Public bug reported: What's the reason of disabling ability of using custom identity drivers in domain configs? The feature was removed in Pike release. As I understand, the only way to use them is copy source code to keystone.identity namespace. Could you suggest any other ways or workarounds for using custom specific code for identity drivers? Example case - handle LDAP errors like password expiration in case of using ppolicy features in OpenLDAP (like password expire warning, login attempts warning, etc.)
** Affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1803345 Title: unable to load custom identity domain drivers Status in OpenStack Identity (keystone): New Bug description: What's the reason of disabling ability of using custom identity drivers in domain configs? The feature was removed in Pike release. As I understand, the only way to use them is copy source code to keystone.identity namespace. Could you suggest any other ways or workarounds for using custom specific code for identity drivers? Example case - handle LDAP errors like password expiration in case of using ppolicy features in OpenLDAP (like password expire warning, login attempts warning, etc.) To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1803345/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp