Bases: keystoneauth1.identity.base.BaseIdentityPlugin
Identity V2 Authentication Plugin.
auth_url (string) – Identity service endpoint for authorization.
trust_id (string) – Trust ID for trust scoping.
tenant_id (string) – Tenant ID for project scoping.
tenant_name (string) – Tenant name for project scoping.
reauthenticate (bool) – Allow fetching a new token if the current one is going to expire. (optional) default True
Return the authentication section of an auth plugin.
headers (dict) – The headers that will be sent with the auth request if a plugin needs to add to them.
A dict of authentication data for the auth type.
dict
Obtain a token from an OpenStack Identity Service.
This method is overridden by the various token version plugins.
This function should not be called independently and is expected to be invoked via the do_authenticate function.
This function will be invoked if the AcessInfo object cached by the plugin is not valid. Thus plugins should always fetch a new AccessInfo when invoked. If you are looking to just retrieve the current auth data then you should use get_access.
session (keystoneauth1.session.Session) – A session object that can be used for communication.
keystoneauth1.exceptions.response.InvalidResponse – The response returned wasn’t appropriate.
keystoneauth1.exceptions.http.HttpError – An error from an invalid HTTP response.
Token access information.
Return true if parameters can be used to create a scoped token.
Bases: keystoneauth1.identity.v2.Auth
A plugin for authenticating with a username and password.
A username or user_id must be provided.
auth_url (string) – Identity service endpoint for authorization.
username (string) – Username for authentication.
password (string) – Password for authentication.
user_id (string) – User ID for authentication.
trust_id (string) – Trust ID for trust scoping.
tenant_id (string) – Tenant ID for tenant scoping.
tenant_name (string) – Tenant name for tenant scoping.
reauthenticate (bool) – Allow fetching a new token if the current one is going to expire. (optional) default True
TypeError – if a user_id or username is not provided.
Return the authentication section of an auth plugin.
headers (dict) – The headers that will be sent with the auth request if a plugin needs to add to them.
A dict of authentication data for the auth type.
dict
Get the elements for this auth plugin that make it unique.
As part of the get_cache_id requirement we need to determine what aspects of this plugin and its values that make up the unique elements.
This should be overridden by plugins that wish to allow caching.
The unique attributes and values of this plugin.
A flat dict with a str key and str or None value. This is required as we feed these values into a hash. Pairs where the value is None are ignored in the hashed id.
Bases: keystoneauth1.identity.v2.Auth
A plugin for authenticating with an existing token.
auth_url (string) – Identity service endpoint for authorization.
token (string) – Existing token for authentication.
tenant_id (string) – Tenant ID for tenant scoping.
tenant_name (string) – Tenant name for tenant scoping.
trust_id (string) – Trust ID for trust scoping.
reauthenticate (bool) – Allow fetching a new token if the current one is going to expire. (optional) default True
Return the authentication section of an auth plugin.
headers (dict) – The headers that will be sent with the auth request if a plugin needs to add to them.
A dict of authentication data for the auth type.
dict
Get the elements for this auth plugin that make it unique.
As part of the get_cache_id requirement we need to determine what aspects of this plugin and its values that make up the unique elements.
This should be overridden by plugins that wish to allow caching.
The unique attributes and values of this plugin.
A flat dict with a str key and str or None value. This is required as we feed these values into a hash. Pairs where the value is None are ignored in the hashed id.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.