bc1fb4910b
Implements server-side filtering in Identity->Projects Projects (Only V3 supports server filtering) Users (Only V3 supports server filtering) Groups Roles This filtering method allows a user to filter by several fields: - Name - UUID - Enabled Cannot implement filter by email ttps://review.openstack.org/#/c/110970/ Implements blueprint: server-side-filtering Co-Authored-By: Daniel Castellanos <luis.daniel.castellanos@intel.com> Change-Id: I37d6afdef84593e2779d21bec0c2f55e2794ab78
97 lines
3.4 KiB
Python
97 lines
3.4 KiB
Python
# Copyright 2013 Hewlett-Packard Development Company, L.P.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from django.core.urlresolvers import reverse
|
|
from django.core.urlresolvers import reverse_lazy
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
from horizon import exceptions
|
|
from horizon import forms
|
|
from horizon import messages
|
|
from horizon import tables
|
|
from horizon.utils import memoized
|
|
|
|
from openstack_dashboard import api
|
|
from openstack_dashboard import policy
|
|
|
|
from openstack_dashboard.dashboards.identity.roles \
|
|
import forms as project_forms
|
|
from openstack_dashboard.dashboards.identity.roles \
|
|
import tables as project_tables
|
|
|
|
|
|
class IndexView(tables.DataTableView):
|
|
table_class = project_tables.RolesTable
|
|
template_name = 'identity/roles/index.html'
|
|
page_title = _("Roles")
|
|
|
|
def get_data(self):
|
|
roles = []
|
|
filters = self.get_filters()
|
|
if policy.check((("identity", "identity:list_roles"),),
|
|
self.request):
|
|
try:
|
|
roles = api.keystone.role_list(self.request,
|
|
filters=filters)
|
|
except Exception:
|
|
exceptions.handle(self.request,
|
|
_('Unable to retrieve roles list.'))
|
|
else:
|
|
msg = _("Insufficient privilege level to view role information.")
|
|
messages.info(self.request, msg)
|
|
return roles
|
|
|
|
|
|
class UpdateView(forms.ModalFormView):
|
|
template_name = 'identity/roles/update.html'
|
|
modal_header = _("Update Role")
|
|
form_id = "update_role_form"
|
|
form_class = project_forms.UpdateRoleForm
|
|
submit_label = _("Update Role")
|
|
submit_url = "horizon:identity:roles:update"
|
|
success_url = reverse_lazy('horizon:identity:roles:index')
|
|
page_title = _("Update Role")
|
|
|
|
@memoized.memoized_method
|
|
def get_object(self):
|
|
try:
|
|
return api.keystone.role_get(self.request, self.kwargs['role_id'])
|
|
except Exception:
|
|
redirect = reverse("horizon:identity:roles:index")
|
|
exceptions.handle(self.request,
|
|
_('Unable to update role.'),
|
|
redirect=redirect)
|
|
|
|
def get_context_data(self, **kwargs):
|
|
context = super(UpdateView, self).get_context_data(**kwargs)
|
|
args = (self.get_object().id,)
|
|
context['submit_url'] = reverse(self.submit_url, args=args)
|
|
return context
|
|
|
|
def get_initial(self):
|
|
role = self.get_object()
|
|
return {'id': role.id,
|
|
'name': role.name}
|
|
|
|
|
|
class CreateView(forms.ModalFormView):
|
|
template_name = 'identity/roles/create.html'
|
|
modal_header = _("Create Role")
|
|
form_id = "create_role_form"
|
|
form_class = project_forms.CreateRoleForm
|
|
submit_label = _("Create Role")
|
|
submit_url = reverse_lazy("horizon:identity:roles:create")
|
|
success_url = reverse_lazy('horizon:identity:roles:index')
|
|
page_title = _("Create Role")
|