heat/heat/engine/resources/openstack/barbican/secret.py

159 lines
5.0 KiB
Python

#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from heat.common.i18n import _
from heat.engine import attributes
from heat.engine import constraints
from heat.engine import properties
from heat.engine import resource
from heat.engine import support
class Secret(resource.Resource):
"""The resource provides access to the secret/keying stored material.
A secret is a singular item that stored within Barbican. A secret is
anything you want it to be; however, the formal use case is a key that you
wish to store away from prying eyes. Secret may include private keys,
passwords and so on.
"""
support_status = support.SupportStatus(version='2014.2')
default_client_name = 'barbican'
entity = 'secrets'
PROPERTIES = (
NAME, PAYLOAD, PAYLOAD_CONTENT_TYPE, PAYLOAD_CONTENT_ENCODING,
MODE, EXPIRATION, ALGORITHM, BIT_LENGTH, SECRET_TYPE,
) = (
'name', 'payload', 'payload_content_type', 'payload_content_encoding',
'mode', 'expiration', 'algorithm', 'bit_length', 'secret_type'
)
ATTRIBUTES = (
STATUS, DECRYPTED_PAYLOAD,
) = (
'status', 'decrypted_payload',
)
_SECRET_TYPES = (
SYMMETRIC, PUBLIC, PRIVATE, CERTIFICATE, PASSPHRASE, OPAQUE
) = (
'symmetric', 'public', 'private', 'certificate', 'passphrase', 'opaque'
)
properties_schema = {
NAME: properties.Schema(
properties.Schema.STRING,
_('Human readable name for the secret.'),
),
PAYLOAD: properties.Schema(
properties.Schema.STRING,
_('The unencrypted plain text of the secret.'),
),
SECRET_TYPE: properties.Schema(
properties.Schema.STRING,
_('The type of the secret.'),
constraints=[
constraints.AllowedValues(_SECRET_TYPES),
],
support_status=support.SupportStatus(version='5.0.0'),
default=OPAQUE
),
PAYLOAD_CONTENT_TYPE: properties.Schema(
properties.Schema.STRING,
_('The type/format the secret data is provided in.'),
constraints=[
constraints.AllowedValues([
'text/plain',
'application/octet-stream',
]),
],
),
PAYLOAD_CONTENT_ENCODING: properties.Schema(
properties.Schema.STRING,
_('The encoding format used to provide the payload data.'),
constraints=[
constraints.AllowedValues([
'base64',
]),
],
),
EXPIRATION: properties.Schema(
properties.Schema.STRING,
_('The expiration date for the secret in ISO-8601 format.'),
constraints=[
constraints.CustomConstraint('iso_8601'),
],
),
ALGORITHM: properties.Schema(
properties.Schema.STRING,
_('The algorithm type used to generate the secret.'),
),
BIT_LENGTH: properties.Schema(
properties.Schema.INTEGER,
_('The bit-length of the secret.'),
constraints=[
constraints.Range(
min=0,
),
],
),
MODE: properties.Schema(
properties.Schema.STRING,
_('The type/mode of the algorithm associated with the secret '
'information.'),
),
}
attributes_schema = {
STATUS: attributes.Schema(
_('The status of the secret.'),
type=attributes.Schema.STRING
),
DECRYPTED_PAYLOAD: attributes.Schema(
_('The decrypted secret payload.'),
type=attributes.Schema.STRING
),
}
def handle_create(self):
info = dict(self.properties)
secret = self.client().secrets.create(**info)
secret_ref = secret.store()
self.resource_id_set(secret_ref)
return secret_ref
def _resolve_attribute(self, name):
secret = self.client().secrets.get(self.resource_id)
if name == self.DECRYPTED_PAYLOAD:
return secret.payload
if name == self.STATUS:
return secret.status
# TODO(ochuprykov): remove this method when bug #1485619 will be fixed
def _show_resource(self):
order = self.client().secrets.get(self.resource_id)
info = order._get_formatted_entity()
return dict(zip(info[0], info[1]))
def resource_mapping():
return {
'OS::Barbican::Secret': Secret,
}