Adjust import items according to hacking import rule
Adjust import items according to hacking import rule
Adjust import items according to hacking import rule
Replace assertTrue with explicit assertIsInstance
Fix discover command failed to read extension list issue
Fix incorrect assertTrue usage
Make assertQueryStringIs usage simpler
auth_token tests use assertIs/Not/None
Make common log import consistent
Python 3: Use HTTPMessage.get() rather than HTTPMessage.getheader()
auth_token tests close temp file descriptor
Tests cleanup temporary files
Removes use of timeutils.set_time_override
Controllable redirect handling
Verify token binding in auth_token middleware
Verify token binding in auth_token middleware
Fix auth_token middleware test invalid cross-device link issue
Add unit tests for generic/shell.py
Rename using-api.rst to using-api-v2.rst
Documents keystone v3 API usage - part 1
v3 test utils, don’t modify input parameter
Fix error in v3 credentials create/update
Rename instead of writing directly to revoked file
Correctly handle auth_url/token authentication
Remove debug specific handling
Fix missed management_url setter in v3 client
Add service catalog to domain scoped token fixture
Change assertEquals to assertIsNone
Avoid meaningless comparison that leads to a TypeError
Python3: replace urllib by six.moves.urllib
Fix –debug handling in the shell
Rename tokenauth to authtoken in the doc
use six.StringIO for compatibility with io.StringIO in python3
Properly handle Regions in keystoneclient
Use testresources for example files
Discover supported APIs
Warn user about unsupported API version
Add workaround for OSError raised by Popen.communicate()
Use assertIn where appropriate
Extract a base Session object
Do not format messages before they are logged
keystoneclient requires an email address when creating a user
Fix typo in keystoneclient
Encode the text before print it to console
Opt-out of service catalog
Opt-out of service catalog
Opt-out of service catalog
Remove deprecated auth_token middleware
“publicurl” should be required on endpoint-create
Update the management url for every fetched token
Fix python3 incompatible use of urlparse
Convert revocation list file last modified to UTC
Convert revocation list file last modified to UTC
Migrate the keystone.common.cms to keystoneclient
Migrate the keystone.common.cms to keystoneclient
Avoid returning stale token via auth_token property
Remove SERVICE_TOKEN and SERVICE_ENDPOINT env vars
Make ROOTDIR determination more robust
Replace OpenStack LLC with OpenStack Foundation
Replace OpenStack LLC with OpenStack Foundation
Replace OpenStack LLC with OpenStack Foundation
Replace OpenStack LLC with OpenStack Foundation
Add AssertRequestHeaderEqual test helper and make use of it
python3: Make iteritems py3k compat
Normalize datetimes to account for tz
Normalize datetimes to account for tz
assertEquals is deprecated, use assertEqual (H602)
remove the nova dependency in the ec2_token middleware
Fix H202 assertRaises Exception
Fix H202 assertRaises Exception
Refactor for testability of an upcoming change
Refactor for testability of an upcoming change
Allow v2 client authentication with trust_id
Fix misused assertTrue in unit tests
Add auth_uri in conf to avoid unnecessary warning
Move tests in keystoneclient
Set example timestamps to 2038-01-18T21:14:07Z
Replace HttpConnection in auth_token with Requests
Replace HttpConnection in auth_token with Requests
Support client generate literal ipv6 auth_uri base on auth_host
Log user info in auth_token middleware
Changed header from LLC to Foundation based on trademark policies
python3: Use from future import unicode_literals
Fix and enable gating on F841
Use OSLO jsonutils instead of json module
Allow configure the number of http retries
Use hashed token for invalid PKI token cache key
Make auth_token middleware fetching respect prefix
Move all opens in auth_token to be in context
Refactor Keystone to use unified logging from Oslo
Refactor verify signing dir logic
Fixes files with wrong bitmode
Don’t cache tokens as invalid on network errors
Fix a typo in fetch_revocation_list
auth_uri (public ep) should not default to auth_* values (admin ep)
Adds help in keystone_authtoken config opts
python3: Add basic compatibility support
remove swift dependency of s3 middleware
flake8: fix alphabetical imports and enable H306
Drop webob from auth_token.py
no logging on cms failure
rm improper assert syntax
Fix and enable gating on H402
Raise key length defaults
Fix auth_token.py bad signing_dir log message
Fix and enable H401
Revert environment module usage in middleware
Fix the cache interface to use time= by default
Change memcache config entry name in Keystone to be consistent with Oslo
Change memcache config entry name in Keystone to be consistent with Oslo
Fix memcache encryption middleware
Fix memcache encryption middleware
Isolate eventlet code into environment
Provide keystone CLI man page
Check Expiry
Check Expiry
import only modules (flake8 H302)
Satisfy flake8 import rules F401 and F403
Default signing_dir to secure temp dir (bug 1181157)
Use testr instead of nose
Securely create signing_dir (bug 1174608)
adding notes about dealing with exceptions in the client
Fix v3 with UUID and memcache expiring
Fix v3 with UUID and memcache expiring
Allow keystoneclient to work with older keystone installs
Wrap config module and require manual setup (bug 1143998)
Config value for revocation list timeout
Cache tokens using memorycache from oslo
Cache tokens using memorycache from oslo
xml_body returns backtrace on XMLSyntaxError
Make auth_token lazy load the auth_version
Doc info and other readability improvements
Retry http_request and json_request failure
Use v2.0 api by default in auth_token middleware
Fix auth-token middleware to understand v3 tokens
Fix auth-token middleware to understand v3 tokens
Remove test dep on name of dir (bug 1124283)
bug 1131840: fix auth and token data for XML translation
Rework S3Token middleware tests
v3 token API
Use oslo-config-2013.1b3
Allow configure auth_token http connect timeout
Allow configure auth_token http connect timeout
Fix spelling mistakes
Mark password config options with secret
Fixes ‘not in’ operator usage
Fix thinko in self.middleware.cert_file_missing
Limit the size of HTTP requests
Blueprint memcache-protection: enable memcache value encryption/integrity check
Blueprint memcache-protection: enable memcache value encryption/integrity check
Warning message is not logged for valid token-less request
Use os.path to find ~/keystone-signing (bug 1078947)
Remove iso8601 dep in favor of openstack.common
remove unused import
Bug 1052674: added support for Swift cache
URL-encode user-supplied tokens (bug 974319)
Fix middleware logging for swift
Remove swift auth
Don’t try to split a list of memcache servers
Import auth_token middleware from keystoneclient
Throw validation response into the environment
Add auth-token code to keystoneclient, along with supporting files
Add auth-token code to keystoneclient, along with supporting files
Use the right subprocess based on os monkeypatch
Make initial structural changes to keystoneclient in preparation to moving auth_token here from keystone. No functional change should occur from this commit (even though it did refresh a newer copy of openstack.common.setup.py, none of the newer updates are in functions called from this client)
fixes bug 1074172
HACKING compliance: consistent use of ‘except’
auth_token hash pki key PKI tokens on hash in memcached when accessed by auth_token middelware
Move ‘opentack.context’ and ‘openstack.params’ definitions to keystone.common.wsgi
Replace refs to ‘Keystone API’ with ‘Identity API’
replacing PKI token detection from content length to content prefix. (bug 1060389)
updating base keystoneclient documentation
updating keystoneclient doc theme
Backslash continuation cleanup
Check for expected cfg impl (bug 1043479)
Fix PEP8 issues
Fix auth_token middleware to fetch revocation list as admin
allow middleware configuration from app config
Change underscores in new cert options to dashes
PKI Token revocation
Use user home dir as default for cache
Set default signing_dir based on os USER
Test for Cert by name
Cryptographically Signed tokens
Prevent service catalog injection in auth_token
Admin Auth URI prefix
Support 2-way SSL with Keystone server if it is configured to enforce 2-way SSL. See also https://review.openstack.org/#/c/7706/ for the corresponding review for the 2-way SSL addition to Keystone