summaryrefslogtreecommitdiffstats
path: root/keystone/auth
diff options
context:
space:
mode:
authorRussell Bryant <rbryant@redhat.com>2013-03-22 12:47:27 -0400
committerRussell Bryant <rbryant@redhat.com>2013-03-22 12:56:42 -0400
commitbceee56097ec705298caac0fa8651c3c0b79d972 (patch)
tree0e6915f02e6d0e7df1448138a375c21ab4d2ebee /keystone/auth
parent09811ecce51a602ee92422b7ea69b93f15796523 (diff)
downloadkeystone-bceee56097ec705298caac0fa8651c3c0b79d972.tar.gz
keystone-bceee56097ec705298caac0fa8651c3c0b79d972.tar.xz
keystone-bceee56097ec705298caac0fa8651c3c0b79d972.zip
Rename trust extension.
Change trust extension from RH-TRUST to OS-TRUST so that the namespace being used is for OpenStack, as opposed to a contributing company. This is also more consistent with namespacing used in other OpenStack APIs. Some additional discussion about this is in this thread: http://lists.openstack.org/pipermail/openstack-dev/2013-March/006876.html Change-Id: I0fd869abe0f527c899808a4dde19dbd1fb6f32cd
Diffstat (limited to 'keystone/auth')
-rw-r--r--keystone/auth/controllers.py8
-rw-r--r--keystone/auth/token_factory.py2
2 files changed, 5 insertions, 5 deletions
diff --git a/keystone/auth/controllers.py b/keystone/auth/controllers.py
index 1ab9de03..113655db 100644
--- a/keystone/auth/controllers.py
+++ b/keystone/auth/controllers.py
@@ -171,9 +171,9 @@ class AuthInfo(object):
return
if sum(['project' in self.auth['scope'],
'domain' in self.auth['scope'],
- 'RH-TRUST:trust' in self.auth['scope']]) != 1:
+ 'OS-TRUST:trust' in self.auth['scope']]) != 1:
raise exception.ValidationError(
- attribute='project, domain, or RH-TRUST:trust',
+ attribute='project, domain, or OS-TRUST:trust',
target='scope')
if 'project' in self.auth['scope']:
@@ -182,11 +182,11 @@ class AuthInfo(object):
elif 'domain' in self.auth['scope']:
domain_ref = self._lookup_domain(self.auth['scope']['domain'])
self._scope_data = (domain_ref['id'], None, None)
- elif 'RH-TRUST:trust' in self.auth['scope']:
+ elif 'OS-TRUST:trust' in self.auth['scope']:
if not CONF.trust.enabled:
raise exception.Forbidden('Trusts are disabled.')
trust_ref = self._lookup_trust(
- self.auth['scope']['RH-TRUST:trust'])
+ self.auth['scope']['OS-TRUST:trust'])
#TODO ayoung when trusts support domain, Fill in domain data here
if 'project_id' in trust_ref:
project_ref = self._lookup_project(
diff --git a/keystone/auth/token_factory.py b/keystone/auth/token_factory.py
index 430c442a..909aa48a 100644
--- a/keystone/auth/token_factory.py
+++ b/keystone/auth/token_factory.py
@@ -114,7 +114,7 @@ class TokenDataHelper(object):
raise exception.Forbidden()
if trust['impersonation']:
user_ref = trustor_user_ref
- token_data['RH-TRUST:trust'] = (
+ token_data['OS-TRUST:trust'] = (
{
'id': trust['id'],
'trustor_user': {'id': trust['trustor_user_id']},