Implement network rbac create and delete commands
Add "network rbac create" and "network rbac delete" commands and also add unit tests, functional tests, docs and release note for them. Change-Id: I5fd58342f2deaa9bae7717412a942a21bbd7d045 Partially-Implements: blueprint neutron-client-rbac
This commit is contained in:
parent
a8880e8b34
commit
13bc3793e0
@ -8,6 +8,68 @@ to network resources for specific projects.
|
||||
|
||||
Network v2
|
||||
|
||||
network rbac create
|
||||
-------------------
|
||||
|
||||
Create network RBAC policy
|
||||
|
||||
.. program:: network rbac create
|
||||
.. code:: bash
|
||||
|
||||
os network rbac create
|
||||
--type <type>
|
||||
--action <action>
|
||||
--target-project <target-project> [--target-project-domain <target-project-domain>]
|
||||
[--project <project> [--project-domain <project-domain>]]
|
||||
<rbac-policy>
|
||||
|
||||
.. option:: --type <type>
|
||||
|
||||
Type of the object that RBAC policy affects ("qos_policy" or "network") (required)
|
||||
|
||||
.. option:: --action <action>
|
||||
|
||||
Action for the RBAC policy ("access_as_external" or "access_as_shared") (required)
|
||||
|
||||
.. option:: --target-project <target-project>
|
||||
|
||||
The project to which the RBAC policy will be enforced (name or ID) (required)
|
||||
|
||||
.. option:: --target-project-domain <target-project-domain>
|
||||
|
||||
Domain the target project belongs to (name or ID).
|
||||
This can be used in case collisions between project names exist.
|
||||
|
||||
.. option:: --project <project>
|
||||
|
||||
The owner project (name or ID)
|
||||
|
||||
.. option:: --project-domain <project-domain>
|
||||
|
||||
Domain the project belongs to (name or ID).
|
||||
This can be used in case collisions between project names exist.
|
||||
|
||||
.. _network_rbac_create-rbac-policy:
|
||||
.. describe:: <rbac-object>
|
||||
|
||||
The object to which this RBAC policy affects (name or ID for network objects, ID only for QoS policy objects)
|
||||
|
||||
network rbac delete
|
||||
-------------------
|
||||
|
||||
Delete network RBAC policy(s)
|
||||
|
||||
.. program:: network rbac delete
|
||||
.. code:: bash
|
||||
|
||||
os network rbac delete
|
||||
<rbac-policy> [<rbac-policy> ...]
|
||||
|
||||
.. _network_rbac_delete-rbac-policy:
|
||||
.. describe:: <rbac-policy>
|
||||
|
||||
RBAC policy(s) to delete (ID only)
|
||||
|
||||
network rbac list
|
||||
-----------------
|
||||
|
||||
|
@ -38,7 +38,7 @@ Delete example(s)
|
||||
|
||||
.. describe:: <example>
|
||||
|
||||
Example to delete (name or ID)
|
||||
Example(s) to delete (name or ID)
|
||||
|
||||
example list
|
||||
------------
|
||||
|
55
functional/tests/network/v2/test_network_rbac.py
Normal file
55
functional/tests/network/v2/test_network_rbac.py
Normal file
@ -0,0 +1,55 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import uuid
|
||||
|
||||
from functional.common import test
|
||||
|
||||
|
||||
class NetworkRBACTests(test.TestCase):
|
||||
"""Functional tests for network rbac. """
|
||||
NET_NAME = uuid.uuid4().hex
|
||||
OBJECT_ID = None
|
||||
ID = None
|
||||
HEADERS = ['ID']
|
||||
FIELDS = ['id']
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
opts = cls.get_opts(cls.FIELDS)
|
||||
raw_output = cls.openstack('network create ' + cls.NET_NAME + opts)
|
||||
cls.OBJECT_ID = raw_output.strip('\n')
|
||||
opts = cls.get_opts(['id', 'object_id'])
|
||||
raw_output = cls.openstack('network rbac create ' +
|
||||
cls.OBJECT_ID +
|
||||
' --action access_as_shared' +
|
||||
' --target-project admin' +
|
||||
' --type network' + opts)
|
||||
cls.ID, object_id, rol = tuple(raw_output.split('\n'))
|
||||
cls.assertOutput(cls.OBJECT_ID, object_id)
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
raw_output = cls.openstack('network rbac delete ' + cls.ID)
|
||||
cls.assertOutput('', raw_output)
|
||||
raw_output = cls.openstack('network delete ' + cls.OBJECT_ID)
|
||||
cls.assertOutput('', raw_output)
|
||||
|
||||
def test_network_rbac_list(self):
|
||||
opts = self.get_opts(self.HEADERS)
|
||||
raw_output = self.openstack('network rbac list' + opts)
|
||||
self.assertIn(self.ID, raw_output)
|
||||
|
||||
def test_network_rbac_show(self):
|
||||
opts = self.get_opts(self.FIELDS)
|
||||
raw_output = self.openstack('network rbac show ' + self.ID + opts)
|
||||
self.assertEqual(self.ID + "\n", raw_output)
|
@ -13,10 +13,17 @@
|
||||
|
||||
"""RBAC action implementations"""
|
||||
|
||||
import logging
|
||||
|
||||
from osc_lib.command import command
|
||||
from osc_lib import exceptions
|
||||
from osc_lib import utils
|
||||
|
||||
from openstackclient.i18n import _
|
||||
from openstackclient.identity import common as identity_common
|
||||
|
||||
|
||||
LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
def _get_columns(item):
|
||||
@ -30,6 +37,131 @@ def _get_columns(item):
|
||||
return tuple(sorted(columns))
|
||||
|
||||
|
||||
def _get_attrs(client_manager, parsed_args):
|
||||
attrs = {}
|
||||
attrs['object_type'] = parsed_args.type
|
||||
attrs['action'] = parsed_args.action
|
||||
|
||||
network_client = client_manager.network
|
||||
if parsed_args.type == 'network':
|
||||
object_id = network_client.find_network(
|
||||
parsed_args.rbac_object, ignore_missing=False).id
|
||||
if parsed_args.type == 'qos_policy':
|
||||
# TODO(Huanxuan Ao): Support finding a object ID by obejct name
|
||||
# after qos policy finding supported in SDK.
|
||||
object_id = parsed_args.rbac_object
|
||||
attrs['object_id'] = object_id
|
||||
|
||||
identity_client = client_manager.identity
|
||||
project_id = identity_common.find_project(
|
||||
identity_client,
|
||||
parsed_args.target_project,
|
||||
parsed_args.target_project_domain,
|
||||
).id
|
||||
attrs['target_tenant'] = project_id
|
||||
if parsed_args.project is not None:
|
||||
project_id = identity_common.find_project(
|
||||
identity_client,
|
||||
parsed_args.project,
|
||||
parsed_args.project_domain,
|
||||
).id
|
||||
attrs['tenant_id'] = project_id
|
||||
|
||||
return attrs
|
||||
|
||||
|
||||
class CreateNetworkRBAC(command.ShowOne):
|
||||
"""Create network RBAC policy"""
|
||||
|
||||
def get_parser(self, prog_name):
|
||||
parser = super(CreateNetworkRBAC, self).get_parser(prog_name)
|
||||
parser.add_argument(
|
||||
'rbac_object',
|
||||
metavar="<rbac-object>",
|
||||
help=_("The object to which this RBAC policy affects (name or "
|
||||
"ID for network objects, ID only for QoS policy objects)")
|
||||
)
|
||||
parser.add_argument(
|
||||
'--type',
|
||||
metavar="<type>",
|
||||
required=True,
|
||||
choices=['qos_policy', 'network'],
|
||||
help=_('Type of the object that RBAC policy '
|
||||
'affects ("qos_policy" or "network")')
|
||||
)
|
||||
parser.add_argument(
|
||||
'--action',
|
||||
metavar="<action>",
|
||||
required=True,
|
||||
choices=['access_as_external', 'access_as_shared'],
|
||||
help=_('Action for the RBAC policy '
|
||||
'("access_as_external" or "access_as_shared")')
|
||||
)
|
||||
parser.add_argument(
|
||||
'--target-project',
|
||||
required=True,
|
||||
metavar="<target-project>",
|
||||
help=_('The project to which the RBAC policy '
|
||||
'will be enforced (name or ID)')
|
||||
)
|
||||
parser.add_argument(
|
||||
'--target-project-domain',
|
||||
metavar='<target-project-domain>',
|
||||
help=_('Domain the target project belongs to (name or ID). '
|
||||
'This can be used in case collisions between project names '
|
||||
'exist.'),
|
||||
)
|
||||
parser.add_argument(
|
||||
'--project',
|
||||
metavar="<project>",
|
||||
help=_('The owner project (name or ID)')
|
||||
)
|
||||
identity_common.add_project_domain_option_to_parser(parser)
|
||||
return parser
|
||||
|
||||
def take_action(self, parsed_args):
|
||||
client = self.app.client_manager.network
|
||||
attrs = _get_attrs(self.app.client_manager, parsed_args)
|
||||
obj = client.create_rbac_policy(**attrs)
|
||||
columns = _get_columns(obj)
|
||||
data = utils.get_item_properties(obj, columns)
|
||||
return columns, data
|
||||
|
||||
|
||||
class DeleteNetworkRBAC(command.Command):
|
||||
"""Delete network RBAC policy(s)"""
|
||||
|
||||
def get_parser(self, prog_name):
|
||||
parser = super(DeleteNetworkRBAC, self).get_parser(prog_name)
|
||||
parser.add_argument(
|
||||
'rbac_policy',
|
||||
metavar="<rbac-policy>",
|
||||
nargs='+',
|
||||
help=_("RBAC policy(s) to delete (ID only)")
|
||||
)
|
||||
return parser
|
||||
|
||||
def take_action(self, parsed_args):
|
||||
client = self.app.client_manager.network
|
||||
result = 0
|
||||
|
||||
for rbac in parsed_args.rbac_policy:
|
||||
try:
|
||||
obj = client.find_rbac_policy(rbac, ignore_missing=False)
|
||||
client.delete_rbac_policy(obj)
|
||||
except Exception as e:
|
||||
result += 1
|
||||
LOG.error(_("Failed to delete RBAC policy with "
|
||||
"ID '%(rbac)s': %(e)s"),
|
||||
{'rbac': rbac, 'e': e})
|
||||
|
||||
if result > 0:
|
||||
total = len(parsed_args.rbac_policy)
|
||||
msg = (_("%(result)s of %(total)s RBAC policies failed "
|
||||
"to delete.") % {'result': result, 'total': total})
|
||||
raise exceptions.CommandError(msg)
|
||||
|
||||
|
||||
class ListNetworkRBAC(command.Lister):
|
||||
"""List network RBAC policies"""
|
||||
|
||||
|
@ -541,6 +541,25 @@ class FakeNetworkRBAC(object):
|
||||
|
||||
return rbac_policies
|
||||
|
||||
@staticmethod
|
||||
def get_network_rbacs(rbac_policies=None, count=2):
|
||||
"""Get an iterable MagicMock object with a list of faked rbac policies.
|
||||
|
||||
If rbac policies list is provided, then initialize the Mock object
|
||||
with the list. Otherwise create one.
|
||||
|
||||
:param List rbac_policies:
|
||||
A list of FakeResource objects faking rbac policies
|
||||
:param int count:
|
||||
The number of rbac policies to fake
|
||||
:return:
|
||||
An iterable Mock object with side_effect set to a list of faked
|
||||
rbac policies
|
||||
"""
|
||||
if rbac_policies is None:
|
||||
rbac_policies = FakeNetworkRBAC.create_network_rbacs(count)
|
||||
return mock.MagicMock(side_effect=rbac_policies)
|
||||
|
||||
|
||||
class FakeRouter(object):
|
||||
"""Fake one or more routers."""
|
||||
|
@ -12,8 +12,12 @@
|
||||
#
|
||||
|
||||
import mock
|
||||
from mock import call
|
||||
|
||||
from osc_lib import exceptions
|
||||
|
||||
from openstackclient.network.v2 import network_rbac
|
||||
from openstackclient.tests.identity.v3 import fakes as identity_fakes_v3
|
||||
from openstackclient.tests.network.v2 import fakes as network_fakes
|
||||
from openstackclient.tests import utils as tests_utils
|
||||
|
||||
@ -25,6 +29,252 @@ class TestNetworkRBAC(network_fakes.TestNetworkV2):
|
||||
|
||||
# Get a shortcut to the network client
|
||||
self.network = self.app.client_manager.network
|
||||
# Get a shortcut to the ProjectManager Mock
|
||||
self.projects_mock = self.app.client_manager.identity.projects
|
||||
|
||||
|
||||
class TestCreateNetworkRBAC(TestNetworkRBAC):
|
||||
|
||||
network_object = network_fakes.FakeNetwork.create_one_network()
|
||||
project = identity_fakes_v3.FakeProject.create_one_project()
|
||||
rbac_policy = network_fakes.FakeNetworkRBAC.create_one_network_rbac(
|
||||
attrs={'tenant_id': project.id,
|
||||
'target_tenant': project.id,
|
||||
'object_id': network_object.id}
|
||||
)
|
||||
|
||||
columns = (
|
||||
'action',
|
||||
'id',
|
||||
'object_id',
|
||||
'object_type',
|
||||
'project_id',
|
||||
'target_project',
|
||||
)
|
||||
|
||||
data = [
|
||||
rbac_policy.action,
|
||||
rbac_policy.id,
|
||||
rbac_policy.object_id,
|
||||
rbac_policy.object_type,
|
||||
rbac_policy.tenant_id,
|
||||
rbac_policy.target_tenant,
|
||||
]
|
||||
|
||||
def setUp(self):
|
||||
super(TestCreateNetworkRBAC, self).setUp()
|
||||
|
||||
# Get the command object to test
|
||||
self.cmd = network_rbac.CreateNetworkRBAC(self.app, self.namespace)
|
||||
|
||||
self.network.create_rbac_policy = mock.Mock(
|
||||
return_value=self.rbac_policy)
|
||||
self.network.find_network = mock.Mock(
|
||||
return_value=self.network_object)
|
||||
self.projects_mock.get.return_value = self.project
|
||||
|
||||
def test_network_rbac_create_no_type(self):
|
||||
arglist = [
|
||||
'--action', self.rbac_policy.action,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('action', self.rbac_policy.action),
|
||||
('rbac_policy', self.rbac_policy.id),
|
||||
]
|
||||
|
||||
self.assertRaises(tests_utils.ParserException, self.check_parser,
|
||||
self.cmd, arglist, verifylist)
|
||||
|
||||
def test_network_rbac_create_no_action(self):
|
||||
arglist = [
|
||||
'--type', self.rbac_policy.object_type,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('type', self.rbac_policy.object_type),
|
||||
('rbac_policy', self.rbac_policy.id),
|
||||
]
|
||||
|
||||
self.assertRaises(tests_utils.ParserException, self.check_parser,
|
||||
self.cmd, arglist, verifylist)
|
||||
|
||||
def test_network_rbac_create_invalid_type(self):
|
||||
arglist = [
|
||||
'--action', self.rbac_policy.action,
|
||||
'--type', 'invalid_type',
|
||||
'--target-project', self.rbac_policy.target_tenant,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('action', self.rbac_policy.action),
|
||||
('type', 'invalid_type'),
|
||||
('target-project', self.rbac_policy.target_tenant),
|
||||
('rbac_policy', self.rbac_policy.id),
|
||||
]
|
||||
|
||||
self.assertRaises(tests_utils.ParserException, self.check_parser,
|
||||
self.cmd, arglist, verifylist)
|
||||
|
||||
def test_network_rbac_create_invalid_action(self):
|
||||
arglist = [
|
||||
'--type', self.rbac_policy.object_type,
|
||||
'--action', 'invalid_action',
|
||||
'--target-project', self.rbac_policy.target_tenant,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('type', self.rbac_policy.object_type),
|
||||
('action', 'invalid_action'),
|
||||
('target-project', self.rbac_policy.target_tenant),
|
||||
('rbac_policy', self.rbac_policy.id),
|
||||
]
|
||||
|
||||
self.assertRaises(tests_utils.ParserException, self.check_parser,
|
||||
self.cmd, arglist, verifylist)
|
||||
|
||||
def test_network_rbac_create(self):
|
||||
arglist = [
|
||||
'--type', self.rbac_policy.object_type,
|
||||
'--action', self.rbac_policy.action,
|
||||
'--target-project', self.rbac_policy.target_tenant,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('type', self.rbac_policy.object_type),
|
||||
('action', self.rbac_policy.action),
|
||||
('target_project', self.rbac_policy.target_tenant),
|
||||
('rbac_object', self.rbac_policy.object_id),
|
||||
]
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
# DisplayCommandBase.take_action() returns two tuples
|
||||
columns, data = self.cmd.take_action(parsed_args)
|
||||
|
||||
self.network.create_rbac_policy.assert_called_with(**{
|
||||
'object_id': self.rbac_policy.object_id,
|
||||
'object_type': self.rbac_policy.object_type,
|
||||
'action': self.rbac_policy.action,
|
||||
'target_tenant': self.rbac_policy.target_tenant,
|
||||
})
|
||||
self.assertEqual(self.columns, columns)
|
||||
self.assertEqual(self.data, list(data))
|
||||
|
||||
def test_network_rbac_create_all_options(self):
|
||||
arglist = [
|
||||
'--type', self.rbac_policy.object_type,
|
||||
'--action', self.rbac_policy.action,
|
||||
'--target-project', self.rbac_policy.target_tenant,
|
||||
'--project', self.rbac_policy.tenant_id,
|
||||
'--project-domain', self.project.domain_id,
|
||||
'--target-project-domain', self.project.domain_id,
|
||||
self.rbac_policy.object_id,
|
||||
]
|
||||
verifylist = [
|
||||
('type', self.rbac_policy.object_type),
|
||||
('action', self.rbac_policy.action),
|
||||
('target_project', self.rbac_policy.target_tenant),
|
||||
('project', self.rbac_policy.tenant_id),
|
||||
('project_domain', self.project.domain_id),
|
||||
('target_project_domain', self.project.domain_id),
|
||||
('rbac_object', self.rbac_policy.object_id),
|
||||
]
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
# DisplayCommandBase.take_action() returns two tuples
|
||||
columns, data = self.cmd.take_action(parsed_args)
|
||||
|
||||
self.network.create_rbac_policy.assert_called_with(**{
|
||||
'object_id': self.rbac_policy.object_id,
|
||||
'object_type': self.rbac_policy.object_type,
|
||||
'action': self.rbac_policy.action,
|
||||
'target_tenant': self.rbac_policy.target_tenant,
|
||||
'tenant_id': self.rbac_policy.tenant_id,
|
||||
})
|
||||
self.assertEqual(self.columns, columns)
|
||||
self.assertEqual(self.data, list(data))
|
||||
|
||||
|
||||
class TestDeleteNetworkRBAC(TestNetworkRBAC):
|
||||
|
||||
rbac_policies = network_fakes.FakeNetworkRBAC.create_network_rbacs(count=2)
|
||||
|
||||
def setUp(self):
|
||||
super(TestDeleteNetworkRBAC, self).setUp()
|
||||
self.network.delete_rbac_policy = mock.Mock(return_value=None)
|
||||
self.network.find_rbac_policy = (
|
||||
network_fakes.FakeNetworkRBAC.get_network_rbacs(
|
||||
rbac_policies=self.rbac_policies)
|
||||
)
|
||||
|
||||
# Get the command object to test
|
||||
self.cmd = network_rbac.DeleteNetworkRBAC(self.app, self.namespace)
|
||||
|
||||
def test_network_rbac_delete(self):
|
||||
arglist = [
|
||||
self.rbac_policies[0].id,
|
||||
]
|
||||
verifylist = [
|
||||
('rbac_policy', [self.rbac_policies[0].id]),
|
||||
]
|
||||
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
result = self.cmd.take_action(parsed_args)
|
||||
self.network.find_rbac_policy.assert_called_once_with(
|
||||
self.rbac_policies[0].id, ignore_missing=False)
|
||||
self.network.delete_rbac_policy.assert_called_once_with(
|
||||
self.rbac_policies[0])
|
||||
self.assertIsNone(result)
|
||||
|
||||
def test_multi_network_rbacs_delete(self):
|
||||
arglist = []
|
||||
verifylist = []
|
||||
|
||||
for r in self.rbac_policies:
|
||||
arglist.append(r.id)
|
||||
verifylist = [
|
||||
('rbac_policy', arglist),
|
||||
]
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
result = self.cmd.take_action(parsed_args)
|
||||
|
||||
calls = []
|
||||
for r in self.rbac_policies:
|
||||
calls.append(call(r))
|
||||
self.network.delete_rbac_policy.assert_has_calls(calls)
|
||||
self.assertIsNone(result)
|
||||
|
||||
def test_multi_network_policies_delete_with_exception(self):
|
||||
arglist = [
|
||||
self.rbac_policies[0].id,
|
||||
'unexist_rbac_policy',
|
||||
]
|
||||
verifylist = [
|
||||
('rbac_policy',
|
||||
[self.rbac_policies[0].id, 'unexist_rbac_policy']),
|
||||
]
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
find_mock_result = [self.rbac_policies[0], exceptions.CommandError]
|
||||
self.network.find_rbac_policy = (
|
||||
mock.MagicMock(side_effect=find_mock_result)
|
||||
)
|
||||
|
||||
try:
|
||||
self.cmd.take_action(parsed_args)
|
||||
self.fail('CommandError should be raised.')
|
||||
except exceptions.CommandError as e:
|
||||
self.assertEqual('1 of 2 RBAC policies failed to delete.', str(e))
|
||||
|
||||
self.network.find_rbac_policy.assert_any_call(
|
||||
self.rbac_policies[0].id, ignore_missing=False)
|
||||
self.network.find_rbac_policy.assert_any_call(
|
||||
'unexist_rbac_policy', ignore_missing=False)
|
||||
self.network.delete_rbac_policy.assert_called_once_with(
|
||||
self.rbac_policies[0]
|
||||
)
|
||||
|
||||
|
||||
class TestListNetworkRABC(TestNetworkRBAC):
|
||||
@ -107,16 +357,18 @@ class TestShowNetworkRBAC(TestNetworkRBAC):
|
||||
|
||||
def test_network_rbac_show_all_options(self):
|
||||
arglist = [
|
||||
self.rbac_policy.object_id,
|
||||
self.rbac_policy.id,
|
||||
]
|
||||
verifylist = [
|
||||
('rbac_policy', self.rbac_policy.id),
|
||||
]
|
||||
verifylist = []
|
||||
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
|
||||
|
||||
# DisplayCommandBase.take_action() returns two tuples
|
||||
columns, data = self.cmd.take_action(parsed_args)
|
||||
|
||||
self.network.find_rbac_policy.assert_called_with(
|
||||
self.rbac_policy.object_id, ignore_missing=False
|
||||
self.rbac_policy.id, ignore_missing=False
|
||||
)
|
||||
self.assertEqual(self.columns, columns)
|
||||
self.assertEqual(self.data, list(data))
|
||||
|
@ -1,4 +1,5 @@
|
||||
---
|
||||
features:
|
||||
- Add ``network rbac list`` and ``network rbac show`` commands.
|
||||
- Add ``network rbac list``, ``network rbac show``, ``network rbac create``
|
||||
and ``network rbac delete`` commands.
|
||||
[Blueprint `neutron-client-rbac <https://blueprints.launchpad.net/python-openstackclient/+spec/neutron-client-rbac>`_]
|
||||
|
@ -361,6 +361,8 @@ openstack.network.v2 =
|
||||
network_set = openstackclient.network.v2.network:SetNetwork
|
||||
network_show = openstackclient.network.v2.network:ShowNetwork
|
||||
|
||||
network_rbac_create = openstackclient.network.v2.network_rbac:CreateNetworkRBAC
|
||||
network_rbac_delete = openstackclient.network.v2.network_rbac:DeleteNetworkRBAC
|
||||
network_rbac_list = openstackclient.network.v2.network_rbac:ListNetworkRBAC
|
||||
network_rbac_show = openstackclient.network.v2.network_rbac:ShowNetworkRBAC
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user