Why Gemfury? Push, build, and install  RubyGems npm packages Python packages Maven artifacts PHP packages Go Modules Debian packages RPM packages NuGet packages

Repository URL to install this package:

Details    
Size: Mime:
ó
µEYc@s±ddlZddlZddlmZddlmZddlmZddlmZdZd„Z	dej
fd
„ƒYZd„Zd„Z
d„Zd„Zd„ZdS(iÿÿÿÿN(t
positional(t_utils(tbase(tsessiontregister_argparse_argumentstload_from_argparse_argumentstregister_conf_optionstload_from_conf_optionstget_conf_optionscCsy|dkrdSyt|ƒ}Wn*tk
rLd|}tj|ƒ‚nX|dkrud|}tj|ƒ‚n|S(Ns%s must be a floatis%s must be greater than 0(tNonetfloatt
ValueErrortargparsetArgumentTypeError(targument_valuetvaluetmsg((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyt_positive_non_zero_floats


tSessioncBsweZed„ƒZd„Zedƒed	d	d	d	d„ƒZd„Z	d„Z
d	d„Zd	d„Zd„Z
RS(
cCstjS(N(RR(tself((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pytplugin_class.scCsgS(N((R((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pytget_options2sicKsg|dkr*|rt}q*|p$t}n|rE|rE||f}ntt|ƒjd|d||S(s
Create a session with individual certificate parameters.

        Some parameters used to create a session don't lend themselves to be
        loaded from config/CLI etc. Create a session by converting those
        parameters into session __init__ parameters.
        tverifytcertN(R	tFalsetTruetsuperRtload_from_options(RtinsecureRtcacertRtkeytkwargs((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyR5s	c
CsÛ|jddƒ}|jddtddddƒ|jd	d
ddtjjdƒdd
ƒ|jdd
ddtjjdƒddƒ|jdd
ddtjjdƒddƒ|jddddtd
dddƒdS(NsAPI Connection Optionss,Options controlling the HTTP API Connectionss
--insecuretdefaulttactiont
store_truethelps¿Explicitly allow client to perform "insecure" TLS (https) requests. The server's certificate will not be verified against any certificate authorities. This option should be used with caution.s--os-cacerttmetavars<ca-certificate>t	OS_CACERTsjSpecify a CA bundle file to use in verifying a TLS (https) server certificate. Defaults to env[OS_CACERT].s	--os-certs
<certificate>tOS_CERTsDefaults to env[OS_CERT].s--os-keys<key>tOS_KEYsDefaults to env[OS_KEY].s	--timeoutiXttypes	<seconds>s!Set request timeout (in seconds).(tadd_argument_grouptadd_argumentRtostenvirontgetR(Rtparsert
session_group((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRRs:	cKsl|jd|jƒ|jd|jƒ|jd|jƒ|jd|jƒ|jd|jƒ|j|S(NRRRRttimeout(t
setdefaultRt	os_cacerttos_certtos_keyR0R(Rt	namespaceR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyR|scCsÐtjƒ}|dkr!i}n|jdd|jdƒddƒ|jdd|jdƒddƒ|jdd|jdƒddƒ|jd	d
td|jd	ƒddƒ|jdd|jdƒdd
ƒgS(sƒGet oslo_config options that are needed for a :py:class:`.Session`.

        These may be useful without being registered for config file generation
        or to manipulate the options before registering them yourself.

        The options that are set are:
            :cafile: The certificate authority filename.
            :certfile: The client certificate file to present.
            :keyfile: The key for the client certificate.
            :insecure: Whether to ignore SSL verification.
            :timeout: The max time to wait for HTTP connections.

        :param dict deprecated_opts: Deprecated options that should be included
             in the definition of new options. This should be a dict from the
             name of the new option to a list of oslo.DeprecatedOpts that
             correspond to the new option. (optional)

             For example, to support the ``ca_file`` option pointing to the new
             ``cafile`` option name::

                 old_opt = oslo_cfg.DeprecatedOpt('ca_file', 'old_group')
                 deprecated_opts={'cafile': [old_opt]}

        :returns: A list of oslo_config options.
        tcafiletdeprecated_optsR#sJPEM encoded Certificate Authority to use when verifying HTTPs connections.tcertfiles(PEM encoded client certificate cert filetkeyfiles'PEM encoded client certificate key fileRR sVerify HTTPS connections.R0sTimeout value for http requestsN(Rtget_oslo_configR	tStrOptR-tBoolOptRtIntOpt(RR7tcfg((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyR…s&	cCsE|jd|ƒ}|jtjƒj|ƒƒ|j|d|ƒ|S(syRegister the oslo_config options that are needed for a session.

        The options that are set are:
            :cafile: The certificate authority filename.
            :certfile: The client certificate file to present.
            :keyfile: The key for the client certificate.
            :insecure: Whether to ignore SSL verification.
            :timeout: The max time to wait for HTTP connections.

        :param oslo_config.Cfg conf: config object to register with.
        :param string group: The ini group to register options in.
        :param dict deprecated_opts: Deprecated options that should be included
             in the definition of new options. This should be a dict from the
             name of the new option to a list of oslo.DeprecatedOpts that
             correspond to the new option. (optional)

             For example, to support the ``ca_file`` option pointing to the new
             ``cafile`` option name::

                 old_opt = oslo_cfg.DeprecatedOpt('ca_file', 'old_group')
                 deprecated_opts={'cafile': [old_opt]}

        :returns: The list of options that was registered.
        R7tgroup(Rtregister_groupRR:tOptGroupt
register_opts(RtconfR?R7topts((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyR·scKsv||}|jd|jƒ|jd|jƒ|jd|jƒ|jd|jƒ|jd|jƒ|j|S(sßCreate a session object from an oslo_config object.

        The options must have been previously registered with
        register_conf_options.

        :param oslo_config.Cfg conf: config object to register with.
        :param string group: The ini group to register options in.
        :param dict kwargs: Additional parameters to pass to session
                            construction.
        :returns: A new session object.
        :rtype: :py:class:`.Session`
        RRRRR0(R1RR6R8R9R0R(RRCR?Rtc((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRÕs
N(t__name__t
__module__tpropertyRRRRR	RRRRRR(((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyR,s			*		2cOstƒj||ŽS(N(RR(targsR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRíscOstƒj||ŽS(N(RR(RIR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRñscOstƒj||ŽS(N(RR(RIR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRõscOstƒj||ŽS(N(RR(RIR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRùscOstƒj||ŽS(N(RR(RIR((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyRýs(sregister_argparse_argumentssload_from_argparse_argumentssregister_conf_optionssload_from_conf_optionssget_conf_options(RR+Rtkeystoneauth1.loadingRRt
keystoneauth1Rt__all__Rt
BaseLoaderRRRRRR(((sR/home/tvault/.virtenv/lib/python2.7/site-packages/keystoneauth1/loading/session.pyt<module>
s"	Á