identity/v3 trust resource

This patch provides support for trust of keystone v3 API.

Change-Id: Icf79e962a30d7066b68021a173a0c0aadd2d06bc
This commit is contained in:
yanyanhu
2015-04-01 02:27:10 -04:00
parent 5359cceee8
commit d8d4400be5
2 changed files with 108 additions and 0 deletions

View File

@@ -0,0 +1,57 @@
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from openstack.identity import identity_service
from openstack import resource
class Trust(resource.Resource):
resource_key = 'trust'
resources_key = 'trusts'
base_path = '/OS-TRUST/trusts'
service = identity_service.IdentityService()
# capabilities
allow_create = True
allow_delete = True
allow_list = True
allow_retrieve = True
# Properties
#: Identifies the project upon which the trustor is
#: delegating authorization. *Type: string*
project_id = resource.prop('project_id')
#: Specifies the expiration time of the trust. A trust may be revoked
#: ahead of expiration. If the value represents a time in the past,
#: the trust is deactivated. *Type: string*
expires_at = resource.prop('expires_at')
#: Identity of the trust object. *Type: string*
id = resource.prop('id')
#: If ``impersonation`` is set to true, then the ``user`` attribute
#: of tokens that are generated based on the trust will represent
#: that of the trustor rather than the trustee, thus allowing the trustee
#: to impersonate the trustor.
#: If ``impersonation`` is set to ``false``, then the token's ``user``
#: attribute will represent that of the trustee. *Type: boolean*
impersonation = resource.prop('impersonation')
#: Represents the user who is capable of consuming the trust.
#: *Type: string*
trustee_user_id = resource.prop('trustee_user_id')
#: Represents the user who created the trust, and who's authorization is
#: being delegated. *Type: string*
trustor_user_id = resource.prop('trustor_user_id')
#: Specifies the subset of the trustor's roles on the ``project_id``
#: to be granted to the trustee when the token in consumed. The
#: trustor must already be granted these roles in the project referenced
#: by the ``project_id`` attribute. *Type: list*
roles = resource.prop('roles')

View File

@@ -0,0 +1,51 @@
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import testtools
from openstack.identity.v3 import trust
IDENTIFIER = 'IDENTIFIER'
EXAMPLE = {
'project_id': '1',
'expires_at': '2020-01-01T18:30:59.999999Z',
'id': IDENTIFIER,
'impersonation': True,
'trustee_user_id': '2',
'trustor_user_id': '3',
'roles': [{'name': 'test-role'}],
}
class TestTrust(testtools.TestCase):
def test_basic(self):
sot = trust.Trust()
self.assertEqual('trust', sot.resource_key)
self.assertEqual('trusts', sot.resources_key)
self.assertEqual('/OS-TRUST/trusts', sot.base_path)
self.assertEqual('identity', sot.service.service_type)
self.assertTrue(sot.allow_create)
self.assertTrue(sot.allow_retrieve)
self.assertTrue(sot.allow_delete)
self.assertTrue(sot.allow_list)
def test_make_it(self):
sot = trust.Trust(EXAMPLE)
self.assertEqual(EXAMPLE['project_id'],
sot.project_id)
self.assertEqual(EXAMPLE['expires_at'], sot.expires_at)
self.assertEqual(EXAMPLE['id'], sot.id)
self.assertEqual(EXAMPLE['impersonation'], sot.impersonation)
self.assertEqual(EXAMPLE['trustee_user_id'], sot.trustee_user_id)
self.assertEqual(EXAMPLE['trustor_user_id'], sot.trustor_user_id)
self.assertEqual(EXAMPLE['roles'], sot.roles)