aboutsummaryrefslogtreecommitdiffstats
path: root/keystone-moon/keystone/tests/unit/test_no_admin_token_auth.py
blob: bf60cff0208510d38b42ea4185b01d90e181b72a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
# Copyright 2013 OpenStack Foundation
#
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
#    not use this file except in compliance with the License. You may obtain
#    a copy of the License at
#
#         http://www.apache.org/licenses/LICENSE-2.0
#
#    Unless required by applicable law or agreed to in writing, software
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
#    License for the specific language governing permissions and limitations
#    under the License.

import os

from six.moves import http_client
import webtest

from keystone.tests import unit


class TestNoAdminTokenAuth(unit.TestCase):
    def setUp(self):
        super(TestNoAdminTokenAuth, self).setUp()
        self.load_backends()

        self._generate_paste_config()

        self.admin_app = webtest.TestApp(
            self.loadapp(unit.dirs.tmp('no_admin_token_auth'), name='admin'),
            extra_environ=dict(REMOTE_ADDR='127.0.0.1'))
        self.addCleanup(setattr, self, 'admin_app', None)

    def _generate_paste_config(self):
        # Generate a file, based on keystone-paste.ini, that doesn't include
        # admin_token_auth in the pipeline

        with open(unit.dirs.etc('keystone-paste.ini'), 'r') as f:
            contents = f.read()

        new_contents = contents.replace(' admin_token_auth ', ' ')

        filename = unit.dirs.tmp('no_admin_token_auth-paste.ini')
        with open(filename, 'w') as f:
            f.write(new_contents)
        self.addCleanup(os.remove, filename)

    def test_request_no_admin_token_auth(self):
        # This test verifies that if the admin_token_auth middleware isn't
        # in the paste pipeline that users can still make requests.

        # Note(blk-u): Picked /v2.0/tenants because it's an operation that
        # requires is_admin in the context, any operation that requires
        # is_admin would work for this test.
        REQ_PATH = '/v2.0/tenants'

        # If the following does not raise, then the test is successful.
        self.admin_app.get(REQ_PATH, headers={'X-Auth-Token': 'NotAdminToken'},
                           status=http_client.UNAUTHORIZED)