api-ref: Correct app credentials auth response

In change I322a40404d8287748fe8c3a8d6dc1256d935d84a we switched from an
'auth_credential_required' field in the response to an 'auth_credential'
object. Correct the api-ref.

While we're alphabetize the response parameters.

Change-Id: Ie5dd375c4922cee895e4dfe25defb70a0b5e21a7
Signed-off-by: Stephen Finucane <sfinucan@redhat.com>
This commit is contained in:
Stephen Finucane 2023-02-03 17:04:16 +00:00
parent 02db926396
commit 434dbe1e73
3 changed files with 41 additions and 35 deletions

View File

@ -151,19 +151,21 @@ Parameters
.. rest_parameters:: parameters.yaml
- X-Subject-Token: X-Subject-Token
- domain: domain
- methods: auth_methods
- user: user
- token: token
- expires_at: expires_at
- project: project
- catalog: catalog
- roles: roles
- application_credential: auth_application_credential_body
- application_credential.id: response_application_credential_id_body
- application_credential.name: response_application_credential_name_body
- application_credential.restricted: response_application_credential_unrestricted_body
- audit_ids: audit_ids
- catalog: catalog
- expires_at: expires_at
- issued_at: issued_at
- id: user_id
- name: user_name
- application_credential_restricted: auth_application_credential_restricted_body
- methods: auth_methods
- project: project
- roles: roles
- user: user
- user.id: user_id
- user.name: user_name
Example
~~~~~~~

View File

@ -500,7 +500,7 @@ auth:
in: body
required: true
type: object
auth_application_credential_restricted_body:
auth_application_credential_body:
description: |
Whether the application credential is permitted to be used for creating and
deleting additional application credentials and trusts.

View File

@ -1,24 +1,13 @@
{
"token": {
"is_domain": false,
"methods": [
"application_credential"
],
"roles": [
{
"id": "df8b7e3bf6fb49e9ba19122da2bae916",
"name": "Member"
}
],
"expires_at": "2018-01-15T22:14:05.000000Z",
"project": {
"domain": {
"id": "default",
"name": "Default"
},
"id": "231c62fb0fbd485b995e8b060c3f0d98",
"name": "demo"
"application_credential": {
"id": "423f19a4ac1e4f48bbb4180756e6eb6c",
"name": "monitoring",
"restricted": true
},
"audit_ids": [
"9JsolhssRzKfyayTIiCRUg"
],
"catalog": [
{
"endpoints": [
@ -42,7 +31,26 @@
"name": "keystone"
}
],
"application_credential_restricted": true,
"expires_at": "2018-01-15T22:14:05.000000Z",
"is_domain": false,
"issued_at": "2018-01-15T21:14:05.000000Z",
"methods": [
"application_credential"
],
"project": {
"domain": {
"id": "default",
"name": "Default"
},
"id": "231c62fb0fbd485b995e8b060c3f0d98",
"name": "demo"
},
"roles": [
{
"id": "df8b7e3bf6fb49e9ba19122da2bae916",
"name": "Member"
}
],
"user": {
"password_expires_at": null,
"domain": {
@ -51,10 +59,6 @@
},
"id": "fd786d56402c4d1691372e7dee0d00b5",
"name": "demo"
},
"audit_ids": [
"9JsolhssRzKfyayTIiCRUg"
],
"issued_at": "2018-01-15T21:14:05.000000Z"
}
}
}