summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJesse Andrews <anotherjesse@gmail.com>2011-08-10 19:08:35 +0000
committerTarmac <>2011-08-10 19:08:35 +0000
commite78499c51b1cec93c0bdaadbcb78e71bf66d473d (patch)
treebc12d5c85668404f750d21e7db8fa6148c35acd5
parentb9c2aad3eca2cc397f96682907a0c4e8c7b6005b (diff)
parent0719b038ba1548f98668991507c001eb18c82981 (diff)
Adding keypair support to the openstack contribute api
-rw-r--r--nova/api/openstack/contrib/keypairs.py145
-rw-r--r--nova/crypto.py10
-rw-r--r--nova/tests/api/openstack/contrib/test_keypairs.py99
-rw-r--r--nova/tests/api/openstack/test_extensions.py4
4 files changed, 253 insertions, 5 deletions
diff --git a/nova/api/openstack/contrib/keypairs.py b/nova/api/openstack/contrib/keypairs.py
new file mode 100644
index 000000000..201648ab5
--- /dev/null
+++ b/nova/api/openstack/contrib/keypairs.py
@@ -0,0 +1,145 @@
+# vim: tabstop=4 shiftwidth=4 softtabstop=4
+
+# Copyright 2011 OpenStack LLC.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+""" Keypair management extension"""
+
+import os
+import shutil
+import tempfile
+
+from webob import exc
+
+from nova import crypto
+from nova import db
+from nova import exception
+from nova.api.openstack import extensions
+
+
+class KeypairController(object):
+ """ Keypair API controller for the Openstack API """
+
+ # TODO(ja): both this file and nova.api.ec2.cloud.py have similar logic.
+ # move the common keypair logic to nova.compute.API?
+
+ def _gen_key(self):
+ """
+ Generate a key
+ """
+ private_key, public_key, fingerprint = crypto.generate_key_pair()
+ return {'private_key': private_key,
+ 'public_key': public_key,
+ 'fingerprint': fingerprint}
+
+ def create(self, req, body):
+ """
+ Create or import keypair.
+
+ Sending name will generate a key and return private_key
+ and fingerprint.
+
+ You can send a public_key to add an existing ssh key
+
+ params: keypair object with:
+ name (required) - string
+ public_key (optional) - string
+ """
+
+ context = req.environ['nova.context']
+ params = body['keypair']
+ name = params['name']
+
+ # NOTE(ja): generation is slow, so shortcut invalid name exception
+ try:
+ db.key_pair_get(context, context.user_id, name)
+ raise exception.KeyPairExists(key_name=name)
+ except exception.NotFound:
+ pass
+
+ keypair = {'user_id': context.user_id,
+ 'name': name}
+
+ # import if public_key is sent
+ if 'public_key' in params:
+ tmpdir = tempfile.mkdtemp()
+ fn = os.path.join(tmpdir, 'import.pub')
+ with open(fn, 'w') as pub:
+ pub.write(params['public_key'])
+ fingerprint = crypto.generate_fingerprint(fn)
+ shutil.rmtree(tmpdir)
+ keypair['public_key'] = params['public_key']
+ keypair['fingerprint'] = fingerprint
+ else:
+ generated_key = self._gen_key()
+ keypair['private_key'] = generated_key['private_key']
+ keypair['public_key'] = generated_key['public_key']
+ keypair['fingerprint'] = generated_key['fingerprint']
+
+ db.key_pair_create(context, keypair)
+ return {'keypair': keypair}
+
+ def delete(self, req, id):
+ """
+ Delete a keypair with a given name
+ """
+ context = req.environ['nova.context']
+ db.key_pair_destroy(context, context.user_id, id)
+ return exc.HTTPAccepted()
+
+ def index(self, req):
+ """
+ List of keypairs for a user
+ """
+ context = req.environ['nova.context']
+ key_pairs = db.key_pair_get_all_by_user(context, context.user_id)
+ rval = []
+ for key_pair in key_pairs:
+ rval.append({'keypair': {
+ 'name': key_pair['name'],
+ 'public_key': key_pair['public_key'],
+ 'fingerprint': key_pair['fingerprint'],
+ }})
+
+ return {'keypairs': rval}
+
+
+class Keypairs(extensions.ExtensionDescriptor):
+
+ def get_name(self):
+ return "Keypairs"
+
+ def get_alias(self):
+ return "os-keypairs"
+
+ def get_description(self):
+ return "Keypair Support"
+
+ def get_namespace(self):
+ return \
+ "http://docs.openstack.org/ext/keypairs/api/v1.1"
+
+ def get_updated(self):
+ return "2011-08-08T00:00:00+00:00"
+
+ def get_resources(self):
+ resources = []
+
+ res = extensions.ResourceExtension(
+ 'os-keypairs',
+ KeypairController())
+
+ resources.append(res)
+ return resources
diff --git a/nova/crypto.py b/nova/crypto.py
index 8d535f426..71bef80f2 100644
--- a/nova/crypto.py
+++ b/nova/crypto.py
@@ -104,6 +104,12 @@ def fetch_ca(project_id=None, chain=True):
return buffer
+def generate_fingerprint(public_key):
+ (out, err) = utils.execute('ssh-keygen', '-q', '-l', '-f', public_key)
+ fingerprint = out.split(' ')[1]
+ return fingerprint
+
+
def generate_key_pair(bits=1024):
# what is the magic 65537?
@@ -111,9 +117,7 @@ def generate_key_pair(bits=1024):
keyfile = os.path.join(tmpdir, 'temp')
utils.execute('ssh-keygen', '-q', '-b', bits, '-N', '',
'-f', keyfile)
- (out, err) = utils.execute('ssh-keygen', '-q', '-l', '-f',
- '%s.pub' % (keyfile))
- fingerprint = out.split(' ')[1]
+ fingerprint = generate_fingerprint('%s.pub' % (keyfile))
private_key = open(keyfile).read()
public_key = open(keyfile + '.pub').read()
diff --git a/nova/tests/api/openstack/contrib/test_keypairs.py b/nova/tests/api/openstack/contrib/test_keypairs.py
new file mode 100644
index 000000000..c9dc34d65
--- /dev/null
+++ b/nova/tests/api/openstack/contrib/test_keypairs.py
@@ -0,0 +1,99 @@
+# Copyright 2011 Eldar Nugaev
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import json
+import webob
+
+from nova import context
+from nova import db
+from nova import test
+from nova.api.openstack.contrib.keypairs import KeypairController
+from nova.tests.api.openstack import fakes
+
+
+def fake_keypair(name):
+ return {'public_key': 'FAKE_KEY',
+ 'fingerprint': 'FAKE_FINGERPRINT',
+ 'name': name}
+
+def db_key_pair_get_all_by_user(self, user_id):
+ return [fake_keypair('FAKE')]
+
+
+def db_key_pair_create(self, keypair):
+ pass
+
+
+def db_key_pair_destroy(context, user_id, name):
+ if not (user_id and name):
+ raise Exception()
+
+
+class KeypairsTest(test.TestCase):
+
+ def setUp(self):
+ super(KeypairsTest, self).setUp()
+ self.controller = KeypairController()
+ fakes.stub_out_networking(self.stubs)
+ fakes.stub_out_rate_limiting(self.stubs)
+ self.stubs.Set(db, "key_pair_get_all_by_user",
+ db_key_pair_get_all_by_user)
+ self.stubs.Set(db, "key_pair_create",
+ db_key_pair_create)
+ self.stubs.Set(db, "key_pair_destroy",
+ db_key_pair_destroy)
+ self.context = context.get_admin_context()
+
+ def test_keypair_list(self):
+ req = webob.Request.blank('/v1.1/os-keypairs')
+ res = req.get_response(fakes.wsgi_app())
+ self.assertEqual(res.status_int, 200)
+ res_dict = json.loads(res.body)
+ response = {'keypairs': [{'keypair': fake_keypair('FAKE')}]}
+ self.assertEqual(res_dict, response)
+
+ def test_keypair_create(self):
+ body = {'keypair': {'name': 'create_test'}}
+ req = webob.Request.blank('/v1.1/os-keypairs')
+ req.method = 'POST'
+ req.body = json.dumps(body)
+ req.headers['Content-Type'] = 'application/json'
+ res = req.get_response(fakes.wsgi_app())
+ self.assertEqual(res.status_int, 200)
+ res_dict = json.loads(res.body)
+ self.assertTrue(len(res_dict['keypair']['fingerprint']) > 0)
+ self.assertTrue(len(res_dict['keypair']['private_key']) > 0)
+
+ def test_keypair_import(self):
+ body = {'keypair': {'name': 'create_test',
+ 'public_key': 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBYIznAx9D7118Q1VKGpXy2HDiKyUTM8XcUuhQpo0srqb9rboUp4a9NmCwpWpeElDLuva707GOUnfaBAvHBwsRXyxHJjRaI6YQj2oLJwqvaSaWUbyT1vtryRqy6J3TecN0WINY71f4uymiMZP0wby4bKBcYnac8KiCIlvkEl0ETjkOGUq8OyWRmn7ljj5SESEUdBP0JnuTFKddWTU/wD6wydeJaUhBTqOlHn0kX1GyqoNTE1UEhcM5ZRWgfUZfTjVyDF2kGj3vJLCJtJ8LoGcj7YaN4uPg1rBle+izwE/tLonRrds+cev8p6krSSrxWOwBbHkXa6OciiJDvkRzJXzf'}}
+ req = webob.Request.blank('/v1.1/os-keypairs')
+ req.method = 'POST'
+ req.body = json.dumps(body)
+ req.headers['Content-Type'] = 'application/json'
+ res = req.get_response(fakes.wsgi_app())
+ self.assertEqual(res.status_int, 200)
+ # FIXME(ja): sholud we check that public_key was sent to create?
+ res_dict = json.loads(res.body)
+ self.assertTrue(len(res_dict['keypair']['fingerprint']) > 0)
+ self.assertFalse('private_key' in res_dict['keypair'])
+
+ def test_keypair_delete(self):
+ req = webob.Request.blank('/v1.1/os-keypairs/FAKE')
+ req.method = 'DELETE'
+ req.headers['Content-Type'] = 'application/json'
+ res = req.get_response(fakes.wsgi_app())
+ self.assertEqual(res.status_int, 202)
+
diff --git a/nova/tests/api/openstack/test_extensions.py b/nova/tests/api/openstack/test_extensions.py
index 49f0ea8b3..8b7e11a5b 100644
--- a/nova/tests/api/openstack/test_extensions.py
+++ b/nova/tests/api/openstack/test_extensions.py
@@ -97,7 +97,7 @@ class ExtensionControllerTest(test.TestCase):
names = [x['name'] for x in data['extensions']]
names.sort()
self.assertEqual(names, ["FlavorExtraSpecs", "Floating_ips",
- "Fox In Socks", "Hosts", "Multinic", "Volumes"])
+ "Fox In Socks", "Hosts", "Keypairs", "Multinic", "Volumes"])
# Make sure that at least Fox in Sox is correct.
(fox_ext,) = [
@@ -144,7 +144,7 @@ class ExtensionControllerTest(test.TestCase):
# Make sure we have all the extensions.
exts = root.findall('{0}extension'.format(NS))
- self.assertEqual(len(exts), 6)
+ self.assertEqual(len(exts), 7)
# Make sure that at least Fox in Sox is correct.
(fox_ext,) = [x for x in exts if x.get('alias') == 'FOXNSOX']