Trivial fix typos
Change-Id: I03f468b000a8d648adb83582bfddef5e2ddb5ad6
This commit is contained in:
parent
57535a5dec
commit
0ea7734c5d
@ -33,7 +33,7 @@ This should provide a response as follows:
|
|||||||
|
|
||||||
{"metadata_ref": "http://localhost:9311/v1/secrets/2a549393-0710-444b-8aa5-84cf0f85ea79/metadata"}
|
{"metadata_ref": "http://localhost:9311/v1/secrets/2a549393-0710-444b-8aa5-84cf0f85ea79/metadata"}
|
||||||
|
|
||||||
.. _retreive_secret_metadata:
|
.. _retrieve_secret_metadata:
|
||||||
|
|
||||||
How to Retrieve Secret Metadata
|
How to Retrieve Secret Metadata
|
||||||
###############################
|
###############################
|
||||||
|
@ -150,7 +150,7 @@ class DBManageTestCase(base.TestCase):
|
|||||||
|
|
||||||
@testcase.attr('positive')
|
@testcase.attr('positive')
|
||||||
def test_active_secret_not_deleted(self):
|
def test_active_secret_not_deleted(self):
|
||||||
"""Verify that active secrest are not removed"""
|
"""Verify that active secrets are not removed"""
|
||||||
project_a_secrets = self._create_secret_list(user=admin_a)
|
project_a_secrets = self._create_secret_list(user=admin_a)
|
||||||
project_b_secrets = self._create_secret_list(user=admin_b)
|
project_b_secrets = self._create_secret_list(user=admin_b)
|
||||||
|
|
||||||
@ -228,7 +228,7 @@ class DBManageTestCase(base.TestCase):
|
|||||||
|
|
||||||
@testcase.attr('positive')
|
@testcase.attr('positive')
|
||||||
def test_no_soft_deleted_secrets_in_db(self):
|
def test_no_soft_deleted_secrets_in_db(self):
|
||||||
"""Test that no soft deleted secrests are in db"""
|
"""Test that no soft deleted secrets are in db"""
|
||||||
os.system("python barbican/cmd/db_manage.py clean -m 0 -p -e")
|
os.system("python barbican/cmd/db_manage.py clean -m 0 -p -e")
|
||||||
|
|
||||||
results = self.conn.execute("select * from secrets where deleted=1")
|
results = self.conn.execute("select * from secrets where deleted=1")
|
||||||
@ -287,7 +287,7 @@ class DBManageTestCase(base.TestCase):
|
|||||||
self.assertNotIn(container_uuid, container_list)
|
self.assertNotIn(container_uuid, container_list)
|
||||||
|
|
||||||
@testcase.attr('positive')
|
@testcase.attr('positive')
|
||||||
def test_containers_with_exipred_secrets_are_deleted(self):
|
def test_containers_with_expired_secrets_are_deleted(self):
|
||||||
"""Containers with expired secrets are deleted"""
|
"""Containers with expired secrets are deleted"""
|
||||||
current_time = utils.create_timestamp_w_tz_and_offset(seconds=10)
|
current_time = utils.create_timestamp_w_tz_and_offset(seconds=10)
|
||||||
|
|
||||||
|
@ -373,12 +373,12 @@ class MultipleSecretStoreLookupFailed(BarbicanException):
|
|||||||
|
|
||||||
class MultipleStoreIncorrectGlobalDefault(BarbicanException):
|
class MultipleStoreIncorrectGlobalDefault(BarbicanException):
|
||||||
"""Raised when a global default for only one plugin is not set to True."""
|
"""Raised when a global default for only one plugin is not set to True."""
|
||||||
def __init__(self, occurence):
|
def __init__(self, occurrence):
|
||||||
msg = None
|
msg = None
|
||||||
if occurence > 1:
|
if occurrence > 1:
|
||||||
msg = u._("There are {count} plugins with global default as "
|
msg = u._("There are {count} plugins with global default as "
|
||||||
"True in service configuration. Only one plugin can have"
|
"True in service configuration. Only one plugin can have"
|
||||||
" this as True").format(count=occurence)
|
" this as True").format(count=occurrence)
|
||||||
else:
|
else:
|
||||||
msg = u._("There is no plugin defined with global default as True."
|
msg = u._("There is no plugin defined with global default as True."
|
||||||
" One of plugin must be identified as global default")
|
" One of plugin must be identified as global default")
|
||||||
|
@ -13,7 +13,7 @@ from barbican.common import utils
|
|||||||
|
|
||||||
|
|
||||||
def convert_resource_id_to_href(resource_slug, resource_id):
|
def convert_resource_id_to_href(resource_slug, resource_id):
|
||||||
"""Convert the resouce ID to a HATEOAS-style href with resource slug."""
|
"""Convert the resource ID to a HATEOAS-style href with resource slug."""
|
||||||
if resource_id:
|
if resource_id:
|
||||||
resource = '{slug}/{id}'.format(slug=resource_slug, id=resource_id)
|
resource = '{slug}/{id}'.format(slug=resource_slug, id=resource_id)
|
||||||
else:
|
else:
|
||||||
@ -125,7 +125,7 @@ def add_nav_hrefs(resources_name, offset, limit,
|
|||||||
:param resources_name: Name of api resource
|
:param resources_name: Name of api resource
|
||||||
:param offset: Element number (ie. index) where current page starts
|
:param offset: Element number (ie. index) where current page starts
|
||||||
:param limit: Max amount of elements listed on current page
|
:param limit: Max amount of elements listed on current page
|
||||||
:param num_elements: Total number of elements
|
:param total_elements: Total number of elements
|
||||||
:returns: augmented dictionary with next and/or previous hrefs
|
:returns: augmented dictionary with next and/or previous hrefs
|
||||||
"""
|
"""
|
||||||
if offset > 0:
|
if offset > 0:
|
||||||
|
@ -30,7 +30,7 @@ except Exception:
|
|||||||
|
|
||||||
# WARNING! The following was autogenerated by Alembic as part of setting up
|
# WARNING! The following was autogenerated by Alembic as part of setting up
|
||||||
# the initial environment. Unfortunately it also **clobbers** the logging
|
# the initial environment. Unfortunately it also **clobbers** the logging
|
||||||
# for the rest of this applicaton, so please do not use it!
|
# for the rest of this application, so please do not use it!
|
||||||
# Interpret the config file for Python logging.
|
# Interpret the config file for Python logging.
|
||||||
# This line sets up loggers basically.
|
# This line sets up loggers basically.
|
||||||
# fileConfig(config.config_file_name)
|
# fileConfig(config.config_file_name)
|
||||||
|
@ -315,7 +315,7 @@ class WhenAddingOrRemovingContainerSecretsUsingContainersSecretsResource(
|
|||||||
def test_should_add_container_secret_with_trailing_slash(self):
|
def test_should_add_container_secret_with_trailing_slash(self):
|
||||||
resp, container_id = create_container(
|
resp, container_id = create_container(
|
||||||
self.app,
|
self.app,
|
||||||
name='test conatiner name',
|
name='test container name',
|
||||||
container_type='generic',
|
container_type='generic',
|
||||||
)
|
)
|
||||||
self._assert_successful_container_create(resp, container_id)
|
self._assert_successful_container_create(resp, container_id)
|
||||||
|
@ -85,7 +85,7 @@ class WhenTestingAllowBinaryContent(utils.BaseTestCase):
|
|||||||
self.assertFalse(r)
|
self.assertFalse(r)
|
||||||
|
|
||||||
def test_not_allow_with_invalid_content_type(self):
|
def test_not_allow_with_invalid_content_type(self):
|
||||||
r = mime_types.use_binary_content_as_is('invalid_conent_type',
|
r = mime_types.use_binary_content_as_is('invalid_content_type',
|
||||||
'binary')
|
'binary')
|
||||||
self.assertFalse(r)
|
self.assertFalse(r)
|
||||||
|
|
||||||
@ -214,7 +214,7 @@ class WhenTestingIfContentTypeAndEncodingSupported(utils.BaseTestCase):
|
|||||||
'plaintext_none': ['text/plain', 'base64'],
|
'plaintext_none': ['text/plain', 'base64'],
|
||||||
'octectstream_no_encoding': ['application/octet-stream', None],
|
'octectstream_no_encoding': ['application/octet-stream', None],
|
||||||
'pkcs8_no_encoding': ['application/pkcs8', None],
|
'pkcs8_no_encoding': ['application/pkcs8', None],
|
||||||
'unknown_with_valid_encoding': ['application/uknown-content-type',
|
'unknown_with_valid_encoding': ['application/unknown-content-type',
|
||||||
'base64']
|
'base64']
|
||||||
})
|
})
|
||||||
def test_content_type_encoding_not_supported(self, content_type, encoding):
|
def test_content_type_encoding_not_supported(self, content_type, encoding):
|
||||||
|
@ -66,7 +66,7 @@ class ContainerBehaviors(base_behaviors.BaseBehaviors):
|
|||||||
:param limit: limits number of returned containers
|
:param limit: limits number of returned containers
|
||||||
:param offset: represents how many records to skip before retrieving
|
:param offset: represents how many records to skip before retrieving
|
||||||
the list
|
the list
|
||||||
:param name_filter: allows you to filter results based on name
|
:param filter: allows you to filter results based on name
|
||||||
:param extra_headers: Extra headers used to retrieve a list of
|
:param extra_headers: Extra headers used to retrieve a list of
|
||||||
containers
|
containers
|
||||||
:param user_name: The user name used to get the list
|
:param user_name: The user name used to get the list
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
prelude: >
|
prelude: >
|
||||||
Now within a single deployment, multiple secret store plugin backends can
|
Now within a single deployment, multiple secret store plugin backends can
|
||||||
be configured and used. With this change, a project adminstrator can
|
be configured and used. With this change, a project administrator can
|
||||||
pre-define a preferred plugin backend for storing their secrets. New APIs
|
pre-define a preferred plugin backend for storing their secrets. New APIs
|
||||||
are added to manage this project level secret store preference.
|
are added to manage this project level secret store preference.
|
||||||
features:
|
features:
|
||||||
|
Loading…
Reference in New Issue
Block a user