keystone/keystone/test/unit/test_roles.py

709 lines
30 KiB
Python
Executable File

# vim: tabstop=4 shiftwidth=4 softtabstop=4
# Copyright (c) 2010-2011 OpenStack, LLC.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
# implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import httplib2
import json
from lxml import etree
import os
import sys
sys.path.append(os.path.abspath(os.path.join(os.path.abspath(__file__),
'..', '..', '..', '..', '..', 'keystone')))
import unittest
import test_common as utils
from test_common import URL_V2
from keystone.logic.types import fault
class RolesTest(unittest.TestCase):
def setUp(self):
self.tenant = utils.get_tenant()
self.password = utils.get_password()
self.email = utils.get_email()
self.user = utils.get_user()
self.userdisabled = utils.get_userdisabled()
self.auth_token = utils.get_auth_token()
self.exp_auth_token = utils.get_exp_auth_token()
self.disabled_token = utils.get_disabled_token()
self.missing_token = utils.get_none_token()
self.invalid_token = utils.get_non_existing_token()
utils.create_tenant(self.tenant, str(self.auth_token))
utils.create_user(self.tenant, self.user, self.auth_token)
self.token = utils.get_token(self.user, 'secrete', self.tenant,
'token')
def tearDown(self):
utils.delete_user(self.user, self.auth_token)
utils.delete_tenant(self.tenant, self.auth_token)
class CreateRolesTest(RolesTest):
def test_create_role(self):
resp, content = utils.create_role('test_role', self.auth_token)
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(201, int(resp['status']))
resp, content = utils.delete_role('test_role', self.auth_token)
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(204, int(resp['status']))
class GetRolesTest(RolesTest):
def test_get_roles(self):
header = httplib2.Http(".cache")
url = '%sroles' % (utils.URL_V2)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
#verify content
obj = json.loads(content)
if not "roles" in obj:
raise self.fail("Expecting Roles")
roles = obj["roles"]["values"]
if len(roles) != 3:
self.fail("Roles not of required length.")
role = roles[0]
if not "id" in role:
role_id = None
else:
role_id = role["id"]
if role_id not in ['Admin', 'Member', 'KeystoneServiceAdmin']:
self.fail("Not the expected Role")
def test_get_roles_xml(self):
header = httplib2.Http(".cache")
url = '%sroles' % (utils.URL_V2)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.auth_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
# Validate Returned Content
dom = etree.Element("root")
dom.append(etree.fromstring(content))
roles = dom.find("{http://docs.openstack.org/identity/api/v2.0}" \
"roles")
if roles == None:
self.fail("Expecting Roles")
roles = roles.findall("{http://docs.openstack.org/identity/api/v2.0}" \
"role")
if len(roles) != 3:
self.fail("Not the expected Role count")
for role in roles:
if role.get("id") not in ['Admin', 'Member', \
'KeystoneServiceAdmin']:
self.fail("Unexpected Role")
def test_get_roles_exp_token(self):
header = httplib2.Http(".cache")
url = '%sroles' % (utils.URL_V2)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.exp_auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_roles_exp_token_xml(self):
header = httplib2.Http(".cache")
url = '%sroles' % (utils.URL_V2)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.exp_auth_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
class GetRoleTest(RolesTest):
role = None
def test_get_role(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
#verify content
obj = json.loads(content)
if not "role" in obj:
raise fault.BadRequestFault("Expecting Role")
role = obj["role"]
if not "id" in role:
role_id = None
else:
role_id = role["id"]
if role_id != 'Admin':
self.fail("Not the expected Role")
def test_get_role_xml(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.auth_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
#verify content
dom = etree.Element("root")
dom.append(etree.fromstring(content))
role = dom.find("{http://docs.openstack.org/identity/api/v2.0}" \
"role")
if role == None:
self.fail("Expecting Role")
role_id = role.get("id")
if role_id != 'Admin':
self.fail("Not the expected Role")
def test_get_role_bad(self):
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, 'tenant_bad')
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
def test_get_role_xml_bad(self):
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, 'tenant_bad')
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
def test_get_role_expired_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.exp_auth_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_role_xml_using_expired_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.exp_auth_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_role_using_disabled_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.disabled_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_role_xml_using_disabled_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.disabled_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_role_using_missing_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.missing_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(401, int(resp['status']))
def test_get_role_xml_using_missing_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.missing_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(401, int(resp['status']))
def test_get_role_using_invalid_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": self.invalid_token})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
def test_get_role_xml_using_invalid_token(self):
self.role = 'Admin'
header = httplib2.Http(".cache")
url = '%sroles/%s' % (utils.URL_V2, self.role)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='',
headers={"Content-Type": "application/xml",
"X-Auth-Token": self.invalid_token,
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
class CreateRoleRefTest(RolesTest):
def test_role_ref_create_json(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
def test_role_ref_create_xml(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref_xml(
self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
def test_role_ref_create_json_using_expired_token(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.exp_auth_token))
resp_val = int(resp['status'])
self.assertEqual(403, resp_val)
def test_role_ref_create_json_using_disabled_token(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.disabled_token))
resp_val = int(resp['status'])
self.assertEqual(403, resp_val)
def test_role_ref_create_json_using_missing_token(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.missing_token))
resp_val = int(resp['status'])
self.assertEqual(401, resp_val)
def test_role_ref_create_json_using_invalid_token(self):
utils.add_user_json(self.auth_token)
resp, _content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.invalid_token))
resp_val = int(resp['status'])
self.assertEqual(404, resp_val)
class GetRoleRefsTest(RolesTest):
def test_get_rolerefs(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(
self.user, 'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/json
resp, content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": str(self.auth_token)})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
#verify content
obj = json.loads(content)
if not "roleRefs" in obj:
raise self.fail("Expecting RoleRefs")
def test_get_rolerefs_xml(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(
self.user, 'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/xml
resp, content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/xml",
"X-Auth-Token": str(self.auth_token),
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(200, int(resp['status']))
#verify content
dom = etree.Element("root")
dom.append(etree.fromstring(content))
roles = dom.find("{http://docs.openstack.org/identity/api/v2.0}" \
"roleRefs")
if roles == None:
self.fail("Expecting Role Refs")
def test_get_rolerefs_using_expired_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(self.user,
'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": str(self.exp_auth_token)})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_rolerefs_xml_using_expired_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(
self.user, 'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/xml
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/xml",
"X-Auth-Token": str(self.exp_auth_token),
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_rolerefs_using_disabled_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(self.user,
'Admin', self.tenant, str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/json",
"X-Auth-Token": str(self.disabled_token)})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_rolerefs_xml_using_disabled_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(
self.user, 'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/xml
resp, _content = header.request(url, "GET", body='{}',
headers={"Content-Type": "application/xml",
"X-Auth-Token": str(self.disabled_token),
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(403, int(resp['status']))
def test_get_rolerefs_using_missing_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(self.user, 'Admin',
self.tenant, str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}', headers={
"Content-Type": "application/json",
"X-Auth-Token": str(self.missing_token)})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(401, int(resp['status']))
def test_get_rolerefs_xml_using_missing_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(self.user, 'Admin',
self.tenant, str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/xml
resp, _content = header.request(url, "GET", body='{}', headers={
"Content-Type": "application/xml",
"X-Auth-Token": str(self.missing_token),
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(401, int(resp['status']))
def test_get_rolerefs_json_using_invalid_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(self.user, 'Admin',
self.tenant, str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/json
resp, _content = header.request(url, "GET", body='{}', headers={
"Content-Type": "application/json",
"X-Auth-Token": str(self.invalid_token)})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
def test_get_rolerefs_xml_using_invalid_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
_resp, _content = utils.create_role_ref(
self.user, 'Admin', self.tenant,
str(self.auth_token))
url = '%susers/%s/roleRefs' % (URL_V2, self.user)
#test for Content-Type = application/xml
resp, _content = header.request(url, "GET", body='{}', headers={
"Content-Type": "application/xml",
"X-Auth-Token": str(self.invalid_token),
"ACCEPT": "application/xml"})
if int(resp['status']) == 500:
self.fail('Identity Fault')
elif int(resp['status']) == 503:
self.fail('Service Not Available')
self.assertEqual(404, int(resp['status']))
class DeleteRoleRefTest(RolesTest):
def test_delete_roleref(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
obj = json.loads(content)
if not "roleRef" in obj:
raise fault.BadRequestFault("Expecting RoleRef")
roleRef = obj["roleRef"]
if not "id" in roleRef:
role_ref_id = None
else:
role_ref_id = roleRef["id"]
if role_ref_id is None:
raise fault.BadRequestFault("Expecting RoleRefId")
url = '%susers/%s/roleRefs/%s' % (URL_V2, self.user, role_ref_id)
resp, content = header.request(url, "DELETE", body='', headers={
"Content-Type": "application/json",
"X-Auth-Token": str(self.auth_token)})
resp_val = int(resp['status'])
self.assertEqual(204, resp_val)
def test_delete_roleref_using_expired_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
obj = json.loads(content)
if not "roleRef" in obj:
raise fault.BadRequestFault("Expecting RoleRef")
roleRef = obj["roleRef"]
if not "id" in roleRef:
role_ref_id = None
else:
role_ref_id = roleRef["id"]
if role_ref_id is None:
raise fault.BadRequestFault("Expecting RoleRefId")
url = '%susers/%s/roleRefs/%s' % (URL_V2, self.user, role_ref_id)
resp, content = header.request(url, "DELETE", body='', headers={
"Content-Type": "application/json",
"X-Auth-Token": str(self.exp_auth_token)})
resp_val = int(resp['status'])
self.assertEqual(403, resp_val)
def test_delete_roleref_using_disabled_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
obj = json.loads(content)
if not "roleRef" in obj:
raise fault.BadRequestFault("Expecting RoleRef")
roleRef = obj["roleRef"]
if not "id" in roleRef:
role_ref_id = None
else:
role_ref_id = roleRef["id"]
if role_ref_id is None:
raise fault.BadRequestFault("Expecting RoleRefId")
url = '%susers/%s/roleRefs/%s' % (URL_V2, self.user, role_ref_id)
resp, content = header.request(url, "DELETE", body='', headers={
"Content-Type": "application/json",
"X-Auth-Token": str(self.disabled_token)})
resp_val = int(resp['status'])
self.assertEqual(403, resp_val)
def test_delete_roleref_using_missing_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
obj = json.loads(content)
if not "roleRef" in obj:
raise fault.BadRequestFault("Expecting RoleRef")
roleRef = obj["roleRef"]
if not "id" in roleRef:
role_ref_id = None
else:
role_ref_id = roleRef["id"]
if role_ref_id is None:
raise fault.BadRequestFault("Expecting RoleRefId")
url = '%susers/%s/roleRefs/%s' % (URL_V2, self.user, role_ref_id)
resp, content = header.request(url, "DELETE", body='',
headers={"Content-Type": "application/json",
"X-Auth-Token": str(self.missing_token)})
resp_val = int(resp['status'])
self.assertEqual(401, resp_val)
def test_delete_roleref_using_invalid_token(self):
header = httplib2.Http(".cache")
utils.add_user_json(self.auth_token)
resp, content = utils.create_role_ref(self.user, 'Admin', self.tenant,
str(self.auth_token))
resp_val = int(resp['status'])
self.assertEqual(201, resp_val)
obj = json.loads(content)
if not "roleRef" in obj:
raise fault.BadRequestFault("Expecting RoleRef")
roleRef = obj["roleRef"]
if not "id" in roleRef:
role_ref_id = None
else:
role_ref_id = roleRef["id"]
if role_ref_id is None:
raise fault.BadRequestFault("Expecting RoleRefId")
url = '%susers/%s/roleRefs/%s' % (URL_V2, self.user, role_ref_id)
resp, content = header.request(url, "DELETE", body='',
headers={"Content-Type": "application/json",
"X-Auth-Token": str(self.invalid_token)})
resp_val = int(resp['status'])
self.assertEqual(404, resp_val)
if __name__ == '__main__':
unittest.main()