 'links': base_url + 'endpoints/' + endpoint_id, -} - -user_id = 'bbbbbbb-aaaa-aaaa-aaaa-bbbbbbbaaaa' -user_name = 'paul' -user_description = 'Sir Paul' -user_email = 'paul@applecorps.com' - -USER = { - 'id': user_id, - 'name': user_name, - 'default_project_id': project_id, - 'email': user_email, - 'enabled': True, - 'domain_id': domain_id, - 'links': base_url + 'users/' + user_id, -} - -trust_id = 't-456' -trust_expires = None -trust_impersonation = False -trust_roles = {"id": role_id, "name": role_name}, - -TRUST = { - 'expires_at': trust_expires, - 'id': trust_id, - 'impersonation': trust_impersonation, - 'links': base_url + 'trusts/' + trust_id, - 'project_id': project_id, - 'roles': trust_roles, - 'trustee_user_id': user_id, - 'trustor_user_id': user_id, -} - -token_expires = '2016-09-05T18:04:52+0000' -token_id = 'tttttttt-tttt-tttt-tttt-tttttttttttt' - -UNSCOPED_TOKEN = { - 'expires': token_expires, - 'id': token_id, - 'user_id': user_id, -} - -TOKEN_WITH_PROJECT_ID = { - 'expires': token_expires, - 'id': token_id, - 'project_id': project_id, - 'user_id': user_id, -} - -TOKEN_WITH_DOMAIN_ID = { - 'expires': token_expires, - 'id': token_id, - 'domain_id': domain_id, - 'user_id': user_id, -} - -idp_id = 'test_idp' -idp_description = 'super exciting IdP description' -idp_remote_ids = ['entity1', 'entity2'] -formatted_idp_remote_ids = 'entity1, entity2' - -IDENTITY_PROVIDER = { - 'id': idp_id, - 'remote_ids': idp_remote_ids, - 'enabled': True, - 'description': idp_description -} - -protocol_id = 'protocol' - -mapping_id = 'test_mapping' -mapping_id_updated = 'prod_mapping' - -sp_id = 'BETA' -sp_description = 'Service Provider to burst into' -service_provider_url = 'https://beta.example.com/Shibboleth.sso/POST/SAML' -sp_auth_url = ('https://beta.example.com/v3/OS-FEDERATION/identity_providers/' - 'idp/protocol/saml2/auth') - -SERVICE_PROVIDER = { - 'id': sp_id, - 'enabled': True, - 'description': sp_description, - 'sp_url': service_provider_url, - 'auth_url': sp_auth_url -} - -PROTOCOL_ID_MAPPING = { - 'id': protocol_id, - 'mapping': mapping_id -} - -PROTOCOL_OUTPUT = { - 'id': protocol_id, - 'mapping_id': mapping_id, - 'identity_provider': idp_id -} - -PROTOCOL_OUTPUT_UPDATED = { - 'id': protocol_id, - 'mapping_id': mapping_id_updated, - 'identity_provider': idp_id -} - -# Assignments - -ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID = { - 'scope': {'project': {'id': project_id}}, - 'user': {'id': user_id}, - 'role': {'id': role_id}, -} - -ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INCLUDE_NAMES = { - 'scope': { - 'project': { - 'domain': {'id': domain_id, - 'name': domain_name}, - 'id': project_id, - 'name': project_name}}, - 'user': { - 'domain': {'id': domain_id, - 'name': domain_name}, - 'id': user_id, - 'name': user_name}, - 'role': {'id': role_id, - 'name': role_name}, -} - -ASSIGNMENT_WITH_PROJECT_ID_AND_USER_ID_INHERITED = { - 'scope': {'project': {'id': project_id}, - 'OS-INHERIT:inherited_to': 'projects'}, - 'user': {'id': user_id}, - 'role': {'id': role_id}, -} - -ASSIGNMENT_WITH_PROJECT_ID_AND_GROUP_ID = { - 'scope': {'project': {'id': project_id}}, - 'group': {'id': group_id}, - 'role': {'id': role_id}, -} - -ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID = { - 'scope': {'domain': {'id': domain_id}}, - 'user': {'id': user_id}, - 'role': {'id': role_id}, -} - -ASSIGNMENT_WITH_DOMAIN_ROLE = { - 'scope': {'domain': {'id': domain_id}}, - 'user': {'id': user_id}, - 'role': {'id': ROLE_2['id']}, -} - -ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INCLUDE_NAMES = { - 'scope': { - 'domain': {'id': domain_id, - 'name': domain_name}}, - 'user': { - 'domain': {'id': domain_id, - 'name': domain_name}, - 'id': user_id, - 'name': user_name}, - 'role': {'id': role_id, - 'name': role_name}, -} - -ASSIGNMENT_WITH_DOMAIN_ID_AND_USER_ID_INHERITED = { - 'scope': {'domain': {'id': domain_id}, - 'OS-INHERIT:inherited_to': 'projects'}, - 'user': {'id': user_id}, - 'role': {'id': role_id}, -} - -ASSIGNMENT_WITH_DOMAIN_ID_AND_GROUP_ID = { - 'scope': {'domain': {'id': domain_id}}, - 'group': {'id': group_id}, - 'role': {'id': role_id}, -} - -consumer_id = 'test consumer id' -consumer_description = 'someone we trust' -consumer_secret = 'test consumer secret' - -OAUTH_CONSUMER = { - 'id': consumer_id, - 'secret': consumer_secret, - 'description': consumer_description -} - -access_token_id = 'test access token id' -access_token_secret = 'test access token secret' -access_token_expires = '2014-05-18T03:13:18.152071Z' - -OAUTH_ACCESS_TOKEN = { - 'id': access_token_id, - 'expires': access_token_expires, - 'key': access_token_id, - 'secret': access_token_secret -} - -request_token_id = 'test request token id' -request_token_secret = 'test request token secret' -request_token_expires = '2014-05-17T11:10:51.511336Z' - -OAUTH_REQUEST_TOKEN = { - 'id': request_token_id, - 'expires': request_token_expires, - 'key': request_token_id, - 'secret': request_token_secret -} - -oauth_verifier_pin = '6d74XaDS' -OAUTH_VERIFIER = { - 'oauth_verifier': oauth_verifier_pin -} - - -def fake_auth_ref(fake_token, fake_service=None): - """Create an auth_ref using keystoneauth's fixtures""" - token_copy = copy.deepcopy(fake_token) - token_id = token_copy.pop('id') - token = fixture.V3Token(**token_copy) - # An auth_ref is actually an access info object - auth_ref = access.create( - body=token, - auth_token=token_id, - ) - - # Create a service catalog - if fake_service: - service = token.add_service( - fake_service['type'], - fake_service['name'], - ) - # TODO(dtroyer): Add an 'id' element to KSA's _Service fixure - service['id'] = fake_service['id'] - for e in fake_service['endpoints']: - region = e.get('region_id') or e.get('region', '<none>') - service.add_endpoint( - e['interface'], - e['url'], - region=region, - ) - - return auth_ref - - -class FakeAuth(object): - - def __init__(self, auth_method_class=None): - self._auth_method_class = auth_method_class - - def get_token(self, *args, **kwargs): - return token_id - - -class FakeSession(object): - - def __init__(self, **kwargs): - self.auth = FakeAuth() - - -class FakeIdentityv3Client(object): - - def __init__(self, **kwargs): - self.domains = mock.Mock() - self.domains.resource_class = fakes.FakeResource(None, {}) - self.credentials = mock.Mock() - self.credentials.resource_class = fakes.FakeResource(None, {}) - self.endpoints = mock.Mock() - self.endpoints.resource_class = fakes.FakeResource(None, {}) - self.groups = mock.Mock() - self.groups.resource_class = fakes.FakeResource(None, {}) - self.oauth1 = mock.Mock() - self.oauth1.resource_class = fakes.FakeResource(None, {}) - self.projects = mock.Mock() - self.projects.resource_class = fakes.FakeResource(None, {}) - self.regions = mock.Mock() - self.regions.resource_class = fakes.FakeResource(None, {}) - self.roles = mock.Mock() - self.roles.resource_class = fakes.FakeResource(None, {}) - self.services = mock.Mock() - self.services.resource_class = fakes.FakeResource(None, {}) - self.session = mock.Mock() - self.session.auth.auth_ref.service_catalog.resource_class = \ - fakes.FakeResource(None, {}) - self.tokens = mock.Mock() - self.tokens.resource_class = fakes.FakeResource(None, {}) - self.trusts = mock.Mock() - self.trusts.resource_class = fakes.FakeResource(None, {}) - self.users = mock.Mock() - self.users.resource_class = fakes.FakeResource(None, {}) - self.role_assignments = mock.Mock() - self.role_assignments.resource_class = fakes.FakeResource(None, {}) - self.auth_token = kwargs['token'] - self.management_url = kwargs['endpoint'] - self.auth = FakeAuth() - self.auth.client = mock.Mock() - self.auth.client.resource_class = fakes.FakeResource(None, {}) - - -class FakeFederationManager(object): - - def __init__(self, **kwargs): - self.identity_providers = mock.Mock() - self.identity_providers.resource_class = fakes.FakeResource(None, {}) - self.mappings = mock.Mock() - self.mappings.resource_class = fakes.FakeResource(None, {}) - self.protocols = mock.Mock() - self.protocols.resource_class = fakes.FakeResource(None, {}) - self.projects = mock.Mock() - self.projects.resource_class = fakes.FakeResource(None, {}) - self.domains = mock.Mock() - self.domains.resource_class = fakes.FakeResource(None, {}) - self.service_providers = mock.Mock() - self.service_providers.resource_class = fakes.FakeResource(None, {}) - - -class FakeFederatedClient(FakeIdentityv3Client): - - def __init__(self, **kwargs): - super(FakeFederatedClient, self).__init__(**kwargs) - self.federation = FakeFederationManager() - - -class FakeOAuth1Client(FakeIdentityv3Client): - - def __init__(self, **kwargs): - super(FakeOAuth1Client, self).__init__(**kwargs) - - self.access_tokens = mock.Mock() - self.access_tokens.resource_class = fakes.FakeResource(None, {}) - self.consumers = mock.Mock() - self.consumers.resource_class = fakes.FakeResource(None, {}) - self.request_tokens = mock.Mock() - self.request_tokens.resource_class = fakes.FakeResource(None, {}) - - -class TestIdentityv3(utils.TestCommand): - - def setUp(self): - super(TestIdentityv3, self).setUp() - - self.app.client_manager.identity = FakeIdentityv3Client( - endpoint=fakes.AUTH_URL, - token=fakes.AUTH_TOKEN, - ) - - -class TestFederatedIdentity(utils.TestCommand): - - def setUp(self): - super(TestFederatedIdentity, self).setUp() - - self.app.client_manager.identity = FakeFederatedClient( - endpoint=fakes.AUTH_URL, - token=fakes.AUTH_TOKEN - ) - - -class TestOAuth1(utils.TestCommand): - - def setUp(self): - super(TestOAuth1, self).setUp() - - self.app.client_manager.identity = FakeOAuth1Client( - endpoint=fakes.AUTH_URL, - token=fakes.AUTH_TOKEN - ) - - -class FakeProject(object): - """Fake one or more project.""" - - @staticmethod - def create_one_project(attrs=None): - """Create a fake project. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, name, and so on - """ - - attrs = attrs or {} - - # set default attributes. - project_info = { - 'id': 'project-id-' + uuid.uuid4().hex, - 'name': 'project-name-' + uuid.uuid4().hex, - 'description': 'project-description-' + uuid.uuid4().hex, - 'enabled': True, - 'is_domain': False, - 'domain_id': 'domain-id-' + uuid.uuid4().hex, - 'parent_id': 'parent-id-' + uuid.uuid4().hex, - 'links': 'links-' + uuid.uuid4().hex, - } - project_info.update(attrs) - - project = fakes.FakeResource(info=copy.deepcopy(project_info), - loaded=True) - return project - - -class FakeDomain(object): - """Fake one or more domain.""" - - @staticmethod - def create_one_domain(attrs=None): - """Create a fake domain. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, name, and so on - """ - - attrs = attrs or {} - - # set default attributes. - domain_info = { - 'id': 'domain-id-' + uuid.uuid4().hex, - 'name': 'domain-name-' + uuid.uuid4().hex, - 'description': 'domain-description-' + uuid.uuid4().hex, - 'enabled': True, - 'links': 'links-' + uuid.uuid4().hex, - } - domain_info.update(attrs) - - domain = fakes.FakeResource(info=copy.deepcopy(domain_info), - loaded=True) - return domain - - -class FakeCredential(object): - """Fake one or more credential.""" - - @staticmethod - def create_one_credential(attrs=None): - """Create a fake credential. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, type, and so on - """ - - attrs = attrs or {} - - # set default attributes. - credential_info = { - 'id': 'credential-id-' + uuid.uuid4().hex, - 'type': 'cert', - 'user_id': 'user-id-' + uuid.uuid4().hex, - 'blob': 'credential-data-' + uuid.uuid4().hex, - 'project_id': 'project-id-' + uuid.uuid4().hex, - 'links': 'links-' + uuid.uuid4().hex, - } - credential_info.update(attrs) - - credential = fakes.FakeResource( - info=copy.deepcopy(credential_info), loaded=True) - return credential - - @staticmethod - def create_credentials(attrs=None, count=2): - """Create multiple fake credentials. - - :param Dictionary attrs: - A dictionary with all attributes - :param int count: - The number of credentials to fake - :return: - A list of FakeResource objects faking the credentials - """ - credentials = [] - for i in range(0, count): - credential = FakeCredential.create_one_credential(attrs) - credentials.append(credential) - - return credentials - - @staticmethod - def get_credentials(credentials=None, count=2): - """Get an iterable MagicMock object with a list of faked credentials. - - If credentials list is provided, then initialize the Mock object with - the list. Otherwise create one. - - :param List credentials: - A list of FakeResource objects faking credentials - :param Integer count: - The number of credentials to be faked - :return - An iterable Mock object with side_effect set to a list of faked - credentials - """ - if credentials is None: - credentials = FakeCredential.create_credentials(count) - - return mock.MagicMock(side_effect=credentials) - - -class FakeUser(object): - """Fake one or more user.""" - - @staticmethod - def create_one_user(attrs=None): - """Create a fake user. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, name, and so on - """ - - attrs = attrs or {} - - # set default attributes. - user_info = { - 'id': 'user-id-' + uuid.uuid4().hex, - 'name': 'user-name-' + uuid.uuid4().hex, - 'default_project_id': 'project-' + uuid.uuid4().hex, - 'email': 'user-email-' + uuid.uuid4().hex, - 'enabled': True, - 'domain_id': 'domain-id-' + uuid.uuid4().hex, - 'links': 'links-' + uuid.uuid4().hex, - } - user_info.update(attrs) - - user = fakes.FakeResource(info=copy.deepcopy(user_info), - loaded=True) - return user - - -class FakeGroup(object): - """Fake one or more group.""" - - @staticmethod - def create_one_group(attrs=None): - """Create a fake group. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, name, and so on - """ - - attrs = attrs or {} - - # set default attributes. - group_info = { - 'id': 'group-id-' + uuid.uuid4().hex, - 'name': 'group-name-' + uuid.uuid4().hex, - 'links': 'links-' + uuid.uuid4().hex, - 'domain_id': 'domain-id-' + uuid.uuid4().hex, - 'description': 'group-description-' + uuid.uuid4().hex, - } - group_info.update(attrs) - - group = fakes.FakeResource(info=copy.deepcopy(group_info), - loaded=True) - return group - - @staticmethod - def create_groups(attrs=None, count=2): - """Create multiple fake groups. - - :param Dictionary attrs: - A dictionary with all attributes - :param int count: - The number of groups to fake - :return: - A list of FakeResource objects faking the groups - """ - groups = [] - for i in range(0, count): - group = FakeGroup.create_one_group(attrs) - groups.append(group) - - return groups - - @staticmethod - def get_groups(groups=None, count=2): - """Get an iterable MagicMock object with a list of faked groups. - - If groups list is provided, then initialize the Mock object with - the list. Otherwise create one. - - :param List groups: - A list of FakeResource objects faking groups - :param Integer count: - The number of groups to be faked - :return - An iterable Mock object with side_effect set to a list of faked - groups - """ - if groups is None: - groups = FakeGroup.create_groups(count) - - return mock.MagicMock(side_effect=groups) - - -class FakeEndpoint(object): - """Fake one or more endpoint.""" - - @staticmethod - def create_one_endpoint(attrs=None): - """Create a fake endpoint. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, url, and so on - """ - - attrs = attrs or {} - - # set default attributes. - endpoint_info = { - 'id': 'endpoint-id-' + uuid.uuid4().hex, - 'url': 'url-' + uuid.uuid4().hex, - 'region': 'endpoint-region-' + uuid.uuid4().hex, - 'interface': 'admin', - 'service_id': 'service-id-' + uuid.uuid4().hex, - 'enabled': True, - 'links': 'links-' + uuid.uuid4().hex, - } - endpoint_info.update(attrs) - - endpoint = fakes.FakeResource(info=copy.deepcopy(endpoint_info), - loaded=True) - return endpoint - - -class FakeService(object): - """Fake one or more service.""" - - @staticmethod - def create_one_service(attrs=None): - """Create a fake service. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with id, name, and so on - """ - - attrs = attrs or {} - - # set default attributes. - service_info = { - 'id': 'service-id-' + uuid.uuid4().hex, - 'name': 'service-name-' + uuid.uuid4().hex, - 'type': 'service-type-' + uuid.uuid4().hex, - 'description': 'service-description-' + uuid.uuid4().hex, - 'enabled': True, - 'links': 'links-' + uuid.uuid4().hex, - } - service_info.update(attrs) - - service = fakes.FakeResource(info=copy.deepcopy(service_info), - loaded=True) - return service - - -class FakeRoleAssignment(object): - """Fake one or more role assignment.""" - - @staticmethod - def create_one_role_assignment(attrs=None): - """Create a fake role assignment. - - :param Dictionary attrs: - A dictionary with all attributes - :return: - A FakeResource object, with scope, user, and so on - """ - - attrs = attrs or {} - - # set default attributes. - role_assignment_info = { - 'scope': {'project': {'id': 'project-id-' + uuid.uuid4().hex}}, - 'user': {'id': 'user-id-' + uuid.uuid4().hex}, - 'role': {'id': 'role-id-' + uuid.uuid4().hex}, - } - role_assignment_info.update(attrs) - - role_assignment = fakes.FakeResource( - info=copy.deepcopy(role_assignment_info), loaded=True) - - return role_assignment |
