def _extract_service_catalog(self, url, resp, body, extract_token=True): """See what the auth service told us and process the response. We may get redirected to another site, fail or actually get back a service catalog with a token and our endpoints.""" if resp.status == 200: # content must always present try: self.auth_url = url self.service_catalog = \ service_catalog.ServiceCatalog(body) if extract_token: self.auth_token = self.service_catalog.get_token() management_url = self.service_catalog.url_for( attr='region', filter_value=self.region_name, endpoint_type=self.endpoint_type, service_type=self.service_type, service_name=self.service_name,) self.management_url = management_url.rstrip('/') return None except exceptions.AmbiguousEndpoints: print "Found more than one valid endpoint. Use a more " \ "restrictive filter" raise except KeyError: raise exceptions.AuthorizationFailure() except exceptions.EndpointNotFound: print "Could not find any suitable endpoint. Correct region?" raise elif resp.status == 305: return resp['location'] else: raise exceptions.from_response(resp, body)
def request(self, *args, **kwargs): kwargs.setdefault('headers', kwargs.get('headers', {})) kwargs['headers']['User-Agent'] = self.USER_AGENT kwargs['headers']['Accept'] = 'application/json' if 'body' in kwargs: kwargs['headers']['Content-Type'] = 'application/json' kwargs['body'] = json.dumps(kwargs['body']) self.http_log_req(args, kwargs) resp, body = super(HTTPClient, self).request(*args, **kwargs) self.http_log_resp(resp, body) if body: # NOTE(alaski): Because force_exceptions_to_status_code=True # httplib2 returns a connection refused event as a 400 response. # To determine if it is a bad request or refused connection we need # to check the body. httplib2 tests check for 'Connection refused' # or 'actively refused' in the body, so that's what we'll do. if resp.status == 400: if 'Connection refused' in body or 'actively refused' in body: raise exceptions.ConnectionRefused(body) try: body = json.loads(body) except ValueError: pass else: body = None if resp.status >= 400: raise exceptions.from_response(resp, body) return resp, body
def _v1_auth(self, url): if self.proxy_token: raise exceptions.NoTokenLookupException() headers = {"X-Auth-User": self.user, "X-Auth-Key": self.password} if self.projectid: headers["X-Auth-Project-Id"] = self.projectid resp, body = self._time_request(url, "GET", headers=headers) if resp.status in (200, 204): # in some cases we get No Content try: mgmt_header = "x-server-management-url" self.management_url = resp[mgmt_header].rstrip("/") self.auth_token = resp["x-auth-token"] self.auth_url = url except KeyError: raise exceptions.AuthorizationFailure() elif resp.status == 305: return resp["location"] else: raise exceptions.from_response(resp, body)
def _v1_auth(self, url): if self.proxy_token: raise exceptions.NoTokenLookupException() headers = {'X-Auth-User': self.user, 'X-Auth-Key': self.password} if self.projectid: headers['X-Auth-Project-Id'] = self.projectid resp, body = self._time_request(url, 'GET', headers=headers) if resp.status in (200, 204): # in some cases we get No Content try: mgmt_header = 'x-server-management-url' self.management_url = resp[mgmt_header].rstrip('/') self.auth_token = resp['x-auth-token'] self.auth_url = url except KeyError: raise exceptions.AuthorizationFailure() elif resp.status == 305: return resp['location'] else: raise exceptions.from_response(resp, body)