Go to file
Jamie Lennox 556c1a6633 Identity plugin thread safety
A common case is for Nova (or other service) to create a service
authentication plugin from a configuration file and then have many
greenlet threads that want to reuse that authentication. If a token
expires then many threads all try and fetch a new token to use and can
step over each other.

I was hoping for a way to put a lock in so that all plugins were thread
safe however fixing it for identity plugins solves almost all real world
situations and anyone doing non-identity plugins will have to manage
threads themselves.

Change-Id: Ib6487de7de638abc69660c851bd048a8ec177109
Closes-Bug: #1493835
2015-09-10 10:18:36 +10:00
2015-09-10 10:18:36 +10:00
2013-09-24 12:34:17 +10:00
2014-05-07 12:12:43 -07:00
2015-02-13 17:55:34 +11:00
2012-09-29 16:03:23 -07:00
2015-06-03 21:01:18 -05:00
2011-10-25 16:50:08 -07:00
2013-05-17 14:43:31 -07:00
2015-02-13 17:55:34 +11:00
2015-07-15 01:37:25 +00:00
2015-07-13 04:53:17 -07:00

Python bindings to the OpenStack Identity API (Keystone)

This is a client for the OpenStack Identity API, implemented by the Keystone team; it contains a Python API (the keystoneclient module) for OpenStack's Identity Service. For command line interface support, use OpenStackClient.

Contents:

Python API

By way of a quick-start:

# use v2.0 auth with http://example.com:5000/v2.0
>>> from keystoneclient.v2_0 import client
>>> keystone = client.Client(username=USERNAME, password=PASSWORD, tenant_name=TENANT, auth_url=AUTH_URL)
>>> keystone.tenants.list()
>>> tenant = keystone.tenants.create(tenant_name="test", description="My new tenant!", enabled=True)
>>> tenant.delete()
Description
OpenStack Identity (Keystone) Client
Readme 33 MiB
Languages
Python 100%