aboutsummaryrefslogtreecommitdiffstats
path: root/keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py
diff options
context:
space:
mode:
Diffstat (limited to 'keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py')
-rw-r--r--keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py20
1 files changed, 11 insertions, 9 deletions
diff --git a/keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py b/keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py
index e0843605..8d6d9eb7 100644
--- a/keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py
+++ b/keystone-moon/keystone/tests/unit/test_v2_keystoneclient.py
@@ -22,10 +22,11 @@ import mock
from oslo_config import cfg
from oslo_serialization import jsonutils
from oslo_utils import timeutils
+from six.moves import http_client
from six.moves import range
import webob
-from keystone.tests import unit as tests
+from keystone.tests import unit
from keystone.tests.unit import default_fixtures
from keystone.tests.unit.ksfixtures import appserver
from keystone.tests.unit.ksfixtures import database
@@ -35,11 +36,11 @@ CONF = cfg.CONF
DEFAULT_DOMAIN_ID = CONF.identity.default_domain_id
-class ClientDrivenTestCase(tests.TestCase):
+class ClientDrivenTestCase(unit.TestCase):
def config_files(self):
config_files = super(ClientDrivenTestCase, self).config_files()
- config_files.append(tests.dirs.tests_conf('backend_sql.conf'))
+ config_files.append(unit.dirs.tests_conf('backend_sql.conf'))
return config_files
def setUp(self):
@@ -1032,7 +1033,8 @@ class ClientDrivenTestCase(tests.TestCase):
(new_password, self.user_two['password']))
self.public_server.application(req.environ,
responseobject.start_fake_response)
- self.assertEqual(403, responseobject.response_status)
+ self.assertEqual(http_client.FORBIDDEN,
+ responseobject.response_status)
self.user_two['password'] = new_password
self.assertRaises(client_exceptions.Unauthorized,
@@ -1110,10 +1112,10 @@ class ClientDrivenTestCase(tests.TestCase):
if not client:
client = self.default_client
url = '%s/ec2tokens' % self.default_client.auth_url
- (resp, token) = client.request(
+ resp = client.session.request(
url=url, method='POST',
- body={'credentials': credentials})
- return resp, token
+ json={'credentials': credentials})
+ return resp, resp.json()
def _generate_default_user_ec2_credentials(self):
cred = self. default_client.ec2.create(
@@ -1135,7 +1137,7 @@ class ClientDrivenTestCase(tests.TestCase):
credentials, signature = self._generate_default_user_ec2_credentials()
credentials['signature'] = signature
resp, token = self._send_ec2_auth_request(credentials)
- self.assertEqual(200, resp.status_code)
+ self.assertEqual(http_client.OK, resp.status_code)
self.assertIn('access', token)
def test_ec2_auth_success_trust(self):
@@ -1167,7 +1169,7 @@ class ClientDrivenTestCase(tests.TestCase):
cred.access, cred.secret)
credentials['signature'] = signature
resp, token = self._send_ec2_auth_request(credentials)
- self.assertEqual(200, resp.status_code)
+ self.assertEqual(http_client.OK, resp.status_code)
self.assertEqual(trust_id, token['access']['trust']['id'])
# TODO(shardy) we really want to check the roles and trustee
# but because of where the stubbing happens we don't seem to