Improve usability of CLI.

* Fixes bug #936422
  * Fixes bug #932223
  * Depends on bcwaldon's review: https://review.openstack.org/#change,4305
  * This review proposes making changes outlined in this spreadsheet:
    https://docs.google.com/spreadsheet/ccc?key=0Ak6TA47h_6fwdGZwRE5WWEJBdEhnckpMTG5RcWFjY3c#gid=0
    This cleans up the CLI, normalizing commands and arguments, correcting
    optional and required arguments and flags.
  * included https://review.openstack.org/4270 here per Brian's request

  Note that some commands have changed names to conform to noun-verb form:
  user-update-password  ->  user-password-update
  add-user-role  ->  user-role-add
  remove-user-role  ->  user-role-remove
  ec2-create-credentials  ->  ec2-credentials-create
  ec2-list-credentials  ->  ec2-credentials-list
  ec2-delete-credentials  ->  ec2-credentials-delete
  token  ->  token-get

Change-Id: I8128fa105a1b8002199211f9e475b1a7a6229b8c
This commit is contained in:
jakedahn
2012-02-21 15:02:41 -08:00
committed by Dean Troyer
parent 1f75cab683
commit 2a1c94a753
5 changed files with 203 additions and 169 deletions

View File

@@ -66,28 +66,66 @@ can specify the one you want with ``--region_name`` (or
You'll find complete documentation on the shell by running
``keystone help``::
usage: keystone [--username user] [--password password]
[--tenant_name tenant] [--auth_url URL]
<subcommand> ...
usage: keystone [--username USERNAME] [--password PASSWORD]
[--tenant_name TENANT_NAME] [--tenant_id TENANT_ID]
[--auth_url AUTH_URL] [--region_name REGION_NAME]
[--identity_api_version IDENTITY_API_VERSION] [--token TOKEN]
[--endpoint ENDPOINT]
<subcommand> ...
Command-line interface to the OpenStack Keystone API.
Positional arguments:
<subcommand>
add-fixed-ip Add a new fixed IP address to a servers network.
catalog List service catalog, possibly filtered by service.
ec2-credentials-create
Create EC2-compatibile credentials for user per tenant
ec2-credentials-delete
Delete EC2-compatibile credentials
ec2-credentials-list
List EC2-compatibile credentials for a user
endpoint-get Find endpoint filtered by a specific attribute or
service type
role-create Create new role
role-delete Delete role
role-get Display role details
role-list List all available roles
service-create Add service to Service Catalog
service-delete Delete service from Service Catalog
service-get Display service from Service Catalog
service-list List all services in Service Catalog
tenant-create Create new tenant
tenant-delete Delete tenant
tenant-get Display tenant details
tenant-list List all tenants
tenant-update Update tenant name, description, enabled status
token-get Display the current user token
user-create Create new user
user-delete Delete user
user-list List users
user-password-update
Update user password
user-role-add Add role to user
user-role-remove Remove role from user
user-update Update user's name, email, and enabled status
discover Discover Keystone servers and show authentication
protocols and
help Display help about this program or one of its
subcommands.
Optional arguments:
--username USER Defaults to env[OS_USERNAME].
--password PASSWORD Defaults to env[OS_PASSWORD].
--tenant_name TENANT_NAME Defaults to env[OS_TENANT_NAME].
--tenant_id TENANT_ID Defaults to env[OS_TENANT_ID].
--url AUTH_URL Defaults to env[OS_AUTH_URL].
--username USERNAME Defaults to env[OS_USERNAME]
--password PASSWORD Defaults to env[OS_PASSWORD]
--tenant_name TENANT_NAME
Defaults to env[OS_TENANT_NAME]
--tenant_id TENANT_ID
Defaults to env[OS_TENANT_ID]
--auth_url AUTH_URL Defaults to env[OS_AUTH_URL]
--region_name REGION_NAME
Defaults to env[OS_REGION_NAME]
--identity_api_version IDENTITY_API_VERSION
Defaults to env[OS_IDENTITY_API_VERSION] or 2.0.
--region_name NAME The region name in the Keystone Service
Catalog to use after authentication.
Defaults to env[KEYSTONE_REGION_NAME] or the
first item in the list returned.
Defaults to env[OS_IDENTITY_API_VERSION] or 2.0
--token TOKEN Defaults to env[SERVICE_TOKEN]
--endpoint ENDPOINT Defaults to env[SERVICE_ENDPOINT]
See "keystone help COMMAND" for help on a specific command.
See "keystone help COMMAND" for help on a specific command.

View File

@@ -66,41 +66,41 @@ class OpenStackIdentityShell(object):
action='store_true',
help=argparse.SUPPRESS)
parser.add_argument('--token',
default=env('SERVICE_TOKEN'),
help='Defaults to env[SERVICE_TOKEN].')
parser.add_argument('--endpoint',
default=env('SERVICE_ENDPOINT'),
help='Defaults to env[SERVICE_ENDPOINT].')
parser.add_argument('--username',
default=env('OS_USERNAME'),
help='Defaults to env[OS_USERNAME].')
help='Defaults to env[OS_USERNAME]')
parser.add_argument('--password',
default=env('OS_PASSWORD'),
help='Defaults to env[OS_PASSWORD].')
help='Defaults to env[OS_PASSWORD]')
parser.add_argument('--tenant_name',
default=env('OS_TENANT_NAME'),
help='Defaults to env[OS_TENANT_NAME].')
help='Defaults to env[OS_TENANT_NAME]')
parser.add_argument('--tenant_id',
default=env('OS_TENANT_ID'),
help='Defaults to env[OS_TENANT_ID].')
help='Defaults to env[OS_TENANT_ID]')
parser.add_argument('--auth_url',
default=env('OS_AUTH_URL'),
help='Defaults to env[OS_AUTH_URL].')
help='Defaults to env[OS_AUTH_URL]')
parser.add_argument('--region_name',
default=env('OS_REGION_NAME'),
help='Defaults to env[OS_REGION_NAME].')
help='Defaults to env[OS_REGION_NAME]')
parser.add_argument('--identity_api_version',
default=env('OS_IDENTITY_API_VERSION', 'KEYSTONE_VERSION'),
help='Defaults to env[OS_IDENTITY_API_VERSION] or 2.0.')
help='Defaults to env[OS_IDENTITY_API_VERSION] or 2.0')
parser.add_argument('--token',
default=env('SERVICE_TOKEN'),
help='Defaults to env[SERVICE_TOKEN]')
parser.add_argument('--endpoint',
default=env('SERVICE_ENDPOINT'),
help='Defaults to env[SERVICE_ENDPOINT]')
return parser

View File

@@ -88,3 +88,7 @@ def isunauthenticated(f):
set to True, False otherwise.
"""
return getattr(f, 'unauthenticated', False)
def string_to_bool(arg):
return arg.strip().lower() in ('t', 'true', 'yes', '1')

View File

@@ -21,108 +21,107 @@ from keystoneclient import utils
CLIENT_CLASS = client.Client
@utils.arg('tenant', metavar='<tenant_id>', nargs='?',
help='ID of Tenant. (Optional)', default=None)
@utils.arg('tenant', metavar='<tenant-id>', nargs='?', default=None,
help='Tenant ID (Optional); lists all users if not specified')
def do_user_list(kc, args):
"""List users"""
users = kc.users.list(tenant_id=args.tenant)
utils.print_list(users, ['id', 'enabled', 'email', 'name', 'tenantId'])
utils.print_list(users, ['id', 'enabled', 'email', 'name'])
@utils.arg('--name', metavar='<name>', nargs='?',
help='Desired username. (unique)')
@utils.arg('--pass', metavar='<pass>', nargs='?',
dest='passwd',
help='Desired password.')
@utils.arg('--email', metavar='<email>', nargs='?',
help='Desired email address. (unique)')
@utils.arg('--tenant_id', metavar='<tenant>', nargs='?',
help='User will join the default tenant as a Member.')
@utils.arg('--enabled', metavar='<enabled>', nargs='?', default=True,
help='Enable user immediately (Optional, default True)')
@utils.arg('--name', metavar='<user-name>', required=True,
help='New user name (must be unique)')
@utils.arg('--tenant_id', metavar='<tenant-id>',
help='New user default tenant')
@utils.arg('--pass', metavar='<pass>', dest='passwd',
help='New user password')
@utils.arg('--email', metavar='<email>',
help='New user email address')
@utils.arg('--enabled', metavar='<true|false>', default=True,
help='Initial user enabled status (default true)')
def do_user_create(kc, args):
"""Create new user"""
user = kc.users.create(args.name, args.passwd, args.email,
tenant_id=args.tenant_id, enabled=args.enabled)
utils.print_dict(user._info)
@utils.arg('id', metavar='<user_id>', help='User ID to update.')
@utils.arg('name', metavar='<name>', nargs='?',
help='New desired user name.')
@utils.arg('email', metavar='<email>', nargs='?',
help='New desired email address.')
@utils.arg('--name', metavar='<user-name>',
help='Desired new user name')
@utils.arg('--email', metavar='<email>',
help='Desired new email address')
@utils.arg('--enabled', metavar='<true|false>',
help='Enable or disable user')
@utils.arg('id', metavar='<user-id>', help='User ID to update')
def do_user_update(kc, args):
user = kc.users.update(args.id, name=args.name, email=args.email)
utils.print_dict(user._info)
"""Update user's name, email, and enabled status"""
kwargs = {}
if args.name:
kwargs['name'] = args.name
if args.email:
kwargs['email'] = args.email
if args.enabled:
kwargs['enabled'] = utils.string_to_bool(args.enabled)
if not len(kwargs):
print "User not updated, no arguments present."
return
@utils.arg('id', metavar='<user_id>', nargs='?', help='User ID to enable.')
def do_user_enable(kc, args):
try:
kc.users.update_enabled(args.id, True)
print 'User has been enabled.'
except:
print 'Unable to enable user.'
kc.users.update(args.id, **kwargs)
print 'User has been updated.'
except Exception, e:
print 'Unable to update user: %s' % e
@utils.arg('id', metavar='<user_id>', nargs='?', help='User ID to disable.')
def do_user_disable(kc, args):
try:
kc.users.update_enabled(args.id, False)
print 'User has been disabled.'
except:
print 'Unable to disable user.'
@utils.arg('--pass', metavar='<password>', required=True,
help='Desired new password')
@utils.arg('id', metavar='<user-id>', help='User ID to update')
def do_user_password_update(kc, args):
"""Update user password"""
kc.users.update_password(args.id, args.password)
@utils.arg('id', metavar='<user_id>', help='User ID to update.')
@utils.arg('password', metavar='<password>', help='New desired password.')
def do_user_update_password(kc, args):
try:
kc.users.update_password(args.id, args.password)
print 'User password has been udpated.'
except:
print 'Unable to update users password.'
@utils.arg('id', metavar='<user_id>', help='User ID to delete.')
@utils.arg('id', metavar='<user-id>', help='User ID to delete')
def do_user_delete(kc, args):
try:
kc.users.delete(args.id)
print 'User has been deleted.'
except:
print 'Unable to delete user.'
"""Delete user"""
kc.users.delete(args.id)
def do_tenant_list(kc, args):
"""List all tenants"""
tenants = kc.tenants.list()
utils.print_list(tenants, ['id', 'name', 'enabled'])
@utils.arg('id', metavar='<tenant_id>', help='Tenant ID to show.')
@utils.arg('id', metavar='<tenant-id>', help='Tenant ID to display')
def do_tenant_get(kc, args):
"""Display tenant details"""
tenant = kc.tenants.get(args.id)
utils.print_dict(tenant._info)
@utils.arg('--name', metavar='<tenant_name>', nargs='?',
help='Desired name of new tenant.')
@utils.arg('--description', metavar='<description>', nargs='?', default=None,
help='Useful description of new tenant (optional, default is None)')
@utils.arg('--enabled', metavar='<True/False>', nargs='?', default=True,
help='Enable user immediately (Optional, default True)')
@utils.arg('--name', metavar='<tenant-name>', required=True,
help='New tenant name (must be unique)')
@utils.arg('--description', metavar='<tenant-description>', default=None,
help='Description of new tenant (default is none)')
@utils.arg('--enabled', metavar='<true|false>', default=True,
help='Initial tenant enabled status (default true)')
def do_tenant_create(kc, args):
"""Create new tenant"""
tenant = kc.tenants.create(args.name,
description=args.description,
enabled=args.enabled)
utils.print_dict(tenant._info)
@utils.arg('--name', metavar='<tenant_name>', nargs='?',
help='Desired name of tenant.')
@utils.arg('--description', metavar='<description>', nargs='?', default=None,
help='Desired description of tenant')
@utils.arg('--enabled', metavar='<True/False>', nargs='?', const=True,
help='Enable/disable tenant')
@utils.arg('id', metavar='<tenant_id>', help='Tenant ID to update')
@utils.arg('--name', metavar='<tenant_name>',
help='Desired new name of tenant')
@utils.arg('--description', metavar='<tenant-description>', default=None,
help='Desired new description of tenant')
@utils.arg('--enabled', metavar='<true|false>',
help='Enable or disable tenant')
@utils.arg('id', metavar='<tenant-id>', help='Tenant ID to update')
def do_tenant_update(kc, args):
"""Update tenant name, description, enabled status"""
tenant = kc.tenants.get(args.id)
@@ -138,31 +137,24 @@ def do_tenant_update(kc, args):
if kwargs == {}:
print "Tenant not updated, no arguments present."
return
try:
tenant.update(**kwargs)
print 'Tenant has been updated.'
except Exception, e:
print 'Unable to update tenant: %s' % e
tenant.update(**kwargs)
@utils.arg('id', metavar='<tenant_id>', help='Tenant ID to delete')
@utils.arg('id', metavar='<tenant-id>', help='Tenant ID to delete')
def do_tenant_delete(kc, args):
try:
kc.tenants.delete(args.id)
print 'Tenant has been deleted.'
except:
print 'Unable to delete tenant.'
"""Delete tenant"""
kc.tenants.delete(args.id)
@utils.arg('--name', metavar='<name>',
help='Desired name of service. (unique)')
@utils.arg('--type', metavar='<type>',
help='Possible service types: identity, compute, network, \
image, or object-store.')
@utils.arg('--description', metavar='<service_description>', nargs='?',
help='Useful description of service.')
@utils.arg('--name', metavar='<name>', required=True,
help='Name of new service (must be unique)')
@utils.arg('--type', metavar='<type>', required=True,
help='Service type (one of: identity, compute, network, '
'image, or object-store)')
@utils.arg('--description', metavar='<service-description>',
help='Description of service')
def do_service_create(kc, args):
"""Add service to Service Catalog"""
service = kc.services.create(args.name,
args.type,
args.description)
@@ -170,98 +162,98 @@ def do_service_create(kc, args):
def do_service_list(kc, args):
"""List all services in Service Catalog"""
services = kc.services.list()
utils.print_list(services, ['id', 'name', 'type', 'description'])
@utils.arg('id', metavar='<service_id>', help='ID of Service to retrieve.')
@utils.arg('id', metavar='<service-id>', help='Service ID to display')
def do_service_get(kc, args):
"""Display service from Service Catalog"""
service = kc.services.get(args.id)
utils.print_dict(service._info)
@utils.arg('id', metavar='<service_id>', help='ID of Service to delete')
@utils.arg('id', metavar='<service-id>', help='Service ID to delete')
def do_service_delete(kc, args):
try:
kc.services.delete(args.id)
print 'Service has been deleted'
except:
print 'Unable to delete service.'
"""Delete service from Service Catalog"""
kc.services.delete(args.id)
def do_role_list(kc, args):
"""List all available roles"""
roles = kc.roles.list()
utils.print_list(roles, ['id', 'name'])
@utils.arg('id', metavar='<role_id>', help='ID of Role to fetch.')
@utils.arg('id', metavar='<role-id>', help='Role ID to display')
def do_role_get(kc, args):
"""Display role details"""
role = kc.roles.get(args.id)
utils.print_dict(role._info)
@utils.arg('--name', metavar='<name>', help='Desired name of new role.')
@utils.arg('--name', metavar='<role-name>', required=True,
help='Name of new role')
def do_role_create(kc, args):
"""Create new role"""
role = kc.roles.create(args.name)
utils.print_dict(role._info)
@utils.arg('id', metavar='<role_id>', help='ID of Role to delete.')
@utils.arg('id', metavar='<role-id>', help='Role ID to delete')
def do_role_delete(kc, args):
try:
kc.roles.delete(args.id)
print 'Role has been deleted.'
except:
print 'Unable to delete role.'
"""Delete role"""
kc.roles.delete(args.id)
# TODO(jakedahn): refactor this to allow role, user, and tenant names.
@utils.arg('user_id', metavar='<user_id>', help='ID of User')
@utils.arg('role_id', metavar='<role_id>', help='ID of Role')
@utils.arg('tenant', metavar='<tenant_id>',
help='ID of Tenant', nargs='?')
def do_add_user_role(kc, args):
kc.roles.add_user_role(args.user_id, args.role_id, args.tenant)
@utils.arg('--user', metavar='<user-id>', required=True, help='User ID')
@utils.arg('--role', metavar='<role-id>', required=True, help='Role ID')
@utils.arg('--tenant_id', metavar='<tenant-id>', help='Tenant ID')
def do_user_role_add(kc, args):
"""Add role to user"""
kc.roles.add_user_role(args.user, args.role, args.tenant_id)
# TODO(jakedahn): refactor this to allow role, user, and tenant names.
@utils.arg('user_id', metavar='<user_id>', help='ID of User')
@utils.arg('role_id', metavar='<role_id>', help='ID of Role')
@utils.arg('tenant', metavar='<tenant_id>',
help='ID of Tenant', nargs='?')
def do_remove_user_role(kc, args):
kc.roles.remove_user_role(args.user_id, args.role_id, args.tenant)
@utils.arg('--user', metavar='<user-id>', required=True, help='User ID')
@utils.arg('--role', metavar='<role-id>', required=True, help='Role ID')
@utils.arg('--tenant_id', metavar='<tenant-id>', help='Tenant ID')
def do_user_role_remove(kc, args):
"""Remove role from user"""
kc.roles.remove_user_role(args.user, args.role, args.tenant_id)
@utils.arg('--tenant_id', metavar='<tenant_id>', help='ID of Tenant')
@utils.arg('--user_id', metavar='<user_id>', help='ID of User')
def do_ec2_create_credentials(kc, args):
credentials = kc.ec2.create(args.user_id, args.tenant_id)
@utils.arg('--user', metavar='<user-id>', required=True, help='User ID')
@utils.arg('--tenant_id', metavar='<tenant-id>', required=True,
help='Tenant ID')
def do_ec2_credentials_create(kc, args):
"""Create EC2-compatibile credentials for user per tenant"""
credentials = kc.ec2.create(args.user, args.tenant_id)
utils.print_dict(credentials._info)
@utils.arg('user_id', metavar='<user_id>', help='ID of User')
def do_ec2_list_credentials(kc, args):
credentials = kc.ec2.list(args.user_id)
@utils.arg('--user', metavar='<user-id>', help='User ID to list')
def do_ec2_credentials_list(kc, args):
"""List EC2-compatibile credentials for a user"""
credentials = kc.ec2.list(args.user)
for cred in credentials:
cred.tenant = kc.tenants.get(cred.tenant_id).name
utils.print_list(credentials, ['tenant', 'key', 'secret'])
@utils.arg('user_id', metavar='<user_id>', help='ID of User')
@utils.arg('key', metavar='<access_key>', help='Access Key')
def do_ec2_delete_credentials(kc, args):
try:
kc.ec2.delete(args.user_id, args.key)
print 'Deleted EC2 Credentials.'
except:
print 'Unable to delete EC2 Credentials.'
@utils.arg('--user', metavar='<user-id>', help='User ID')
@utils.arg('--key', metavar='<access-key>', help='Access Key')
def do_ec2_credentials_delete(kc, args):
"""Delete EC2-compatibile credentials"""
kc.ec2.delete(args.user, args.key)
@utils.arg('--service', metavar='<service_type>',
help='Service type to return', nargs='?', default=None)
@utils.arg('--service', metavar='<service-type>', default=None,
help='Service type to return')
def do_catalog(kc, args):
"""List service catalog, possibly filtered by service"""
"""List service catalog, possibly filtered by service."""
endpoints = kc.service_catalog.get_endpoints(service_type=args.service)
for (service, service_endpoints) in endpoints.iteritems():
if len(service_endpoints) > 0:
@@ -270,14 +262,14 @@ def do_catalog(kc, args):
utils.print_dict(ep)
@utils.arg('--endpoint_type', metavar='<endpoint_type>',
help='Endpoint type to select', nargs='?', default='publicURL')
@utils.arg('--service', metavar='<service_type>',
help='Service type to select', nargs='?', required=True)
@utils.arg('--attr', metavar='<attribute>',
help='Attribute to match', nargs='?')
@utils.arg('--service', metavar='<service-type>', required=True,
help='Service type to select')
@utils.arg('--endpoint_type', metavar='<endpoint-type>', default='publicURL',
help='Endpoint type to select')
@utils.arg('--attr', metavar='<service-attribute>',
help='Service attribute to match for selection')
@utils.arg('--value', metavar='<value>',
help='Value of attribute to match', nargs='?')
help='Value of attribute to match')
def do_endpoint_get(kc, args):
"""Find endpoint filtered by a specific attribute or service type"""
kwargs = {
@@ -295,6 +287,6 @@ def do_endpoint_get(kc, args):
utils.print_dict({'%s.%s' % (args.service, args.endpoint_type): url})
def do_token(kc, args):
"""Fetch the current user's token"""
def do_token_get(kc, args):
"""Display the current user token"""
utils.print_dict(kc.service_catalog.get_token())

View File

@@ -40,7 +40,7 @@ class UserManager(base.ManagerWithFind):
"""
Update user data.
Supported arguments include ``name`` and ``email``.
Supported arguments include ``name``, ``email``, and ``enabled``.
"""
# FIXME(gabriel): "tenantId" seems to be accepted by the API but
# fails to actually update the default tenant.