2012-09-11 11:20:16 -05:00
|
|
|
# Copyright 2011 Nebula, Inc.
|
|
|
|
# All Rights Reserved.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
# not use this file except in compliance with the License. You may obtain
|
|
|
|
# a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
# License for the specific language governing permissions and limitations
|
|
|
|
# under the License.
|
2014-01-17 20:13:24 +08:00
|
|
|
|
2012-09-11 11:20:16 -05:00
|
|
|
import logging
|
2015-07-26 08:55:30 -05:00
|
|
|
import warnings
|
2012-09-11 11:20:16 -05:00
|
|
|
|
2015-01-20 10:47:44 -06:00
|
|
|
from oslo_serialization import jsonutils
|
2014-10-14 17:49:17 -04:00
|
|
|
|
2014-01-21 11:40:28 +10:00
|
|
|
from keystoneclient.auth.identity import v3 as v3_auth
|
2013-08-01 17:09:55 -05:00
|
|
|
from keystoneclient import exceptions
|
2013-07-31 16:13:13 +10:00
|
|
|
from keystoneclient import httpclient
|
2014-10-27 10:54:48 -05:00
|
|
|
from keystoneclient.i18n import _
|
2019-08-20 17:37:34 -07:00
|
|
|
from keystoneclient.v3 import access_rules
|
2018-01-17 23:46:56 +01:00
|
|
|
from keystoneclient.v3 import application_credentials
|
2015-03-30 17:16:25 +11:00
|
|
|
from keystoneclient.v3 import auth
|
2014-03-24 22:13:48 -07:00
|
|
|
from keystoneclient.v3.contrib import endpoint_filter
|
2014-09-18 09:59:38 +01:00
|
|
|
from keystoneclient.v3.contrib import endpoint_policy
|
2014-03-26 17:44:08 +01:00
|
|
|
from keystoneclient.v3.contrib import federation
|
2013-12-09 07:50:44 -06:00
|
|
|
from keystoneclient.v3.contrib import oauth1
|
2014-12-16 13:28:05 -06:00
|
|
|
from keystoneclient.v3.contrib import simple_cert
|
2013-08-02 11:45:38 +01:00
|
|
|
from keystoneclient.v3.contrib import trusts
|
2012-09-11 15:42:38 -05:00
|
|
|
from keystoneclient.v3 import credentials
|
2015-03-24 17:57:25 +00:00
|
|
|
from keystoneclient.v3 import domain_configs
|
2012-09-11 12:32:01 -05:00
|
|
|
from keystoneclient.v3 import domains
|
2015-06-01 13:13:38 +10:00
|
|
|
from keystoneclient.v3 import ec2
|
2017-01-05 23:37:39 -03:00
|
|
|
from keystoneclient.v3 import endpoint_groups
|
2013-02-13 22:52:05 -06:00
|
|
|
from keystoneclient.v3 import endpoints
|
2012-12-07 16:47:56 +00:00
|
|
|
from keystoneclient.v3 import groups
|
2018-06-11 19:19:03 +00:00
|
|
|
from keystoneclient.v3 import limits
|
2012-09-11 11:44:05 -05:00
|
|
|
from keystoneclient.v3 import policies
|
2012-09-11 15:38:22 -05:00
|
|
|
from keystoneclient.v3 import projects
|
2014-04-11 16:39:16 -04:00
|
|
|
from keystoneclient.v3 import regions
|
2018-01-24 21:46:52 +00:00
|
|
|
from keystoneclient.v3 import registered_limits
|
2014-05-01 11:07:59 -03:00
|
|
|
from keystoneclient.v3 import role_assignments
|
2012-09-11 15:34:56 -05:00
|
|
|
from keystoneclient.v3 import roles
|
2012-09-11 11:22:30 -05:00
|
|
|
from keystoneclient.v3 import services
|
2014-06-26 10:47:23 +08:00
|
|
|
from keystoneclient.v3 import tokens
|
2012-09-11 15:40:37 -05:00
|
|
|
from keystoneclient.v3 import users
|
2012-09-11 11:20:16 -05:00
|
|
|
|
|
|
|
|
|
|
|
_logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2013-07-31 16:13:13 +10:00
|
|
|
class Client(httpclient.HTTPClient):
|
2016-05-02 16:29:24 +00:00
|
|
|
r"""Client for the OpenStack Identity API v3.
|
2012-09-11 11:20:16 -05:00
|
|
|
|
2016-02-28 11:10:41 -06:00
|
|
|
:param session: Session for requests. (optional)
|
|
|
|
:type session: keystoneauth1.session.Session
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string user_id: User ID for authentication. (optional)
|
2012-09-11 11:20:16 -05:00
|
|
|
:param string username: Username for authentication. (optional)
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string user_domain_id: User's domain ID for authentication.
|
|
|
|
(optional)
|
|
|
|
:param string user_domain_name: User's domain name for authentication.
|
|
|
|
(optional)
|
2012-09-11 11:20:16 -05:00
|
|
|
:param string password: Password for authentication. (optional)
|
|
|
|
:param string token: Token for authentication. (optional)
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string domain_id: Domain ID for domain scoping. (optional)
|
|
|
|
:param string domain_name: Domain name for domain scoping. (optional)
|
|
|
|
:param string project_id: Project ID for project scoping. (optional)
|
|
|
|
:param string project_name: Project name for project scoping. (optional)
|
|
|
|
:param string project_domain_id: Project's domain ID for project
|
|
|
|
scoping. (optional)
|
|
|
|
:param string project_domain_name: Project's domain name for project
|
|
|
|
scoping. (optional)
|
|
|
|
:param string tenant_name: Tenant name. (optional)
|
2015-07-24 15:06:00 -05:00
|
|
|
The tenant_name keyword argument is deprecated
|
|
|
|
as of the 1.7.0 release in favor of project_name
|
|
|
|
and may be removed in the 2.0.0 release.
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string tenant_id: Tenant id. (optional)
|
2015-07-24 15:06:00 -05:00
|
|
|
The tenant_id keyword argument is deprecated as of
|
|
|
|
the 1.7.0 release in favor of project_id and may
|
|
|
|
be removed in the 2.0.0 release.
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string auth_url: Identity service endpoint for authorization.
|
2012-09-11 11:20:16 -05:00
|
|
|
:param string region_name: Name of a region to select when choosing an
|
|
|
|
endpoint from the service catalog.
|
2013-02-13 22:52:05 -06:00
|
|
|
:param string endpoint: A user-supplied endpoint URL for the identity
|
2012-09-11 11:20:16 -05:00
|
|
|
service. Lazy-authentication is possible for API
|
|
|
|
service calls if endpoint is set at
|
2013-02-13 22:52:05 -06:00
|
|
|
instantiation. (optional)
|
2012-09-11 11:20:16 -05:00
|
|
|
:param integer timeout: Allows customization of the timeout for client
|
|
|
|
http requests. (optional)
|
|
|
|
|
2015-07-26 08:55:30 -05:00
|
|
|
.. warning::
|
|
|
|
|
|
|
|
Constructing an instance of this class without a session is
|
|
|
|
deprecated as of the 1.7.0 release and will be removed in the
|
|
|
|
2.0.0 release.
|
|
|
|
|
2012-09-11 11:20:16 -05:00
|
|
|
Example::
|
|
|
|
|
2016-02-28 08:59:43 -06:00
|
|
|
>>> from keystoneauth1.identity import v3
|
|
|
|
>>> from keystoneauth1 import session
|
2012-09-11 11:20:16 -05:00
|
|
|
>>> from keystoneclient.v3 import client
|
2016-02-28 08:59:43 -06:00
|
|
|
>>> auth = v3.Password(user_domain_name=DOMAIN_NAME,
|
|
|
|
... username=USER,
|
|
|
|
... password=PASS,
|
|
|
|
... project_domain_name=PROJECT_DOMAIN_NAME,
|
|
|
|
... project_name=PROJECT_NAME,
|
|
|
|
... auth_url=KEYSTONE_URL)
|
|
|
|
>>> sess = session.Session(auth=auth)
|
|
|
|
>>> keystone = client.Client(session=sess)
|
2013-02-13 22:52:05 -06:00
|
|
|
>>> keystone.projects.list()
|
2012-09-11 11:20:16 -05:00
|
|
|
...
|
|
|
|
>>> user = keystone.users.get(USER_ID)
|
|
|
|
>>> user.delete()
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
Instances of this class have the following managers:
|
|
|
|
|
|
|
|
.. py:attribute:: credentials
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.credentials.CredentialManager`
|
|
|
|
|
2015-03-24 17:57:25 +00:00
|
|
|
.. py:attribute:: domain_configs
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.domain_configs.DomainConfigManager`
|
|
|
|
|
2015-06-01 13:13:38 +10:00
|
|
|
.. py:attribute:: ec2
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.ec2.EC2Manager`
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: endpoint_filter
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.endpoint_filter.\
|
2016-05-03 18:08:31 +00:00
|
|
|
EndpointFilterManager`
|
2014-06-12 14:51:21 -05:00
|
|
|
|
2017-01-05 23:37:39 -03:00
|
|
|
.. py:attribute:: endpoint_groups
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.endpoint_groups.\
|
|
|
|
EndpointGroupManager`
|
|
|
|
|
2014-09-18 09:59:38 +01:00
|
|
|
.. py:attribute:: endpoint_policy
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.endpoint_policy.\
|
2016-05-03 18:08:31 +00:00
|
|
|
EndpointPolicyManager`
|
2014-09-18 09:59:38 +01:00
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: endpoints
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.endpoints.EndpointManager`
|
|
|
|
|
|
|
|
.. py:attribute:: domains
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.domains.DomainManager`
|
|
|
|
|
|
|
|
.. py:attribute:: federation
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.federation.core.FederationManager`
|
|
|
|
|
|
|
|
.. py:attribute:: groups
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.groups.GroupManager`
|
|
|
|
|
2018-06-11 19:19:03 +00:00
|
|
|
.. py:attribute:: limits
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.limits.LimitManager`
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: oauth1
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.oauth1.core.OAuthManager`
|
|
|
|
|
|
|
|
.. py:attribute:: policies
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.policies.PolicyManager`
|
|
|
|
|
|
|
|
.. py:attribute:: regions
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.regions.RegionManager`
|
|
|
|
|
2018-01-24 21:46:52 +00:00
|
|
|
.. py:attribute:: registered_limits
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.registered_limits.RegisteredLimitManager`
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: role_assignments
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.role_assignments.RoleAssignmentManager`
|
|
|
|
|
|
|
|
.. py:attribute:: roles
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.roles.RoleManager`
|
|
|
|
|
2014-12-16 13:28:05 -06:00
|
|
|
.. py:attribute:: simple_cert
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.simple_cert.SimpleCertManager`
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: services
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.services.ServiceManager`
|
|
|
|
|
2014-06-26 10:47:23 +08:00
|
|
|
.. py:attribute:: tokens
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.tokens.TokenManager`
|
|
|
|
|
2014-06-12 14:51:21 -05:00
|
|
|
.. py:attribute:: trusts
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.contrib.trusts.TrustManager`
|
|
|
|
|
2014-08-05 15:09:01 +08:00
|
|
|
.. py:attribute:: users
|
|
|
|
|
|
|
|
:py:class:`keystoneclient.v3.users.UserManager`
|
|
|
|
|
2012-09-11 11:20:16 -05:00
|
|
|
"""
|
|
|
|
|
2013-09-23 11:50:57 +10:00
|
|
|
version = 'v3'
|
|
|
|
|
2013-02-13 22:52:05 -06:00
|
|
|
def __init__(self, **kwargs):
|
2013-06-21 19:04:50 +02:00
|
|
|
"""Initialize a new client for the Keystone v3 API."""
|
2013-02-13 22:52:05 -06:00
|
|
|
super(Client, self).__init__(**kwargs)
|
2012-09-11 11:20:16 -05:00
|
|
|
|
2015-07-26 08:55:30 -05:00
|
|
|
if not kwargs.get('session'):
|
|
|
|
warnings.warn(
|
|
|
|
'Constructing an instance of the '
|
|
|
|
'keystoneclient.v3.client.Client class without a session is '
|
|
|
|
'deprecated as of the 1.7.0 release and may be removed in '
|
|
|
|
'the 2.0.0 release.', DeprecationWarning)
|
|
|
|
|
2019-08-20 17:37:34 -07:00
|
|
|
self.access_rules = (
|
|
|
|
access_rules.AccessRuleManager(self._adapter)
|
|
|
|
)
|
2018-01-17 23:46:56 +01:00
|
|
|
self.application_credentials = (
|
|
|
|
application_credentials.ApplicationCredentialManager(self._adapter)
|
|
|
|
)
|
2015-03-30 17:16:25 +11:00
|
|
|
self.auth = auth.AuthManager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.credentials = credentials.CredentialManager(self._adapter)
|
2015-06-01 13:13:38 +10:00
|
|
|
self.ec2 = ec2.EC2Manager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.endpoint_filter = endpoint_filter.EndpointFilterManager(
|
|
|
|
self._adapter)
|
2017-01-05 23:37:39 -03:00
|
|
|
self.endpoint_groups = endpoint_groups.EndpointGroupManager(
|
|
|
|
self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.endpoint_policy = endpoint_policy.EndpointPolicyManager(
|
|
|
|
self._adapter)
|
|
|
|
self.endpoints = endpoints.EndpointManager(self._adapter)
|
2015-03-24 17:57:25 +00:00
|
|
|
self.domain_configs = domain_configs.DomainConfigManager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.domains = domains.DomainManager(self._adapter)
|
|
|
|
self.federation = federation.FederationManager(self._adapter)
|
|
|
|
self.groups = groups.GroupManager(self._adapter)
|
2018-06-11 19:19:03 +00:00
|
|
|
self.limits = limits.LimitManager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.oauth1 = oauth1.create_oauth_manager(self._adapter)
|
|
|
|
self.policies = policies.PolicyManager(self._adapter)
|
|
|
|
self.projects = projects.ProjectManager(self._adapter)
|
2018-01-24 21:46:52 +00:00
|
|
|
self.registered_limits = registered_limits.RegisteredLimitManager(
|
|
|
|
self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.regions = regions.RegionManager(self._adapter)
|
|
|
|
self.role_assignments = (
|
|
|
|
role_assignments.RoleAssignmentManager(self._adapter))
|
|
|
|
self.roles = roles.RoleManager(self._adapter)
|
2016-12-18 13:07:59 -08:00
|
|
|
self.inference_rules = roles.InferenceRuleManager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.services = services.ServiceManager(self._adapter)
|
2014-12-16 13:28:05 -06:00
|
|
|
self.simple_cert = simple_cert.SimpleCertManager(self._adapter)
|
2014-07-04 09:09:18 +10:00
|
|
|
self.tokens = tokens.TokenManager(self._adapter)
|
|
|
|
self.trusts = trusts.TrustManager(self._adapter)
|
|
|
|
self.users = users.UserManager(self._adapter)
|
2012-09-11 11:22:30 -05:00
|
|
|
|
2014-01-21 11:40:28 +10:00
|
|
|
# DEPRECATED: if session is passed then we go to the new behaviour of
|
|
|
|
# authenticating on the first required call.
|
|
|
|
if 'session' not in kwargs and self.management_url is None:
|
2013-07-18 15:54:41 +10:00
|
|
|
self.authenticate()
|
|
|
|
|
2012-09-11 11:20:16 -05:00
|
|
|
def serialize(self, entity):
|
2013-08-16 11:45:44 +10:00
|
|
|
return jsonutils.dumps(entity, sort_keys=True)
|
2013-02-13 22:52:05 -06:00
|
|
|
|
2013-10-22 09:41:00 +10:00
|
|
|
def process_token(self, **kwargs):
|
2013-06-21 19:04:50 +02:00
|
|
|
"""Extract and process information from the new auth_ref.
|
2013-02-13 22:52:05 -06:00
|
|
|
|
|
|
|
And set the relevant authentication information.
|
|
|
|
"""
|
2013-10-22 09:41:00 +10:00
|
|
|
super(Client, self).process_token(**kwargs)
|
2013-02-13 22:52:05 -06:00
|
|
|
if self.auth_ref.domain_scoped:
|
|
|
|
if not self.auth_ref.domain_id:
|
|
|
|
raise exceptions.AuthorizationFailure(
|
2014-10-27 10:54:48 -05:00
|
|
|
_("Token didn't provide domain_id"))
|
2014-01-10 16:38:55 +10:00
|
|
|
self._process_management_url(kwargs.get('region_name'))
|
2013-02-13 22:52:05 -06:00
|
|
|
self.domain_name = self.auth_ref.domain_name
|
|
|
|
self.domain_id = self.auth_ref.domain_id
|
2014-02-24 01:47:21 +01:00
|
|
|
if self._management_url:
|
|
|
|
self._management_url = self._management_url.replace('/v2.0', '/v3')
|
2013-02-13 22:52:05 -06:00
|
|
|
|
|
|
|
def get_raw_token_from_identity_service(self, auth_url, user_id=None,
|
|
|
|
username=None,
|
|
|
|
user_domain_id=None,
|
|
|
|
user_domain_name=None,
|
|
|
|
password=None,
|
|
|
|
domain_id=None, domain_name=None,
|
|
|
|
project_id=None, project_name=None,
|
|
|
|
project_domain_id=None,
|
|
|
|
project_domain_name=None,
|
2013-08-02 11:45:38 +01:00
|
|
|
token=None,
|
|
|
|
trust_id=None,
|
|
|
|
**kwargs):
|
2013-06-21 19:04:50 +02:00
|
|
|
"""Authenticate against the v3 Identity API.
|
2013-02-13 22:52:05 -06:00
|
|
|
|
2014-03-21 14:39:13 +10:00
|
|
|
If password and token methods are both provided then both methods will
|
|
|
|
be used in the request.
|
|
|
|
|
2014-01-21 11:40:28 +10:00
|
|
|
:returns: access.AccessInfo if authentication was successful.
|
2016-02-28 11:14:19 -06:00
|
|
|
:rtype: :class:`keystoneclient.access.AccessInfoV3`
|
2014-10-12 19:41:38 -05:00
|
|
|
:raises keystoneclient.exceptions.AuthorizationFailure: if unable to
|
|
|
|
authenticate or validate the existing authorization token.
|
|
|
|
:raises keystoneclient.exceptions.Unauthorized: if authentication fails
|
|
|
|
due to invalid token.
|
2013-02-13 22:52:05 -06:00
|
|
|
|
|
|
|
"""
|
|
|
|
try:
|
2014-01-21 11:40:28 +10:00
|
|
|
if auth_url is None:
|
2014-10-27 10:54:48 -05:00
|
|
|
raise ValueError(_("Cannot authenticate without an auth_url"))
|
2014-01-21 11:40:28 +10:00
|
|
|
|
2014-03-21 14:39:13 +10:00
|
|
|
auth_methods = []
|
|
|
|
|
|
|
|
if token:
|
|
|
|
auth_methods.append(v3_auth.TokenMethod(token=token))
|
|
|
|
|
|
|
|
if password:
|
|
|
|
m = v3_auth.PasswordMethod(user_id=user_id,
|
|
|
|
username=username,
|
|
|
|
user_domain_id=user_domain_id,
|
|
|
|
user_domain_name=user_domain_name,
|
|
|
|
password=password)
|
|
|
|
auth_methods.append(m)
|
|
|
|
|
|
|
|
if not auth_methods:
|
2014-10-27 10:54:48 -05:00
|
|
|
msg = _('A user and password or token is required.')
|
2014-03-21 14:39:13 +10:00
|
|
|
raise exceptions.AuthorizationFailure(msg)
|
|
|
|
|
|
|
|
plugin = v3_auth.Auth(auth_url, auth_methods,
|
|
|
|
trust_id=trust_id,
|
|
|
|
domain_id=domain_id,
|
|
|
|
domain_name=domain_name,
|
|
|
|
project_id=project_id,
|
|
|
|
project_name=project_name,
|
|
|
|
project_domain_id=project_domain_id,
|
|
|
|
project_domain_name=project_domain_name)
|
|
|
|
|
|
|
|
return plugin.get_auth_ref(self.session)
|
2013-02-13 22:52:05 -06:00
|
|
|
except (exceptions.AuthorizationFailure, exceptions.Unauthorized):
|
|
|
|
_logger.debug('Authorization failed.')
|
|
|
|
raise
|
2013-12-05 16:32:56 +10:00
|
|
|
except exceptions.EndpointNotFound:
|
2014-10-27 10:54:48 -05:00
|
|
|
msg = _('There was no suitable authentication url for this'
|
|
|
|
' request')
|
2013-12-05 16:32:56 +10:00
|
|
|
raise exceptions.AuthorizationFailure(msg)
|
2013-02-13 22:52:05 -06:00
|
|
|
except Exception as e:
|
2014-10-27 10:54:48 -05:00
|
|
|
raise exceptions.AuthorizationFailure(
|
|
|
|
_('Authorization failed: %s') % e)
|