@Override public Access apply(HttpResponse from) { releasePayload(from); URI storageUrl = null; String authToken = null; for (Map.Entry<String, String> entry : from.getHeaders().entries()) { String header = entry.getKey(); if (header.equalsIgnoreCase(STORAGE_URL)) { storageUrl = getURI(entry.getValue()); } else if (header.equalsIgnoreCase(AUTH_TOKEN)) { authToken = entry.getValue(); } } if (storageUrl == null || authToken == null) { throw new AuthorizationException("Invalid headers in TempAuth response " + from); } // For portability with keystone, based on common knowledge that these tokens tend to expire in 24 hours // http://docs.openstack.org/api/openstack-object-storage/1.0/content/authentication-object-dev-guide.html Date expires = new Date(System.currentTimeMillis() + TimeUnit.HOURS.toMillis(24)); return Access.builder() .user(User.builder().id(username).name(username).build()) .token(Token.builder().id(authToken).expires(expires).build()) .service(Service.builder().name("Object Storage").type(OBJECT_STORE) .endpoint(Endpoint.builder().publicURL(storageUrl).id(apiVersion).region(storageUrl.getHost()).build()) .build()).build(); }
/** * @see User#delegate() */ public T roles(Iterable<Role> roles) { this.roles.addAll(roles); return self(); }
.tenant(Tenant.builder().id("40806637803162").name("40806637803162").build()).build()) .user(User.builder() .id("54321") .name("joe") .role(Role.builder() .id("3") .name("identity:user-admin") .description("User Admin Role.").build()).build()) .service(Service.builder().name("cloudDatabases").type("rax:database") .endpoint(Endpoint.builder()
.tenant(Tenant.builder().id("40806637803162").name("user@jclouds.org-default-tenant").build()).build()) .user(User.builder() .id("36980896575174").name("user@jclouds.org") .role(Role.builder().id("00000000004022").serviceId("110").name("Admin").tenantId("40806637803162").build()) .role(Role.builder().id("00000000004024").serviceId("140").name("user").tenantId("40806637803162").build()) .role(Role.builder().id("00000000004004").serviceId("100").name("domainuser").build()) .role(Role.builder().id("00000000004016").serviceId("120").name("netadmin").tenantId("40806637803162").build()).build()) .service(Service.builder().name("Object Storage").type(OBJECT_STORE) .endpoint(Endpoint.builder()
.tenant(Tenant.builder().id("40806637803162").name("40806637803162").build()).build()) .user(User.builder() .id("54321") .name("joe") .role(Role.builder() .id("3") .name("identity:user-admin") .description("User Admin Role.").build()).build()) .service(Service.builder().name("cloudDatabases").type("rax:database") .endpoint(Endpoint.builder()
.tenant(Tenant.builder().id("40806637803162").name("user@jclouds.org-default-tenant").build()).build()) .user(User.builder() .id("36980896575174").name("user@jclouds.org") .role(Role.builder().id("00000000004022").serviceId("110").name("Admin").tenantId("40806637803162").build()) .role(Role.builder().id("00000000004024").serviceId("140").name("user").tenantId("40806637803162").build()) .role(Role.builder().id("00000000004004").serviceId("100").name("domainuser").build()) .role(Role.builder().id("00000000004016").serviceId("120").name("netadmin").tenantId("40806637803162").build()).build()) .service(Service.builder().name("Object Storage").type(OBJECT_STORE) .endpoint(Endpoint.builder()
.enabled(true).build()).build()) .user(User.builder() .id("b4d134cfe3cf43ad8ba0c2fc5b5d8f91") .name("admin") .role(Role.builder().name("admin").build()) .role(Role.builder().name("KeystoneServiceAdmin").build()) .role(Role.builder().name("KeystoneAdmin").build()).build()) .service(Service.builder().name("Compute Service").type("compute") .endpoint(Endpoint.builder()
.tenant(Tenant.builder().id("40806637803162").name("40806637803162").build()).build()) .user(User.builder() .id("54321") .name("joe") .role(Role.builder() .id("3") .name("identity:user-admin") .description("User Admin Role.").build()).build()) .service(Service.builder().name("cloudDatabases").type("rax:database") .endpoint(Endpoint.builder()
.tenant(Tenant.builder().id("2fdc88ae152948c690b97ba307acae9b").name("admin").build()).build()) .user(User.builder() .id("b4d134cfe3cf43ad8ba0c2fc5b5d8f91") .name("admin") .role(Role.builder().name("admin").build()) .role(Role.builder().name("KeystoneServiceAdmin").build()) .role(Role.builder().name("KeystoneAdmin").build()).build()) .service(Service.builder().name("Compute Service").type("compute") .endpoint(Endpoint.builder()
@Override public Access apply(HttpResponse from) { releasePayload(from); URI storageUrl = null; String authToken = null; for (Map.Entry<String, String> entry : from.getHeaders().entries()) { String header = entry.getKey(); if (header.equalsIgnoreCase(STORAGE_URL)) { storageUrl = getURI(entry.getValue()); } else if (header.equalsIgnoreCase(AUTH_TOKEN)) { authToken = entry.getValue(); } } if (storageUrl == null || authToken == null) { throw new AuthorizationException("Invalid headers in TempAuth response " + from); } // For portability with keystone, based on common knowledge that these tokens tend to expire in 24 hours // http://docs.openstack.org/api/openstack-object-storage/1.0/content/authentication-object-dev-guide.html Date expires = new Date(System.currentTimeMillis() + TimeUnit.HOURS.toMillis(24)); return Access.builder() .user(User.builder().id(username).name(username).build()) .token(Token.builder().id(authToken).expires(expires).build()) .service(Service.builder().name("Object Storage").type(OBJECT_STORE) .endpoint(Endpoint.builder().publicURL(storageUrl).id(apiVersion).region(storageUrl.getHost()).build()) .build()).build(); }
/** * Injects into the guts of jclouds' openstack-keystone a token that was requested, which * should last for only 5 seconds. By sleeping for 10 seconds in the test, it should mean * the token subsequently used by jclouds will expire by the time the second half of the * test executes. */ private void injectShortLivedTokenForSwiftAuth() throws Exception { URL endpointUrl = new URL(endpoint); Credentials creds = new Credentials(identity, credential); Set<Service> services = getServices(creds); HttpToolResponse tokenHttpResponse1 = requestTokenWithExplicitLifetime(endpointUrl, identity, credential, Duration.FIVE_SECONDS); Access access = Access.builder() .user(User.builder() .id(identity) .name(identity) .build()) .token(Token.builder() .id(tokenHttpResponse1.getHeaderLists().get(AuthHeaders.AUTH_TOKEN).get(0)) .expires(new Date(System.currentTimeMillis() + 5000)) .build()) .services(services) .build(); getAuthCache(context).put(creds, access); }
@Override public Access apply(HttpResponse from) { releasePayload(from); URI storageUrl = null; String authToken = null; for (Map.Entry<String, String> entry : from.getHeaders().entries()) { String header = entry.getKey(); if (header.equalsIgnoreCase(STORAGE_URL)) { storageUrl = getURI(entry.getValue()); } else if (header.equalsIgnoreCase(AUTH_TOKEN)) { authToken = entry.getValue(); } } if (storageUrl == null || authToken == null) { throw new AuthorizationException("Invalid headers in TempAuth response " + from); } // For portability with keystone, based on common knowledge that these tokens tend to expire in 24 hours // http://docs.openstack.org/api/openstack-object-storage/1.0/content/authentication-object-dev-guide.html Date expires = new Date(System.currentTimeMillis() + TimeUnit.HOURS.toMillis(24)); return Access.builder() .user(User.builder().id(username).name(username).build()) .token(Token.builder().id(authToken).expires(expires).build()) .service(Service.builder().name("Object Storage").type(OBJECT_STORE) .endpoint(Endpoint.builder().publicURL(storageUrl).id(apiVersion).region(storageUrl.getHost()).build()) .build()).build(); }
@Override @SelectJson("access") @Consumes(MediaType.APPLICATION_JSON) public Access expected() { return Access.builder() .token(Token.builder() .expires(new SimpleDateFormatDateService().iso8601SecondsDateParse("2012-12-02T01:44:54Z")) .id("5afc3adea6654e758b4a9cf01bafe507").build()) .user(User.builder() .id("bf45fd7586c2410c980c651b918aa850") .name("nova") // .username("nova") TODO: add optional username field! .build()).build(); }
/** * @see User#isEnabled() */ public T enabled(Boolean enabled) { this.enabled = enabled; return self(); }
/** * @see User#getEmail() */ public T email(String email) { this.email = email; return self(); }
/** * @see User#getName() */ public T name(String name) { this.name = name; return self(); }
/** * @see User#getId() */ public T id(String id) { this.id = id; return self(); }
/** * @see User#isEnabled() */ public T enabled(Boolean enabled) { this.enabled = enabled; return self(); }