Skip to content

Commit

Permalink
Minor corrections to the middleware and wadl.
Browse files Browse the repository at this point in the history
Change-Id: I608a547dc16178c866a932d8ced449c64eb8c9db
  • Loading branch information
yoga80 committed Oct 13, 2011
1 parent 1bf12cc commit 4b07efe
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 8 deletions.
5 changes: 1 addition & 4 deletions keystone/content/admin/identity-admin.wadl
Expand Up @@ -305,10 +305,7 @@
</doc>
</param>
</request>
<response status="200 203">
<representation mediaType="application/xml" element="identity:access"/>
<representation mediaType="application/json"/>
</response>
<response status="200 203"/>
&commonFaults;
&getFaults;
</method>
Expand Down
2 changes: 1 addition & 1 deletion keystone/content/service/identity.wadl
Expand Up @@ -73,7 +73,7 @@

<!-- Version -->

<method name="GET" id="versionDetails">
<method name="GET" id="getVersionInfo">
<doc xml:lang="EN" title="Version Details">
<p xmlns="http://www.w3.org/1999/xhtml">
Returns detailed information about this specific version of the API.
Expand Down
7 changes: 4 additions & 3 deletions keystone/middleware/auth_token.py
Expand Up @@ -195,7 +195,8 @@ def get_admin_auth_token(self, username, password):
validate a user's token. Validate_token is a priviledged call so
it needs to be authenticated by a service that is calling it
"""
headers = {"Content-type": "application/json", "Accept": "text/json"}
headers = {"Content-type": "application/json",
"Accept": "application/json"}
params = {"passwordCredentials": {"username": username,
"password": password,
"tenantId": "1"}}
Expand Down Expand Up @@ -238,7 +239,7 @@ def _validate_claims(self, claims):
# since this is a priviledged op,m we need to auth ourselves
# by using an admin token
headers = {"Content-type": "application/json",
"Accept": "text/json",
"Accept": "application/json",
"X-Auth-Token": self.admin_token}
##TODO(ziad):we need to figure out how to auth to keystone
#since validate_token is a priviledged call
Expand All @@ -264,7 +265,7 @@ def _expound_claims(self, claims):
# Valid token. Get user data and put it in to the call
# so the downstream service can use it
headers = {"Content-type": "application/json",
"Accept": "text/json",
"Accept": "application/json",
"X-Auth-Token": self.admin_token}
##TODO(ziad):we need to figure out how to auth to keystone
#since validate_token is a priviledged call
Expand Down

0 comments on commit 4b07efe

Please sign in to comment.