Merge "Fix optional keyring support, add basic keyring tests"
This commit is contained in:
@@ -10,11 +10,17 @@ OpenStack Client interface. Handles the REST calls and responses.
|
|||||||
|
|
||||||
import copy
|
import copy
|
||||||
import logging
|
import logging
|
||||||
import sys
|
|
||||||
import urlparse
|
import urlparse
|
||||||
|
|
||||||
import requests
|
import requests
|
||||||
|
|
||||||
|
try:
|
||||||
|
import keyring
|
||||||
|
import pickle
|
||||||
|
except ImportError:
|
||||||
|
keyring = None
|
||||||
|
pickle = None
|
||||||
|
|
||||||
try:
|
try:
|
||||||
import json
|
import json
|
||||||
except ImportError:
|
except ImportError:
|
||||||
@@ -33,19 +39,6 @@ from keystoneclient import exceptions
|
|||||||
_logger = logging.getLogger(__name__)
|
_logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
def try_import_keyring():
|
|
||||||
try:
|
|
||||||
import keyring # noqa
|
|
||||||
import pickle # noqa
|
|
||||||
return True
|
|
||||||
except ImportError:
|
|
||||||
if (hasattr(sys.stderr, 'isatty') and sys.stderr.isatty()):
|
|
||||||
print >> sys.stderr, 'Failed to load keyring modules.'
|
|
||||||
else:
|
|
||||||
_logger.warning('Failed to load keyring modules.')
|
|
||||||
return False
|
|
||||||
|
|
||||||
|
|
||||||
class HTTPClient(object):
|
class HTTPClient(object):
|
||||||
|
|
||||||
USER_AGENT = 'python-keystoneclient'
|
USER_AGENT = 'python-keystoneclient'
|
||||||
@@ -121,7 +114,9 @@ class HTTPClient(object):
|
|||||||
requests.logging.getLogger(requests.__name__).addHandler(ch)
|
requests.logging.getLogger(requests.__name__).addHandler(ch)
|
||||||
|
|
||||||
# keyring setup
|
# keyring setup
|
||||||
self.use_keyring = use_keyring and try_import_keyring()
|
if use_keyring and keyring is None:
|
||||||
|
_logger.warning('Failed to load keyring modules.')
|
||||||
|
self.use_keyring = use_keyring and keyring is not None
|
||||||
self.force_new_token = force_new_token
|
self.force_new_token = force_new_token
|
||||||
self.stale_duration = stale_duration or access.STALE_TOKEN_DURATION
|
self.stale_duration = stale_duration or access.STALE_TOKEN_DURATION
|
||||||
self.stale_duration = int(self.stale_duration)
|
self.stale_duration = int(self.stale_duration)
|
||||||
@@ -233,6 +228,7 @@ class HTTPClient(object):
|
|||||||
Otherwise, (keyring_key, None) is returned.
|
Otherwise, (keyring_key, None) is returned.
|
||||||
|
|
||||||
:returns: (keyring_key, auth_ref) or (keyring_key, None)
|
:returns: (keyring_key, auth_ref) or (keyring_key, None)
|
||||||
|
:returns: or (None, None) if use_keyring is not set in the object
|
||||||
|
|
||||||
"""
|
"""
|
||||||
keyring_key = None
|
keyring_key = None
|
||||||
@@ -246,7 +242,7 @@ class HTTPClient(object):
|
|||||||
keyring_key)
|
keyring_key)
|
||||||
if auth_ref:
|
if auth_ref:
|
||||||
auth_ref = pickle.loads(auth_ref)
|
auth_ref = pickle.loads(auth_ref)
|
||||||
if self.auth_ref.will_expire_soon(self.stale_duration):
|
if auth_ref.will_expire_soon(self.stale_duration):
|
||||||
# token has expired, don't use it
|
# token has expired, don't use it
|
||||||
auth_ref = None
|
auth_ref = None
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
|
126
tests/test_keyring.py
Normal file
126
tests/test_keyring.py
Normal file
@@ -0,0 +1,126 @@
|
|||||||
|
import datetime
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from keystoneclient import access
|
||||||
|
from keystoneclient import client
|
||||||
|
from keystoneclient.openstack.common import timeutils
|
||||||
|
from tests import client_fixtures
|
||||||
|
from tests import utils
|
||||||
|
|
||||||
|
try:
|
||||||
|
import keyring # noqa
|
||||||
|
import pickle # noqa
|
||||||
|
except ImportError:
|
||||||
|
keyring = None
|
||||||
|
|
||||||
|
PROJECT_SCOPED_TOKEN = client_fixtures.PROJECT_SCOPED_TOKEN
|
||||||
|
|
||||||
|
# These mirror values from PROJECT_SCOPED_TOKEN
|
||||||
|
USERNAME = 'exampleuser'
|
||||||
|
AUTH_URL = 'http://public.com:5000/v2.0'
|
||||||
|
TOKEN = '04c7d5ffaeef485f9dc69c06db285bdb'
|
||||||
|
|
||||||
|
PASSWORD = 'password'
|
||||||
|
TENANT = 'tenant'
|
||||||
|
TENANT_ID = 'tenant_id'
|
||||||
|
|
||||||
|
|
||||||
|
class KeyringTest(utils.TestCase):
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def setUpClass(cls):
|
||||||
|
super(KeyringTest, cls).setUpClass()
|
||||||
|
|
||||||
|
if keyring is None:
|
||||||
|
raise unittest.SkipTest(
|
||||||
|
'optional package keyring or pickle is not installed')
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
class MemoryKeyring(keyring.backend.KeyringBackend):
|
||||||
|
"""Simple memory keyring with support for multiple keys"""
|
||||||
|
def __init__(self):
|
||||||
|
self.passwords = {}
|
||||||
|
|
||||||
|
def supported(self):
|
||||||
|
return 1
|
||||||
|
|
||||||
|
def get_password(self, service, username):
|
||||||
|
key = username + '@' + service
|
||||||
|
if key not in self.passwords:
|
||||||
|
return None
|
||||||
|
return self.passwords[key]
|
||||||
|
|
||||||
|
def set_password(self, service, username, password):
|
||||||
|
key = username + '@' + service
|
||||||
|
self.passwords[key] = password
|
||||||
|
|
||||||
|
super(KeyringTest, self).setUp()
|
||||||
|
keyring.set_keyring(MemoryKeyring())
|
||||||
|
|
||||||
|
def test_no_keyring_key(self):
|
||||||
|
"""
|
||||||
|
Ensure that we get no value back if we don't have use_keyring
|
||||||
|
set in the client.
|
||||||
|
"""
|
||||||
|
cl = client.HTTPClient(username=USERNAME, password=PASSWORD,
|
||||||
|
tenant_id=TENANT_ID, auth_url=AUTH_URL)
|
||||||
|
|
||||||
|
(keyring_key, auth_ref) = cl.get_auth_ref_from_keyring(AUTH_URL,
|
||||||
|
USERNAME,
|
||||||
|
TENANT,
|
||||||
|
TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
|
||||||
|
self.assertIsNone(keyring_key)
|
||||||
|
self.assertIsNone(auth_ref)
|
||||||
|
|
||||||
|
def test_build_keyring_key(self):
|
||||||
|
cl = client.HTTPClient(username=USERNAME, password=PASSWORD,
|
||||||
|
tenant_id=TENANT_ID, auth_url=AUTH_URL)
|
||||||
|
|
||||||
|
keyring_key = cl._build_keyring_key(AUTH_URL, USERNAME,
|
||||||
|
TENANT, TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
|
||||||
|
self.assertEqual(keyring_key,
|
||||||
|
'%s/%s/%s/%s/%s' %
|
||||||
|
(AUTH_URL, USERNAME, TENANT, TENANT_ID, TOKEN))
|
||||||
|
|
||||||
|
def test_set_and_get_keyring_expired(self):
|
||||||
|
cl = client.HTTPClient(username=USERNAME, password=PASSWORD,
|
||||||
|
tenant_id=TENANT_ID, auth_url=AUTH_URL,
|
||||||
|
use_keyring=True)
|
||||||
|
keyring_key = cl._build_keyring_key(AUTH_URL, USERNAME,
|
||||||
|
TENANT, TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
|
||||||
|
cl.auth_ref = access.AccessInfo(PROJECT_SCOPED_TOKEN['access'])
|
||||||
|
expired = timeutils.utcnow() - datetime.timedelta(minutes=30)
|
||||||
|
cl.auth_ref['token']['expires'] = timeutils.isotime(expired)
|
||||||
|
cl.store_auth_ref_into_keyring(keyring_key)
|
||||||
|
(keyring_key, auth_ref) = cl.get_auth_ref_from_keyring(AUTH_URL,
|
||||||
|
USERNAME,
|
||||||
|
TENANT,
|
||||||
|
TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
self.assertIsNone(auth_ref)
|
||||||
|
|
||||||
|
def test_set_and_get_keyring(self):
|
||||||
|
cl = client.HTTPClient(username=USERNAME, password=PASSWORD,
|
||||||
|
tenant_id=TENANT_ID, auth_url=AUTH_URL,
|
||||||
|
use_keyring=True)
|
||||||
|
keyring_key = cl._build_keyring_key(AUTH_URL, USERNAME,
|
||||||
|
TENANT, TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
|
||||||
|
cl.auth_ref = access.AccessInfo(PROJECT_SCOPED_TOKEN['access'])
|
||||||
|
expires = timeutils.utcnow() + datetime.timedelta(minutes=30)
|
||||||
|
cl.auth_ref['token']['expires'] = timeutils.isotime(expires)
|
||||||
|
cl.store_auth_ref_into_keyring(keyring_key)
|
||||||
|
(keyring_key, auth_ref) = cl.get_auth_ref_from_keyring(AUTH_URL,
|
||||||
|
USERNAME,
|
||||||
|
TENANT,
|
||||||
|
TENANT_ID,
|
||||||
|
TOKEN)
|
||||||
|
self.assertEqual(auth_ref.auth_token, TOKEN)
|
||||||
|
self.assertEqual(auth_ref.username, USERNAME)
|
Reference in New Issue
Block a user