Skip to content

Commit a38efb6

Browse files
committed
Add v1password keystoneauth plugin
This lets us use Keystone sessions against endpoints like swauth and tempauth with code like: import keystoneauth1.loading import keystoneauth1.session import swiftclient loader = keystoneauth1.loading.get_plugin_loader('v1password') auth_plugin = loader.load_from_options( auth_url='http://saio:8080/auth/v1.0', username='test:tester', password='testing') keystone_session = keystoneauth1.session.Session(auth_plugin) conn = swiftclient.Connection(session=keystone_session) The plugin includes an optional project_name option, which may be used to override the swift account from the storage url that was returned. Additionally, it includes enough infrastructure to support some commands in python-openstackclient>=3.0: export OS_AUTH_TYPE=v1password export OS_AUTH_URL=http://saio:8080/auth/v1.0 export OS_PROJECT_NAME=AUTH_test2 export OS_USERNAME=test:tester export OS_PASSWORD=testing openstack token issue openstack catalog list openstack catalog show object-store openstack object store account show openstack container list openstack container create <container> openstack container save <container> openstack container show <container> openstack container delete <container> openstack object list <container> openstack object create <container> <file> openstack object save <container> <object> opsentack object show <container> <object> openstack object delete <container> <object> Change-Id: Ia963dc44415f72a6518227e86d9528a987e07491
1 parent 73e4296 commit a38efb6

File tree

5 files changed

+606
-1
lines changed

5 files changed

+606
-1
lines changed

doc/source/conf.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151

5252
# General information about the project.
5353
project = u'Swiftclient'
54-
copyright = u'2013 OpenStack, LLC.'
54+
copyright = u'2013-2016 OpenStack, LLC.'
5555

5656
# The version info for the project you're documenting, acts as replacement for
5757
# |version| and |release|, also used in various other places throughout the

doc/source/swiftclient.rst

+6
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ swiftclient
55

66
.. automodule:: swiftclient
77

8+
swiftclient.authv1
9+
==================
10+
11+
.. automodule:: swiftclient.authv1
12+
:inherited-members:
13+
814
swiftclient.client
915
==================
1016

setup.cfg

+3
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ keystone =
4040
console_scripts =
4141
swift = swiftclient.shell:main
4242

43+
keystoneauth1.plugin =
44+
v1password = swiftclient.authv1:PasswordLoader
45+
4346
[build_sphinx]
4447
source-dir = doc/source
4548
build-dir = doc/build

swiftclient/authv1.py

+350
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,350 @@
1+
# Copyright 2016 OpenStack Foundation
2+
#
3+
# Licensed under the Apache License, Version 2.0 (the "License");
4+
# you may not use this file except in compliance with the License.
5+
# You may obtain a copy of the License at
6+
#
7+
# http://www.apache.org/licenses/LICENSE-2.0
8+
#
9+
# Unless required by applicable law or agreed to in writing, software
10+
# distributed under the License is distributed on an "AS IS" BASIS,
11+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
12+
# implied. See the License for the specific language governing
13+
# permissions and limitations under the License.
14+
15+
"""
16+
Authentication plugin for keystoneauth to support v1 endpoints.
17+
18+
Way back in the long-long ago, there was no Keystone. Swift used an auth
19+
mechanism now known as "v1", which used only HTTP headers. Auth requests
20+
and responses would look something like::
21+
22+
> GET /auth/v1.0 HTTP/1.1
23+
> Host: <swift server>
24+
> X-Auth-User: <tenant>:<user>
25+
> X-Auth-Key: <password>
26+
>
27+
< HTTP/1.1 200 OK
28+
< X-Storage-Url: http://<swift server>/v1/<tenant account>
29+
< X-Auth-Token: <token>
30+
< X-Storage-Token: <token>
31+
<
32+
33+
This plugin provides a way for Keystone sessions (and clients that
34+
use them, like python-openstackclient) to communicate with old auth
35+
endpoints that still use this mechanism, such as tempauth, swauth,
36+
or https://identity.api.rackspacecloud.com/v1.0
37+
"""
38+
39+
import datetime
40+
import json
41+
import time
42+
43+
from six.moves.urllib.parse import urljoin
44+
45+
# Note that while we import keystoneauth1 here, we *don't* need to add it to
46+
# requirements.txt -- this entire module only makes sense (and should only be
47+
# loaded) if keystoneauth is already installed.
48+
from keystoneauth1 import plugin
49+
from keystoneauth1 import exceptions
50+
from keystoneauth1 import loading
51+
from keystoneauth1.identity import base
52+
53+
54+
# stupid stdlib...
55+
class _UTC(datetime.tzinfo):
56+
def utcoffset(self, dt):
57+
return datetime.timedelta(0)
58+
59+
def tzname(self, dt):
60+
return "UTC"
61+
62+
def dst(self, dt):
63+
return datetime.timedelta(0)
64+
65+
66+
UTC = _UTC()
67+
del _UTC
68+
69+
70+
class ServiceCatalogV1(object):
71+
def __init__(self, auth_url, storage_url, account):
72+
self.auth_url = auth_url
73+
self._storage_url = storage_url
74+
self._account = account
75+
76+
@property
77+
def storage_url(self):
78+
if self._account:
79+
return urljoin(self._storage_url.rstrip('/'), self._account)
80+
return self._storage_url
81+
82+
@property
83+
def catalog(self):
84+
# openstackclient wants this for the `catalog list` and
85+
# `catalog show` commands
86+
endpoints = [{
87+
'region': 'default',
88+
'publicURL': self._storage_url,
89+
}]
90+
if self.storage_url != self._storage_url:
91+
endpoints.insert(0, {
92+
'region': 'override',
93+
'publicURL': self.storage_url,
94+
})
95+
96+
return [
97+
{
98+
'name': 'swift',
99+
'type': 'object-store',
100+
'endpoints': endpoints,
101+
},
102+
{
103+
'name': 'auth',
104+
'type': 'identity',
105+
'endpoints': [{
106+
'region': 'default',
107+
'publicURL': self.auth_url,
108+
}],
109+
}
110+
]
111+
112+
def url_for(self, **kwargs):
113+
kwargs.setdefault('interface', 'public')
114+
kwargs.setdefault('service_type', None)
115+
116+
if kwargs['service_type'] == 'object-store':
117+
return self.storage_url
118+
119+
# Although our "catalog" includes an identity entry, nothing that uses
120+
# url_for() (including `openstack endpoint list`) will know what to do
121+
# with it. Better to just raise the exception, cribbing error messages
122+
# from keystoneauth1/access/service_catalog.py
123+
124+
if 'service_name' in kwargs and 'region_name' in kwargs:
125+
msg = ('%(interface)s endpoint for %(service_type)s service '
126+
'named %(service_name)s in %(region_name)s region not '
127+
'found' % kwargs)
128+
elif 'service_name' in kwargs:
129+
msg = ('%(interface)s endpoint for %(service_type)s service '
130+
'named %(service_name)s not found' % kwargs)
131+
elif 'region_name' in kwargs:
132+
msg = ('%(interface)s endpoint for %(service_type)s service '
133+
'in %(region_name)s region not found' % kwargs)
134+
else:
135+
msg = ('%(interface)s endpoint for %(service_type)s service '
136+
'not found' % kwargs)
137+
138+
raise exceptions.EndpointNotFound(msg)
139+
140+
141+
class AccessInfoV1(object):
142+
"""An object for encapsulating a raw v1 auth token."""
143+
144+
def __init__(self, auth_url, storage_url, account, username, auth_token,
145+
token_life):
146+
self.auth_url = auth_url
147+
self.storage_url = storage_url
148+
self.account = account
149+
self.service_catalog = ServiceCatalogV1(auth_url, storage_url, account)
150+
self.username = username
151+
self.auth_token = auth_token
152+
self._issued = time.time()
153+
try:
154+
self._expires = self._issued + float(token_life)
155+
except (TypeError, ValueError):
156+
self._expires = None
157+
# following is used by openstackclient
158+
self.project_id = None
159+
160+
@property
161+
def expires(self):
162+
if self._expires is None:
163+
return None
164+
return datetime.datetime.fromtimestamp(self._expires, UTC)
165+
166+
@property
167+
def issued(self):
168+
return datetime.datetime.fromtimestamp(self._issued, UTC)
169+
170+
@property
171+
def user_id(self):
172+
# openstackclient wants this for the `token issue` command
173+
return self.username
174+
175+
def will_expire_soon(self, stale_duration):
176+
"""Determines if expiration is about to occur.
177+
178+
:returns: true if expiration is within the given duration
179+
"""
180+
if self._expires is None:
181+
return False # assume no expiration
182+
return time.time() + stale_duration > self._expires
183+
184+
def get_state(self):
185+
"""Serialize the current state."""
186+
return json.dumps({
187+
'auth_url': self.auth_url,
188+
'storage_url': self.storage_url,
189+
'account': self.account,
190+
'username': self.username,
191+
'auth_token': self.auth_token,
192+
'issued': self._issued,
193+
'expires': self._expires}, sort_keys=True)
194+
195+
@classmethod
196+
def from_state(cls, data):
197+
"""Deserialize the given state.
198+
199+
:returns: a new AccessInfoV1 object with the given state
200+
"""
201+
data = json.loads(data)
202+
access = cls(
203+
data['auth_url'],
204+
data['storage_url'],
205+
data['account'],
206+
data['username'],
207+
data['auth_token'],
208+
token_life=None)
209+
access._issued = data['issued']
210+
access._expires = data['expires']
211+
return access
212+
213+
214+
class PasswordPlugin(base.BaseIdentityPlugin):
215+
"""A plugin for authenticating with a username and password.
216+
217+
Subclassing from BaseIdentityPlugin gets us a few niceties, like handling
218+
token invalidation and locking during authentication.
219+
220+
:param string auth_url: Identity v1 endpoint for authorization.
221+
:param string username: Username for authentication.
222+
:param string password: Password for authentication.
223+
:param string project_name: Swift account to use after authentication.
224+
We use 'project_name' to be consistent with
225+
other auth plugins.
226+
:param string reauthenticate: Whether to allow re-authentication.
227+
"""
228+
access_class = AccessInfoV1
229+
230+
def __init__(self, auth_url, username, password, project_name=None,
231+
reauthenticate=True):
232+
super(PasswordPlugin, self).__init__(
233+
auth_url=auth_url,
234+
reauthenticate=reauthenticate)
235+
self.user = username
236+
self.key = password
237+
self.account = project_name
238+
239+
def get_auth_ref(self, session, **kwargs):
240+
"""Obtain a token from a v1 endpoint.
241+
242+
This function should not be called independently and is expected to be
243+
invoked via the do_authenticate function.
244+
245+
This function will be invoked if the AcessInfo object cached by the
246+
plugin is not valid. Thus plugins should always fetch a new AccessInfo
247+
when invoked. If you are looking to just retrieve the current auth
248+
data then you should use get_access.
249+
250+
:param session: A session object that can be used for communication.
251+
252+
:returns: Token access information.
253+
"""
254+
headers = {'X-Auth-User': self.user,
255+
'X-Auth-Key': self.key}
256+
257+
resp = session.get(self.auth_url, headers=headers,
258+
authenticated=False, log=False)
259+
260+
if resp.status_code // 100 != 2:
261+
raise exceptions.InvalidResponse(response=resp)
262+
263+
if 'X-Storage-Url' not in resp.headers:
264+
raise exceptions.InvalidResponse(response=resp)
265+
266+
if 'X-Auth-Token' not in resp.headers and \
267+
'X-Storage-Token' not in resp.headers:
268+
raise exceptions.InvalidResponse(response=resp)
269+
token = resp.headers.get('X-Storage-Token',
270+
resp.headers.get('X-Auth-Token'))
271+
return AccessInfoV1(
272+
auth_url=self.auth_url,
273+
storage_url=resp.headers['X-Storage-Url'],
274+
account=self.account,
275+
username=self.user,
276+
auth_token=token,
277+
token_life=resp.headers.get('X-Auth-Token-Expires'))
278+
279+
def get_cache_id_elements(self):
280+
"""Get the elements for this auth plugin that make it unique."""
281+
return {'auth_url': self.auth_url,
282+
'user': self.user,
283+
'key': self.key,
284+
'account': self.account}
285+
286+
def get_endpoint(self, session, interface='public', **kwargs):
287+
"""Return an endpoint for the client."""
288+
if interface is plugin.AUTH_INTERFACE:
289+
return self.auth_url
290+
else:
291+
return self.get_access(session).service_catalog.url_for(
292+
interface=interface, **kwargs)
293+
294+
def get_auth_state(self):
295+
"""Retrieve the current authentication state for the plugin.
296+
297+
:returns: raw python data (which can be JSON serialized) that can be
298+
moved into another plugin (of the same type) to have the
299+
same authenticated state.
300+
"""
301+
if self.auth_ref:
302+
return self.auth_ref.get_state()
303+
304+
def set_auth_state(self, data):
305+
"""Install existing authentication state for a plugin.
306+
307+
Take the output of get_auth_state and install that authentication state
308+
into the current authentication plugin.
309+
"""
310+
if data:
311+
self.auth_ref = self.access_class.from_state(data)
312+
else:
313+
self.auth_ref = None
314+
315+
def get_sp_auth_url(self, *args, **kwargs):
316+
raise NotImplementedError()
317+
318+
def get_sp_url(self, *args, **kwargs):
319+
raise NotImplementedError()
320+
321+
def get_discovery(self, *args, **kwargs):
322+
raise NotImplementedError()
323+
324+
325+
class PasswordLoader(loading.BaseLoader):
326+
"""Option handling for the ``v1password`` plugin."""
327+
plugin_class = PasswordPlugin
328+
329+
def get_options(self):
330+
"""Return the list of parameters associated with the auth plugin.
331+
332+
This list may be used to generate CLI or config arguments.
333+
"""
334+
return [
335+
loading.Opt('auth-url', required=True,
336+
help='Authentication URL'),
337+
# overload project-name as a way to specify an alternate account,
338+
# since:
339+
# - in a world of just users & passwords, this seems the closest
340+
# analog to a project, and
341+
# - openstackclient will (or used to?) still require that you
342+
# provide one anyway
343+
loading.Opt('project-name', required=False,
344+
help='Swift account to use'),
345+
loading.Opt('username', required=True,
346+
deprecated=[loading.Opt('user-name')],
347+
help='Username to login with'),
348+
loading.Opt('password', required=True, secret=True,
349+
help='Password to use'),
350+
]

0 commit comments

Comments
 (0)