keystonemiddleware/keystonemiddleware/auth_token
Jamie Lennox 5ba3d06b20 Don't cache signed tokens
Currently the cache is always checked and a result is always cached even
if it is for a PKI token. In the case of PKI token though we don't have
to do an online lookup, we just decoded the data we've been given.

There is a CPU vs IO bound tradeoff as to whether you take decrypt the
token or wait for memcache to return however I do not see any point in
storing the result of a signing operation.

This will also make it much easier to support similar signing
validations on the keystone server side because we are not bound by the
same cache constraints.

Change-Id: Ibb45b14954ef8a26dcc0e3b5dfa7c047dd8edfe1
2016-01-12 05:35:03 +00:00
..
__init__.py Don't cache signed tokens 2016-01-12 05:35:03 +00:00
_auth.py Use oslo_config choices support 2016-01-06 13:42:29 -08:00
_base.py Break default auth plugin into file 2015-02-26 10:01:15 +11:00
_cache.py Disable memory caching of tokens 2016-01-12 05:34:39 +00:00
_exceptions.py Separate exceptions into their own file 2015-02-23 14:20:29 +11:00
_identity.py Use keystoneauth 2015-11-23 12:03:00 +11:00
_memcache_crypt.py Address hacking check H405. 2015-11-16 22:34:32 +00:00
_memcache_pool.py Handle memcache pool arguments collectively 2015-09-01 13:45:31 +10:00
_request.py Use keystoneauth 2015-11-23 12:03:00 +11:00
_revocations.py auth_token verify revocation by audit_id 2015-12-17 10:55:58 -06:00
_signing_dir.py Extract SigningDirectory into file 2015-02-23 14:20:40 +11:00
_user_plugin.py Merge "Use keystoneauth" 2015-12-01 19:04:42 +00:00