summaryrefslogtreecommitdiffstats
path: root/awxkit
diff options
context:
space:
mode:
authorMike Graves <mgraves@redhat.com>2024-10-16 18:01:30 +0200
committerGitHub <noreply@github.com>2024-10-16 18:01:30 +0200
commit764dcbf94b51f9b55b467824208e4c8b9dc15786 (patch)
tree33d5874799bb7b377e3938a2c5b9f89da6a9f68b /awxkit
parentremove oauth use (diff)
downloadawx-764dcbf94b51f9b55b467824208e4c8b9dc15786.tar.xz
awx-764dcbf94b51f9b55b467824208e4c8b9dc15786.zip
Add gateway support to awxkit (#15576)
* Add gateway support to awxkit This updates awxkit to add support for gateway when fetching oauth tokens, which is used during the `login` subcommand. awxkit will first try fetching a token from gateway and if that fails, fallback to existing behavior. This change is backwards compatible. Signed-off-by: Mike Graves <mgraves@redhat.com> * Address review feedback This: * adds coverage for the get_oauth2_token() method * changes AuthUrls to a TypedDict * changes the url used for personal token access in gateway * Address review feedback This is just minor stylistic changes. --------- Signed-off-by: Mike Graves <mgraves@redhat.com>
Diffstat (limited to 'awxkit')
-rw-r--r--awxkit/awxkit/api/pages/base.py32
-rw-r--r--awxkit/awxkit/config.py1
-rw-r--r--awxkit/test/api/pages/test_base.py59
3 files changed, 85 insertions, 7 deletions
diff --git a/awxkit/awxkit/api/pages/base.py b/awxkit/awxkit/api/pages/base.py
index ec3fcd0857..8730b9be48 100644
--- a/awxkit/awxkit/api/pages/base.py
+++ b/awxkit/awxkit/api/pages/base.py
@@ -1,5 +1,6 @@
import collections
import logging
+import typing
from requests.auth import HTTPBasicAuth
@@ -12,6 +13,11 @@ import awxkit.exceptions as exc
log = logging.getLogger(__name__)
+class AuthUrls(typing.TypedDict):
+ access_token: str
+ personal_token: str
+
+
class Base(Page):
def silent_delete(self):
"""Delete the object. If it's already deleted, ignore the error"""
@@ -141,30 +147,27 @@ class Base(Page):
load_default_authtoken = load_authtoken
- def get_oauth2_token(self, username='', password='', client_id=None, description='AWX CLI', client_secret=None, scope='write'):
- default_cred = config.credentials.default
- username = username or default_cred.username
- password = password or default_cred.password
+ def _request_token(self, auth_urls, username, password, client_id, description, client_secret, scope):
req = collections.namedtuple('req', 'headers')({})
if client_id and client_secret:
HTTPBasicAuth(client_id, client_secret)(req)
req.headers['Content-Type'] = 'application/x-www-form-urlencoded'
resp = self.connection.post(
- f"{config.api_base_path}o/token/",
+ auth_urls["access_token"],
data={"grant_type": "password", "username": username, "password": password, "scope": scope},
headers=req.headers,
)
elif client_id:
req.headers['Content-Type'] = 'application/x-www-form-urlencoded'
resp = self.connection.post(
- f"{config.api_base_path}o/token/",
+ auth_urls["access_token"],
data={"grant_type": "password", "username": username, "password": password, "client_id": client_id, "scope": scope},
headers=req.headers,
)
else:
HTTPBasicAuth(username, password)(req)
resp = self.connection.post(
- '{0}v2/users/{1}/personal_tokens/'.format(config.api_base_path, username),
+ auth_urls['personal_token'],
json={"description": description, "application": None, "scope": scope},
headers=req.headers,
)
@@ -177,6 +180,21 @@ class Base(Page):
else:
raise exception_from_status_code(resp.status_code)
+ def get_oauth2_token(self, username='', password='', client_id=None, description='AWX CLI', client_secret=None, scope='write'):
+ default_cred = config.credentials.default
+ username = username or default_cred.username
+ password = password or default_cred.password
+ # Try gateway first, fallback to controller
+ urls: AuthUrls = {"access_token": "/o/token/", "personal_token": f"{config.gateway_base_path}v1/tokens/"}
+ try:
+ return self._request_token(urls, username, password, client_id, description, client_secret, scope)
+ except exc.NotFound:
+ urls = {
+ "access_token": f"{config.api_base_path}o/token/",
+ "personal_token": f"{config.api_base_path}v2/users/{username}/personal_tokens/",
+ }
+ return self._request_token(urls, username, password, client_id, description, client_secret, scope)
+
def load_session(self, username='', password=''):
default_cred = config.credentials.default
self.connection.login(
diff --git a/awxkit/awxkit/config.py b/awxkit/awxkit/config.py
index 81c4d7938b..c5aee872c3 100644
--- a/awxkit/awxkit/config.py
+++ b/awxkit/awxkit/config.py
@@ -33,3 +33,4 @@ config.client_connection_attempts = int(os.getenv('AWXKIT_CLIENT_CONNECTION_ATTE
config.prevent_teardown = to_bool(os.getenv('AWXKIT_PREVENT_TEARDOWN', False))
config.use_sessions = to_bool(os.getenv('AWXKIT_SESSIONS', False))
config.api_base_path = os.getenv('AWXKIT_API_BASE_PATH', '/api/')
+config.gateway_base_path = os.getenv('AWXKIT_GATEWAY_BASE_PATH', '/api/gateway/')
diff --git a/awxkit/test/api/pages/test_base.py b/awxkit/test/api/pages/test_base.py
new file mode 100644
index 0000000000..6706d950d4
--- /dev/null
+++ b/awxkit/test/api/pages/test_base.py
@@ -0,0 +1,59 @@
+from http.client import NOT_FOUND
+import pytest
+from pytest_mock import MockerFixture
+from requests import Response
+
+from awxkit.api.pages import Base
+from awxkit.config import config
+
+
+@pytest.fixture(autouse=True)
+def setup_config(monkeypatch: pytest.MonkeyPatch) -> None:
+ monkeypatch.setattr(config, "credentials", {"default": {"username": "foo", "password": "bar"}}, raising=False)
+ monkeypatch.setattr(config, "base_url", "", raising=False)
+
+
+@pytest.fixture
+def response(mocker):
+ r = mocker.Mock()
+ r.status_code = NOT_FOUND
+ r.json.return_value = {
+ "token": "my_personal_token",
+ "access_token": "my_token",
+ }
+ return r
+
+
+@pytest.mark.parametrize(
+ ("auth_creds", "url", "token"),
+ [
+ ({"client_id": "foo", "client_secret": "bar"}, "/o/token/", "my_token"),
+ ({"client_id": "foo"}, "/o/token/", "my_token"),
+ ({}, "/api/gateway/v1/tokens/", "my_personal_token"),
+ ],
+)
+def test_get_oauth2_token_from_gateway(mocker: MockerFixture, response: Response, auth_creds, url, token):
+ post = mocker.patch("requests.Session.post", return_value=response)
+ base = Base()
+ ret = base.get_oauth2_token(**auth_creds)
+ assert post.call_count == 1
+ assert post.call_args.args[0] == url
+ assert ret == token
+
+
+@pytest.mark.parametrize(
+ ("auth_creds", "url", "token"),
+ [
+ ({"client_id": "foo", "client_secret": "bar"}, "/api/o/token/", "my_token"),
+ ({"client_id": "foo"}, "/api/o/token/", "my_token"),
+ ({}, "/api/v2/users/foo/personal_tokens/", "my_personal_token"),
+ ],
+)
+def test_get_oauth2_token_from_controller(mocker: MockerFixture, response: Response, auth_creds, url, token):
+ type(response).ok = mocker.PropertyMock(side_effect=[False, True])
+ post = mocker.patch("requests.Session.post", return_value=response)
+ base = Base()
+ ret = base.get_oauth2_token(**auth_creds)
+ assert post.call_count == 2
+ assert post.call_args.args[0] == url
+ assert ret == token