5afd51e8cf
Keystone no longer depends on mongodb after cache implementation was
split to oslo.cache[1]. Also, bandit is not a runtime dependency but
a test dependency, so should live in test requirements.
[1] 4969f66fca
Change-Id: I85f376d0897dd6b4dba758f86882fae70511fb6a
178 lines
5.1 KiB
INI
178 lines
5.1 KiB
INI
[metadata]
|
|
name = keystone
|
|
summary = OpenStack Identity
|
|
description_file =
|
|
README.rst
|
|
author = OpenStack
|
|
author_email = openstack-discuss@lists.openstack.org
|
|
home_page = https://docs.openstack.org/keystone/latest
|
|
python_requires = >=3.8
|
|
classifier =
|
|
Environment :: OpenStack
|
|
Intended Audience :: Information Technology
|
|
Intended Audience :: System Administrators
|
|
License :: OSI Approved :: Apache Software License
|
|
Operating System :: POSIX :: Linux
|
|
Programming Language :: Python
|
|
Programming Language :: Python :: Implementation :: CPython
|
|
Programming Language :: Python :: 3 :: Only
|
|
Programming Language :: Python :: 3
|
|
Programming Language :: Python :: 3.8
|
|
Programming Language :: Python :: 3.9
|
|
Programming Language :: Python :: 3.10
|
|
Programming Language :: Python :: 3.11
|
|
|
|
[files]
|
|
data_files =
|
|
etc/keystone =
|
|
etc/sso_callback_template.html
|
|
packages =
|
|
keystone
|
|
|
|
[extras]
|
|
ldap =
|
|
python-ldap>=3.0.0 # PSF
|
|
ldappool>=2.3.1 # MPL
|
|
memcache =
|
|
python-memcached>=1.56 # PSF
|
|
|
|
[entry_points]
|
|
console_scripts =
|
|
keystone-manage = keystone.cmd.manage:main
|
|
keystone-status = keystone.cmd.status:main
|
|
|
|
wsgi_scripts =
|
|
keystone-wsgi-admin = keystone.server.wsgi:initialize_admin_application
|
|
keystone-wsgi-public = keystone.server.wsgi:initialize_public_application
|
|
|
|
keystone.assignment =
|
|
sql = keystone.assignment.backends.sql:Assignment
|
|
|
|
keystone.auth.application_credential =
|
|
default = keystone.auth.plugins.application_credential:ApplicationCredential
|
|
|
|
keystone.auth.external =
|
|
default = keystone.auth.plugins.external:DefaultDomain
|
|
DefaultDomain = keystone.auth.plugins.external:DefaultDomain
|
|
Domain = keystone.auth.plugins.external:Domain
|
|
|
|
keystone.auth.kerberos =
|
|
default = keystone.auth.plugins.external:KerberosDomain
|
|
|
|
keystone.auth.oauth1 =
|
|
default = keystone.auth.plugins.oauth1:OAuth
|
|
|
|
keystone.auth.openid =
|
|
default = keystone.auth.plugins.mapped:Mapped
|
|
|
|
keystone.auth.password =
|
|
default = keystone.auth.plugins.password:Password
|
|
|
|
keystone.auth.saml2 =
|
|
default = keystone.auth.plugins.mapped:Mapped
|
|
|
|
keystone.auth.token =
|
|
default = keystone.auth.plugins.token:Token
|
|
|
|
keystone.auth.totp =
|
|
default = keystone.auth.plugins.totp:TOTP
|
|
|
|
keystone.auth.x509 =
|
|
default = keystone.auth.plugins.mapped:Mapped
|
|
|
|
keystone.auth.mapped =
|
|
default = keystone.auth.plugins.mapped:Mapped
|
|
|
|
keystone.catalog =
|
|
sql = keystone.catalog.backends.sql:Catalog
|
|
templated = keystone.catalog.backends.templated:Catalog
|
|
|
|
keystone.credential =
|
|
sql = keystone.credential.backends.sql:Credential
|
|
|
|
keystone.credential.provider =
|
|
fernet = keystone.credential.providers.fernet:Provider
|
|
|
|
keystone.identity =
|
|
ldap = keystone.identity.backends.ldap:Identity
|
|
sql = keystone.identity.backends.sql:Identity
|
|
|
|
keystone.identity.id_generator =
|
|
sha256 = keystone.identity.id_generators.sha256:Generator
|
|
|
|
keystone.identity.id_mapping =
|
|
sql = keystone.identity.mapping_backends.sql:Mapping
|
|
|
|
keystone.identity.shadow_users =
|
|
sql = keystone.identity.shadow_backends.sql:ShadowUsers
|
|
|
|
keystone.policy =
|
|
rules = keystone.policy.backends.rules:Policy
|
|
sql = keystone.policy.backends.sql:Policy
|
|
|
|
keystone.resource =
|
|
sql = keystone.resource.backends.sql:Resource
|
|
|
|
keystone.resource.domain_config =
|
|
sql = keystone.resource.config_backends.sql:DomainConfig
|
|
|
|
keystone.role =
|
|
sql = keystone.assignment.role_backends.sql:Role
|
|
|
|
keystone.token.provider =
|
|
fernet = keystone.token.providers.fernet:Provider
|
|
jws = keystone.token.providers.jws:Provider
|
|
|
|
keystone.receipt.provider =
|
|
fernet = keystone.receipt.providers.fernet:Provider
|
|
|
|
keystone.trust =
|
|
sql = keystone.trust.backends.sql:Trust
|
|
|
|
keystone.unified_limit =
|
|
sql = keystone.limit.backends.sql:UnifiedLimit
|
|
|
|
keystone.endpoint_filter =
|
|
sql = keystone.catalog.backends.sql:Catalog
|
|
|
|
keystone.endpoint_policy =
|
|
sql = keystone.endpoint_policy.backends.sql:EndpointPolicy
|
|
|
|
keystone.federation =
|
|
sql = keystone.federation.backends.sql:Federation
|
|
|
|
keystone.oauth1 =
|
|
sql = keystone.oauth1.backends.sql:OAuth1
|
|
|
|
keystone.revoke =
|
|
sql = keystone.revoke.backends.sql:Revoke
|
|
|
|
keystone.application_credential =
|
|
sql = keystone.application_credential.backends.sql:ApplicationCredential
|
|
|
|
keystone.unified_limit.model =
|
|
flat = keystone.limit.models.flat:FlatModel
|
|
strict_two_level = keystone.limit.models.strict_two_level:StrictTwoLevelModel
|
|
|
|
oslo.config.opts =
|
|
keystone = keystone.conf.opts:list_opts
|
|
|
|
oslo.config.opts.defaults =
|
|
keystone = keystone.conf:set_external_opts_defaults
|
|
|
|
oslo.policy.policies =
|
|
# With the move of default policy in code list_rules returns a list of
|
|
# the default defined polices.
|
|
keystone = keystone.common.policies:list_rules
|
|
|
|
oslo.policy.enforcer =
|
|
keystone = keystone.common.rbac_enforcer.policy:get_enforcer
|
|
|
|
keystone.server_middleware =
|
|
cors = oslo_middleware:CORS
|
|
sizelimit = oslo_middleware:RequestBodySizeLimiter
|
|
http_proxy_to_wsgi = oslo_middleware:HTTPProxyToWSGI
|
|
osprofiler = osprofiler.web:WsgiMiddleware
|
|
request_id = oslo_middleware:RequestId
|
|
debug = oslo_middleware:Debug
|