 5939541bc7
			
		
	
	5939541bc7
	
	
	
		
			
			User can optionally turn off keyring by specifying the --no-cache option. It can also be disabled with environment variable OS-NO-CACHE. Change-Id: I8935260bf7fd6befa14798da9b4d02c81e65c417
		
			
				
	
	
		
			481 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			481 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # Copyright 2010 Jacob Kaplan-Moss
 | |
| # Copyright 2011 OpenStack LLC.
 | |
| # All Rights Reserved.
 | |
| #
 | |
| #    Licensed under the Apache License, Version 2.0 (the "License"); you may
 | |
| #    not use this file except in compliance with the License. You may obtain
 | |
| #    a copy of the License at
 | |
| #
 | |
| #         http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| #    Unless required by applicable law or agreed to in writing, software
 | |
| #    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | |
| #    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | |
| #    License for the specific language governing permissions and limitations
 | |
| #    under the License.
 | |
| 
 | |
| """
 | |
| Command-line interface to the OpenStack Identity API.
 | |
| """
 | |
| 
 | |
| import argparse
 | |
| import getpass
 | |
| import httplib2
 | |
| import os
 | |
| import sys
 | |
| 
 | |
| import keystoneclient
 | |
| 
 | |
| from keystoneclient import access
 | |
| from keystoneclient import exceptions as exc
 | |
| from keystoneclient import utils
 | |
| from keystoneclient.v2_0 import shell as shell_v2_0
 | |
| from keystoneclient.generic import shell as shell_generic
 | |
| from keystoneclient.contrib.bootstrap import shell as shell_bootstrap
 | |
| 
 | |
| 
 | |
| def env(*vars, **kwargs):
 | |
|     """Search for the first defined of possibly many env vars
 | |
| 
 | |
|     Returns the first environment variable defined in vars, or
 | |
|     returns the default defined in kwargs.
 | |
| 
 | |
|     """
 | |
|     for v in vars:
 | |
|         value = os.environ.get(v, None)
 | |
|         if value:
 | |
|             return value
 | |
|     return kwargs.get('default', '')
 | |
| 
 | |
| 
 | |
| class OpenStackIdentityShell(object):
 | |
| 
 | |
|     def get_base_parser(self):
 | |
|         parser = argparse.ArgumentParser(
 | |
|             prog='keystone',
 | |
|             description=__doc__.strip(),
 | |
|             epilog='See "keystone help COMMAND" '
 | |
|                    'for help on a specific command.',
 | |
|             add_help=False,
 | |
|             formatter_class=OpenStackHelpFormatter,
 | |
|         )
 | |
| 
 | |
|         # Global arguments
 | |
|         parser.add_argument('-h',
 | |
|                             '--help',
 | |
|                             action='store_true',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--version',
 | |
|                             action='version',
 | |
|                             version=keystoneclient.__version__)
 | |
| 
 | |
|         parser.add_argument('--debug',
 | |
|                             default=False,
 | |
|                             action='store_true',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-username',
 | |
|                             metavar='<auth-user-name>',
 | |
|                             default=env('OS_USERNAME'),
 | |
|                             help='Name used for authentication with the '
 | |
|                                  'OpenStack Identity service. '
 | |
|                                  'Defaults to env[OS_USERNAME]')
 | |
|         parser.add_argument('--os_username',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-password',
 | |
|                             metavar='<auth-password>',
 | |
|                             default=env('OS_PASSWORD'),
 | |
|                             help='Password used for authentication with the '
 | |
|                                  'OpenStack Identity service. '
 | |
|                                  'Defaults to env[OS_PASSWORD]')
 | |
|         parser.add_argument('--os_password',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-tenant-name',
 | |
|                             metavar='<auth-tenant-name>',
 | |
|                             default=env('OS_TENANT_NAME'),
 | |
|                             help='Tenant to request authorization on. '
 | |
|                                  'Defaults to env[OS_TENANT_NAME]')
 | |
|         parser.add_argument('--os_tenant_name',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-tenant-id',
 | |
|                             metavar='<tenant-id>',
 | |
|                             default=env('OS_TENANT_ID'),
 | |
|                             help='Tenant to request authorization on. '
 | |
|                                  'Defaults to env[OS_TENANT_ID]')
 | |
|         parser.add_argument('--os_tenant_id',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-auth-url',
 | |
|                             metavar='<auth-url>',
 | |
|                             default=env('OS_AUTH_URL'),
 | |
|                             help='Specify the Identity endpoint to use for '
 | |
|                                  'authentication. '
 | |
|                                  'Defaults to env[OS_AUTH_URL]')
 | |
|         parser.add_argument('--os_auth_url',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-region-name',
 | |
|                             metavar='<region-name>',
 | |
|                             default=env('OS_REGION_NAME'),
 | |
|                             help='Defaults to env[OS_REGION_NAME]')
 | |
|         parser.add_argument('--os_region_name',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-identity-api-version',
 | |
|                             metavar='<identity-api-version>',
 | |
|                             default=env('OS_IDENTITY_API_VERSION',
 | |
|                                         'KEYSTONE_VERSION'),
 | |
|                             help='Defaults to env[OS_IDENTITY_API_VERSION]'
 | |
|                                  ' or 2.0')
 | |
|         parser.add_argument('--os_identity_api_version',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-token',
 | |
|                             metavar='<service-token>',
 | |
|                             default=env('OS_SERVICE_TOKEN'),
 | |
|                             help='Specify an existing token to use instead of '
 | |
|                                  'retrieving one via authentication (e.g. '
 | |
|                                  'with username & password). '
 | |
|                                  'Defaults to env[OS_SERVICE_TOKEN]')
 | |
| 
 | |
|         parser.add_argument('--os-endpoint',
 | |
|                             metavar='<service-endpoint>',
 | |
|                             default=env('OS_SERVICE_ENDPOINT'),
 | |
|                             help='Specify an endpoint to use instead of '
 | |
|                                  'retrieving one from the service catalog '
 | |
|                                  '(via authentication). '
 | |
|                                  'Defaults to env[OS_SERVICE_ENDPOINT]')
 | |
| 
 | |
|         parser.add_argument('--os-cacert',
 | |
|                             metavar='<ca-certificate>',
 | |
|                             default=env('OS_CA_CERT', default=None),
 | |
|                             help='Defaults to env[OS_CACERT]')
 | |
|         parser.add_argument('--os_cacert',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-cert',
 | |
|                             metavar='<certificate>',
 | |
|                             default=env('OS_CERT'),
 | |
|                             help='Defaults to env[OS_CERT]')
 | |
|         parser.add_argument('--os_cert',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--os-key',
 | |
|                             metavar='<key>',
 | |
|                             default=env('OS_KEY'),
 | |
|                             help='Defaults to env[OS_KEY]')
 | |
|         parser.add_argument('--os_key',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--insecure',
 | |
|                             default=False,
 | |
|                             action="store_true",
 | |
|                             help='Explicitly allow keystoneclient to perform '
 | |
|                                  '"insecure" SSL (https) requests. The '
 | |
|                                  'server\'s certificate will not be verified '
 | |
|                                  'against any certificate authorities. This '
 | |
|                                  'option should be used with caution.')
 | |
| 
 | |
|         parser.add_argument('--no-cache',
 | |
|                             default=env('OS_NO_CACHE',
 | |
|                                         default=False),
 | |
|                             action='store_true',
 | |
|                             help='Don\'t use the auth token cache. '
 | |
|                                  'Default to env[OS_NO_CACHE]')
 | |
|         parser.add_argument('--no_cache',
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         parser.add_argument('--force-new-token',
 | |
|                             default=False,
 | |
|                             action="store_true",
 | |
|                             dest='force_new_token',
 | |
|                             help="If keyring is available and in used, "
 | |
|                                  "token will always be stored and fetched "
 | |
|                                  "from the keyring, until the token has "
 | |
|                                  "expired. Use this option to request a "
 | |
|                                  "new token and replace the existing one "
 | |
|                                  "in keyring.")
 | |
| 
 | |
|         parser.add_argument('--stale-duration',
 | |
|                             metavar='<seconds>',
 | |
|                             default=access.STALE_TOKEN_DURATION,
 | |
|                             dest='stale_duration',
 | |
|                             help="Stale duration (in seconds) used to "
 | |
|                                  "determine whether a token has expired "
 | |
|                                  "when retrieving it from keyring. This "
 | |
|                                  "is useful in mitigating process or "
 | |
|                                  "network delays. Default is %s seconds." % (
 | |
|                             access.STALE_TOKEN_DURATION))
 | |
| 
 | |
|         #FIXME(heckj):
 | |
|         # deprecated command line options for essex compatibility. To be
 | |
|         # removed in Grizzly release cycle.
 | |
|         parser.add_argument('--token',
 | |
|                             metavar='<service-token>',
 | |
|                             dest='os_token',
 | |
|                             default=env('SERVICE_TOKEN'),
 | |
|                             help=argparse.SUPPRESS)
 | |
|         parser.add_argument('--endpoint',
 | |
|                             dest='os_endpoint',
 | |
|                             metavar='<service-endpoint>',
 | |
|                             default=env('SERVICE_ENDPOINT'),
 | |
|                             help=argparse.SUPPRESS)
 | |
| 
 | |
|         return parser
 | |
| 
 | |
|     def get_subcommand_parser(self, version):
 | |
|         parser = self.get_base_parser()
 | |
| 
 | |
|         self.subcommands = {}
 | |
|         subparsers = parser.add_subparsers(metavar='<subcommand>')
 | |
| 
 | |
|         try:
 | |
|             actions_module = {
 | |
|                 '2.0': shell_v2_0,
 | |
|             }[version]
 | |
|         except KeyError:
 | |
|             actions_module = shell_v2_0
 | |
| 
 | |
|         self._find_actions(subparsers, actions_module)
 | |
|         self._find_actions(subparsers, shell_generic)
 | |
|         self._find_actions(subparsers, shell_bootstrap)
 | |
|         self._find_actions(subparsers, self)
 | |
|         self._add_bash_completion_subparser(subparsers)
 | |
| 
 | |
|         return parser
 | |
| 
 | |
|     def _add_bash_completion_subparser(self, subparsers):
 | |
|         subparser = subparsers.add_parser(
 | |
|             'bash_completion',
 | |
|             add_help=False,
 | |
|             formatter_class=OpenStackHelpFormatter
 | |
|         )
 | |
|         self.subcommands['bash_completion'] = subparser
 | |
|         subparser.set_defaults(func=self.do_bash_completion)
 | |
| 
 | |
|     def _find_actions(self, subparsers, actions_module):
 | |
|         for attr in (a for a in dir(actions_module) if a.startswith('do_')):
 | |
|             # I prefer to be hypen-separated instead of underscores.
 | |
|             command = attr[3:].replace('_', '-')
 | |
|             callback = getattr(actions_module, attr)
 | |
|             desc = callback.__doc__ or ''
 | |
|             help = desc.strip().split('\n')[0]
 | |
|             arguments = getattr(callback, 'arguments', [])
 | |
| 
 | |
|             subparser = subparsers.add_parser(
 | |
|                 command,
 | |
|                 help=help,
 | |
|                 description=desc,
 | |
|                 add_help=False,
 | |
|                 formatter_class=OpenStackHelpFormatter)
 | |
|             subparser.add_argument('-h', '--help', action='help',
 | |
|                                    help=argparse.SUPPRESS)
 | |
|             self.subcommands[command] = subparser
 | |
|             for (args, kwargs) in arguments:
 | |
|                 subparser.add_argument(*args, **kwargs)
 | |
|             subparser.set_defaults(func=callback)
 | |
| 
 | |
|     def main(self, argv):
 | |
|         # Parse args once to find version
 | |
|         parser = self.get_base_parser()
 | |
|         (options, args) = parser.parse_known_args(argv)
 | |
| 
 | |
|         # build available subcommands based on version
 | |
|         api_version = options.os_identity_api_version
 | |
|         subcommand_parser = self.get_subcommand_parser(api_version)
 | |
|         self.parser = subcommand_parser
 | |
| 
 | |
|         # Handle top-level --help/-h before attempting to parse
 | |
|         # a command off the command line
 | |
|         if not argv or options.help:
 | |
|             self.do_help(options)
 | |
|             return 0
 | |
| 
 | |
|         # Parse args again and call whatever callback was selected
 | |
|         args = subcommand_parser.parse_args(argv)
 | |
| 
 | |
|         # Deal with global arguments
 | |
|         if args.debug:
 | |
|             httplib2.debuglevel = 1
 | |
| 
 | |
|         # Short-circuit and deal with help command right away.
 | |
|         if args.func == self.do_help:
 | |
|             self.do_help(args)
 | |
|             return 0
 | |
|         elif args.func == self.do_bash_completion:
 | |
|             self.do_bash_completion(args)
 | |
|             return 0
 | |
| 
 | |
|         # TODO(heckj): supporting backwards compatibility with environment
 | |
|         # variables. To be removed after DEVSTACK is updated, ideally in
 | |
|         # the Grizzly release cycle.
 | |
|         args.os_token = args.os_token or env('SERVICE_TOKEN')
 | |
|         args.os_endpoint = args.os_endpoint or env('SERVICE_ENDPOINT')
 | |
| 
 | |
|         if not utils.isunauthenticated(args.func):
 | |
|             # if the user hasn't provided any auth data
 | |
|             if not (args.os_token or args.os_endpoint or args.os_username or
 | |
|                     args.os_password or args.os_auth_url):
 | |
|                 raise exc.CommandError('Expecting authentication method via'
 | |
|                                        '\n  either a service token, '
 | |
|                                        '--os-token or env[OS_SERVICE_TOKEN], '
 | |
|                                        '\n  or credentials, '
 | |
|                                        '--os-username or env[OS_USERNAME].')
 | |
| 
 | |
|             # user supplied a token and endpoint and at least one other cred
 | |
|             if (args.os_token and args.os_endpoint) and (args.os_username or
 | |
|                                                          args.os_tenant_id or
 | |
|                                                          args.os_tenant_name or
 | |
|                                                          args.os_password or
 | |
|                                                          args.os_auth_url):
 | |
|                 msg = ('WARNING: Bypassing authentication using a token & '
 | |
|                        'endpoint (authentication credentials are being '
 | |
|                        'ignored).')
 | |
|                 print msg
 | |
| 
 | |
|             # if it looks like the user wants to provide a credentials
 | |
|             # but is missing something
 | |
|             if (not (args.os_token and args.os_endpoint)
 | |
|                 and ((args.os_username or args.os_password or args.os_auth_url)
 | |
|                 and not (args.os_username and args.os_password and
 | |
|                          args.os_auth_url))):
 | |
|                 if not args.os_username:
 | |
|                     raise exc.CommandError(
 | |
|                         'Expecting a username provided via either '
 | |
|                         '--os-username or env[OS_USERNAME]')
 | |
| 
 | |
|                 if not args.os_auth_url:
 | |
|                     raise exc.CommandError(
 | |
|                         'Expecting an auth URL via either --os-auth-url or '
 | |
|                         'env[OS_AUTH_URL]')
 | |
| 
 | |
|                 if not args.os_password:
 | |
|                     # No password, If we've got a tty, try prompting for it
 | |
|                     if hasattr(sys.stdin, 'isatty') and sys.stdin.isatty():
 | |
|                         # Check for Ctl-D
 | |
|                         try:
 | |
|                             args.os_password = getpass.getpass('OS Password: ')
 | |
|                         except EOFError:
 | |
|                             pass
 | |
|                     # No password because we did't have a tty or the
 | |
|                     # user Ctl-D when prompted?
 | |
|                     if not args.os_password:
 | |
|                         raise exc.CommandError(
 | |
|                             'Expecting a password provided via either '
 | |
|                             '--os-password, env[OS_PASSWORD], or '
 | |
|                             'prompted response')
 | |
| 
 | |
|             # if it looks like the user wants to provide a service token
 | |
|             # but is missing something
 | |
|             if args.os_token or args.os_endpoint and not (
 | |
|                     args.os_token and args.os_endpoint):
 | |
|                 if not args.os_token:
 | |
|                     raise exc.CommandError(
 | |
|                         'Expecting a token provided via either --os-token or '
 | |
|                         'env[OS_SERVICE_TOKEN]')
 | |
| 
 | |
|                 if not args.os_endpoint:
 | |
|                     raise exc.CommandError(
 | |
|                         'Expecting an endpoint provided via either '
 | |
|                         '--os-endpoint or env[OS_SERVICE_ENDPOINT]')
 | |
| 
 | |
|         if utils.isunauthenticated(args.func):
 | |
|             self.cs = shell_generic.CLIENT_CLASS(endpoint=args.os_auth_url,
 | |
|                                                  cacert=args.os_cacert,
 | |
|                                                  key=args.os_key,
 | |
|                                                  cert=args.os_cert,
 | |
|                                                  insecure=args.insecure,
 | |
|                                                  debug=args.debug)
 | |
|         else:
 | |
|             token = None
 | |
|             if args.os_token and args.os_endpoint:
 | |
|                 token = args.os_token
 | |
|             api_version = options.os_identity_api_version
 | |
|             self.cs = self.get_api_class(api_version)(
 | |
|                 username=args.os_username,
 | |
|                 tenant_name=args.os_tenant_name,
 | |
|                 tenant_id=args.os_tenant_id,
 | |
|                 token=token,
 | |
|                 endpoint=args.os_endpoint,
 | |
|                 password=args.os_password,
 | |
|                 auth_url=args.os_auth_url,
 | |
|                 region_name=args.os_region_name,
 | |
|                 cacert=args.os_cacert,
 | |
|                 key=args.os_key,
 | |
|                 cert=args.os_cert,
 | |
|                 insecure=args.insecure,
 | |
|                 debug=args.debug,
 | |
|                 use_keyring=(not args.no_cache),
 | |
|                 force_new_token=args.force_new_token,
 | |
|                 stale_duration=args.stale_duration)
 | |
| 
 | |
|         try:
 | |
|             args.func(self.cs, args)
 | |
|         except exc.Unauthorized:
 | |
|             raise exc.CommandError("Invalid OpenStack Identity credentials.")
 | |
|         except exc.AuthorizationFailure:
 | |
|             raise exc.CommandError("Unable to authorize user")
 | |
| 
 | |
|     def get_api_class(self, version):
 | |
|         try:
 | |
|             return {
 | |
|                 "2.0": shell_v2_0.CLIENT_CLASS,
 | |
|             }[version]
 | |
|         except KeyError:
 | |
|             return shell_v2_0.CLIENT_CLASS
 | |
| 
 | |
|     def do_bash_completion(self, args):
 | |
|         """
 | |
|         Prints all of the commands and options to stdout.
 | |
|         The keystone.bash_completion script doesn't have to hard code them.
 | |
|         """
 | |
|         commands = set()
 | |
|         options = set()
 | |
|         for sc_str, sc in self.subcommands.items():
 | |
|             commands.add(sc_str)
 | |
|             for option in sc._optionals._option_string_actions.keys():
 | |
|                 options.add(option)
 | |
| 
 | |
|         commands.remove('bash-completion')
 | |
|         commands.remove('bash_completion')
 | |
|         print ' '.join(commands | options)
 | |
| 
 | |
|     @utils.arg('command', metavar='<subcommand>', nargs='?',
 | |
|                help='Display help for <subcommand>')
 | |
|     def do_help(self, args):
 | |
|         """
 | |
|         Display help about this program or one of its subcommands.
 | |
|         """
 | |
|         if getattr(args, 'command', None):
 | |
|             if args.command in self.subcommands:
 | |
|                 self.subcommands[args.command].print_help()
 | |
|             else:
 | |
|                 raise exc.CommandError("'%s' is not a valid subcommand" %
 | |
|                                        args.command)
 | |
|         else:
 | |
|             self.parser.print_help()
 | |
| 
 | |
| 
 | |
| # I'm picky about my shell help.
 | |
| class OpenStackHelpFormatter(argparse.HelpFormatter):
 | |
|     def start_section(self, heading):
 | |
|         # Title-case the headings
 | |
|         heading = '%s%s' % (heading[0].upper(), heading[1:])
 | |
|         super(OpenStackHelpFormatter, self).start_section(heading)
 | |
| 
 | |
| 
 | |
| def main():
 | |
|     try:
 | |
|         OpenStackIdentityShell().main(sys.argv[1:])
 | |
| 
 | |
|     except Exception as e:
 | |
|         if httplib2.debuglevel == 1:
 | |
|             raise  # dump stack.
 | |
|         else:
 | |
|             print >> sys.stderr, e
 | |
|         sys.exit(1)
 |