1
|
|
|
# Licensed to the StackStorm, Inc ('StackStorm') under one or more |
2
|
|
|
# contributor license agreements. See the NOTICE file distributed with |
3
|
|
|
# this work for additional information regarding copyright ownership. |
4
|
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0 |
5
|
|
|
# (the "License"); you may not use this file except in compliance with |
6
|
|
|
# the License. You may obtain a copy of the License at |
7
|
|
|
# |
8
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0 |
9
|
|
|
# |
10
|
|
|
# Unless required by applicable law or agreed to in writing, software |
11
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, |
12
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
13
|
|
|
# See the License for the specific language governing permissions and |
14
|
|
|
# limitations under the License. |
15
|
|
|
|
16
|
|
|
import os |
17
|
|
|
import json |
18
|
|
|
import logging |
19
|
|
|
import time |
20
|
|
|
import calendar |
21
|
|
|
import traceback |
22
|
|
|
|
23
|
|
|
import six |
24
|
|
|
import requests |
25
|
|
|
|
26
|
|
|
from st2client import models |
27
|
|
|
from st2client.config_parser import CLIConfigParser |
28
|
|
|
from st2client.config_parser import ST2_CONFIG_DIRECTORY |
29
|
|
|
from st2client.config_parser import ST2_CONFIG_PATH |
30
|
|
|
from st2client.client import Client |
31
|
|
|
from st2client.config import get_config |
32
|
|
|
from st2client.utils.date import parse as parse_isotime |
33
|
|
|
from st2client.utils.misc import merge_dicts |
34
|
|
|
|
35
|
|
|
__all__ = [ |
36
|
|
|
'BaseCLIApp' |
37
|
|
|
] |
38
|
|
|
|
39
|
|
|
# How many seconds before the token actual expiration date we should consider the token as |
40
|
|
|
# expired. This is used to prevent the operation from failing durig the API request because the |
41
|
|
|
# token was just about to expire. |
42
|
|
|
TOKEN_EXPIRATION_GRACE_PERIOD_SECONDS = 15 |
43
|
|
|
|
44
|
|
|
CONFIG_OPTION_TO_CLIENT_KWARGS_MAP = { |
45
|
|
|
'base_url': ['general', 'base_url'], |
46
|
|
|
'auth_url': ['auth', 'url'], |
47
|
|
|
'stream_url': ['stream', 'url'], |
48
|
|
|
'api_url': ['api', 'url'], |
49
|
|
|
'api_version': ['general', 'api_version'], |
50
|
|
|
'api_key': ['credentials', 'api_key'], |
51
|
|
|
'cacert': ['general', 'cacert'], |
52
|
|
|
'debug': ['cli', 'debug'] |
53
|
|
|
} |
54
|
|
|
|
55
|
|
|
|
56
|
|
|
class BaseCLIApp(object): |
57
|
|
|
""" |
58
|
|
|
Base class for StackStorm CLI apps. |
59
|
|
|
""" |
60
|
|
|
|
61
|
|
|
LOG = logging.getLogger(__name__) # logger instance to use |
62
|
|
|
client = None # st2client instance |
63
|
|
|
|
64
|
|
|
# A list of command classes for which automatic authentication should be skipped. |
65
|
|
|
SKIP_AUTH_CLASSES = [] |
66
|
|
|
|
67
|
|
|
def get_client(self, args, debug=False): |
68
|
|
|
ST2_CLI_SKIP_CONFIG = os.environ.get('ST2_CLI_SKIP_CONFIG', 0) |
69
|
|
|
ST2_CLI_SKIP_CONFIG = int(ST2_CLI_SKIP_CONFIG) |
70
|
|
|
|
71
|
|
|
skip_config = args.skip_config |
72
|
|
|
skip_config = skip_config or ST2_CLI_SKIP_CONFIG |
73
|
|
|
|
74
|
|
|
# Note: Options provided as the CLI argument have the highest precedence |
75
|
|
|
# Precedence order: cli arguments > environment variables > rc file variables |
76
|
|
|
cli_options = ['base_url', 'auth_url', 'api_url', 'stream_url', 'api_version', 'cacert'] |
77
|
|
|
cli_options = {opt: getattr(args, opt, None) for opt in cli_options} |
78
|
|
|
config_file_options = self._get_config_file_options(args=args) |
79
|
|
|
|
80
|
|
|
kwargs = {} |
81
|
|
|
|
82
|
|
|
if not skip_config: |
83
|
|
|
# Config parsing is not skipped |
84
|
|
|
kwargs = merge_dicts(kwargs, config_file_options) |
85
|
|
|
|
86
|
|
|
kwargs = merge_dicts(kwargs, cli_options) |
87
|
|
|
kwargs['debug'] = debug |
88
|
|
|
|
89
|
|
|
client = Client(**kwargs) |
90
|
|
|
|
91
|
|
|
if skip_config: |
92
|
|
|
# Config parsing is skipped |
93
|
|
|
self.LOG.info('Skipping parsing CLI config') |
94
|
|
|
return client |
95
|
|
|
|
96
|
|
|
# Ok to use config at this point |
97
|
|
|
rc_config = get_config() |
98
|
|
|
|
99
|
|
|
# Silence SSL warnings |
100
|
|
|
silence_ssl_warnings = rc_config.get('general', {}).get('silence_ssl_warnings', False) |
101
|
|
|
if silence_ssl_warnings: |
102
|
|
|
requests.packages.urllib3.disable_warnings() |
103
|
|
|
|
104
|
|
|
# We skip automatic authentication for some commands such as auth |
105
|
|
|
try: |
106
|
|
|
command_class_name = args.func.im_class.__name__ |
107
|
|
|
except Exception: |
108
|
|
|
command_class_name = None |
109
|
|
|
|
110
|
|
|
if command_class_name in self.SKIP_AUTH_CLASSES: |
111
|
|
|
return client |
112
|
|
|
|
113
|
|
|
# We also skip automatic authentication if token is provided via the environment variable |
114
|
|
|
# or as a command line argument |
115
|
|
|
env_var_token = os.environ.get('ST2_AUTH_TOKEN', None) |
116
|
|
|
cli_argument_token = getattr(args, 'token', None) |
117
|
|
|
env_var_api_key = os.environ.get('ST2_API_KEY', None) |
118
|
|
|
cli_argument_api_key = getattr(args, 'api_key', None) |
119
|
|
|
if env_var_token or cli_argument_token or env_var_api_key or cli_argument_api_key: |
120
|
|
|
return client |
121
|
|
|
|
122
|
|
|
# If credentials are provided in the CLI config use them and try to authenticate |
123
|
|
|
credentials = rc_config.get('credentials', {}) |
124
|
|
|
username = credentials.get('username', None) |
125
|
|
|
password = credentials.get('password', None) |
126
|
|
|
cache_token = rc_config.get('cli', {}).get('cache_token', False) |
127
|
|
|
|
128
|
|
|
if username: |
129
|
|
|
# Credentials are provided, try to authenticate agaist the API |
130
|
|
|
try: |
131
|
|
|
token = self._get_auth_token(client=client, username=username, password=password, |
132
|
|
|
cache_token=cache_token) |
133
|
|
|
except requests.exceptions.ConnectionError as e: |
134
|
|
|
self.LOG.warn('Auth API server is not available, skipping authentication.') |
135
|
|
|
self.LOG.exception(e) |
136
|
|
|
return client |
137
|
|
|
except Exception as e: |
138
|
|
|
print('Failed to authenticate with credentials provided in the config.') |
139
|
|
|
raise e |
140
|
|
|
client.token = token |
141
|
|
|
# TODO: Hack, refactor when splitting out the client |
142
|
|
|
os.environ['ST2_AUTH_TOKEN'] = token |
143
|
|
|
|
144
|
|
|
return client |
145
|
|
|
|
146
|
|
|
def _get_config_file_options(self, args): |
147
|
|
|
""" |
148
|
|
|
Parse the config and return kwargs which can be passed to the Client |
149
|
|
|
constructor. |
150
|
|
|
|
151
|
|
|
:rtype: ``dict`` |
152
|
|
|
""" |
153
|
|
|
rc_options = self._parse_config_file(args=args) |
154
|
|
|
result = {} |
155
|
|
|
for kwarg_name, (section, option) in six.iteritems(CONFIG_OPTION_TO_CLIENT_KWARGS_MAP): |
156
|
|
|
result[kwarg_name] = rc_options.get(section, {}).get(option, None) |
157
|
|
|
|
158
|
|
|
return result |
159
|
|
|
|
160
|
|
|
def _parse_config_file(self, args): |
161
|
|
|
config_file_path = self._get_config_file_path(args=args) |
162
|
|
|
|
163
|
|
|
parser = CLIConfigParser(config_file_path=config_file_path, validate_config_exists=False) |
164
|
|
|
result = parser.parse() |
165
|
|
|
return result |
166
|
|
|
|
167
|
|
|
def _get_config_file_path(self, args): |
168
|
|
|
""" |
169
|
|
|
Retrieve path to the CLI configuration file. |
170
|
|
|
|
171
|
|
|
:rtype: ``str`` |
172
|
|
|
""" |
173
|
|
|
path = os.environ.get('ST2_CONFIG_FILE', ST2_CONFIG_PATH) |
174
|
|
|
|
175
|
|
|
if args.config_file: |
176
|
|
|
path = args.config_file |
177
|
|
|
|
178
|
|
|
path = os.path.abspath(os.path.expanduser(path)) |
179
|
|
|
if path != ST2_CONFIG_PATH and not os.path.isfile(path): |
180
|
|
|
raise ValueError('Config "%s" not found' % (path)) |
181
|
|
|
|
182
|
|
|
return path |
183
|
|
|
|
184
|
|
|
def _get_auth_token(self, client, username, password, cache_token): |
185
|
|
|
""" |
186
|
|
|
Retrieve a valid auth token. |
187
|
|
|
|
188
|
|
|
If caching is enabled, we will first try to retrieve cached token from a |
189
|
|
|
file system. If cached token is expired or not available, we will try to |
190
|
|
|
authenticate using the provided credentials and retrieve a new auth |
191
|
|
|
token. |
192
|
|
|
|
193
|
|
|
:rtype: ``str`` |
194
|
|
|
""" |
195
|
|
|
if cache_token: |
196
|
|
|
token = self._get_cached_auth_token(client=client, username=username, |
197
|
|
|
password=password) |
198
|
|
|
else: |
199
|
|
|
token = None |
200
|
|
|
if not token: |
201
|
|
|
# Token is either expired or not available |
202
|
|
|
token_obj = self._authenticate_and_retrieve_auth_token(client=client, |
203
|
|
|
username=username, |
204
|
|
|
password=password) |
205
|
|
|
|
206
|
|
|
self._cache_auth_token(token_obj=token_obj) |
207
|
|
|
token = token_obj.token |
208
|
|
|
|
209
|
|
|
return token |
210
|
|
|
|
211
|
|
|
def _get_cached_auth_token(self, client, username, password): |
212
|
|
|
""" |
213
|
|
|
Retrieve cached auth token from the file in the config directory. |
214
|
|
|
|
215
|
|
|
:rtype: ``str`` |
216
|
|
|
""" |
217
|
|
|
if not os.path.isdir(ST2_CONFIG_DIRECTORY): |
218
|
|
|
os.makedirs(ST2_CONFIG_DIRECTORY) |
219
|
|
|
|
220
|
|
|
cached_token_path = self._get_cached_token_path_for_user(username=username) |
221
|
|
|
|
222
|
|
|
if not os.access(ST2_CONFIG_DIRECTORY, os.R_OK): |
223
|
|
|
# We don't have read access to the file with a cached token |
224
|
|
|
message = ('Unable to retrieve cached token from "%s" (user %s doesn\'t have read ' |
225
|
|
|
'access to the parent directory). Subsequent requests won\'t use a ' |
226
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
227
|
|
|
os.getlogin())) |
228
|
|
|
self.LOG.warn(message) |
229
|
|
|
return None |
230
|
|
|
|
231
|
|
|
if not os.path.isfile(cached_token_path): |
232
|
|
|
return None |
233
|
|
|
|
234
|
|
|
if not os.access(cached_token_path, os.R_OK): |
235
|
|
|
# We don't have read access to the file with a cached token |
236
|
|
|
message = ('Unable to retrieve cached token from "%s" (user %s doesn\'t have read ' |
237
|
|
|
'access to this file). Subsequent requests won\'t use a cached token ' |
238
|
|
|
'meaning they may be slower.' % (cached_token_path, os.getlogin())) |
239
|
|
|
self.LOG.warn(message) |
240
|
|
|
return None |
241
|
|
|
|
242
|
|
|
# Safety check for too permissive permissions |
243
|
|
|
file_st_mode = oct(os.stat(cached_token_path).st_mode & 0777) |
244
|
|
|
others_st_mode = int(file_st_mode[-1]) |
245
|
|
|
|
246
|
|
|
if others_st_mode >= 4: |
247
|
|
|
# Every user has access to this file which is dangerous |
248
|
|
|
message = ('Permissions (%s) for cached token file "%s" are to permissive. Please ' |
249
|
|
|
'restrict the permissions and make sure only your own user can read ' |
250
|
|
|
'from the file' % (file_st_mode, cached_token_path)) |
251
|
|
|
self.LOG.warn(message) |
252
|
|
|
|
253
|
|
|
with open(cached_token_path) as fp: |
254
|
|
|
data = fp.read() |
255
|
|
|
|
256
|
|
|
try: |
257
|
|
|
data = json.loads(data) |
258
|
|
|
|
259
|
|
|
token = data['token'] |
260
|
|
|
expire_timestamp = data['expire_timestamp'] |
261
|
|
|
except Exception as e: |
262
|
|
|
msg = ('File "%s" with cached token is corrupted or invalid (%s). Please delete ' |
263
|
|
|
' this file' % (cached_token_path, str(e))) |
264
|
|
|
raise ValueError(msg) |
265
|
|
|
|
266
|
|
|
now = int(time.time()) |
267
|
|
|
if (expire_timestamp - TOKEN_EXPIRATION_GRACE_PERIOD_SECONDS) < now: |
268
|
|
|
self.LOG.debug('Cached token from file "%s" has expired' % (cached_token_path)) |
269
|
|
|
# Token has expired |
270
|
|
|
return None |
271
|
|
|
|
272
|
|
|
self.LOG.debug('Using cached token from file "%s"' % (cached_token_path)) |
273
|
|
|
return token |
274
|
|
|
|
275
|
|
|
def _cache_auth_token(self, token_obj): |
276
|
|
|
""" |
277
|
|
|
Cache auth token in the config directory. |
278
|
|
|
|
279
|
|
|
:param token_obj: Token object. |
280
|
|
|
:type token_obj: ``object`` |
281
|
|
|
""" |
282
|
|
|
if not os.path.isdir(ST2_CONFIG_DIRECTORY): |
283
|
|
|
os.makedirs(ST2_CONFIG_DIRECTORY) |
284
|
|
|
|
285
|
|
|
username = token_obj.user |
286
|
|
|
cached_token_path = self._get_cached_token_path_for_user(username=username) |
287
|
|
|
|
288
|
|
|
if not os.access(ST2_CONFIG_DIRECTORY, os.W_OK): |
289
|
|
|
# We don't have write access to the file with a cached token |
290
|
|
|
message = ('Unable to write token to "%s" (user %s doesn\'t have write ' |
291
|
|
|
'access to the parent directory). Subsequent requests won\'t use a ' |
292
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
293
|
|
|
os.getlogin())) |
294
|
|
|
self.LOG.warn(message) |
295
|
|
|
return None |
296
|
|
|
|
297
|
|
|
if os.path.isfile(cached_token_path) and not os.access(cached_token_path, os.W_OK): |
298
|
|
|
# We don't have write access to the file with a cached token |
299
|
|
|
message = ('Unable to write token to "%s" (user %s doesn\'t have write ' |
300
|
|
|
'access to this file). Subsequent requests won\'t use a ' |
301
|
|
|
'cached token meaning they may be slower.' % (cached_token_path, |
302
|
|
|
os.getlogin())) |
303
|
|
|
self.LOG.warn(message) |
304
|
|
|
return None |
305
|
|
|
|
306
|
|
|
token = token_obj.token |
307
|
|
|
expire_timestamp = parse_isotime(token_obj.expiry) |
308
|
|
|
expire_timestamp = calendar.timegm(expire_timestamp.timetuple()) |
309
|
|
|
|
310
|
|
|
data = {} |
311
|
|
|
data['token'] = token |
312
|
|
|
data['expire_timestamp'] = expire_timestamp |
313
|
|
|
data = json.dumps(data) |
314
|
|
|
|
315
|
|
|
# Note: We explictly use fdopen instead of open + chmod to avoid a security issue. |
316
|
|
|
# open + chmod are two operations which means that during a short time frame (between |
317
|
|
|
# open and chmod) when file can potentially be read by other users if the default |
318
|
|
|
# permissions used during create allow that. |
319
|
|
|
fd = os.open(cached_token_path, os.O_WRONLY | os.O_CREAT, 0600) |
320
|
|
|
with os.fdopen(fd, 'w') as fp: |
321
|
|
|
fp.write(data) |
322
|
|
|
|
323
|
|
|
self.LOG.debug('Token has been cached in "%s"' % (cached_token_path)) |
324
|
|
|
return True |
325
|
|
|
|
326
|
|
|
def _authenticate_and_retrieve_auth_token(self, client, username, password): |
327
|
|
|
manager = models.ResourceManager(models.Token, client.endpoints['auth'], |
328
|
|
|
cacert=client.cacert, debug=client.debug) |
329
|
|
|
instance = models.Token() |
330
|
|
|
instance = manager.create(instance, auth=(username, password)) |
331
|
|
|
return instance |
332
|
|
|
|
333
|
|
|
def _get_cached_token_path_for_user(self, username): |
334
|
|
|
""" |
335
|
|
|
Retrieve cached token path for the provided username. |
336
|
|
|
""" |
337
|
|
|
file_name = 'token-%s' % (username) |
338
|
|
|
result = os.path.abspath(os.path.join(ST2_CONFIG_DIRECTORY, file_name)) |
339
|
|
|
return result |
340
|
|
|
|
341
|
|
|
def _print_config(self, args): |
342
|
|
|
config = self._parse_config_file(args=args) |
343
|
|
|
|
344
|
|
|
for section, options in six.iteritems(config): |
345
|
|
|
print('[%s]' % (section)) |
346
|
|
|
|
347
|
|
|
for name, value in six.iteritems(options): |
348
|
|
|
print('%s = %s' % (name, value)) |
349
|
|
|
|
350
|
|
|
def _print_debug_info(self, args): |
351
|
|
|
# Print client settings |
352
|
|
|
self._print_client_settings(args=args) |
353
|
|
|
|
354
|
|
|
# Print exception traceback |
355
|
|
|
traceback.print_exc() |
356
|
|
|
|
357
|
|
|
def _print_client_settings(self, args): |
358
|
|
|
client = self.client |
359
|
|
|
|
360
|
|
|
if not client: |
361
|
|
|
return |
362
|
|
|
|
363
|
|
|
config_file_path = self._get_config_file_path(args=args) |
364
|
|
|
|
365
|
|
|
print('CLI settings:') |
366
|
|
|
print('----------------') |
367
|
|
|
print('Config file path: %s' % (config_file_path)) |
368
|
|
|
print('Client settings:') |
369
|
|
|
print('----------------') |
370
|
|
|
print('ST2_BASE_URL: %s' % (client.endpoints['base'])) |
371
|
|
|
print('ST2_AUTH_URL: %s' % (client.endpoints['auth'])) |
372
|
|
|
print('ST2_API_URL: %s' % (client.endpoints['api'])) |
373
|
|
|
print('ST2_STREAM_URL: %s' % (client.endpoints['stream'])) |
374
|
|
|
print('ST2_AUTH_TOKEN: %s' % (os.environ.get('ST2_AUTH_TOKEN'))) |
375
|
|
|
print('') |
376
|
|
|
print('Proxy settings:') |
377
|
|
|
print('---------------') |
378
|
|
|
print('HTTP_PROXY: %s' % (os.environ.get('HTTP_PROXY', ''))) |
379
|
|
|
print('HTTPS_PROXY: %s' % (os.environ.get('HTTPS_PROXY', ''))) |
380
|
|
|
print('') |
381
|
|
|
|