Move to the keystoneauth1 namespace
Conver from the keystoneauth namespace to keystoneauth1. This is to ensure that is is possible to install all versions of keystoneauth side-by-side. Change-Id: Ibbaf11525980c8edb5968d8b8ee19c55094e77d8
This commit is contained in:
		| @@ -1,4 +1,4 @@ | ||||
| [DEFAULT] | ||||
| test_command=${PYTHON:-python} -m subunit.run discover -t ./  ${OS_TEST_PATH:-./keystoneauth/tests/unit} $LISTOPT $IDOPTION | ||||
| test_command=${PYTHON:-python} -m subunit.run discover -t ./  ${OS_TEST_PATH:-./keystoneauth1/tests/unit} $LISTOPT $IDOPTION | ||||
| test_id_option=--load-list $IDFILE | ||||
| test_list_option=--list | ||||
|   | ||||
| @@ -28,13 +28,13 @@ V2 Identity Plugins | ||||
| ------------------- | ||||
|  | ||||
| Standard V2 identity plugins are defined in the module: | ||||
| :py:mod:`keystoneauth.auth.identity.v2` | ||||
| :py:mod:`keystoneauth1.auth.identity.v2` | ||||
|  | ||||
| They include: | ||||
|  | ||||
| - :py:class:`~keystoneauth.auth.identity.v2.Password`: Authenticate against | ||||
| - :py:class:`~keystoneauth1.auth.identity.v2.Password`: Authenticate against | ||||
|   a V2 identity service using a username and password. | ||||
| - :py:class:`~keystoneauth.auth.identity.v2.Token`: Authenticate against a | ||||
| - :py:class:`~keystoneauth1.auth.identity.v2.Token`: Authenticate against a | ||||
|   V2 identity service using an existing token. | ||||
|  | ||||
| V2 identity plugins must use an auth_url that points to the root of a V2 | ||||
| @@ -44,23 +44,23 @@ V3 Identity Plugins | ||||
| ------------------- | ||||
|  | ||||
| Standard V3 identity plugins are defined in the module | ||||
| :py:mod:`keystoneauth.auth.identity.v3`. | ||||
| :py:mod:`keystoneauth1.auth.identity.v3`. | ||||
|  | ||||
| V3 Identity plugins are slightly different from their V2 counterparts as a V3 | ||||
| authentication request can contain multiple authentication methods.  To handle | ||||
| this V3 defines a number of different | ||||
| :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` classes: | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` classes: | ||||
|  | ||||
| - :py:class:`~keystoneauth.auth.identity.v3.PasswordMethod`: Authenticate | ||||
| - :py:class:`~keystoneauth1.auth.identity.v3.PasswordMethod`: Authenticate | ||||
|   against a V3 identity service using a username and password. | ||||
| - :py:class:`~keystoneauth.auth.identity.v3.TokenMethod`: Authenticate against | ||||
| - :py:class:`~keystoneauth1.auth.identity.v3.TokenMethod`: Authenticate against | ||||
|   a V2 identity service using an existing token. | ||||
|  | ||||
| The :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` objects are then | ||||
| passed to the :py:class:`~keystoneauth.auth.identity.v3.Auth` plugin:: | ||||
| The :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` objects are then | ||||
| passed to the :py:class:`~keystoneauth1.auth.identity.v3.Auth` plugin:: | ||||
|  | ||||
|     >>> from keystoneauth import session | ||||
|     >>> from keystoneauth.auth.identity import v3 | ||||
|     >>> from keystoneauth1 import session | ||||
|     >>> from keystoneauth1.auth.identity import v3 | ||||
|     >>> password = v3.PasswordMethod(username='user', | ||||
|     ...                              password='password') | ||||
|     >>> auth = v3.Auth(auth_url='http://my.keystone.com:5000/v3', | ||||
| @@ -69,15 +69,15 @@ passed to the :py:class:`~keystoneauth.auth.identity.v3.Auth` plugin:: | ||||
|     >>> sess = session.Session(auth=auth) | ||||
|  | ||||
| As in the majority of cases you will only want to use one | ||||
| :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` there are also helper | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` there are also helper | ||||
| authentication plugins for the various | ||||
| :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` which can be used more | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` which can be used more | ||||
| like the V2 plugins: | ||||
|  | ||||
| - :py:class:`~keystoneauth.auth.identity.v3.Password`: Authenticate using | ||||
|   only a :py:class:`~keystoneauth.auth.identity.v3.PasswordMethod`. | ||||
| - :py:class:`~keystoneauth.auth.identity.v3.Token`: Authenticate using only a | ||||
|   :py:class:`~keystoneauth.auth.identity.v3.TokenMethod`. | ||||
| - :py:class:`~keystoneauth1.auth.identity.v3.Password`: Authenticate using | ||||
|   only a :py:class:`~keystoneauth1.auth.identity.v3.PasswordMethod`. | ||||
| - :py:class:`~keystoneauth1.auth.identity.v3.Token`: Authenticate using only a | ||||
|   :py:class:`~keystoneauth1.auth.identity.v3.TokenMethod`. | ||||
|  | ||||
| :: | ||||
|  | ||||
| @@ -88,7 +88,7 @@ like the V2 plugins: | ||||
|     >>> sess = session.Session(auth=auth) | ||||
|  | ||||
| This will have exactly the same effect as using the single | ||||
| :py:class:`~keystoneauth.auth.identity.v3.PasswordMethod` above. | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.PasswordMethod` above. | ||||
|  | ||||
| V3 identity plugins must use an auth_url that points to the root of a V3 | ||||
| identity server URL, i.e.: `http://hostname:5000/v3`. | ||||
| @@ -97,7 +97,7 @@ Version Independent Identity Plugins | ||||
| ------------------------------------ | ||||
|  | ||||
| Standard version independent identity plugins are defined in the module | ||||
| :py:mod:`keystoneauth.auth.identity.generic`. | ||||
| :py:mod:`keystoneauth1.auth.identity.generic`. | ||||
|  | ||||
| For the cases of plugins that exist under both the identity V2 and V3 APIs | ||||
| there is an abstraction to allow the plugin to determine which of the V2 and V3 | ||||
| @@ -105,9 +105,9 @@ APIs are supported by the server and use the most appropriate API. | ||||
|  | ||||
| These plugins are: | ||||
|  | ||||
| - :py:class:`~keystoneauth.auth.identity.generic.Password`: Authenticate | ||||
| - :py:class:`~keystoneauth1.auth.identity.generic.Password`: Authenticate | ||||
|   using a user/password against either v2 or v3 API. | ||||
| - :py:class:`~keystoneauth.auth.identity.generic.Token`: Authenticate using | ||||
| - :py:class:`~keystoneauth1.auth.identity.generic.Token`: Authenticate using | ||||
|   an existing token against either v2 or v3 API. | ||||
|  | ||||
| These plugins work by first querying the identity server to determine available | ||||
| @@ -124,7 +124,7 @@ same provided token and endpoint is available. This is useful in situations | ||||
| where you have an ``ADMIN_TOKEN`` or in testing when you specifically know the | ||||
| endpoint you want to communicate with. | ||||
|  | ||||
| It can be found at :py:class:`keystoneauth.auth.token_endpoint.Token`. | ||||
| It can be found at :py:class:`keystoneauth1.auth.token_endpoint.Token`. | ||||
|  | ||||
|  | ||||
| V3 OAuth 1.0a Plugins | ||||
| @@ -132,13 +132,13 @@ V3 OAuth 1.0a Plugins | ||||
|  | ||||
| There also exists a plugin for OAuth 1.0a authentication. We provide a helper | ||||
| authentication plugin at: | ||||
| :py:class:`~keystoneauth.v3.contrib.oauth1.auth.OAuth`. | ||||
| :py:class:`~keystoneauth1.v3.contrib.oauth1.auth.OAuth`. | ||||
| The plugin requires the OAuth consumer's key and secret, as well as the OAuth | ||||
| access token's key and secret. For example:: | ||||
|  | ||||
|     >>> from keystoneauth.v3.contrib.oauth1 import auth | ||||
|     >>> from keystoneauth import session | ||||
|     >>> from keystoneauth.v3 import client | ||||
|     >>> from keystoneauth1.v3.contrib.oauth1 import auth | ||||
|     >>> from keystoneauth1 import session | ||||
|     >>> from keystoneauth1.v3 import client | ||||
|     >>> a = auth.OAuth('http://my.keystone.com:5000/v3', | ||||
|     ...                consumer_key=consumer_id, | ||||
|     ...                consumer_secret=consumer_secret, | ||||
| @@ -155,12 +155,12 @@ possible to specify a plugin to load via name. The authentication options that | ||||
| are available are then specific to the plugin that you specified. Currently the | ||||
| authentication plugins that are available in `keystoneauth` are: | ||||
|  | ||||
| - password: :py:class:`keystoneauth.auth.identity.generic.Password` | ||||
| - token: :py:class:`keystoneauth.auth.identity.generic.Token` | ||||
| - v2password: :py:class:`keystoneauth.auth.identity.v2.Password` | ||||
| - v2token: :py:class:`keystoneauth.auth.identity.v2.Token` | ||||
| - v3password: :py:class:`keystoneauth.auth.identity.v3.Password` | ||||
| - v3token: :py:class:`keystoneauth.auth.identity.v3.Token` | ||||
| - password: :py:class:`keystoneauth1.auth.identity.generic.Password` | ||||
| - token: :py:class:`keystoneauth1.auth.identity.generic.Token` | ||||
| - v2password: :py:class:`keystoneauth1.auth.identity.v2.Password` | ||||
| - v2token: :py:class:`keystoneauth1.auth.identity.v2.Token` | ||||
| - v3password: :py:class:`keystoneauth1.auth.identity.v3.Password` | ||||
| - v3token: :py:class:`keystoneauth1.auth.identity.v3.Token` | ||||
|  | ||||
|  | ||||
| Creating Authentication Plugins | ||||
| @@ -175,43 +175,43 @@ for the existing Identity mechanisms. As the V2 identity API is essentially | ||||
| frozen, it is expected that new plugins are for the V3 API. | ||||
|  | ||||
| To implement a new V3 plugin that can be combined with others you should | ||||
| implement the base :py:class:`keystoneauth.auth.identity.v3.AuthMethod` class | ||||
| implement the base :py:class:`keystoneauth1.auth.identity.v3.AuthMethod` class | ||||
| and implement the | ||||
| :py:meth:`~keystoneauth.auth.identity.v3.AuthMethod.get_auth_data` function. | ||||
| :py:meth:`~keystoneauth1.auth.identity.v3.AuthMethod.get_auth_data` function. | ||||
| If your Plugin cannot be used in conjunction with existing | ||||
| :py:class:`keystoneauth.auth.identity.v3.AuthMethod` then you should just | ||||
| override :py:class:`keystoneauth.auth.identity.v3.Auth` directly. | ||||
| :py:class:`keystoneauth1.auth.identity.v3.AuthMethod` then you should just | ||||
| override :py:class:`keystoneauth1.auth.identity.v3.Auth` directly. | ||||
|  | ||||
| The new :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` should take all | ||||
| The new :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` should take all | ||||
| the required parameters via | ||||
| :py:meth:`~keystoneauth.auth.identity.v3.AuthMethod.__init__` and return from | ||||
| :py:meth:`~keystoneauth.auth.identity.v3.AuthMethod.get_auth_data` a tuple | ||||
| :py:meth:`~keystoneauth1.auth.identity.v3.AuthMethod.__init__` and return from | ||||
| :py:meth:`~keystoneauth1.auth.identity.v3.AuthMethod.get_auth_data` a tuple | ||||
| with the unique identifier of this plugin (e.g. *password*) and a dictionary | ||||
| containing the payload of values to send to the authentication server. The | ||||
| session, calling auth object and request headers are also passed to this | ||||
| function so that the plugin may use or manipulate them. | ||||
|  | ||||
| You should also provide a class that inherits from | ||||
| :py:class:`keystoneauth.auth.identity.v3.Auth` with an instance of your new | ||||
| :py:class:`~keystoneauth.auth.identity.v3.AuthMethod` as the `auth_methods` | ||||
| parameter to :py:class:`keystoneauth.auth.identity.v3.Auth`. | ||||
| :py:class:`keystoneauth1.auth.identity.v3.Auth` with an instance of your new | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.AuthMethod` as the `auth_methods` | ||||
| parameter to :py:class:`keystoneauth1.auth.identity.v3.Auth`. | ||||
|  | ||||
| By convention (and like above) these are named `PluginType` and | ||||
| `PluginTypeMethod` (for example | ||||
| :py:class:`~keystoneauth.auth.identity.v3.Password` and | ||||
| :py:class:`~keystoneauth.auth.identity.v3.PasswordMethod`). | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.Password` and | ||||
| :py:class:`~keystoneauth1.auth.identity.v3.PasswordMethod`). | ||||
|  | ||||
|  | ||||
| Creating a Custom Plugin | ||||
| ------------------------ | ||||
|  | ||||
| To implement an entirely new plugin you should implement the base class | ||||
| :py:class:`keystoneauth.auth.base.BaseAuthPlugin` and provide the | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.get_endpoint`, | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.get_token` and | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.invalidate` functions. | ||||
| :py:class:`keystoneauth1.auth.base.BaseAuthPlugin` and provide the | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.get_endpoint`, | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.get_token` and | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.invalidate` functions. | ||||
|  | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.get_token` is called to | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.get_token` is called to | ||||
| retrieve the string token from a plugin. It is intended that a plugin will | ||||
| cache a received token and so if the token is still valid then it should be | ||||
| re-used rather than fetching a new one. A session object is provided with which | ||||
| @@ -219,19 +219,19 @@ the plugin can contact it's server. (Note: use `authenticated=False` when | ||||
| making those requests or it will end up being called recursively). The return | ||||
| value should be the token as a string. | ||||
|  | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.get_endpoint` is called to | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.get_endpoint` is called to | ||||
| determine a base URL for a particular service's requests. The keyword arguments | ||||
| provided to the function are those that are given by the `endpoint_filter` | ||||
| variable in :py:meth:`keystoneauth.session.Session.request`. A session object | ||||
| variable in :py:meth:`keystoneauth1.session.Session.request`. A session object | ||||
| is also provided so that the plugin may contact an external source to determine | ||||
| the endpoint.  Again this will be generally be called once per request and so | ||||
| it is up to the plugin to cache these responses if appropriate. The return | ||||
| value should be the base URL to communicate with. | ||||
|  | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.invalidate` should also be | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.invalidate` should also be | ||||
| implemented to clear the current user credentials so that on the next | ||||
| :py:meth:`~keystoneauth.auth.base.BaseAuthPlugin.get_token` call a new token | ||||
| :py:meth:`~keystoneauth1.auth.base.BaseAuthPlugin.get_token` call a new token | ||||
| can be retrieved. | ||||
|  | ||||
| The most simple example of a plugin is the | ||||
| :py:class:`keystoneauth.auth.token_endpoint.Token` plugin. | ||||
| :py:class:`keystoneauth1.auth.token_endpoint.Token` plugin. | ||||
|   | ||||
| @@ -1,6 +1,6 @@ | ||||
| # -*- coding: utf-8 -*- | ||||
| # | ||||
| # keystoneauth documentation build configuration file, created by | ||||
| # keystoneauth1 documentation build configuration file, created by | ||||
| # sphinx-quickstart on Sun Dec  6 14:19:25 2009. | ||||
| # | ||||
| # This file is execfile()d with the current directory set to its containing | ||||
| @@ -55,13 +55,13 @@ source_suffix = '.rst' | ||||
| master_doc = 'index' | ||||
|  | ||||
| # General information about the project. | ||||
| project = 'keystoneauth' | ||||
| project = 'keystoneauth1' | ||||
| copyright = 'OpenStack Contributors' | ||||
|  | ||||
| # The version info for the project you're documenting, acts as replacement for | ||||
| # |version| and |release|, also used in various other places throughout the | ||||
| # built documents. | ||||
| version_info = pbr.version.VersionInfo('keystoneauth') | ||||
| version_info = pbr.version.VersionInfo('keystoneauth1') | ||||
| # The short X.Y version. | ||||
| version = version_info.version_string() | ||||
| # The full version, including alpha/beta/rc tags. | ||||
| @@ -201,8 +201,8 @@ htmlhelp_basename = 'keystoneauthdoc' | ||||
| # (source start file, target name, title, author, documentclass [howto/manual]) | ||||
| # . | ||||
| latex_documents = [ | ||||
|     ('index', 'keystoneauth.tex', | ||||
|      'keystoneauth Documentation', | ||||
|     ('index', 'keystoneauth1.tex', | ||||
|      'keystoneauth1 Documentation', | ||||
|      'Nebula Inc, based on work by Rackspace and Jacob Kaplan-Moss', | ||||
|      'manual'), | ||||
| ] | ||||
|   | ||||
| @@ -5,8 +5,8 @@ Using Sessions | ||||
| Introduction | ||||
| ============ | ||||
|  | ||||
| The :py:class:`keystoneauth.session.Session` class was introduced into | ||||
| keystoneauth as an attempt to bring a unified interface to the various | ||||
| The :py:class:`keystoneauth1.session.Session` class was introduced into | ||||
| keystoneauth1 as an attempt to bring a unified interface to the various | ||||
| OpenStack clients that share common authentication and request parameters | ||||
| between a variety of services. | ||||
|  | ||||
| @@ -55,9 +55,9 @@ service and fetch a new one. | ||||
|  | ||||
| An example from keystoneauth:: | ||||
|  | ||||
|     >>> from keystoneauth.auth.identity import v3 | ||||
|     >>> from keystoneauth import session | ||||
|     >>> from keystoneauth.v3 import client | ||||
|     >>> from keystoneauth1.auth.identity import v3 | ||||
|     >>> from keystoneauth1 import session | ||||
|     >>> from keystoneauth1.v3 import client | ||||
|  | ||||
|     >>> auth = v3.Password(auth_url='https://my.keystone.com:5000/v2.0', | ||||
|     ...                    username='myuser', | ||||
| @@ -72,16 +72,16 @@ As clients adopt this means of operating they will be created in a similar | ||||
| fashion by passing the Session object to the client's constructor. | ||||
|  | ||||
|  | ||||
| Migrating keystoneauth to use a Session | ||||
| Migrating keystoneauth1 to use a Session | ||||
| ----------------------------------------- | ||||
|  | ||||
| By using a session with a keystoneauth Client we presume that you have opted | ||||
| By using a session with a keystoneauth1 Client we presume that you have opted | ||||
| in to new behavior defined by the session. For example authentication is now | ||||
| on-demand rather than on creation. To allow this change in behavior there are | ||||
| a number of functions that have changed behavior or are no longer available. | ||||
|  | ||||
| For example the | ||||
| :py:meth:`keystoneauth.httpclient.HTTPClient.authenticate` method used | ||||
| :py:meth:`keystoneauth1.httpclient.HTTPClient.authenticate` method used | ||||
| to be able to always re-authenticate the current client and fetch a new token. | ||||
| As this is now controlled by the Session and not the client this has changed, | ||||
| however the function will still exist to provide compatibility with older | ||||
| @@ -91,7 +91,7 @@ Likewise certain parameters such as ``user_id`` and ``auth_token`` that used to | ||||
| be available on the client object post authentication will remain | ||||
| uninitialized. | ||||
|  | ||||
| When converting an application to use a session object with keystoneauth you | ||||
| When converting an application to use a session object with keystoneauth1 you | ||||
| should be aware of the possibility of changes to authentication and | ||||
| authentication parameters and make sure to test your code thoroughly. It should | ||||
| have no impact on the typical CRUD interaction with the client. | ||||
| @@ -188,7 +188,7 @@ While authentication plugins will endeavour to maintain a consistent set of | ||||
| arguments for an ``endpoint_filter`` the concept of an authentication plugin is | ||||
| purposefully generic and a specific mechanism may not know how to interpret | ||||
| certain arguments and ignore them. For example the | ||||
| :py:class:`keystoneauth.auth.token_endpoint.Token` plugin (which is used when | ||||
| :py:class:`keystoneauth1.auth.token_endpoint.Token` plugin (which is used when | ||||
| you want to always use a specific endpoint and token combination) will always | ||||
| return the same endpoint regardless of the parameters to ``endpoint_filter`` or | ||||
| a custom OpenStack authentication mechanism may not have the concept of | ||||
|   | ||||
| @@ -16,9 +16,9 @@ | ||||
| 
 | ||||
| import functools | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import service_catalog | ||||
| from keystoneauth import service_providers | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import service_catalog | ||||
| from keystoneauth1 import service_providers | ||||
| 
 | ||||
| 
 | ||||
| # gap, in seconds, to determine whether the given token is about to expire | ||||
| @@ -358,7 +358,7 @@ class AccessInfo(object): | ||||
| 
 | ||||
|         Used for Keystone2Keystone federating-out. | ||||
| 
 | ||||
|         :returns: :py:class:`keystoneauth.service_providers.ServiceProviders` | ||||
|         :returns: :py:class:`keystoneauth1.service_providers.ServiceProviders` | ||||
|                   or None | ||||
|         """ | ||||
|         raise NotImplementedError() | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth1 import _utils as utils | ||||
| 
 | ||||
| 
 | ||||
| class Adapter(object): | ||||
| @@ -11,9 +11,9 @@ | ||||
| # under the License. | ||||
| 
 | ||||
| 
 | ||||
| from keystoneauth.auth.base import *  # noqa | ||||
| from keystoneauth.auth.cli import *  # noqa | ||||
| from keystoneauth.auth.conf import *  # noqa | ||||
| from keystoneauth1.auth.base import *  # noqa | ||||
| from keystoneauth1.auth.cli import *  # noqa | ||||
| from keystoneauth1.auth.conf import *  # noqa | ||||
| 
 | ||||
| 
 | ||||
| __all__ = [ | ||||
| @@ -15,7 +15,7 @@ import os | ||||
| import six | ||||
| import stevedore | ||||
| 
 | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| 
 | ||||
| # NOTE(jamielennox): The AUTH_INTERFACE is a special value that can be | ||||
| @@ -23,7 +23,7 @@ from keystoneauth import exceptions | ||||
| # 'interface' it should return the initial URL that was passed to the plugin. | ||||
| AUTH_INTERFACE = object() | ||||
| 
 | ||||
| PLUGIN_NAMESPACE = 'keystoneauth.auth.plugin' | ||||
| PLUGIN_NAMESPACE = 'keystoneauth1.auth.plugin' | ||||
| IDENTITY_AUTH_HEADER_NAME = 'X-Auth-Token' | ||||
| 
 | ||||
| 
 | ||||
| @@ -13,8 +13,8 @@ | ||||
| import argparse | ||||
| import os | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1.auth import base | ||||
| 
 | ||||
| 
 | ||||
| @utils.positional() | ||||
| @@ -12,7 +12,7 @@ | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth1.auth import base | ||||
| 
 | ||||
| _AUTH_PLUGIN_OPT = cfg.StrOpt('auth_plugin', help='Name of the plugin to load') | ||||
| 
 | ||||
| @@ -10,10 +10,10 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.auth.identity import base | ||||
| from keystoneauth.auth.identity import generic | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth1.auth.identity import base | ||||
| from keystoneauth1.auth.identity import generic | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| 
 | ||||
| 
 | ||||
| BaseIdentityPlugin = base.BaseIdentityPlugin | ||||
| @@ -10,8 +10,8 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth.auth.identity import base | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1.auth.identity import base | ||||
| 
 | ||||
| 
 | ||||
| class AccessInfoPlugin(base.BaseIdentityPlugin): | ||||
| @@ -16,10 +16,10 @@ import logging | ||||
| from oslo_config import cfg | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth import discover | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1 import discover | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| LOG = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -10,9 +10,9 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.auth.identity.generic.base import BaseGenericPlugin  # noqa | ||||
| from keystoneauth.auth.identity.generic.password import Password  # noqa | ||||
| from keystoneauth.auth.identity.generic.token import Token  # noqa | ||||
| from keystoneauth1.auth.identity.generic.base import BaseGenericPlugin  # noqa | ||||
| from keystoneauth1.auth.identity.generic.password import Password  # noqa | ||||
| from keystoneauth1.auth.identity.generic.token import Token  # noqa | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['BaseGenericPlugin', | ||||
| @@ -17,9 +17,9 @@ from oslo_config import cfg | ||||
| import six | ||||
| import six.moves.urllib.parse as urlparse | ||||
| 
 | ||||
| from keystoneauth.auth.identity import base | ||||
| from keystoneauth import discover | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1.auth.identity import base | ||||
| from keystoneauth1 import discover | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| 
 | ||||
| LOG = logging.getLogger(__name__) | ||||
| @@ -14,11 +14,11 @@ import logging | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth.auth.identity.generic import base | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth import discover | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1.auth.identity.generic import base | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1 import discover | ||||
| 
 | ||||
| LOG = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -14,10 +14,10 @@ import logging | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth.identity.generic import base | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth import discover | ||||
| from keystoneauth1.auth.identity.generic import base | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1 import discover | ||||
| 
 | ||||
| LOG = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -16,10 +16,10 @@ import logging | ||||
| from oslo_config import cfg | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth.identity import base | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth.identity import base | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| _logger = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -10,11 +10,11 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.auth.identity.v3.base import *  # noqa | ||||
| from keystoneauth.auth.identity.v3.federation import *  # noqa | ||||
| from keystoneauth.auth.identity.v3.k2k import *  # noqa | ||||
| from keystoneauth.auth.identity.v3.password import *  # noqa | ||||
| from keystoneauth.auth.identity.v3.token import *  # noqa | ||||
| from keystoneauth1.auth.identity.v3.base import *  # noqa | ||||
| from keystoneauth1.auth.identity.v3.federation import *  # noqa | ||||
| from keystoneauth1.auth.identity.v3.k2k import *  # noqa | ||||
| from keystoneauth1.auth.identity.v3.password import *  # noqa | ||||
| from keystoneauth1.auth.identity.v3.token import *  # noqa | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['Auth', | ||||
| @@ -16,10 +16,10 @@ import logging | ||||
| from oslo_config import cfg | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth.identity import base | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth.identity import base | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| _logger = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -15,8 +15,8 @@ import abc | ||||
| from oslo_config import cfg | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth.auth.identity.v3 import base | ||||
| from keystoneauth.auth.identity.v3 import token | ||||
| from keystoneauth1.auth.identity.v3 import base | ||||
| from keystoneauth1.auth.identity.v3 import token | ||||
| 
 | ||||
| __all__ = ['FederationBaseAuth'] | ||||
| 
 | ||||
| @@ -12,11 +12,11 @@ | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth import base as auth_base | ||||
| from keystoneauth.auth.identity.v3 import base | ||||
| from keystoneauth.auth.identity.v3 import token | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth import base as auth_base | ||||
| from keystoneauth1.auth.identity.v3 import base | ||||
| from keystoneauth1.auth.identity.v3 import token | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| __all__ = ['Keystone2Keystone'] | ||||
| 
 | ||||
| @@ -30,7 +30,7 @@ class Keystone2Keystone(base.BaseAuth): | ||||
| 
 | ||||
|     :param base_plugin: Auth plugin already authenticated against the keystone | ||||
|                         IdP. | ||||
|     :type base_plugin: ``keystoneauth.auth.v3.base.BaseAuth`` | ||||
|     :type base_plugin: ``keystoneauth1.auth.v3.base.BaseAuth`` | ||||
| 
 | ||||
|     :param service_provider: The Service Provider ID. | ||||
|     :type service_provider: string | ||||
| @@ -12,7 +12,7 @@ | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth.identity.v3 import base | ||||
| from keystoneauth1.auth.identity.v3 import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['PasswordMethod', 'Password'] | ||||
| @@ -12,7 +12,7 @@ | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth.identity.v3 import base | ||||
| from keystoneauth1.auth.identity.v3 import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['TokenMethod', 'Token'] | ||||
| @@ -12,7 +12,7 @@ | ||||
| 
 | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth1.auth import base | ||||
| 
 | ||||
| 
 | ||||
| class Token(base.BaseAuthPlugin): | ||||
| @@ -13,7 +13,7 @@ | ||||
| """The passive components to version discovery. | ||||
| 
 | ||||
| The Discover object in discover.py contains functions that can create objects | ||||
| on your behalf. These functions are not usable from within the keystoneauth | ||||
| on your behalf. These functions are not usable from within the keystoneauth1 | ||||
| library because you will get dependency resolution issues. | ||||
| 
 | ||||
| The Discover object in this file provides the querying components of Discovery. | ||||
| @@ -24,8 +24,8 @@ raw data specified in version discovery responses. | ||||
| import logging | ||||
| import re | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| 
 | ||||
| _LOGGER = logging.getLogger(__name__) | ||||
| @@ -314,7 +314,7 @@ _VERSION_HACKS.add_discover_hack('identity', re.compile('/v2.0/?$'), '/') | ||||
| def _get_catalog_discover_hack(service_type, url): | ||||
|     """Apply the catalog hacks and figure out an unversioned endpoint. | ||||
| 
 | ||||
|     This function is internal to keystoneauth. | ||||
|     This function is internal to keystoneauth1. | ||||
| 
 | ||||
|     :param str service_type: the service_type to look up. | ||||
|     :param str url: The original url that came from a service_catalog. | ||||
| @@ -11,12 +11,12 @@ | ||||
| # under the License. | ||||
| 
 | ||||
| 
 | ||||
| from keystoneauth.exceptions.auth import *  # noqa | ||||
| from keystoneauth.exceptions.auth_plugins import *  # noqa | ||||
| from keystoneauth.exceptions.base import *  # noqa | ||||
| from keystoneauth.exceptions.catalog import *  # noqa | ||||
| from keystoneauth.exceptions.connection import *  # noqa | ||||
| from keystoneauth.exceptions.discovery import *  # noqa | ||||
| from keystoneauth.exceptions.http import *  # noqa | ||||
| from keystoneauth.exceptions.response import *  # noqa | ||||
| from keystoneauth.exceptions.service_providers import *  # noqa | ||||
| from keystoneauth1.exceptions.auth import *  # noqa | ||||
| from keystoneauth1.exceptions.auth_plugins import *  # noqa | ||||
| from keystoneauth1.exceptions.base import *  # noqa | ||||
| from keystoneauth1.exceptions.catalog import *  # noqa | ||||
| from keystoneauth1.exceptions.connection import *  # noqa | ||||
| from keystoneauth1.exceptions.discovery import *  # noqa | ||||
| from keystoneauth1.exceptions.http import *  # noqa | ||||
| from keystoneauth1.exceptions.response import *  # noqa | ||||
| from keystoneauth1.exceptions.service_providers import *  # noqa | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| class AuthorizationFailure(base.ClientException): | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| class AuthPluginException(base.ClientException): | ||||
| @@ -11,7 +11,7 @@ | ||||
| # under the License. | ||||
| 
 | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| __all__ = ['CatalogException', | ||||
|            'EmptyCatalog', | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['ConnectionError', | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['DiscoveryFailure', | ||||
| @@ -17,7 +17,7 @@ | ||||
| #    under the License. | ||||
| 
 | ||||
| """ | ||||
| HTTP Exceptions used by keystoneauth | ||||
| HTTP Exceptions used by keystoneauth1 | ||||
| """ | ||||
| 
 | ||||
| import inspect | ||||
| @@ -25,7 +25,7 @@ import sys | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['HttpError', | ||||
| @@ -11,7 +11,7 @@ | ||||
| # under the License. | ||||
| 
 | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| 
 | ||||
| __all__ = ['InvalidResponse'] | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth.exceptions import base | ||||
| from keystoneauth1.exceptions import base | ||||
| 
 | ||||
| __all__ = ['ServiceProviderNotFound'] | ||||
| 
 | ||||
| @@ -21,10 +21,10 @@ may be dependencies from this module on libraries that are only available in | ||||
| testing. | ||||
| """ | ||||
| 
 | ||||
| from keystoneauth.fixture.discovery import *  # noqa | ||||
| from keystoneauth.fixture import exception | ||||
| from keystoneauth.fixture import v2 | ||||
| from keystoneauth.fixture import v3 | ||||
| from keystoneauth1.fixture.discovery import *  # noqa | ||||
| from keystoneauth1.fixture import exception | ||||
| from keystoneauth1.fixture import v2 | ||||
| from keystoneauth1.fixture import v3 | ||||
| 
 | ||||
| 
 | ||||
| FixtureValidationError = exception.FixtureValidationError | ||||
| @@ -10,7 +10,7 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth1 import _utils as utils | ||||
| 
 | ||||
| __all__ = ['DiscoveryList', | ||||
|            'V2Discovery', | ||||
| @@ -13,8 +13,8 @@ | ||||
| import datetime | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth import _utils | ||||
| from keystoneauth.fixture import exception | ||||
| from keystoneauth1 import _utils | ||||
| from keystoneauth1.fixture import exception | ||||
| 
 | ||||
| 
 | ||||
| class _Service(dict): | ||||
| @@ -13,8 +13,8 @@ | ||||
| import datetime | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth import _utils | ||||
| from keystoneauth.fixture import exception | ||||
| from keystoneauth1 import _utils | ||||
| from keystoneauth1.fixture import exception | ||||
| 
 | ||||
| 
 | ||||
| class _Service(dict): | ||||
| @@ -10,10 +10,10 @@ | ||||
| # License for the specific language governing permissions and limitations | ||||
| # under the License. | ||||
| 
 | ||||
| """keystoneauth's pep8 extensions. | ||||
| """keystoneauth1's pep8 extensions. | ||||
| 
 | ||||
| In order to make the review process faster and easier for core devs we are | ||||
| adding some keystoneauth specific pep8 checks. This will catch common | ||||
| adding some keystoneauth1 specific pep8 checks. This will catch common | ||||
| errors so that core devs don't have to. | ||||
| 
 | ||||
| """ | ||||
| @@ -20,8 +20,8 @@ import abc | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| 
 | ||||
| @six.add_metaclass(abc.ABCMeta) | ||||
| @@ -10,7 +10,7 @@ | ||||
| # See the License for the specific language governing permissions and | ||||
| # limitations under the License. | ||||
| 
 | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| 
 | ||||
| class ServiceProviders(object): | ||||
| @@ -26,8 +26,8 @@ import requests | ||||
| import six | ||||
| from six.moves import urllib | ||||
| 
 | ||||
| from keystoneauth import _utils as utils | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth1 import _utils as utils | ||||
| from keystoneauth1 import exceptions | ||||
| 
 | ||||
| try: | ||||
|     import netaddr | ||||
| @@ -39,7 +39,7 @@ try: | ||||
| except ImportError: | ||||
|     osprofiler_web = None | ||||
| 
 | ||||
| USER_AGENT = 'keystoneauth' | ||||
| USER_AGENT = 'keystoneauth1' | ||||
| 
 | ||||
| _logger = logging.getLogger(__name__) | ||||
| 
 | ||||
| @@ -101,7 +101,7 @@ class Session(object): | ||||
|                           to 0) | ||||
|     :param string user_agent: A User-Agent header string to use for the | ||||
|                               request. If not provided a default is used. | ||||
|                               (optional, defaults to 'keystoneauth') | ||||
|                               (optional, defaults to 'keystoneauth1') | ||||
|     :param int/bool redirect: Controls the maximum number of redirections that | ||||
|                               can be followed by a request. Either an integer | ||||
|                               for a specific count or True/False for | ||||
| @@ -12,12 +12,12 @@ | ||||
| 
 | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth import access | ||||
| from keystoneauth import auth | ||||
| from keystoneauth.auth.identity import access as access_plugin | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1 import auth | ||||
| from keystoneauth1.auth.identity import access as access_plugin | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class AccessInfoPluginTests(utils.TestCase): | ||||
| @@ -17,9 +17,9 @@ import fixtures | ||||
| import mock | ||||
| from oslo_config import cfg | ||||
| 
 | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth.auth import cli | ||||
| from keystoneauth.tests.unit.auth import utils | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1.auth import cli | ||||
| from keystoneauth1.tests.unit.auth import utils | ||||
| 
 | ||||
| 
 | ||||
| class TesterPlugin(base.BaseAuthPlugin): | ||||
| @@ -17,12 +17,12 @@ from oslo_config import cfg | ||||
| from oslo_config import fixture as config | ||||
| import stevedore | ||||
| 
 | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth.auth import conf | ||||
| from keystoneauth.auth.identity import v2 as v2_auth | ||||
| from keystoneauth.auth.identity import v3 as v3_auth | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth.tests.unit.auth import utils | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1.auth import conf | ||||
| from keystoneauth1.auth.identity import v2 as v2_auth | ||||
| from keystoneauth1.auth.identity import v3 as v3_auth | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1.tests.unit.auth import utils | ||||
| 
 | ||||
| 
 | ||||
| class ConfTests(utils.TestCase): | ||||
| @@ -16,14 +16,14 @@ import uuid | ||||
| import mock | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import _utils | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth.auth import identity | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import _utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1.auth import identity | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| @six.add_metaclass(abc.ABCMeta) | ||||
| @@ -13,10 +13,10 @@ | ||||
| import copy | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class V2IdentityPlugin(utils.TestCase): | ||||
| @@ -13,13 +13,13 @@ | ||||
| import copy | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth.auth.identity.v3 import base as v3_base | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1.auth.identity.v3 import base as v3_base | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class V3IdentityPlugin(utils.TestCase): | ||||
| @@ -15,13 +15,13 @@ import uuid | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import k2k_fixtures | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import k2k_fixtures | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class TesterFederationPlugin(v3.FederationBaseAuth): | ||||
| @@ -14,7 +14,7 @@ import uuid | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth.tests.unit.auth import utils | ||||
| from keystoneauth1.tests.unit.auth import utils | ||||
| 
 | ||||
| 
 | ||||
| class TestOtherLoading(utils.TestCase): | ||||
| @@ -12,11 +12,11 @@ | ||||
| 
 | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth.auth.identity.generic import password | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth.auth.identity.v3 import password as v3_password | ||||
| from keystoneauth.tests.unit.auth import utils | ||||
| from keystoneauth1.auth.identity.generic import password | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1.auth.identity.v3 import password as v3_password | ||||
| from keystoneauth1.tests.unit.auth import utils | ||||
| 
 | ||||
| 
 | ||||
| class PasswordTests(utils.GenericPluginTestCase): | ||||
| @@ -12,11 +12,11 @@ | ||||
| 
 | ||||
| import uuid | ||||
| 
 | ||||
| from keystoneauth.auth.identity.generic import token | ||||
| from keystoneauth.auth.identity import v2 | ||||
| from keystoneauth.auth.identity import v3 | ||||
| from keystoneauth.auth.identity.v3 import token as v3_token | ||||
| from keystoneauth.tests.unit.auth import utils | ||||
| from keystoneauth1.auth.identity.generic import token | ||||
| from keystoneauth1.auth.identity import v2 | ||||
| from keystoneauth1.auth.identity import v3 | ||||
| from keystoneauth1.auth.identity.v3 import token as v3_token | ||||
| from keystoneauth1.tests.unit.auth import utils | ||||
| 
 | ||||
| 
 | ||||
| class TokenTests(utils.GenericPluginTestCase): | ||||
| @@ -12,9 +12,9 @@ | ||||
| 
 | ||||
| from testtools import matchers | ||||
| 
 | ||||
| from keystoneauth.auth import token_endpoint | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1.auth import token_endpoint | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class TokenEndpointTest(utils.TestCase): | ||||
| @@ -17,12 +17,12 @@ import mock | ||||
| from oslo_config import cfg | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import access | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth import session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import access | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1 import session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class MockPlugin(base.BaseAuthPlugin): | ||||
| @@ -15,9 +15,9 @@ import re | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import discover | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import discover | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| BASE_HOST = 'http://keystone.example.com' | ||||
| @@ -14,8 +14,8 @@ import uuid | ||||
| 
 | ||||
| import six | ||||
| 
 | ||||
| from keystoneauth import fixture | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import fixture | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class V2TokenTests(utils.TestCase): | ||||
| @@ -16,8 +16,8 @@ import mock | ||||
| import pep8 | ||||
| import testtools | ||||
| 
 | ||||
| from keystoneauth.hacking import checks | ||||
| from keystoneauth.tests.unit import keystoneauth_fixtures | ||||
| from keystoneauth1.hacking import checks | ||||
| from keystoneauth1.tests.unit import keystoneauth_fixtures | ||||
| 
 | ||||
| 
 | ||||
| class TestCheckOsloNamespaceImports(testtools.TestCase): | ||||
| @@ -23,11 +23,11 @@ import requests | ||||
| import six | ||||
| from testtools import matchers | ||||
| 
 | ||||
| from keystoneauth import adapter | ||||
| from keystoneauth.auth import base | ||||
| from keystoneauth import exceptions | ||||
| from keystoneauth import session as client_session | ||||
| from keystoneauth.tests.unit import utils | ||||
| from keystoneauth1 import adapter | ||||
| from keystoneauth1.auth import base | ||||
| from keystoneauth1 import exceptions | ||||
| from keystoneauth1 import session as client_session | ||||
| from keystoneauth1.tests.unit import utils | ||||
| 
 | ||||
| 
 | ||||
| class SessionTests(utils.TestCase): | ||||
| @@ -4,4 +4,4 @@ | ||||
| module=install_venv_common | ||||
|  | ||||
| # The base module to hold the copy of openstack.common | ||||
| base=keystoneauth | ||||
| base=keystoneauth1 | ||||
|   | ||||
							
								
								
									
										20
									
								
								setup.cfg
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								setup.cfg
									
									
									
									
									
								
							| @@ -1,5 +1,5 @@ | ||||
| [metadata] | ||||
| name = keystoneauth | ||||
| name = keystoneauth1 | ||||
| summary = Authentication Libarary for OpenStack Identity | ||||
| description-file = | ||||
|     README.rst | ||||
| @@ -21,18 +21,18 @@ classifier = | ||||
|  | ||||
| [files] | ||||
| packages = | ||||
|     keystoneauth | ||||
|     keystoneauth1 | ||||
|  | ||||
| [entry_points] | ||||
|  | ||||
| keystoneauth.auth.plugin = | ||||
|     password = keystoneauth.auth.identity.generic:Password | ||||
|     token = keystoneauth.auth.identity.generic:Token | ||||
|     v2password = keystoneauth.auth.identity.v2:Password | ||||
|     v2token = keystoneauth.auth.identity.v2:Token | ||||
|     v3password = keystoneauth.auth.identity.v3:Password | ||||
|     v3token = keystoneauth.auth.identity.v3:Token | ||||
|     k2k = keystoneauth.auth.identity.v3:Keystone2Keystone | ||||
| keystoneauth1.auth.plugin = | ||||
|     password = keystoneauth1.auth.identity.generic:Password | ||||
|     token = keystoneauth1.auth.identity.generic:Token | ||||
|     v2password = keystoneauth1.auth.identity.v2:Password | ||||
|     v2token = keystoneauth1.auth.identity.v2:Token | ||||
|     v3password = keystoneauth1.auth.identity.v3:Password | ||||
|     v3token = keystoneauth1.auth.identity.v3:Token | ||||
|     k2k = keystoneauth1.auth.identity.v3:Keystone2Keystone | ||||
|  | ||||
| [build_sphinx] | ||||
| source-dir = doc/source | ||||
|   | ||||
							
								
								
									
										4
									
								
								tox.ini
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								tox.ini
									
									
									
									
									
								
							| @@ -28,7 +28,7 @@ commands = python setup.py testr --coverage --testr-args='{posargs}' | ||||
| downloadcache = ~/cache/pip | ||||
|  | ||||
| [testenv:debug] | ||||
| commands = oslo_debug_helper -t keystoneauth/tests {posargs} | ||||
| commands = oslo_debug_helper -t keystoneauth1/tests {posargs} | ||||
|  | ||||
| [flake8] | ||||
| # H405: multi line docstring summary not separated with an empty line | ||||
| @@ -41,4 +41,4 @@ commands= | ||||
|     python setup.py build_sphinx | ||||
|  | ||||
| [hacking] | ||||
| local-check-factory = keystoneauth.hacking.checks.factory | ||||
| local-check-factory = keystoneauth1.hacking.checks.factory | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Morgan Fainberg
					Morgan Fainberg