keystone.token.controllers.Auth(*args, **kwargs)[source]¶Bases: keystone.common.controller.V2Controller
authenticate(*args, **kwargs)[source]¶Authenticate credentials and return a token.
Accept auth as a dict that looks like:
{
"auth":{
"passwordCredentials":{
"username":"test_user",
"password":"mypass"
},
"tenantName":"customer-x"
}
}
In this case, tenant is optional, if not provided the token will be considered “unscoped” and can later be used to get a scoped token.
Alternatively, this call accepts auth with only a token and tenant that will return a token that is scoped to that tenant.
format_endpoint_list(catalog_ref)[source]¶Format a list of endpoints according to Identity API v2.
The v2.0 API wants an endpoint list to look like:
{
'endpoints': [
{
'id': $endpoint_id,
'name': $SERVICE[name],
'type': $SERVICE,
'tenantId': $tenant_id,
'region': $REGION,
}
],
'endpoints_links': [],
}
keystone.token.controllers.BaseAuthenticationMethod(*args, **kwargs)[source]¶Bases: object
Common utilities/dependencies for all authentication method classes.
keystone.token.controllers.ExternalAuthNotApplicable[source]¶Bases: exceptions.Exception
External authentication is not applicable.
keystone.token.controllers.ExternalAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate using an external authentication method.
authenticate(request, auth)[source]¶Try to authenticate an external user via REMOTE_USER variable.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.LocalAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate against a local backend using password credentials.
authenticate(request, auth)[source]¶Try to authenticate against the identity backend.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.TokenAuthenticationMethod(*args, **kwargs)[source]¶Bases: keystone.token.controllers.BaseAuthenticationMethod
Authenticate using an existing token.
authenticate(request, auth)[source]¶Try to authenticate using an already existing token.
| Parameters: |
|
|---|---|
| Returns: | A tuple containing the user reference, project identifier, token expiration, bind information, and original audit information. |
keystone.token.controllers.V2TokenDataHelper(*args, **kwargs)[source]¶Bases: object
Create V2 token data.
format_catalog(catalog_ref)[source]¶Munge catalogs from internal to output format.
Internal catalogs look like:
{$REGION: {
{$SERVICE: {
$key1: $value1,
...
}
}
}
The legacy api wants them to look like:
[{'name': $SERVICE[name],
'type': $SERVICE,
'endpoints': [{
'tenantId': $tenant_id,
...
'region': $REGION,
}],
'endpoints_links': [],
}]
v3_to_v2_token(v3_token_data, token_id)[source]¶Convert v3 token data into v2.0 token data.
This method expects a dictionary generated from V3TokenDataHelper.get_token_data() and converts it to look like a v2.0 token dictionary.
| Parameters: |
|
|---|---|
| Returns: | dictionary formatted for v2 tokens |
| Raises: | keystone.exception.Unauthorized – If a specific token type is not supported in v2. |
keystone.token.controllers.authentication_method_generator(request, auth)[source]¶Given an request return a suitable authentication method.
This is simply a generator to handle matching an authentication request with the appropriate authentication method.
| Parameters: | auth – Dictionary containing authentication information from the request. |
|---|---|
| Returns: | An authentication method class object. |
Token provider interface.
keystone.token.provider.Manager(*args, **kwargs)[source]¶Bases: keystone.common.manager.Manager
Default pivot point for the token provider backend.
See keystone.common.manager.Manager for more details on how this
dynamically calls the backend.
INVALIDATE_PROJECT_TOKEN_PERSISTENCE = ‘invalidate_project_tokens’¶INVALIDATE_USER_TOKEN_PERSISTENCE = ‘invalidate_user_tokens’¶V2 = ‘v2.0’¶V3 = ‘v3.0’¶VERSIONS = frozenset([‘v3.0’, ‘v2.0’])¶driver_namespace = ‘keystone.token.provider’¶
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.