Commit Graph

97 Commits

Author SHA1 Message Date
Ghanshyam Mann 2db8309be9 Update python classifier in setup.cfg
As per the current release tested runtime, we test
python version from 3.8 to 3.11 so updating the
same in python classifier in setup.cfg

Change-Id: I8d3a53d2bc5207a5627edf881bb7eacdff56a7ec
2024-01-03 23:56:30 -08:00
Tim Burke 66cd04e2ab Add project URLs from README as packaging metadata
Change-Id: Ibdbc0b9228c6b24a521b9117ee0298a4a302bb98
2023-03-16 16:03:30 -07:00
Tim Burke 4e518145c3 Fix up some packaging metadata
https://pypi.org/pypi/keystoneauth1/json currently does not have a minimum
python version.

Also clean up a twine warning:

  warning: `long_description_content_type` missing. defaulting to `text/x-rst`.

Change-Id: Ibc4747c32afe646fe15baf52538f1ef1defc40c1
2023-03-16 16:00:52 -07:00
Zuul b80a6b62e4 Merge "New auth plugin v3oidcdeviceauthz" 2023-03-03 17:10:06 +00:00
Arvid Requate 44e5b2deef New auth plugin v3oidcdeviceauthz
OAuth 2.0 Device Authorization Grant

https://www.rfc-editor.org/rfc/rfc8628

Signed-off-by: Arvid Requate <requate@univention.de>
Change-Id: I8344ee5c9730c1533d58d7ccb04ddc3d2d517ade
2023-02-23 10:09:08 +01:00
sunyonggen ca28df8480 OAuth 2.0 Mutual-TLS Support
Added a new OAuth2mTlsClientCredential plugin, accessible via the
'v3oauth2mtlsclientcredential' entry point, making possible to
authenticate using an OAuth 2.0 Mutual-TLS client credentials.

Co-Authored-By: Hiromu Asahina <hiromu.asahina.az@hco.ntt.co.jp>
Change-Id: I0e02ef18da5d60cdd1bcde07b07c2071b74b73d6
Implements: blueprint support-oauth2-mtls
2023-02-10 20:56:45 +09:00
Yi Feng aa9c5d230f OAuth2.0 Client Credentials Grant Flow Support
Added a new OAuth2ClientCredential plugin, accessible via the
'v3oauth2clientcredential' entry point, making possible to authenticate
using an application credentials as an OAuth2.0 client credentials.

Change-Id: I77d6faef4cbc75abb8e7d86f386fb6d16e40cabf
2022-08-30 06:29:20 +00:00
Grzegorz Grasza 2445a5df78 Update python testing as per zed cycle teting runtime
In Zed cycle, we have dropped the python 3.6/3.7[1] testing
and its support. Add release notes and update the python
classifier for the same.

[1] https://governance.openstack.org/tc/reference/runtimes/zed.html

Co-Authored-By: Ghanshyam Mann <gmann@ghanshyammann.com>
Change-Id: Ic7671ad666ebc0614686e068b9d4c0824e384fb3
2022-06-03 17:56:03 +02:00
Takashi Kajinami a1e209c9a1 setup.cfg: Replace dashes by underscores
Since setuptools v54.1.0[1], the parmeters with dash have been
deprecated in favor of the new parameters with underscore.

This change updates the parameters accordingly to avoid the warnings
like the example below.

  UserWarning: Usage of dash-separated 'description-file' will not be
  supported in future versions. Please use the underscore name
  'description_file' instead

[1] https://github.com/pypa/setuptools/commit/a2e9ae4cb

Change-Id: I3980fbc53ce4b954aff5e98087897ea94e50e4fc
2022-02-06 01:49:01 +09:00
Zuul dab8e1057a Merge "Drop python 3.5 support" 2020-06-22 19:19:22 +00:00
Zuul e0f1d314f4 Merge "Update lower-constraints versions" 2020-06-22 16:43:26 +00:00
Monty Taylor 4aaa2e52b0 Drop python 3.5 support
Now that we released ussuri, we have a stable release that supports
3.5. That means if needed we can backport changes needed for
zuul and nodepool, so it should be safe to go ahead and drop 3.5
support.

Change-Id: Iaaba139009f2b49815c29717d71b9182a6bec2ab
2020-06-22 10:04:17 -05:00
Steve Baker ff68663217 Implement HTTP Basic client support in keystoneauth1
A new basic auth plugin is added which enables HTTP Basic
authentication for standalone services. Like the noauth plugin, the
endpoint needs to be specified explicitly, along with the
username and password.

An example of a standalone server implementing HTTP Basic can be seen
in Ironic change https://review.opendev.org/#/c/727467/

Change-Id: Ib3f0a9c518d031a67f9605cf64a8a9cc81131ed3
Story: 2007656
Task: 39741
2020-06-15 10:26:35 +12:00
Sean McGinnis 8915fabc38
Update lower-constraints versions
This updates lower constraints to versions that will work with py38 so
that when we move to running on focal nodes, which has py38 as its
default py3 runtime, the lower-constraints job will continue to pass.

It also cleans out some secondary requirements that are no longer needed
due to our direct dependencies being updated.

Linters are removed that are kept in the global requirements blacklist
as those are not version tracked and are not relevant for our
lower-constraints unit test runs.

Change-Id: I228212d8347a33a6bc2735a8506acffe58bee2ec
Signed-off-by: Sean McGinnis <sean.mcginnis@gmail.com>
2020-06-10 06:42:37 -05:00
zhangboye 38374adab6 Add py38 package metadata
Change-Id: I6ec1530d9ddc844f3ba687fe94f5fcdd3670122f
2020-05-22 09:38:27 -05:00
Monty Taylor ae534646b3 Re-add python3.5 testing
keystoneauth is a little special in the world, in that it's an user
facing library and takes pride in staying compatible. As such it
doesn't change much, so the likelihood that patches will land that
break python3.5 is really low in the first place.

Although the overall openstack python3 support goal puts a min of
python3.6 - which is a great choice, keystoneauth has a big user,
OpenStackSDK, that is keeping python3.5 because OpenStackSDK has
a big user - Zuul, that still supports python3.5.

To be friendly to everyone, keep the py35 unit tests just to make
sure nobody lands f-strings or anything.

Once Zuul drops python3.5 we can circle back around and drop it
here too.

Remove openstackdocstheme from test-requirements.txt. It only
needs to be in doc/requirements.txt.

Change-Id: If380bbf77b757655b1dc55322f4636ef83986fe5
2020-04-19 10:33:33 -05:00
Andreas Jaeger 1accaf2d8a Cleanup py27 support
This repo is now testing only with Python 3, so let's make
a few cleanups:
- Remove python 2.7 stanza from setup.py
- Add requires on python >= 3.6 to setup.cfg so that pypi and pip
  know about the requirement
- Remove obsolete sections from setup.cfg
- Update classifiers
- Update requirements, no need for python_version anymore
- Cleanup doc/source/conf.py to remove now obsolete content.
- Use newer openstackdocstheme and Sphinx versions
- Remove install_command from tox.ini, the default is fine
- Remove hacking from doc/requirements, we don't need to autodoc it.
- Remove Babel, this repo does not use it.

Change-Id: I8ad7b5e6ef11ea51c587ff58bfc54aee4fcda9da
2020-04-17 18:46:54 +02:00
Ben Nemec 1fd67089f7 Remove universal wheel configuration
Now that we've dropped py2 support we shouldn't be setting this
anymore.

Change-Id: Ief8adcc693ff9bb4625f3bad1cbb38c55719d9ef
2020-02-06 17:30:14 +00:00
Vishakha Agarwal aafc90a9c2 [ussuri][goal] Drop python 2.7 support and testing
OpenStack is dropping the py2.7 support in ussuri cycle.

keystoneauth is ready with python 3 and ok to drop the
python 2.7 support.

Complete discussion & schedule can be found in
- http://lists.openstack.org/pipermail/openstack-discuss/2019-October/010142.html
- https://etherpad.openstack.org/p/drop-python2-support

Ussuri Communtiy-wide goal:
https://governance.openstack.org/tc/goals/selected/ussuri/drop-py27.html

Change-Id: I76ad66b76a85db9609aebc08e1f26a74219402f0
2020-01-07 12:31:09 -05:00
Adrian Turjak 6a69e4dfbd add support for auth_receipts and multi-method auth
- new exception when an auth receipt is returned.
- a new method for auth receipt.
- support to existing v3 Auth plugins to add additional methods.
- Added a new MultiFactor plugin with loading support which
  takes method names as strings.

Change-Id: Ie6601a50011118e3a07be9752f747c2298ff5230
Closes-Bug: #1839748
2019-08-14 11:51:28 +12:00
Vishakha Agarwal 33a804a288 Drop py35 jobs
Python 3.5 was the target runtime for the Rocky release.
The current target py3 runtime for Stein is Python 3.6,
so there is no reason to keep testing against the older version. Also
correct setup.cfg and tox.ini to reflect the current supported Python
versions.

https://governance.openstack.org/tc/reference/runtimes/stein.html#python-runtime-for-stein

Change-Id: I9d1b57b981269fea3afe39cf524350f3c4a7d944
2019-03-01 11:32:50 +01:00
Vieri f2ad956f82 Change openstack-dev to openstack-discuss
Mailinglists have been updated. Openstack-discuss replaces openstack-dev.

Change-Id: Ifd1ee825acd098a6525b5c5f3932ce200cfe730e
2018-12-05 03:38:39 +00:00
Doug Hellmann f41e304849 add lower-constraints job
Create a tox environment for running the unit tests against the lower
bounds of the dependencies.

Create a lower-constraints.txt to be used to enforce the lower bounds
in those tests.

Add openstack-tox-lower-constraints job to the zuul configuration.

See http://lists.openstack.org/pipermail/openstack-dev/2018-March/128352.html
for more details.

Also fix the lower bound for requests-kerberos.

Change-Id: Ie5da1d132321b2cffea3eb8522462daad45900b5
Depends-On: https://review.openstack.org/555034
Signed-off-by: Doug Hellmann <doug@doughellmann.com>
2018-04-19 09:54:28 +02:00
OpenStack Proposal Bot ce78397bff Updated from global requirements
Change-Id: I02b333b1cf75419bfad64159976f5aba0f304125
2018-03-15 07:03:34 +00:00
Colleen Murphy c2ae9e298e Add support for application credentials
Add new auth classes and loading options for application credentials.

Change-Id: If267c17eecc2c4acaf62e27276afc185c1ae3616
2018-01-18 13:16:54 +01:00
OpenStack Proposal Bot 7f41c9b9e5 Updated from global requirements
Change-Id: Ib2f4a05998d74ea4db3c8a00a8b68d47245adbcd
2017-09-22 12:52:21 +00:00
OpenStack Proposal Bot 4b15f5706a Updated from global requirements
Change-Id: I925ed8f1e685c7ae73aabe24312808daf96ecee3
2017-08-26 11:33:45 +00:00
Jenkins 7fb369881c Merge "Update URLs in documents according to document migration" 2017-07-19 08:50:52 +00:00
melissaml 885acfec57 Update URLs in documents according to document migration
Change-Id: I5afc149ab61e037cb3d9dd355975802a37342cf8
2017-07-14 09:23:53 +08:00
Pavlo Shchelokovskyy 070f8fd891 Add 'none' identity plugin
It does not accept any arguments and sets the token to 'notused'.
It does not have any endpoint/url associated,
and thus must be used together with adapter.Adapter.endpoint_override to
instantiate a session for client to a service that is deployed in
noauth/standalone mode.

Unfortunately the 'noauth' name is already taken by
cinderclient.contrib.noauth.

Change-Id: I2f7175ea095aac774e7c5889880fcff15586559c
2017-06-08 14:42:03 +00:00
Blake Covarrubias d46483cf24 Add ADFSPassword to keystoneauth1 entry points
The ADFSPassword plugin is not registered as an entry point under
keystoneauth1.plugin, and is therefore unusable from the “openstack” CLI
as a valid authentication plugin.

This commit registers the ADFS plugin in entry points as v3adfspassword.

Change-Id: Ic95c25647d91ea2de51a3eea7672a45c48bdaefb
Closes-Bug: #1687314
2017-05-07 21:30:42 -07:00
Gage Hugo 1859a7f2ee Uncomment warning-is-error for doc building
Now that the latest version of pbr supports handling a
ChangeLog that can contain invalid characters, this
setting should be uncommented in order to support
strict documentation formatting.

This will cause any docs build warnings to be treated as
as errors and fail.

Change-Id: I22d631550f0dbb6e0efcfd875a24dcd278fa1d03
2017-04-25 07:59:24 -05:00
Gage Hugo 7bf7619104 Remove pbr warnerrors in favor of sphinx check
This change removes the soon-to-be unused "warnerrors" setting,
which will be replaced by "warning-is-error" in sphinx
releases >= 1.5.[0] This also pre-emptively fixes most warnings
that came up when testing with sphinx >= 1.5:

- Multiple cases of Opts
- Redundant loading of todo extension

Added a comment to not to enable the new sphinx setting until
the issues with Changlog building are fixed.

Added setup.py to the list of files to ignore when building
docs.

[0] http://lists.openstack.org/pipermail/openstack-dev/2017-March/113085.html

Change-Id: Ia0079c6b551dd3896bc3d922a477f927757bd61b
2017-03-07 20:51:19 -06:00
Eric Brown 049e2e6b9b Use https for *.openstack.org references
The openstack.org pages now support https and our references to
the site should by default be one signed by the organization.

Change-Id: I8a0588259d7b3fc8bd10504ffba7129b840e2a0d
2017-02-06 13:45:24 -08:00
Eric Brown b7008bd1b6 Remove references to Python 3.4
Now that there exists only a gate job for Python 3.5 and not 3.4,
we should remove those references to the 3.4 that is untested.

Change-Id: I82f370a4d9da07e121e0ce6cac851008e3925639
2017-01-05 15:27:51 -08:00
OpenStack Proposal Bot 014db209d8 Updated from global requirements
Change-Id: I8e42b0ee27ef5c30a675b76cefd7c8ed90a0b5e5
2016-12-23 03:12:21 +00:00
OpenStack Proposal Bot 194a5041c8 Updated from global requirements
Change-Id: I9ad530fe6fac2cefdc0ec868367ef4d8b65f6add
2016-09-21 05:58:13 +00:00
lilintan acbd414497 Update the home-page in setup.cfg
Change-Id: Icdc7c1541ac24e8d6216da5b15e4171c6dd4d0b9
2016-08-09 16:14:42 +08:00
Alvaro Lopez Garcia e5fd66ca35 oidc: implement client_credentials grant type
Change-Id: If1538726cb7e4cb87fad82c5daf50c67b161b52d
2016-07-20 09:59:05 +02:00
Jamie Lennox 701b911437 Use SAML2 requests plugin
This is a major refactoring of the SAML2 plugin to move the logic into a
standalone requests auth plugin, and then have the keystoneauth plugin
simply provide a wrapper around that.

There was really no way to migrate this and keep the existing test files
as they were because the entire structure has been changed.

This will be the recommended way to do federation plugins in future and
keep the auth logic out of keystoneauth as much as possible (as kerberos
already does).

The intention will be that later we should be able to extract the SAML
ECP requests plugin into it's own upstream module.

Change-Id: I4a7377b9350741e8f7a4ed2a49a7e2442eacdd23
2016-07-18 00:24:37 -04:00
Yatin Kumbhare 88d4fdb14a Add Python 3.5 classifier and venv
Now that there is a passing gate job, we can claim support for
Python 3.5 in the classifier. This patch also adds the convenience
py35 venv.

Change-Id: I277c17f774e880b6d2c7c73a8410f1cd1167f055
2016-07-12 21:05:25 +05:30
chioleong e203d61092 Auth plugin for X.509 tokenless authentication
An auth plugin that allows service clients to be authenticated
with the X.509 tokenless authentication. Please find typical configured
options in authentication-plugins.rst

implements bp keystone-tokenless-authz-with-x509-ssl-client-cert

Change-Id: Ie0298f0ef7f3891cfc81072ab9ef9e501773fe5f
2016-07-05 17:11:36 -07:00
Adam Young d86df8613e Add entrypoint for Federated Kerberos
Closes-Bug: 1593885

Change-Id: I6cf01a796d96001812ef078acfde9a367f216b7a
2016-06-18 07:40:15 -04:00
guang-yee 9e29e6e9c5 Support TOTP auth plugin
Add support for time-based one-time password (TOTP) authentication.

Change-Id: I004677ac7f0e2fb8c059ad14868e661e8ee4c1f9
2016-06-13 11:40:43 -07:00
Colleen Murphy fc95d25544 Make the kerberos plugin loadable
This patch adds a BaseLoader class for the Kerberos plugin and an entry
point in setup.cfg.

Since the plugin file is being renamed, also fix the comment that
refers to the library as 'keystoneauth' - it is called 'keystoneauth1'
and trying to install 'keystoneauth' will cause the outdated version of
the library to be installed and kerberos will not work.

To make sure the plugin was loadable, this was tested using a version
of python-openstackclient that had been migrated to keystoneauth[1].

[1] https://review.openstack.org/#/c/276350/

Change-Id: Id339295c795f6bf1b428dac8fc9f79d2f5fb453f
Closes-bug: #1567257
Partial-bug: #1567260
2016-06-10 15:59:20 +00:00
OpenStack Proposal Bot c7ceb42490 Updated from global requirements
Change-Id: Iec0fcdf9a48bb28bfd33e5cdda054e440825525d
2016-06-02 23:30:12 +00:00
OpenStack Proposal Bot 156f3404c4 Updated from global requirements
Change-Id: I86dadad5d2899ca3975a1c45a9a7cc6a07c19793
2016-05-30 20:41:01 +00:00
OpenStack Proposal Bot cdec6c9afb Updated from global requirements
Change-Id: I60025c13789cbaa681d39a418e865acb26eb889b
2016-05-30 07:17:39 +00:00
OpenStack Proposal Bot 8d6c22b4e4 Updated from global requirements
Change-Id: Ic3c8086a72c0825e33177f4678b89f700606a408
2016-05-26 16:59:13 +00:00
Alvaro Lopez Garcia 553a523830 oidc: add OidcAccessToken class to authenticate reusing an access token
Some services or users may have obtained an access token, so it would be
possible to authenticate using this token directly (for example a
service where the user has already logged in). This new class makes
possible to use an access token to authenticate directly with Keystone,
exchanging it for a Keystone token.

Closes-bug: 1583780
Change-Id: I5a31270194a3d1aa48de709dba49afde460731e2
2016-05-20 09:31:09 +02:00