openstack_auth.utils.
LOG
= <Logger openstack_auth.utils (WARNING)>¶We need the request object to get the user, so we’ll slightly modify the existing django.contrib.auth.get_user method. To do so we update the auth middleware to point to our overridden method.
Calling “patch_middleware_get_user” is done in our custom middleware at “openstack_auth.middleware” to monkeypatch the code in before it is needed.
openstack_auth.utils.
allow_expired_passowrd_change
()[source]¶Checks if users should be able to change their expired passwords.
openstack_auth.utils.
build_absolute_uri
(request, relative_url)[source]¶Ensure absolute_uri are relative to WEBROOT.
openstack_auth.utils.
clean_up_auth_url
(auth_url)[source]¶Clean up the auth url to extract the exact Keystone URL
openstack_auth.utils.
default_services_region
(service_catalog, request=None, ks_endpoint=None)[source]¶Return the default service region.
Order of precedence: 1. ‘services_region’ cookie value 2. Matching endpoint in DEFAULT_SERVICE_REGIONS 3. ‘*’ key in DEFAULT_SERVICE_REGIONS 4. First valid region from catalog
In each case the value must also be present in available_regions or we move to the next level of precedence.
openstack_auth.utils.
fix_auth_url_version_prefix
(auth_url)[source]¶Fix up the auth url if an invalid or no version prefix was given.
Fix the URL to say v3 in this case and add version if it is missing entirely. This should be smarter and use discovery. Until version discovery is implemented we need this method to get everything working.
openstack_auth.utils.
get_admin_permissions
()[source]¶Common function for getting the admin permissions from settings
This format is ‘openstack.roles.xxx’ and ‘xxx’ is a real role name.
Returns: | Set object including all admin permission.
If there is no permission, this will return empty:{
"openstack.roles.foo",
"openstack.roles.bar",
"openstack.roles.admin"
}
|
---|
openstack_auth.utils.
get_admin_roles
()[source]¶Common function for getting the admin roles from settings
Returns: | Set object including all admin roles.
If there is no role, this will return empty:{
"foo", "bar", "admin"
}
|
---|
openstack_auth.utils.
get_client_ip
(request)[source]¶Return client ip address using SECURE_PROXY_ADDR_HEADER variable.
If not present or not defined on settings then REMOTE_ADDR is used.
Parameters: | request (django.http.HttpRequest) – Django http request object. |
---|---|
Returns: | Possible client ip address |
Return type: | string |
openstack_auth.utils.
get_endpoint_region
(endpoint)[source]¶Common function for getting the region from endpoint.
In Keystone V3, region has been deprecated in favor of region_id.
This method provides a way to get region that works for both Keystone V2 and V3.
openstack_auth.utils.
get_role_permission
(role)[source]¶Common function for getting the permission froms arg
This format is ‘openstack.roles.xxx’ and ‘xxx’ is a real role name.
Returns: | String like “openstack.roles.admin” If role is None, this will return None. |
---|
openstack_auth.utils.
get_websso_url
(request, auth_url, websso_auth)[source]¶Return the keystone endpoint for initiating WebSSO.
Generate the keystone WebSSO endpoint that will redirect the user to the login page of the federated identity provider.
Based on the authentication type selected by the user in the login form, it will construct the keystone WebSSO endpoint.
Parameters: |
|
---|
Example of horizon WebSSO setting:
WEBSSO_CHOICES = (
("credentials", "Keystone Credentials"),
("oidc", "OpenID Connect"),
("saml2", "Security Assertion Markup Language"),
("acme_oidc", "ACME - OpenID Connect"),
("acme_saml2", "ACME - SAML2")
)
WEBSSO_IDP_MAPPING = {
"acme_oidc": ("acme", "oidc"),
"acme_saml2": ("acme", "saml2")
}
}
The value of websso_auth will be looked up in the WEBSSO_IDP_MAPPING dictionary, if a match is found it will return a IdP specific WebSSO endpoint using the values found in the mapping.
The value in WEBSSO_IDP_MAPPING is expected to be a tuple formatted as (<idp_id>, <protocol_id>). Using the values found, a IdP/protocol specific URL will be constructed:
/auth/OS-FEDERATION/identity_providers/<idp_id>
/protocols/<protocol_id>/websso
If no value is found from the WEBSSO_IDP_MAPPING dictionary, it will treat the value as the global WebSSO protocol <protocol_id> and construct the WebSSO URL by:
/auth/OS-FEDERATION/websso/<protocol_id>
Returns: | Keystone WebSSO endpoint. |
---|---|
Return type: | string |
openstack_auth.utils.
has_in_url_path
(url, subs)[source]¶Test if any of subs strings is present in the url path.
openstack_auth.utils.
is_token_valid
(token, margin=None)[source]¶Timezone-aware checking of the auth token’s expiration timestamp.
Returns True
if the token has not yet expired, otherwise False
.
Parameters: |
|
---|
Common function for setting the cookie in the response.
Provides a common policy of setting cookies for last used project and region, can be reused in other locations.
This method will set the cookie to expire in 365 days.
openstack_auth.utils.
store_initial_k2k_session
(auth_url, request, scoped_auth_ref, unscoped_auth_ref)[source]¶Stores session variables if there are k2k service providers
This stores variables related to Keystone2Keystone federation. This function gets skipped if there are no Keystone service providers. An unscoped token to the identity provider keystone gets stored so that it can be used to do federated login into the service providers when switching keystone providers. The settings file can be configured to set the display name of the local (identity provider) keystone by setting KEYSTONE_PROVIDER_IDP_NAME. The KEYSTONE_PROVIDER_IDP_ID settings variable is used for comparison against the service providers. It should not conflict with any of the service provider ids.
Parameters: |
|
---|
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.