keystoneauth1.access package¶
Submodules¶
- keystoneauth1.access.access module
AccessInfo
AccessInfo.__annotations__
AccessInfo.__dict__
AccessInfo.__doc__
AccessInfo.__firstlineno__
AccessInfo.__init__()
AccessInfo.__module__
AccessInfo.__static_attributes__
AccessInfo.__weakref__
AccessInfo._data
AccessInfo._service_catalog
AccessInfo._service_catalog_class
AccessInfo._service_providers
AccessInfo.audit_chain_id
AccessInfo.audit_id
AccessInfo.auth_token
AccessInfo.bind
AccessInfo.domain_id
AccessInfo.domain_name
AccessInfo.domain_scoped
AccessInfo.expires
AccessInfo.has_service_catalog()
AccessInfo.initial_audit_id
AccessInfo.is_admin_project
AccessInfo.is_federated
AccessInfo.issued
AccessInfo.oauth_access_token_id
AccessInfo.oauth_consumer_id
AccessInfo.project_domain_id
AccessInfo.project_domain_name
AccessInfo.project_id
AccessInfo.project_is_domain
AccessInfo.project_name
AccessInfo.project_scoped
AccessInfo.role_ids
AccessInfo.role_names
AccessInfo.scoped
AccessInfo.service_catalog
AccessInfo.service_providers
AccessInfo.system_scoped
AccessInfo.tenant_id
AccessInfo.tenant_name
AccessInfo.trust_id
AccessInfo.trust_scoped
AccessInfo.trustee_user_id
AccessInfo.trustor_user_id
AccessInfo.user_domain_id
AccessInfo.user_domain_name
AccessInfo.user_id
AccessInfo.username
AccessInfo.will_expire_soon()
AccessInfoV2
AccessInfoV2.__annotations__
AccessInfoV2.__doc__
AccessInfoV2.__firstlineno__
AccessInfoV2.__module__
AccessInfoV2.__static_attributes__
AccessInfoV2._data
AccessInfoV2._service_catalog
AccessInfoV2._service_catalog_class
AccessInfoV2._service_providers
AccessInfoV2._token
AccessInfoV2._trust
AccessInfoV2._user
AccessInfoV2.audit_chain_id
AccessInfoV2.audit_id
AccessInfoV2.auth_token
AccessInfoV2.bind
AccessInfoV2.domain_id
AccessInfoV2.domain_name
AccessInfoV2.domain_scoped
AccessInfoV2.expires
AccessInfoV2.has_service_catalog()
AccessInfoV2.is_admin_project
AccessInfoV2.is_federated
AccessInfoV2.issued
AccessInfoV2.oauth_access_token_id
AccessInfoV2.oauth_consumer_id
AccessInfoV2.project_domain_id
AccessInfoV2.project_domain_name
AccessInfoV2.project_id
AccessInfoV2.project_is_domain
AccessInfoV2.project_name
AccessInfoV2.role_ids
AccessInfoV2.role_names
AccessInfoV2.service_providers
AccessInfoV2.system_scoped
AccessInfoV2.trust_id
AccessInfoV2.trust_scoped
AccessInfoV2.trustee_user_id
AccessInfoV2.trustor_user_id
AccessInfoV2.user_domain_id
AccessInfoV2.user_domain_name
AccessInfoV2.user_id
AccessInfoV2.username
AccessInfoV2.version
AccessInfoV3
AccessInfoV3.__annotations__
AccessInfoV3.__doc__
AccessInfoV3.__firstlineno__
AccessInfoV3.__module__
AccessInfoV3.__static_attributes__
AccessInfoV3._application_credential
AccessInfoV3._data
AccessInfoV3._domain
AccessInfoV3._oauth
AccessInfoV3._oauth2_credential
AccessInfoV3._project
AccessInfoV3._project_domain
AccessInfoV3._service_catalog
AccessInfoV3._service_catalog_class
AccessInfoV3._service_providers
AccessInfoV3._token
AccessInfoV3._trust
AccessInfoV3._user
AccessInfoV3._user_domain
AccessInfoV3.application_credential
AccessInfoV3.application_credential_access_rules
AccessInfoV3.application_credential_id
AccessInfoV3.audit_chain_id
AccessInfoV3.audit_id
AccessInfoV3.bind
AccessInfoV3.domain_id
AccessInfoV3.domain_name
AccessInfoV3.domain_scoped
AccessInfoV3.expires
AccessInfoV3.has_service_catalog()
AccessInfoV3.is_admin_project
AccessInfoV3.is_federated
AccessInfoV3.issued
AccessInfoV3.oauth2_credential
AccessInfoV3.oauth2_credential_thumbprint
AccessInfoV3.oauth_access_token_id
AccessInfoV3.oauth_consumer_id
AccessInfoV3.project_domain_id
AccessInfoV3.project_domain_name
AccessInfoV3.project_id
AccessInfoV3.project_is_domain
AccessInfoV3.project_name
AccessInfoV3.role_ids
AccessInfoV3.role_names
AccessInfoV3.service_providers
AccessInfoV3.system
AccessInfoV3.system_scoped
AccessInfoV3.trust_id
AccessInfoV3.trust_scoped
AccessInfoV3.trustee_user_id
AccessInfoV3.trustor_user_id
AccessInfoV3.user_domain_id
AccessInfoV3.user_domain_name
AccessInfoV3.user_id
AccessInfoV3.username
AccessInfoV3.version
create()
- keystoneauth1.access.service_catalog module
ServiceCatalog
ServiceCatalog.__abstractmethods__
ServiceCatalog.__dict__
ServiceCatalog.__doc__
ServiceCatalog.__firstlineno__
ServiceCatalog.__init__()
ServiceCatalog.__module__
ServiceCatalog.__static_attributes__
ServiceCatalog.__weakref__
ServiceCatalog._abc_impl
ServiceCatalog._denormalize_endpoints()
ServiceCatalog._endpoints_by_type()
ServiceCatalog._get_endpoint_region()
ServiceCatalog._get_interface_list()
ServiceCatalog._normalize_endpoints()
ServiceCatalog.catalog
ServiceCatalog.endpoint_data_for()
ServiceCatalog.from_token()
ServiceCatalog.get_endpoint_data_list()
ServiceCatalog.get_endpoints()
ServiceCatalog.get_endpoints_data()
ServiceCatalog.get_urls()
ServiceCatalog.is_interface_match()
ServiceCatalog.normalize_catalog()
ServiceCatalog.normalize_interface()
ServiceCatalog.url_for()
ServiceCatalogV2
ServiceCatalogV2.__abstractmethods__
ServiceCatalogV2.__annotations__
ServiceCatalogV2.__doc__
ServiceCatalogV2.__firstlineno__
ServiceCatalogV2.__module__
ServiceCatalogV2.__static_attributes__
ServiceCatalogV2._abc_impl
ServiceCatalogV2._denormalize_endpoints()
ServiceCatalogV2._normalize_endpoints()
ServiceCatalogV2.from_token()
ServiceCatalogV2.is_interface_match()
ServiceCatalogV2.normalize_interface()
ServiceCatalogV3
ServiceCatalogV3.__abstractmethods__
ServiceCatalogV3.__annotations__
ServiceCatalogV3.__doc__
ServiceCatalogV3.__firstlineno__
ServiceCatalogV3.__module__
ServiceCatalogV3.__static_attributes__
ServiceCatalogV3._abc_impl
ServiceCatalogV3.from_token()
ServiceCatalogV3.is_interface_match()
ServiceCatalogV3.normalize_interface()
- keystoneauth1.access.service_providers module
ServiceProviders
ServiceProviders.__dict__
ServiceProviders.__doc__
ServiceProviders.__firstlineno__
ServiceProviders.__init__()
ServiceProviders.__module__
ServiceProviders.__static_attributes__
ServiceProviders.__weakref__
ServiceProviders._get_service_provider()
ServiceProviders.from_token()
ServiceProviders.get_auth_url()
ServiceProviders.get_sp_url()
- keystoneauth1.access.types module
AccessV2
AccessV2.__annotations__
AccessV2.__dict__
AccessV2.__doc__
AccessV2.__firstlineno__
AccessV2.__module__
AccessV2.__mutable_keys__
AccessV2.__optional_keys__
AccessV2.__orig_bases__
AccessV2.__readonly_keys__
AccessV2.__required_keys__
AccessV2.__static_attributes__
AccessV2.__total__
AccessV2.__weakref__
AccessV2.metadata
AccessV2.serviceCatalog
AccessV2.token
AccessV2.trust
AccessV2.user
ApplicationCredentialAccessRuleV3
ApplicationCredentialAccessRuleV3.__annotations__
ApplicationCredentialAccessRuleV3.__dict__
ApplicationCredentialAccessRuleV3.__doc__
ApplicationCredentialAccessRuleV3.__firstlineno__
ApplicationCredentialAccessRuleV3.__module__
ApplicationCredentialAccessRuleV3.__mutable_keys__
ApplicationCredentialAccessRuleV3.__optional_keys__
ApplicationCredentialAccessRuleV3.__orig_bases__
ApplicationCredentialAccessRuleV3.__readonly_keys__
ApplicationCredentialAccessRuleV3.__required_keys__
ApplicationCredentialAccessRuleV3.__static_attributes__
ApplicationCredentialAccessRuleV3.__total__
ApplicationCredentialAccessRuleV3.__weakref__
ApplicationCredentialAccessRuleV3.id
ApplicationCredentialV3
ApplicationCredentialV3.__annotations__
ApplicationCredentialV3.__dict__
ApplicationCredentialV3.__doc__
ApplicationCredentialV3.__firstlineno__
ApplicationCredentialV3.__module__
ApplicationCredentialV3.__mutable_keys__
ApplicationCredentialV3.__optional_keys__
ApplicationCredentialV3.__orig_bases__
ApplicationCredentialV3.__readonly_keys__
ApplicationCredentialV3.__required_keys__
ApplicationCredentialV3.__static_attributes__
ApplicationCredentialV3.__total__
ApplicationCredentialV3.__weakref__
ApplicationCredentialV3.access_rules
ApplicationCredentialV3.id
ApplicationCredentialV3.name
ApplicationCredentialV3.restricted
CatalogServiceV2
CatalogServiceV2.__annotations__
CatalogServiceV2.__dict__
CatalogServiceV2.__doc__
CatalogServiceV2.__firstlineno__
CatalogServiceV2.__module__
CatalogServiceV2.__mutable_keys__
CatalogServiceV2.__optional_keys__
CatalogServiceV2.__orig_bases__
CatalogServiceV2.__readonly_keys__
CatalogServiceV2.__required_keys__
CatalogServiceV2.__static_attributes__
CatalogServiceV2.__total__
CatalogServiceV2.__weakref__
CatalogServiceV2.endpoints
CatalogServiceV2.endpoints_links
CatalogServiceV2.name
CatalogServiceV2.type
DomainV3
DomainV3.__annotations__
DomainV3.__dict__
DomainV3.__doc__
DomainV3.__firstlineno__
DomainV3.__module__
DomainV3.__mutable_keys__
DomainV3.__optional_keys__
DomainV3.__orig_bases__
DomainV3.__readonly_keys__
DomainV3.__required_keys__
DomainV3.__static_attributes__
DomainV3.__total__
DomainV3.__weakref__
DomainV3.id
DomainV3.name
EndpointV2
EndpointV2.__annotations__
EndpointV2.__dict__
EndpointV2.__doc__
EndpointV2.__firstlineno__
EndpointV2.__module__
EndpointV2.__mutable_keys__
EndpointV2.__optional_keys__
EndpointV2.__orig_bases__
EndpointV2.__readonly_keys__
EndpointV2.__required_keys__
EndpointV2.__static_attributes__
EndpointV2.__total__
EndpointV2.__weakref__
EndpointV2.adminURL
EndpointV2.id
EndpointV2.internalURL
EndpointV2.publicURL
EndpointV2.region
EndpointV3
EndpointV3.__annotations__
EndpointV3.__dict__
EndpointV3.__doc__
EndpointV3.__firstlineno__
EndpointV3.__module__
EndpointV3.__mutable_keys__
EndpointV3.__optional_keys__
EndpointV3.__orig_bases__
EndpointV3.__readonly_keys__
EndpointV3.__required_keys__
EndpointV3.__static_attributes__
EndpointV3.__total__
EndpointV3.__weakref__
EndpointV3.id
EndpointV3.interface
EndpointV3.region
EndpointV3.region_id
EndpointV3.url
FederationGroupV3
FederationGroupV3.__annotations__
FederationGroupV3.__dict__
FederationGroupV3.__doc__
FederationGroupV3.__firstlineno__
FederationGroupV3.__module__
FederationGroupV3.__mutable_keys__
FederationGroupV3.__optional_keys__
FederationGroupV3.__orig_bases__
FederationGroupV3.__readonly_keys__
FederationGroupV3.__required_keys__
FederationGroupV3.__static_attributes__
FederationGroupV3.__total__
FederationGroupV3.__weakref__
FederationGroupV3.id
FederationProtocolV3
FederationProtocolV3.__annotations__
FederationProtocolV3.__dict__
FederationProtocolV3.__doc__
FederationProtocolV3.__firstlineno__
FederationProtocolV3.__module__
FederationProtocolV3.__mutable_keys__
FederationProtocolV3.__optional_keys__
FederationProtocolV3.__orig_bases__
FederationProtocolV3.__readonly_keys__
FederationProtocolV3.__required_keys__
FederationProtocolV3.__static_attributes__
FederationProtocolV3.__total__
FederationProtocolV3.__weakref__
FederationProtocolV3.id
FederationProviderV3
FederationProviderV3.__annotations__
FederationProviderV3.__dict__
FederationProviderV3.__doc__
FederationProviderV3.__firstlineno__
FederationProviderV3.__module__
FederationProviderV3.__mutable_keys__
FederationProviderV3.__optional_keys__
FederationProviderV3.__orig_bases__
FederationProviderV3.__readonly_keys__
FederationProviderV3.__required_keys__
FederationProviderV3.__static_attributes__
FederationProviderV3.__total__
FederationProviderV3.__weakref__
FederationProviderV3.id
FederationV3
FederationV3.__annotations__
FederationV3.__dict__
FederationV3.__doc__
FederationV3.__firstlineno__
FederationV3.__module__
FederationV3.__mutable_keys__
FederationV3.__optional_keys__
FederationV3.__orig_bases__
FederationV3.__readonly_keys__
FederationV3.__required_keys__
FederationV3.__static_attributes__
FederationV3.__total__
FederationV3.__weakref__
FederationV3.groups
FederationV3.identity_provider
FederationV3.protocol
MetadataV2
MetadataV2.__annotations__
MetadataV2.__dict__
MetadataV2.__doc__
MetadataV2.__firstlineno__
MetadataV2.__module__
MetadataV2.__mutable_keys__
MetadataV2.__optional_keys__
MetadataV2.__orig_bases__
MetadataV2.__readonly_keys__
MetadataV2.__required_keys__
MetadataV2.__static_attributes__
MetadataV2.__total__
MetadataV2.__weakref__
MetadataV2.is_admin
MetadataV2.roles
OAuth1V3
OAuth1V3.__annotations__
OAuth1V3.__dict__
OAuth1V3.__doc__
OAuth1V3.__firstlineno__
OAuth1V3.__module__
OAuth1V3.__mutable_keys__
OAuth1V3.__optional_keys__
OAuth1V3.__orig_bases__
OAuth1V3.__readonly_keys__
OAuth1V3.__required_keys__
OAuth1V3.__static_attributes__
OAuth1V3.__total__
OAuth1V3.__weakref__
OAuth1V3.access_token_id
OAuth1V3.consumer_id
OAuth2V3
ProjectDomainV3
ProjectDomainV3.__annotations__
ProjectDomainV3.__dict__
ProjectDomainV3.__doc__
ProjectDomainV3.__firstlineno__
ProjectDomainV3.__module__
ProjectDomainV3.__mutable_keys__
ProjectDomainV3.__optional_keys__
ProjectDomainV3.__orig_bases__
ProjectDomainV3.__readonly_keys__
ProjectDomainV3.__required_keys__
ProjectDomainV3.__static_attributes__
ProjectDomainV3.__total__
ProjectDomainV3.__weakref__
ProjectDomainV3.id
ProjectDomainV3.name
ProjectV3
ProjectV3.__annotations__
ProjectV3.__dict__
ProjectV3.__doc__
ProjectV3.__firstlineno__
ProjectV3.__module__
ProjectV3.__mutable_keys__
ProjectV3.__optional_keys__
ProjectV3.__orig_bases__
ProjectV3.__readonly_keys__
ProjectV3.__required_keys__
ProjectV3.__static_attributes__
ProjectV3.__total__
ProjectV3.__weakref__
ProjectV3.domain
ProjectV3.id
ProjectV3.name
RoleV2
RoleV3
RoleV3.__annotations__
RoleV3.__dict__
RoleV3.__doc__
RoleV3.__firstlineno__
RoleV3.__module__
RoleV3.__mutable_keys__
RoleV3.__optional_keys__
RoleV3.__orig_bases__
RoleV3.__readonly_keys__
RoleV3.__required_keys__
RoleV3.__static_attributes__
RoleV3.__total__
RoleV3.__weakref__
RoleV3.id
RoleV3.name
ServiceProviderV3
ServiceProviderV3.__annotations__
ServiceProviderV3.__dict__
ServiceProviderV3.__doc__
ServiceProviderV3.__firstlineno__
ServiceProviderV3.__module__
ServiceProviderV3.__mutable_keys__
ServiceProviderV3.__optional_keys__
ServiceProviderV3.__orig_bases__
ServiceProviderV3.__readonly_keys__
ServiceProviderV3.__required_keys__
ServiceProviderV3.__static_attributes__
ServiceProviderV3.__total__
ServiceProviderV3.__weakref__
ServiceProviderV3.auth_url
ServiceProviderV3.id
ServiceProviderV3.sp_url
ServiceV3
ServiceV3.__annotations__
ServiceV3.__dict__
ServiceV3.__doc__
ServiceV3.__firstlineno__
ServiceV3.__module__
ServiceV3.__mutable_keys__
ServiceV3.__optional_keys__
ServiceV3.__orig_bases__
ServiceV3.__readonly_keys__
ServiceV3.__required_keys__
ServiceV3.__static_attributes__
ServiceV3.__total__
ServiceV3.__weakref__
ServiceV3.endpoints
ServiceV3.id
ServiceV3.name
ServiceV3.type
SystemV3
SystemV3.__annotations__
SystemV3.__dict__
SystemV3.__doc__
SystemV3.__firstlineno__
SystemV3.__module__
SystemV3.__mutable_keys__
SystemV3.__optional_keys__
SystemV3.__orig_bases__
SystemV3.__readonly_keys__
SystemV3.__required_keys__
SystemV3.__static_attributes__
SystemV3.__total__
SystemV3.__weakref__
SystemV3.all
TenantV2
TenantV2.__annotations__
TenantV2.__dict__
TenantV2.__doc__
TenantV2.__firstlineno__
TenantV2.__module__
TenantV2.__mutable_keys__
TenantV2.__optional_keys__
TenantV2.__orig_bases__
TenantV2.__readonly_keys__
TenantV2.__required_keys__
TenantV2.__static_attributes__
TenantV2.__total__
TenantV2.__weakref__
TenantV2.description
TenantV2.enabled
TenantV2.id
TenantV2.name
TokenResponseV2
TokenResponseV2.__annotations__
TokenResponseV2.__dict__
TokenResponseV2.__doc__
TokenResponseV2.__firstlineno__
TokenResponseV2.__module__
TokenResponseV2.__mutable_keys__
TokenResponseV2.__optional_keys__
TokenResponseV2.__orig_bases__
TokenResponseV2.__readonly_keys__
TokenResponseV2.__required_keys__
TokenResponseV2.__static_attributes__
TokenResponseV2.__total__
TokenResponseV2.__weakref__
TokenResponseV2.access
TokenResponseV3
TokenResponseV3.__annotations__
TokenResponseV3.__dict__
TokenResponseV3.__doc__
TokenResponseV3.__firstlineno__
TokenResponseV3.__module__
TokenResponseV3.__mutable_keys__
TokenResponseV3.__optional_keys__
TokenResponseV3.__orig_bases__
TokenResponseV3.__readonly_keys__
TokenResponseV3.__required_keys__
TokenResponseV3.__static_attributes__
TokenResponseV3.__total__
TokenResponseV3.__weakref__
TokenResponseV3.token
TokenV2
TokenV2.__annotations__
TokenV2.__dict__
TokenV2.__doc__
TokenV2.__firstlineno__
TokenV2.__module__
TokenV2.__mutable_keys__
TokenV2.__optional_keys__
TokenV2.__orig_bases__
TokenV2.__readonly_keys__
TokenV2.__required_keys__
TokenV2.__static_attributes__
TokenV2.__total__
TokenV2.__weakref__
TokenV2.audit_ids
TokenV2.bind
TokenV2.expires
TokenV2.id
TokenV2.issued_at
TokenV2.tenant
TokenV3
TokenV3.__annotations__
TokenV3.__dict__
TokenV3.__doc__
TokenV3.__module__
TokenV3.__mutable_keys__
TokenV3.__optional_keys__
TokenV3.__orig_bases__
TokenV3.__readonly_keys__
TokenV3.__required_keys__
TokenV3.__total__
TokenV3.__weakref__
TokenV3.application_credential
TokenV3.audit_ids
TokenV3.bind
TokenV3.catalog
TokenV3.domain
TokenV3.expires_at
TokenV3.is_admin_project
TokenV3.is_domain
TokenV3.issued_at
TokenV3.methods
TokenV3.oauth2_credential
TokenV3.project
TokenV3.roles
TokenV3.service_providers
TokenV3.system
TokenV3.user
TrustV2
TrustV2.__annotations__
TrustV2.__dict__
TrustV2.__doc__
TrustV2.__firstlineno__
TrustV2.__module__
TrustV2.__mutable_keys__
TrustV2.__optional_keys__
TrustV2.__orig_bases__
TrustV2.__readonly_keys__
TrustV2.__required_keys__
TrustV2.__static_attributes__
TrustV2.__total__
TrustV2.__weakref__
TrustV2.id
TrustV2.impersonation
TrustV2.trustee_user_id
TrustV2.trustor_user_id
TrustV3
TrustV3.__annotations__
TrustV3.__dict__
TrustV3.__doc__
TrustV3.__firstlineno__
TrustV3.__module__
TrustV3.__mutable_keys__
TrustV3.__optional_keys__
TrustV3.__orig_bases__
TrustV3.__readonly_keys__
TrustV3.__required_keys__
TrustV3.__static_attributes__
TrustV3.__total__
TrustV3.__weakref__
TrustV3.id
TrustV3.impersonation
TrustV3.trustee_user
TrustV3.trustor_user
TrusteeUser
TrusteeUser.__annotations__
TrusteeUser.__dict__
TrusteeUser.__doc__
TrusteeUser.__firstlineno__
TrusteeUser.__module__
TrusteeUser.__mutable_keys__
TrusteeUser.__optional_keys__
TrusteeUser.__orig_bases__
TrusteeUser.__readonly_keys__
TrusteeUser.__required_keys__
TrusteeUser.__static_attributes__
TrusteeUser.__total__
TrusteeUser.__weakref__
TrusteeUser.id
TrustorUser
TrustorUser.__annotations__
TrustorUser.__dict__
TrustorUser.__doc__
TrustorUser.__firstlineno__
TrustorUser.__module__
TrustorUser.__mutable_keys__
TrustorUser.__optional_keys__
TrustorUser.__orig_bases__
TrustorUser.__readonly_keys__
TrustorUser.__required_keys__
TrustorUser.__static_attributes__
TrustorUser.__total__
TrustorUser.__weakref__
TrustorUser.id
UserDomainV3
UserDomainV3.__annotations__
UserDomainV3.__dict__
UserDomainV3.__doc__
UserDomainV3.__firstlineno__
UserDomainV3.__module__
UserDomainV3.__mutable_keys__
UserDomainV3.__optional_keys__
UserDomainV3.__orig_bases__
UserDomainV3.__readonly_keys__
UserDomainV3.__required_keys__
UserDomainV3.__static_attributes__
UserDomainV3.__total__
UserDomainV3.__weakref__
UserDomainV3.id
UserDomainV3.name
UserV2
UserV2.__annotations__
UserV2.__dict__
UserV2.__doc__
UserV2.__firstlineno__
UserV2.__module__
UserV2.__mutable_keys__
UserV2.__optional_keys__
UserV2.__orig_bases__
UserV2.__readonly_keys__
UserV2.__required_keys__
UserV2.__static_attributes__
UserV2.__total__
UserV2.__weakref__
UserV2.id
UserV2.name
UserV2.role_links
UserV2.roles
UserV2.tenantId
UserV2.tenantName
UserV2.username
UserV3
Module contents¶
- class keystoneauth1.access.AccessInfo(body: dict[str, Any], auth_token: str | None = None)¶
Bases:
object
Encapsulates a raw authentication token from keystone.
Provides helper methods for extracting useful values from that token.
- __annotations__ = {'_data': typing.Any, '_service_catalog_class': typing.Type[keystoneauth1.access.service_catalog.ServiceCatalog]}¶
- __dict__ = mappingproxy({'__module__': 'keystoneauth1.access.access', '__firstlineno__': 54, '__annotations__': {'_service_catalog_class': typing.Type[keystoneauth1.access.service_catalog.ServiceCatalog], '_data': typing.Any, '_service_catalog': 'ty.Optional[service_catalog.ServiceCatalog]', '_service_providers': 'ty.Optional[service_providers.ServiceProviders]'}, '__doc__': 'Encapsulates a raw authentication token from keystone.\n\nProvides helper methods for extracting useful values from that token.\n', '__init__': <function AccessInfo.__init__>, 'service_catalog': <property object>, 'will_expire_soon': <function AccessInfo.will_expire_soon>, 'has_service_catalog': <function AccessInfo.has_service_catalog>, 'auth_token': <property object>, 'expires': <property object>, 'issued': <property object>, 'username': <property object>, 'user_id': <property object>, 'user_domain_id': <property object>, 'user_domain_name': <property object>, 'role_ids': <property object>, 'role_names': <property object>, 'domain_name': <property object>, 'domain_id': <property object>, 'project_name': <property object>, 'tenant_name': <property object>, 'scoped': <property object>, 'project_scoped': <property object>, 'domain_scoped': <property object>, 'system_scoped': <property object>, 'trust_id': <property object>, 'trust_scoped': <property object>, 'trustee_user_id': <property object>, 'trustor_user_id': <property object>, 'project_id': <property object>, 'tenant_id': <property object>, 'project_domain_id': <property object>, 'project_domain_name': <property object>, 'oauth_access_token_id': <property object>, 'oauth_consumer_id': <property object>, 'is_federated': <property object>, 'is_admin_project': <property object>, 'audit_id': <property object>, 'audit_chain_id': <property object>, 'initial_audit_id': <property object>, 'service_providers': <property object>, 'bind': <property object>, 'project_is_domain': <property object>, '__static_attributes__': ('_auth_token', '_data', '_service_catalog', '_service_providers'), '__dict__': <attribute '__dict__' of 'AccessInfo' objects>, '__weakref__': <attribute '__weakref__' of 'AccessInfo' objects>})¶
- __doc__ = 'Encapsulates a raw authentication token from keystone.\n\nProvides helper methods for extracting useful values from that token.\n'¶
- __firstlineno__ = 54¶
- __init__(body: dict[str, Any], auth_token: str | None = None)¶
- __module__ = 'keystoneauth1.access.access'¶
- __static_attributes__ = ('_auth_token', '_data', '_service_catalog', '_service_providers')¶
- __weakref__¶
list of weak references to the object
- _data: Any¶
- _service_catalog_class: Type[ServiceCatalog]¶
- property audit_chain_id: str | None¶
Return the audit chain ID if present.
In the event that a token was rescoped then this ID will be the
audit_id
of the initial token. Returns None if no value present.- Returns:
str or None.
- property audit_id: str | None¶
Return the audit ID if present.
- Returns:
str or None.
- property auth_token: str | None¶
Return the token_id associated with the auth request.
To be used in headers for authenticating OpenStack API requests.
- Returns:
str
- property bind: dict[str, Any] | None¶
Information about external mechanisms the token is bound to.
If a token is bound to an external authentication mechanism it can only be used in conjunction with that mechanism. For example if bound to a kerberos principal it may only be accepted if there is also kerberos authentication performed on the request.
- Returns:
A dictionary or None. The key will be the bind type the value is a dictionary that is specific to the format of the bind type. Returns None if there is no bind information in the token.
- property domain_id: str | None¶
Return the domain id associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_name: str | None¶
Return the domain name associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_scoped: bool¶
Return true if the auth token was scoped to a domain.
- Returns:
bool
- property expires: datetime | None¶
Return the token expiration (as datetime object).
- Returns:
datetime
- has_service_catalog() bool ¶
Return true if the auth token has a service catalog.
- Returns:
boolean
- property initial_audit_id: str | None¶
The audit ID of the initially requested token.
This is the
audit_chain_id
if present or theaudit_id
.
- property is_admin_project: bool¶
Return true if the current project scope is the admin project.
For backwards compatibility purposes if there is nothing specified in the token we always assume we are in the admin project, so this will default to True.
:returns boolean
- property is_federated: bool¶
Return true if federation was used to get the token.
- Returns:
boolean
- property issued: datetime | None¶
Return the token issue time (as datetime object).
- Returns:
datetime
- property oauth_access_token_id: str | None¶
Return the access token ID if OAuth authentication used.
- Returns:
str or None.
- property oauth_consumer_id: str | None¶
Return the consumer ID if OAuth authentication used.
- Returns:
str or None.
- property project_domain_id: str | None¶
Return the project’s domain id associated with the auth request.
- Returns:
str
- property project_domain_name: str | None¶
Return the project’s domain name associated with the auth request.
- Returns:
str
- property project_id: str | None¶
Return the project ID associated with the auth request.
This returns None if the auth token wasn’t scoped to a project.
- Returns:
str or None (if no project associated with the token)
- property project_is_domain: bool | None¶
Return if a project act as a domain.
- Returns:
bool
- property project_name: str | None¶
Return the project name associated with the auth request.
- Returns:
str or None (if no project associated with the token)
- property project_scoped: bool¶
Return true if the auth token was scoped to a tenant (project).
- Returns:
bool
- property role_ids: list[str] | None¶
Return a list of user’s role ids associated with the auth request.
- Returns:
a list of strings of role ids
- property role_names: list[str] | None¶
Return a list of user’s role names associated with the auth request.
- Returns:
a list of strings of role names
- property scoped: bool¶
Return true if the auth token was scoped.
Returns true if scoped to a tenant(project) or domain, and contains a populated service catalog.
This is deprecated, use project_scoped instead.
- Returns:
bool
- property service_catalog: ServiceCatalog¶
- property service_providers: ServiceProviders | None¶
Return an object representing the list of trusted service providers.
Used for Keystone2Keystone federating-out.
- Returns:
keystoneauth1.service_providers.ServiceProviders
or None
- property system_scoped: bool¶
Return true if the auth token was scoped to the system.
- Returns:
bool
- property tenant_id: str | None¶
Synonym for project_id.
- property tenant_name: str | None¶
Synonym for project_name.
- property trust_id: str | None¶
Return the trust id associated with the auth request.
- Returns:
str or None (if no trust associated with the token)
- property trust_scoped: bool¶
Return true if the auth token was scoped from a delegated trust.
The trust delegation is via the OS-TRUST v3 extension.
- Returns:
bool
- property trustee_user_id: str | None¶
Return the trustee user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property trustor_user_id: str | None¶
Return the trustor user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property user_domain_id: str | None¶
Return the user’s domain id associated with the auth request.
- Returns:
str
- property user_domain_name: str | None¶
Return the user’s domain name associated with the auth request.
- Returns:
str
- property user_id: str | None¶
Return the user id associated with the auth request.
- Returns:
str
- property username: str | None¶
Return the username associated with the auth request.
Follows the pattern defined in the V2 API of first looking for ‘name’, returning that if available, and falling back to ‘username’ if name is unavailable.
- Returns:
str
- will_expire_soon(stale_duration: int = 30) bool ¶
Determine if expiration is about to occur.
- Returns:
true if expiration is within the given duration
- Return type:
boolean
- class keystoneauth1.access.AccessInfoV2(body: dict[str, Any], auth_token: str | None = None)¶
Bases:
AccessInfo
An object for encapsulating raw v2 auth token from identity service.
- __annotations__ = {'_data': <class 'keystoneauth1.access.types.TokenResponseV2'>}¶
- __doc__ = 'An object for encapsulating raw v2 auth token from identity service.'¶
- __firstlineno__ = 420¶
- __module__ = 'keystoneauth1.access.access'¶
- __static_attributes__ = ()¶
- _data: TokenResponseV2¶
- _service_catalog_class¶
alias of
ServiceCatalogV2
- property audit_chain_id: str | None¶
Return the audit chain ID if present.
In the event that a token was rescoped then this ID will be the
audit_id
of the initial token. Returns None if no value present.- Returns:
str or None.
- property audit_id: str | None¶
Return the audit ID if present.
- Returns:
str or None.
- property auth_token: str | None¶
Return the token_id associated with the auth request.
To be used in headers for authenticating OpenStack API requests.
- Returns:
str
- property bind: dict[str, Any] | None¶
Information about external mechanisms the token is bound to.
If a token is bound to an external authentication mechanism it can only be used in conjunction with that mechanism. For example if bound to a kerberos principal it may only be accepted if there is also kerberos authentication performed on the request.
- Returns:
A dictionary or None. The key will be the bind type the value is a dictionary that is specific to the format of the bind type. Returns None if there is no bind information in the token.
- property domain_id: str | None¶
Return the domain id associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_name: str | None¶
Return the domain name associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_scoped: bool¶
Return true if the auth token was scoped to a domain.
- Returns:
bool
- property expires: datetime | None¶
Return the token expiration (as datetime object).
- Returns:
datetime
- has_service_catalog() bool ¶
Return true if the auth token has a service catalog.
- Returns:
boolean
- property is_admin_project: bool¶
Return true if the current project scope is the admin project.
For backwards compatibility purposes if there is nothing specified in the token we always assume we are in the admin project, so this will default to True.
:returns boolean
- property is_federated: bool¶
Return true if federation was used to get the token.
- Returns:
boolean
- property issued: datetime | None¶
Return the token issue time (as datetime object).
- Returns:
datetime
- property oauth_access_token_id: str | None¶
Return the access token ID if OAuth authentication used.
- Returns:
str or None.
- property oauth_consumer_id: str | None¶
Return the consumer ID if OAuth authentication used.
- Returns:
str or None.
- property project_domain_id: str | None¶
Return the project’s domain id associated with the auth request.
- Returns:
str
- property project_domain_name: str | None¶
Return the project’s domain name associated with the auth request.
- Returns:
str
- property project_id: str | None¶
Return the project ID associated with the auth request.
This returns None if the auth token wasn’t scoped to a project.
- Returns:
str or None (if no project associated with the token)
- property project_is_domain: bool | None¶
Return if a project act as a domain.
- Returns:
bool
- property project_name: str | None¶
Return the project name associated with the auth request.
- Returns:
str or None (if no project associated with the token)
- property role_ids: list[str] | None¶
Return a list of user’s role ids associated with the auth request.
- Returns:
a list of strings of role ids
- property role_names: list[str] | None¶
Return a list of user’s role names associated with the auth request.
- Returns:
a list of strings of role names
- property service_providers: ServiceProviders | None¶
Return an object representing the list of trusted service providers.
Used for Keystone2Keystone federating-out.
- Returns:
keystoneauth1.service_providers.ServiceProviders
or None
- property system_scoped: bool¶
Return true if the auth token was scoped to the system.
- Returns:
bool
- property trust_id: str | None¶
Return the trust id associated with the auth request.
- Returns:
str or None (if no trust associated with the token)
- property trust_scoped: bool¶
Return true if the auth token was scoped from a delegated trust.
The trust delegation is via the OS-TRUST v3 extension.
- Returns:
bool
- property trustee_user_id: str | None¶
Return the trustee user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property trustor_user_id: str | None¶
Return the trustor user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property user_domain_id: str | None¶
Return the user’s domain id associated with the auth request.
- Returns:
str
- property user_domain_name: str | None¶
Return the user’s domain name associated with the auth request.
- Returns:
str
- property user_id: str | None¶
Return the user id associated with the auth request.
- Returns:
str
- property username: str | None¶
Return the username associated with the auth request.
Follows the pattern defined in the V2 API of first looking for ‘name’, returning that if available, and falling back to ‘username’ if name is unavailable.
- Returns:
str
- version = 'v2.0'¶
- class keystoneauth1.access.AccessInfoV3(body: dict[str, Any], auth_token: str | None = None)¶
Bases:
AccessInfo
An object encapsulating raw v3 auth token from identity service.
- __annotations__ = {'_data': <class 'keystoneauth1.access.types.TokenResponseV3'>}¶
- __doc__ = 'An object encapsulating raw v3 auth token from identity service.'¶
- __firstlineno__ = 596¶
- __module__ = 'keystoneauth1.access.access'¶
- __static_attributes__ = ('_service_providers',)¶
- property _application_credential: ApplicationCredentialV3 | None¶
- _data: TokenResponseV3¶
- property _project_domain: ProjectDomainV3 | None¶
- _service_catalog_class¶
alias of
ServiceCatalogV3
- property _user_domain: UserDomainV3¶
- property application_credential: ApplicationCredentialV3¶
- property application_credential_access_rules: list[ApplicationCredentialAccessRuleV3] | None¶
- property application_credential_id: str | None¶
- property audit_chain_id: str | None¶
Return the audit chain ID if present.
In the event that a token was rescoped then this ID will be the
audit_id
of the initial token. Returns None if no value present.- Returns:
str or None.
- property audit_id: str | None¶
Return the audit ID if present.
- Returns:
str or None.
- property bind: dict[str, Any] | None¶
Information about external mechanisms the token is bound to.
If a token is bound to an external authentication mechanism it can only be used in conjunction with that mechanism. For example if bound to a kerberos principal it may only be accepted if there is also kerberos authentication performed on the request.
- Returns:
A dictionary or None. The key will be the bind type the value is a dictionary that is specific to the format of the bind type. Returns None if there is no bind information in the token.
- property domain_id: str | None¶
Return the domain id associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_name: str | None¶
Return the domain name associated with the auth request.
- Returns:
str or None (if no domain associated with the token)
- property domain_scoped: bool¶
Return true if the auth token was scoped to a domain.
- Returns:
bool
- property expires: datetime | None¶
Return the token expiration (as datetime object).
- Returns:
datetime
- has_service_catalog() bool ¶
Return true if the auth token has a service catalog.
- Returns:
boolean
- property is_admin_project: bool¶
Return true if the current project scope is the admin project.
For backwards compatibility purposes if there is nothing specified in the token we always assume we are in the admin project, so this will default to True.
:returns boolean
- property is_federated: bool¶
Return true if federation was used to get the token.
- Returns:
boolean
- property issued: datetime | None¶
Return the token issue time (as datetime object).
- Returns:
datetime
- property oauth2_credential_thumbprint: str | None¶
- property oauth_access_token_id: str | None¶
Return the access token ID if OAuth authentication used.
- Returns:
str or None.
- property oauth_consumer_id: str | None¶
Return the consumer ID if OAuth authentication used.
- Returns:
str or None.
- property project_domain_id: str | None¶
Return the project’s domain id associated with the auth request.
- Returns:
str
- property project_domain_name: str | None¶
Return the project’s domain name associated with the auth request.
- Returns:
str
- property project_id: str | None¶
Return the project ID associated with the auth request.
This returns None if the auth token wasn’t scoped to a project.
- Returns:
str or None (if no project associated with the token)
- property project_is_domain: bool | None¶
Return if a project act as a domain.
- Returns:
bool
- property project_name: str | None¶
Return the project name associated with the auth request.
- Returns:
str or None (if no project associated with the token)
- property role_ids: list[str] | None¶
Return a list of user’s role ids associated with the auth request.
- Returns:
a list of strings of role ids
- property role_names: list[str] | None¶
Return a list of user’s role names associated with the auth request.
- Returns:
a list of strings of role names
- property service_providers: ServiceProviders | None¶
Return an object representing the list of trusted service providers.
Used for Keystone2Keystone federating-out.
- Returns:
keystoneauth1.service_providers.ServiceProviders
or None
- property system_scoped: bool¶
Return true if the auth token was scoped to the system.
- Returns:
bool
- property trust_id: str | None¶
Return the trust id associated with the auth request.
- Returns:
str or None (if no trust associated with the token)
- property trust_scoped: bool¶
Return true if the auth token was scoped from a delegated trust.
The trust delegation is via the OS-TRUST v3 extension.
- Returns:
bool
- property trustee_user_id: str | None¶
Return the trustee user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property trustor_user_id: str | None¶
Return the trustor user id associated with a trust.
- Returns:
str or None (if no trust associated with the token)
- property user_domain_id: str | None¶
Return the user’s domain id associated with the auth request.
- Returns:
str
- property user_domain_name: str | None¶
Return the user’s domain name associated with the auth request.
- Returns:
str
- property user_id: str | None¶
Return the user id associated with the auth request.
- Returns:
str
- property username: str | None¶
Return the username associated with the auth request.
Follows the pattern defined in the V2 API of first looking for ‘name’, returning that if available, and falling back to ‘username’ if name is unavailable.
- Returns:
str
- version = 'v3'¶
- keystoneauth1.access.create(resp: Response | None = None, body: dict[str, object] | None = None, auth_token: str | None = None) AccessInfo ¶