cfme.utils.auth package¶
Module contents¶
-
class
cfme.utils.auth.
AmazonAuthProvider
(key, access_key, secret_key, get_groups=False)[source]¶ Bases:
cfme.utils.auth.BaseAuthProvider
AWS IAM auth provider
-
access_key
= Attribute(name='access_key', default=NOTHING, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
auth_type
= 'amazon'¶
-
get_groups
= Attribute(name='get_groups', default=False, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
secret_key
= Attribute(name='secret_key', default=NOTHING, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
view_class
¶ alias of
AmazonAuthenticationView
-
-
class
cfme.utils.auth.
BaseAuthProvider
(key)[source]¶ Bases:
object
Base class for authentication provider objects
-
auth_type
= None¶
-
classmethod
from_config
(prov_config, prov_key)[source]¶ Returns an object using the passed yaml config Sets defaults for yaml configured objects separate from attr.ib definitions
-
key
= Attribute(name='key', default=NOTHING, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
view_class
= None¶
-
-
class
cfme.utils.auth.
FreeIPAAuthProvider
(key, host1, bind_password, host2=None, host3=None, port=389, user_type='principal', domain_prefix=None, user_suffix=None, base_dn=None, bind_dn=None, get_groups=False, get_roles=False, follow_referrals=False, domain_name=None, cert_filename=None, cert_filepath=None, ipaddress=None, ldap_conf=None, sssd_conf=None, ipaprincipal=None, iparealm=None, ipadomain=None)[source]¶ Bases:
cfme.utils.auth.MIQAuthProvider
freeipa can be used with ldap auth config or external
For ldap config:
- 3 hosts can be configured
- bind_dn is used for admin user validation
- ipa realm and ipadomain are not part of config
- user_type will use the cfme.utils.auth.USER_TYPES dict
For external config:
- 1 host is configured as –ipaserver
- realm and domain are optional params
- all user type, suffix, base/bind_dn, get_groups/roles/referrals args are not used
-
as_external_value
()[source]¶ return a dictionary that can be used with appliance_console_cli.configure_ipa
-
auth_type
= 'freeipa'¶
-
ipadomain
= Attribute(name='ipadomain', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
ipaprincipal
= Attribute(name='ipaprincipal', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
iparealm
= Attribute(name='iparealm', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
view_class
¶ alias of
LdapAuthenticationView
-
class
cfme.utils.auth.
MIQAuthProvider
(key, host1, bind_password, host2=None, host3=None, port=389, user_type='principal', domain_prefix=None, user_suffix=None, base_dn=None, bind_dn=None, get_groups=False, get_roles=False, follow_referrals=False, domain_name=None, cert_filename=None, cert_filepath=None, ipaddress=None, ldap_conf=None, sssd_conf=None)[source]¶ Bases:
cfme.utils.auth.BaseAuthProvider
base class for miq auth providers (ldap/ldaps modes in UI) Intended to be used for freeipa, AD, openldap and openldaps type providers
-
base_dn
= Attribute(name='base_dn', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
bind_dn
= Attribute(name='bind_dn', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
bind_password
= Attribute(name='bind_password', default=NOTHING, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
cert_filename
= Attribute(name='cert_filename', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
cert_filepath
= Attribute(name='cert_filepath', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
domain_name
= Attribute(name='domain_name', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
domain_prefix
= Attribute(name='domain_prefix', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
follow_referrals
= Attribute(name='follow_referrals', default=False, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
get_groups
= Attribute(name='get_groups', default=False, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
get_roles
= Attribute(name='get_roles', default=False, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
host1
= Attribute(name='host1', default=NOTHING, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
host2
= Attribute(name='host2', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
host3
= Attribute(name='host3', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
ipaddress
= Attribute(name='ipaddress', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
ldap_conf
= Attribute(name='ldap_conf', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
port
= Attribute(name='port', default=389, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
sssd_conf
= Attribute(name='sssd_conf', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
user_suffix
= Attribute(name='user_suffix', default=None, validator=None, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
user_type
= Attribute(name='user_type', default='principal', validator=<function <lambda>>, repr=True, cmp=True, hash=None, init=True, convert=None, metadata=mappingproxy({}))¶
-
-
class
cfme.utils.auth.
OpenLDAPAuthProvider
(key, host1, bind_password, host2=None, host3=None, port=389, user_type='principal', domain_prefix=None, user_suffix=None, base_dn=None, bind_dn=None, get_groups=False, get_roles=False, follow_referrals=False, domain_name=None, cert_filename=None, cert_filepath=None, ipaddress=None, ldap_conf=None, sssd_conf=None)[source]¶ Bases:
cfme.utils.auth.MIQAuthProvider
openldap auth provider, NO SSL No attributes beyond MIQAuthProvider
-
auth_type
= 'openldap'¶
-
view_class
¶ alias of
LdapAuthenticationView
-
-
class
cfme.utils.auth.
OpenLDAPSAuthProvider
(key, host1, bind_password, host2=None, host3=None, port=389, user_type='principal', domain_prefix=None, user_suffix=None, base_dn=None, bind_dn=None, get_groups=False, get_roles=False, follow_referrals=False, domain_name=None, cert_filename=None, cert_filepath=None, ipaddress=None, ldap_conf=None, sssd_conf=None)[source]¶ Bases:
cfme.utils.auth.MIQAuthProvider
openldap auth provider, WITH SSL
-
auth_type
= 'openldaps'¶
-
view_class
¶ alias of
LdapsAuthenticationView
-
-
cfme.utils.auth.
auth_class_from_type
(auth_prov_type)[source]¶ Using the registered auth provider classes, fetch a class by its type key
Parameters: auth_prov_type – string key matching a registered type in entry_points Raises: UnknownProviderType when the given type isn’t registered in entry_points
-
cfme.utils.auth.
auth_provider_types
()[source]¶ Fetch the registered classes from entry_points manageiq.auth_provider_categories
-
cfme.utils.auth.
get_auth_crud
(auth_prov_key)[source]¶ Get a BaseAuthProvider derived class with the auth_data.yaml configuration for the key
Parameters: auth_prov_key – string key matching one in conf/auth_data.yaml ‘auth_providers’ dict Raises: ValueError if the yaml type for given key doesn’t match auth_type on fetched class