import requests
from heat.openstack.common import gettextutils
+from heat.api.aws.exception import HeatAPIException
gettextutils.install('heat')
opts = [
cfg.StrOpt('auth_uri',
default=None,
- help=_("Authentication Endpoint URI"))
+ help=_("Authentication Endpoint URI")),
+ cfg.BoolOpt('multi_cloud',
+ default=False,
+ help=_('Allow orchestration of multiple clouds')),
+ cfg.ListOpt('allowed_auth_uris',
+ default=[],
+ help=_('Allowed keystone endpoints for auth_uri when '
+ 'multi_cloud is enabled. At least one endpoint needs '
+ 'to be specified.'))
]
cfg.CONF.register_opts(opts, group='ec2authtoken')
else:
return cfg.CONF.ec2authtoken[name]
- def _conf_get_keystone_ec2_uri(self):
- auth_uri = self._conf_get('auth_uri')
+ @staticmethod
+ def _conf_get_keystone_ec2_uri(auth_uri):
if auth_uri.endswith('/'):
return '%sec2tokens' % auth_uri
return '%s/ec2tokens' % auth_uri
@webob.dec.wsgify(RequestClass=wsgi.Request)
def __call__(self, req):
+ if not self._conf_get('multi_cloud'):
+ return self._authorize(req, self._conf_get('auth_uri'))
+ else:
+ # attempt to authorize for each configured allowed_auth_uris
+ # until one is successful.
+ # This is safe for the following reasons:
+ # 1. AWSAccessKeyId is a randomly generated sequence
+ # 2. No secret is transferred to validate a request
+ last_failure = None
+ for auth_uri in self._conf_get('allowed_auth_uris'):
+ try:
+ logger.debug("Attempt authorize on %s" % auth_uri)
+ return self._authorize(req, auth_uri)
+ except HeatAPIException as e:
+ logger.debug("Authorize failed: %s" % e.__class__)
+ last_failure = e
+ raise last_failure or exception.HeatAccessDeniedError()
+
+ def _authorize(self, req, auth_uri):
# Read request signature and access id.
# If we find X-Auth-User in the headers we ignore a key error
# here so that we can use both authentication methods.
creds_json = json.dumps(creds)
headers = {'Content-Type': 'application/json'}
- keystone_ec2_uri = self._conf_get_keystone_ec2_uri()
+ keystone_ec2_uri = self._conf_get_keystone_ec2_uri(auth_uri)
logger.info('Authenticating with %s' % keystone_ec2_uri)
response = requests.post(keystone_ec2_uri, data=creds_json,
headers=headers)
'''
Tests the Ec2Token middleware
'''
+
+ def setUp(self):
+ super(Ec2TokenTest, self).setUp()
+ self.m.StubOutWithMock(requests, 'post')
+
def _dummy_GET_request(self, params={}, environ={}):
# Mangle the params dict into a query string
qs = "&".join(["=".join([k, str(params[k])]) for k in params])
dummy_conf = {'auth_uri': 'http://192.0.2.9/v2.0'}
ec2 = ec2token.EC2Token(app=None, conf=dummy_conf)
self.assertEqual(ec2._conf_get('auth_uri'), 'http://192.0.2.9/v2.0')
- self.assertEqual(ec2._conf_get_keystone_ec2_uri(),
- 'http://192.0.2.9/v2.0/ec2tokens')
+ self.assertEqual(
+ ec2._conf_get_keystone_ec2_uri('http://192.0.2.9/v2.0'),
+ 'http://192.0.2.9/v2.0/ec2tokens')
def test_conf_get_opts(self):
cfg.CONF.set_default('auth_uri', 'http://192.0.2.9/v2.0/',
group='ec2authtoken')
ec2 = ec2token.EC2Token(app=None, conf={})
self.assertEqual(ec2._conf_get('auth_uri'), 'http://192.0.2.9/v2.0/')
- self.assertEqual(ec2._conf_get_keystone_ec2_uri(),
- 'http://192.0.2.9/v2.0/ec2tokens')
+ self.assertEqual(
+ ec2._conf_get_keystone_ec2_uri('http://192.0.2.9/v2.0/'),
+ 'http://192.0.2.9/v2.0/ec2tokens')
def test_get_signature_param_old(self):
params = {'Signature': 'foo'}
ec2 = ec2token.EC2Token(app='xyz', conf={})
self.assertEqual(ec2.__call__(dummy_req), 'xyz')
- def _stub_http_connection(self, headers={}, params={}, response=None):
+ def _stub_http_connection(self, headers={}, params={}, response=None,
+ req_url='http://123:5000/v2.0/ec2tokens'):
class DummyHTTPResponse(object):
text = response
def json(self):
return json.loads(self.text)
- self.m.StubOutWithMock(requests, 'post')
body_hash = ('e3b0c44298fc1c149afbf4c8996fb9'
'2427ae41e4649b934ca495991b7852b855')
req_creds = json.dumps({"ec2Credentials":
"path": "/v1",
"body_hash": body_hash}})
req_headers = {'Content-Type': 'application/json'}
- req_url = 'http://123:5000/v2.0/ec2tokens'
requests.post(req_url, data=req_creds,
headers=req_headers).AndReturn(DummyHTTPResponse())
self.assertEqual(ec2.__call__(dummy_req), 'woot')
self.m.VerifyAll()
+
+ def test_call_ok_multicloud(self):
+ dummy_conf = {
+ 'allowed_auth_uris': [
+ 'http://123:5000/v2.0', 'http://456:5000/v2.0'],
+ 'multi_cloud': True
+ }
+ ec2 = ec2token.EC2Token(app='woot', conf=dummy_conf)
+ params = {'AWSAccessKeyId': 'foo', 'Signature': 'xyz'}
+ req_env = {'SERVER_NAME': 'heat',
+ 'SERVER_PORT': '8000',
+ 'PATH_INFO': '/v1'}
+ dummy_req = self._dummy_GET_request(params, req_env)
+
+ ok_resp = json.dumps({'access': {'metadata': {}, 'token': {
+ 'id': 123,
+ 'tenant': {'name': 'tenant', 'id': 'abcd1234'}}}})
+ err_msg = "EC2 access key not found."
+ err_resp = json.dumps({'error': {'message': err_msg}})
+
+ # first request fails
+ self._stub_http_connection(
+ req_url='http://123:5000/v2.0/ec2tokens',
+ response=err_resp,
+ params={'AWSAccessKeyId': 'foo'})
+
+ # second request passes
+ self._stub_http_connection(
+ req_url='http://456:5000/v2.0/ec2tokens',
+ response=ok_resp,
+ params={'AWSAccessKeyId': 'foo'})
+
+ self.m.ReplayAll()
+ self.assertEqual(ec2.__call__(dummy_req), 'woot')
+
+ self.m.VerifyAll()
+
+ def test_call_err_multicloud(self):
+ dummy_conf = {
+ 'allowed_auth_uris': [
+ 'http://123:5000/v2.0', 'http://456:5000/v2.0'],
+ 'multi_cloud': True
+ }
+ ec2 = ec2token.EC2Token(app='woot', conf=dummy_conf)
+ params = {'AWSAccessKeyId': 'foo', 'Signature': 'xyz'}
+ req_env = {'SERVER_NAME': 'heat',
+ 'SERVER_PORT': '8000',
+ 'PATH_INFO': '/v1'}
+ dummy_req = self._dummy_GET_request(params, req_env)
+
+ err_resp1 = json.dumps({})
+
+ err_msg2 = "EC2 access key not found."
+ err_resp2 = json.dumps({'error': {'message': err_msg2}})
+
+ # first request fails with HeatAccessDeniedError
+ self._stub_http_connection(
+ req_url='http://123:5000/v2.0/ec2tokens',
+ response=err_resp1,
+ params={'AWSAccessKeyId': 'foo'})
+
+ # second request fails with HeatInvalidClientTokenIdError
+ self._stub_http_connection(
+ req_url='http://456:5000/v2.0/ec2tokens',
+ response=err_resp2,
+ params={'AWSAccessKeyId': 'foo'})
+
+ self.m.ReplayAll()
+ # raised error matches last failure
+ self.assertRaises(exception.HeatInvalidClientTokenIdError,
+ ec2.__call__, dummy_req)
+
+ self.m.VerifyAll()
+
+ def test_call_err_multicloud_none_allowed(self):
+ dummy_conf = {
+ 'allowed_auth_uris': [],
+ 'multi_cloud': True
+ }
+ ec2 = ec2token.EC2Token(app='woot', conf=dummy_conf)
+ params = {'AWSAccessKeyId': 'foo', 'Signature': 'xyz'}
+ req_env = {'SERVER_NAME': 'heat',
+ 'SERVER_PORT': '8000',
+ 'PATH_INFO': '/v1'}
+ dummy_req = self._dummy_GET_request(params, req_env)
+
+ self.m.ReplayAll()
+ self.assertRaises(exception.HeatAccessDeniedError,
+ ec2.__call__, dummy_req)
+
+ self.m.VerifyAll()