263b27f2cd
We don't need vim modelines in each source file, it can be set in user's vimrc. Change-Id: Ie51ad62946afdf39eadcd59edaf8134ec10265c6 Closes-Bug: #1229324
56 lines
2.1 KiB
Python
56 lines
2.1 KiB
Python
# Copyright 2012 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
"""WSGI Routers for the Identity service."""
|
|
|
|
from keystone.trust import controllers
|
|
|
|
|
|
def append_v3_routers(mapper, routers):
|
|
trust_controller = controllers.TrustV3()
|
|
|
|
mapper.connect('/OS-TRUST/trusts',
|
|
controller=trust_controller,
|
|
action='create_trust',
|
|
conditions=dict(method=['POST']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts',
|
|
controller=trust_controller,
|
|
action='list_trusts',
|
|
conditions=dict(method=['GET']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts/{trust_id}',
|
|
controller=trust_controller,
|
|
action='delete_trust',
|
|
conditions=dict(method=['DELETE']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts/{trust_id}',
|
|
controller=trust_controller,
|
|
action='get_trust',
|
|
conditions=dict(method=['GET']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts/{trust_id}/roles',
|
|
controller=trust_controller,
|
|
action='list_roles_for_trust',
|
|
conditions=dict(method=['GET']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts/{trust_id}/roles/{role_id}',
|
|
controller=trust_controller,
|
|
action='check_role_for_trust',
|
|
conditions=dict(method=['HEAD']))
|
|
|
|
mapper.connect('/OS-TRUST/trusts/{trust_id}/roles/{role_id}',
|
|
controller=trust_controller,
|
|
action='get_role_for_trust',
|
|
conditions=dict(method=['GET']))
|