keystone/keystone
Dolph Mathews 0967058007 Additional test coverage for password changes
Keystone has four API calls which may result in a user's password
changing.

1. Administrative password reset on v2:

    POST /v2.0/users/{user_id}/OS-KSADM/password

2. Self-service password change on v2:

    PATCH /v2.0/OS-KSCRUD/users/{user_id}

3. Administrative password reset on v3:

    POST /v3/users/{user_id}

4. Self-service password change on v3:

    POST /v3/users/{user_id}/password

This patch adds additional test coverage to *consistently* ensure that:

- Old passwords no longer work
- Old tokens no longer work
- The new password works

Change-Id: I2a296b7ed407c75018fff3b60bd13aaa4fa9a849
Closes-Bug: 1407105
(cherry picked from commit a22aa08bf2)
2015-03-10 08:38:19 +01:00
..
assignment Fix race on default role creation 2015-02-06 18:24:08 -08:00
auth Make sure scoping to the project of a disabled domain result in 401. 2014-11-20 08:10:53 -06:00
catalog Merge "Catalog driver generates v3 catalog from v2 catalog" into stable/icehouse 2014-09-25 20:36:22 +00:00
common Keystoneclient tests from venv-installed client 2015-02-10 13:39:47 -06:00
contrib Fix revocation event handling with MySQL 2014-08-05 13:19:01 -05:00
credential Uses explicit imports for _ 2014-03-18 01:23:21 -07:00
identity No longer allow listing users by email 2014-08-18 14:26:34 -05:00
locale Fix Jenkins translation jobs 2014-04-01 09:31:11 -05:00
middleware Change the default version discovery URLs 2014-03-25 10:15:15 +10:00
openstack Sync from oslo db.sqlalchemy.migration 2014-04-02 14:35:02 -07:00
policy Uses explicit imports for _ 2014-03-18 01:23:21 -07:00
tests Additional test coverage for password changes 2015-03-10 08:38:19 +01:00
token Merge "Remove extraenous instantiations of managers" into stable/icehouse 2014-09-26 17:25:18 +00:00
trust Remove `with_lockmode` use from Trust SQL backend. 2014-08-08 08:14:00 -07:00
__init__.py Revert "Disable eventlet monkey-patching of DNS" 2013-05-10 10:24:48 -04:00
clean.py Make sure domains are enabled by default 2014-06-18 19:33:35 -07:00
cli.py Token Revocation Extension 2014-03-04 13:42:28 -05:00
config.py Merge "Remove vim header" 2014-02-13 03:43:19 +00:00
controllers.py revert deprecation of v2 API 2014-03-25 20:54:54 -05:00
exception.py Remove `with_lockmode` use from Trust SQL backend. 2014-08-08 08:14:00 -07:00
notifications.py Uses generator expressions instead of filter 2014-03-20 00:31:42 +00:00
routers.py Remove vim header 2014-02-08 23:54:04 +08:00
service.py Don't automatically enable revocation events. 2014-03-15 15:46:46 -07:00