diff options
| author | Jenkins <jenkins@review.openstack.org> | 2017-06-22 19:53:03 +0000 |
|---|---|---|
| committer | Gerrit Code Review <review@openstack.org> | 2017-06-22 19:53:03 +0000 |
| commit | 19c8cabeca1ea3c83da734ab5269318b27eb5634 (patch) | |
| tree | 17f706dffe571922e86d5f31714abf5bbbdd13e6 /openstackclient | |
| parent | fe82f4b281112634eb5a71694de5fcc9cde95ca3 (diff) | |
| parent | da53c2b33457f4f1e93bdda6c0c16172ea36bc78 (diff) | |
| download | python-openstackclient-19c8cabeca1ea3c83da734ab5269318b27eb5634.tar.gz | |
Merge "When creating a trust, send role_ids instead or role_names"
Diffstat (limited to 'openstackclient')
| -rw-r--r-- | openstackclient/identity/v3/trust.py | 12 | ||||
| -rw-r--r-- | openstackclient/tests/unit/identity/v3/test_trust.py | 2 |
2 files changed, 7 insertions, 7 deletions
diff --git a/openstackclient/identity/v3/trust.py b/openstackclient/identity/v3/trust.py index 52daeb4d..155063bb 100644 --- a/openstackclient/identity/v3/trust.py +++ b/openstackclient/identity/v3/trust.py @@ -104,16 +104,16 @@ class CreateTrust(command.ShowOne): parsed_args.project, parsed_args.project_domain).id - role_names = [] + role_ids = [] for role in parsed_args.role: try: - role_name = utils.find_resource( + role_id = utils.find_resource( identity_client.roles, role, - ).name + ).id except identity_exc.Forbidden: - role_name = role - role_names.append(role_name) + role_id = role + role_ids.append(role_id) expires_at = None if parsed_args.expiration: @@ -124,7 +124,7 @@ class CreateTrust(command.ShowOne): trustee_id, trustor_id, impersonation=parsed_args.impersonate, project=project_id, - role_names=role_names, + role_ids=role_ids, expires_at=expires_at, ) diff --git a/openstackclient/tests/unit/identity/v3/test_trust.py b/openstackclient/tests/unit/identity/v3/test_trust.py index 93e8f63d..614aab54 100644 --- a/openstackclient/tests/unit/identity/v3/test_trust.py +++ b/openstackclient/tests/unit/identity/v3/test_trust.py @@ -94,7 +94,7 @@ class TestTrustCreate(TestTrust): kwargs = { 'impersonation': False, 'project': identity_fakes.project_id, - 'role_names': [identity_fakes.role_name], + 'role_ids': [identity_fakes.role_id], 'expires_at': None, } # TrustManager.create(trustee_id, trustor_id, impersonation=, |
