keystone/keystone/contrib
Morgan Fainberg ea185a25a2 Revoke by Audit Id / Audit Id Chain instead of expires
Instead of using the expiry of the token which can collide (is non
unique in some/many cases) use the new Audit ID for the tokens when
revoking a single token via the token revocation events.

Support for revoking by the audit_chain_id has been added to the
token provider, however, the REST API has not been updated to
accept an argument to revoke the chain. Support for revoking
the entire chain is in place to allow Keystone to internally
revoke an entire chain in certain circumstances. Exposing the
ability to revoke the entire chain via the REST API may occur
based upon further design discussions.

Change-Id: I840355ccd9bcfcd88aa139184731c056808c2c8f
bp: non-persistent-tokens
Closes-Bug: 1292283
2014-08-26 04:02:26 +00:00
..
access Remove unnecessary declaration of CONF 2014-08-13 11:21:08 -04:00
admin_crud Safer noqa handling 2014-03-27 18:52:07 -05:00
ec2 Merge "Support the hints mechanism in list_credentials()" 2014-08-15 16:38:38 +00:00
endpoint_filter Merge "Change V3 extensions to use resources" 2014-08-12 23:43:51 +00:00
example Remove unnecessary declaration of CONF 2014-08-13 11:21:08 -04:00
federation Standardizing the Federation Process 2014-08-19 09:17:42 -07:00
oauth1 Bump hacking to 0.9.x series 2014-08-14 20:42:48 -07:00
revoke Revoke by Audit Id / Audit Id Chain instead of expires 2014-08-26 04:02:26 +00:00
s3 Remove unnecessary declaration of CONF 2014-08-13 11:21:08 -04:00
simple_cert Change V3 extensions to use resources 2014-08-02 18:11:55 -05:00
stats Safer noqa handling 2014-03-27 18:52:07 -05:00
user_crud Remove assignment controller dependency on token_api 2014-08-07 18:37:05 +00:00
__init__.py establish basic structure 2012-01-18 20:06:27 -08:00