1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import typing as ty
from keystoneauth1 import plugin
if ty.TYPE_CHECKING:
from keystoneauth1 import session as ks_session
SERVICE_AUTH_HEADER_NAME = 'X-Service-Token'
__all__ = ('ServiceTokenAuthWrapper',)
class ServiceTokenAuthWrapper(plugin.BaseAuthPlugin):
def __init__(
self,
user_auth: plugin.BaseAuthPlugin,
service_auth: plugin.BaseAuthPlugin,
):
super().__init__()
self.user_auth = user_auth
self.service_auth = service_auth
def get_headers(
self, session: 'ks_session.Session'
) -> dict[str, str] | None:
headers = self.user_auth.get_headers(session) or {}
token = self.service_auth.get_token(session)
if token:
headers[SERVICE_AUTH_HEADER_NAME] = token
return headers
def invalidate(self) -> bool:
# NOTE(jamielennox): hmm, what to do here? Should we invalidate both
# the service and user auth? Only one? There's no way to know what the
# failure was to selectively invalidate.
user = self.user_auth.invalidate()
service = self.service_auth.invalidate()
return user or service
def get_connection_params(
self, session: 'ks_session.Session'
) -> plugin.ConnectionParams:
# NOTE(jamielennox): This is also a bit of a guess but unlikely to be a
# problem in practice. We don't know how merging connection parameters
# between these plugins will conflict - but there aren't many plugins
# that set this anyway.
# Take the service auth params first so that user auth params will be
# given priority.
params = self.service_auth.get_connection_params(session)
params.update(self.user_auth.get_connection_params(session))
return params
# TODO(jamielennox): Everything below here is a generic wrapper that could
# be extracted into a base wrapper class. We can do this as soon as there
# is a need for it, but we may never actually need it.
def get_token(self, session: 'ks_session.Session') -> str | None:
return self.user_auth.get_token(session)
def get_endpoint(
self, session: 'ks_session.Session', **kwargs: ty.Any
) -> str | None:
return self.user_auth.get_endpoint(session, **kwargs)
def get_user_id(self, session: 'ks_session.Session') -> str | None:
return self.user_auth.get_user_id(session)
def get_project_id(self, session: 'ks_session.Session') -> str | None:
return self.user_auth.get_project_id(session)
def get_sp_auth_url(
self, session: 'ks_session.Session', sp_id: str
) -> str | None:
return self.user_auth.get_sp_auth_url(session, sp_id)
def get_sp_url(
self, session: 'ks_session.Session', sp_id: str
) -> str | None:
return self.user_auth.get_sp_url(session, sp_id)
|