Fix response data for API access-allow

API access-allow returns following redundant data:
- deleted
- deleted_at
- instance_mappings

So, remove them for create share api method and cover it with
unit and tempest tests.

Change-Id: I103380c3f0008d4879b39f339187e57eeec40456
Closes-Bug: #1499733
(cherry picked from commit beb9191c69058cecb3c961297213a1c59f65745e)
diff --git a/manila_tempest_tests/tests/api/test_rules.py b/manila_tempest_tests/tests/api/test_rules.py
index 7198c90..5336127 100644
--- a/manila_tempest_tests/tests/api/test_rules.py
+++ b/manila_tempest_tests/tests/api/test_rules.py
@@ -30,7 +30,10 @@
     """
     rule = self.shares_client.create_access_rule(
         self.share["id"], self.access_type, self.access_to, 'ro')
+
     self.assertEqual('ro', rule['access_level'])
+    for key in ('deleted', 'deleted_at', 'instance_mappings'):
+        self.assertNotIn(key, rule.keys())
     self.shares_client.wait_for_access_rule_status(
         self.share["id"], rule["id"], "active")
     self.shares_client.delete_access_rule(self.share["id"], rule["id"])
@@ -61,7 +64,10 @@
         # create rule
         rule = self.shares_client.create_access_rule(
             self.share["id"], self.access_type, access_to)
+
         self.assertEqual('rw', rule['access_level'])
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            self.assertNotIn(key, rule.keys())
         self.shares_client.wait_for_access_rule_status(
             self.share["id"], rule["id"], "active")
 
@@ -79,6 +85,9 @@
         # create rule
         rule = self.shares_client.create_access_rule(
             self.share["id"], self.access_type, access_to)
+
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            self.assertNotIn(key, rule.keys())
         self.assertEqual('rw', rule['access_level'])
         self.shares_client.wait_for_access_rule_status(
             self.share["id"], rule["id"], "active")
@@ -128,7 +137,10 @@
         # create rule
         rule = self.shares_client.create_access_rule(
             self.share["id"], self.access_type, self.access_to)
+
         self.assertEqual('rw', rule['access_level'])
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            self.assertNotIn(key, rule.keys())
         self.shares_client.wait_for_access_rule_status(
             self.share["id"], rule["id"], "active")
 
@@ -179,7 +191,10 @@
         # create rule
         rule = self.shares_client.create_access_rule(
             self.share["id"], self.access_type, self.access_to)
+
         self.assertEqual('rw', rule['access_level'])
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            self.assertNotIn(key, rule.keys())
         self.shares_client.wait_for_access_rule_status(
             self.share["id"], rule["id"], "active")
 
@@ -193,7 +208,10 @@
     def test_create_delete_cert_ro_access_rule(self):
         rule = self.shares_client.create_access_rule(
             self.share["id"], 'cert', 'client2.com', 'ro')
+
         self.assertEqual('ro', rule['access_level'])
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            self.assertNotIn(key, rule.keys())
         self.shares_client.wait_for_access_rule_status(
             self.share["id"], rule["id"], "active")
         self.shares_client.delete_access_rule(self.share["id"], rule["id"])
@@ -249,8 +267,10 @@
         rules = self.shares_client.list_access_rules(self.share["id"])
 
         # verify keys
-        keys = ["state", "id", "access_type", "access_to", "access_level"]
-        [self.assertIn(key, r.keys()) for r in rules for key in keys]
+        for key in ("state", "id", "access_type", "access_to", "access_level"):
+            [self.assertIn(key, r.keys()) for r in rules]
+        for key in ('deleted', 'deleted_at', 'instance_mappings'):
+            [self.assertNotIn(key, r.keys()) for r in rules]
 
         # verify values
         self.assertEqual("active", rules[0]["state"])