601eeb50b6
Blueprint trusts creates a trust. Using a trust, one user (the trustee), can then create tokens with a subset of another user's (the trustor) roles and projects. If the impersonate flag in the trust is set, the token user_id is set to the trustor's user ID If the impersonate flag is not set, the token's user_is is set to the trustee's user ID check that both trustor and trustee are enabled prior to creating the trust token. sql and kvs backends sql upgrade scripts unit tests for backends, auth and v3 api modifications to the trust controller for creating tokens Authenticates that only user can be trustor in create Deleting a trust invalidates all tokens created from that trust Adds the trust id and the id of the trustee to the header of the token policy rules for trust This version has a workaround for testing against the KVS version of the Service catalog Change-Id: I5745f4d9a4180b59671a143a55ed87019e98ec76
28 lines
644 B
Plaintext
28 lines
644 B
Plaintext
[sql]
|
|
connection = sqlite://
|
|
#For a file based sqlite use
|
|
#connection = sqlite:////tmp/keystone.db
|
|
#To Test MySQL:
|
|
#connection = mysql://keystone:keystone@localhost/keystone?charset=utf8
|
|
#To Test PostgreSQL:
|
|
#connection = postgresql://keystone:keystone@localhost/keystone?client_encoding=utf8
|
|
idle_timeout = 200
|
|
|
|
[identity]
|
|
driver = keystone.identity.backends.sql.Identity
|
|
|
|
[token]
|
|
driver = keystone.token.backends.sql.Token
|
|
|
|
[ec2]
|
|
driver = keystone.contrib.ec2.backends.sql.Ec2
|
|
|
|
[catalog]
|
|
driver = keystone.catalog.backends.sql.Catalog
|
|
|
|
[policy]
|
|
driver = keystone.policy.backends.sql.Policy
|
|
|
|
[trust]
|
|
driver = keystone.trust.backends.sql.Trust
|