summaryrefslogtreecommitdiff
path: root/keystoneclient/contrib
diff options
context:
space:
mode:
authorMarek Denis <marek.denis@cern.ch>2014-07-23 12:09:43 +0200
committerMarek Denis <marek.denis@cern.ch>2014-07-23 12:09:43 +0200
commitbad4bf928d57806033d53bab1e7cc766b0d8eef0 (patch)
tree271115ad6a872fbf6db4eb56ab059d166ab15c81 /keystoneclient/contrib
parentc758a2fc506f6687fd6234ff6e662185a010d642 (diff)
downloadpython-keystoneclient-bad4bf928d57806033d53bab1e7cc766b0d8eef0.tar.gz
Enforce authenticated=False in saml2 plugin
All underlying HTTP calls executed via ``keystoneclient.session.Session`` object should have ``authenticated=False`` option enforced indicating the plugin is not authenticated with the Identity Service yet. Change-Id: I946f1ed6a55c4172d8f4bf6a24e5cbc3a00d1154
Diffstat (limited to 'keystoneclient/contrib')
-rw-r--r--keystoneclient/contrib/auth/v3/saml2.py6
1 files changed, 4 insertions, 2 deletions
diff --git a/keystoneclient/contrib/auth/v3/saml2.py b/keystoneclient/contrib/auth/v3/saml2.py
index 947c1e7..be2b482 100644
--- a/keystoneclient/contrib/auth/v3/saml2.py
+++ b/keystoneclient/contrib/auth/v3/saml2.py
@@ -137,7 +137,8 @@ class Saml2UnscopedToken(v3.AuthConstructor):
return response
location = response.headers['location']
- return session.request(location, method, **kwargs)
+ return session.request(location, method, authenticated=False,
+ **kwargs)
def _first(self, _list):
if len(_list) != 1:
@@ -244,7 +245,8 @@ class Saml2UnscopedToken(v3.AuthConstructor):
self.identity_provider_url,
headers={'Content-type': 'text/xml'},
data=etree.tostring(idp_saml2_authn_request),
- requests_auth=(self.username, self.password))
+ requests_auth=(self.username, self.password),
+ authenticated=False)
try:
self.saml2_idp_authn_response = etree.XML(idp_response.content)