Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 1 | #!/usr/bin/env bash |
| 2 | |
Dean Troyer | 0f2d954 | 2013-02-20 17:51:19 -0600 | [diff] [blame] | 3 | # **create_userrc.sh** |
| 4 | |
| 5 | # Pre-create rc files and credentials for the default users. |
| 6 | |
| 7 | # Warning: This script just for development purposes |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 8 | |
Adam Spiers | c85ade7 | 2013-10-01 00:35:16 +0100 | [diff] [blame] | 9 | set -o errexit |
| 10 | set -o xtrace |
| 11 | |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 12 | ACCOUNT_DIR=./accrc |
| 13 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 14 | function display_help { |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 15 | cat <<EOF |
| 16 | |
| 17 | usage: $0 <options..> |
| 18 | |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 19 | This script creates certificates and sourcable rc files per project/user. |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 20 | |
| 21 | Target account directory hierarchy: |
| 22 | target_dir-| |
| 23 | |-cacert.pem |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 24 | |-project1-name| |
| 25 | | |- user1 |
| 26 | | |- user1-cert.pem |
| 27 | | |- user1-pk.pem |
| 28 | | |- user2 |
| 29 | | .. |
| 30 | |-project2-name.. |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 31 | .. |
| 32 | |
| 33 | Optional Arguments |
| 34 | -P include password to the rc files; with -A it assume all users password is the same |
| 35 | -A try with all user |
| 36 | -u <username> create files just for the specified user |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 37 | -C <project_name> create user and project, the specifid project will be the user's project |
| 38 | -r <name> when combined with -C and the (-u) user exists it will be the user's project role in the (-C)project (default: Member) |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 39 | -p <userpass> password for the user |
Steve Baker | e389aed | 2014-09-23 17:10:39 +1200 | [diff] [blame] | 40 | --heat-url <heat_url> |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 41 | --os-username <username> |
| 42 | --os-password <admin password> |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 43 | --os-project-name <project_name> |
| 44 | --os-project-id <project_id> |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 45 | --os-user-domain-id <user_domain_id> |
| 46 | --os-user-domain-name <user_domain_name> |
| 47 | --os-project-domain-id <project_domain_id> |
| 48 | --os-project-domain-name <project_domain_name> |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 49 | --os-auth-url <auth_url> |
Jamie Lennox | bd24a8d | 2013-09-20 16:26:42 +1000 | [diff] [blame] | 50 | --os-cacert <cert file> |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 51 | --target-dir <target_directory> |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 52 | --skip-project <project-name> |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 53 | --debug |
| 54 | |
| 55 | Example: |
| 56 | $0 -AP |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 57 | $0 -P -C myproject -u myuser -p mypass |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 58 | EOF |
| 59 | } |
| 60 | |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 61 | if ! options=$(getopt -o hPAp:u:r:C: -l os-username:,os-password:,os-tenant-id:,os-tenant-name:,os-project-name:,os-project-id:,os-project-domain-id:,os-project-domain-name:,os-user-domain-id:,os-user-domain-name:,os-auth-url:,target-dir:,heat-url:,skip-project:,os-cacert:,help,debug -- "$@"); then |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 62 | display_help |
| 63 | exit 1 |
| 64 | fi |
| 65 | eval set -- $options |
| 66 | ADDPASS="" |
Steve Baker | e389aed | 2014-09-23 17:10:39 +1200 | [diff] [blame] | 67 | HEAT_URL="" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 68 | |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 69 | # The services users usually in the service project. |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 70 | # rc files for service users, is out of scope. |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 71 | # Supporting different project for services is out of scope. |
| 72 | SKIP_PROJECT="service" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 73 | MODE="" |
| 74 | ROLE=Member |
| 75 | USER_NAME="" |
| 76 | USER_PASS="" |
Chmouel Boudjnah | 86a8e97 | 2014-02-04 15:20:15 +0100 | [diff] [blame] | 77 | while [ $# -gt 0 ]; do |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 78 | case "$1" in |
| 79 | -h|--help) display_help; exit 0 ;; |
| 80 | --os-username) export OS_USERNAME=$2; shift ;; |
| 81 | --os-password) export OS_PASSWORD=$2; shift ;; |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 82 | --os-tenant-name) export OS_PROJECT_NAME=$2; shift ;; |
| 83 | --os-tenant-id) export OS_PROJECT_ID=$2; shift ;; |
| 84 | --os-project-name) export OS_PROJECT_NAME=$2; shift ;; |
| 85 | --os-project-id) export OS_PROJECT_ID=$2; shift ;; |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 86 | --os-user-domain-id) export OS_USER_DOMAIN_ID=$2; shift ;; |
| 87 | --os-user-domain-name) export OS_USER_DOMAIN_NAME=$2; shift ;; |
| 88 | --os-project-domain-id) export OS_PROJECT_DOMAIN_ID=$2; shift ;; |
| 89 | --os-project-domain-name) export OS_PROJECT_DOMAIN_NAME=$2; shift ;; |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 90 | --skip-tenant) SKIP_PROJECT="$SKIP_PROJECT$2,"; shift ;; |
| 91 | --skip-project) SKIP_PROJECT="$SKIP_PROJECT$2,"; shift ;; |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 92 | --os-auth-url) export OS_AUTH_URL=$2; shift ;; |
Jamie Lennox | bd24a8d | 2013-09-20 16:26:42 +1000 | [diff] [blame] | 93 | --os-cacert) export OS_CACERT=$2; shift ;; |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 94 | --target-dir) ACCOUNT_DIR=$2; shift ;; |
Steve Baker | e389aed | 2014-09-23 17:10:39 +1200 | [diff] [blame] | 95 | --heat-url) HEAT_URL=$2; shift ;; |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 96 | --debug) set -o xtrace ;; |
| 97 | -u) MODE=${MODE:-one}; USER_NAME=$2; shift ;; |
| 98 | -p) USER_PASS=$2; shift ;; |
| 99 | -A) MODE=all; ;; |
| 100 | -P) ADDPASS="yes" ;; |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 101 | -C) MODE=create; PROJECT=$2; shift ;; |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 102 | -r) ROLE=$2; shift ;; |
| 103 | (--) shift; break ;; |
| 104 | (-*) echo "$0: error - unrecognized option $1" >&2; display_help; exit 1 ;; |
| 105 | (*) echo "$0: error - unexpected argument $1" >&2; display_help; exit 1 ;; |
| 106 | esac |
| 107 | shift |
| 108 | done |
| 109 | |
| 110 | if [ -z "$OS_PASSWORD" ]; then |
| 111 | if [ -z "$ADMIN_PASSWORD" ];then |
| 112 | echo "The admin password is required option!" >&2 |
| 113 | exit 2 |
| 114 | else |
| 115 | OS_PASSWORD=$ADMIN_PASSWORD |
| 116 | fi |
| 117 | fi |
| 118 | |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 119 | if [ -z "$OS_PROJECT_ID" -a "$OS_TENANT_ID" ]; then |
| 120 | export OS_PROJECT_ID=$OS_TENANT_ID |
| 121 | fi |
| 122 | |
| 123 | if [ -z "$OS_PROJECT_NAME" -a "$OS_TENANT_NAME" ]; then |
| 124 | export OS_PROJECT_NAME=$OS_TENANT_NAME |
| 125 | fi |
| 126 | |
| 127 | if [ -z "$OS_PROJECT_NAME" -a -z "$OS_PROJECT_ID" ]; then |
| 128 | export OS_PROJECT_NAME=admin |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 129 | fi |
| 130 | |
| 131 | if [ -z "$OS_USERNAME" ]; then |
Sean Dague | 0b865a5 | 2013-10-22 11:37:35 -0400 | [diff] [blame] | 132 | export OS_USERNAME=admin |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 133 | fi |
| 134 | |
| 135 | if [ -z "$OS_AUTH_URL" ]; then |
Sean Dague | 0b865a5 | 2013-10-22 11:37:35 -0400 | [diff] [blame] | 136 | export OS_AUTH_URL=http://localhost:5000/v2.0/ |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 137 | fi |
| 138 | |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 139 | if [ -z "$OS_USER_DOMAIN_ID" -a -z "$OS_USER_DOMAIN_NAME" ]; then |
| 140 | # purposefully not exported as it would force v3 auth within this file. |
| 141 | OS_USER_DOMAIN_ID=default |
| 142 | fi |
| 143 | |
| 144 | if [ -z "$OS_PROJECT_DOMAIN_ID" -a -z "$OS_PROJECT_DOMAIN_NAME" ]; then |
| 145 | # purposefully not exported as it would force v3 auth within this file. |
| 146 | OS_PROJECT_DOMAIN_ID=default |
| 147 | fi |
| 148 | |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 149 | USER_PASS=${USER_PASS:-$OS_PASSWORD} |
| 150 | USER_NAME=${USER_NAME:-$OS_USERNAME} |
| 151 | |
| 152 | if [ -z "$MODE" ]; then |
| 153 | echo "You must specify at least -A or -u parameter!" >&2 |
| 154 | echo |
| 155 | display_help |
| 156 | exit 3 |
| 157 | fi |
| 158 | |
| 159 | export -n SERVICE_TOKEN SERVICE_ENDPOINT OS_SERVICE_TOKEN OS_SERVICE_ENDPOINT |
| 160 | |
Andrey Pavlov | 485c962 | 2015-08-24 22:55:19 +0300 | [diff] [blame] | 161 | EC2_URL=$(openstack endpoint list --service ec2 --interface public --os-identity-api-version=3 -c URL -f value || true) |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 162 | if [[ -z $EC2_URL ]]; then |
Andrey Pavlov | 0ea8b72 | 2015-02-06 22:37:53 +0300 | [diff] [blame] | 163 | EC2_URL=http://localhost:8773/ |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 164 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 165 | |
Andrey Pavlov | 485c962 | 2015-08-24 22:55:19 +0300 | [diff] [blame] | 166 | S3_URL=$(openstack endpoint list --service s3 --interface public --os-identity-api-version=3 -c URL -f value || true) |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 167 | if [[ -z $S3_URL ]]; then |
| 168 | S3_URL=http://localhost:3333 |
| 169 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 170 | |
| 171 | mkdir -p "$ACCOUNT_DIR" |
| 172 | ACCOUNT_DIR=`readlink -f "$ACCOUNT_DIR"` |
| 173 | EUCALYPTUS_CERT=$ACCOUNT_DIR/cacert.pem |
Adam Spiers | c85ade7 | 2013-10-01 00:35:16 +0100 | [diff] [blame] | 174 | if [ -e "$EUCALYPTUS_CERT" ]; then |
| 175 | mv "$EUCALYPTUS_CERT" "$EUCALYPTUS_CERT.old" |
| 176 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 177 | if ! nova x509-get-root-cert "$EUCALYPTUS_CERT"; then |
| 178 | echo "Failed to update the root certificate: $EUCALYPTUS_CERT" >&2 |
Adam Spiers | c85ade7 | 2013-10-01 00:35:16 +0100 | [diff] [blame] | 179 | if [ -e "$EUCALYPTUS_CERT.old" ]; then |
| 180 | mv "$EUCALYPTUS_CERT.old" "$EUCALYPTUS_CERT" |
| 181 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 182 | fi |
| 183 | |
| 184 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 185 | function add_entry { |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 186 | local user_id=$1 |
| 187 | local user_name=$2 |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 188 | local project_id=$3 |
| 189 | local project_name=$4 |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 190 | local user_passwd=$5 |
| 191 | |
| 192 | # The admin user can see all user's secret AWS keys, it does not looks good |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 193 | local line=`openstack ec2 credentials list --user $user_id | grep " $project_id "` |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 194 | if [ -z "$line" ]; then |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 195 | openstack ec2 credentials create --user $user_id --project $project_id 1>&2 |
| 196 | line=`openstack ec2 credentials list --user $user_id | grep " $project_id "` |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 197 | fi |
| 198 | local ec2_access_key ec2_secret_key |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 199 | read ec2_access_key ec2_secret_key <<< `echo $line | awk '{print $2 " " $4 }'` |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 200 | mkdir -p "$ACCOUNT_DIR/$project_name" |
| 201 | local rcfile="$ACCOUNT_DIR/$project_name/$user_name" |
| 202 | # The certs subject part are the project ID "dash" user ID, but the CN should be the first part of the DN |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 203 | # Generally the subject DN parts should be in reverse order like the Issuer |
| 204 | # The Serial does not seams correctly marked either |
| 205 | local ec2_cert="$rcfile-cert.pem" |
| 206 | local ec2_private_key="$rcfile-pk.pem" |
| 207 | # Try to preserve the original file on fail (best effort) |
Adam Spiers | c85ade7 | 2013-10-01 00:35:16 +0100 | [diff] [blame] | 208 | if [ -e "$ec2_private_key" ]; then |
| 209 | mv -f "$ec2_private_key" "$ec2_private_key.old" |
| 210 | fi |
| 211 | if [ -e "$ec2_cert" ]; then |
| 212 | mv -f "$ec2_cert" "$ec2_cert.old" |
| 213 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 214 | # It will not create certs when the password is incorrect |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 215 | if ! nova --os-password "$user_passwd" --os-username "$user_name" --os-project-name "$project_name" x509-create-cert "$ec2_private_key" "$ec2_cert"; then |
Adam Spiers | c85ade7 | 2013-10-01 00:35:16 +0100 | [diff] [blame] | 216 | if [ -e "$ec2_private_key.old" ]; then |
| 217 | mv -f "$ec2_private_key.old" "$ec2_private_key" |
| 218 | fi |
| 219 | if [ -e "$ec2_cert.old" ]; then |
| 220 | mv -f "$ec2_cert.old" "$ec2_cert" |
| 221 | fi |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 222 | fi |
| 223 | cat >"$rcfile" <<EOF |
| 224 | # you can source this file |
Attila Fazekas | 5b813bc | 2013-01-08 16:51:05 +0100 | [diff] [blame] | 225 | export EC2_ACCESS_KEY="$ec2_access_key" |
| 226 | export EC2_SECRET_KEY="$ec2_secret_key" |
| 227 | export EC2_URL="$EC2_URL" |
| 228 | export S3_URL="$S3_URL" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 229 | # OpenStack USER ID = $user_id |
| 230 | export OS_USERNAME="$user_name" |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 231 | # OpenStack project ID = $project_id |
| 232 | export OS_PROJECT_NAME="$project_name" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 233 | export OS_AUTH_URL="$OS_AUTH_URL" |
Jamie Lennox | bd24a8d | 2013-09-20 16:26:42 +1000 | [diff] [blame] | 234 | export OS_CACERT="$OS_CACERT" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 235 | export EC2_CERT="$ec2_cert" |
| 236 | export EC2_PRIVATE_KEY="$ec2_private_key" |
| 237 | export EC2_USER_ID=42 #not checked by nova (can be a 12-digit id) |
| 238 | export EUCALYPTUS_CERT="$ACCOUNT_DIR/cacert.pem" |
| 239 | export NOVA_CERT="$ACCOUNT_DIR/cacert.pem" |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 240 | export OS_AUTH_TYPE=v2password |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 241 | EOF |
| 242 | if [ -n "$ADDPASS" ]; then |
| 243 | echo "export OS_PASSWORD=\"$user_passwd\"" >>"$rcfile" |
| 244 | fi |
Steve Baker | e389aed | 2014-09-23 17:10:39 +1200 | [diff] [blame] | 245 | if [ -n "$HEAT_URL" ]; then |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 246 | echo "export HEAT_URL=\"$HEAT_URL/$project_id\"" >>"$rcfile" |
Steve Baker | e389aed | 2014-09-23 17:10:39 +1200 | [diff] [blame] | 247 | echo "export OS_NO_CLIENT_AUTH=True" >>"$rcfile" |
| 248 | fi |
Jamie Lennox | c54d4ab | 2015-06-22 04:07:18 +0000 | [diff] [blame] | 249 | for v in OS_USER_DOMAIN_ID OS_USER_DOMAIN_NAME OS_PROJECT_DOMAIN_ID OS_PROJECT_DOMAIN_NAME; do |
| 250 | if [ ${!v} ]; then |
| 251 | echo "export $v=${!v}" >>"$rcfile" |
| 252 | else |
| 253 | echo "unset $v" >>"$rcfile" |
| 254 | fi |
| 255 | done |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 256 | } |
| 257 | |
| 258 | #admin users expected |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 259 | function create_or_get_project { |
| 260 | local name=$1 |
| 261 | local id |
| 262 | eval $(openstack project show -f shell -c id $name) |
| 263 | if [[ -z $id ]]; then |
| 264 | eval $(openstack project create -f shell -c id $name) |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 265 | fi |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 266 | echo $id |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 267 | } |
| 268 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 269 | function create_or_get_role { |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 270 | local name=$1 |
| 271 | local id |
| 272 | eval $(openstack role show -f shell -c id $name) |
| 273 | if [[ -z $id ]]; then |
| 274 | eval $(openstack role create -f shell -c id $name) |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 275 | fi |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 276 | echo $id |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 277 | } |
| 278 | |
| 279 | # Provides empty string when the user does not exists |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 280 | function get_user_id { |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 281 | openstack user list | grep " $1 " | cut -d " " -f2 |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 282 | } |
| 283 | |
| 284 | if [ $MODE != "create" ]; then |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 285 | # looks like I can't ask for all project related to a specified user |
| 286 | openstack project list --long --quote none -f csv | grep ',True' | grep -v "${SKIP_PROJECT}" | while IFS=, read project_id project_name desc enabled; do |
| 287 | openstack user list --project $project_id --long --quote none -f csv | grep ',True' | while IFS=, read user_id user_name project email enabled; do |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 288 | if [ $MODE = one -a "$user_name" != "$USER_NAME" ]; then |
Sean Dague | 0b865a5 | 2013-10-22 11:37:35 -0400 | [diff] [blame] | 289 | continue; |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 290 | fi |
Sahid Orentino Ferdjaoui | 1814e67 | 2014-02-11 17:56:07 +0100 | [diff] [blame] | 291 | |
| 292 | # Checks for a specific password defined for an user. |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 293 | # Example for an username johndoe: JOHNDOE_PASSWORD=1234 |
JordanP | 7c6d005 | 2014-10-06 23:08:50 +0200 | [diff] [blame] | 294 | # This mechanism is used by lib/swift |
| 295 | eval SPECIFIC_UPASSWORD="\$${user_name}_password" |
Sahid Orentino Ferdjaoui | 1814e67 | 2014-02-11 17:56:07 +0100 | [diff] [blame] | 296 | if [ -n "$SPECIFIC_UPASSWORD" ]; then |
| 297 | USER_PASS=$SPECIFIC_UPASSWORD |
| 298 | fi |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 299 | add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 300 | done |
| 301 | done |
| 302 | else |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 303 | project_name=$PROJECT |
| 304 | project_id=$(create_or_get_project "$PROJECT") |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 305 | user_name=$USER_NAME |
| 306 | user_id=`get_user_id $user_name` |
| 307 | if [ -z "$user_id" ]; then |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 308 | eval $(openstack user create "$user_name" --project "$project_id" --password "$USER_PASS" --email "$user_name@example.com" -f shell -c id) |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 309 | user_id=$id |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 310 | add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 311 | else |
Steve Martinelli | bce8899 | 2014-03-14 00:40:06 -0500 | [diff] [blame] | 312 | role_id=$(create_or_get_role "$ROLE") |
Jamie Lennox | 9d6d8f8 | 2015-06-22 03:37:59 +0000 | [diff] [blame] | 313 | openstack role add "$role_id" --user "$user_id" --project "$project_id" |
| 314 | add_entry "$user_id" "$user_name" "$project_id" "$project_name" "$USER_PASS" |
Attila Fazekas | 22ef573 | 2012-12-16 14:03:06 +0100 | [diff] [blame] | 315 | fi |
| 316 | fi |