Пример #1
0
def _setup():
    common_setup(service='auth', config=config, setup_db=True, register_mq_exchanges=False,
                 register_signal_handlers=True, register_internal_trigger_types=False,
                 run_migrations=False)

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()
Пример #2
0
def setup_app(config=None):
    config = config or {}

    LOG.info("Creating st2auth: %s as OpenAPI app.", VERSION_STRING)

    is_gunicorn = config.get("is_gunicorn", False)
    if is_gunicorn:
        # NOTE: We only want to perform this logic in the WSGI worker
        st2auth_config.register_opts(ignore_errors=True)
        capabilities = {
            "name": "auth",
            "listen_host": cfg.CONF.auth.host,
            "listen_port": cfg.CONF.auth.port,
            "listen_ssl": cfg.CONF.auth.use_ssl,
            "type": "active",
        }

        # This should be called in gunicorn case because we only want
        # workers to connect to db, rabbbitmq etc. In standalone HTTP
        # server case, this setup would have already occurred.
        common_setup(
            service="auth",
            config=st2auth_config,
            setup_db=True,
            register_mq_exchanges=False,
            register_signal_handlers=True,
            register_internal_trigger_types=False,
            run_migrations=False,
            service_registry=True,
            capabilities=capabilities,
            config_args=config.get("config_args", None),
        )

        # pysaml2 uses subprocess communicate which calls communicate_with_poll
        if cfg.CONF.auth.sso and cfg.CONF.auth.sso_backend == "saml2":
            use_select_poll_workaround(nose_only=False)

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()

    router = Router(debug=cfg.CONF.auth.debug, is_gunicorn=is_gunicorn)

    spec = spec_loader.load_spec("st2common", "openapi.yaml.j2")
    transforms = {"^/auth/v1/": ["/", "/v1/"]}
    router.add_spec(spec, transforms=transforms)

    app = router.as_wsgi

    # Order is important. Check middleware for detailed explanation.
    app = ErrorHandlingMiddleware(app)
    app = CorsMiddleware(app)
    app = LoggingMiddleware(app, router)
    app = ResponseInstrumentationMiddleware(app, router, service_name="auth")
    app = RequestIDMiddleware(app)
    app = RequestInstrumentationMiddleware(app, router, service_name="auth")

    return app
Пример #3
0
Файл: app.py Проект: zwunix/st2
def setup_app(config={}):
    LOG.info('Creating st2auth: %s as OpenAPI app.', VERSION_STRING)

    is_gunicorn = config.get('is_gunicorn', False)
    if is_gunicorn:
        # Note: We need to perform monkey patching in the worker. If we do it in
        # the master process (gunicorn_config.py), it breaks tons of things
        # including shutdown
        monkey_patch()

        st2auth_config.register_opts()
        capabilities = {
            'name': 'auth',
            'listen_host': cfg.CONF.auth.host,
            'listen_port': cfg.CONF.auth.port,
            'listen_ssl': cfg.CONF.auth.use_ssl,
            'type': 'active'
        }

        # This should be called in gunicorn case because we only want
        # workers to connect to db, rabbbitmq etc. In standalone HTTP
        # server case, this setup would have already occurred.
        common_setup(service='auth', config=st2auth_config, setup_db=True,
                     register_mq_exchanges=False,
                     register_signal_handlers=True,
                     register_internal_trigger_types=False,
                     run_migrations=False,
                     service_registry=True,
                     capabilities=capabilities,
                     config_args=config.get('config_args', None))

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()

    router = Router(debug=cfg.CONF.auth.debug, is_gunicorn=is_gunicorn)

    spec = spec_loader.load_spec('st2common', 'openapi.yaml.j2')
    transforms = {
        '^/auth/v1/': ['/', '/v1/']
    }
    router.add_spec(spec, transforms=transforms)

    app = router.as_wsgi

    # Order is important. Check middleware for detailed explanation.
    app = ErrorHandlingMiddleware(app)
    app = CorsMiddleware(app)
    app = LoggingMiddleware(app, router)
    app = ResponseInstrumentationMiddleware(app, router, service_name='auth')
    app = RequestIDMiddleware(app)
    app = RequestInstrumentationMiddleware(app, router, service_name='auth')

    return app
Пример #4
0
def _setup():
    capabilities = {
        'name': 'auth',
        'listen_host': cfg.CONF.auth.host,
        'listen_port': cfg.CONF.auth.port,
        'listen_ssl': cfg.CONF.auth.use_ssl,
        'type': 'active'
    }
    common_setup(service='auth', config=config, setup_db=True, register_mq_exchanges=False,
                 register_signal_handlers=True, register_internal_trigger_types=False,
                 run_migrations=False, service_registry=True, capabilities=capabilities)

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()
Пример #5
0
def _setup():
    capabilities = {
        'name': 'auth',
        'listen_host': cfg.CONF.auth.host,
        'listen_port': cfg.CONF.auth.port,
        'listen_ssl': cfg.CONF.auth.use_ssl,
        'type': 'active'
    }
    common_setup(service='auth', config=config, setup_db=True, register_mq_exchanges=False,
                 register_signal_handlers=True, register_internal_trigger_types=False,
                 run_migrations=False, service_registry=True, capabilities=capabilities)

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()
Пример #6
0
def _setup():
    capabilities = {
        "name": "auth",
        "listen_host": cfg.CONF.auth.host,
        "listen_port": cfg.CONF.auth.port,
        "listen_ssl": cfg.CONF.auth.use_ssl,
        "type": "active",
    }
    common_setup(
        service="auth",
        config=config,
        setup_db=True,
        register_mq_exchanges=False,
        register_signal_handlers=True,
        register_internal_trigger_types=False,
        run_migrations=False,
        service_registry=True,
        capabilities=capabilities,
    )

    # Additional pre-run time checks
    validate_auth_backend_is_correctly_configured()
Пример #7
0
 def test_validate_auth_backend_is_correctly_configured_success(self):
     result = validate_auth_backend_is_correctly_configured()
     self.assertTrue(result)
Пример #8
0
 def test_validate_auth_backend_is_correctly_configured_success(self):
     result = validate_auth_backend_is_correctly_configured()
     self.assertTrue(result)