00eeb3593c
In several places we had else branches where a reasonable default would do the job. This makes the code a mean cleaer and easier to read. Change-Id: I231e09aab85fd32b8300bc33c48d0899b728b96e
226 lines
7.6 KiB
Python
226 lines
7.6 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
|
|
"""Identity v3 Trust action implementations"""
|
|
|
|
import datetime
|
|
import logging
|
|
import six
|
|
|
|
from cliff import command
|
|
from cliff import lister
|
|
from cliff import show
|
|
|
|
from openstackclient.common import utils
|
|
from openstackclient.identity import common
|
|
|
|
|
|
class CreateTrust(show.ShowOne):
|
|
"""Create new trust"""
|
|
|
|
log = logging.getLogger(__name__ + '.CreateTrust')
|
|
|
|
def get_parser(self, prog_name):
|
|
parser = super(CreateTrust, self).get_parser(prog_name)
|
|
parser.add_argument(
|
|
'trustor',
|
|
metavar='<trustor-user>',
|
|
help='User that is delegating authorization (name or ID)',
|
|
)
|
|
parser.add_argument(
|
|
'trustee',
|
|
metavar='<trustee-user>',
|
|
help='User that is assuming authorization (name or ID)',
|
|
)
|
|
parser.add_argument(
|
|
'--project',
|
|
metavar='<project>',
|
|
required=True,
|
|
help='Project being delegated (name or ID) (required)',
|
|
)
|
|
parser.add_argument(
|
|
'--role',
|
|
metavar='<role>',
|
|
action='append',
|
|
default=[],
|
|
help='Roles to authorize (name or ID) '
|
|
'(repeat to set multiple values) (required)',
|
|
required=True
|
|
)
|
|
parser.add_argument(
|
|
'--impersonate',
|
|
dest='impersonate',
|
|
action='store_true',
|
|
default=False,
|
|
help='Tokens generated from the trust will represent <trustor>'
|
|
' (defaults to False)',
|
|
)
|
|
parser.add_argument(
|
|
'--expiration',
|
|
metavar='<expiration>',
|
|
help='Sets an expiration date for the trust'
|
|
' (format of YYYY-mm-ddTHH:MM:SS)',
|
|
)
|
|
parser.add_argument(
|
|
'--project-domain',
|
|
metavar='<domain>',
|
|
help='Domain that contains <project> (name or ID)',
|
|
)
|
|
parser.add_argument(
|
|
'--trustor-domain',
|
|
metavar='<domain>',
|
|
help='Domain that contains <trustor> (name or ID)',
|
|
)
|
|
parser.add_argument(
|
|
'--trustee-domain',
|
|
metavar='<domain>',
|
|
help='Domain that contains <trustee> (name or ID)',
|
|
)
|
|
return parser
|
|
|
|
def take_action(self, parsed_args):
|
|
self.log.debug('take_action(%s)' % parsed_args)
|
|
identity_client = self.app.client_manager.identity
|
|
|
|
project_domain = None
|
|
if parsed_args.project_domain:
|
|
project_domain = common.find_domain(identity_client,
|
|
parsed_args.project_domain).id
|
|
|
|
trustor_domain = None
|
|
if parsed_args.trustor_domain:
|
|
trustor_domain = common.find_domain(identity_client,
|
|
parsed_args.trustor_domain).id
|
|
|
|
trustee_domain = None
|
|
if parsed_args.trustee_domain:
|
|
trustee_domain = common.find_domain(identity_client,
|
|
parsed_args.trustee_domain).id
|
|
|
|
# NOTE(stevemar): Find the two users, project and roles that
|
|
# are necessary for making a trust usable, the API dictates that
|
|
# trustee, project and role are optional, but that makes the trust
|
|
# pointless, and trusts are immutable, so let's enforce it at the
|
|
# client level.
|
|
trustor_id = utils.find_resource(identity_client.users,
|
|
parsed_args.trustor,
|
|
domain_id=trustor_domain).id
|
|
trustee_id = utils.find_resource(identity_client.users,
|
|
parsed_args.trustee,
|
|
domain_id=trustee_domain).id
|
|
project_id = utils.find_resource(identity_client.projects,
|
|
parsed_args.project,
|
|
domain_id=project_domain).id
|
|
|
|
role_names = []
|
|
for role in parsed_args.role:
|
|
role_name = utils.find_resource(
|
|
identity_client.roles,
|
|
role,
|
|
).name
|
|
role_names.append(role_name)
|
|
|
|
expires_at = None
|
|
if parsed_args.expiration:
|
|
expires_at = datetime.datetime.strptime(parsed_args.expiration,
|
|
'%Y-%m-%dT%H:%M:%S')
|
|
|
|
trust = identity_client.trusts.create(
|
|
trustee_id, trustor_id,
|
|
impersonation=parsed_args.impersonate,
|
|
project=project_id,
|
|
role_names=role_names,
|
|
expires_at=expires_at,
|
|
)
|
|
|
|
trust._info.pop('roles_links', None)
|
|
trust._info.pop('links', None)
|
|
|
|
# Format roles into something sensible
|
|
roles = trust._info.pop('roles')
|
|
msg = ''.join([r['name'] + ' ' for r in roles])
|
|
trust._info['roles'] = msg
|
|
|
|
return zip(*sorted(six.iteritems(trust._info)))
|
|
|
|
|
|
class DeleteTrust(command.Command):
|
|
"""Delete trust(s)"""
|
|
|
|
log = logging.getLogger(__name__ + '.DeleteTrust')
|
|
|
|
def get_parser(self, prog_name):
|
|
parser = super(DeleteTrust, self).get_parser(prog_name)
|
|
parser.add_argument(
|
|
'trust',
|
|
metavar='<trust>',
|
|
help='Trust(s) to delete',
|
|
nargs="+",
|
|
)
|
|
return parser
|
|
|
|
def take_action(self, parsed_args):
|
|
self.log.debug('take_action(%s)' % parsed_args)
|
|
identity_client = self.app.client_manager.identity
|
|
for t in parsed_args.trust:
|
|
trust_obj = utils.find_resource(identity_client.trusts, t)
|
|
identity_client.trusts.delete(trust_obj.id)
|
|
|
|
|
|
class ListTrust(lister.Lister):
|
|
"""List trusts"""
|
|
|
|
log = logging.getLogger(__name__ + '.ListTrust')
|
|
|
|
def take_action(self, parsed_args):
|
|
self.log.debug('take_action(%s)' % parsed_args)
|
|
columns = ('ID', 'Expires At', 'Impersonation', 'Project ID',
|
|
'Trustee User ID', 'Trustor User ID')
|
|
data = self.app.client_manager.identity.trusts.list()
|
|
return (columns,
|
|
(utils.get_item_properties(
|
|
s, columns,
|
|
formatters={},
|
|
) for s in data))
|
|
|
|
|
|
class ShowTrust(show.ShowOne):
|
|
"""Display trust details"""
|
|
|
|
log = logging.getLogger(__name__ + '.ShowTrust')
|
|
|
|
def get_parser(self, prog_name):
|
|
parser = super(ShowTrust, self).get_parser(prog_name)
|
|
parser.add_argument(
|
|
'trust',
|
|
metavar='<trust>',
|
|
help='Trust to display',
|
|
)
|
|
return parser
|
|
|
|
def take_action(self, parsed_args):
|
|
self.log.debug('take_action(%s)' % parsed_args)
|
|
identity_client = self.app.client_manager.identity
|
|
trust = utils.find_resource(identity_client.trusts,
|
|
parsed_args.trust)
|
|
|
|
trust._info.pop('roles_links', None)
|
|
trust._info.pop('links', None)
|
|
|
|
# Format roles into something sensible
|
|
roles = trust._info.pop('roles')
|
|
msg = ''.join([r['name'] + ' ' for r in roles])
|
|
trust._info['roles'] = msg
|
|
|
|
return zip(*sorted(six.iteritems(trust._info)))
|