Swauth is retired
The swauth project is already retired[1]. The documentation is updated to reflect status of the project. Also, this change removes reference to this middleware in unit tests. [1] https://opendev.org/x/swauth/ Change-Id: I3d8e46d85ccd965f9b51006c330e391dcdc24a34
This commit is contained in:
parent
179fc43eb5
commit
5a272421d0
@ -59,7 +59,7 @@ Authentication
|
|||||||
|
|
||||||
* `Keystone <https://github.com/openstack/keystone>`_ - Official Identity
|
* `Keystone <https://github.com/openstack/keystone>`_ - Official Identity
|
||||||
Service for OpenStack.
|
Service for OpenStack.
|
||||||
* `Swauth <https://github.com/openstack/swauth>`_ - An alternative Swift
|
* `Swauth <https://opendev.org/x/swauth/>`_ - **RETIRED**: An alternative Swift
|
||||||
authentication service that only requires Swift itself.
|
authentication service that only requires Swift itself.
|
||||||
* `Basicauth <https://github.com/CloudVPS/swift-basicauth>`_ - HTTP Basic
|
* `Basicauth <https://github.com/CloudVPS/swift-basicauth>`_ - HTTP Basic
|
||||||
authentication support (keystone backed).
|
authentication support (keystone backed).
|
||||||
|
@ -373,8 +373,6 @@ Extending Auth
|
|||||||
|
|
||||||
TempAuth is written as wsgi middleware, so implementing your own auth is as
|
TempAuth is written as wsgi middleware, so implementing your own auth is as
|
||||||
easy as writing new wsgi middleware, and plugging it in to the proxy server.
|
easy as writing new wsgi middleware, and plugging it in to the proxy server.
|
||||||
The `Swauth <https://github.com/openstack/swauth>`_ project is an example of
|
|
||||||
an additional auth service.
|
|
||||||
|
|
||||||
See :doc:`development_auth` for detailed information on extending the
|
See :doc:`development_auth` for detailed information on extending the
|
||||||
auth system.
|
auth system.
|
||||||
|
@ -916,9 +916,6 @@ class TestS3ApiMiddleware(S3ApiTestCase):
|
|||||||
pipeline.return_value = 's3api s3token keystoneauth proxy-server'
|
pipeline.return_value = 's3api s3token keystoneauth proxy-server'
|
||||||
self.s3api.check_pipeline(self.conf)
|
self.s3api.check_pipeline(self.conf)
|
||||||
|
|
||||||
pipeline.return_value = 's3api swauth proxy-server'
|
|
||||||
self.s3api.check_pipeline(self.conf)
|
|
||||||
|
|
||||||
# Note that authtoken would need to have delay_auth_decision=True
|
# Note that authtoken would need to have delay_auth_decision=True
|
||||||
pipeline.return_value = 's3api authtoken s3token keystoneauth ' \
|
pipeline.return_value = 's3api authtoken s3token keystoneauth ' \
|
||||||
'proxy-server'
|
'proxy-server'
|
||||||
@ -952,9 +949,6 @@ class TestS3ApiMiddleware(S3ApiTestCase):
|
|||||||
'proxy-server'
|
'proxy-server'
|
||||||
self.s3api.check_pipeline(self.conf)
|
self.s3api.check_pipeline(self.conf)
|
||||||
|
|
||||||
pipeline.return_value = 's3api swauth proxy-server'
|
|
||||||
self.s3api.check_pipeline(self.conf)
|
|
||||||
|
|
||||||
pipeline.return_value = 's3api authtoken s3token keystoneauth ' \
|
pipeline.return_value = 's3api authtoken s3token keystoneauth ' \
|
||||||
'proxy-server'
|
'proxy-server'
|
||||||
self.s3api.check_pipeline(self.conf)
|
self.s3api.check_pipeline(self.conf)
|
||||||
|
Loading…
Reference in New Issue
Block a user