keystone.identity.backends package

Submodules

keystone.identity.backends.ldap module

class keystone.identity.backends.ldap.GroupApi(conf)[source]

Bases: keystone.common.ldap.core.BaseLdap

DEFAULT_ID_ATTR = 'cn'
DEFAULT_MEMBER_ATTRIBUTE = 'member'
DEFAULT_OBJECTCLASS = 'groupOfNames'
DEFAULT_OU = 'ou=UserGroups'
DEFAULT_STRUCTURAL_CLASSES = []
NotFound

alias of GroupNotFound

add_user(user_dn, group_id, user_id)[source]
attribute_options_names = {'description': 'desc', 'name': 'name'}
create(values)[source]
delete(group_id)[source]
get_all_filtered(hints, query=None)[source]
get_filtered(group_id)[source]
get_filtered_by_name(group_name)[source]
immutable_attrs = ['name']
list_group_users(group_id)[source]

Return a list of user dns which are members of a group.

list_user_groups(user_dn)[source]

Return a list of groups for which the user is a member.

list_user_groups_filtered(user_dn, hints)[source]

Return a filtered list of groups for which the user is a member.

model

alias of Group

options_name = 'group'
remove_user(user_dn, group_id, user_id)[source]
update(group_id, values)[source]
class keystone.identity.backends.ldap.Identity(conf=None)[source]

Bases: keystone.identity.core.IdentityDriverV8

add_user_to_group(user_id, group_id)[source]
authenticate(user_id, password)[source]
check_user_in_group(user_id, group_id)[source]
create_group(group_id, group)[source]
create_user(user_id, user)[source]
delete_group(group_id)[source]
delete_user(user_id)[source]
generates_uuids()[source]
get_group(group_id)[source]
get_group_by_name(group_name, domain_id)[source]
get_user(user_id)[source]
get_user_by_name(user_name, domain_id)[source]
is_domain_aware()[source]
list_groups(hints)[source]
list_groups_for_user(user_id, hints)[source]
list_users(hints)[source]
list_users_in_group(group_id, hints)[source]
remove_user_from_group(user_id, group_id)[source]
update_group(group_id, group)[source]
update_user(user_id, user)[source]
class keystone.identity.backends.ldap.UserApi(conf)[source]

Bases: keystone.common.ldap.core.EnabledEmuMixIn, keystone.common.ldap.core.BaseLdap

DEFAULT_ID_ATTR = 'cn'
DEFAULT_OBJECTCLASS = 'inetOrgPerson'
DEFAULT_OU = 'ou=Users'
DEFAULT_STRUCTURAL_CLASSES = ['person']
NotFound

alias of UserNotFound

attribute_options_names = {'name': 'name', 'enabled': 'enabled', 'default_project_id': 'default_project_id', 'email': 'mail', 'password': 'pass', 'description': 'description'}
create(values)[source]
filter_attributes(user)[source]
get_all_filtered(hints)[source]
get_filtered(user_id)[source]
immutable_attrs = ['id']
is_user(dn)[source]

Returns True if the entry is a user.

mask_enabled_attribute(values)[source]
model

alias of User

options_name = 'user'

keystone.identity.backends.sql module

class keystone.identity.backends.sql.FederatedUser(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.ModelDictMixin

attributes = ['id', 'user_id', 'idp_id', 'protocol_id', 'unique_id', 'display_name']
display_name
id
idp_id
protocol_id
unique_id
user_id
class keystone.identity.backends.sql.Group(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.DictBase

attributes = ['id', 'name', 'domain_id', 'description']
description
domain_id
extra
id
name
class keystone.identity.backends.sql.Identity(conf=None)[source]

Bases: keystone.identity.core.IdentityDriverV8

add_user_to_group(user_id, group_id)[source]
authenticate(user_id, password)[source]
check_user_in_group(user_id, group_id)[source]
create_group(*args, **kwargs)[source]
create_user(*args, **kwargs)[source]
delete_group(group_id)[source]
delete_user(user_id)[source]
get_group(group_id)[source]
get_group_by_name(group_name, domain_id)[source]
get_user(user_id)[source]
get_user_by_name(user_name, domain_id)[source]
is_sql[source]
list_groups(hints, *args, **kwargs)[source]
list_groups_for_user(user_id, hints)[source]
list_users(hints, *args, **kwargs)[source]
list_users_in_group(group_id, hints)[source]
remove_user_from_group(user_id, group_id)[source]
update_group(*args, **kwargs)[source]
update_user(*args, **kwargs)[source]
class keystone.identity.backends.sql.LocalUser(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.DictBase

attributes = ['id', 'user_id', 'domain_id', 'name']
domain_id
id
name
passwords
user_id
class keystone.identity.backends.sql.Password(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.DictBase

attributes = ['id', 'local_user_id', 'password']
id
local_user_id
password
class keystone.identity.backends.sql.User(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.DictBase

attributes = ['id', 'name', 'domain_id', 'password', 'enabled', 'default_project_id']
default_project_id
domain_id[source]
enabled
extra
federated_users
id
local_user
name[source]
password[source]
to_dict(include_extra_dict=False)[source]
class keystone.identity.backends.sql.UserGroupMembership(*args, **kwargs)[source]

Bases: sqlalchemy.ext.declarative.api.Base, keystone.common.sql.core.DictBase

Group membership join table.

group_id
user_id

Module contents