1
# Copyright (c) 2014 Hewlett-Packard Development Company, L.P.
2
# Licensed under the Apache License, Version 2.0 (the "License");
3
# you may not use this file except in compliance with the License.
4
# You may obtain a copy of the License at
6
# http://www.apache.org/licenses/LICENSE-2.0
8
# Unless required by applicable law or agreed to in writing, software
9
# distributed under the License is distributed on an "AS IS" BASIS,
10
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11
# See the License for the specific language governing permissions and
12
# limitations under the License.
16
from neutron.tests.tempest.common import accounts
17
from neutron.tests.tempest.common import cred_provider
18
from neutron.tests.tempest.common import isolated_creds
19
from neutron.tests.tempest import config
20
from neutron.tests.tempest import exceptions
25
# Return the right implementation of CredentialProvider based on config
26
# Dropping interface and password, as they are never used anyways
27
# TODO(andreaf) Drop them from the CredentialsProvider interface completely
28
def get_isolated_credentials(name, network_resources=None,
29
force_tenant_isolation=False):
30
# If a test requires a new account to work, it can have it via forcing
31
# tenant isolation. A new account will be produced only for that test.
32
# In case admin credentials are not available for the account creation,
33
# the test should be skipped else it would fail.
34
if CONF.auth.allow_tenant_isolation or force_tenant_isolation:
35
return isolated_creds.IsolatedCreds(
37
network_resources=network_resources)
39
if CONF.auth.locking_credentials_provider:
40
# Most params are not relevant for pre-created accounts
41
return accounts.Accounts(name=name)
43
return accounts.NotLockingAccounts(name=name)
46
# We want a helper function here to check and see if admin credentials
47
# are available so we can do a single call from skip_checks if admin
48
# creds area vailable.
49
def is_admin_available():
51
# If tenant isolation is enabled admin will be available
52
if CONF.auth.allow_tenant_isolation:
54
# Check whether test accounts file has the admin specified or not
55
elif os.path.isfile(CONF.auth.test_accounts_file):
56
check_accounts = accounts.Accounts(name='check_admin')
57
if not check_accounts.admin_available():
61
cred_provider.get_configured_credentials('identity_admin',
63
except exceptions.InvalidConfiguration: