keystonemiddleware/keystonemiddleware/tests/unit/auth_token
Chris Dent d3352ff422 Identify the keystone service when raising 503
When the keystonemiddleware is used directly in the WSGI stack of an
application, the 503 that is raised when the keystone service errors
or cannot be reached needs to identify that keystone is the service
that has failed, otherwise it appears to the client that it is the
service they are trying to access is down, which is misleading.

This addresses the problem in the most straightforward way possible:
the exception that causes the 503 is given a message including the
word "Keystone".

The call method in BaseAuthTokenTestCase gains an
expected_body_string kwarg. If not None, the response body (as
a six.text_type) is compared with the value.

Change-Id: Idf211e7bc99139744af232f5ea3ecb4be41551ca
Closes-Bug: #1747655
Closes-Bug: #1749797
2018-02-20 17:32:41 +01:00
..
__init__.py Move unit tests into tests.unit 2015-03-11 17:03:54 -05:00
base.py Identify the keystone service when raising 503 2018-02-20 17:32:41 +01:00
test_auth.py use oslo.log instead of logging 2017-01-13 03:24:18 +00:00
test_auth_token_middleware.py Identify the keystone service when raising 503 2018-02-20 17:32:41 +01:00
test_base_middleware.py strip whitespace from token 2017-07-31 16:16:37 -04:00
test_cache.py Rename auth_uri to www_authenticate_uri 2017-10-11 14:00:49 +02:00
test_config.py Rename auth_uri to www_authenticate_uri 2017-10-11 14:00:49 +02:00
test_connection_pool.py Use oslo_cache in auth_token middleware 2017-12-01 16:36:40 -08:00
test_memcache_crypt.py Fix py3 byte/string error 2017-10-11 10:21:06 -05:00
test_request.py Use keystoneauth 2015-11-23 12:03:00 +11:00
test_revocations.py auth_token verify revocation by audit_id 2015-12-17 10:55:58 -06:00
test_signing_dir.py Create signing_dir upon first usage 2016-04-11 11:12:06 -07:00
test_user_auth_plugin.py Pass ?allow_expired 2016-12-15 16:15:35 +00:00