Improve KeyStone credentials parameter handling.

- Put order in keystone credentials parameters
- Add keystone auth parameters:
  * domain_name
  * trust_id
- Add support for environment variables:
  * OS_USER_ID
  * OS_PROJECT_ID
  * OS_TENANT_ID
  * OS_DOMAIN_NAME
  * OS_DOMAIN_ID
  * OS_USER_DOMAIN_ID
  * OS_PROJECT_DOMAIN_ID
  * OS_TRUST_ID

Co-Authored-By: Federico Ressi <fressi@redhat.com>
Change-Id: I66085db690c8f72408b79b3abea9dce7c60b4ea2
This commit is contained in:
pkomarov 2019-04-23 12:51:57 +03:00 committed by Federico Ressi
parent 82d1584e59
commit 7aaab7fb57
4 changed files with 97 additions and 52 deletions

View File

@ -115,15 +115,15 @@ Currently supported variables are::
export OS_TENANT_ID=...
# Domain-level authorization scope (name or ID)
export OS_DOMAIN_NAME=default
export OS_DOMAIN_NAME=Default
export OS_DOMAIN_ID=...
# Domain name or ID containing user
export OS_USER_DOMAIN_NAME=default
export OS_USER_DOMAIN_NAME=Default
export OS_USER_DOMAIN_ID=...
# Domain name or ID containing project
export OS_PROJECT_DOMAIN_NAME=default
export OS_PROJECT_DOMAIN_NAME=Default
export OS_PROJECT_DOMAIN_ID=...
# ID of the trust to use as a trustee user

View File

@ -28,13 +28,15 @@ def default_keystone_credentials():
class KeystoneCredentials(collections.namedtuple(
'KeystoneCredentials', ['auth_url',
'KeystoneCredentials', ['api_version',
'auth_url',
'username',
'project_name',
'password',
'api_version',
'project_name',
'domain_name',
'user_domain_name',
'project_domain_name'])):
'project_domain_name',
'trust_id'])):
def to_dict(self):
return collections.OrderedDict(
@ -50,7 +52,7 @@ class KeystoneCredentials(collections.namedtuple(
", ".join("{!s}={!r}".format(k, v)
for k, v in params.items()))
required_params = ('auth_url', 'username', 'project_name', 'password')
required_params = ('auth_url', 'username', 'password', 'project_name')
def validate(self, required_params=None):
required_params = required_params or self.required_params
@ -63,14 +65,25 @@ class KeystoneCredentials(collections.namedtuple(
raise InvalidKeystoneCredentials(credentials=self, reason=reason)
def keystone_credentials(api_version=None, auth_url=None,
username=None, password=None, project_name=None,
user_domain_name=None, project_domain_name=None,
def keystone_credentials(api_version=None,
auth_url=None,
username=None,
password=None,
project_name=None,
domain_name=None,
user_domain_name=None,
project_domain_name=None,
trust_id=None,
cls=KeystoneCredentials):
return cls(api_version=api_version, username=username,
password=password, project_name=project_name,
auth_url=auth_url, user_domain_name=user_domain_name,
project_domain_name=project_domain_name)
return cls(api_version=api_version,
auth_url=auth_url,
username=username,
password=password,
project_name=project_name,
domain_name=domain_name,
user_domain_name=user_domain_name,
project_domain_name=project_domain_name,
trust_id=trust_id)
class InvalidKeystoneCredentials(tobiko.TobikoException):
@ -88,24 +101,46 @@ class EnvironKeystoneCredentialsFixture(tobiko.SharedFixture):
LOG.debug("OS_AUTH_URL environment variable not defined")
return
api_version = (config.get_int_env('OS_IDENTITY_API_VERSION') or
api_version = (
config.get_int_env('OS_IDENTITY_API_VERSION') or
api_version_from_url(auth_url))
username = (
config.get_env('OS_USERNAME') or
config.get_env('OS_USER_ID'))
password = config.get_env('OS_PASSWORD')
project_name = (
config.get_env('OS_PROJECT_NAME') or
config.get_env('OS_TENANT_NAME') or
config.get_env('OS_PROJECT_ID') or
config.get_env('OS_TENANT_ID'))
if api_version == 2:
credentials = keystone_credentials(
api_version=api_version, auth_url=auth_url,
username=config.get_env('OS_USERNAME'),
password=config.get_env('OS_PASSWORD'),
project_name=(config.get_env('OS_PROJECT_NAME') or
config.get_env('OS_TENANT_NAME')))
api_version=api_version,
auth_url=auth_url,
username=username,
password=password,
project_name=project_name)
else:
domain_name = (
config.get_env('OS_DOMAIN_NAME') or
config.get_env('OS_DOMAIN_ID'))
user_domain_name = (
config.get_env('OS_USER_DOMAIN_NAME') or
config.get_env('OS_USER_DOMAIN_ID'))
project_domain_name = (
config.get_env('OS_PROJECT_DOMAIN_NAME') or
config.get_env('OS_PROJECT_DOMAIN_ID'))
trust_id = config.get_env('OS_TRUST_ID')
credentials = keystone_credentials(
api_version=api_version, auth_url=auth_url,
username=config.get_env('OS_USERNAME'),
password=config.get_env('OS_PASSWORD'),
project_name=(config.get_env('OS_PROJECT_NAME') or
config.get_env('OS_TENANT_NAME')),
user_domain_name=config.get_env('OS_USER_DOMAIN_NAME'),
project_domain_name=config.get_env('OS_PROJECT_DOMAIN_NAME'))
api_version=api_version,
auth_url=auth_url,
username=username,
password=password,
project_name=project_name,
domain_name=domain_name,
user_domain_name=user_domain_name,
project_domain_name=project_domain_name,
trust_id=trust_id)
try:
credentials.validate()
except InvalidKeystoneCredentials as ex:
@ -131,16 +166,22 @@ class ConfigKeystoneCredentialsFixture(tobiko.SharedFixture):
api_version_from_url(auth_url))
if api_version == 2:
credentials = keystone_credentials(
api_version=api_version, auth_url=auth_url,
username=conf.username, password=conf.password,
api_version=api_version,
auth_url=auth_url,
username=conf.username,
password=conf.password,
project_name=conf.project_name)
else:
credentials = keystone_credentials(
api_version=api_version, auth_url=auth_url,
username=conf.username, password=conf.password,
api_version=api_version,
auth_url=auth_url,
username=conf.username,
password=conf.password,
project_name=conf.project_name,
domain_name=conf.domain_name,
user_domain_name=conf.user_domain_name,
project_domain_name=conf.project_domain_name)
project_domain_name=conf.project_domain_name,
trust_id=conf.trust_id)
try:
credentials.validate()
except InvalidKeystoneCredentials as ex:
@ -160,7 +201,6 @@ class DefaultKeystoneCredentialsFixture(tobiko.SharedFixture):
credentials = None
def setup_fixture(self):
for fixture in self.fixtures:
try:
credentials = tobiko.setup_fixture(fixture).credentials
@ -172,7 +212,6 @@ class DefaultKeystoneCredentialsFixture(tobiko.SharedFixture):
fixture, credentials)
self.credentials = credentials
return credentials
raise RuntimeError('Unable to found any valid credentials')
@ -183,7 +222,6 @@ def api_version_from_url(auth_url):
elif auth_url.endswith('/v3'):
LOG.info('Got Keystone API version 3 from auth_url: %r', auth_url)
return 3
else:
LOG.warning('Unable to get Keystone API version from auth_url: %r',
auth_url)

View File

@ -20,7 +20,10 @@ def register_tobiko_options(conf):
conf.register_opts(
group=cfg.OptGroup('keystone'),
opts=[cfg.StrOpt('auth_url',
opts=[cfg.IntOpt('api_version',
default=None,
help="Identity API version"),
cfg.StrOpt('auth_url',
default=None,
help="Identity service URL"),
cfg.StrOpt('username',
@ -32,12 +35,15 @@ def register_tobiko_options(conf):
cfg.StrOpt('password',
default=None,
help="Password"),
cfg.IntOpt('api_version',
cfg.StrOpt('domain_name',
default=None,
help="Identity API version"),
help="Domain name"),
cfg.StrOpt('user_domain_name',
default=None,
help="User domain name"),
cfg.StrOpt('project_domain_name',
default=None,
help="Project domain name")])
help="Project domain name"),
cfg.StrOpt('trust_id',
default=None,
help="Trust ID for trust scoping.")])

View File

@ -48,16 +48,16 @@ V3_PARAMS = {
'username': 'demo',
'password': 'super-secret',
'auth_url': 'http://10.0.0.1:5678/v3',
'user_domain_name': 'demo',
'project_domain_name': 'demo'}
'user_domain_name': 'Default',
'project_domain_name': 'Default'}
V3_ENVIRON = {
'OS_PROJECT_NAME': 'demo',
'OS_USERNAME': 'demo',
'OS_PASSWORD': 'super-secret',
'OS_AUTH_URL': 'http://10.0.0.1:5678/v3',
'OS_USER_DOMAIN_NAME': 'demo',
'OS_PROJECT_DOMAIN_NAME': 'demo'}
'OS_USER_DOMAIN_NAME': 'Default',
'OS_PROJECT_DOMAIN_NAME': 'Default'}
V3_ENVIRON_WITH_VERSION = dict(V3_ENVIRON, OS_IDENTITY_API_VERSION='3')
@ -75,9 +75,9 @@ class KeystoneCredentialsTest(base.OpenstackTest):
credentials.validate()
self.assertEqual(V2_PARAMS, credentials.to_dict())
self.assertEqual(
"keystone_credentials(auth_url='http://10.0.0.1:5678/v2.0', "
"username='demo', project_name='demo', password='***', "
"api_version=2)",
"keystone_credentials(api_version=2, "
"auth_url='http://10.0.0.1:5678/v2.0', username='demo', "
"password='***', project_name='demo')",
repr(credentials))
def test_validate_from_params_v3(self):
@ -85,10 +85,11 @@ class KeystoneCredentialsTest(base.OpenstackTest):
credentials.validate()
self.assertEqual(V3_PARAMS, credentials.to_dict())
self.assertEqual(
"keystone_credentials(auth_url='http://10.0.0.1:5678/v3', "
"username='demo', project_name='demo', password='***', "
"api_version=3, user_domain_name='demo', "
"project_domain_name='demo')",
"keystone_credentials(api_version=3, "
"auth_url='http://10.0.0.1:5678/v3', username='demo', "
"password='***', project_name='demo', "
"user_domain_name='Default', "
"project_domain_name='Default')",
repr(credentials))
def test_validate_without_auth_url(self):