sahara/sahara/utils/openstack/keystone.py

319 lines
9.8 KiB
Python

# Copyright (c) 2013 Mirantis Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
# implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import re
from keystoneauth1 import identity as keystone_identity
from keystoneclient.v2_0 import client as keystone_client
from keystoneclient.v3 import client as keystone_client_v3
from oslo_config import cfg
from oslo_log import log as logging
from sahara import context
from sahara.service import sessions
from sahara.utils.openstack import base
LOG = logging.getLogger(__name__)
def _get_keystoneauth_cfg(name):
"""get the keystone auth cfg
Fetch value of keystone_authtoken group from config file when not
available as part of GroupAttr.
:rtype: String
:param name: property name to be retrieved
"""
try:
value_list = CONF._namespace._get_file_value([('keystone_authtoken',
name)])
if isinstance(value_list, tuple):
value_list = value_list[0]
cfg_val = value_list[0]
if name == "auth_url" and not re.findall(r'\/v[2-3].*', cfg_val):
cfg_val += "/v3"
return cfg_val
except KeyError:
if name in ["user_domain_name", "project_domain_name"]:
return "Default"
else:
raise
def validate_config():
if any(map(lambda o: getattr(CONF.trustee, o) is None, CONF.trustee)):
for replace_opt in CONF.trustee:
CONF.set_override(replace_opt, _get_keystoneauth_cfg(replace_opt),
group="trustee")
LOG.warning("""
__ __ _
\ \ / /_ _ _ __ _ __ (_)_ __ __ _
\ \ /\ / / _` | '__| '_ \| | '_ \ / _` |
\ V V / (_| | | | | | | | | | | (_| |
\_/\_/ \__,_|_| |_| |_|_|_| |_|\__, |
|___/
Using the [keystone_authtoken] user as the Sahara trustee user directly is
deprecated. Please add the trustee credentials you need to the [trustee]
section of your sahara.conf file.
""")
opts = [
# TODO(alazarev) Move to [keystone] section
cfg.BoolOpt('use_identity_api_v3',
default=True,
help='Enables Sahara to use Keystone API v3. '
'If that flag is disabled, '
'per-job clusters will not be terminated '
'automatically.')
]
ssl_opts = [
cfg.BoolOpt('api_insecure',
default=False,
help='Allow to perform insecure SSL requests to keystone.'),
cfg.StrOpt('ca_file',
help='Location of ca certificates file to use for keystone '
'client requests.'),
cfg.StrOpt("endpoint_type",
default="internalURL",
help="Endpoint type for keystone client requests")
]
keystone_group = cfg.OptGroup(name='keystone',
title='Keystone client options')
trustee_opts = [
cfg.StrOpt('username',
help='Username for trusts creation'),
cfg.StrOpt('password',
help='Password for trusts creation'),
cfg.StrOpt('project_name',
help='Project name for trusts creation'),
cfg.StrOpt('user_domain_name',
help='User domain name for trusts creation',
default="Default"),
cfg.StrOpt('project_domain_name',
help='Project domain name for trusts creation',
default="Default"),
cfg.StrOpt('auth_url',
help='Auth url for trusts creation'),
]
trustee_group = cfg.OptGroup(name='trustee', title="Trustee options")
CONF = cfg.CONF
CONF.register_group(keystone_group)
CONF.register_group(trustee_group)
CONF.register_opts(opts)
CONF.register_opts(ssl_opts, group=keystone_group)
CONF.register_opts(trustee_opts, group=trustee_group)
def auth():
'''Return a token auth plugin for the current context.'''
ctx = context.current()
return ctx.auth_plugin or token_auth(token=context.get_auth_token(),
project_id=ctx.tenant_id)
def auth_for_admin(project_name=None, trust_id=None):
'''Return an auth plugin for the admin.
:param project_name: a project to scope the auth with (optional).
:param trust_id: a trust to scope the auth with (optional).
:returns: an auth plugin object for the admin.
'''
# TODO(elmiko) revisit the project_domain_name if we start getting
# into federated authentication. it will need to match the domain that
# the project_name exists in.
auth = _password_auth(
username=CONF.trustee.username,
password=CONF.trustee.password,
project_name=project_name,
user_domain_name=CONF.trustee.user_domain_name,
project_domain_name=CONF.trustee.project_domain_name,
trust_id=trust_id)
return auth
def auth_for_proxy(username, password, trust_id=None):
'''Return an auth plugin for the proxy user.
:param username: the name of the proxy user.
:param password: the proxy user's password.
:param trust_id: a trust to scope the auth with (optional).
:returns: an auth plugin object for the proxy user.
'''
auth = _password_auth(
username=username,
password=password,
user_domain_name=CONF.proxy_user_domain_name,
trust_id=trust_id)
return auth
def client():
'''Return the current context client.'''
return client_from_auth(auth())
def client_for_admin():
'''Return the Sahara admin user client.'''
auth = auth_for_admin(
project_name=CONF.trustee.project_name)
return client_from_auth(auth)
def client_from_auth(auth):
'''Return a session based client from the auth plugin provided.
A session is obtained from the global session cache.
:param auth: the auth plugin object to use in client creation.
:returns: a keystone client
'''
session = sessions.cache().get_session(sessions.SESSION_TYPE_KEYSTONE)
if CONF.use_identity_api_v3:
client_class = keystone_client_v3.Client
else:
client_class = keystone_client.Client
return client_class(session=session, auth=auth)
def project_id_from_auth(auth):
'''Return the project id associated with an auth plugin.
:param auth: the auth plugin to inspect.
:returns: the project id associated with the auth plugin.
'''
return auth.get_project_id(
sessions.cache().get_session(sessions.SESSION_TYPE_KEYSTONE))
def service_catalog_from_auth(auth):
'''Return the service catalog associated with an auth plugin.
:param auth: the auth plugin to inspect.
:returns: a list containing the service catalog.
'''
access_info = auth.get_access(
sessions.cache().get_session(sessions.SESSION_TYPE_KEYSTONE))
if access_info.has_service_catalog():
return access_info.service_catalog.catalog
else:
return []
def token_auth(token, project_id=None, project_name=None,
project_domain_name='Default'):
'''Return a token auth plugin object.
:param token: the token to use for authentication.
:param project_id: the project(ex. tenant) id to scope the auth.
:returns: a token auth plugin object.
'''
token_kwargs = dict(
auth_url=base.retrieve_auth_url(CONF.keystone.endpoint_type),
token=token
)
if CONF.use_identity_api_v3:
token_kwargs.update(dict(
project_id=project_id,
project_name=project_name,
project_domain_name=project_domain_name,
))
auth = keystone_identity.v3.Token(**token_kwargs)
else:
token_kwargs.update(dict(
tenant_id=project_id,
tenant_name=project_name,
))
auth = keystone_identity.v2.Token(**token_kwargs)
return auth
def token_from_auth(auth):
'''Return an authentication token from an auth plugin.
:param auth: the auth plugin to acquire a token from.
:returns: an auth token in string format.
'''
return sessions.cache().token_for_auth(auth)
def user_id_from_auth(auth):
'''Return a user id associated with an auth plugin.
:param auth: the auth plugin to inspect.
:returns: a token associated with the auth.
'''
return auth.get_user_id(sessions.cache().get_session(
sessions.SESSION_TYPE_KEYSTONE))
def _password_auth(username, password,
project_name=None, user_domain_name=None,
project_domain_name=None, trust_id=None):
'''Return a password auth plugin object.
:param username: the user to authenticate as.
:param password: the user's password.
:param project_name: the project(ex. tenant) name to scope the auth.
:param user_domain_name: the domain the user belongs to.
:param project_domain_name: the domain the project belongs to.
:param trust_id: a trust id to scope the auth.
:returns: a password auth plugin object.
'''
passwd_kwargs = dict(
auth_url=CONF.trustee.auth_url,
username=username,
password=password
)
if CONF.use_identity_api_v3:
passwd_kwargs.update(dict(
project_name=project_name,
user_domain_name=user_domain_name,
project_domain_name=project_domain_name,
trust_id=trust_id
))
auth = keystone_identity.v3.Password(**passwd_kwargs)
else:
passwd_kwargs.update(dict(
tenant_name=project_name,
trust_id=trust_id
))
auth = keystone_identity.v2.Password(**passwd_kwargs)
return auth