keystone.token.controllers.BaseAuthenticationMethod(*args, **kwargs)[source]¶Bases: object
Common utilities/dependencies for all authentication method classes.
keystone.token.controllers.ExternalAuthNotApplicable[source]¶Bases: exceptions.Exception
External authentication is not applicable.
keystone.token.controllers.ExternalAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate using an external authentication method.
authenticate(request, auth)[source]¶Try to authenticate an external user via REMOTE_USER variable.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.LocalAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate against a local backend using password credentials.
authenticate(request, auth)[source]¶Try to authenticate against the identity backend.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.TokenAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate using an existing token.
authenticate(request, auth)[source]¶Try to authenticate using an already existing token.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.V2TokenDataHelper(*args, **kwargs)[source]¶Bases: object
Create V2 token data.
format_catalog(catalog_ref)[source]¶Munge catalogs from internal to output format.
Internal catalogs look like:
{$REGION: {
{$SERVICE: {
$key1: $value1,
...
}
}
}
The legacy api wants them to look like:
[{'name': $SERVICE[name],
'type': $SERVICE,
'endpoints': [{
'tenantId': $tenant_id,
...
'region': $REGION,
}],
'endpoints_links': [],
}]
v3_to_v2_token(v3_token_data, token_id)[source]¶Convert v3 token data into v2.0 token data.
This method expects a dictionary generated from V3TokenDataHelper.get_token_data() and converts it to look like a v2.0 token dictionary.
| Parameters: |
|
|---|---|
| Returns: | dictionary formatted for v2 tokens |
| Raises: | keystone.exception.Unauthorized – If a specific token type is not supported in v2. |
keystone.token.controllers.authentication_method_generator(request, auth)[source]¶Given an request return a suitable authentication method.
This is simply a generator to handle matching an authentication request with the appropriate authentication method.
| Parameters: | auth – Dictionary containing authentication information from the request. |
|---|---|
| Returns: | An authentication method class object. |
Token provider interface.
keystone.token.provider.Manager(*args, **kwargs)[source]¶Bases: keystone.common.manager.Manager
Default pivot point for the token provider backend.
See keystone.common.manager.Manager for more details on how this
dynamically calls the backend.
INVALIDATE_PROJECT_TOKEN_PERSISTENCE = 'invalidate_project_tokens'¶INVALIDATE_USER_TOKEN_PERSISTENCE = 'invalidate_user_tokens'¶V2 = 'v2.0'¶V3 = 'v3.0'¶VERSIONS = frozenset(['v3.0', 'v2.0'])¶driver_namespace = 'keystone.token.provider'¶
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.