identity/v3 trust resource
This patch provides support for trust of keystone v3 API. Change-Id: Icf79e962a30d7066b68021a173a0c0aadd2d06bc
This commit is contained in:
57
openstack/identity/v3/trust.py
Normal file
57
openstack/identity/v3/trust.py
Normal file
@@ -0,0 +1,57 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
|
||||
from openstack.identity import identity_service
|
||||
from openstack import resource
|
||||
|
||||
|
||||
class Trust(resource.Resource):
|
||||
resource_key = 'trust'
|
||||
resources_key = 'trusts'
|
||||
base_path = '/OS-TRUST/trusts'
|
||||
service = identity_service.IdentityService()
|
||||
|
||||
# capabilities
|
||||
allow_create = True
|
||||
allow_delete = True
|
||||
allow_list = True
|
||||
allow_retrieve = True
|
||||
|
||||
# Properties
|
||||
#: Identifies the project upon which the trustor is
|
||||
#: delegating authorization. *Type: string*
|
||||
project_id = resource.prop('project_id')
|
||||
#: Specifies the expiration time of the trust. A trust may be revoked
|
||||
#: ahead of expiration. If the value represents a time in the past,
|
||||
#: the trust is deactivated. *Type: string*
|
||||
expires_at = resource.prop('expires_at')
|
||||
#: Identity of the trust object. *Type: string*
|
||||
id = resource.prop('id')
|
||||
#: If ``impersonation`` is set to true, then the ``user`` attribute
|
||||
#: of tokens that are generated based on the trust will represent
|
||||
#: that of the trustor rather than the trustee, thus allowing the trustee
|
||||
#: to impersonate the trustor.
|
||||
#: If ``impersonation`` is set to ``false``, then the token's ``user``
|
||||
#: attribute will represent that of the trustee. *Type: boolean*
|
||||
impersonation = resource.prop('impersonation')
|
||||
#: Represents the user who is capable of consuming the trust.
|
||||
#: *Type: string*
|
||||
trustee_user_id = resource.prop('trustee_user_id')
|
||||
#: Represents the user who created the trust, and who's authorization is
|
||||
#: being delegated. *Type: string*
|
||||
trustor_user_id = resource.prop('trustor_user_id')
|
||||
#: Specifies the subset of the trustor's roles on the ``project_id``
|
||||
#: to be granted to the trustee when the token in consumed. The
|
||||
#: trustor must already be granted these roles in the project referenced
|
||||
#: by the ``project_id`` attribute. *Type: list*
|
||||
roles = resource.prop('roles')
|
||||
51
openstack/tests/unit/identity/v3/test_trust.py
Normal file
51
openstack/tests/unit/identity/v3/test_trust.py
Normal file
@@ -0,0 +1,51 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import testtools
|
||||
|
||||
from openstack.identity.v3 import trust
|
||||
|
||||
IDENTIFIER = 'IDENTIFIER'
|
||||
EXAMPLE = {
|
||||
'project_id': '1',
|
||||
'expires_at': '2020-01-01T18:30:59.999999Z',
|
||||
'id': IDENTIFIER,
|
||||
'impersonation': True,
|
||||
'trustee_user_id': '2',
|
||||
'trustor_user_id': '3',
|
||||
'roles': [{'name': 'test-role'}],
|
||||
}
|
||||
|
||||
|
||||
class TestTrust(testtools.TestCase):
|
||||
|
||||
def test_basic(self):
|
||||
sot = trust.Trust()
|
||||
self.assertEqual('trust', sot.resource_key)
|
||||
self.assertEqual('trusts', sot.resources_key)
|
||||
self.assertEqual('/OS-TRUST/trusts', sot.base_path)
|
||||
self.assertEqual('identity', sot.service.service_type)
|
||||
self.assertTrue(sot.allow_create)
|
||||
self.assertTrue(sot.allow_retrieve)
|
||||
self.assertTrue(sot.allow_delete)
|
||||
self.assertTrue(sot.allow_list)
|
||||
|
||||
def test_make_it(self):
|
||||
sot = trust.Trust(EXAMPLE)
|
||||
self.assertEqual(EXAMPLE['project_id'],
|
||||
sot.project_id)
|
||||
self.assertEqual(EXAMPLE['expires_at'], sot.expires_at)
|
||||
self.assertEqual(EXAMPLE['id'], sot.id)
|
||||
self.assertEqual(EXAMPLE['impersonation'], sot.impersonation)
|
||||
self.assertEqual(EXAMPLE['trustee_user_id'], sot.trustee_user_id)
|
||||
self.assertEqual(EXAMPLE['trustor_user_id'], sot.trustor_user_id)
|
||||
self.assertEqual(EXAMPLE['roles'], sot.roles)
|
||||
Reference in New Issue
Block a user