Bases: keystone.cli.BaseApp
Sync the database.
Bases: keystone.cli.BaseApp
Export the service catalog from a legacy database.
Bases: keystone.cli.BaseApp
Import a legacy database.
Bases: keystone.cli.BaseApp
Import a dump of nova auth data into keystone.
Bases: keystone.config.ConfigMixin, keystone.openstack.common.cfg.CommonConfigOpts
Bases: keystone.config.ConfigMixin, keystone.openstack.common.cfg.ConfigOpts
Sets up the logging options for a log with supplied name
Parameters: | conf – a cfg.ConfOpts object |
---|
Bases: keystone.exception.Error
Conflict occurred attempting to store %(type)s.
%(details)s
Bases: keystone.exception.NotFound
Could not find endpoint: %(endpoint_id)s
Bases: exceptions.StandardError
Base error class.
Child classes should define an HTTP status code, title, and a doc string.
Bases: keystone.exception.Error
You are not authorized to perform the requested action.
Bases: keystone.exception.Forbidden
You are not authorized to perform the requested action: %(action)s
Bases: keystone.exception.Error
Could not find: %(target)s
Bases: keystone.exception.Error
The action you have requested has not been implemented.
Bases: keystone.exception.NotFound
Could not find role: %(role_id)s
Bases: keystone.exception.NotFound
Could not find service: %(service_id)s
Bases: keystone.exception.NotFound
Could not find tenant: %(tenant_id)s
Bases: keystone.exception.NotFound
Could not find token: %(token_id)s
Bases: keystone.exception.Error
The request you have made requires authentication.
Bases: keystone.exception.Error
An unexpected error prevented the server from fulfilling your request.
%(exception)s
Bases: keystone.exception.NotFound
Could not find user: %(user_id)s
Bases: keystone.exception.Error
Expecting to find %(attribute)s in %(target)s.
The server could not comply with the request since it is either malformed or otherwise incorrect.
The client is assumed to be in error.
Bases: keystone.common.wsgi.Application
Base extensions controller to be extended by public and admin API’s.
Bases: keystone.common.wsgi.Application
Bases: keystone.common.wsgi.Application
Authenticate credentials and return a token.
Accept auth as a dict that looks like:
{
"auth":{
"passwordCredentials":{
"username":"test_user",
"password":"mypass"
},
"tenantName":"customer-x"
}
}
In this case, tenant is optional, if not provided the token will be considered “unscoped” and can later be used to get a scoped token.
Alternatively, this call accepts auth with only a token and tenant that will return a token that is scoped to that tenant.
Delete a token, effectively invalidating it for authz.
Return a list of endpoints available to the token.
Check that a token is valid.
Optionally, also ensure that it is owned by a specific tenant.
Returns metadata about the token along any associated roles.
Check that a token is valid.
Optionally, also ensure that it is owned by a specific tenant.
Identical to validate_token, except does not return a response.
Bases: keystone.common.wsgi.Application
Bases: unittest.case.TestCase
Hacky shortcut to load the backends for data manipulation.
Hacky basic and naive fixture loading based on a python module.
Expects that the various APIs into the various services are already defined on self.
Bases: object