 b98aee57c1
			
		
	
	b98aee57c1
	
	
	
		
			
			Fix a bug for "service show" subcommand cannot cache NoUniqueMatch Exception Change-Id: I393c5417de0fef424618b08119ddbc8fea27e114 Closes-Bug: #1524305
		
			
				
	
	
		
			168 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			168 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| #   Copyright 2012-2013 OpenStack Foundation
 | |
| #
 | |
| #   Licensed under the Apache License, Version 2.0 (the "License"); you may
 | |
| #   not use this file except in compliance with the License. You may obtain
 | |
| #   a copy of the License at
 | |
| #
 | |
| #        http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| #   Unless required by applicable law or agreed to in writing, software
 | |
| #   distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | |
| #   WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | |
| #   License for the specific language governing permissions and limitations
 | |
| #   under the License.
 | |
| #
 | |
| 
 | |
| """Common identity code"""
 | |
| 
 | |
| from keystoneclient import exceptions as identity_exc
 | |
| from keystoneclient.v3 import domains
 | |
| from keystoneclient.v3 import groups
 | |
| from keystoneclient.v3 import projects
 | |
| from keystoneclient.v3 import users
 | |
| 
 | |
| from openstackclient.common import exceptions
 | |
| from openstackclient.common import utils
 | |
| 
 | |
| 
 | |
| def find_service(identity_client, name_type_or_id):
 | |
|     """Find a service by id, name or type."""
 | |
| 
 | |
|     try:
 | |
|         # search for the usual ID or name
 | |
|         return utils.find_resource(identity_client.services, name_type_or_id)
 | |
|     except exceptions.CommandError:
 | |
|         try:
 | |
|             # search for service type
 | |
|             return identity_client.services.find(type=name_type_or_id)
 | |
|         # FIXME(dtroyer): This exception should eventually come from
 | |
|         #                 common client exceptions
 | |
|         except identity_exc.NotFound:
 | |
|             msg = ("No service with a type, name or ID of '%s' exists."
 | |
|                    % name_type_or_id)
 | |
|             raise exceptions.CommandError(msg)
 | |
|         except identity_exc.NoUniqueMatch:
 | |
|             msg = ("Multiple service matches found for '%s', "
 | |
|                    "use an ID to be more specific."
 | |
|                    % name_type_or_id)
 | |
|             raise exceptions.CommandError(msg)
 | |
| 
 | |
| 
 | |
| def _get_domain_id_if_requested(identity_client, domain_name_or_id):
 | |
|     if not domain_name_or_id:
 | |
|         return None
 | |
|     domain = find_domain(identity_client, domain_name_or_id)
 | |
|     return domain.id
 | |
| 
 | |
| 
 | |
| def find_domain(identity_client, name_or_id):
 | |
|     return _find_identity_resource(identity_client.domains, name_or_id,
 | |
|                                    domains.Domain)
 | |
| 
 | |
| 
 | |
| def find_group(identity_client, name_or_id, domain_name_or_id=None):
 | |
|     domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id)
 | |
|     if not domain_id:
 | |
|         return _find_identity_resource(identity_client.groups, name_or_id,
 | |
|                                        groups.Group)
 | |
|     else:
 | |
|         return _find_identity_resource(identity_client.groups, name_or_id,
 | |
|                                        groups.Group, domain_id=domain_id)
 | |
| 
 | |
| 
 | |
| def find_project(identity_client, name_or_id, domain_name_or_id=None):
 | |
|     domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id)
 | |
|     if not domain_id:
 | |
|         return _find_identity_resource(identity_client.projects, name_or_id,
 | |
|                                        projects.Project)
 | |
|     else:
 | |
|         return _find_identity_resource(identity_client.projects, name_or_id,
 | |
|                                        projects.Project, domain_id=domain_id)
 | |
| 
 | |
| 
 | |
| def find_user(identity_client, name_or_id, domain_name_or_id=None):
 | |
|     domain_id = _get_domain_id_if_requested(identity_client, domain_name_or_id)
 | |
|     if not domain_id:
 | |
|         return _find_identity_resource(identity_client.users, name_or_id,
 | |
|                                        users.User)
 | |
|     else:
 | |
|         return _find_identity_resource(identity_client.users, name_or_id,
 | |
|                                        users.User, domain_id=domain_id)
 | |
| 
 | |
| 
 | |
| def _find_identity_resource(identity_client_manager, name_or_id,
 | |
|                             resource_type, **kwargs):
 | |
|     """Find a specific identity resource.
 | |
| 
 | |
|     Using keystoneclient's manager, attempt to find a specific resource by its
 | |
|     name or ID. If Forbidden to find the resource (a common case if the user
 | |
|     does not have permission), then return the resource by creating a local
 | |
|     instance of keystoneclient's Resource.
 | |
| 
 | |
|     The parameter identity_client_manager is a keystoneclient manager,
 | |
|     for example: keystoneclient.v3.users or keystoneclient.v3.projects.
 | |
| 
 | |
|     The parameter resource_type is a keystoneclient resource, for example:
 | |
|     keystoneclient.v3.users.User or keystoneclient.v3.projects.Project.
 | |
| 
 | |
|     :param identity_client_manager: the manager that contains the resource
 | |
|     :type identity_client_manager: `keystoneclient.base.CrudManager`
 | |
|     :param name_or_id: the resources's name or ID
 | |
|     :type name_or_id: string
 | |
|     :param resource_type: class that represents the resource type
 | |
|     :type resource_type: `keystoneclient.base.Resource`
 | |
| 
 | |
|     :returns: the resource in question
 | |
|     :rtype: `keystoneclient.base.Resource`
 | |
| 
 | |
|     """
 | |
| 
 | |
|     try:
 | |
|         identity_resource = utils.find_resource(identity_client_manager,
 | |
|                                                 name_or_id, **kwargs)
 | |
|         if identity_resource is not None:
 | |
|             return identity_resource
 | |
|     except identity_exc.Forbidden:
 | |
|         pass
 | |
| 
 | |
|     return resource_type(None, {'id': name_or_id, 'name': name_or_id})
 | |
| 
 | |
| 
 | |
| def add_user_domain_option_to_parser(parser):
 | |
|     parser.add_argument(
 | |
|         '--user-domain',
 | |
|         metavar='<user-domain>',
 | |
|         help=('Domain the user belongs to (name or ID). '
 | |
|               'This can be used in case collisions between user names '
 | |
|               'exist.')
 | |
|     )
 | |
| 
 | |
| 
 | |
| def add_group_domain_option_to_parser(parser):
 | |
|     parser.add_argument(
 | |
|         '--group-domain',
 | |
|         metavar='<group-domain>',
 | |
|         help=('Domain the group belongs to (name or ID). '
 | |
|               'This can be used in case collisions between group names '
 | |
|               'exist.')
 | |
|     )
 | |
| 
 | |
| 
 | |
| def add_project_domain_option_to_parser(parser):
 | |
|     parser.add_argument(
 | |
|         '--project-domain',
 | |
|         metavar='<project-domain>',
 | |
|         help=('Domain the project belongs to (name or ID). '
 | |
|               'This can be used in case collisions between project names '
 | |
|               'exist.')
 | |
|     )
 | |
| 
 | |
| 
 | |
| def add_inherited_option_to_parser(parser):
 | |
|     parser.add_argument(
 | |
|         '--inherited',
 | |
|         action='store_true',
 | |
|         default=False,
 | |
|         help=('Specifies if the role grant is inheritable to the sub projects')
 | |
|     )
 |