Move UserAuthInfo to a separate file
Since authentication plugins ``password.Password`` and ``mapped.Mapped`` need use class UserAuthInfo, we need to move it out of the ``password`` module. It is going to be moved to ``auth.plugins.core`` module, accessible via importing ``keystone.auth.plugins`` module. Change-Id: I4ec97eb0169881e6a50598f5b3a9d655378e2481 Partially-Implements: bp federated-direct-user-mapping
This commit is contained in:
parent
7fa15589ad
commit
4fd53b6ccb
@ -0,0 +1,15 @@
|
|||||||
|
# Copyright 2015 CERN
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
|
||||||
|
from keystone.auth.plugins.core import * # noqa
|
112
keystone/auth/plugins/core.py
Normal file
112
keystone/auth/plugins/core.py
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
# Copyright 2013 OpenStack Foundation
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from oslo_log import log
|
||||||
|
import six
|
||||||
|
|
||||||
|
from keystone.common import dependency
|
||||||
|
from keystone import exception
|
||||||
|
|
||||||
|
LOG = log.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
@dependency.requires('identity_api', 'resource_api')
|
||||||
|
class UserAuthInfo(object):
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def create(auth_payload, method_name):
|
||||||
|
user_auth_info = UserAuthInfo()
|
||||||
|
user_auth_info._validate_and_normalize_auth_data(auth_payload)
|
||||||
|
user_auth_info.METHOD_NAME = method_name
|
||||||
|
return user_auth_info
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.user_id = None
|
||||||
|
self.password = None
|
||||||
|
self.user_ref = None
|
||||||
|
self.METHOD_NAME = None
|
||||||
|
|
||||||
|
def _assert_domain_is_enabled(self, domain_ref):
|
||||||
|
try:
|
||||||
|
self.resource_api.assert_domain_enabled(
|
||||||
|
domain_id=domain_ref['id'],
|
||||||
|
domain=domain_ref)
|
||||||
|
except AssertionError as e:
|
||||||
|
LOG.warning(six.text_type(e))
|
||||||
|
six.reraise(exception.Unauthorized, exception.Unauthorized(e),
|
||||||
|
sys.exc_info()[2])
|
||||||
|
|
||||||
|
def _assert_user_is_enabled(self, user_ref):
|
||||||
|
try:
|
||||||
|
self.identity_api.assert_user_enabled(
|
||||||
|
user_id=user_ref['id'],
|
||||||
|
user=user_ref)
|
||||||
|
except AssertionError as e:
|
||||||
|
LOG.warning(six.text_type(e))
|
||||||
|
six.reraise(exception.Unauthorized, exception.Unauthorized(e),
|
||||||
|
sys.exc_info()[2])
|
||||||
|
|
||||||
|
def _lookup_domain(self, domain_info):
|
||||||
|
domain_id = domain_info.get('id')
|
||||||
|
domain_name = domain_info.get('name')
|
||||||
|
domain_ref = None
|
||||||
|
if not domain_id and not domain_name:
|
||||||
|
raise exception.ValidationError(attribute='id or name',
|
||||||
|
target='domain')
|
||||||
|
try:
|
||||||
|
if domain_name:
|
||||||
|
domain_ref = self.resource_api.get_domain_by_name(
|
||||||
|
domain_name)
|
||||||
|
else:
|
||||||
|
domain_ref = self.resource_api.get_domain(domain_id)
|
||||||
|
except exception.DomainNotFound as e:
|
||||||
|
LOG.exception(six.text_type(e))
|
||||||
|
raise exception.Unauthorized(e)
|
||||||
|
self._assert_domain_is_enabled(domain_ref)
|
||||||
|
return domain_ref
|
||||||
|
|
||||||
|
def _validate_and_normalize_auth_data(self, auth_payload):
|
||||||
|
if 'user' not in auth_payload:
|
||||||
|
raise exception.ValidationError(attribute='user',
|
||||||
|
target=self.METHOD_NAME)
|
||||||
|
user_info = auth_payload['user']
|
||||||
|
user_id = user_info.get('id')
|
||||||
|
user_name = user_info.get('name')
|
||||||
|
user_ref = None
|
||||||
|
if not user_id and not user_name:
|
||||||
|
raise exception.ValidationError(attribute='id or name',
|
||||||
|
target='user')
|
||||||
|
self.password = user_info.get('password')
|
||||||
|
try:
|
||||||
|
if user_name:
|
||||||
|
if 'domain' not in user_info:
|
||||||
|
raise exception.ValidationError(attribute='domain',
|
||||||
|
target='user')
|
||||||
|
domain_ref = self._lookup_domain(user_info['domain'])
|
||||||
|
user_ref = self.identity_api.get_user_by_name(
|
||||||
|
user_name, domain_ref['id'])
|
||||||
|
else:
|
||||||
|
user_ref = self.identity_api.get_user(user_id)
|
||||||
|
domain_ref = self.resource_api.get_domain(
|
||||||
|
user_ref['domain_id'])
|
||||||
|
self._assert_domain_is_enabled(domain_ref)
|
||||||
|
except exception.UserNotFound as e:
|
||||||
|
LOG.exception(six.text_type(e))
|
||||||
|
raise exception.Unauthorized(e)
|
||||||
|
self._assert_user_is_enabled(user_ref)
|
||||||
|
self.user_ref = user_ref
|
||||||
|
self.user_id = user_ref['id']
|
||||||
|
self.domain_id = domain_ref['id']
|
@ -12,12 +12,10 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import sys
|
|
||||||
|
|
||||||
from oslo_log import log
|
from oslo_log import log
|
||||||
import six
|
|
||||||
|
|
||||||
from keystone import auth
|
from keystone import auth
|
||||||
|
from keystone.auth import plugins as auth_plugins
|
||||||
from keystone.common import dependency
|
from keystone.common import dependency
|
||||||
from keystone import exception
|
from keystone import exception
|
||||||
from keystone.i18n import _
|
from keystone.i18n import _
|
||||||
@ -27,92 +25,6 @@ METHOD_NAME = 'password'
|
|||||||
LOG = log.getLogger(__name__)
|
LOG = log.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
@dependency.requires('identity_api', 'resource_api')
|
|
||||||
class UserAuthInfo(object):
|
|
||||||
@staticmethod
|
|
||||||
def create(auth_payload):
|
|
||||||
user_auth_info = UserAuthInfo()
|
|
||||||
user_auth_info._validate_and_normalize_auth_data(auth_payload)
|
|
||||||
return user_auth_info
|
|
||||||
|
|
||||||
def __init__(self):
|
|
||||||
self.user_id = None
|
|
||||||
self.password = None
|
|
||||||
self.user_ref = None
|
|
||||||
|
|
||||||
def _assert_domain_is_enabled(self, domain_ref):
|
|
||||||
try:
|
|
||||||
self.resource_api.assert_domain_enabled(
|
|
||||||
domain_id=domain_ref['id'],
|
|
||||||
domain=domain_ref)
|
|
||||||
except AssertionError as e:
|
|
||||||
LOG.warning(six.text_type(e))
|
|
||||||
six.reraise(exception.Unauthorized, exception.Unauthorized(e),
|
|
||||||
sys.exc_info()[2])
|
|
||||||
|
|
||||||
def _assert_user_is_enabled(self, user_ref):
|
|
||||||
try:
|
|
||||||
self.identity_api.assert_user_enabled(
|
|
||||||
user_id=user_ref['id'],
|
|
||||||
user=user_ref)
|
|
||||||
except AssertionError as e:
|
|
||||||
LOG.warning(six.text_type(e))
|
|
||||||
six.reraise(exception.Unauthorized, exception.Unauthorized(e),
|
|
||||||
sys.exc_info()[2])
|
|
||||||
|
|
||||||
def _lookup_domain(self, domain_info):
|
|
||||||
domain_id = domain_info.get('id')
|
|
||||||
domain_name = domain_info.get('name')
|
|
||||||
domain_ref = None
|
|
||||||
if not domain_id and not domain_name:
|
|
||||||
raise exception.ValidationError(attribute='id or name',
|
|
||||||
target='domain')
|
|
||||||
try:
|
|
||||||
if domain_name:
|
|
||||||
domain_ref = self.resource_api.get_domain_by_name(
|
|
||||||
domain_name)
|
|
||||||
else:
|
|
||||||
domain_ref = self.resource_api.get_domain(domain_id)
|
|
||||||
except exception.DomainNotFound as e:
|
|
||||||
LOG.exception(six.text_type(e))
|
|
||||||
raise exception.Unauthorized(e)
|
|
||||||
self._assert_domain_is_enabled(domain_ref)
|
|
||||||
return domain_ref
|
|
||||||
|
|
||||||
def _validate_and_normalize_auth_data(self, auth_payload):
|
|
||||||
if 'user' not in auth_payload:
|
|
||||||
raise exception.ValidationError(attribute='user',
|
|
||||||
target=METHOD_NAME)
|
|
||||||
user_info = auth_payload['user']
|
|
||||||
user_id = user_info.get('id')
|
|
||||||
user_name = user_info.get('name')
|
|
||||||
user_ref = None
|
|
||||||
if not user_id and not user_name:
|
|
||||||
raise exception.ValidationError(attribute='id or name',
|
|
||||||
target='user')
|
|
||||||
self.password = user_info.get('password')
|
|
||||||
try:
|
|
||||||
if user_name:
|
|
||||||
if 'domain' not in user_info:
|
|
||||||
raise exception.ValidationError(attribute='domain',
|
|
||||||
target='user')
|
|
||||||
domain_ref = self._lookup_domain(user_info['domain'])
|
|
||||||
user_ref = self.identity_api.get_user_by_name(
|
|
||||||
user_name, domain_ref['id'])
|
|
||||||
else:
|
|
||||||
user_ref = self.identity_api.get_user(user_id)
|
|
||||||
domain_ref = self.resource_api.get_domain(
|
|
||||||
user_ref['domain_id'])
|
|
||||||
self._assert_domain_is_enabled(domain_ref)
|
|
||||||
except exception.UserNotFound as e:
|
|
||||||
LOG.exception(six.text_type(e))
|
|
||||||
raise exception.Unauthorized(e)
|
|
||||||
self._assert_user_is_enabled(user_ref)
|
|
||||||
self.user_ref = user_ref
|
|
||||||
self.user_id = user_ref['id']
|
|
||||||
self.domain_id = domain_ref['id']
|
|
||||||
|
|
||||||
|
|
||||||
@dependency.requires('identity_api')
|
@dependency.requires('identity_api')
|
||||||
class Password(auth.AuthMethodHandler):
|
class Password(auth.AuthMethodHandler):
|
||||||
|
|
||||||
@ -120,7 +32,7 @@ class Password(auth.AuthMethodHandler):
|
|||||||
|
|
||||||
def authenticate(self, context, auth_payload, auth_context):
|
def authenticate(self, context, auth_payload, auth_context):
|
||||||
"""Try to authenticate against the identity backend."""
|
"""Try to authenticate against the identity backend."""
|
||||||
user_info = UserAuthInfo.create(auth_payload)
|
user_info = auth_plugins.UserAuthInfo.create(auth_payload, self.method)
|
||||||
|
|
||||||
# FIXME(gyee): identity.authenticate() can use some refactoring since
|
# FIXME(gyee): identity.authenticate() can use some refactoring since
|
||||||
# all we care is password matches
|
# all we care is password matches
|
||||||
|
Loading…
Reference in New Issue
Block a user