Remove six usage
This repo does not support Python 2 anymore, so we don't need six for compatibility between Python2 and 3, convert six usage to Python 3 code. Change-Id: Icba56808f38277b27af2ae5aac4b8507dee71b3b
This commit is contained in:
parent
7bb26ffd15
commit
4530041931
@ -12,10 +12,7 @@
|
||||
|
||||
# Common base resource for EC2 and S3 Authentication
|
||||
|
||||
import sys
|
||||
|
||||
from oslo_serialization import jsonutils
|
||||
import six
|
||||
from werkzeug import exceptions
|
||||
|
||||
from keystone.common import provider_api
|
||||
@ -102,10 +99,7 @@ class ResourceBase(ks_flask.ResourceBase):
|
||||
PROVIDERS.resource_api.assert_project_enabled(
|
||||
project_id=project_ref['id'], project=project_ref)
|
||||
except AssertionError as e:
|
||||
six.reraise(
|
||||
ks_exceptions.Unauthorized,
|
||||
ks_exceptions.Unauthorized(e),
|
||||
sys.exc_info()[2])
|
||||
raise ks_exceptions.Unauthorized from e
|
||||
|
||||
roles = PROVIDERS.assignment_api.get_roles_for_user_and_project(
|
||||
user_ref['id'], project_ref['id'])
|
||||
|
@ -19,7 +19,6 @@
|
||||
|
||||
import flask
|
||||
from oslo_log import log
|
||||
import six
|
||||
|
||||
from keystone.auth import core
|
||||
from keystone.common import provider_api
|
||||
@ -55,7 +54,7 @@ def _check_and_set_default_scoping(auth_info, auth_context):
|
||||
try:
|
||||
user_ref = PROVIDERS.identity_api.get_user(auth_context['user_id'])
|
||||
except exception.UserNotFound as e:
|
||||
LOG.warning(six.text_type(e))
|
||||
LOG.warning(e)
|
||||
raise exception.Unauthorized(e)
|
||||
|
||||
default_project_id = user_ref.get('default_project_id')
|
||||
@ -235,7 +234,7 @@ def authenticate_for_token(auth=None):
|
||||
|
||||
return token
|
||||
except exception.TrustNotFound as e:
|
||||
LOG.warning(six.text_type(e))
|
||||
LOG.warning(e)
|
||||
raise exception.Unauthorized(e)
|
||||
|
||||
|
||||
|
@ -15,11 +15,11 @@ import string
|
||||
|
||||
import flask
|
||||
import flask_restful
|
||||
import http.client
|
||||
from oslo_log import log
|
||||
from oslo_serialization import jsonutils
|
||||
from oslo_utils import strutils
|
||||
from six.moves import http_client
|
||||
from six.moves import urllib
|
||||
import urllib
|
||||
import werkzeug.exceptions
|
||||
|
||||
from keystone.api._shared import authentication
|
||||
@ -107,7 +107,7 @@ class _AuthFederationWebSSOBase(ks_flask.ResourceBase):
|
||||
src = string.Template(template.read())
|
||||
subs = {'host': host, 'token': token_id}
|
||||
body = src.substitute(subs)
|
||||
resp = flask.make_response(body, http_client.OK)
|
||||
resp = flask.make_response(body, http.client.OK)
|
||||
resp.charset = 'utf-8'
|
||||
resp.headers['Content-Type'] = 'text/html'
|
||||
return resp
|
||||
@ -298,7 +298,7 @@ class AuthTokenResource(_AuthFederationWebSSOBase):
|
||||
token_resp = render_token.render_token_response_from_model(
|
||||
token, include_catalog=include_catalog)
|
||||
resp_body = jsonutils.dumps(token_resp)
|
||||
response = flask.make_response(resp_body, http_client.OK)
|
||||
response = flask.make_response(resp_body, http.client.OK)
|
||||
response.headers['X-Subject-Token'] = token_id
|
||||
response.headers['Content-Type'] = 'application/json'
|
||||
return response
|
||||
@ -317,7 +317,7 @@ class AuthTokenResource(_AuthFederationWebSSOBase):
|
||||
token, include_catalog=include_catalog
|
||||
)
|
||||
resp_body = jsonutils.dumps(resp_data)
|
||||
response = flask.make_response(resp_body, http_client.CREATED)
|
||||
response = flask.make_response(resp_body, http.client.CREATED)
|
||||
response.headers['X-Subject-Token'] = token.id
|
||||
response.headers['Content-Type'] = 'application/json'
|
||||
return response
|
||||
@ -331,7 +331,7 @@ class AuthTokenResource(_AuthFederationWebSSOBase):
|
||||
token_id = flask.request.headers.get(
|
||||
authorization.SUBJECT_TOKEN_HEADER)
|
||||
PROVIDERS.token_provider_api.revoke_token(token_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class AuthFederationWebSSOResource(_AuthFederationWebSSOBase):
|
||||
@ -404,7 +404,7 @@ class AuthFederationSaml2Resource(_AuthFederationWebSSOBase):
|
||||
validation.lazy_validate(federation_schema.saml_create, auth)
|
||||
response, service_provider = saml.create_base_saml_assertion(auth)
|
||||
headers = _build_response_headers(service_provider)
|
||||
response = flask.make_response(response.to_string(), http_client.OK)
|
||||
response = flask.make_response(response.to_string(), http.client.OK)
|
||||
for header, value in headers:
|
||||
response.headers[header] = value
|
||||
return response
|
||||
@ -431,7 +431,7 @@ class AuthFederationSaml2ECPResource(_AuthFederationWebSSOBase):
|
||||
saml_assertion, relay_state_prefix)
|
||||
headers = _build_response_headers(service_provider)
|
||||
response = flask.make_response(
|
||||
ecp_assertion.to_string(), http_client.OK)
|
||||
ecp_assertion.to_string(), http.client.OK)
|
||||
for header, value in headers:
|
||||
response.headers[header] = value
|
||||
return response
|
||||
|
@ -15,8 +15,8 @@
|
||||
import hashlib
|
||||
|
||||
import flask
|
||||
import http.client
|
||||
from oslo_serialization import jsonutils
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.common import provider_api
|
||||
from keystone.common import rbac_enforcer
|
||||
@ -150,7 +150,7 @@ class CredentialResource(ks_flask.ResourceBase):
|
||||
self._normalize_dict(credential), trust_id=trust_id)
|
||||
ref = PROVIDERS.credential_api.create_credential(
|
||||
ref['id'], ref, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, credential_id):
|
||||
# Update Credential
|
||||
@ -176,7 +176,7 @@ class CredentialResource(ks_flask.ResourceBase):
|
||||
|
||||
return (PROVIDERS.credential_api.delete_credential(
|
||||
credential_id, initiator=self.audit_initiator),
|
||||
http_client.NO_CONTENT)
|
||||
http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class CredentialAPI(ks_flask.APIBase):
|
||||
|
@ -12,8 +12,8 @@
|
||||
|
||||
import flask
|
||||
from flask import request
|
||||
import http.client
|
||||
from oslo_serialization import jsonutils
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.common import json_home
|
||||
import keystone.conf
|
||||
@ -79,7 +79,7 @@ def get_versions():
|
||||
{'versions': {
|
||||
'values': list(versions.values())}}),
|
||||
mimetype=MimeTypes.JSON,
|
||||
status=http_client.MULTIPLE_CHOICES)
|
||||
status=http.client.MULTIPLE_CHOICES)
|
||||
response.headers['Location'] = preferred_location
|
||||
return response
|
||||
|
||||
|
@ -15,7 +15,7 @@
|
||||
import flask
|
||||
import flask_restful
|
||||
import functools
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.common import json_home
|
||||
from keystone.common import provider_api
|
||||
@ -127,7 +127,7 @@ class DomainResource(ks_flask.ResourceBase):
|
||||
domain = self._normalize_dict(domain)
|
||||
ref = PROVIDERS.resource_api.create_domain(
|
||||
domain['id'], domain, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, domain_id):
|
||||
"""Update domain.
|
||||
@ -150,7 +150,7 @@ class DomainResource(ks_flask.ResourceBase):
|
||||
ENFORCER.enforce_call(action='identity:delete_domain')
|
||||
PROVIDERS.resource_api.delete_domain(
|
||||
domain_id, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class DomainConfigBase(ks_flask.ResourceBase):
|
||||
@ -217,7 +217,7 @@ class DomainConfigBase(ks_flask.ResourceBase):
|
||||
PROVIDERS.resource_api.get_domain(domain_id)
|
||||
PROVIDERS.domain_config_api.delete_config(
|
||||
domain_id, group, option=option)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class DomainConfigResource(DomainConfigBase):
|
||||
@ -247,7 +247,7 @@ class DomainConfigResource(DomainConfigBase):
|
||||
if original_config:
|
||||
return {self.member_key: ref}
|
||||
else:
|
||||
return {self.member_key: ref}, http_client.CREATED
|
||||
return {self.member_key: ref}, http.client.CREATED
|
||||
|
||||
|
||||
class DomainConfigGroupResource(DomainConfigBase):
|
||||
@ -337,7 +337,7 @@ class DomainUserResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
role_id, domain_id=domain_id, user_id=user_id,
|
||||
inherited_to_projects=False)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, domain_id=None, user_id=None, role_id=None):
|
||||
"""Create a role to a user on a domain.
|
||||
@ -350,7 +350,7 @@ class DomainUserResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
role_id, domain_id=domain_id, user_id=user_id,
|
||||
inherited_to_projects=False, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, domain_id=None, user_id=None, role_id=None):
|
||||
"""Revoke a role from user on a domain.
|
||||
@ -364,7 +364,7 @@ class DomainUserResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
role_id, domain_id=domain_id, user_id=user_id,
|
||||
inherited_to_projects=False, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class DomainGroupListResource(flask_restful.Resource):
|
||||
@ -398,7 +398,7 @@ class DomainGroupResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
role_id, domain_id=domain_id, group_id=group_id,
|
||||
inherited_to_projects=False)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, domain_id=None, group_id=None, role_id=None):
|
||||
"""Grant a role to a group on a domain.
|
||||
@ -411,7 +411,7 @@ class DomainGroupResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
role_id, domain_id=domain_id, group_id=group_id,
|
||||
inherited_to_projects=False, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, domain_id=None, group_id=None, role_id=None):
|
||||
"""Revoke a role from a group on a domain.
|
||||
@ -425,7 +425,7 @@ class DomainGroupResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
role_id, domain_id=domain_id, group_id=group_id,
|
||||
inherited_to_projects=False, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class DomainAPI(ks_flask.APIBase):
|
||||
|
@ -13,9 +13,9 @@
|
||||
# This file handles all flask-restful resources for /v3/ec2tokens
|
||||
|
||||
import flask
|
||||
import http.client
|
||||
from keystoneclient.contrib.ec2 import utils as ec2_utils
|
||||
from oslo_serialization import jsonutils
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.api._shared import EC2_S3_Resource
|
||||
from keystone.api._shared import json_home_relations
|
||||
@ -67,7 +67,7 @@ class EC2TokensResource(EC2_S3_Resource.ResourceBase):
|
||||
token = self.handle_authenticate()
|
||||
token_reference = render_token.render_token_response_from_model(token)
|
||||
resp_body = jsonutils.dumps(token_reference)
|
||||
response = flask.make_response(resp_body, http_client.OK)
|
||||
response = flask.make_response(resp_body, http.client.OK)
|
||||
response.headers['X-Subject-Token'] = token.id
|
||||
response.headers['Content-Type'] = 'application/json'
|
||||
return response
|
||||
|
@ -13,7 +13,7 @@
|
||||
# This file handles all flask-restful resources for /v3/services
|
||||
|
||||
import flask_restful
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.api._shared import json_home_relations
|
||||
from keystone.catalog import schema
|
||||
@ -97,7 +97,7 @@ class EndpointResource(ks_flask.ResourceBase):
|
||||
endpoint = self._validate_endpoint_region(endpoint)
|
||||
ref = PROVIDERS.catalog_api.create_endpoint(
|
||||
endpoint['id'], endpoint, initiator=self.audit_initiator)
|
||||
return self.wrap_member(_filter_endpoint(ref)), http_client.CREATED
|
||||
return self.wrap_member(_filter_endpoint(ref)), http.client.CREATED
|
||||
|
||||
def patch(self, endpoint_id):
|
||||
ENFORCER.enforce_call(action='identity:update_endpoint')
|
||||
@ -113,7 +113,7 @@ class EndpointResource(ks_flask.ResourceBase):
|
||||
ENFORCER.enforce_call(action='identity:delete_endpoint')
|
||||
PROVIDERS.catalog_api.delete_endpoint(endpoint_id,
|
||||
initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class EndpointPolicyEndpointResource(flask_restful.Resource):
|
||||
|
@ -15,7 +15,7 @@
|
||||
import flask
|
||||
import flask_restful
|
||||
import functools
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.common import json_home
|
||||
from keystone.common import provider_api
|
||||
@ -107,7 +107,7 @@ class GroupsResource(ks_flask.ResourceBase):
|
||||
group = self._normalize_domain_id(group)
|
||||
ref = PROVIDERS.identity_api.create_group(
|
||||
group, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, group_id):
|
||||
"""Update group.
|
||||
@ -133,7 +133,7 @@ class GroupsResource(ks_flask.ResourceBase):
|
||||
ENFORCER.enforce_call(action='identity:delete_group')
|
||||
PROVIDERS.identity_api.delete_group(
|
||||
group_id, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class GroupUsersResource(ks_flask.ResourceBase):
|
||||
@ -194,7 +194,7 @@ class UserGroupCRUDResource(flask_restful.Resource):
|
||||
build_target=functools.partial(self._build_enforcement_target_attr,
|
||||
user_id, group_id))
|
||||
PROVIDERS.identity_api.check_user_in_group(user_id, group_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, group_id, user_id):
|
||||
"""Add user to group.
|
||||
@ -207,7 +207,7 @@ class UserGroupCRUDResource(flask_restful.Resource):
|
||||
user_id, group_id))
|
||||
PROVIDERS.identity_api.add_user_to_group(
|
||||
user_id, group_id, initiator=notifications.build_audit_initiator())
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, group_id, user_id):
|
||||
"""Remove user from group.
|
||||
@ -220,7 +220,7 @@ class UserGroupCRUDResource(flask_restful.Resource):
|
||||
user_id, group_id))
|
||||
PROVIDERS.identity_api.remove_user_from_group(
|
||||
user_id, group_id, initiator=notifications.build_audit_initiator())
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class GroupAPI(ks_flask.APIBase):
|
||||
|
@ -14,7 +14,7 @@
|
||||
|
||||
import flask
|
||||
import flask_restful
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.common import json_home
|
||||
from keystone.common import provider_api
|
||||
@ -110,7 +110,7 @@ class LimitsResource(ks_flask.ResourceBase):
|
||||
refs = PROVIDERS.unified_limit_api.create_limits(limits)
|
||||
refs = self.wrap_collection(refs)
|
||||
refs.pop('links')
|
||||
return refs, http_client.CREATED
|
||||
return refs, http.client.CREATED
|
||||
|
||||
def patch(self, limit_id):
|
||||
ENFORCER.enforce_call(action='identity:update_limit')
|
||||
@ -124,7 +124,7 @@ class LimitsResource(ks_flask.ResourceBase):
|
||||
def delete(self, limit_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_limit')
|
||||
return (PROVIDERS.unified_limit_api.delete_limit(limit_id),
|
||||
http_client.NO_CONTENT)
|
||||
http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class LimitModelResource(flask_restful.Resource):
|
||||
|
@ -13,7 +13,7 @@
|
||||
# This file handles all flask-restful resources for /OS-EP-FILTER
|
||||
|
||||
import flask_restful
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.api._shared import json_home_relations
|
||||
from keystone.api import endpoints as _endpoints_api
|
||||
@ -90,7 +90,7 @@ class EndpointGroupsResource(ks_flask.ResourceBase):
|
||||
self._require_valid_filter(ep_group)
|
||||
ep_group = self._assign_unique_id(ep_group)
|
||||
return self.wrap_member(PROVIDERS.catalog_api.create_endpoint_group(
|
||||
ep_group['id'], ep_group)), http_client.CREATED
|
||||
ep_group['id'], ep_group)), http.client.CREATED
|
||||
|
||||
def patch(self, endpoint_group_id):
|
||||
ENFORCER.enforce_call(action='identity:update_endpoint_group')
|
||||
@ -105,7 +105,7 @@ class EndpointGroupsResource(ks_flask.ResourceBase):
|
||||
def delete(self, endpoint_group_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_endpoint_group')
|
||||
return (PROVIDERS.catalog_api.delete_endpoint_group(endpoint_group_id),
|
||||
http_client.NO_CONTENT)
|
||||
http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class EPFilterEndpointProjectsResource(flask_restful.Resource):
|
||||
@ -127,19 +127,19 @@ class EPFilterProjectsEndpointsResource(flask_restful.Resource):
|
||||
PROVIDERS.resource_api.get_project(project_id)
|
||||
PROVIDERS.catalog_api.check_endpoint_in_project(
|
||||
endpoint_id, project_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, endpoint_id):
|
||||
ENFORCER.enforce_call(action='identity:add_endpoint_to_project')
|
||||
PROVIDERS.catalog_api.get_endpoint(endpoint_id)
|
||||
PROVIDERS.resource_api.get_project(project_id)
|
||||
PROVIDERS.catalog_api.add_endpoint_to_project(endpoint_id, project_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, project_id, endpoint_id):
|
||||
ENFORCER.enforce_call(action='identity:remove_endpoint_from_project')
|
||||
return (PROVIDERS.catalog_api.remove_endpoint_from_project(
|
||||
endpoint_id, project_id), http_client.NO_CONTENT)
|
||||
endpoint_id, project_id), http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class EPFilterProjectEndpointsListResource(flask_restful.Resource):
|
||||
@ -219,7 +219,7 @@ class EPFilterGroupsProjectsResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.catalog_api.get_endpoint_group(endpoint_group_id)
|
||||
PROVIDERS.catalog_api.add_endpoint_group_to_project(
|
||||
endpoint_group_id, project_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, endpoint_group_id, project_id):
|
||||
ENFORCER.enforce_call(
|
||||
@ -228,7 +228,7 @@ class EPFilterGroupsProjectsResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.catalog_api.get_endpoint_group(endpoint_group_id)
|
||||
PROVIDERS.catalog_api.remove_endpoint_group_from_project(
|
||||
endpoint_group_id, project_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class EPFilterAPI(ks_flask.APIBase):
|
||||
|
@ -14,8 +14,8 @@
|
||||
|
||||
import flask
|
||||
import flask_restful
|
||||
import http.client
|
||||
from oslo_serialization import jsonutils
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.api._shared import authentication
|
||||
from keystone.api._shared import json_home_relations
|
||||
@ -137,7 +137,7 @@ class IdentityProvidersResource(_ResourceBase):
|
||||
idp.setdefault('enabled', False)
|
||||
idp_ref = PROVIDERS.federation_api.create_idp(
|
||||
idp_id, idp)
|
||||
return self.wrap_member(idp_ref), http_client.CREATED
|
||||
return self.wrap_member(idp_ref), http.client.CREATED
|
||||
|
||||
def patch(self, idp_id):
|
||||
ENFORCER.enforce_call(action='identity:update_identity_provider')
|
||||
@ -151,7 +151,7 @@ class IdentityProvidersResource(_ResourceBase):
|
||||
def delete(self, idp_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_identity_provider')
|
||||
PROVIDERS.federation_api.delete_idp(idp_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class _IdentityProvidersProtocolsResourceBase(_ResourceBase):
|
||||
@ -218,7 +218,7 @@ class IDPProtocolsCRUDResource(_IdentityProvidersProtocolsResourceBase):
|
||||
protocol = self._normalize_dict(protocol)
|
||||
ref = PROVIDERS.federation_api.create_protocol(idp_id, protocol_id,
|
||||
protocol)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, idp_id, protocol_id):
|
||||
"""Update protocol for an IDP.
|
||||
@ -241,7 +241,7 @@ class IDPProtocolsCRUDResource(_IdentityProvidersProtocolsResourceBase):
|
||||
"""
|
||||
ENFORCER.enforce_call(action='identity:delete_protocol')
|
||||
PROVIDERS.federation_api.delete_protocol(idp_id, protocol_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class MappingResource(_ResourceBase):
|
||||
@ -282,7 +282,7 @@ class MappingResource(_ResourceBase):
|
||||
utils.validate_mapping_structure(mapping)
|
||||
mapping_ref = PROVIDERS.federation_api.create_mapping(
|
||||
mapping_id, mapping)
|
||||
return self.wrap_member(mapping_ref), http_client.CREATED
|
||||
return self.wrap_member(mapping_ref), http.client.CREATED
|
||||
|
||||
def patch(self, mapping_id):
|
||||
"""Update a mapping.
|
||||
@ -304,7 +304,7 @@ class MappingResource(_ResourceBase):
|
||||
"""
|
||||
ENFORCER.enforce_call(action='identity:delete_mapping')
|
||||
PROVIDERS.federation_api.delete_mapping(mapping_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ServiceProvidersResource(_ResourceBase):
|
||||
@ -355,7 +355,7 @@ class ServiceProvidersResource(_ResourceBase):
|
||||
sp.setdefault('relay_state_prefix',
|
||||
CONF.saml.relay_state_prefix)
|
||||
sp_ref = PROVIDERS.federation_api.create_sp(sp_id, sp)
|
||||
return self.wrap_member(sp_ref), http_client.CREATED
|
||||
return self.wrap_member(sp_ref), http.client.CREATED
|
||||
|
||||
def patch(self, sp_id):
|
||||
"""Update a service provider.
|
||||
@ -376,7 +376,7 @@ class ServiceProvidersResource(_ResourceBase):
|
||||
"""
|
||||
ENFORCER.enforce_call(action='identity:delete_service_provider')
|
||||
PROVIDERS.federation_api.delete_sp(sp_id)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class SAML2MetadataResource(flask_restful.Resource):
|
||||
@ -393,7 +393,7 @@ class SAML2MetadataResource(flask_restful.Resource):
|
||||
except IOError as e:
|
||||
# Raise HTTP 500 in case Metadata file cannot be read.
|
||||
raise exception.MetadataFileError(reason=e)
|
||||
resp = flask.make_response(metadata, http_client.OK)
|
||||
resp = flask.make_response(metadata, http.client.OK)
|
||||
resp.headers['Content-Type'] = 'text/xml'
|
||||
return resp
|
||||
|
||||
@ -436,7 +436,7 @@ class OSFederationAuthResource(flask_restful.Resource):
|
||||
token = authentication.authenticate_for_token(auth)
|
||||
token_data = render_token.render_token_response_from_model(token)
|
||||
resp_data = jsonutils.dumps(token_data)
|
||||
flask_resp = flask.make_response(resp_data, http_client.CREATED)
|
||||
flask_resp = flask.make_response(resp_data, http.client.CREATED)
|
||||
flask_resp.headers['X-Subject-Token'] = token.id
|
||||
flask_resp.headers['Content-Type'] = 'application/json'
|
||||
return flask_resp
|
||||
|
@ -14,8 +14,8 @@
|
||||
|
||||
import flask_restful
|
||||
import functools
|
||||
import http.client
|
||||
from oslo_log import log
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.api._shared import json_home_relations
|
||||
from keystone.common import json_home
|
||||
@ -118,7 +118,7 @@ class OSInheritDomainGroupRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
domain_id=domain_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, domain_id, group_id, role_id):
|
||||
"""Create an inherited grant for a group on a domain.
|
||||
@ -135,7 +135,7 @@ class OSInheritDomainGroupRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
domain_id=domain_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, domain_id, group_id, role_id):
|
||||
"""Revoke an inherited grant for a group on a domain.
|
||||
@ -152,7 +152,7 @@ class OSInheritDomainGroupRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
domain_id=domain_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class OSInheritDomainGroupRolesListResource(flask_restful.Resource):
|
||||
@ -189,7 +189,7 @@ class OSInheritDomainUserRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
domain_id=domain_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, domain_id, user_id, role_id):
|
||||
"""Create an inherited grant for a user on a domain.
|
||||
@ -206,7 +206,7 @@ class OSInheritDomainUserRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
domain_id=domain_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, domain_id, user_id, role_id):
|
||||
"""Revoke a grant from a user on a domain.
|
||||
@ -223,7 +223,7 @@ class OSInheritDomainUserRolesResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
domain_id=domain_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class OSInheritDomainUserRolesListResource(flask_restful.Resource):
|
||||
@ -260,7 +260,7 @@ class OSInheritProjectUserResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
project_id=project_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, user_id, role_id):
|
||||
"""Create an inherited grant for a user on a project.
|
||||
@ -277,7 +277,7 @@ class OSInheritProjectUserResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
project_id=project_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, project_id, user_id, role_id):
|
||||
"""Revoke an inherited grant for a user on a project.
|
||||
@ -294,7 +294,7 @@ class OSInheritProjectUserResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
project_id=project_id, user_id=user_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class OSInheritProjectGroupResource(flask_restful.Resource):
|
||||
@ -313,7 +313,7 @@ class OSInheritProjectGroupResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
project_id=project_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, group_id, role_id):
|
||||
"""Create an inherited grant for a group on a project.
|
||||
@ -330,7 +330,7 @@ class OSInheritProjectGroupResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
project_id=project_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, project_id, group_id, role_id):
|
||||
"""Revoke an inherited grant for a group on a project.
|
||||
@ -347,7 +347,7 @@ class OSInheritProjectGroupResource(flask_restful.Resource):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
project_id=project_id, group_id=group_id, role_id=role_id,
|
||||
inherited_to_projects=True)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class OSInheritAPI(ks_flask.APIBase):
|
||||
|
@ -14,10 +14,10 @@
|
||||
|
||||
import flask
|
||||
import flask_restful
|
||||
import http.client
|
||||
from oslo_log import log
|
||||
from oslo_utils import timeutils
|
||||
from six.moves import http_client
|
||||
from six.moves.urllib import parse as urlparse
|
||||
from urllib import parse as urlparse
|
||||
from werkzeug import exceptions
|
||||
|
||||
from keystone.api._shared import json_home_relations
|
||||
@ -108,7 +108,7 @@ class ConsumerResource(ks_flask.ResourceBase):
|
||||
consumer = self._assign_unique_id(consumer)
|
||||
ref = PROVIDERS.oauth_api.create_consumer(
|
||||
consumer, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def delete(self, consumer_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_consumer')
|
||||
@ -122,7 +122,7 @@ class ConsumerResource(ks_flask.ResourceBase):
|
||||
notifications.invalidate_token_cache_notification(reason)
|
||||
PROVIDERS.oauth_api.delete_consumer(
|
||||
consumer_id, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def patch(self, consumer_id):
|
||||
ENFORCER.enforce_call(action='identity:update_consumer')
|
||||
@ -184,7 +184,7 @@ class RequestTokenResource(_OAuth1ResourceBase):
|
||||
expiry_bit = '&oauth_expires_at=%s' % token_ref['expires_at']
|
||||
result += expiry_bit
|
||||
|
||||
resp = flask.make_response(result, http_client.CREATED)
|
||||
resp = flask.make_response(result, http.client.CREATED)
|
||||
resp.headers['Content-Type'] = 'application/x-www-form-urlencoded'
|
||||
return resp
|
||||
|
||||
@ -276,7 +276,7 @@ class AccessTokenResource(_OAuth1ResourceBase):
|
||||
expiry_bit = '&oauth_expires_at=%s' % (token_ref['expires_at'])
|
||||
result += expiry_bit
|
||||
|
||||
resp = flask.make_response(result, http_client.CREATED)
|
||||
resp = flask.make_response(result, http.client.CREATED)
|
||||
resp.headers['Content-Type'] = 'application/x-www-form-urlencoded'
|
||||
return resp
|
||||
|
||||
|
@ -13,8 +13,8 @@
|
||||
# This file handles all flask-restful resources for /policy
|
||||
|
||||
import flask_restful
|
||||
import http.client
|
||||
from oslo_log import versionutils
|
||||
from six.moves import http_client
|
||||
|
||||
from keystone.api._shared import json_home_relations
|
||||
from keystone.common import json_home
|
||||
@ -72,7 +72,7 @@ class PolicyResource(ks_flask.ResourceBase):
|
||||
ref = PROVIDERS.policy_api.create_policy(
|
||||
policy['id'], policy, initiator=self.audit_initiator
|
||||
)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
@versionutils.deprecated(
|
||||
as_of=versionutils.deprecated.QUEENS,
|
||||
@ -97,7 +97,7 @@ class PolicyResource(ks_flask.ResourceBase):
|
||||
res = PROVIDERS.policy_api.delete_policy(
|
||||
policy_id, initiator=self.audit_initiator
|
||||
)
|
||||
return (res, http_client.NO_CONTENT)
|
||||
return (res, http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class EndpointPolicyResource(flask_restful.Resource):
|
||||
@ -128,7 +128,7 @@ class EndpointPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.check_policy_association(
|
||||
policy_id, endpoint_id=endpoint_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, policy_id, endpoint_id):
|
||||
action = 'identity:create_policy_association_for_endpoint'
|
||||
@ -138,7 +138,7 @@ class EndpointPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.create_policy_association(
|
||||
policy_id, endpoint_id=endpoint_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, policy_id, endpoint_id):
|
||||
action = 'identity:delete_policy_association_for_endpoint'
|
||||
@ -148,7 +148,7 @@ class EndpointPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.delete_policy_association(
|
||||
policy_id, endpoint_id=endpoint_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ServicePolicyAssociations(flask_restful.Resource):
|
||||
@ -161,7 +161,7 @@ class ServicePolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.check_policy_association(
|
||||
policy_id, service_id=service_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, policy_id, service_id):
|
||||
action = 'identity:create_policy_association_for_service'
|
||||
@ -171,7 +171,7 @@ class ServicePolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.create_policy_association(
|
||||
policy_id, service_id=service_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, policy_id, service_id):
|
||||
action = 'identity:delete_policy_association_for_service'
|
||||
@ -181,7 +181,7 @@ class ServicePolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.delete_policy_association(
|
||||
policy_id, service_id=service_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ServiceRegionPolicyAssociations(flask_restful.Resource):
|
||||
@ -195,7 +195,7 @@ class ServiceRegionPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.check_policy_association(
|
||||
policy_id, service_id=service_id, region_id=region_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, policy_id, service_id, region_id):
|
||||
action = 'identity:create_policy_association_for_region_and_service'
|
||||
@ -206,7 +206,7 @@ class ServiceRegionPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.create_policy_association(
|
||||
policy_id, service_id=service_id, region_id=region_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, policy_id, service_id, region_id):
|
||||
action = 'identity:delete_policy_association_for_region_and_service'
|
||||
@ -217,7 +217,7 @@ class ServiceRegionPolicyAssociations(flask_restful.Resource):
|
||||
PROVIDERS.endpoint_policy_api.delete_policy_association(
|
||||
policy_id, service_id=service_id, region_id=region_id
|
||||
)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class PolicyAPI(ks_flask.APIBase):
|
||||
|
@ -15,7 +15,7 @@
|
||||
import functools
|
||||
|
||||
import flask
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.common import json_home
|
||||
from keystone.common import provider_api
|
||||
@ -179,7 +179,7 @@ class ProjectResource(ks_flask.ResourceBase):
|
||||
initiator=self.audit_initiator)
|
||||
except (exception.DomainNotFound, exception.ProjectNotFound) as e:
|
||||
raise exception.ValidationError(e)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, project_id):
|
||||
"""Update project.
|
||||
@ -211,7 +211,7 @@ class ProjectResource(ks_flask.ResourceBase):
|
||||
PROVIDERS.resource_api.delete_project(
|
||||
project_id,
|
||||
initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class _ProjectTagResourceBase(ks_flask.ResourceBase):
|
||||
@ -268,7 +268,7 @@ class ProjectTagsResource(_ProjectTagResourceBase):
|
||||
build_target=_build_project_target_enforcement
|
||||
)
|
||||
PROVIDERS.resource_api.update_project_tags(project_id, [])
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ProjectTagResource(_ProjectTagResourceBase):
|
||||
@ -282,7 +282,7 @@ class ProjectTagResource(_ProjectTagResourceBase):
|
||||
build_target=_build_project_target_enforcement,
|
||||
)
|
||||
PROVIDERS.resource_api.get_project_tag(project_id, value)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, value):
|
||||
"""Add a single tag to a project.
|
||||
@ -304,7 +304,7 @@ class ProjectTagResource(_ProjectTagResourceBase):
|
||||
initiator=self.audit_initiator
|
||||
)
|
||||
url = '/'.join((ks_flask.base_url(), project_id, 'tags', value))
|
||||
response = flask.make_response('', http_client.CREATED)
|
||||
response = flask.make_response('', http.client.CREATED)
|
||||
response.headers['Location'] = url
|
||||
return response
|
||||
|
||||
@ -318,7 +318,7 @@ class ProjectTagResource(_ProjectTagResourceBase):
|
||||
build_target=_build_project_target_enforcement
|
||||
)
|
||||
PROVIDERS.resource_api.delete_project_tag(project_id, value)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class _ProjectGrantResourceBase(ks_flask.ResourceBase):
|
||||
@ -375,7 +375,7 @@ class ProjectUserGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
role_id=role_id, user_id=user_id, project_id=project_id,
|
||||
inherited_to_projects=inherited)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, user_id, role_id):
|
||||
"""Grant role for user on project.
|
||||
@ -392,7 +392,7 @@ class ProjectUserGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
role_id=role_id, user_id=user_id, project_id=project_id,
|
||||
inherited_to_projects=inherited, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, project_id, user_id, role_id):
|
||||
"""Delete grant of role for user on project.
|
||||
@ -410,7 +410,7 @@ class ProjectUserGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
role_id=role_id, user_id=user_id, project_id=project_id,
|
||||
inherited_to_projects=inherited, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ProjectUserListGrantResource(_ProjectGrantResourceBase):
|
||||
@ -448,7 +448,7 @@ class ProjectGroupGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.get_grant(
|
||||
role_id=role_id, group_id=group_id, project_id=project_id,
|
||||
inherited_to_projects=inherited)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def put(self, project_id, group_id, role_id):
|
||||
"""Grant role for group on project.
|
||||
@ -465,7 +465,7 @@ class ProjectGroupGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.create_grant(
|
||||
role_id=role_id, group_id=group_id, project_id=project_id,
|
||||
inherited_to_projects=inherited, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def delete(self, project_id, group_id, role_id):
|
||||
"""Delete grant of role for group on project.
|
||||
@ -483,7 +483,7 @@ class ProjectGroupGrantResource(_ProjectGrantResourceBase):
|
||||
PROVIDERS.assignment_api.delete_grant(
|
||||
role_id=role_id, group_id=group_id, project_id=project_id,
|
||||
inherited_to_projects=inherited, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
class ProjectGroupListGrantResource(_ProjectGrantResourceBase):
|
||||
|
@ -12,7 +12,7 @@
|
||||
|
||||
# This file handles all flask-restful resources for /v3/regions
|
||||
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.catalog import schema
|
||||
from keystone.common import provider_api
|
||||
@ -59,7 +59,7 @@ class RegionResource(ks_flask.ResourceBase):
|
||||
region = self._assign_unique_id(region)
|
||||
ref = PROVIDERS.catalog_api.create_region(
|
||||
region, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def put(self, region_id):
|
||||
ENFORCER.enforce_call(action='identity:create_region')
|
||||
@ -77,7 +77,7 @@ class RegionResource(ks_flask.ResourceBase):
|
||||
|
||||
ref = PROVIDERS.catalog_api.create_region(
|
||||
region, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, region_id):
|
||||
ENFORCER.enforce_call(action='identity:update_region')
|
||||
@ -90,7 +90,7 @@ class RegionResource(ks_flask.ResourceBase):
|
||||
def delete(self, region_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_region')
|
||||
return PROVIDERS.catalog_api.delete_region(
|
||||
region_id, initiator=self.audit_initiator), http_client.NO_CONTENT
|
||||
region_id, initiator=self.audit_initiator), http.client.NO_CONTENT
|
||||
|
||||
|
||||
class RegionAPI(ks_flask.APIBase):
|
||||
|
@ -13,7 +13,7 @@
|
||||
# This file handles all flask-restful resources for /v3/registered_limits
|
||||
|
||||
import flask
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.common import json_home
|
||||
from keystone.common import provider_api
|
||||
@ -62,7 +62,7 @@ class RegisteredLimitResource(ks_flask.ResourceBase):
|
||||
registered_limits)
|
||||
refs = self.wrap_collection(refs)
|
||||
refs.pop('links')
|
||||
return refs, http_client.CREATED
|
||||
return refs, http.client.CREATED
|
||||
|
||||
def patch(self, registered_limit_id):
|
||||
ENFORCER.enforce_call(action='identity:update_registered_limit')
|
||||
@ -78,7 +78,7 @@ class RegisteredLimitResource(ks_flask.ResourceBase):
|
||||
def delete(self, registered_limit_id):
|
||||
ENFORCER.enforce_call(action='identity:delete_registered_limit')
|
||||
return (PROVIDERS.unified_limit_api.delete_registered_limit(
|
||||
registered_limit_id), http_client.NO_CONTENT)
|
||||
registered_limit_id), http.client.NO_CONTENT)
|
||||
|
||||
|
||||
class RegisteredLimitsAPI(ks_flask.APIBase):
|
||||
|
@ -14,7 +14,7 @@
|
||||
|
||||
import flask
|
||||
import flask_restful
|
||||
from six.moves import http_client
|
||||
import http.client
|
||||
|
||||
from keystone.api._shared import implied_roles as shared
|
||||
from keystone.assignment import schema
|
||||
@ -114,7 +114,7 @@ class RoleResource(ks_flask.ResourceBase):
|
||||
role = self._normalize_dict(role)
|
||||
ref = PROVIDERS.role_api.create_role(
|
||||
role['id'], role, initiator=self.audit_initiator)
|
||||
return self.wrap_member(ref), http_client.CREATED
|
||||
return self.wrap_member(ref), http.client.CREATED
|
||||
|
||||
def patch(self, role_id):
|
||||
"""Update role.
|
||||
@ -170,7 +170,7 @@ class RoleResource(ks_flask.ResourceBase):
|
||||
member_target_type='role',
|
||||
member_target=role)
|
||||
PROVIDERS.role_api.delete_role(role_id, initiator=self.audit_initiator)
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
|
||||
def _build_enforcement_target_ref():
|
||||
@ -222,7 +222,7 @@ class RoleImplicationResource(flask_restful.Resource):
|
||||
# for a future fix. This should just return the above "get" however,
|
||||
# we document and implment this as a NO_CONTENT response. NO_CONTENT
|
||||
# here is incorrect. It is maintained as is for API contract reasons.
|
||||
return None, http_client.NO_CONTENT
|
||||
return None, http.client.NO_CONTENT
|
||||
|
||||
def get(self, prior_role_id, implied_role_id):
|
||||
"""Get implied role.
|
||||
@ -258,7 +258,7 @@ class RoleImplicationResource(flask_restful.Resource):
|
||||
build_target=_build_enforcement_target_ref)
|
||||
PROVIDERS.role_api.create_implied_role(prior_role_id, implied_role_id)
|
||||
response_json = self._get_implied_role(prior_role_id, implied_role_id)
|
||||
return response_json, http_client.CREATED
|
||||
return response_json, http.client.CREATED
|
||||
|
||||
def delete(self, prior_role_id, implied_role_id):
|
||||
"""Delete implied role.
|
||||
@ -268,7 +268,7 @@ class RoleImplicationResource(flask_restful.Resource):
|
||||
ENFORCER.enforce_call(action='identity:delete_implied_role',
|
||||
build_target=_build_enforcement_target_ref)
|
||||
PROVIDERS.role_api.delete_implied_role(prior_role_id, implied_role_id)
|
||||
return None, http_client.NO_CONTENT
|