共計 1570 個字符,預計需要花費 4 分鐘才能閱讀完成。
這期內容當中丸趣 TV 小編將會給大家帶來有關如何進行 NoAuthMiddlewareBase 及 NoAuthMiddleware 解析,文章內容豐富且以專業的角度為大家分析和敘述,閱讀完這篇文章希望大家可以有所收獲。
NoAuthMiddlewareBase 解析
class NoAuthMiddlewareBase(base_wsgi.Middleware): 如果請求頭里沒有指定對應的請求令牌,則返回一個偽造的令牌. def base_call(self, req, project_id_in_path, always_admin=True):if X-Auth-Token not in req.headers:
user_id = req.headers.get(X-Auth-User , admin)# 設置默認的用戶 ID
project_id = req.headers.get(X-Auth-Project-Id , admin)# 設置默認的項目 IDif project_id_in_path:
os_url = / .join([req.url.rstrip( /), project_id])else:
os_url = req.url.rstrip(/)
res = webob.Response()# NOTE(vish): This is expecting and returning Auth(1.1), whereas # keystone uses 2.0 auth. We should probably allow # 2.0 auth here as well. res.headers[X-Auth-Token] = %s:%s % (user_id, project_id)# 偽造 token
res.headers[X-Server-Management-Url] = os_url # 設置 url
res.content_type = text/plain # 設置 content-type res.status = 204 return res
token = req.headers[X-Auth-Token]
user_id, _sep, project_id = token.partition(:)
project_id = project_id or user_id
remote_address = getattr(req, remote_address , 127.0.0.1)if CONF.api.use_forwarded_for:
remote_address = req.headers.get(X-Forwarded-For , remote_address)
is_admin = always_admin or (user_id == admin)
ctx = context.RequestContext(user_id,
project_id, is_admin=is_admin, remote_address=remote_address)# 封裝請求上下文
req.environ[nova.context] = ctxreturn self.application
NoAuthMiddleware 解析
class NoAuthMiddleware(NoAuthMiddlewareBase):
#繼承父類
@webob.dec.wsgify(Request >上述就是丸趣 TV 小編為大家分享的如何進行 NoAuthMiddlewareBase 及 NoAuthMiddleware 解析了,如果剛好有類似的疑惑,不妨參照上述分析進行理解。如果想知道更多相關知識,歡迎關注丸趣 TV 行業資訊頻道。
正文完