Patchset fixes calculating EC2_URL/S3_URL for user rc files in 'accrc' directory. Currently calculation of these url's uses 'openstack endpoint show' command without specifying os-identity-v3 flag. But output is empty without such flag. So this patchset uses same construction as exists in functions-common. Change-Id: Ia4f2510750fa0f46e2f1d58cf0a7a16782f022b3
		
			
				
	
	
		
			317 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			317 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
#!/usr/bin/env bash
 | 
						|
 | 
						|
# **create_userrc.sh**
 | 
						|
 | 
						|
# Pre-create rc files and credentials for the default users.
 | 
						|
 | 
						|
# Warning: This script just for development purposes
 | 
						|
 | 
						|
set -o errexit
 | 
						|
set -o xtrace
 | 
						|
 | 
						|
ACCOUNT_DIR=./accrc
 | 
						|
 | 
						|
function display_help {
 | 
						|
cat <<EOF
 | 
						|
 | 
						|
usage: $0 <options..>
 | 
						|
 | 
						|
This script creates certificates and sourcable rc files per project/user.
 | 
						|
 | 
						|
Target account directory hierarchy:
 | 
						|
target_dir-|
 | 
						|
           |-cacert.pem
 | 
						|
           |-project1-name|
 | 
						|
           |              |- user1
 | 
						|
           |              |- user1-cert.pem
 | 
						|
           |              |- user1-pk.pem
 | 
						|
           |              |- user2
 | 
						|
           |              ..
 | 
						|
           |-project2-name..
 | 
						|
           ..
 | 
						|
 | 
						|
Optional Arguments
 | 
						|
-P include password to the rc files; with -A it assume all users password is the same
 | 
						|
-A try with all user
 | 
						|
-u <username> create files just for the specified user
 | 
						|
-C <project_name> create user and project, the specifid project will be the user's project
 | 
						|
-r <name> when combined with -C and the (-u) user exists it will be the user's project role in the (-C)project (default: Member)
 | 
						|
-p <userpass> password for the user
 | 
						|
--heat-url <heat_url>
 | 
						|
--os-username <username>
 | 
						|
--os-password <admin password>
 | 
						|
--os-project-name <project_name>
 | 
						|
--os-project-id <project_id>
 | 
						|
--os-user-domain-id <user_domain_id>
 | 
						|
--os-user-domain-name <user_domain_name>
 | 
						|
--os-project-domain-id <project_domain_id>
 | 
						|
--os-project-domain-name <project_domain_name>
 | 
						|
--os-auth-url <auth_url>
 | 
						|
--os-cacert <cert file>
 | 
						|
--target-dir <target_directory>
 | 
						|
--skip-project <project-name>
 | 
						|
--debug
 | 
						|
 | 
						|
Example:
 | 
						|
$0 -AP
 | 
						|
$0 -P -C myproject -u myuser -p mypass
 | 
						|
EOF
 | 
						|
}
 | 
						|
 | 
						|
if ! options=$(getopt -o hPAp:u:r:C: -l os-username:,os-password:,os-tenant-id:,os-tenant-name:,os-project-name:,os-project-id:,os-project-domain-id:,os-project-domain-name:,os-user-domain-id:,os-user-domain-name:,os-auth-url:,target-dir:,heat-url:,skip-project:,os-cacert:,help,debug -- "$@"); then
 | 
						|
    display_help
 | 
						|
    exit 1
 | 
						|
fi
 | 
						|
eval set -- $options
 | 
						|
ADDPASS=""
 | 
						|
HEAT_URL=""
 | 
						|
 | 
						|
# The services users usually in the service project.
 | 
						|
# rc files for service users, is out of scope.
 | 
						|
# Supporting different project for services is out of scope.
 | 
						|
SKIP_PROJECT="service"
 | 
						|
MODE=""
 | 
						|
ROLE=Member
 | 
						|
USER_NAME=""
 | 
						|
USER_PASS=""
 | 
						|
while [ $# -gt 0 ]; do
 | 
						|
    case "$1" in
 | 
						|
    -h|--help) display_help; exit 0 ;;
 | 
						|
    --os-username) export OS_USERNAME=$2; shift ;;
 | 
						|
    --os-password) export OS_PASSWORD=$2; shift ;;
 | 
						|
    --os-tenant-name) export OS_PROJECT_NAME=$2; shift ;;
 | 
						|
    --os-tenant-id) export OS_PROJECT_ID=$2; shift ;;
 | 
						|
    --os-project-name) export OS_PROJECT_NAME=$2; shift ;;
 | 
						|
    --os-project-id) export OS_PROJECT_ID=$2; shift ;;
 | 
						|
    --os-user-domain-id) export OS_USER_DOMAIN_ID=$2; shift ;;
 | 
						|
    --os-user-domain-name) export OS_USER_DOMAIN_NAME=$2; shift ;;
 | 
						|
    --os-project-domain-id) export OS_PROJECT_DOMAIN_ID=$2; shift ;;
 | 
						|
    --os-project-domain-name) export OS_PROJECT_DOMAIN_NAME=$2; shift ;;
 | 
						|
    --skip-tenant) SKIP_PROJECT="$SKIP_PROJECT$2,"; shift ;;
 | 
						|
    --skip-project) SKIP_PROJECT="$SKIP_PROJECT$2,"; shift ;;
 | 
						|
    --os-auth-url) export OS_AUTH_URL=$2; shift ;;
 | 
						|
    --os-cacert) export OS_CACERT=$2; shift ;;
 | 
						|
    --target-dir) ACCOUNT_DIR=$2; shift ;;
 | 
						|
    --heat-url) HEAT_URL=$2; shift ;;
 | 
						|
    --debug) set -o xtrace ;;
 | 
						|
    -u) MODE=${MODE:-one};  USER_NAME=$2; shift ;;
 | 
						|
    -p) USER_PASS=$2; shift ;;
 | 
						|
    -A) MODE=all; ;;
 | 
						|
    -P) ADDPASS="yes" ;;
 | 
						|
    -C) MODE=create; PROJECT=$2; shift ;;
 | 
						|
    -r) ROLE=$2; shift ;;
 | 
						|
    (--) shift; break ;;
 | 
						|
    (-*) echo "$0: error - unrecognized option $1" >&2; display_help; exit 1 ;;
 | 
						|
    (*)  echo "$0: error - unexpected argument $1" >&2; display_help; exit 1 ;;
 | 
						|
    esac
 | 
						|
    shift
 | 
						|
done
 | 
						|
 | 
						|
if [ -z "$OS_PASSWORD" ]; then
 | 
						|
    if [ -z "$ADMIN_PASSWORD" ];then
 | 
						|
        echo "The admin password is required option!"  >&2
 | 
						|
        exit 2
 | 
						|
    else
 | 
						|
        OS_PASSWORD=$ADMIN_PASSWORD
 | 
						|
    fi
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_PROJECT_ID" -a "$OS_TENANT_ID" ]; then
 | 
						|
    export OS_PROJECT_ID=$OS_TENANT_ID
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_PROJECT_NAME" -a "$OS_TENANT_NAME" ]; then
 | 
						|
    export OS_PROJECT_NAME=$OS_TENANT_NAME
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_PROJECT_NAME" -a -z "$OS_PROJECT_ID" ]; then
 | 
						|
    export OS_PROJECT_NAME=admin
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_USERNAME" ]; then
 | 
						|
    export OS_USERNAME=admin
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_AUTH_URL" ]; then
 | 
						|
    export OS_AUTH_URL=http://localhost:5000/v2.0/
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_USER_DOMAIN_ID" -a -z "$OS_USER_DOMAIN_NAME" ]; then
 | 
						|
    # purposefully not exported as it would force v3 auth within this file.
 | 
						|
    OS_USER_DOMAIN_ID=default
 | 
						|
fi
 | 
						|
 | 
						|
if [ -z "$OS_PROJECT_DOMAIN_ID" -a -z "$OS_PROJECT_DOMAIN_NAME" ]; then
 | 
						|
    # purposefully not exported as it would force v3 auth within this file.
 | 
						|
    OS_PROJECT_DOMAIN_ID=default
 | 
						|
fi
 | 
						|
 | 
						|
USER_PASS=${USER_PASS:-$OS_PASSWORD}
 | 
						|
USER_NAME=${USER_NAME:-$OS_USERNAME}
 | 
						|
 | 
						|
if [ -z "$MODE" ]; then
 | 
						|
    echo "You must specify at least -A or -u parameter!"  >&2
 | 
						|
    echo
 | 
						|
    display_help
 | 
						|
    exit 3
 | 
						|
fi
 | 
						|
 | 
						|
export -n SERVICE_TOKEN SERVICE_ENDPOINT OS_SERVICE_TOKEN OS_SERVICE_ENDPOINT
 | 
						|
 | 
						|
EC2_URL=$(openstack endpoint list --service ec2 --interface public --os-identity-api-version=3 -c URL -f value || true)
 | 
						|
if [[ -z $EC2_URL ]]; then
 | 
						|
    EC2_URL=http://localhost:8773/
 | 
						|
fi
 | 
						|
 | 
						|
S3_URL=$(openstack endpoint list --service s3 --interface public --os-identity-api-version=3 -c URL -f value || true)
 | 
						|
if [[ -z $S3_URL ]]; then
 | 
						|
    S3_URL=http://localhost:3333
 | 
						|
fi
 | 
						|
 | 
						|
mkdir -p "$ACCOUNT_DIR"
 | 
						|
ACCOUNT_DIR=`readlink -f "$ACCOUNT_DIR"`
 | 
						|
EUCALYPTUS_CERT=$ACCOUNT_DIR/cacert.pem
 | 
						|
if [ -e "$EUCALYPTUS_CERT" ]; then
 | 
						|
    mv "$EUCALYPTUS_CERT" "$EUCALYPTUS_CERT.old"
 | 
						|
fi
 | 
						|
if ! nova x509-get-root-cert "$EUCALYPTUS_CERT"; then
 | 
						|
    echo "Failed to update the root certificate: $EUCALYPTUS_CERT" >&2
 | 
						|
    if [ -e "$EUCALYPTUS_CERT.old" ]; then
 | 
						|
        mv "$EUCALYPTUS_CERT.old" "$EUCALYPTUS_CERT"
 | 
						|
    fi
 | 
						|
fi
 | 
						|
 | 
						|
 | 
						|
function add_entry {
 | 
						|
    local user_id=$1
 | 
						|
    local user_name=$2
 | 
						|
    local project_id=$3
 | 
						|
    local project_name=$4
 | 
						|
    local user_passwd=$5
 | 
						|
 | 
						|
    # The admin user can see all user's secret AWS keys, it does not looks good
 | 
						|
    local line=`openstack ec2 credentials list --user $user_id | grep " $project_id "`
 | 
						|
    if [ -z "$line" ]; then
 | 
						|
        openstack ec2 credentials create --user $user_id --project $project_id 1>&2
 | 
						|
        line=`openstack ec2 credentials list --user $user_id | grep " $project_id "`
 | 
						|
    fi
 | 
						|
    local ec2_access_key ec2_secret_key
 | 
						|
    read ec2_access_key ec2_secret_key <<<  `echo $line | awk '{print $2 " " $4 }'`
 | 
						|
    mkdir -p "$ACCOUNT_DIR/$project_name"
 | 
						|
    local rcfile="$ACCOUNT_DIR/$project_name/$user_name"
 | 
						|
    # The certs subject part are the project ID "dash" user ID, but the CN should be the first part of the DN
 | 
						|
    # Generally the subject DN parts should be in reverse order like the Issuer
 | 
						|
    # The Serial does not seams correctly marked either
 | 
						|
    local ec2_cert="$rcfile-cert.pem"
 | 
						|
    local ec2_private_key="$rcfile-pk.pem"
 | 
						|
    # Try to preserve the original file on fail (best effort)
 | 
						|
    if [ -e "$ec2_private_key" ]; then
 | 
						|
        mv -f "$ec2_private_key" "$ec2_private_key.old"
 | 
						|
    fi
 | 
						|
    if [ -e "$ec2_cert" ]; then
 | 
						|
        mv -f "$ec2_cert" "$ec2_cert.old"
 | 
						|
    fi
 | 
						|
    # It will not create certs when the password is incorrect
 | 
						|
    if ! nova --os-password "$user_passwd" --os-username "$user_name" --os-project-name "$project_name" x509-create-cert "$ec2_private_key" "$ec2_cert"; then
 | 
						|
        if [ -e "$ec2_private_key.old" ]; then
 | 
						|
            mv -f "$ec2_private_key.old" "$ec2_private_key"
 | 
						|
        fi
 | 
						|
        if [ -e "$ec2_cert.old" ]; then
 | 
						|
            mv -f "$ec2_cert.old" "$ec2_cert"
 | 
						|
        fi
 | 
						|
    fi
 | 
						|
    cat >"$rcfile" <<EOF
 | 
						|
# you can source this file
 | 
						|
export EC2_ACCESS_KEY="$ec2_access_key"
 | 
						|
export EC2_SECRET_KEY="$ec2_secret_key"
 | 
						|
export EC2_URL="$EC2_URL"
 | 
						|
export S3_URL="$S3_URL"
 | 
						|
# OpenStack USER ID = $user_id
 | 
						|
export OS_USERNAME="$user_name"
 | 
						|
# OpenStack project ID = $project_id
 | 
						|
export OS_PROJECT_NAME="$project_name"
 | 
						|
export OS_AUTH_URL="$OS_AUTH_URL"
 | 
						|
export OS_CACERT="$OS_CACERT"
 | 
						|
export EC2_CERT="$ec2_cert"
 | 
						|
export EC2_PRIVATE_KEY="$ec2_private_key"
 | 
						|
export EC2_USER_ID=42 #not checked by nova (can be a 12-digit id)
 | 
						|
export EUCALYPTUS_CERT="$ACCOUNT_DIR/cacert.pem"
 | 
						|
export NOVA_CERT="$ACCOUNT_DIR/cacert.pem"
 | 
						|
export OS_AUTH_TYPE=v2password
 | 
						|
EOF
 | 
						|
    if [ -n "$ADDPASS" ]; then
 | 
						|
        echo "export OS_PASSWORD=\"$user_passwd\"" >>"$rcfile"
 | 
						|
    fi
 | 
						|
    if [ -n "$HEAT_URL" ]; then
 | 
						|
        echo "export HEAT_URL=\"$HEAT_URL/$project_id\"" >>"$rcfile"
 | 
						|
        echo "export OS_NO_CLIENT_AUTH=True" >>"$rcfile"
 | 
						|
    fi
 | 
						|
    for v in OS_USER_DOMAIN_ID OS_USER_DOMAIN_NAME OS_PROJECT_DOMAIN_ID OS_PROJECT_DOMAIN_NAME; do
 | 
						|
        if [ ${!v} ]; then
 | 
						|
            echo "export $v=${!v}" >>"$rcfile"
 | 
						|
        else
 | 
						|
            echo "unset $v" >>"$rcfile"
 | 
						|
        fi
 | 
						|
    done
 | 
						|
}
 | 
						|
 | 
						|
#admin users expected
 | 
						|
function create_or_get_project {
 | 
						|
    local name=$1
 | 
						|
    local id
 | 
						|
    eval $(openstack project show -f shell -c id $name)
 | 
						|
    if [[ -z $id ]]; then
 | 
						|
        eval $(openstack project create -f shell -c id $name)
 | 
						|
    fi
 | 
						|
    echo $id
 | 
						|
}
 | 
						|
 | 
						|
function create_or_get_role {
 | 
						|
    local name=$1
 | 
						|
    local id
 | 
						|
    eval $(openstack role show -f shell -c id $name)
 | 
						|
    if [[ -z $id ]]; then
 | 
						|
        eval $(openstack role create -f shell -c id $name)
 | 
						|
    fi
 | 
						|
    echo $id
 | 
						|
}
 | 
						|
 | 
						|
# Provides empty string when the user does not exists
 | 
						|
function get_user_id {
 | 
						|
    openstack user list | grep " $1 " | cut -d " " -f2
 | 
						|
}
 | 
						|
 | 
						|
if [ $MODE != "create" ]; then
 | 
						|
    # looks like I can't ask for all project related to a specified user
 | 
						|
    openstack project list --long --quote none -f csv | grep ',True' | grep -v "${SKIP_PROJECT}" | while IFS=, read project_id project_name desc enabled; do
 | 
						|
        openstack user list --project $project_id --long --quote none -f csv | grep ',True' | while IFS=, read user_id user_name project email enabled; do
 | 
						|
            if [ $MODE = one -a "$user_name" != "$USER_NAME" ]; then
 | 
						|
                continue;
 | 
						|
            fi
 | 
						|
 | 
						|
            # Checks for a specific password defined for an user.
 | 
						|
            # Example for an username johndoe: JOHNDOE_PASSWORD=1234
 | 
						|
            # This mechanism is used by lib/swift
 | 
						|
            eval SPECIFIC_UPASSWORD="\$${user_name}_password"
 | 
						|
            if [ -n "$SPECIFIC_UPASSWORD" ]; then
 | 
						|
                USER_PASS=$SPECIFIC_UPASSWORD
 | 
						|
            fi
 | 
						|
            add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS"
 | 
						|
        done
 | 
						|
    done
 | 
						|
else
 | 
						|
    project_name=$PROJECT
 | 
						|
    project_id=$(create_or_get_project "$PROJECT")
 | 
						|
    user_name=$USER_NAME
 | 
						|
    user_id=`get_user_id $user_name`
 | 
						|
    if [ -z "$user_id" ]; then
 | 
						|
        eval $(openstack user create "$user_name" --project "$project_id" --password "$USER_PASS" --email "$user_name@example.com" -f shell -c id)
 | 
						|
        user_id=$id
 | 
						|
        add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS"
 | 
						|
    else
 | 
						|
        role_id=$(create_or_get_role "$ROLE")
 | 
						|
        openstack role add "$role_id" --user "$user_id" --project "$project_id"
 | 
						|
        add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS"
 | 
						|
    fi
 | 
						|
fi
 |