keystone/keystone/token
Lance Bragstad 796198f196 Populate application credential data in token
Without this patch, the token formatter does not have enough data to
construct a token created with an application credential. This means
that if the token cache is disabled or expired, when keystone goes to
create the token it will not find any application credential information
and will not recreate the application_credential_restricted parameter in
the token data. This patch creates a new Payload class for application
credentials so that the application credential ID is properly persisted
in the msgpack'd payload. It also adds more data to the token data
object so that the application credential ID and name as well as its
restricted status is available when the token is queried.

Co-authored-by: Lance Bragstad <lbragstad@gmail.com>

Change-Id: I322a40404d8287748fe8c3a8d6dc1256d935d84a
Closes-bug: #1750415
2018-02-19 22:41:12 +01:00
..
providers Populate application credential data in token 2018-02-19 22:41:12 +01:00
__init__.py Remove the sql token driver and uuid token provider 2018-02-12 17:32:47 +00:00
_simple_cert.py Remove all v2.0 APIs except the ec2tokens API 2018-02-06 23:12:55 +01:00
provider.py Refactor token cache invalidation callbacks 2018-02-15 20:38:57 +00:00
token_formatters.py Populate application credential data in token 2018-02-19 22:41:12 +01:00