keystonemiddleware/keystonemiddleware/auth_token
Chris Dent d3352ff422 Identify the keystone service when raising 503
When the keystonemiddleware is used directly in the WSGI stack of an
application, the 503 that is raised when the keystone service errors
or cannot be reached needs to identify that keystone is the service
that has failed, otherwise it appears to the client that it is the
service they are trying to access is down, which is misleading.

This addresses the problem in the most straightforward way possible:
the exception that causes the 503 is given a message including the
word "Keystone".

The call method in BaseAuthTokenTestCase gains an
expected_body_string kwarg. If not None, the response body (as
a six.text_type) is compared with the value.

Change-Id: Idf211e7bc99139744af232f5ea3ecb4be41551ca
Closes-Bug: #1747655
Closes-Bug: #1749797
2018-02-20 17:32:41 +01:00
..
__init__.py Identify the keystone service when raising 503 2018-02-20 17:32:41 +01:00
_auth.py Correct docs usage of keystoneauth1 session 2017-09-12 16:18:00 -05:00
_base.py Break default auth plugin into file 2015-02-26 10:01:15 +11:00
_cache.py rel-note and doc for lazy loading of oslo_cache 2017-12-13 11:57:54 +01:00
_exceptions.py Create a Config object 2016-06-10 18:21:56 +00:00
_identity.py Log TokenNotFound at INFO level instead of WARNING 2017-12-18 16:30:45 +00:00
_memcache_crypt.py Fix py3 byte/string error 2017-10-11 10:21:06 -05:00
_opts.py Rename auth_uri to www_authenticate_uri 2017-10-11 14:00:49 +02:00
_request.py Replace six.iteritems() with .items() 2017-07-12 13:43:55 +07:00
_revocations.py use oslo.log instead of logging 2017-01-13 03:24:18 +00:00
_signing_dir.py Remove log translations 2017-05-02 09:58:02 +08:00
_user_plugin.py Add service token to user token plugin 2016-10-11 16:03:26 +11:00