summaryrefslogtreecommitdiff
path: root/keystoneclient
diff options
context:
space:
mode:
Diffstat (limited to 'keystoneclient')
-rw-r--r--keystoneclient/base.py136
-rw-r--r--keystoneclient/contrib/auth/v3/saml2.py2
-rw-r--r--keystoneclient/httpclient.py5
-rw-r--r--keystoneclient/tests/unit/test_base.py221
-rw-r--r--keystoneclient/tests/unit/test_session.py2
-rw-r--r--keystoneclient/tests/unit/v3/test_limits.py77
-rw-r--r--keystoneclient/tests/unit/v3/test_projects.py73
-rw-r--r--keystoneclient/tests/unit/v3/test_registered_limits.py76
-rw-r--r--keystoneclient/tests/unit/v3/utils.py4
-rw-r--r--keystoneclient/v3/client.py13
-rw-r--r--keystoneclient/v3/limits.py148
-rw-r--r--keystoneclient/v3/projects.py16
-rw-r--r--keystoneclient/v3/regions.py11
-rw-r--r--keystoneclient/v3/registered_limits.py158
14 files changed, 898 insertions, 44 deletions
diff --git a/keystoneclient/base.py b/keystoneclient/base.py
index c466b1b..839b8a1 100644
--- a/keystoneclient/base.py
+++ b/keystoneclient/base.py
@@ -32,22 +32,33 @@ from keystoneclient import exceptions as ksc_exceptions
from keystoneclient.i18n import _
+class Response(object):
+
+ def __init__(self, http_response, data):
+ self.request_ids = []
+ if isinstance(http_response, list):
+ # http_response is a list of <requests.Response> in case
+ # of pagination
+ for resp_obj in http_response:
+ # Extract 'x-openstack-request-id' from headers
+ self.request_ids.append(resp_obj.headers.get(
+ 'x-openstack-request-id'))
+ else:
+ self.request_ids.append(http_response.headers.get(
+ 'x-openstack-request-id'))
+ self.data = data
+
+
def getid(obj):
"""Return id if argument is a Resource.
Abstracts the common pattern of allowing both an object or an object's ID
(UUID) as a parameter when dealing with relationships.
"""
- try:
- if obj.uuid:
- return obj.uuid
- except AttributeError: # nosec(cjschaef): 'obj' doesn't contain attribute
- # 'uuid', return attribute 'id' or the 'obj'
- pass
- try:
- return obj.id
- except AttributeError:
- return obj
+ if getattr(obj, 'uuid', None):
+ return obj.uuid
+ else:
+ return getattr(obj, 'id', obj)
def filter_none(**kwargs):
@@ -107,6 +118,11 @@ class Manager(object):
'may be removed in the 2.0.0 release', DeprecationWarning)
return self.client
+ def _prepare_return_value(self, http_response, data):
+ if self.client.include_metadata:
+ return Response(http_response, data)
+ return data
+
def _list(self, url, response_key, obj_class=None, body=None, **kwargs):
"""List the collection.
@@ -137,7 +153,8 @@ class Manager(object):
# are already returned in a list (so simply utilize that list)
pass
- return [obj_class(self, res, loaded=True) for res in data if res]
+ return self._prepare_return_value(
+ resp, [obj_class(self, res, loaded=True) for res in data if res])
def _get(self, url, response_key, **kwargs):
"""Get an object from collection.
@@ -148,7 +165,8 @@ class Manager(object):
:param kwargs: Additional arguments will be passed to the request.
"""
resp, body = self.client.get(url, **kwargs)
- return self.resource_class(self, body[response_key], loaded=True)
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body[response_key], loaded=True))
def _head(self, url, **kwargs):
"""Retrieve request headers for an object.
@@ -157,7 +175,7 @@ class Manager(object):
:param kwargs: Additional arguments will be passed to the request.
"""
resp, body = self.client.head(url, **kwargs)
- return resp.status_code == 204
+ return self._prepare_return_value(resp, resp.status_code == 204)
def _post(self, url, body, response_key, return_raw=False, **kwargs):
"""Create an object.
@@ -174,7 +192,8 @@ class Manager(object):
resp, body = self.client.post(url, body=body, **kwargs)
if return_raw:
return body[response_key]
- return self.resource_class(self, body[response_key])
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body[response_key]))
def _put(self, url, body=None, response_key=None, **kwargs):
"""Update an object with PUT method.
@@ -190,9 +209,11 @@ class Manager(object):
# PUT requests may not return a body
if body is not None:
if response_key is not None:
- return self.resource_class(self, body[response_key])
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body[response_key]))
else:
- return self.resource_class(self, body)
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body))
def _patch(self, url, body=None, response_key=None, **kwargs):
"""Update an object with PATCH method.
@@ -206,9 +227,11 @@ class Manager(object):
"""
resp, body = self.client.patch(url, body=body, **kwargs)
if response_key is not None:
- return self.resource_class(self, body[response_key])
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body[response_key]))
else:
- return self.resource_class(self, body)
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body))
def _delete(self, url, **kwargs):
"""Delete an object.
@@ -216,7 +239,8 @@ class Manager(object):
:param url: a partial URL, e.g., '/servers/my-server'
:param kwargs: Additional arguments will be passed to the request.
"""
- return self.client.delete(url, **kwargs)
+ resp, body = self.client.delete(url, **kwargs)
+ return resp, self._prepare_return_value(resp, body)
def _update(self, url, body=None, response_key=None, method="PUT",
**kwargs):
@@ -231,7 +255,10 @@ class Manager(object):
% method)
# PUT requests may not return a body
if body:
- return self.resource_class(self, body[response_key])
+ return self._prepare_return_value(
+ resp, self.resource_class(self, body[response_key]))
+ else:
+ return self._prepare_return_value(resp, body)
@six.add_metaclass(abc.ABCMeta)
@@ -249,16 +276,20 @@ class ManagerWithFind(Manager):
the Python side.
"""
rl = self.findall(**kwargs)
- num = len(rl)
- if num == 0:
+ if self.client.include_metadata:
+ base_response = rl
+ rl = rl.data
+ base_response.data = rl[0]
+
+ if len(rl) == 0:
msg = _("No %(name)s matching %(kwargs)s.") % {
'name': self.resource_class.__name__, 'kwargs': kwargs}
raise ksa_exceptions.NotFound(404, msg)
- elif num > 1:
+ elif len(rl) > 1:
raise ksc_exceptions.NoUniqueMatch
else:
- return rl[0]
+ return base_response if self.client.include_metadata else rl[0]
def findall(self, **kwargs):
"""Find all items with attributes matching ``**kwargs``.
@@ -269,15 +300,23 @@ class ManagerWithFind(Manager):
found = []
searches = kwargs.items()
- for obj in self.list():
- try:
- if all(getattr(obj, attr) == value
- for (attr, value) in searches):
- found.append(obj)
- except AttributeError:
- continue
+ def _extract_data(objs, response_data):
+ for obj in objs:
+ try:
+ if all(getattr(obj, attr) == value
+ for (attr, value) in searches):
+ response_data.append(obj)
+ except AttributeError:
+ continue
+ return response_data
+
+ objs = self.list()
+ if self.client.include_metadata:
+ # 'objs' is the object of 'Response' class.
+ objs.data = _extract_data(objs.data, found)
+ return objs
- return found
+ return _extract_data(objs, found)
class CrudManager(Manager):
@@ -376,6 +415,16 @@ class CrudManager(Manager):
@filter_kwargs
def list(self, fallback_to_auth=False, **kwargs):
+
+ def return_resp(resp, include_metadata=False):
+ base_response = None
+ list_data = resp
+ if include_metadata:
+ base_response = resp
+ list_data = resp.data
+ base_response.data = list_data
+ return base_response if include_metadata else list_data
+
if 'id' in kwargs.keys():
# Ensure that users are not trying to call things like
# ``domains.list(id='default')`` when they should have used
@@ -392,15 +441,16 @@ class CrudManager(Manager):
try:
query = self._build_query(kwargs)
url_query = '%(url)s%(query)s' % {'url': url, 'query': query}
- return self._list(
- url_query,
- self.collection_key)
+ list_resp = self._list(url_query, self.collection_key)
+ return return_resp(list_resp,
+ include_metadata=self.client.include_metadata)
except ksa_exceptions.EmptyCatalog:
if fallback_to_auth:
- return self._list(
- url_query,
- self.collection_key,
- endpoint_filter={'interface': plugin.AUTH_INTERFACE})
+ list_resp = self._list(url_query, self.collection_key,
+ endpoint_filter={
+ 'interface': plugin.AUTH_INTERFACE})
+ return return_resp(
+ list_resp, include_metadata=self.client.include_metadata)
else:
raise
@@ -439,6 +489,11 @@ class CrudManager(Manager):
url_query,
self.collection_key)
+ if self.client.include_metadata:
+ base_response = elements
+ elements = elements.data
+ base_response.data = elements[0]
+
if not elements:
msg = _("No %(name)s matching %(kwargs)s.") % {
'name': self.resource_class.__name__, 'kwargs': kwargs}
@@ -446,7 +501,8 @@ class CrudManager(Manager):
elif len(elements) > 1:
raise ksc_exceptions.NoUniqueMatch
else:
- return elements[0]
+ return (base_response if self.client.include_metadata
+ else elements[0])
class Resource(object):
diff --git a/keystoneclient/contrib/auth/v3/saml2.py b/keystoneclient/contrib/auth/v3/saml2.py
index 8a07b7f..85beabb 100644
--- a/keystoneclient/contrib/auth/v3/saml2.py
+++ b/keystoneclient/contrib/auth/v3/saml2.py
@@ -327,7 +327,7 @@ class Saml2UnscopedToken(_BaseSAMLPlugin):
authenticated user. This function directs the HTTP request to SP
managed URL, for instance: ``https://<host>:<port>/Shibboleth.sso/
SAML2/ECP``.
- Upon success the there's a session created and access to the protected
+ Upon success there's a session created and access to the protected
resource is granted. Many implementations of the SP return HTTP 302/303
status code pointing to the protected URL (``https://<host>:<port>/v3/
OS-FEDERATION/identity_providers/{identity_provider}/protocols/
diff --git a/keystoneclient/httpclient.py b/keystoneclient/httpclient.py
index 50d393a..8d157ce 100644
--- a/keystoneclient/httpclient.py
+++ b/keystoneclient/httpclient.py
@@ -389,6 +389,11 @@ class HTTPClient(baseclient.Client, base.BaseAuthPlugin):
user_agent=user_agent,
connect_retries=connect_retries)
+ # NOTE(dstanek): This allows me to not have to change keystoneauth or
+ # to write an adapter to the adapter here. Splitting thing into
+ # multiple project isn't always all sunshine and roses.
+ self._adapter.include_metadata = kwargs.pop('include_metadata', False)
+
# keyring setup
if use_keyring and keyring is None:
_logger.warning('Failed to load keyring modules.')
diff --git a/keystoneclient/tests/unit/test_base.py b/keystoneclient/tests/unit/test_base.py
index 0a0fde1..bd5deb7 100644
--- a/keystoneclient/tests/unit/test_base.py
+++ b/keystoneclient/tests/unit/test_base.py
@@ -11,14 +11,29 @@
# License for the specific language governing permissions and limitations
# under the License.
+import uuid
+
import fixtures
from keystoneauth1.identity import v2
from keystoneauth1 import session
+import requests
from keystoneclient import base
+from keystoneclient import exceptions
from keystoneclient.tests.unit import utils
+from keystoneclient import utils as base_utils
from keystoneclient.v2_0 import client
from keystoneclient.v2_0 import roles
+from keystoneclient.v3 import users
+
+TEST_REQUEST_ID = uuid.uuid4().hex
+TEST_REQUEST_ID_1 = uuid.uuid4().hex
+
+
+def create_response_with_request_id_header():
+ resp = requests.Response()
+ resp.headers['x-openstack-request-id'] = TEST_REQUEST_ID
+ return resp
class HumanReadable(base.Resource):
@@ -202,3 +217,209 @@ class ManagerTest(utils.TestCase):
management=True)
put_mock.assert_called_once_with(self.url, management=True, body=None)
self.assertEqual(rsrc.hi, 1)
+
+
+class ManagerRequestIdTest(utils.TestCase):
+ url = "/test-url"
+ resp = create_response_with_request_id_header()
+
+ def setUp(self):
+ super(ManagerRequestIdTest, self).setUp()
+
+ auth = v2.Token(auth_url='http://127.0.0.1:5000',
+ token=self.TEST_TOKEN)
+ session_ = session.Session(auth=auth)
+ self.client = client.Client(session=session_,
+ include_metadata='True')._adapter
+
+ self.mgr = base.Manager(self.client)
+ self.mgr.resource_class = base.Resource
+
+ def mock_request_method(self, request_method, body):
+ return self.useFixture(fixtures.MockPatchObject(
+ self.client, request_method, autospec=True,
+ return_value=(self.resp, body))
+ ).mock
+
+ def test_get(self):
+ body = {"hello": {"hi": 1}}
+ get_mock = self.mock_request_method('get', body)
+ rsrc = self.mgr._get(self.url, "hello")
+ get_mock.assert_called_once_with(self.url)
+ self.assertEqual(rsrc.data.hi, 1)
+ self.assertEqual(rsrc.request_ids[0], TEST_REQUEST_ID)
+
+ def test_list(self):
+ body = {"hello": [{"name": "admin"}, {"name": "admin"}]}
+ get_mock = self.mock_request_method('get', body)
+
+ returned_list = self.mgr._list(self.url, "hello")
+ self.assertEqual(returned_list.request_ids[0], TEST_REQUEST_ID)
+ get_mock.assert_called_once_with(self.url)
+
+ def test_list_with_multiple_response_objects(self):
+ body = {"hello": [{"name": "admin"}, {"name": "admin"}]}
+ resp_1 = requests.Response()
+ resp_1.headers['x-openstack-request-id'] = TEST_REQUEST_ID
+ resp_2 = requests.Response()
+ resp_2.headers['x-openstack-request-id'] = TEST_REQUEST_ID_1
+
+ resp_result = [resp_1, resp_2]
+ get_mock = self.useFixture(fixtures.MockPatchObject(
+ self.client, 'get', autospec=True,
+ return_value=(resp_result, body))
+ ).mock
+
+ returned_list = self.mgr._list(self.url, "hello")
+ self.assertIn(returned_list.request_ids[0], [
+ TEST_REQUEST_ID, TEST_REQUEST_ID_1])
+ self.assertIn(returned_list.request_ids[1], [
+ TEST_REQUEST_ID, TEST_REQUEST_ID_1])
+ get_mock.assert_called_once_with(self.url)
+
+ def test_post(self):
+ body = {"hello": {"hi": 1}}
+ post_mock = self.mock_request_method('post', body)
+ rsrc = self.mgr._post(self.url, body, "hello")
+ post_mock.assert_called_once_with(self.url, body=body)
+ self.assertEqual(rsrc.data.hi, 1)
+
+ post_mock.reset_mock()
+
+ rsrc = self.mgr._post(self.url, body, "hello", return_raw=True)
+ post_mock.assert_called_once_with(self.url, body=body)
+ self.assertNotIsInstance(rsrc, base.Response)
+ self.assertEqual(rsrc["hi"], 1)
+
+ def test_put(self):
+ body = {"hello": {"hi": 1}}
+ put_mock = self.mock_request_method('put', body)
+ rsrc = self.mgr._put(self.url, body, "hello")
+ put_mock.assert_called_once_with(self.url, body=body)
+ self.assertEqual(rsrc.data.hi, 1)
+
+ put_mock.reset_mock()
+
+ rsrc = self.mgr._put(self.url, body)
+ put_mock.assert_called_once_with(self.url, body=body)
+ self.assertEqual(rsrc.data.hello["hi"], 1)
+ self.assertEqual(rsrc.request_ids[0], TEST_REQUEST_ID)
+
+ def test_head(self):
+ get_mock = self.mock_request_method('head', None)
+ rsrc = self.mgr._head(self.url)
+ get_mock.assert_called_once_with(self.url)
+ self.assertFalse(rsrc.data)
+ self.assertEqual(rsrc.request_ids[0], TEST_REQUEST_ID)
+
+ def test_delete(self):
+ delete_mock = self.mock_request_method('delete', None)
+ resp, base_resp = self.mgr._delete(self.url, name="hello")
+
+ delete_mock.assert_called_once_with('/test-url', name='hello')
+ self.assertEqual(base_resp.request_ids[0], TEST_REQUEST_ID)
+ self.assertEqual(base_resp.data, None)
+ self.assertTrue(isinstance(resp, requests.Response))
+
+ def test_patch(self):
+ body = {"hello": {"hi": 1}}
+ patch_mock = self.mock_request_method('patch', body)
+ rsrc = self.mgr._patch(self.url, body, "hello")
+ patch_mock.assert_called_once_with(self.url, body=body)
+ self.assertEqual(rsrc.data.hi, 1)
+
+ patch_mock.reset_mock()
+
+ rsrc = self.mgr._patch(self.url, body)
+ patch_mock.assert_called_once_with(self.url, body=body)
+ self.assertEqual(rsrc.data.hello["hi"], 1)
+ self.assertEqual(rsrc.request_ids[0], TEST_REQUEST_ID)
+
+ def test_update(self):
+ body = {"hello": {"hi": 1}}
+ patch_mock = self.mock_request_method('patch', body)
+ put_mock = self.mock_request_method('put', body)
+
+ rsrc = self.mgr._update(
+ self.url, body=body, response_key="hello", method="PATCH",
+ management=False)
+ patch_mock.assert_called_once_with(
+ self.url, management=False, body=body)
+ self.assertEqual(rsrc.data.hi, 1)
+
+ rsrc = self.mgr._update(
+ self.url, body=None, response_key="hello", method="PUT",
+ management=True)
+ put_mock.assert_called_once_with(self.url, management=True, body=None)
+ self.assertEqual(rsrc.data.hi, 1)
+ self.assertEqual(rsrc.request_ids[0], TEST_REQUEST_ID)
+
+
+class ManagerWithFindRequestIdTest(utils.TestCase):
+ url = "/fakes"
+ resp = create_response_with_request_id_header()
+
+ def setUp(self):
+ super(ManagerWithFindRequestIdTest, self).setUp()
+
+ auth = v2.Token(auth_url='http://127.0.0.1:5000',
+ token=self.TEST_TOKEN)
+ session_ = session.Session(auth=auth)
+ self.client = client.Client(session=session_,
+ include_metadata='True')._adapter
+
+ def test_find_resource(self):
+ body = {"roles": [{"name": 'entity_one'}, {"name": 'entity_one_1'}]}
+ request_resp = requests.Response()
+ request_resp.headers['x-openstack-request-id'] = TEST_REQUEST_ID
+
+ get_mock = self.useFixture(fixtures.MockPatchObject(
+ self.client, 'get', autospec=True,
+ side_effect=[exceptions.NotFound, (request_resp, body)])
+ ).mock
+
+ mgr = roles.RoleManager(self.client)
+ mgr.resource_class = roles.Role
+ response = base_utils.find_resource(mgr, 'entity_one')
+ get_mock.assert_called_with('/OS-KSADM/roles')
+ self.assertEqual(response.request_ids[0], TEST_REQUEST_ID)
+
+
+class CrudManagerRequestIdTest(utils.TestCase):
+ resp = create_response_with_request_id_header()
+ request_resp = requests.Response()
+ request_resp.headers['x-openstack-request-id'] = TEST_REQUEST_ID
+
+ def setUp(self):
+ super(CrudManagerRequestIdTest, self).setUp()
+
+ auth = v2.Token(auth_url='http://127.0.0.1:5000',
+ token=self.TEST_TOKEN)
+ session_ = session.Session(auth=auth)
+ self.client = client.Client(session=session_,
+ include_metadata='True')._adapter
+
+ def test_find_resource(self):
+ body = {"users": [{"name": 'entity_one'}]}
+ get_mock = self.useFixture(fixtures.MockPatchObject(
+ self.client, 'get', autospec=True,
+ side_effect=[exceptions.NotFound, (self.request_resp, body)])
+ ).mock
+ mgr = users.UserManager(self.client)
+ mgr.resource_class = users.User
+ response = base_utils.find_resource(mgr, 'entity_one')
+ get_mock.assert_called_with('/users?name=entity_one')
+ self.assertEqual(response.request_ids[0], TEST_REQUEST_ID)
+
+ def test_list(self):
+ body = {"users": [{"name": "admin"}, {"name": "admin"}]}
+
+ get_mock = self.useFixture(fixtures.MockPatchObject(
+ self.client, 'get', autospec=True,
+ return_value=(self.request_resp, body))
+ ).mock
+ mgr = users.UserManager(self.client)
+ mgr.resource_class = users.User
+ returned_list = mgr.list()
+ self.assertEqual(returned_list.request_ids[0], TEST_REQUEST_ID)
+ get_mock.assert_called_once_with('/users?')
diff --git a/keystoneclient/tests/unit/test_session.py b/keystoneclient/tests/unit/test_session.py
index 27d224d..e0d9b28 100644
--- a/keystoneclient/tests/unit/test_session.py
+++ b/keystoneclient/tests/unit/test_session.py
@@ -266,7 +266,7 @@ class SessionTests(utils.TestCase):
# elements to make sure that all joins are appropriately
# handled (any join of unicode and byte strings should
# raise a UnicodeDecodeError)
- session.post(unicode(self.TEST_URL), data=data)
+ session.post(six.text_type(self.TEST_URL), data=data)
self.assertNotIn('my data', self.logger.output)
diff --git a/keystoneclient/tests/unit/v3/test_limits.py b/keystoneclient/tests/unit/v3/test_limits.py
new file mode 100644
index 0000000..0dca67d
--- /dev/null
+++ b/keystoneclient/tests/unit/v3/test_limits.py
@@ -0,0 +1,77 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import uuid
+
+from keystoneclient.tests.unit.v3 import utils
+from keystoneclient.v3 import limits
+
+
+class LimitTests(utils.ClientTestCase, utils.CrudTests):
+ def setUp(self):
+ super(LimitTests, self).setUp()
+ self.key = 'limit'
+ self.collection_key = 'limits'
+ self.model = limits.Limit
+ self.manager = self.client.limits
+
+ def new_ref(self, **kwargs):
+ ref = {
+ 'id': uuid.uuid4().hex,
+ 'project_id': uuid.uuid4().hex,
+ 'service_id': uuid.uuid4().hex,
+ 'resource_name': uuid.uuid4().hex,
+ 'resource_limit': 15,
+ 'description': uuid.uuid4().hex
+ }
+ ref.update(kwargs)
+ return ref
+
+ def test_create(self):
+ # This test overrides the generic test case provided by the CrudTests
+ # class because the limits API supports creating multiple limits in a
+ # single POST request. As a result, it returns the limits as a list of
+ # all the created limits from the request. This is different from what
+ # the base test_create() method assumes about keystone's API. The
+ # changes here override the base test to closely model how the actual
+ # limit API behaves.
+ ref = self.new_ref()
+ manager_ref = ref.copy()
+ manager_ref.pop('id')
+ req_ref = [manager_ref.copy()]
+
+ self.stub_entity('POST', entity=req_ref, status_code=201)
+
+ returned = self.manager.create(**utils.parameterize(manager_ref))
+ self.assertIsInstance(returned, self.model)
+
+ expected_limit = req_ref.pop()
+ for attr in expected_limit:
+ self.assertEqual(
+ getattr(returned, attr),
+ expected_limit[attr],
+ 'Expected different %s' % attr)
+ self.assertEntityRequestBodyIs([expected_limit])
+
+ def test_list_filter_by_service(self):
+ service_id = uuid.uuid4().hex
+ expected_query = {'service_id': service_id}
+ self.test_list(expected_query=expected_query, service=service_id)
+
+ def test_list_filtered_by_resource_name(self):
+ resource_name = uuid.uuid4().hex
+ self.test_list(resource_name=resource_name)
+
+ def test_list_filtered_by_region(self):
+ region_id = uuid.uuid4().hex
+ expected_query = {'region_id': region_id}
+ self.test_list(expected_query=expected_query, region=region_id)
diff --git a/keystoneclient/tests/unit/v3/test_projects.py b/keystoneclient/tests/unit/v3/test_projects.py
index 8933bbf..fd91bac 100644
--- a/keystoneclient/tests/unit/v3/test_projects.py
+++ b/keystoneclient/tests/unit/v3/test_projects.py
@@ -10,12 +10,17 @@
# License for the specific language governing permissions and limitations
# under the License.
+import fixtures
+import requests
import uuid
from keystoneauth1 import exceptions as ksa_exceptions
+from keystoneauth1.identity import v3
+from keystoneauth1 import session
from keystoneclient import exceptions as ksc_exceptions
from keystoneclient.tests.unit.v3 import utils
+from keystoneclient.v3 import client
from keystoneclient.v3 import projects
@@ -395,3 +400,71 @@ class ProjectTests(utils.ClientTestCase, utils.CrudTests):
"name": project_id}
]}
return ret
+
+
+class ProjectsRequestIdTests(utils.TestCase):
+
+ url = "/projects"
+ resp = requests.Response()
+ TEST_REQUEST_ID = uuid.uuid4().hex
+ resp.headers['x-openstack-request-id'] = TEST_REQUEST_ID
+
+ def setUp(self):
+ super(ProjectsRequestIdTests, self).setUp()
+ auth = v3.Token(auth_url='http://127.0.0.1:5000',
+ token=self.TEST_TOKEN)
+ session_ = session.Session(auth=auth)
+ self.client = client.Client(session=session_,
+ include_metadata='True')._adapter
+ self.mgr = projects.ProjectManager(self.client)
+ self.mgr.resource_class = projects.Project
+
+ def _mock_request_method(self, method=None, body=None):
+ return self.useFixture(fixtures.MockPatchObject(
+ self.client, method, autospec=True,
+ return_value=(self.resp, body))
+ ).mock
+
+ def test_get_project(self):
+ body = {"project": {"name": "admin"}}
+ get_mock = self._mock_request_method(method='get', body=body)
+
+ response = self.mgr.get(project='admin')
+ self.assertEqual(response.request_ids[0], self.TEST_REQUEST_ID)
+ get_mock.assert_called_once_with(self.url + '/admin')
+
+ def test_create_project(self):
+ body = {"project": {"name": "admin", "domain": "admin"}}
+ post_mock = self._mock_request_method(method='post', body=body)
+
+ response = self.mgr.create('admin', 'admin')
+ self.assertEqual(response.request_ids[0], self.TEST_REQUEST_ID)
+ post_mock.assert_called_once_with(self.url, body={'project': {
+ 'name': 'admin', 'enabled': True, 'domain_id': 'admin'}})
+
+ def test_list_project(self):
+ body = {"projects": [{"name": "admin"}, {"name": "admin"}]}
+ get_mock = self._mock_request_method(method='get', body=body)
+
+ returned_list = self.mgr.list()
+ self.assertEqual(returned_list.request_ids[0], self.TEST_REQUEST_ID)
+ get_mock.assert_called_once_with(self.url + '?')
+
+ def test_update_project(self):
+ body = {"project": {"name": "admin"}}
+ patch_mock = self._mock_request_method(method='patch', body=body)
+
+ put_mock = self._mock_request_method(method='put', body=body)
+
+ response = self.mgr.update("admin", domain='demo')
+ self.assertEqual(response.request_ids[0], self.TEST_REQUEST_ID)
+ patch_mock.assert_called_once_with(self.url + '/admin', body={
+ 'project': {'domain_id': 'demo'}})
+ self.assertFalse(put_mock.called)
+
+ def test_delete_project(self):
+ get_mock = self._mock_request_method(method='delete')
+
+ _, resp = self.mgr.delete("admin")
+ self.assertEqual(resp.request_ids[0], self.TEST_REQUEST_ID)
+ get_mock.assert_called_once_with(self.url + '/admin')
diff --git a/keystoneclient/tests/unit/v3/test_registered_limits.py b/keystoneclient/tests/unit/v3/test_registered_limits.py
new file mode 100644
index 0000000..1f612f8
--- /dev/null
+++ b/keystoneclient/tests/unit/v3/test_registered_limits.py
@@ -0,0 +1,76 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import uuid
+
+from keystoneclient.tests.unit.v3 import utils
+from keystoneclient.v3 import registered_limits
+
+
+class RegisteredLimitTests(utils.ClientTestCase, utils.CrudTests):
+ def setUp(self):
+ super(RegisteredLimitTests, self).setUp()
+ self.key = 'registered_limit'
+ self.collection_key = 'registered_limits'
+ self.model = registered_limits.RegisteredLimit
+ self.manager = self.client.registered_limits
+
+ def new_ref(self, **kwargs):
+ ref = {
+ 'id': uuid.uuid4().hex,
+ 'service_id': uuid.uuid4().hex,
+ 'resource_name': uuid.uuid4().hex,
+ 'default_limit': 10,
+ 'description': uuid.uuid4().hex
+ }
+ ref.update(kwargs)
+ return ref
+
+ def test_create(self):
+ # This test overrides the generic test case provided by the CrudTests
+ # class because the registered limits API supports creating multiple
+ # limits in a single POST request. As a result, it returns the
+ # registered limits as a list of all the created limits from the
+ # request. This is different from what the base test_create() method
+ # assumes about keystone's API. The changes here override the base test
+ # to closely model how the actual registered limit API behaves.
+ ref = self.new_ref()
+ manager_ref = ref.copy()
+ manager_ref.pop('id')
+ req_ref = [manager_ref.copy()]
+
+ self.stub_entity('POST', entity=req_ref, status_code=201)
+
+ returned = self.manager.create(**utils.parameterize(manager_ref))
+ self.assertIsInstance(returned, self.model)
+
+ expected_limit = req_ref.pop()
+ for attr in expected_limit:
+ self.assertEqual(
+ getattr(returned, attr),
+ expected_limit[attr],
+ 'Expected different %s' % attr)
+ self.assertEntityRequestBodyIs([expected_limit])
+
+ def test_list_filter_by_service(self):
+ service_id = uuid.uuid4().hex
+ expected_query = {'service_id': service_id}
+ self.test_list(expected_query=expected_query, service=service_id)
+
+ def test_list_filter_resource_name(self):
+ resource_name = uuid.uuid4().hex
+ self.test_list(resource_name=resource_name)
+
+ def test_list_filter_region(self):
+ region_id = uuid.uuid4().hex
+ expected_query = {'region_id': region_id}
+ self.test_list(expected_query=expected_query, region=region_id)
diff --git a/keystoneclient/tests/unit/v3/utils.py b/keystoneclient/tests/unit/v3/utils.py
index d9cb5a4..5781a92 100644
--- a/keystoneclient/tests/unit/v3/utils.py
+++ b/keystoneclient/tests/unit/v3/utils.py
@@ -221,6 +221,8 @@ class CrudTests(object):
self.assertRequestBodyIs(json=self.encode(entity))
def test_create(self, ref=None, req_ref=None):
+ deprecations = self.useFixture(client_fixtures.Deprecations())
+ deprecations.expect_deprecations()
ref = ref or self.new_ref()
manager_ref = ref.copy()
manager_ref.pop('id')
@@ -343,6 +345,8 @@ class CrudTests(object):
self.assertQueryStringIs('')
def test_update(self, ref=None, req_ref=None):
+ deprecations = self.useFixture(client_fixtures.Deprecations())
+ deprecations.expect_deprecations()
ref = ref or self.new_ref()
self.stub_entity('PATCH', id=ref['id'], entity=ref)
diff --git a/keystoneclient/v3/client.py b/keystoneclient/v3/client.py
index e57e6bf..89ba5ac 100644
--- a/keystoneclient/v3/client.py
+++ b/keystoneclient/v3/client.py
@@ -37,9 +37,11 @@ from keystoneclient.v3 import ec2
from keystoneclient.v3 import endpoint_groups
from keystoneclient.v3 import endpoints
from keystoneclient.v3 import groups
+from keystoneclient.v3 import limits
from keystoneclient.v3 import policies
from keystoneclient.v3 import projects
from keystoneclient.v3 import regions
+from keystoneclient.v3 import registered_limits
from keystoneclient.v3 import role_assignments
from keystoneclient.v3 import roles
from keystoneclient.v3 import services
@@ -158,6 +160,10 @@ class Client(httpclient.HTTPClient):
:py:class:`keystoneclient.v3.groups.GroupManager`
+ .. py:attribute:: limits
+
+ :py:class:`keystoneclient.v3.limits.LimitManager`
+
.. py:attribute:: oauth1
:py:class:`keystoneclient.v3.contrib.oauth1.core.OAuthManager`
@@ -170,6 +176,10 @@ class Client(httpclient.HTTPClient):
:py:class:`keystoneclient.v3.regions.RegionManager`
+ .. py:attribute:: registered_limits
+
+ :py:class:`keystoneclient.v3.registered_limits.RegisteredLimitManager`
+
.. py:attribute:: role_assignments
:py:class:`keystoneclient.v3.role_assignments.RoleAssignmentManager`
@@ -230,9 +240,12 @@ class Client(httpclient.HTTPClient):
self.domains = domains.DomainManager(self._adapter)
self.federation = federation.FederationManager(self._adapter)
self.groups = groups.GroupManager(self._adapter)
+ self.limits = limits.LimitManager(self._adapter)
self.oauth1 = oauth1.create_oauth_manager(self._adapter)
self.policies = policies.PolicyManager(self._adapter)
self.projects = projects.ProjectManager(self._adapter)
+ self.registered_limits = registered_limits.RegisteredLimitManager(
+ self._adapter)
self.regions = regions.RegionManager(self._adapter)
self.role_assignments = (
role_assignments.RoleAssignmentManager(self._adapter))
diff --git a/keystoneclient/v3/limits.py b/keystoneclient/v3/limits.py
new file mode 100644
index 0000000..5d298a4
--- /dev/null
+++ b/keystoneclient/v3/limits.py
@@ -0,0 +1,148 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+from keystoneclient import base
+
+
+class Limit(base.Resource):
+ """Represents a project limit.
+
+ Attributes:
+ * id: a UUID that identifies the project limit
+ * service_id: a UUID that identifies the service for the limit
+ * region_id: a UUID that identifies the region for the limit
+ * project_id: a UUID that identifies the project for the limit
+ * resource_name: the name of the resource to limit
+ * resource_limit: the limit to apply to the project
+ * description: a description for the project limit
+
+ """
+
+ pass
+
+
+class LimitManager(base.CrudManager):
+ """Manager class for project limits."""
+
+ resource_class = Limit
+ collection_key = 'limits'
+ key = 'limit'
+
+ def create(self, project, service, resource_name, resource_limit,
+ description=None, region=None, **kwargs):
+ """Create a project-specific limit.
+
+ :param project: the project to create a limit for.
+ :type project: str or :class:`keystoneclient.v3.projects.Project`
+ :param service: the service that owns the resource to limit.
+ :type service: str or :class:`keystoneclient.v3.services.Service`
+ :param resource_name: the name of the resource to limit
+ :type resource_name: str
+ :param resource_limit: the quantity of the limit
+ :type resource_limit: int
+ :param description: a description of the limit
+ :type description: str
+ :param region: region the limit applies to
+ :type region: str or :class:`keystoneclient.v3.regions.Region`
+
+ :returns: a reference of the created limit
+ :rtype: :class:`keystoneclient.v3.limits.Limit`
+
+ """
+ limit_data = base.filter_none(
+ project_id=base.getid(project),
+ service_id=base.getid(service),
+ resource_name=resource_name,
+ resource_limit=resource_limit,
+ description=description,
+ region_id=base.getid(region),
+ **kwargs
+ )
+ body = {self.collection_key: [limit_data]}
+ resp, body = self.client.post('/limits', body=body)
+ limit = body[self.collection_key].pop()
+ return self.resource_class(self, limit)
+
+ def update(self, limit, project=None, service=None, resource_name=None,
+ resource_limit=None, description=None, **kwargs):
+ """Update a project-specific limit.
+
+ :param limit: a limit to update
+ :param project: the project ID of the limit to update
+ :type project: str or :class:`keystoneclient.v3.projects.Project`
+ :param resource_limit: the limit of the limit's resource to update
+ :type: resource_limit: int
+ :param description: a description of the limit
+ :type description: str
+
+ :returns: a reference of the updated limit.
+ :rtype: :class:`keystoneclient.v3.limits.Limit`
+
+ """
+ return super(LimitManager, self).update(
+ limit_id=base.getid(limit),
+ project_id=base.getid(project),
+ service_id=base.getid(service),
+ resource_name=resource_name,
+ resource_limit=resource_limit,
+ description=description,
+ **kwargs
+ )
+
+ def get(self, limit):
+ """Retrieve a project limit.
+
+ :param limit:
+ the project-specific limit to be retrieved.
+ :type limit:
+ str or :class:`keystoneclient.v3.limit.Limit`
+
+ :returns: a project-specific limit
+ :rtype: :class:`keystoneclient.v3.limit.Limit`
+
+ """
+ return super(LimitManager, self).get(limit_id=base.getid(limit))
+
+ def list(self, service=None, region=None, resource_name=None, **kwargs):
+ """List project-specific limits.
+
+ Any parameter provided will be passed to the server as a filter
+
+ :param service: service to filter limits by
+ :type service: UUID or :class:`keystoneclient.v3.services.Service`
+ :param region: region to filter limits by
+ :type region: UUID or :class:`keystoneclient.v3.regions.Region`
+ :param resource_name: the name of the resource to filter limits by
+ :type resource_name: str
+
+ :returns: a list of project-specific limits.
+ :rtype: list of :class:`keystoneclient.v3.limits.Limit`
+
+ """
+ return super(LimitManager, self).list(
+ service_id=base.getid(service),
+ region_id=base.getid(region),
+ resource_name=resource_name,
+ **kwargs
+ )
+
+ def delete(self, limit):
+ """Delete a project-specific limit.
+
+ :param limit: the project-specific limit to be deleted.
+ :type limit: str or :class:`keystoneclient.v3.limit.Limit`
+
+ :returns: Response object with 204 status
+ :rtype: :class:`requests.models.Response`
+
+ """
+ return super(LimitManager, self).delete(limit_id=base.getid(limit))
diff --git a/keystoneclient/v3/projects.py b/keystoneclient/v3/projects.py
index 79f8c93..aa94293 100644
--- a/keystoneclient/v3/projects.py
+++ b/keystoneclient/v3/projects.py
@@ -136,9 +136,21 @@ class ProjectManager(base.CrudManager):
domain_id=base.getid(domain),
fallback_to_auth=True,
**kwargs)
- for p in projects:
+
+ base_response = None
+ list_data = projects
+ if self.client.include_metadata:
+ base_response = projects
+ list_data = projects.data
+ base_response.data = list_data
+
+ for p in list_data:
p.tags = self._encode_tags(getattr(p, 'tags', []))
- return projects
+
+ if self.client.include_metadata:
+ base_response.data = list_data
+
+ return base_response if self.client.include_metadata else list_data
def _check_not_parents_as_ids_and_parents_as_list(self, parents_as_ids,
parents_as_list):
diff --git a/keystoneclient/v3/regions.py b/keystoneclient/v3/regions.py
index 7783b3f..0538a66 100644
--- a/keystoneclient/v3/regions.py
+++ b/keystoneclient/v3/regions.py
@@ -10,6 +10,7 @@
# License for the specific language governing permissions and limitations
# under the License.
+from debtcollector import removals
from keystoneclient import base
@@ -34,6 +35,11 @@ class RegionManager(base.CrudManager):
collection_key = 'regions'
key = 'region'
+ @removals.removed_kwarg(
+ 'enabled',
+ message='The enabled parameter is deprecated.',
+ version='3.18.0',
+ removal_version='4.0.0')
def create(self, id=None, description=None, enabled=True,
parent_region=None, **kwargs):
"""Create a region.
@@ -81,6 +87,11 @@ class RegionManager(base.CrudManager):
return super(RegionManager, self).list(
**kwargs)
+ @removals.removed_kwarg(
+ 'enabled',
+ message='The enabled parameter is deprecated.',
+ version='3.18.0',
+ removal_version='4.0.0')
def update(self, region, description=None, enabled=None,
parent_region=None, **kwargs):
"""Update a region.
diff --git a/keystoneclient/v3/registered_limits.py b/keystoneclient/v3/registered_limits.py
new file mode 100644
index 0000000..6593845
--- /dev/null
+++ b/keystoneclient/v3/registered_limits.py
@@ -0,0 +1,158 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+from keystoneclient import base
+
+
+class RegisteredLimit(base.Resource):
+ """Represents a registered limit.
+
+ Attributes:
+ * id: a UUID that identifies the registered limit
+ * service_id: a UUID that identifies the service for the limit
+ * region_id: a UUID that identifies the region for the limit
+ * resource_name: the name of the resource to limit
+ * default_limit: the default limit for projects to assume
+ * description: a description of the registered limit
+
+ """
+
+ pass
+
+
+class RegisteredLimitManager(base.CrudManager):
+ """Manager class for registered limits."""
+
+ resource_class = RegisteredLimit
+ collection_key = 'registered_limits'
+ key = 'registered_limit'
+
+ def create(self, service, resource_name, default_limit,
+ description=None, region=None, **kwargs):
+ """Create a registered limit.
+
+ :param service: a UUID that identifies the service for the limit.
+ :type service: str
+ :param resource_name: the name of the resource to limit.
+ :type resource_name: str
+ :param default_limit: the default limit for projects to assume.
+ :type default_limit: int
+ :param description: a string that describes the limit
+ :type description: str
+ :param region: a UUID that identifies the region for the limit.
+ :type region: str
+
+ :returns: a reference of the created registered limit.
+ :rtype: :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ """
+ # NOTE(lbragstad): Keystone's registered limit API supports creation of
+ # limits in batches. This client accepts a single limit and passes it
+ # to the identity service as a list of a single item.
+ limit_data = base.filter_none(
+ service_id=base.getid(service),
+ resource_name=resource_name,
+ default_limit=default_limit,
+ description=description,
+ region_id=base.getid(region),
+ **kwargs
+ )
+ body = {self.collection_key: [limit_data]}
+ resp, body = self.client.post('/registered_limits', body=body)
+ registered_limit = body[self.collection_key].pop()
+ return self.resource_class(self, registered_limit)
+
+ def update(self, registered_limit, service=None, resource_name=None,
+ default_limit=None, description=None, region=None, **kwargs):
+ """Update a registered limit.
+
+ :param registered_limit:
+ the UUID or reference of the registered limit to update.
+ :param registered_limit:
+ str or :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+ :param service: a UUID that identifies the service for the limit.
+ :type service: str
+ :param resource_name: the name of the resource to limit.
+ :type resource_name: str
+ :param default_limit: the default limit for projects to assume.
+ :type default_limit: int
+ :param description: a string that describes the limit
+ :type description: str
+ :param region: a UUID that identifies the region for the limit.
+ :type region: str
+
+ :returns: a reference of the updated registered limit.
+ :rtype: :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ """
+ return super(RegisteredLimitManager, self).update(
+ registered_limit_id=base.getid(registered_limit),
+ service_id=base.getid(service),
+ resource_name=resource_name,
+ default_limit=default_limit,
+ description=description,
+ region=region,
+ **kwargs
+ )
+
+ def get(self, registered_limit):
+ """Retrieve a registered limit.
+
+ :param registered_limit: the registered limit to get.
+ :type registered_limit:
+ str or :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ :returns: a specific registered limit.
+ :rtype: :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ """
+ return super(RegisteredLimitManager, self).get(
+ registered_limit_id=base.getid(registered_limit))
+
+ def list(self, service=None, resource_name=None, region=None, **kwargs):
+ """List registered limits.
+
+ Any parameter provided will be passed to the server as a filter.
+
+ :param service: filter registered limits by service
+ :type service: a UUID or :class:`keystoneclient.v3.services.Service`
+ :param resource_name: filter registered limits by resource name
+ :type resource_name: str
+ :param region: filter registered limits by region
+ :type region: a UUID or :class:`keystoneclient.v3.regions.Region`
+
+ :returns: a list of registered limits.
+ :rtype: list of
+ :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ """
+ return super(RegisteredLimitManager, self).list(
+ service_id=base.getid(service),
+ resource_name=resource_name,
+ region_id=base.getid(region),
+ **kwargs)
+
+ def delete(self, registered_limit):
+ """Delete a registered limit.
+
+ :param registered_limit: the registered limit to delete.
+ :type registered_limit:
+ str or :class:`keystoneclient.v3.registered_limits.RegisteredLimit`
+
+ :returns: Response object with 204 status.
+ :rtype: :class:`requests.models.Response`
+
+ """
+ registered_limit_id = base.getid(registered_limit)
+ return super(RegisteredLimitManager, self).delete(
+ registered_limit_id=registered_limit_id
+ )