diff options
| author | Jamie Lennox <jamielennox@redhat.com> | 2014-06-18 14:53:01 +1000 |
|---|---|---|
| committer | Jamie Lennox <jamielennox@redhat.com> | 2014-06-30 09:17:04 +1000 |
| commit | 3d29db1bd1274e54097ee9387987f9b64ed8b3d0 (patch) | |
| tree | 32f782eae0c0765c90d8b20b1f9c237dbb3f6fd1 /keystoneclient/fixture | |
| parent | 90abb4cfb2c133fda1df5da11d8fc30ec9e5514b (diff) | |
| download | python-keystoneclient-3d29db1bd1274e54097ee9387987f9b64ed8b3d0.tar.gz | |
Add OAuth data to AccessInfo
Allow access to the access_token_id and the consumer_id that are set as
part of the Oauth authentication process.
This only makes sense for V3 tokens, as Oauth cannot be used with v2.
Change-Id: I9ac76f92acdfd6446a13f535b24e0a99f02f2eef
Diffstat (limited to 'keystoneclient/fixture')
| -rw-r--r-- | keystoneclient/fixture/v3.py | 27 |
1 files changed, 26 insertions, 1 deletions
diff --git a/keystoneclient/fixture/v3.py b/keystoneclient/fixture/v3.py index a0896f0..87e0b7b 100644 --- a/keystoneclient/fixture/v3.py +++ b/keystoneclient/fixture/v3.py @@ -59,7 +59,8 @@ class Token(dict): project_id=None, project_name=None, project_domain_id=None, project_domain_name=None, domain_id=None, domain_name=None, trust_id=None, trust_impersonation=None, trustee_user_id=None, - trustor_user_id=None): + trustor_user_id=None, oauth_access_token_id=None, + oauth_consumer_id=None): super(Token, self).__init__() self.user_id = user_id or uuid.uuid4().hex @@ -106,6 +107,10 @@ class Token(dict): trustee_user_id=trustee_user_id, trustor_user_id=trustor_user_id) + if oauth_access_token_id or oauth_consumer_id: + self.set_oauth(access_token_id=oauth_access_token_id, + consumer_id=oauth_consumer_id) + @property def root(self): return self.setdefault('token', {}) @@ -272,6 +277,22 @@ class Token(dict): trust = self.root.setdefault('OS-TRUST:trust', {}) trust.setdefault('trustor_user', {})['id'] = value + @property + def oauth_access_token_id(self): + return self.root.get('OS-OAUTH1', {}).get('access_token_id') + + @oauth_access_token_id.setter + def oauth_access_token_id(self, value): + self.root.setdefault('OS-OAUTH1', {})['access_token_id'] = value + + @property + def oauth_consumer_id(self): + return self.root.get('OS-OAUTH1', {}).get('consumer_id') + + @oauth_consumer_id.setter + def oauth_consumer_id(self, value): + self.root.setdefault('OS-OAUTH1', {})['consumer_id'] = value + def validate(self): project = self.root.get('project') domain = self.root.get('domain') @@ -327,3 +348,7 @@ class Token(dict): self.trust_impersonation = impersonation self.trustee_user_id = trustee_user_id or uuid.uuid4().hex self.trustor_user_id = trustor_user_id or uuid.uuid4().hex + + def set_oauth(self, access_token_id=None, consumer_id=None): + self.oauth_access_token_id = access_token_id or uuid.uuid4().hex + self.oauth_consumer_id = consumer_id or uuid.uuid4().hex |
