Identity: Migrate 'role' commands to SDK

Depends-On: https://review.opendev.org/c/openstack/openstacksdk/+/929578
Change-Id: I22254604705080095ac852a1e03506b1552a1fd2
This commit is contained in:
ArtofBugs 2024-06-05 15:00:59 -07:00 committed by Oria Weng
parent eb0dbd5c33
commit 8f1382eda3
4 changed files with 1009 additions and 731 deletions
openstackclient
identity/v3
tests
functional/identity/v3
unit/identity/v3

@ -17,7 +17,7 @@
import logging import logging
from keystoneauth1 import exceptions as ks_exc from openstack import exceptions as sdk_exc
from osc_lib.command import command from osc_lib.command import command
from osc_lib import exceptions from osc_lib import exceptions
from osc_lib import utils from osc_lib import utils
@ -29,6 +29,25 @@ from openstackclient.identity import common
LOG = logging.getLogger(__name__) LOG = logging.getLogger(__name__)
def _format_role(role):
columns = (
"id",
"name",
"domain_id",
"description",
)
column_headers = (
"id",
"name",
"domain_id",
"description",
)
return (
column_headers,
utils.get_item_properties(role, columns),
)
def _add_identity_and_resource_options_to_parser(parser): def _add_identity_and_resource_options_to_parser(parser):
system_or_domain_or_project = parser.add_mutually_exclusive_group() system_or_domain_or_project = parser.add_mutually_exclusive_group()
system_or_domain_or_project.add_argument( system_or_domain_or_project.add_argument(
@ -63,32 +82,79 @@ def _add_identity_and_resource_options_to_parser(parser):
common.add_inherited_option_to_parser(parser) common.add_inherited_option_to_parser(parser)
def _find_sdk_id(
find_command, name_or_id, validate_actor_existence=True, **kwargs
):
try:
resource = find_command(
name_or_id=name_or_id, ignore_missing=False, **kwargs
)
# Mimic the behavior of
# openstackclient.identity.common._find_identity_resource()
# and ignore if we don't have permission to find a resource.
except sdk_exc.ForbiddenException:
return name_or_id
except sdk_exc.ResourceNotFound as exc:
if not validate_actor_existence:
return name_or_id
raise exceptions.CommandError from exc
return resource.id
def _process_identity_and_resource_options( def _process_identity_and_resource_options(
parsed_args, identity_client_manager, validate_actor_existence=True parsed_args, identity_client, validate_actor_existence=True
): ):
def _find_user(): def _find_user():
try: domain_id = (
return common.find_user( _find_sdk_id(
identity_client_manager, identity_client.find_domain,
parsed_args.user, name_or_id=parsed_args.user_domain,
parsed_args.user_domain, validate_actor_existence=validate_actor_existence,
).id )
except exceptions.CommandError: if parsed_args.user_domain
if not validate_actor_existence: else None
return parsed_args.user )
raise return _find_sdk_id(
identity_client.find_user,
name_or_id=parsed_args.user,
validate_actor_existence=validate_actor_existence,
domain_id=domain_id,
)
def _find_group(): def _find_group():
try: domain_id = (
return common.find_group( _find_sdk_id(
identity_client_manager, identity_client.find_domain,
parsed_args.group, name_or_id=parsed_args.group_domain,
parsed_args.group_domain, validate_actor_existence=validate_actor_existence,
).id )
except exceptions.CommandError: if parsed_args.group_domain
if not validate_actor_existence: else None
return parsed_args.group )
raise return _find_sdk_id(
identity_client.find_group,
name_or_id=parsed_args.group,
validate_actor_existence=validate_actor_existence,
domain_id=domain_id,
)
def _find_project():
domain_id = (
_find_sdk_id(
identity_client.find_domain,
name_or_id=parsed_args.project_domain,
validate_actor_existence=validate_actor_existence,
)
if parsed_args.project_domain
else None
)
return _find_sdk_id(
identity_client.find_project,
name_or_id=parsed_args.project,
validate_actor_existence=validate_actor_existence,
domain_id=domain_id,
)
kwargs = {} kwargs = {}
if parsed_args.user and parsed_args.system: if parsed_args.user and parsed_args.system:
@ -96,34 +162,35 @@ def _process_identity_and_resource_options(
kwargs['system'] = parsed_args.system kwargs['system'] = parsed_args.system
elif parsed_args.user and parsed_args.domain: elif parsed_args.user and parsed_args.domain:
kwargs['user'] = _find_user() kwargs['user'] = _find_user()
kwargs['domain'] = common.find_domain( kwargs['domain'] = _find_sdk_id(
identity_client_manager, identity_client.find_domain,
parsed_args.domain, name_or_id=parsed_args.domain,
).id validate_actor_existence=validate_actor_existence,
)
elif parsed_args.user and parsed_args.project: elif parsed_args.user and parsed_args.project:
kwargs['user'] = _find_user() kwargs['user'] = _find_user()
kwargs['project'] = common.find_project( kwargs['project'] = _find_project()
identity_client_manager,
parsed_args.project,
parsed_args.project_domain,
).id
elif parsed_args.group and parsed_args.system: elif parsed_args.group and parsed_args.system:
kwargs['group'] = _find_group() kwargs['group'] = _find_group()
kwargs['system'] = parsed_args.system kwargs['system'] = parsed_args.system
elif parsed_args.group and parsed_args.domain: elif parsed_args.group and parsed_args.domain:
kwargs['group'] = _find_group() kwargs['group'] = _find_group()
kwargs['domain'] = common.find_domain( kwargs['domain'] = _find_sdk_id(
identity_client_manager, identity_client.find_domain,
parsed_args.domain, name_or_id=parsed_args.domain,
).id validate_actor_existence=validate_actor_existence,
)
elif parsed_args.group and parsed_args.project: elif parsed_args.group and parsed_args.project:
kwargs['group'] = _find_group() kwargs['group'] = _find_group()
kwargs['project'] = common.find_project( kwargs['project'] = _find_project()
identity_client_manager, else:
parsed_args.project, msg = _(
parsed_args.project_domain, "Role not added, incorrect set of arguments "
).id "provided. See openstack --help for more details"
kwargs['os_inherit_extension_inherited'] = parsed_args.inherited )
raise exceptions.CommandError(msg)
kwargs['inherited'] = parsed_args.inherited
return kwargs return kwargs
@ -145,7 +212,7 @@ class AddRole(command.Command):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
if ( if (
not parsed_args.user not parsed_args.user
@ -161,18 +228,71 @@ class AddRole(command.Command):
domain_id = None domain_id = None
if parsed_args.role_domain: if parsed_args.role_domain:
domain_id = common.find_domain( domain_id = _find_sdk_id(
identity_client, parsed_args.role_domain identity_client.find_domain, name_or_id=parsed_args.role_domain
).id )
role = utils.find_resource( role = _find_sdk_id(
identity_client.roles, parsed_args.role, domain_id=domain_id identity_client.find_role,
name_or_id=parsed_args.role,
domain_id=domain_id,
) )
kwargs = _process_identity_and_resource_options( add_kwargs = _process_identity_and_resource_options(
parsed_args, self.app.client_manager.identity parsed_args, identity_client
) )
identity_client.roles.grant(role.id, **kwargs) if add_kwargs.get("domain"):
if add_kwargs.get("user"):
identity_client.assign_domain_role_to_user(
domain=add_kwargs["domain"],
user=add_kwargs["user"],
role=role,
inherited=add_kwargs["inherited"],
)
if add_kwargs.get("group"):
identity_client.assign_domain_role_to_group(
domain=add_kwargs["domain"],
group=add_kwargs["group"],
role=role,
inherited=add_kwargs["inherited"],
)
elif add_kwargs.get("project"):
if add_kwargs.get("user"):
identity_client.assign_project_role_to_user(
project=add_kwargs["project"],
user=add_kwargs["user"],
role=role,
inherited=add_kwargs["inherited"],
)
if add_kwargs.get("group"):
identity_client.assign_project_role_to_group(
project=add_kwargs["project"],
group=add_kwargs["group"],
role=role,
inherited=add_kwargs["inherited"],
)
elif add_kwargs.get("system"):
if add_kwargs["inherited"]:
LOG.warning(
_(
"'--inherited' was given, which is not supported "
"when adding a system role. This will be an error "
"in a future release."
)
)
# TODO(0weng): This should be an error in a future release
if add_kwargs.get("user"):
identity_client.assign_system_role_to_user(
system=add_kwargs["system"],
user=add_kwargs["user"],
role=role,
)
if add_kwargs.get("group"):
identity_client.assign_system_role_to_group(
system=add_kwargs["system"],
group=add_kwargs["group"],
role=role,
)
class CreateRole(command.ShowOne): class CreateRole(command.ShowOne):
@ -204,37 +324,35 @@ class CreateRole(command.ShowOne):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
domain_id = None create_kwargs = {}
if parsed_args.domain: if parsed_args.domain:
domain_id = common.find_domain( create_kwargs['domain_id'] = _find_sdk_id(
identity_client, parsed_args.domain identity_client.find_domain, name_or_id=parsed_args.domain
).id
options = common.get_immutable_options(parsed_args)
try:
role = identity_client.roles.create(
name=parsed_args.name,
domain=domain_id,
description=parsed_args.description,
options=options,
) )
except ks_exc.Conflict: if parsed_args.name:
create_kwargs['name'] = parsed_args.name
if parsed_args.description:
create_kwargs['description'] = parsed_args.description
create_kwargs['options'] = common.get_immutable_options(parsed_args)
try:
role = identity_client.create_role(**create_kwargs)
except sdk_exc.ConflictException:
if parsed_args.or_show: if parsed_args.or_show:
role = utils.find_resource( role = identity_client.find_role(
identity_client.roles, name_or_id=parsed_args.name,
parsed_args.name, domain_id=parsed_args.domain,
domain_id=domain_id, ignore_missing=False,
) )
LOG.info(_('Returning existing role %s'), role.name) LOG.info(_('Returning existing role %s'), role.name)
else: else:
raise raise
role._info.pop('links') return _format_role(role)
return zip(*sorted(role._info.items()))
class DeleteRole(command.Command): class DeleteRole(command.Command):
@ -245,7 +363,7 @@ class DeleteRole(command.Command):
parser.add_argument( parser.add_argument(
'roles', 'roles',
metavar='<role>', metavar='<role>',
nargs="+", nargs='+',
help=_('Role(s) to delete (name or ID)'), help=_('Role(s) to delete (name or ID)'),
) )
parser.add_argument( parser.add_argument(
@ -256,20 +374,22 @@ class DeleteRole(command.Command):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
domain_id = None domain_id = None
if parsed_args.domain: if parsed_args.domain:
domain_id = common.find_domain( domain_id = _find_sdk_id(
identity_client, parsed_args.domain identity_client.find_domain, parsed_args.domain
).id )
errors = 0 errors = 0
for role in parsed_args.roles: for role in parsed_args.roles:
try: try:
role_obj = utils.find_resource( role_id = _find_sdk_id(
identity_client.roles, role, domain_id=domain_id identity_client.find_role,
name_or_id=role,
domain_id=domain_id,
) )
identity_client.roles.delete(role_obj.id) identity_client.delete_role(role=role_id, ignore_missing=False)
except Exception as e: except Exception as e:
errors += 1 errors += 1
LOG.error( LOG.error(
@ -302,20 +422,17 @@ class ListRole(command.Lister):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
if parsed_args.domain: if parsed_args.domain:
domain = common.find_domain( domain = identity_client.find_domain(
identity_client, name_or_id=parsed_args.domain,
parsed_args.domain,
) )
columns = ('ID', 'Name', 'Domain') columns = ('ID', 'Name', 'Domain')
data = identity_client.roles.list(domain_id=domain.id) data = identity_client.roles(domain_id=domain.id)
for role in data:
role.domain = domain.name
else: else:
columns = ('ID', 'Name') columns = ('ID', 'Name')
data = identity_client.roles.list() data = identity_client.roles()
return ( return (
columns, columns,
@ -323,7 +440,7 @@ class ListRole(command.Lister):
utils.get_item_properties( utils.get_item_properties(
s, s,
columns, columns,
formatters={}, formatters={'Domain': lambda _: domain.name},
) )
for s in data for s in data
), ),
@ -348,8 +465,7 @@ class RemoveRole(command.Command):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
if ( if (
not parsed_args.user not parsed_args.user
and not parsed_args.domain and not parsed_args.domain
@ -364,19 +480,65 @@ class RemoveRole(command.Command):
domain_id = None domain_id = None
if parsed_args.role_domain: if parsed_args.role_domain:
domain_id = common.find_domain( domain_id = _find_sdk_id(
identity_client, parsed_args.role_domain identity_client.find_domain,
).id name_or_id=parsed_args.role_domain,
role = utils.find_resource( )
identity_client.roles, parsed_args.role, domain_id=domain_id role = _find_sdk_id(
identity_client.find_role,
name_or_id=parsed_args.role,
domain_id=domain_id,
) )
kwargs = _process_identity_and_resource_options( remove_kwargs = _process_identity_and_resource_options(
parsed_args, parsed_args,
self.app.client_manager.identity, identity_client,
validate_actor_existence=False, validate_actor_existence=False,
) )
identity_client.roles.revoke(role.id, **kwargs)
if remove_kwargs.get("domain"):
if remove_kwargs.get("user"):
identity_client.unassign_domain_role_from_user(
domain=remove_kwargs["domain"],
user=remove_kwargs["user"],
role=role,
inherited=remove_kwargs["inherited"],
)
if remove_kwargs.get("group"):
identity_client.unassign_domain_role_from_group(
domain=remove_kwargs["domain"],
group=remove_kwargs["group"],
role=role,
inherited=remove_kwargs["inherited"],
)
elif remove_kwargs.get("project"):
if remove_kwargs.get("user"):
identity_client.unassign_project_role_from_user(
project=remove_kwargs["project"],
user=remove_kwargs["user"],
role=role,
inherited=remove_kwargs["inherited"],
)
if remove_kwargs.get("group"):
identity_client.unassign_project_role_from_group(
project=remove_kwargs["project"],
group=remove_kwargs["group"],
role=role,
inherited=remove_kwargs["inherited"],
)
elif remove_kwargs.get("system"):
if remove_kwargs.get("user"):
identity_client.unassign_system_role_from_user(
system=remove_kwargs["system"],
user=remove_kwargs["user"],
role=role,
)
if remove_kwargs.get("group"):
identity_client.unassign_system_role_from_group(
system=remove_kwargs["system"],
group=remove_kwargs["group"],
role=role,
)
class SetRole(command.Command): class SetRole(command.Command):
@ -408,25 +570,31 @@ class SetRole(command.Command):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
update_kwargs = {}
if parsed_args.description:
update_kwargs["description"] = parsed_args.description
if parsed_args.name:
update_kwargs["name"] = parsed_args.name
domain_id = None domain_id = None
if parsed_args.domain: if parsed_args.domain:
domain_id = common.find_domain( domain_id = _find_sdk_id(
identity_client, parsed_args.domain identity_client.find_domain,
).id name_or_id=parsed_args.domain,
options = common.get_immutable_options(parsed_args)
role = utils.find_resource(
identity_client.roles, parsed_args.role, domain_id=domain_id
) )
update_kwargs["domain_id"] = domain_id
identity_client.roles.update( update_kwargs["options"] = common.get_immutable_options(parsed_args)
role.id, role = _find_sdk_id(
name=parsed_args.name, identity_client.find_role,
description=parsed_args.description, name_or_id=parsed_args.role,
options=options, domain_id=domain_id,
) )
update_kwargs["role"] = role
identity_client.update_role(**update_kwargs)
class ShowRole(command.ShowOne): class ShowRole(command.ShowOne):
@ -447,17 +615,19 @@ class ShowRole(command.ShowOne):
return parser return parser
def take_action(self, parsed_args): def take_action(self, parsed_args):
identity_client = self.app.client_manager.identity identity_client = self.app.client_manager.sdk_connection.identity
domain_id = None domain_id = None
if parsed_args.domain: if parsed_args.domain:
domain_id = common.find_domain( domain_id = _find_sdk_id(
identity_client, parsed_args.domain identity_client.find_domain,
).id name_or_id=parsed_args.domain,
role = utils.find_resource(
identity_client.roles, parsed_args.role, domain_id=domain_id
) )
role._info.pop('links') role = identity_client.find_role(
return zip(*sorted(role._info.items())) name_or_id=parsed_args.role,
domain_id=domain_id,
ignore_missing=False,
)
return _format_role(role)

@ -93,6 +93,30 @@ class RoleTests(common.IdentityTests):
) )
self.assertEqual(0, len(raw_output)) self.assertEqual(0, len(raw_output))
def test_role_add_inherited(self):
role_name = self._create_dummy_role()
username = self._create_dummy_user()
raw_output = self.openstack(
'role add '
f'--project {self.project_name} '
f'--project-domain {self.domain_name} '
f'--user {username} '
f'--user-domain {self.domain_name} '
'--inherited '
f'{role_name}'
)
self.addCleanup(
self.openstack,
'role remove '
f'--project {self.project_name} '
f'--project-domain {self.domain_name} '
f'--user {username} '
f'--user-domain {self.domain_name} '
'--inherited '
f'{role_name}',
)
self.assertEqual(0, len(raw_output))
def test_role_remove(self): def test_role_remove(self):
role_name = self._create_dummy_role() role_name = self._create_dummy_role()
username = self._create_dummy_user() username = self._create_dummy_user()

@ -151,6 +151,14 @@ class RoleAssignmentTests(common.IdentityTests):
'--inherited ' '--inherited '
f'{role_name}' f'{role_name}'
) )
self.addCleanup(
self.openstack,
'role remove '
f'--project {self.project_name} '
f'--user {username} '
'--inherited '
f'{role_name}',
)
self.assertEqual(0, len(raw_output)) self.assertEqual(0, len(raw_output))
raw_output = self.openstack('role assignment list --inherited') raw_output = self.openstack('role assignment list --inherited')

File diff suppressed because it is too large Load Diff