Files
openstacksdk/openstack/identity/v3/trust.py
Monty Taylor 071e567b32 Use discovery instead of config to create proxies
Since the dawn of time we've labored under the crippling burden of
needing to explicitly request a version via configuration in order to
get a usable handle to the cloud. This is despite the hilarity of the
existence of a system for discovering available versions since basically
the beginning of the entire OpenStack project.

Today we shall be liberated from the tyranny of terrible past life
decisions on the part of our forefathers and shall usher forth the
shining freedom of actually using the discovery system.

Change-Id: I11c16d37d3ab3d77bed3a0bcbd98f1fa33b9555f
2018-10-06 07:44:29 -05:00

77 lines
3.4 KiB
Python

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from openstack import resource
class Trust(resource.Resource):
resource_key = 'trust'
resources_key = 'trusts'
base_path = '/OS-TRUST/trusts'
# capabilities
allow_create = True
allow_fetch = True
allow_delete = True
allow_list = True
_query_mapping = resource.QueryParameters(
'trustor_user_id', 'trustee_user_id')
# Properties
#: A boolean indicating whether the trust can be issued by the trustee as
#: a regulart trust. Default is ``False``.
allow_redelegation = resource.Body('allow_redelegation', type=bool)
#: If ``impersonation`` is set to ``False``, then the token's ``user``
#: attribute will represent that of the trustee. *Type: bool*
is_impersonation = resource.Body('impersonation', type=bool)
#: Specifies the expiration time of the trust. A trust may be revoked
#: ahead of expiration. If the value represents a time in the past,
#: the trust is deactivated.
expires_at = resource.Body('expires_at')
#: If ``impersonation`` is set to true, then the ``user`` attribute
#: of tokens that are generated based on the trust will represent
#: that of the trustor rather than the trustee, thus allowing the trustee
#: to impersonate the trustor.
#: If ``impersonation`` is set to ``False``, then the token's ``user``
#: attribute will represent that of the trustee. *Type: bool*
is_impersonation = resource.Body('impersonation', type=bool)
#: Links for the trust resource.
links = resource.Body('links')
#: ID of the project upon which the trustor is
#: delegating authorization. *Type: string*
project_id = resource.Body('project_id')
#: A role links object that includes 'next', 'previous', and self links
#: for roles.
role_links = resource.Body('role_links')
#: Specifies the subset of the trustor's roles on the ``project_id``
#: to be granted to the trustee when the token in consumed. The
#: trustor must already be granted these roles in the project referenced
#: by the ``project_id`` attribute. *Type: list*
roles = resource.Body('roles')
#: Returned with redelegated trust provides information about the
#: predecessor in the trust chain.
redelegated_trust_id = resource.Body('redelegated_trust_id')
#: Redelegation count
redelegation_count = resource.Body('redelegation_count')
#: How many times the trust can be used to obtain a token. The value is
#: decreased each time a token is issued through the trust. Once it
#: reaches zero, no further tokens will be isued through the trust.
remaining_uses = resource.Body('remaining_uses')
#: Represents the user ID who is capable of consuming the trust.
#: *Type: string*
trustee_user_id = resource.Body('trustee_user_id')
#: Represents the user ID who created the trust, and who's authorization is
#: being delegated. *Type: string*
trustor_user_id = resource.Body('trustor_user_id')