| #!/usr/bin/env bash | 
 |  | 
 | # **create_userrc.sh** | 
 |  | 
 | # Pre-create rc files and credentials for the default users. | 
 |  | 
 | # Warning: This script just for development purposes | 
 |  | 
 | set -o errexit | 
 | set -o xtrace | 
 |  | 
 | ACCOUNT_DIR=./accrc | 
 |  | 
 | function display_help { | 
 | cat <<EOF | 
 |  | 
 | usage: $0 <options..> | 
 |  | 
 | This script creates certificates and sourcable rc files per tenant/user. | 
 |  | 
 | Target account directory hierarchy: | 
 | target_dir-| | 
 |            |-cacert.pem | 
 |            |-tenant1-name| | 
 |            |             |- user1 | 
 |            |             |- user1-cert.pem | 
 |            |             |- user1-pk.pem | 
 |            |             |- user2 | 
 |            |             .. | 
 |            |-tenant2-name.. | 
 |            .. | 
 |  | 
 | Optional Arguments | 
 | -P include password to the rc files; with -A it assume all users password is the same | 
 | -A try with all user | 
 | -u <username> create files just for the specified user | 
 | -C <tenant_name> create user and tenant, the specifid tenant will be the user's tenant | 
 | -r <name> when combined with -C and the (-u) user exists it will be the user's tenant role in the (-C)tenant (default: Member) | 
 | -p <userpass> password for the user | 
 | --heat-url <heat_url> | 
 | --os-username <username> | 
 | --os-password <admin password> | 
 | --os-tenant-name <tenant_name> | 
 | --os-tenant-id <tenant_id> | 
 | --os-auth-url <auth_url> | 
 | --os-cacert <cert file> | 
 | --target-dir <target_directory> | 
 | --skip-tenant <tenant-name> | 
 | --debug | 
 |  | 
 | Example: | 
 | $0 -AP | 
 | $0 -P -C mytenant -u myuser -p mypass | 
 | EOF | 
 | } | 
 |  | 
 | if ! options=$(getopt -o hPAp:u:r:C: -l os-username:,os-password:,os-tenant-name:,os-tenant-id:,os-auth-url:,target-dir:,heat-url:,skip-tenant:,os-cacert:,help,debug -- "$@"); then | 
 |     display_help | 
 |     exit 1 | 
 | fi | 
 | eval set -- $options | 
 | ADDPASS="" | 
 | HEAT_URL="" | 
 |  | 
 | # The services users usually in the service tenant. | 
 | # rc files for service users, is out of scope. | 
 | # Supporting different tenant for services is out of scope. | 
 | SKIP_TENANT="service" | 
 | MODE="" | 
 | ROLE=Member | 
 | USER_NAME="" | 
 | USER_PASS="" | 
 | while [ $# -gt 0 ]; do | 
 |     case "$1" in | 
 |     -h|--help) display_help; exit 0 ;; | 
 |     --os-username) export OS_USERNAME=$2; shift ;; | 
 |     --os-password) export OS_PASSWORD=$2; shift ;; | 
 |     --os-tenant-name) export OS_TENANT_NAME=$2; shift ;; | 
 |     --os-tenant-id) export OS_TENANT_ID=$2; shift ;; | 
 |     --skip-tenant) SKIP_TENANT="$SKIP_TENANT$2,"; shift ;; | 
 |     --os-auth-url) export OS_AUTH_URL=$2; shift ;; | 
 |     --os-cacert) export OS_CACERT=$2; shift ;; | 
 |     --target-dir) ACCOUNT_DIR=$2; shift ;; | 
 |     --heat-url) HEAT_URL=$2; shift ;; | 
 |     --debug) set -o xtrace ;; | 
 |     -u) MODE=${MODE:-one};  USER_NAME=$2; shift ;; | 
 |     -p) USER_PASS=$2; shift ;; | 
 |     -A) MODE=all; ;; | 
 |     -P) ADDPASS="yes" ;; | 
 |     -C) MODE=create; TENANT=$2; shift ;; | 
 |     -r) ROLE=$2; shift ;; | 
 |     (--) shift; break ;; | 
 |     (-*) echo "$0: error - unrecognized option $1" >&2; display_help; exit 1 ;; | 
 |     (*)  echo "$0: error - unexpected argument $1" >&2; display_help; exit 1 ;; | 
 |     esac | 
 |     shift | 
 | done | 
 |  | 
 | if [ -z "$OS_PASSWORD" ]; then | 
 |     if [ -z "$ADMIN_PASSWORD" ];then | 
 |         echo "The admin password is required option!"  >&2 | 
 |         exit 2 | 
 |     else | 
 |         OS_PASSWORD=$ADMIN_PASSWORD | 
 |     fi | 
 | fi | 
 |  | 
 | if [ -z "$OS_TENANT_NAME" -a -z "$OS_TENANT_ID" ]; then | 
 |     export OS_TENANT_NAME=admin | 
 | fi | 
 |  | 
 | if [ -z "$OS_USERNAME" ]; then | 
 |     export OS_USERNAME=admin | 
 | fi | 
 |  | 
 | if [ -z "$OS_AUTH_URL" ]; then | 
 |     export OS_AUTH_URL=http://localhost:5000/v2.0/ | 
 | fi | 
 |  | 
 | USER_PASS=${USER_PASS:-$OS_PASSWORD} | 
 | USER_NAME=${USER_NAME:-$OS_USERNAME} | 
 |  | 
 | if [ -z "$MODE" ]; then | 
 |     echo "You must specify at least -A or -u parameter!"  >&2 | 
 |     echo | 
 |     display_help | 
 |     exit 3 | 
 | fi | 
 |  | 
 | export -n SERVICE_TOKEN SERVICE_ENDPOINT OS_SERVICE_TOKEN OS_SERVICE_ENDPOINT | 
 |  | 
 | EC2_URL=$(openstack endpoint show -f value -c publicurl ec2 || true) | 
 | if [[ -z $EC2_URL ]]; then | 
 |     EC2_URL=http://localhost:8773/ | 
 | fi | 
 |  | 
 | S3_URL=$(openstack endpoint show -f value -c publicurl s3 || true) | 
 | if [[ -z $S3_URL ]]; then | 
 |     S3_URL=http://localhost:3333 | 
 | fi | 
 |  | 
 | mkdir -p "$ACCOUNT_DIR" | 
 | ACCOUNT_DIR=`readlink -f "$ACCOUNT_DIR"` | 
 | EUCALYPTUS_CERT=$ACCOUNT_DIR/cacert.pem | 
 | if [ -e "$EUCALYPTUS_CERT" ]; then | 
 |     mv "$EUCALYPTUS_CERT" "$EUCALYPTUS_CERT.old" | 
 | fi | 
 | if ! nova x509-get-root-cert "$EUCALYPTUS_CERT"; then | 
 |     echo "Failed to update the root certificate: $EUCALYPTUS_CERT" >&2 | 
 |     if [ -e "$EUCALYPTUS_CERT.old" ]; then | 
 |         mv "$EUCALYPTUS_CERT.old" "$EUCALYPTUS_CERT" | 
 |     fi | 
 | fi | 
 |  | 
 |  | 
 | function add_entry { | 
 |     local user_id=$1 | 
 |     local user_name=$2 | 
 |     local tenant_id=$3 | 
 |     local tenant_name=$4 | 
 |     local user_passwd=$5 | 
 |  | 
 |     # The admin user can see all user's secret AWS keys, it does not looks good | 
 |     local line=`openstack ec2 credentials list --user $user_id | grep " $tenant_id "` | 
 |     if [ -z "$line" ]; then | 
 |         openstack ec2 credentials create --user $user_id --project $tenant_id 1>&2 | 
 |         line=`openstack ec2 credentials list --user $user_id | grep " $tenant_id "` | 
 |     fi | 
 |     local ec2_access_key ec2_secret_key | 
 |     read ec2_access_key ec2_secret_key <<<  `echo $line | awk '{print $2 " " $4 }'` | 
 |     mkdir -p "$ACCOUNT_DIR/$tenant_name" | 
 |     local rcfile="$ACCOUNT_DIR/$tenant_name/$user_name" | 
 |     # The certs subject part are the tenant ID "dash" user ID, but the CN should be the first part of the DN | 
 |     # Generally the subject DN parts should be in reverse order like the Issuer | 
 |     # The Serial does not seams correctly marked either | 
 |     local ec2_cert="$rcfile-cert.pem" | 
 |     local ec2_private_key="$rcfile-pk.pem" | 
 |     # Try to preserve the original file on fail (best effort) | 
 |     if [ -e "$ec2_private_key" ]; then | 
 |         mv -f "$ec2_private_key" "$ec2_private_key.old" | 
 |     fi | 
 |     if [ -e "$ec2_cert" ]; then | 
 |         mv -f "$ec2_cert" "$ec2_cert.old" | 
 |     fi | 
 |     # It will not create certs when the password is incorrect | 
 |     if ! nova --os-password "$user_passwd" --os-username "$user_name" --os-tenant-name "$tenant_name" x509-create-cert "$ec2_private_key" "$ec2_cert"; then | 
 |         if [ -e "$ec2_private_key.old" ]; then | 
 |             mv -f "$ec2_private_key.old" "$ec2_private_key" | 
 |         fi | 
 |         if [ -e "$ec2_cert.old" ]; then | 
 |             mv -f "$ec2_cert.old" "$ec2_cert" | 
 |         fi | 
 |     fi | 
 |     cat >"$rcfile" <<EOF | 
 | # you can source this file | 
 | export EC2_ACCESS_KEY="$ec2_access_key" | 
 | export EC2_SECRET_KEY="$ec2_secret_key" | 
 | export EC2_URL="$EC2_URL" | 
 | export S3_URL="$S3_URL" | 
 | # OpenStack USER ID = $user_id | 
 | export OS_USERNAME="$user_name" | 
 | # OpenStack Tenant ID = $tenant_id | 
 | export OS_TENANT_NAME="$tenant_name" | 
 | export OS_AUTH_URL="$OS_AUTH_URL" | 
 | export OS_CACERT="$OS_CACERT" | 
 | export EC2_CERT="$ec2_cert" | 
 | export EC2_PRIVATE_KEY="$ec2_private_key" | 
 | export EC2_USER_ID=42 #not checked by nova (can be a 12-digit id) | 
 | export EUCALYPTUS_CERT="$ACCOUNT_DIR/cacert.pem" | 
 | export NOVA_CERT="$ACCOUNT_DIR/cacert.pem" | 
 | EOF | 
 |     if [ -n "$ADDPASS" ]; then | 
 |         echo "export OS_PASSWORD=\"$user_passwd\"" >>"$rcfile" | 
 |     fi | 
 |     if [ -n "$HEAT_URL" ]; then | 
 |         echo "export HEAT_URL=\"$HEAT_URL/$tenant_id\"" >>"$rcfile" | 
 |         echo "export OS_NO_CLIENT_AUTH=True" >>"$rcfile" | 
 |     fi | 
 | } | 
 |  | 
 | #admin users expected | 
 | function create_or_get_project { | 
 |     local name=$1 | 
 |     local id | 
 |     eval $(openstack project show -f shell -c id $name) | 
 |     if [[ -z $id ]]; then | 
 |         eval $(openstack project create -f shell -c id $name) | 
 |     fi | 
 |     echo $id | 
 | } | 
 |  | 
 | function create_or_get_role { | 
 |     local name=$1 | 
 |     local id | 
 |     eval $(openstack role show -f shell -c id $name) | 
 |     if [[ -z $id ]]; then | 
 |         eval $(openstack role create -f shell -c id $name) | 
 |     fi | 
 |     echo $id | 
 | } | 
 |  | 
 | # Provides empty string when the user does not exists | 
 | function get_user_id { | 
 |     openstack user list | grep " $1 " | cut -d " " -f2 | 
 | } | 
 |  | 
 | if [ $MODE != "create" ]; then | 
 |     # looks like I can't ask for all tenant related to a specified user | 
 |     openstack project list --long --quote none -f csv | grep ',True' | grep -v "${SKIP_TENANT}" | while IFS=, read tenant_id tenant_name desc enabled; do | 
 |         openstack user list --project $tenant_id --long --quote none -f csv | grep ',True' | while IFS=, read user_id user_name project email enabled; do | 
 |             if [ $MODE = one -a "$user_name" != "$USER_NAME" ]; then | 
 |                 continue; | 
 |             fi | 
 |  | 
 |             # Checks for a specific password defined for an user. | 
 |             # Example for an username johndoe: JOHNDOE_PASSWORD=1234 | 
 |             # This mechanism is used by lib/swift | 
 |             eval SPECIFIC_UPASSWORD="\$${user_name}_password" | 
 |             if [ -n "$SPECIFIC_UPASSWORD" ]; then | 
 |                 USER_PASS=$SPECIFIC_UPASSWORD | 
 |             fi | 
 |             add_entry "$user_id" "$user_name" "$tenant_id" "$tenant_name" "$USER_PASS" | 
 |         done | 
 |     done | 
 | else | 
 |     tenant_name=$TENANT | 
 |     tenant_id=$(create_or_get_project "$TENANT") | 
 |     user_name=$USER_NAME | 
 |     user_id=`get_user_id $user_name` | 
 |     if [ -z "$user_id" ]; then | 
 |         eval $(openstack user create "$user_name" --project "$tenant_id" --password "$USER_PASS" --email "$user_name@example.com" -f shell -c id) | 
 |         user_id=$id | 
 |         add_entry "$user_id" "$user_name" "$tenant_id" "$tenant_name" "$USER_PASS" | 
 |     else | 
 |         role_id=$(create_or_get_role "$ROLE") | 
 |         openstack role add "$role_id" --user "$user_id" --project "$tenant_id" | 
 |         add_entry "$user_id" "$user_name" "$tenant_id" "$tenant_name" "$USER_PASS" | 
 |     fi | 
 | fi |