keystone.api.os_inherit module
updated: 2023-04-14 08:07
keystone.api.os_inherit module
-
class keystone.api.os_inherit.OSInheritAPI(blueprint_url_prefix='', api_url_prefix='', default_mediatype='application/json', decorators=None, errors=None)[source]
Bases: APIBase
-
resource_mapping = [resource_map(resource=<class 'keystone.api.os_inherit.OSInheritDomainGroupRolesResource'>, url='/domains/<string:domain_id>/groups/<string:group_id>/roles/<string:role_id>/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/domain_group_role_inherited_to_projects', status='stable', path_vars={'domain_id': 'https://docs.openstack.org/api/openstack-identity/3/param/domain_id', 'group_id': 'https://docs.openstack.org/api/openstack-identity/3/param/group_id', 'role_id': 'https://docs.openstack.org/api/openstack-identity/3/param/role_id'})), resource_map(resource=<class 'keystone.api.os_inherit.OSInheritDomainGroupRolesListResource'>, url='/domains/<string:domain_id>/groups/<string:group_id>/roles/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/domain_group_roles_inherited_to_projects', status='stable', path_vars={'domain_id': 'https://docs.openstack.org/api/openstack-identity/3/param/domain_id', 'group_id': 'https://docs.openstack.org/api/openstack-identity/3/param/group_id'})), resource_map(resource=<class 'keystone.api.os_inherit.OSInheritDomainUserRolesResource'>, url='/domains/<string:domain_id>/users/<string:user_id>/roles/<string:role_id>/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/domain_user_role_inherited_to_projects', status='stable', path_vars={'domain_id': 'https://docs.openstack.org/api/openstack-identity/3/param/domain_id', 'user_id': 'https://docs.openstack.org/api/openstack-identity/3/param/user_id', 'role_id': 'https://docs.openstack.org/api/openstack-identity/3/param/role_id'})), resource_map(resource=<class 'keystone.api.os_inherit.OSInheritDomainUserRolesListResource'>, url='/domains/<string:domain_id>/users/<string:user_id>/roles/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/domain_user_roles_inherited_to_projects', status='stable', path_vars={'domain_id': 'https://docs.openstack.org/api/openstack-identity/3/param/domain_id', 'user_id': 'https://docs.openstack.org/api/openstack-identity/3/param/user_id'})), resource_map(resource=<class 'keystone.api.os_inherit.OSInheritProjectUserResource'>, url='/projects/<string:project_id>/users/<string:user_id>/roles/<string:role_id>/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/project_user_role_inherited_to_projects', status='stable', path_vars={'project_id': 'https://docs.openstack.org/api/openstack-identity/3/param/project_id', 'user_id': 'https://docs.openstack.org/api/openstack-identity/3/param/user_id', 'role_id': 'https://docs.openstack.org/api/openstack-identity/3/param/role_id'})), resource_map(resource=<class 'keystone.api.os_inherit.OSInheritProjectGroupResource'>, url='/projects/<string:project_id>/groups/<string:group_id>/roles/<string:role_id>/inherited_to_projects', alternate_urls=None, kwargs={}, json_home_data=json_home_data(rel='https://docs.openstack.org/api/openstack-identity/3/ext/OS-INHERIT/1.0/rel/project_group_role_inherited_to_projects', status='stable', path_vars={'project_id': 'https://docs.openstack.org/api/openstack-identity/3/param/project_id', 'group_id': 'https://docs.openstack.org/api/openstack-identity/3/param/group_id', 'role_id': 'https://docs.openstack.org/api/openstack-identity/3/param/role_id'}))]
-
resources = []
-
class keystone.api.os_inherit.OSInheritDomainGroupRolesListResource[source]
Bases: Resource
-
get(domain_id, group_id)[source]
List roles (inherited) for a group on a domain.
- GET/HEAD /OS-INHERIT/domains/{domain_id}/groups/{group_id}
/roles/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'GET'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
class keystone.api.os_inherit.OSInheritDomainGroupRolesResource[source]
Bases: Resource
-
delete(domain_id, group_id, role_id)[source]
Revoke an inherited grant for a group on a domain.
- DELETE /OS-INHERIT/domains/{domain_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
get(domain_id, group_id, role_id)[source]
Check for an inherited grant for a group on a domain.
- GET/HEAD /OS-INHERIT/domains/{domain_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'DELETE', 'GET', 'PUT'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
put(domain_id, group_id, role_id)[source]
Create an inherited grant for a group on a domain.
- PUT /OS-INHERIT/domains/{domain_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
class keystone.api.os_inherit.OSInheritDomainUserRolesListResource[source]
Bases: Resource
-
get(domain_id, user_id)[source]
List roles (inherited) for a user on a domain.
- GET/HEAD /OS-INHERIT/domains/{domain_id}/users/{user_id}
/roles/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'GET'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
class keystone.api.os_inherit.OSInheritDomainUserRolesResource[source]
Bases: Resource
-
delete(domain_id, user_id, role_id)[source]
Revoke a grant from a user on a domain.
- DELETE /OS-INHERIT/domains/{domain_id}/users/{user_id}/roles
/{role_id}/inherited_to_projects
-
get(domain_id, user_id, role_id)[source]
Check for an inherited grant for a user on a domain.
- GET/HEAD /OS-INHERIT/domains/{domain_id}/users/{user_id}/roles
/{role_id}/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'DELETE', 'GET', 'PUT'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
put(domain_id, user_id, role_id)[source]
Create an inherited grant for a user on a domain.
- PUT /OS-INHERIT/domains/{domain_id}/users/{user_id}/roles/{role_id}
/inherited_to_projects
-
class keystone.api.os_inherit.OSInheritProjectGroupResource[source]
Bases: Resource
-
delete(project_id, group_id, role_id)[source]
Revoke an inherited grant for a group on a project.
- DELETE /OS-INHERIT/projects/{project_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
get(project_id, group_id, role_id)[source]
Check for an inherited grant for a group on a project.
- GET/HEAD /OS-INHERIT/projects/{project_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'DELETE', 'GET', 'PUT'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
put(project_id, group_id, role_id)[source]
Create an inherited grant for a group on a project.
- PUT /OS-INHERIT/projects/{project_id}/groups/{group_id}
/roles/{role_id}/inherited_to_projects
-
class keystone.api.os_inherit.OSInheritProjectUserResource[source]
Bases: Resource
-
delete(project_id, user_id, role_id)[source]
Revoke an inherited grant for a user on a project.
- DELETE /OS-INHERIT/projects/{project_id}/users/{user_id}
/roles/{role_id}/inherited_to_projects
-
get(project_id, user_id, role_id)[source]
Check for an inherited grant for a user on a project.
- GET/HEAD /OS-INHERIT/projects/{project_id}/users/{user_id}
/roles/{role_id}/inherited_to_projects
-
methods: t.ClassVar[t.Optional[t.Collection[str]]] = {'DELETE', 'GET', 'PUT'}
The methods this view is registered for. Uses the same default
(["GET", "HEAD", "OPTIONS"]
) as route
and
add_url_rule
by default.
-
put(project_id, user_id, role_id)[source]
Create an inherited grant for a user on a project.
- PUT /OS-INHERIT/projects/{project_id}/users/{user_id}
/roles/{role_id}/inherited_to_projects
updated: 2023-04-14 08:07