<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/openstack/python-keystoneclient.git/setup.cfg, branch juno-eol</title>
<subtitle>opendev.org: openstack/python-keystoneclient.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/'/>
<entry>
<title>SAML2 federated authentication for ADFS.</title>
<updated>2014-09-17T17:52:47+00:00</updated>
<author>
<name>Marek Denis</name>
<email>marek.denis@cern.ch</email>
</author>
<published>2014-08-04T16:31:25+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=cbe8c0a178fd589a06657846157518b3ac70aada'/>
<id>cbe8c0a178fd589a06657846157518b3ac70aada</id>
<content type='text'>
Authentication workflow for the Active Directory Federated Services
(ADFS) by Microsoft is different from 'standard' ECP based one.
This plugin allows for authentication and fetching security token with SAML2
assertion inside, sending to the Service Provide and retrieving an
unscoped token.

Change-Id: I588de1967a7fb92c5928686d092895847553923a
Implements: blueprint add-saml2-cli-authentication
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Authentication workflow for the Active Directory Federated Services
(ADFS) by Microsoft is different from 'standard' ECP based one.
This plugin allows for authentication and fetching security token with SAML2
assertion inside, sending to the Service Provide and retrieving an
unscoped token.

Change-Id: I588de1967a7fb92c5928686d092895847553923a
Implements: blueprint add-saml2-cli-authentication
</pre>
</div>
</content>
</entry>
<entry>
<title>Version independent plugins</title>
<updated>2014-09-03T11:34:10+00:00</updated>
<author>
<name>Jamie Lennox</name>
<email>jamielennox@redhat.com</email>
</author>
<published>2014-03-18T02:37:46+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=d070347988e1fbc9f84439f1b63cb4d52a9bfcda'/>
<id>d070347988e1fbc9f84439f1b63cb4d52a9bfcda</id>
<content type='text'>
A Framework for creating plugins that work across identity versions.
Upon creating a generic plugin the plugin will go and discover what
versions are available on the server and then attemp to construct a
suitable plugin.

Blueprint: version-independant-plugins
Change-Id: If7fed94aaf4636e80a9c3a834cf6c5430f20e489
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A Framework for creating plugins that work across identity versions.
Upon creating a generic plugin the plugin will go and discover what
versions are available on the server and then attemp to construct a
suitable plugin.

Blueprint: version-independant-plugins
Change-Id: If7fed94aaf4636e80a9c3a834cf6c5430f20e489
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "Remove cruft from setup.cfg"</title>
<updated>2014-08-21T05:46:09+00:00</updated>
<author>
<name>Jenkins</name>
<email>jenkins@review.openstack.org</email>
</author>
<published>2014-08-21T05:46:09+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=5a0913383ee71fc368c1328601965a00982e5348'/>
<id>5a0913383ee71fc368c1328601965a00982e5348</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove cruft from setup.cfg</title>
<updated>2014-08-20T22:09:10+00:00</updated>
<author>
<name>Monty Taylor</name>
<email>mordred@inaugust.com</email>
</author>
<published>2014-08-16T00:13:24+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=ea9fab0a50c040ea2db49b64b4ebbc9ffa783a43'/>
<id>ea9fab0a50c040ea2db49b64b4ebbc9ffa783a43</id>
<content type='text'>
We haven't needed to register a setup_hook in about 6 months.

Change-Id: I446e9385e1545a0a4cdfb02d8d3bd4b498fa51cd
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We haven't needed to register a setup_hook in about 6 months.

Change-Id: I446e9385e1545a0a4cdfb02d8d3bd4b498fa51cd
</pre>
</div>
</content>
</entry>
<entry>
<title>Add v3scopedsaml entry to the setup.cfg.</title>
<updated>2014-08-20T19:09:26+00:00</updated>
<author>
<name>Marek Denis</name>
<email>marek.denis@cern.ch</email>
</author>
<published>2014-07-30T20:06:32+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=f92f49155ec47330766412dc90c8b887e7c863de'/>
<id>f92f49155ec47330766412dc90c8b887e7c863de</id>
<content type='text'>
Since Patch https://review.openstack.org/#/c/107231/ was abandoned and
entry ``v3unscopedsaml`` stays in the setup.cfg, there should
also some room for v3scopedsaml entry which lets users scope their
unscoped tokens.

Change-Id: Ie42206c323d287b905b4c5da9c790e544a8b8433</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since Patch https://review.openstack.org/#/c/107231/ was abandoned and
entry ``v3unscopedsaml`` stays in the setup.cfg, there should
also some room for v3scopedsaml entry which lets users scope their
unscoped tokens.

Change-Id: Ie42206c323d287b905b4c5da9c790e544a8b8433</pre>
</div>
</content>
</entry>
<entry>
<title>SAML2 ECP auth plugin</title>
<updated>2014-07-15T21:03:12+00:00</updated>
<author>
<name>Marek Denis</name>
<email>marek.denis@cern.ch</email>
</author>
<published>2014-05-05T16:41:59+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=75ebf09187680c4c8f07ffbcf35d95bd16892f53'/>
<id>75ebf09187680c4c8f07ffbcf35d95bd16892f53</id>
<content type='text'>
Auth plugin authenticating against remote SAML based Identity Providers.
Upon successful authentication the plugin retrieves and stores unscoped token.
Plugin object should be later used for scoping the token.

Currently only HTTP BasicAuth Method is supported as
an IdP authn method.

Will not work for ADFS, as that has extensions to the document formats
as well as a different workflow.

Change-Id: Ieea40505a406bedf7219fa6f9e6cf29a45ad6e88
Implements: blueprint add-saml2-cli-authentication
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Auth plugin authenticating against remote SAML based Identity Providers.
Upon successful authentication the plugin retrieves and stores unscoped token.
Plugin object should be later used for scoping the token.

Currently only HTTP BasicAuth Method is supported as
an IdP authn method.

Will not work for ADFS, as that has extensions to the document formats
as well as a different workflow.

Change-Id: Ieea40505a406bedf7219fa6f9e6cf29a45ad6e88
Implements: blueprint add-saml2-cli-authentication
</pre>
</div>
</content>
</entry>
<entry>
<title>Plugin loading from config objects</title>
<updated>2014-07-07T04:15:10+00:00</updated>
<author>
<name>Jamie Lennox</name>
<email>jamielennox@redhat.com</email>
</author>
<published>2014-03-11T05:59:10+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=5c91ede44768ebbb2fff12f9a7c93e63b9bbd56d'/>
<id>5c91ede44768ebbb2fff12f9a7c93e63b9bbd56d</id>
<content type='text'>
Provide a pattern for auth plugins to load themselves from a config
object. The first user of this will be auth_token middleware however it
is not likely to be the only user.

By doing this in an exportable way we are defining a single config file
format for specifying how to load a plugin for all services. We also
provide a standard way of retrieving a plugins options for loading via
other mechanisms.

Blueprint: standard-client-params
Change-Id: I353b26a1ffc04a20666e76f5bd2f1e6d7c19a22d
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Provide a pattern for auth plugins to load themselves from a config
object. The first user of this will be auth_token middleware however it
is not likely to be the only user.

By doing this in an exportable way we are defining a single config file
format for specifying how to load a plugin for all services. We also
provide a standard way of retrieving a plugins options for loading via
other mechanisms.

Blueprint: standard-client-params
Change-Id: I353b26a1ffc04a20666e76f5bd2f1e6d7c19a22d
</pre>
</div>
</content>
</entry>
<entry>
<title>Doc build fails if warnings</title>
<updated>2014-06-19T00:12:39+00:00</updated>
<author>
<name>Brant Knudson</name>
<email>bknudson@us.ibm.com</email>
</author>
<published>2014-06-19T00:09:57+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=0a9a8476c70ef4f139c692e5a9b8eca6879fd1d2'/>
<id>0a9a8476c70ef4f139c692e5a9b8eca6879fd1d2</id>
<content type='text'>
If the docstrings are invalid then the commit should fail the gate.

Change-Id: Iabe506fa914ac5e742c0c5f4682ed0471c4a64ca
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the docstrings are invalid then the commit should fail the gate.

Change-Id: Iabe506fa914ac5e742c0c5f4682ed0471c4a64ca
</pre>
</div>
</content>
</entry>
<entry>
<title>Mark keystoneclient as being a universal wheel</title>
<updated>2014-05-17T20:48:34+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2014-05-17T20:48:28+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=e0dc22a665141ea61b877cbd8aaeb4b92877a690'/>
<id>e0dc22a665141ea61b877cbd8aaeb4b92877a690</id>
<content type='text'>
Change-Id: I216b422175dba6e1ca1623c21ff87f4d2fd0a486
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change-Id: I216b422175dba6e1ca1623c21ff87f4d2fd0a486
</pre>
</div>
</content>
</entry>
<entry>
<title>Add Python 3 classifiers.</title>
<updated>2014-02-19T00:47:24+00:00</updated>
<author>
<name>Cyril Roelandt</name>
<email>cyril.roelandt@enovance.com</email>
</author>
<published>2014-02-19T00:47:24+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/openstack/python-keystoneclient.git/commit/?id=aa6c99e8794bcfd7c2cfbcfac487e5ebab0da2dd'/>
<id>aa6c99e8794bcfd7c2cfbcfac487e5ebab0da2dd</id>
<content type='text'>
This makes sure people know that the client is Python 3 compatible when
browsing PyPI.

Change-Id: Ie97a4de49bafc2184831ca25bc70d8af3c29d34f
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This makes sure people know that the client is Python 3 compatible when
browsing PyPI.

Change-Id: Ie97a4de49bafc2184831ca25bc70d8af3c29d34f
</pre>
</div>
</content>
</entry>
</feed>
