2013-07-03 18:12:58 -05:00
|
|
|
# Copyright 2012-2013 OpenStack Foundation
|
2013-05-21 00:57:19 -05:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
# not use this file except in compliance with the License. You may obtain
|
|
|
|
# a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
# License for the specific language governing permissions and limitations
|
|
|
|
# under the License.
|
|
|
|
#
|
|
|
|
|
2013-08-21 13:13:45 -05:00
|
|
|
"""Identity v3 Token action implementations"""
|
2013-05-21 00:57:19 -05:00
|
|
|
|
2013-07-03 18:12:58 -05:00
|
|
|
import six
|
2013-05-21 00:57:19 -05:00
|
|
|
|
2016-01-10 21:54:53 +09:00
|
|
|
from openstackclient.common import command
|
2015-01-08 02:02:55 -05:00
|
|
|
from openstackclient.common import utils
|
|
|
|
from openstackclient.identity import common
|
|
|
|
|
2013-07-03 15:26:33 -05:00
|
|
|
|
2016-01-10 21:54:53 +09:00
|
|
|
class AuthorizeRequestToken(command.ShowOne):
|
2015-01-08 02:14:06 -05:00
|
|
|
"""Authorize a request token"""
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
def get_parser(self, prog_name):
|
|
|
|
parser = super(AuthorizeRequestToken, self).get_parser(prog_name)
|
|
|
|
parser.add_argument(
|
|
|
|
'--request-key',
|
|
|
|
metavar='<request-key>',
|
2015-01-08 02:14:06 -05:00
|
|
|
help='Request token to authorize (ID only) (required)',
|
2013-12-09 17:50:07 -06:00
|
|
|
required=True
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
2015-01-08 02:14:06 -05:00
|
|
|
'--role',
|
|
|
|
metavar='<role>',
|
|
|
|
action='append',
|
|
|
|
default=[],
|
|
|
|
help='Roles to authorize (name or ID) '
|
|
|
|
'(repeat to set multiple values) (required)',
|
2013-05-21 00:57:19 -05:00
|
|
|
required=True
|
|
|
|
)
|
|
|
|
return parser
|
|
|
|
|
|
|
|
def take_action(self, parsed_args):
|
2013-12-09 17:50:07 -06:00
|
|
|
identity_client = self.app.client_manager.identity
|
2013-05-21 00:57:19 -05:00
|
|
|
|
2015-01-08 02:14:06 -05:00
|
|
|
# NOTE(stevemar): We want a list of role ids
|
2013-12-09 17:50:07 -06:00
|
|
|
roles = []
|
2015-01-08 02:14:06 -05:00
|
|
|
for role in parsed_args.role:
|
|
|
|
role_id = utils.find_resource(
|
|
|
|
identity_client.roles,
|
|
|
|
role,
|
|
|
|
).id
|
|
|
|
roles.append(role_id)
|
2013-12-09 17:50:07 -06:00
|
|
|
|
|
|
|
verifier_pin = identity_client.oauth1.request_tokens.authorize(
|
|
|
|
parsed_args.request_key,
|
|
|
|
roles)
|
2015-01-08 02:02:55 -05:00
|
|
|
|
2015-01-08 02:14:06 -05:00
|
|
|
return zip(*sorted(six.iteritems(verifier_pin._info)))
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
|
2016-01-10 21:54:53 +09:00
|
|
|
class CreateAccessToken(command.ShowOne):
|
2015-01-08 02:22:31 -05:00
|
|
|
"""Create an access token"""
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
def get_parser(self, prog_name):
|
|
|
|
parser = super(CreateAccessToken, self).get_parser(prog_name)
|
|
|
|
parser.add_argument(
|
|
|
|
'--consumer-key',
|
|
|
|
metavar='<consumer-key>',
|
2015-01-08 02:22:31 -05:00
|
|
|
help='Consumer key (required)',
|
2013-05-21 00:57:19 -05:00
|
|
|
required=True
|
|
|
|
)
|
2013-07-03 15:26:33 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--consumer-secret',
|
|
|
|
metavar='<consumer-secret>',
|
2015-01-08 02:22:31 -05:00
|
|
|
help='Consumer secret (required)',
|
2013-07-03 15:26:33 -05:00
|
|
|
required=True
|
|
|
|
)
|
2013-05-21 00:57:19 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--request-key',
|
|
|
|
metavar='<request-key>',
|
2015-01-08 02:22:31 -05:00
|
|
|
help='Request token to exchange for access token (required)',
|
2013-07-03 15:26:33 -05:00
|
|
|
required=True
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'--request-secret',
|
|
|
|
metavar='<request-secret>',
|
2015-01-08 02:22:31 -05:00
|
|
|
help='Secret associated with <request-key> (required)',
|
2013-05-21 00:57:19 -05:00
|
|
|
required=True
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'--verifier',
|
|
|
|
metavar='<verifier>',
|
2015-01-08 02:22:31 -05:00
|
|
|
help='Verifier associated with <request-key> (required)',
|
2013-05-21 00:57:19 -05:00
|
|
|
required=True
|
|
|
|
)
|
|
|
|
return parser
|
|
|
|
|
|
|
|
def take_action(self, parsed_args):
|
2013-12-09 17:50:07 -06:00
|
|
|
token_client = self.app.client_manager.identity.oauth1.access_tokens
|
|
|
|
access_token = token_client.create(
|
2013-07-03 15:26:33 -05:00
|
|
|
parsed_args.consumer_key, parsed_args.consumer_secret,
|
|
|
|
parsed_args.request_key, parsed_args.request_secret,
|
2013-05-21 00:57:19 -05:00
|
|
|
parsed_args.verifier)
|
2015-01-08 02:22:31 -05:00
|
|
|
return zip(*sorted(six.iteritems(access_token._info)))
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
|
2016-01-10 21:54:53 +09:00
|
|
|
class CreateRequestToken(command.ShowOne):
|
2015-01-08 02:02:55 -05:00
|
|
|
"""Create a request token"""
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
def get_parser(self, prog_name):
|
|
|
|
parser = super(CreateRequestToken, self).get_parser(prog_name)
|
|
|
|
parser.add_argument(
|
|
|
|
'--consumer-key',
|
|
|
|
metavar='<consumer-key>',
|
2015-01-08 02:02:55 -05:00
|
|
|
help='Consumer key (required)',
|
2013-05-21 00:57:19 -05:00
|
|
|
required=True
|
|
|
|
)
|
2013-07-03 15:26:33 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--consumer-secret',
|
|
|
|
metavar='<consumer-secret>',
|
2015-01-08 02:02:55 -05:00
|
|
|
help='Consumer secret (required)',
|
2013-07-03 15:26:33 -05:00
|
|
|
required=True
|
|
|
|
)
|
2013-08-21 13:13:45 -05:00
|
|
|
parser.add_argument(
|
2015-01-08 02:02:55 -05:00
|
|
|
'--project',
|
|
|
|
metavar='<project>',
|
|
|
|
help='Project that consumer wants to access (name or ID)'
|
|
|
|
' (required)',
|
2013-12-09 17:50:07 -06:00
|
|
|
required=True
|
2013-05-21 00:57:19 -05:00
|
|
|
)
|
2015-01-08 02:02:55 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--domain',
|
|
|
|
metavar='<domain>',
|
|
|
|
help='Domain owning <project> (name or ID)',
|
|
|
|
)
|
2013-05-21 00:57:19 -05:00
|
|
|
return parser
|
|
|
|
|
|
|
|
def take_action(self, parsed_args):
|
2015-01-08 02:02:55 -05:00
|
|
|
identity_client = self.app.client_manager.identity
|
|
|
|
|
|
|
|
if parsed_args.domain:
|
|
|
|
domain = common.find_domain(identity_client, parsed_args.domain)
|
|
|
|
project = utils.find_resource(identity_client.projects,
|
|
|
|
parsed_args.project,
|
|
|
|
domain_id=domain.id)
|
|
|
|
else:
|
|
|
|
project = utils.find_resource(identity_client.projects,
|
|
|
|
parsed_args.project)
|
|
|
|
|
|
|
|
token_client = identity_client.oauth1.request_tokens
|
|
|
|
|
2013-12-09 17:50:07 -06:00
|
|
|
request_token = token_client.create(
|
2013-07-03 15:26:33 -05:00
|
|
|
parsed_args.consumer_key,
|
|
|
|
parsed_args.consumer_secret,
|
2015-01-08 02:02:55 -05:00
|
|
|
project.id)
|
|
|
|
return zip(*sorted(six.iteritems(request_token._info)))
|
2013-05-21 00:57:19 -05:00
|
|
|
|
|
|
|
|
2016-01-10 21:54:53 +09:00
|
|
|
class IssueToken(command.ShowOne):
|
2014-06-26 18:20:35 -05:00
|
|
|
"""Issue new token"""
|
2014-01-29 15:57:18 +08:00
|
|
|
|
2016-02-08 11:16:24 -08:00
|
|
|
# scoped token is optional
|
|
|
|
required_scope = False
|
|
|
|
|
2014-01-29 15:57:18 +08:00
|
|
|
def get_parser(self, prog_name):
|
2014-06-26 18:20:35 -05:00
|
|
|
parser = super(IssueToken, self).get_parser(prog_name)
|
2014-01-29 15:57:18 +08:00
|
|
|
return parser
|
|
|
|
|
|
|
|
def take_action(self, parsed_args):
|
2014-10-20 12:47:39 -05:00
|
|
|
token = self.app.client_manager.auth_ref.service_catalog.get_token()
|
2014-01-29 15:57:18 +08:00
|
|
|
if 'tenant_id' in token:
|
|
|
|
token['project_id'] = token.pop('tenant_id')
|
|
|
|
return zip(*sorted(six.iteritems(token)))
|
2016-02-09 16:49:11 -08:00
|
|
|
|
|
|
|
|
|
|
|
class RevokeToken(command.Command):
|
|
|
|
"""Revoke existing token"""
|
|
|
|
|
|
|
|
def get_parser(self, prog_name):
|
|
|
|
parser = super(RevokeToken, self).get_parser(prog_name)
|
|
|
|
parser.add_argument(
|
|
|
|
'token',
|
|
|
|
metavar='<token>',
|
|
|
|
help='Token to be deleted',
|
|
|
|
)
|
|
|
|
return parser
|
|
|
|
|
|
|
|
def take_action(self, parsed_args):
|
|
|
|
identity_client = self.app.client_manager.identity
|
|
|
|
|
|
|
|
identity_client.tokens.revoke_token(parsed_args.token)
|