1
|
|
|
# Licensed to the StackStorm, Inc ('StackStorm') under one or more |
2
|
|
|
# contributor license agreements. See the NOTICE file distributed with |
3
|
|
|
# this work for additional information regarding copyright ownership. |
4
|
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0 |
5
|
|
|
# (the "License"); you may not use this file except in compliance with |
6
|
|
|
# the License. You may obtain a copy of the License at |
7
|
|
|
# |
8
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0 |
9
|
|
|
# |
10
|
|
|
# Unless required by applicable law or agreed to in writing, software |
11
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, |
12
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
13
|
|
|
# See the License for the specific language governing permissions and |
14
|
|
|
# limitations under the License. |
15
|
|
|
|
16
|
|
|
""" |
17
|
|
|
Command-line interface to StackStorm. |
18
|
|
|
""" |
19
|
|
|
|
20
|
|
|
from __future__ import print_function |
21
|
|
|
from __future__ import absolute_import |
22
|
|
|
|
23
|
|
|
import os |
24
|
|
|
import sys |
25
|
|
|
import json |
26
|
|
|
import time |
27
|
|
|
import argparse |
28
|
|
|
import calendar |
29
|
|
|
import logging |
30
|
|
|
import traceback |
31
|
|
|
|
32
|
|
|
import six |
33
|
|
|
import requests |
34
|
|
|
|
35
|
|
|
from st2client import __version__ |
36
|
|
|
from st2client import models |
37
|
|
|
from st2client.client import Client |
38
|
|
|
from st2client.commands import auth |
39
|
|
|
from st2client.commands import action |
40
|
|
|
from st2client.commands import action_alias |
41
|
|
|
from st2client.commands import keyvalue |
42
|
|
|
from st2client.commands import policy |
43
|
|
|
from st2client.commands import resource |
44
|
|
|
from st2client.commands import sensor |
45
|
|
|
from st2client.commands import trace |
46
|
|
|
from st2client.commands import trigger |
47
|
|
|
from st2client.commands import triggerinstance |
48
|
|
|
from st2client.commands import webhook |
49
|
|
|
from st2client.commands import rule |
50
|
|
|
from st2client.commands import rule_enforcement |
51
|
|
|
from st2client.config_parser import CLIConfigParser |
52
|
|
|
from st2client.config_parser import ST2_CONFIG_DIRECTORY |
53
|
|
|
from st2client.config_parser import ST2_CONFIG_PATH |
54
|
|
|
from st2client.exceptions.operations import OperationFailureException |
55
|
|
|
from st2client.utils.date import parse as parse_isotime |
56
|
|
|
from st2client.utils.misc import merge_dicts |
57
|
|
|
from st2client.utils.logging import LogLevelFilter, set_log_level_for_all_loggers |
58
|
|
|
|
59
|
|
|
__all__ = [ |
60
|
|
|
'Shell' |
61
|
|
|
] |
62
|
|
|
|
63
|
|
|
LOG = logging.getLogger(__name__) |
64
|
|
|
|
65
|
|
|
CLI_DESCRIPTION = 'CLI for StackStorm event-driven automation platform. https://stackstorm.com' |
66
|
|
|
|
67
|
|
|
# How many seconds before the token actual expiration date we should consider the token as |
68
|
|
|
# expired. This is used to prevent the operation from failing durig the API request because the |
69
|
|
|
# token was just about to expire. |
70
|
|
|
TOKEN_EXPIRATION_GRACE_PERIOD_SECONDS = 15 |
71
|
|
|
|
72
|
|
|
CONFIG_OPTION_TO_CLIENT_KWARGS_MAP = { |
73
|
|
|
'base_url': ['general', 'base_url'], |
74
|
|
|
'auth_url': ['auth', 'url'], |
75
|
|
|
'api_url': ['api', 'url'], |
76
|
|
|
'api_version': ['general', 'api_version'], |
77
|
|
|
'cacert': ['general', 'cacert'], |
78
|
|
|
'debug': ['cli', 'debug'] |
79
|
|
|
} |
80
|
|
|
|
81
|
|
|
# A list of command classes for which automatic authentication should be skipped. |
82
|
|
|
from st2client.commands.auth import TokenCreateCommand |
83
|
|
|
SKIP_AUTH_CLASSES = [ |
84
|
|
|
TokenCreateCommand.__name__ |
85
|
|
|
] |
86
|
|
|
|
87
|
|
|
|
88
|
|
|
class Shell(object): |
89
|
|
|
|
90
|
|
|
def __init__(self): |
91
|
|
|
# Set up of endpoints is delayed until program is run. |
92
|
|
|
self.client = None |
93
|
|
|
|
94
|
|
|
# Set up the main parser. |
95
|
|
|
self.parser = argparse.ArgumentParser(description=CLI_DESCRIPTION) |
96
|
|
|
|
97
|
|
|
# Set up general program options. |
98
|
|
|
self.parser.add_argument( |
99
|
|
|
'--version', |
100
|
|
|
action='version', |
101
|
|
|
version='%(prog)s {version}'.format(version=__version__)) |
102
|
|
|
|
103
|
|
|
self.parser.add_argument( |
104
|
|
|
'--url', |
105
|
|
|
action='store', |
106
|
|
|
dest='base_url', |
107
|
|
|
default=None, |
108
|
|
|
help='Base URL for the API servers. Assumes all servers uses the ' |
109
|
|
|
'same base URL and default ports are used. Get ST2_BASE_URL' |
110
|
|
|
'from the environment variables by default.' |
111
|
|
|
) |
112
|
|
|
|
113
|
|
|
self.parser.add_argument( |
114
|
|
|
'--auth-url', |
115
|
|
|
action='store', |
116
|
|
|
dest='auth_url', |
117
|
|
|
default=None, |
118
|
|
|
help='URL for the autentication service. Get ST2_AUTH_URL' |
119
|
|
|
'from the environment variables by default.' |
120
|
|
|
) |
121
|
|
|
|
122
|
|
|
self.parser.add_argument( |
123
|
|
|
'--api-url', |
124
|
|
|
action='store', |
125
|
|
|
dest='api_url', |
126
|
|
|
default=None, |
127
|
|
|
help='URL for the API server. Get ST2_API_URL' |
128
|
|
|
'from the environment variables by default.' |
129
|
|
|
) |
130
|
|
|
|
131
|
|
|
self.parser.add_argument( |
132
|
|
|
'--api-version', |
133
|
|
|
action='store', |
134
|
|
|
dest='api_version', |
135
|
|
|
default=None, |
136
|
|
|
help='API version to sue. Get ST2_API_VERSION' |
137
|
|
|
'from the environment variables by default.' |
138
|
|
|
) |
139
|
|
|
|
140
|
|
|
self.parser.add_argument( |
141
|
|
|
'--cacert', |
142
|
|
|
action='store', |
143
|
|
|
dest='cacert', |
144
|
|
|
default=None, |
145
|
|
|
help='Path to the CA cert bundle for the SSL endpoints. ' |
146
|
|
|
'Get ST2_CACERT from the environment variables by default. ' |
147
|
|
|
'If this is not provided, then SSL cert will not be verified.' |
148
|
|
|
) |
149
|
|
|
|
150
|
|
|
self.parser.add_argument( |
151
|
|
|
'--config-file', |
152
|
|
|
action='store', |
153
|
|
|
dest='config_file', |
154
|
|
|
default=None, |
155
|
|
|
help='Path to the CLI config file' |
156
|
|
|
) |
157
|
|
|
|
158
|
|
|
self.parser.add_argument( |
159
|
|
|
'--print-config', |
160
|
|
|
action='store_true', |
161
|
|
|
dest='print_config', |
162
|
|
|
default=False, |
163
|
|
|
help='Parse the config file and print the values' |
164
|
|
|
) |
165
|
|
|
|
166
|
|
|
self.parser.add_argument( |
167
|
|
|
'--skip-config', |
168
|
|
|
action='store_true', |
169
|
|
|
dest='skip_config', |
170
|
|
|
default=False, |
171
|
|
|
help='Don\'t parse and use the CLI config file' |
172
|
|
|
) |
173
|
|
|
|
174
|
|
|
self.parser.add_argument( |
175
|
|
|
'--debug', |
176
|
|
|
action='store_true', |
177
|
|
|
dest='debug', |
178
|
|
|
default=False, |
179
|
|
|
help='Enable debug mode' |
180
|
|
|
) |
181
|
|
|
|
182
|
|
|
# Set up list of commands and subcommands. |
183
|
|
|
self.subparsers = self.parser.add_subparsers() |
184
|
|
|
self.commands = dict() |
185
|
|
|
|
186
|
|
|
self.commands['action'] = action.ActionBranch( |
187
|
|
|
'An activity that happens as a response to the external event.', |
188
|
|
|
self, self.subparsers) |
189
|
|
|
|
190
|
|
|
self.commands['action-alias'] = action_alias.ActionAliasBranch( |
191
|
|
|
'Action aliases.', |
192
|
|
|
self, self.subparsers) |
193
|
|
|
|
194
|
|
|
self.commands['auth'] = auth.TokenCreateCommand( |
195
|
|
|
models.Token, self, self.subparsers, name='auth') |
196
|
|
|
|
197
|
|
|
self.commands['api-key'] = auth.ApiKeyBranch( |
198
|
|
|
'API Keys.', |
199
|
|
|
self, self.subparsers) |
200
|
|
|
|
201
|
|
|
self.commands['execution'] = action.ActionExecutionBranch( |
202
|
|
|
'An invocation of an action.', |
203
|
|
|
self, self.subparsers) |
204
|
|
|
|
205
|
|
|
self.commands['key'] = keyvalue.KeyValuePairBranch( |
206
|
|
|
'Key value pair is used to store commonly used configuration ' |
207
|
|
|
'for reuse in sensors, actions, and rules.', |
208
|
|
|
self, self.subparsers) |
209
|
|
|
|
210
|
|
|
self.commands['policy'] = policy.PolicyBranch( |
211
|
|
|
'Policy that is enforced on a resource.', |
212
|
|
|
self, self.subparsers) |
213
|
|
|
|
214
|
|
|
self.commands['policy-type'] = policy.PolicyTypeBranch( |
215
|
|
|
'Type of policy that can be applied to resources.', |
216
|
|
|
self, self.subparsers) |
217
|
|
|
|
218
|
|
|
self.commands['rule'] = rule.RuleBranch( |
219
|
|
|
'A specification to invoke an "action" on a "trigger" selectively ' |
220
|
|
|
'based on some criteria.', |
221
|
|
|
self, self.subparsers) |
222
|
|
|
|
223
|
|
|
self.commands['run'] = action.ActionRunCommand( |
224
|
|
|
models.Action, self, self.subparsers, name='run', add_help=False) |
225
|
|
|
|
226
|
|
|
self.commands['runner'] = resource.ResourceBranch( |
227
|
|
|
models.RunnerType, |
228
|
|
|
'Runner is a type of handler for a specific class of actions.', |
229
|
|
|
self, self.subparsers, read_only=True) |
230
|
|
|
|
231
|
|
|
self.commands['sensor'] = sensor.SensorBranch( |
232
|
|
|
'An adapter which allows you to integrate StackStorm with external system ', |
233
|
|
|
self, self.subparsers) |
234
|
|
|
|
235
|
|
|
self.commands['trace'] = trace.TraceBranch( |
236
|
|
|
'A group of executions, rules and triggerinstances that are related.', |
237
|
|
|
self, self.subparsers) |
238
|
|
|
|
239
|
|
|
self.commands['trigger'] = trigger.TriggerTypeBranch( |
240
|
|
|
'An external event that is mapped to a st2 input. It is the ' |
241
|
|
|
'st2 invocation point.', |
242
|
|
|
self, self.subparsers) |
243
|
|
|
|
244
|
|
|
self.commands['trigger-instance'] = triggerinstance.TriggerInstanceBranch( |
245
|
|
|
'Actual instances of triggers received by st2.', |
246
|
|
|
self, self.subparsers) |
247
|
|
|
|
248
|
|
|
self.commands['webhook'] = webhook.WebhookBranch( |
249
|
|
|
'Webhooks.', |
250
|
|
|
self, self.subparsers) |
251
|
|
|
|
252
|
|
|
self.commands['rule-enforcement'] = rule_enforcement.RuleEnforcementBranch( |
253
|
|
|
'Models that represent enforcement of rules.', |
254
|
|
|
self, self.subparsers) |
255
|
|
|
|
256
|
|
|
def get_client(self, args, debug=False): |
257
|
|
|
ST2_CLI_SKIP_CONFIG = os.environ.get('ST2_CLI_SKIP_CONFIG', 0) |
258
|
|
|
ST2_CLI_SKIP_CONFIG = int(ST2_CLI_SKIP_CONFIG) |
259
|
|
|
|
260
|
|
|
skip_config = args.skip_config |
261
|
|
|
skip_config = skip_config or ST2_CLI_SKIP_CONFIG |
262
|
|
|
|
263
|
|
|
# Note: Options provided as the CLI argument have the highest precedence |
264
|
|
|
# Precedence order: cli arguments > environment variables > rc file variables |
265
|
|
|
cli_options = ['base_url', 'auth_url', 'api_url', 'api_version', 'cacert'] |
266
|
|
|
cli_options = {opt: getattr(args, opt) for opt in cli_options} |
267
|
|
|
config_file_options = self._get_config_file_options(args=args) |
268
|
|
|
|
269
|
|
|
kwargs = {} |
270
|
|
|
|
271
|
|
|
if not skip_config: |
272
|
|
|
# Config parsing is skipped |
273
|
|
|
kwargs = merge_dicts(kwargs, config_file_options) |
274
|
|
|
|
275
|
|
|
kwargs = merge_dicts(kwargs, cli_options) |
276
|
|
|
kwargs['debug'] = debug |
277
|
|
|
|
278
|
|
|
client = Client(**kwargs) |
279
|
|
|
|
280
|
|
|
if ST2_CLI_SKIP_CONFIG: |
281
|
|
|
# Config parsing is skipped |
282
|
|
|
LOG.info('Skipping parsing CLI config') |
283
|
|
|
return client |
284
|
|
|
|
285
|
|
|
# Ok to load config at this point. |
286
|
|
|
rc_config = self._parse_config_file(args=args) |
287
|
|
|
|
288
|
|
|
# Silence SSL warnings |
289
|
|
|
silence_ssl_warnings = rc_config.get('general', {}).get('silence_ssl_warnings', False) |
290
|
|
|
if silence_ssl_warnings: |
291
|
|
|
requests.packages.urllib3.disable_warnings() |
292
|
|
|
|
293
|
|
|
# We skip automatic authentication for some commands such as auth |
294
|
|
|
try: |
295
|
|
|
command_class_name = args.func.im_class.__name__ |
296
|
|
|
except Exception: |
297
|
|
|
command_class_name = None |
298
|
|
|
|
299
|
|
|
if command_class_name in SKIP_AUTH_CLASSES: |
300
|
|
|
return client |
301
|
|
|
|
302
|
|
|
# We also skip automatic authentication if token is provided via the environment variable |
303
|
|
|
# or as a command line argument |
304
|
|
|
env_var_token = os.environ.get('ST2_AUTH_TOKEN', None) |
305
|
|
|
cli_argument_token = getattr(args, 'token', None) |
306
|
|
|
if env_var_token or cli_argument_token: |
307
|
|
|
return client |
308
|
|
|
|
309
|
|
|
# If credentials are provided in the CLI config use them and try to authenticate |
310
|
|
|
credentials = rc_config.get('credentials', {}) |
311
|
|
|
username = credentials.get('username', None) |
312
|
|
|
password = credentials.get('password', None) |
313
|
|
|
cache_token = rc_config.get('cli', {}).get('cache_token', False) |
314
|
|
|
|
315
|
|
|
if username and password: |
316
|
|
|
# Credentials are provided, try to authenticate agaist the API |
317
|
|
|
try: |
318
|
|
|
token = self._get_auth_token(client=client, username=username, password=password, |
319
|
|
|
cache_token=cache_token) |
320
|
|
|
except requests.exceptions.ConnectionError as e: |
321
|
|
|
LOG.warn('Auth API server is not available, skipping authentication.') |
322
|
|
|
LOG.exception(e) |
323
|
|
|
return client |
324
|
|
|
except Exception as e: |
325
|
|
|
print('Failed to authenticate with credentials provided in the config.') |
326
|
|
|
raise e |
327
|
|
|
|
328
|
|
|
client.token = token |
329
|
|
|
# TODO: Hack, refactor when splitting out the client |
330
|
|
|
os.environ['ST2_AUTH_TOKEN'] = token |
331
|
|
|
|
332
|
|
|
return client |
333
|
|
|
|
334
|
|
|
def run(self, argv): |
335
|
|
|
debug = False |
336
|
|
|
|
337
|
|
|
if '--print-config' in argv: |
338
|
|
|
# Hack because --print-config requires no command to be specified |
339
|
|
|
argv = argv + ['action', 'list'] |
340
|
|
|
|
341
|
|
|
# Parse command line arguments. |
342
|
|
|
args = self.parser.parse_args(args=argv) |
343
|
|
|
|
344
|
|
|
print_config = args.print_config |
345
|
|
|
if print_config: |
346
|
|
|
self._print_config(args=args) |
347
|
|
|
return 3 |
348
|
|
|
|
349
|
|
|
try: |
350
|
|
|
debug = getattr(args, 'debug', False) |
351
|
|
|
if debug: |
352
|
|
|
set_log_level_for_all_loggers(level=logging.DEBUG) |
353
|
|
|
|
354
|
|
|
# Set up client. |
355
|
|
|
self.client = self.get_client(args=args, debug=debug) |
356
|
|
|
|
357
|
|
|
# Execute command. |
358
|
|
|
args.func(args) |
359
|
|
|
|
360
|
|
|
return 0 |
361
|
|
|
except OperationFailureException as e: |
362
|
|
|
if debug: |
363
|
|
|
self._print_debug_info(args=args) |
364
|
|
|
return 2 |
365
|
|
|
except Exception as e: |
366
|
|
|
# We allow exception to define custom exit codes |
367
|
|
|
exit_code = getattr(e, 'exit_code', 1) |
368
|
|
|
|
369
|
|
|
print('ERROR: %s\n' % e) |
370
|
|
|
if debug: |
371
|
|
|
self._print_debug_info(args=args) |
372
|
|
|
|
373
|
|
|
return exit_code |
374
|
|
|
|
375
|
|
|
def _print_config(self, args): |
376
|
|
|
config = self._parse_config_file(args=args) |
377
|
|
|
|
378
|
|
|
for section, options in six.iteritems(config): |
379
|
|
|
print('[%s]' % (section)) |
380
|
|
|
|
381
|
|
|
for name, value in six.iteritems(options): |
382
|
|
|
print('%s = %s' % (name, value)) |
383
|
|
|
|
384
|
|
|
def _print_debug_info(self, args): |
385
|
|
|
# Print client settings |
386
|
|
|
self._print_client_settings(args=args) |
387
|
|
|
|
388
|
|
|
# Print exception traceback |
389
|
|
|
traceback.print_exc() |
390
|
|
|
|
391
|
|
|
def _print_client_settings(self, args): |
392
|
|
|
client = self.client |
393
|
|
|
|
394
|
|
|
if not client: |
395
|
|
|
return |
396
|
|
|
|
397
|
|
|
config_file_path = self._get_config_file_path(args=args) |
398
|
|
|
|
399
|
|
|
print('CLI settings:') |
400
|
|
|
print('----------------') |
401
|
|
|
print('Config file path: %s' % (config_file_path)) |
402
|
|
|
print('Client settings:') |
403
|
|
|
print('----------------') |
404
|
|
|
print('ST2_BASE_URL: %s' % (client.endpoints['base'])) |
405
|
|
|
print('ST2_AUTH_URL: %s' % (client.endpoints['auth'])) |
406
|
|
|
print('ST2_API_URL: %s' % (client.endpoints['api'])) |
407
|
|
|
print('ST2_AUTH_TOKEN: %s' % (os.environ.get('ST2_AUTH_TOKEN'))) |
408
|
|
|
print('') |
409
|
|
|
print('Proxy settings:') |
410
|
|
|
print('---------------') |
411
|
|
|
print('HTTP_PROXY: %s' % (os.environ.get('HTTP_PROXY', ''))) |
412
|
|
|
print('HTTPS_PROXY: %s' % (os.environ.get('HTTPS_PROXY', ''))) |
413
|
|
|
print('') |
414
|
|
|
|
415
|
|
|
def _get_auth_token(self, client, username, password, cache_token): |
416
|
|
|
""" |
417
|
|
|
Retrieve a valid auth token. |
418
|
|
|
|
419
|
|
|
If caching is enabled, we will first try to retrieve cached token from a |
420
|
|
|
file system. If cached token is expired or not available, we will try to |
421
|
|
|
authenticate using the provided credentials and retrieve a new auth |
422
|
|
|
token. |
423
|
|
|
|
424
|
|
|
:rtype: ``str`` |
425
|
|
|
""" |
426
|
|
|
if cache_token: |
427
|
|
|
token = self._get_cached_auth_token(client=client, username=username, |
428
|
|
|
password=password) |
429
|
|
|
else: |
430
|
|
|
token = None |
431
|
|
|
|
432
|
|
|
if not token: |
433
|
|
|
# Token is either expired or not available |
434
|
|
|
token_obj = self._authenticate_and_retrieve_auth_token(client=client, |
435
|
|
|
username=username, |
436
|
|
|
password=password) |
437
|
|
|
self._cache_auth_token(token_obj=token_obj) |
438
|
|
|
token = token_obj.token |
439
|
|
|
|
440
|
|
|
return token |
441
|
|
|
|
442
|
|
|
def _get_cached_auth_token(self, client, username, password): |
443
|
|
|
""" |
444
|
|
|
Retrieve cached auth token from the file in the config directory. |
445
|
|
|
|
446
|
|
|
:rtype: ``str`` |
447
|
|
|
""" |
448
|
|
|
if not os.path.isdir(ST2_CONFIG_DIRECTORY): |
449
|
|
|
os.makedirs(ST2_CONFIG_DIRECTORY) |
450
|
|
|
|
451
|
|
|
cached_token_path = self._get_cached_token_path_for_user(username=username) |
452
|
|
|
if not os.path.isfile(cached_token_path): |
453
|
|
|
return None |
454
|
|
|
|
455
|
|
|
if not os.access(ST2_CONFIG_DIRECTORY, os.R_OK): |
456
|
|
|
# We don't have read access to the file with a cached token |
457
|
|
|
message = ('Unable to retrieve cached token from "%s" (user %s doesn\'t have read ' |
458
|
|
|
'access to the parent directory). Subsequent requests won\'t use a ' |
459
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
460
|
|
|
os.getlogin())) |
461
|
|
|
LOG.warn(message) |
462
|
|
|
return None |
463
|
|
|
|
464
|
|
|
if not os.access(cached_token_path, os.R_OK): |
465
|
|
|
# We don't have read access to the file with a cached token |
466
|
|
|
message = ('Unable to retrieve cached token from "%s" (user %s doesn\'t have read ' |
467
|
|
|
'access to this file). Subsequent requests won\'t use a cached token ' |
468
|
|
|
'meaning they may be slower.' % (cached_token_path, os.getlogin())) |
469
|
|
|
LOG.warn(message) |
470
|
|
|
return None |
471
|
|
|
|
472
|
|
|
with open(cached_token_path) as fp: |
473
|
|
|
data = fp.read() |
474
|
|
|
|
475
|
|
|
try: |
476
|
|
|
data = json.loads(data) |
477
|
|
|
|
478
|
|
|
token = data['token'] |
479
|
|
|
expire_timestamp = data['expire_timestamp'] |
480
|
|
|
except Exception as e: |
481
|
|
|
msg = ('File "%s" with cached token is corrupted or invalid (%s). Please delete ' |
482
|
|
|
' this file' % (cached_token_path, str(e))) |
483
|
|
|
raise ValueError(msg) |
484
|
|
|
|
485
|
|
|
now = int(time.time()) |
486
|
|
|
if (expire_timestamp - TOKEN_EXPIRATION_GRACE_PERIOD_SECONDS) < now: |
487
|
|
|
LOG.debug('Cached token from file "%s" has expired' % (cached_token_path)) |
488
|
|
|
# Token has expired |
489
|
|
|
return None |
490
|
|
|
|
491
|
|
|
LOG.debug('Using cached token from file "%s"' % (cached_token_path)) |
492
|
|
|
return token |
493
|
|
|
|
494
|
|
|
def _cache_auth_token(self, token_obj): |
495
|
|
|
""" |
496
|
|
|
Cache auth token in the config directory. |
497
|
|
|
|
498
|
|
|
:param token_obj: Token object. |
499
|
|
|
:type token_obj: ``object`` |
500
|
|
|
""" |
501
|
|
|
if not os.path.isdir(ST2_CONFIG_DIRECTORY): |
502
|
|
|
os.makedirs(ST2_CONFIG_DIRECTORY) |
503
|
|
|
|
504
|
|
|
username = token_obj.user |
505
|
|
|
cached_token_path = self._get_cached_token_path_for_user(username=username) |
506
|
|
|
|
507
|
|
|
if not os.access(ST2_CONFIG_DIRECTORY, os.W_OK): |
508
|
|
|
# We don't have write access to the file with a cached token |
509
|
|
|
message = ('Unable to write token to "%s" (user %s doesn\'t have write' |
510
|
|
|
'access to the parent directory). Subsequent requests won\'t use a ' |
511
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
512
|
|
|
os.getlogin())) |
513
|
|
|
LOG.warn(message) |
514
|
|
|
return None |
515
|
|
|
|
516
|
|
|
if os.path.isfile(cached_token_path) and not os.access(cached_token_path, os.W_OK): |
517
|
|
|
# We don't have write access to the file with a cached token |
518
|
|
|
message = ('Unable to write token to "%s" (user %s doesn\'t have write' |
519
|
|
|
'access to this file). Subsequent requests won\'t use a ' |
520
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
521
|
|
|
os.getlogin())) |
522
|
|
|
LOG.warn(message) |
523
|
|
|
return None |
524
|
|
|
|
525
|
|
|
token = token_obj.token |
526
|
|
|
expire_timestamp = parse_isotime(token_obj.expiry) |
527
|
|
|
expire_timestamp = calendar.timegm(expire_timestamp.timetuple()) |
528
|
|
|
|
529
|
|
|
data = {} |
530
|
|
|
data['token'] = token |
531
|
|
|
data['expire_timestamp'] = expire_timestamp |
532
|
|
|
data = json.dumps(data) |
533
|
|
|
|
534
|
|
|
# Note: We explictly use fdopen instead of open + chmod to avoid a security issue. |
535
|
|
|
# open + chmod are two operations which means that during a short time frame (between |
536
|
|
|
# open and chmod) when file can potentially be read by other users if the default |
537
|
|
|
# permissions used during create allow that. |
538
|
|
|
fd = os.open(cached_token_path, os.O_WRONLY | os.O_CREAT, 0600) |
539
|
|
|
with os.fdopen(fd, 'w') as fp: |
540
|
|
|
fp.write(data) |
541
|
|
|
|
542
|
|
|
LOG.debug('Token has been cached in "%s"' % (cached_token_path)) |
543
|
|
|
return True |
544
|
|
|
|
545
|
|
|
def _authenticate_and_retrieve_auth_token(self, client, username, password): |
546
|
|
|
manager = models.ResourceManager(models.Token, client.endpoints['auth'], |
547
|
|
|
cacert=client.cacert, debug=client.debug) |
548
|
|
|
instance = models.Token() |
549
|
|
|
instance = manager.create(instance, auth=(username, password)) |
550
|
|
|
return instance |
551
|
|
|
|
552
|
|
|
def _get_cached_token_path_for_user(self, username): |
553
|
|
|
""" |
554
|
|
|
Retrieve cached token path for the provided username. |
555
|
|
|
""" |
556
|
|
|
file_name = 'token-%s' % (username) |
557
|
|
|
result = os.path.abspath(os.path.join(ST2_CONFIG_DIRECTORY, file_name)) |
558
|
|
|
return result |
559
|
|
|
|
560
|
|
|
def _get_config_file_path(self, args): |
561
|
|
|
""" |
562
|
|
|
Retrieve path to the CLI configuration file. |
563
|
|
|
|
564
|
|
|
:rtype: ``str`` |
565
|
|
|
""" |
566
|
|
|
path = os.environ.get('ST2_CONFIG_FILE', ST2_CONFIG_PATH) |
567
|
|
|
|
568
|
|
|
if args.config_file: |
569
|
|
|
path = args.config_file |
570
|
|
|
|
571
|
|
|
path = os.path.abspath(path) |
572
|
|
|
if path != ST2_CONFIG_PATH and not os.path.isfile(path): |
573
|
|
|
raise ValueError('Config "%s" not found' % (path)) |
574
|
|
|
|
575
|
|
|
return path |
576
|
|
|
|
577
|
|
|
def _parse_config_file(self, args): |
578
|
|
|
config_file_path = self._get_config_file_path(args=args) |
579
|
|
|
|
580
|
|
|
parser = CLIConfigParser(config_file_path=config_file_path, validate_config_exists=False) |
581
|
|
|
result = parser.parse() |
582
|
|
|
return result |
583
|
|
|
|
584
|
|
|
def _get_config_file_options(self, args): |
585
|
|
|
""" |
586
|
|
|
Parse the config and return kwargs which can be passed to the Client |
587
|
|
|
constructor. |
588
|
|
|
|
589
|
|
|
:rtype: ``dict`` |
590
|
|
|
""" |
591
|
|
|
rc_options = self._parse_config_file(args=args) |
592
|
|
|
|
593
|
|
|
result = {} |
594
|
|
|
for kwarg_name, (section, option) in six.iteritems(CONFIG_OPTION_TO_CLIENT_KWARGS_MAP): |
595
|
|
|
result[kwarg_name] = rc_options.get(section, {}).get(option, None) |
596
|
|
|
|
597
|
|
|
return result |
598
|
|
|
|
599
|
|
|
|
600
|
|
|
def setup_logging(argv): |
601
|
|
|
debug = '--debug' in argv |
602
|
|
|
|
603
|
|
|
root = LOG |
604
|
|
|
root.setLevel(logging.WARNING) |
605
|
|
|
|
606
|
|
|
handler = logging.StreamHandler(sys.stderr) |
607
|
|
|
handler.setLevel(logging.WARNING) |
608
|
|
|
formatter = logging.Formatter('%(asctime)s %(levelname)s - %(message)s') |
609
|
|
|
handler.setFormatter(formatter) |
610
|
|
|
|
611
|
|
|
if not debug: |
612
|
|
|
handler.addFilter(LogLevelFilter(log_levels=[logging.ERROR])) |
613
|
|
|
|
614
|
|
|
root.addHandler(handler) |
615
|
|
|
|
616
|
|
|
|
617
|
|
|
def main(argv=sys.argv[1:]): |
618
|
|
|
setup_logging(argv) |
619
|
|
|
return Shell().run(argv) |
620
|
|
|
|
621
|
|
|
|
622
|
|
|
if __name__ == '__main__': |
623
|
|
|
sys.exit(main(sys.argv[1:])) |
624
|
|
|
|