summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJorge L. Williams <jorge.williams@rackspace.com>2011-04-22 01:25:45 -0500
committerJorge L. Williams <jorge.williams@rackspace.com>2011-04-22 01:25:45 -0500
commit53cbd3bc9667bb46f16aa7c23ee4e278e6dd6009 (patch)
treee9f4d4299fccabf2c64b3164b7f0298ddc65bf70
parent552ce8f9c5984434b80b8af15f109b8a1850b73c (diff)
downloadkeystone-53cbd3bc9667bb46f16aa7c23ee4e278e6dd6009.tar.gz
keystone-53cbd3bc9667bb46f16aa7c23ee4e278e6dd6009.tar.xz
keystone-53cbd3bc9667bb46f16aa7c23ee4e278e6dd6009.zip
Cleaned up validate token call.
-rw-r--r--keystone/logic/service.py20
1 files changed, 11 insertions, 9 deletions
diff --git a/keystone/logic/service.py b/keystone/logic/service.py
index 9565b7db..d6f31955 100644
--- a/keystone/logic/service.py
+++ b/keystone/logic/service.py
@@ -34,7 +34,7 @@ class IDMService(object):
True
def validate_token(self, admin_token, token_id, belongs_to=None):
- self.__validate_admin_token(admin_token)
+ self.__validate_token(admin_token)
group1 = auth.Group("Admin","19928")
group2 = auth.Group("Other","28882")
gs = [group1, group2]
@@ -71,10 +71,10 @@ class IDMService(object):
#
# Private Operations
#
- def __validate_admin_token(self, admin_token):
- if not admin_token:
- raise fault.UnauthorizedFault("Missing admin token")
- token = db_api.token_get(admin_token)
+ def __validate_token(self, token_id, admin=True):
+ if not token_id:
+ raise fault.UnauthorizedFault("Missing token")
+ token = db_api.token_get(token_id)
if not token:
raise fault.UnauthorizedFault("Bad token, please reauthenticate")
if token.expires < datetime.now():
@@ -82,8 +82,10 @@ class IDMService(object):
user = db_api.user_get(token.user_id)
if not user.enabled:
raise fault.UserDisabledFault("The user "+user.id+" has been disabled!")
- for ug in user.groups:
- if ug.group_id == "Admin":
- return True
- raise fault.ForbiddenFault("You are not authorized to make this call")
+ if admin:
+ for ug in user.groups:
+ if ug.group_id == "Admin":
+ return True
+ raise fault.ForbiddenFault("You are not authorized to make this call")
+ return True