
The Oslo team has moved all previously incubated code from the openstack/oslo-incubator repository into separate library repositories and released those libraries to the Python Package Index. Many of our big tent project teams are still using the old, unsupported, incubated versions of the code. The Oslo team has been working to remove that incubated code from projects, and the time has come to finish that work. As one of community-wide goals in Ocata, please see: https://github.com/openstack/governance/blob/master/goals/ocata/remove-incubated-oslo-code.rst Note: This commit also fix pep8 violations. Change-Id: I03288adb94c702d1d63df88ef9ba33a2ff59eaa3
219 lines
6.8 KiB
Python
219 lines
6.8 KiB
Python
# Copyright 2013 OpenStack Foundation
|
|
# Copyright 2013 Spanish National Research Council.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
# E0202: An attribute inherited from %s hide this method
|
|
# pylint: disable=E0202
|
|
|
|
import abc
|
|
import argparse
|
|
import os
|
|
|
|
import six
|
|
from stevedore import extension
|
|
|
|
from manilaclient.common.apiclient import exceptions
|
|
|
|
|
|
_discovered_plugins = {}
|
|
|
|
|
|
def discover_auth_systems():
|
|
"""Discover the available auth-systems.
|
|
|
|
This won't take into account the old style auth-systems.
|
|
"""
|
|
global _discovered_plugins
|
|
_discovered_plugins = {}
|
|
|
|
def add_plugin(ext):
|
|
_discovered_plugins[ext.name] = ext.plugin
|
|
|
|
ep_namespace = "manilaclient.common.apiclient.auth"
|
|
mgr = extension.ExtensionManager(ep_namespace)
|
|
mgr.map(add_plugin)
|
|
|
|
|
|
def load_auth_system_opts(parser):
|
|
"""Load options needed by the available auth-systems into a parser.
|
|
|
|
This function will try to populate the parser with options from the
|
|
available plugins.
|
|
"""
|
|
group = parser.add_argument_group("Common auth options")
|
|
BaseAuthPlugin.add_common_opts(group)
|
|
for name, auth_plugin in six.iteritems(_discovered_plugins):
|
|
group = parser.add_argument_group(
|
|
"Auth-system '%s' options" % name,
|
|
conflict_handler="resolve")
|
|
auth_plugin.add_opts(group)
|
|
|
|
|
|
def load_plugin(auth_system):
|
|
try:
|
|
plugin_class = _discovered_plugins[auth_system]
|
|
except KeyError:
|
|
raise exceptions.AuthSystemNotFound(auth_system)
|
|
return plugin_class(auth_system=auth_system)
|
|
|
|
|
|
def load_plugin_from_args(args):
|
|
"""Load required plugin and populate it with options.
|
|
|
|
Try to guess auth system if it is not specified. Systems are tried in
|
|
alphabetical order.
|
|
|
|
:type args: argparse.Namespace
|
|
:raises: AuthPluginOptionsMissing
|
|
"""
|
|
auth_system = args.os_auth_system
|
|
if auth_system:
|
|
plugin = load_plugin(auth_system)
|
|
plugin.parse_opts(args)
|
|
plugin.sufficient_options()
|
|
return plugin
|
|
|
|
for plugin_auth_system in sorted(six.iterkeys(_discovered_plugins)):
|
|
plugin_class = _discovered_plugins[plugin_auth_system]
|
|
plugin = plugin_class()
|
|
plugin.parse_opts(args)
|
|
try:
|
|
plugin.sufficient_options()
|
|
except exceptions.AuthPluginOptionsMissing:
|
|
continue
|
|
return plugin
|
|
raise exceptions.AuthPluginOptionsMissing(["auth_system"])
|
|
|
|
|
|
@six.add_metaclass(abc.ABCMeta)
|
|
class BaseAuthPlugin(object):
|
|
"""Base class for authentication plugins.
|
|
|
|
An authentication plugin needs to override at least the authenticate
|
|
method to be a valid plugin.
|
|
"""
|
|
|
|
auth_system = None
|
|
opt_names = []
|
|
common_opt_names = [
|
|
"auth_system",
|
|
"username",
|
|
"password",
|
|
"tenant_name",
|
|
"token",
|
|
"auth_url",
|
|
]
|
|
|
|
def __init__(self, auth_system=None, **kwargs):
|
|
self.auth_system = auth_system or self.auth_system
|
|
self.opts = dict((name, kwargs.get(name))
|
|
for name in self.opt_names)
|
|
|
|
@staticmethod
|
|
def _parser_add_opt(parser, opt):
|
|
"""Add an option to parser in two variants.
|
|
|
|
:param opt: option name (with underscores)
|
|
"""
|
|
dashed_opt = opt.replace("_", "-")
|
|
env_var = "OS_%s" % opt.upper()
|
|
arg_default = os.environ.get(env_var, "")
|
|
arg_help = "Defaults to env[%s]." % env_var
|
|
parser.add_argument(
|
|
"--os-%s" % dashed_opt,
|
|
metavar="<%s>" % dashed_opt,
|
|
default=arg_default,
|
|
help=arg_help)
|
|
parser.add_argument(
|
|
"--os_%s" % opt,
|
|
metavar="<%s>" % dashed_opt,
|
|
help=argparse.SUPPRESS)
|
|
|
|
@classmethod
|
|
def add_opts(cls, parser):
|
|
"""Populate the parser with the options for this plugin."""
|
|
for opt in cls.opt_names:
|
|
# use `BaseAuthPlugin.common_opt_names` since it is never
|
|
# changed in child classes
|
|
if opt not in BaseAuthPlugin.common_opt_names:
|
|
cls._parser_add_opt(parser, opt)
|
|
|
|
@classmethod
|
|
def add_common_opts(cls, parser):
|
|
"""Add options that are common for several plugins."""
|
|
for opt in cls.common_opt_names:
|
|
cls._parser_add_opt(parser, opt)
|
|
|
|
@staticmethod
|
|
def get_opt(opt_name, args):
|
|
"""Return option name and value.
|
|
|
|
:param opt_name: name of the option, e.g., "username"
|
|
:param args: parsed arguments
|
|
"""
|
|
return (opt_name, getattr(args, "os_%s" % opt_name, None))
|
|
|
|
def parse_opts(self, args):
|
|
"""Parse the actual auth-system options if any.
|
|
|
|
This method is expected to populate the attribute `self.opts` with a
|
|
dict containing the options and values needed to make authentication.
|
|
"""
|
|
self.opts.update(dict(self.get_opt(opt_name, args)
|
|
for opt_name in self.opt_names))
|
|
|
|
def authenticate(self, http_client):
|
|
"""Authenticate using plugin defined method.
|
|
|
|
The method usually analyses `self.opts` and performs
|
|
a request to authentication server.
|
|
|
|
:param http_client: client object that needs authentication
|
|
:type http_client: HTTPClient
|
|
:raises: AuthorizationFailure
|
|
"""
|
|
self.sufficient_options()
|
|
self._do_authenticate(http_client)
|
|
|
|
@abc.abstractmethod
|
|
def _do_authenticate(self, http_client):
|
|
"""Protected method for authentication."""
|
|
|
|
def sufficient_options(self):
|
|
"""Check if all required options are present.
|
|
|
|
:raises: AuthPluginOptionsMissing
|
|
"""
|
|
missing = [opt
|
|
for opt in self.opt_names
|
|
if not self.opts.get(opt)]
|
|
if missing:
|
|
raise exceptions.AuthPluginOptionsMissing(missing)
|
|
|
|
@abc.abstractmethod
|
|
def token_and_endpoint(self, endpoint_type, service_type):
|
|
"""Return token and endpoint.
|
|
|
|
:param service_type: Service type of the endpoint
|
|
:type service_type: string
|
|
:param endpoint_type: Type of endpoint.
|
|
Possible values: public or publicURL,
|
|
internal or internalURL,
|
|
admin or adminURL
|
|
:type endpoint_type: string
|
|
:returns: tuple of token and endpoint strings
|
|
:raises: EndpointException
|
|
"""
|