-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Expand file tree
/
Copy path_params.py
More file actions
354 lines (301 loc) · 25.4 KB
/
_params.py
File metadata and controls
354 lines (301 loc) · 25.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
# --------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# --------------------------------------------------------------------------------------------
# pylint: disable=line-too-long
from knack.arguments import CLIArgumentType
from azure.cli.core.commands.parameters import get_enum_type, get_three_state_flag
from azure.cli.core.commands.validators import validate_file_or_dict
# from azure.cli.core.profiles import ResourceType
from azure.cli.command_modules.role._completers import get_role_definition_name_completion_list
from azure.cli.command_modules.role._validators import validate_group, validate_cert, VARIANT_GROUP_ID_ARGS
name_arg_type = CLIArgumentType(options_list=('--name', '-n'), metavar='NAME')
JSON_PROPERTY_HELP = "Should be JSON file path or in-line JSON string. See examples for details"
# pylint: disable=too-many-statements
def load_arguments(self, _):
with self.argument_context('ad') as c:
c.ignore('_subscription') # hide global subscription param
c.argument('owner_object_id', help="owner's object id")
c.argument('show_mine', action='store_true', help='list entities owned by the current user')
c.argument('include_all', options_list='--all', action='store_true',
help='list all entities, expect long delay if under a big organization')
with self.argument_context('ad app') as c:
c.argument('app_id', help='application id')
c.argument('application_object_id', options_list=('--object-id',))
c.argument('display_name', help='the display name of the application')
c.argument('identifier', options_list=['--id'], help='identifier uri, application id, or object id')
c.argument('identifier_uris', nargs='+',
help='space-separated values. '
'Also known as App ID URI, this value is set when an application is used as a resource app. '
'The identifierUris acts as the prefix for the scopes you\'ll reference in your API\'s code, '
'and it must be globally unique. You can use the default value provided, which is in the '
'form api://<application-client-id>, or specify a more readable URI like '
'https://contoso.com/api.')
c.argument('is_fallback_public_client', arg_type=get_three_state_flag(),
help="Specifies the fallback application type as public client, such as an installed application "
"running on a mobile device. The default value is false which means the fallback application "
"type is confidential client such as a web app.")
c.argument('sign_in_audience',
arg_type=get_enum_type(['AzureADMyOrg', 'AzureADMultipleOrgs', 'AzureADandPersonalMicrosoftAccount',
'PersonalMicrosoftAccount']),
help='Specifies the Microsoft accounts that are supported for the current application.')
# web
c.argument('web_home_page_url', arg_group='web', help='Home page or landing page of the application.')
c.argument('web_redirect_uris', arg_group='web', nargs='+',
help='Space-separated values. '
'Specifies the URLs where user tokens are sent for sign-in, or the redirect URIs '
'where OAuth 2.0 authorization codes and access tokens are sent.')
c.argument('enable_id_token_issuance', arg_group='web',
arg_type=get_three_state_flag(),
help='Specifies whether this web application can request an ID token using the OAuth 2.0 '
'implicit flow.')
c.argument('enable_access_token_issuance', arg_group='web',
arg_type=get_three_state_flag(),
help='Specifies whether this web application can request an access token using the OAuth 2.0 '
'implicit flow.')
# publicClient
c.argument('public_client_redirect_uris', arg_group='publicClient', nargs='+',
help='Space-separated values. '
'Specifies the URLs where user tokens are sent for sign-in, or the redirect URIs '
'where OAuth 2.0 authorization codes and access tokens are sent.')
# keyCredential
c.argument('start_date', arg_group='keyCredential',
help="Date or datetime at which credentials become valid (e.g. '2017-01-01T01:00:00+00:00' or "
"'2017-01-01'). Default value is current time")
c.argument('end_date', arg_group='keyCredential',
help="Date or datetime after which credentials expire (e.g. '2017-12-31T11:59:59+00:00' or "
"'2017-12-31'). Default value is one year after current time")
c.argument('key_value', arg_group='keyCredential',
help='the value for the key credentials associated with the application')
c.argument('key_type', arg_group='keyCredential',
help='the type of the key credentials associated with the application',
arg_type=get_enum_type(['AsymmetricX509Cert', 'Password', 'Symmetric'],
default='AsymmetricX509Cert'))
c.argument('key_usage', arg_group='keyCredential',
help='the usage of the key credentials associated with the application.',
arg_type=get_enum_type(['Sign', 'Verify'], default='Verify'))
c.argument('key_display_name', arg_group='keyCredential',
help="Friendly name for the key.")
# JSON properties
c.argument('required_resource_accesses', arg_group='JSON property', type=validate_file_or_dict,
help="Specifies the resources that the application needs to access. This property also specifies "
"the set of delegated permissions and application roles that it needs for each of those "
"resources. This configuration of access to the required resources drives the consent "
"experience. " + JSON_PROPERTY_HELP)
c.argument('app_roles', arg_group='JSON property', type=validate_file_or_dict,
help="The collection of roles assigned to the application. With app role assignments, these roles "
"can be assigned to users, groups, or service principals associated with other applications. " +
JSON_PROPERTY_HELP)
c.argument('optional_claims', arg_group='JSON property', type=validate_file_or_dict,
help="Application developers can configure optional claims in their Azure AD applications to "
"specify the claims that are sent to their application by the Microsoft security token "
"service. For more information, see https://docs.microsoft.com/azure/active-directory/develop"
"/active-directory-optional-claims. " + JSON_PROPERTY_HELP)
with self.argument_context('ad app owner list') as c:
c.argument('identifier', options_list=['--id'], help='identifier uri, application id, or object id of the application')
with self.argument_context('ad app permission') as c:
# https://docs.microsoft.com/en-us/graph/api/resources/requiredresourceaccess
c.argument('api',
help='requiredResourceAccess.resourceAppId - '
'The unique identifier for the resource that the application requires access to. '
'This should be equal to the appId declared on the target resource application.')
# https://docs.microsoft.com/en-us/graph/api/resources/resourceaccess
c.argument('api_permissions', nargs='+',
help='Space-separated list of {id}={type}. '
"{id} is resourceAccess.id - The unique identifier for one of the oauth2PermissionScopes or "
'appRole instances that the resource application exposes. '
"{type} is resourceAccess.type - Specifies whether the id property references an "
'oauth2PermissionScopes or an appRole. The possible values are: Scope (for OAuth 2.0 '
'permission scopes) or Role (for app roles).')
with self.argument_context('ad app permission grant') as c:
c.argument('identifier', options_list=['--id, --client-id'],
help='The id of the client service principal for the application which is authorized to act on '
'behalf of a signed-in user when accessing an API.')
c.argument('scope', nargs='*',
help='A space-separated list of the claim values for delegated permissions which should be included '
'in access tokens for the resource application (the API). '
'For example, openid User.Read GroupMember.Read.All. '
'Each claim value should match the value field of one of the delegated permissions defined by '
'the API, listed in the oauth2PermissionScopes property of the resource service principal.')
c.argument('consent_type', arg_type=get_enum_type(["AllPrincipals", "Principal"]), default="AllPrincipals",
help="Indicates whether authorization is granted for the client application to impersonate all "
"users or only a specific user. 'AllPrincipals' indicates authorization to impersonate all "
"users. 'Principal' indicates authorization to impersonate a specific user. Consent on behalf "
"of all users can be granted by an administrator. Non-admin users may be authorized to consent "
"on behalf of themselves in some cases, for some delegated permissions.")
c.argument('principal_id',
help='The id of the user on behalf of whom the client is authorized to access the resource, '
"when consentType is 'Principal'. If consentType is 'AllPrincipals' this value is null. "
"Required when consentType is 'Principal'.")
c.argument('api', options_list=['--api, --resource-id'],
help='The id of the resource service principal to which access is authorized. This identifies the '
'API which the client is authorized to attempt to call on behalf of a signed-in user.')
with self.argument_context('ad app permission list-grants') as c:
c.argument('show_resource_name', options_list=['--show-resource-name', '-r'],
arg_type=get_three_state_flag(), help="show resource's display name")
with self.argument_context('ad app permission delete') as c:
# `=<type>` is not needed.
c.argument('api_permissions', nargs='+', help='Specify `ResourceAccess.id` - The unique identifier for one of the OAuth2Permission or AppRole instances that the resource application exposes. Space-separated list of `<resource-access-id>`.')
with self.argument_context('ad app permission list') as c:
c.argument('identifier', options_list=['--id'], help='identifier uri, application id, or object id of the associated application')
with self.argument_context('ad sp') as c:
c.argument('identifier', options_list=['--id'], help='service principal name, or object id')
with self.argument_context('ad sp create') as c:
c.argument('identifier', options_list=['--id'], help='identifier uri, application id, or object id of the associated application')
with self.argument_context('ad sp create-for-rbac') as c:
c.argument('display_name', options_list=['--display-name', '--name', '-n'],
help='Display name of the service principal. If not present, default to azure-cli-%Y-%m-%d-%H-%M-%S '
'where the suffix is the time of creation.')
c.argument('scopes', nargs='+',
help="Space-separated list of scopes the service principal's role assignment applies to. e.g., "
"subscriptions/0b1f6471-1bf0-4dda-aec3-111122223333/resourceGroups/myGroup, "
"/subscriptions/0b1f6471-1bf0-4dda-aec3-111122223333/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM")
c.argument('role', completer=get_role_definition_name_completion_list,
help='Role of the service principal.')
c.argument('show_auth_for_sdk', options_list='--sdk-auth', deprecate_info=c.deprecate(target='--sdk-auth'),
help='output result in compatible with Azure SDK auth file', arg_type=get_three_state_flag())
with self.argument_context('ad sp owner list') as c:
c.argument('identifier', options_list=['--id'], help='service principal name, or object id or the service principal')
for item in ['ad app credential reset', 'ad sp credential reset', 'ad sp create-for-rbac']:
with self.argument_context(item) as c:
# general credential arguments
c.argument('years', type=int, default=None, arg_group='Credential',
help='Number of years for which the credentials will be valid. Default: 1 year')
c.argument('append', action='store_true', arg_group='Credential',
help='Append the new credential instead of overwriting.')
c.argument('end_date', default=None, arg_group='Credential',
help="Finer grain of expiry time if '--years' is insufficient, e.g. '2020-12-31T11:59:59+00:00' "
"or '2299-12-31'")
# keyCredential arguments
c.argument('cert', arg_group='keyCredential', validator=validate_cert,
help='Certificate to use for credentials. When used with `--keyvault,`, indicates the name of the '
'cert to use or create. Otherwise, supply a PEM or DER formatted public certificate string. '
'Use `@{path}` to load from a file. Do not include private key info.')
c.argument('create_cert', arg_group='keyCredential', action='store_true',
help='Create a self-signed certificate to use for the credential. Only the current OS user has '
'read/write permission to this certificate. Use with `--keyvault` to create the certificate in '
'Key Vault. Otherwise, a certificate will be created locally.')
c.argument('keyvault', arg_group='keyCredential',
help='Name or ID of a KeyVault to use for creating or retrieving certificates.')
# --display-name in `ad sp create-for-rbac` is for the sp, not credential, so we only apply it to `credential reset`
# commands.
for item in ['ad app credential reset', 'ad sp credential reset']:
with self.argument_context(item) as c:
c.argument('display_name', arg_group='Credential',
help="Friendly name for the credential.")
for item in ['ad app credential list', 'ad app credential delete',
'ad sp credential list', 'ad sp credential delete']:
with self.argument_context(item) as c:
c.argument('key_id', help='credential key id')
c.argument('cert', action='store_true', help='Operate on certificate credentials')
with self.argument_context('ad app federated-credential') as c:
c.argument('app_identifier', options_list=['--id'],
help="Application's appId, identifierUri, or id (formerly known as objectId)")
c.argument('federated_identity_credential_id_or_name', options_list=['--federated-credential-id'],
help='ID or name of the federated identity credential')
c.argument('parameters', type=validate_file_or_dict,
help='Parameters for creating federated identity credential. ' + JSON_PROPERTY_HELP)
with self.argument_context('ad') as c:
c.argument('display_name', help='object\'s display name or its prefix')
c.argument('identifier_uri', help='graph application identifier, must be in uri format')
c.argument('spn', help='service principal name')
c.argument('upn', help='user principal name, e.g. john.doe@contoso.com')
c.argument('query_filter', options_list=['--filter'], help='OData filter, e.g. --filter "displayname eq \'test\' and servicePrincipalType eq \'Application\'"')
with self.argument_context('ad user') as c:
c.argument('mail_nickname', help='mail alias. Defaults to user principal name')
c.argument('force_change_password_next_login', arg_type=get_three_state_flag(), help='Require the user to change their password the next time they log in. Only valid when --password is specified')
c.argument('account_enabled', arg_type=get_three_state_flag(), help='enable the user account')
c.argument('password', help='user password')
c.argument('upn_or_object_id', options_list=['--id'],
help='The object ID or principal name of the user for which to get information')
c.argument('force_change_password_next_sign_in', arg_type=get_three_state_flag(),
help='If the user must change her password on the next login.')
with self.argument_context('ad user create') as c:
c.argument('immutable_id', help="This must be specified if you are using a federated domain for "
"the user's userPrincipalName (UPN) property when creating a new user account."
" It is used to associate an on-premises Active Directory user account with "
"their Azure AD user object.")
c.argument('user_principal_name',
help="The user principal name (someuser@contoso.com). It must contain one of the verified domains "
"for the tenant.")
with self.argument_context('ad user get-member-groups') as c:
c.argument('security_enabled_only', arg_type=get_three_state_flag(),
help='true to specify that only security groups that the entity is a member of should be returned; '
'false to specify that all groups and directory roles that the entity is a member of should be '
'returned.')
group_help_msg = "group's object id or display name(prefix also works if there is a unique match)"
with self.argument_context('ad group') as c:
for arg in VARIANT_GROUP_ID_ARGS:
c.argument(arg, options_list=['--group', '-g'], validator=validate_group, help=group_help_msg)
with self.argument_context('ad group create') as c:
c.argument('mail_nickname', help='Mail nickname')
c.argument('force', arg_type=get_three_state_flag(),
help='always create a new group instead of updating the one with same display and mail nickname')
c.argument('description', help='Group description')
with self.argument_context('ad group show') as c:
c.extra('cmd')
member_id_help_msg = 'The object ID of the contact, group, user, or service principal'
with self.argument_context('ad group get-member-groups') as c:
c.argument('security_enabled_only', arg_type=get_three_state_flag(),
help='true to specify that only security groups that the entity is a member of should be returned; '
'false to specify that all groups and directory roles that the entity is a member of should be '
'returned.')
c.extra('cmd')
# with self.argument_context('ad group member add') as c:
# c.argument('url', options_list='--member-id', validator=validate_member_id, help=member_id_help_msg)
for item in ['member add', 'member check', 'member list', 'member remove', 'delete']:
with self.argument_context('ad group {}'.format(item)) as c:
c.extra('cmd')
with self.argument_context('ad group member') as c:
c.argument('member_object_id', options_list='--member-id', help=member_id_help_msg)
with self.argument_context('ad signed-in-user') as c:
c.argument('object_type', options_list=['--type', '-t'], help='object type filter, e.g. "application", "servicePrincipal" "group", etc')
with self.argument_context('role') as c:
c.argument('scope', help='scope at which the role assignment or definition applies to, e.g., /subscriptions/0b1f6471-1bf0-4dda-aec3-111122223333, /subscriptions/0b1f6471-1bf0-4dda-aec3-111122223333/resourceGroups/myGroup, or /subscriptions/0b1f6471-1bf0-4dda-aec3-111122223333/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM')
c.argument('resource_group_name', options_list=['--resource-group', '-g'], help='use it only if the role or assignment was added at the level of a resource group')
with self.argument_context('role assignment') as c:
c.argument('role', help='role name or id', completer=get_role_definition_name_completion_list)
c.argument('show_all', options_list=['--all'], action='store_true', help='show all assignments under the current subscription')
c.argument('include_inherited', action='store_true', help='include assignments applied on parent scopes')
c.argument('can_delegate', action='store_true', help='when set, the assignee will be able to create further role assignments to the same role')
c.argument('assignee', help='represent a user, group, or service principal. supported format: object id, user sign-in name, or service principal name')
c.argument('assignee_object_id', help="Use this parameter instead of '--assignee' to bypass Graph API invocation in case of insufficient privileges. "
"This parameter only works with object ids for users, groups, service principals, and "
"managed identities. For managed identities use the principal id. For service principals, "
"use the object id and not the app id.")
c.argument('ids', nargs='+', help='space-separated role assignment ids')
c.argument('include_classic_administrators', arg_type=get_three_state_flag(), help='list default role assignments for subscription classic administrators, aka co-admins')
c.argument('description', is_preview=True, min_api='2020-04-01-preview', help='Description of role assignment.')
c.argument('condition', is_preview=True, min_api='2020-04-01-preview', help='Condition under which the user can be granted permission.')
c.argument('condition_version', is_preview=True, min_api='2020-04-01-preview', help='Version of the condition syntax. If --condition is specified without --condition-version, default to 2.0.')
c.argument('assignment_name', name_arg_type,
help='A GUID for the role assignment. It must be unique and different for each role assignment. If omitted, a new GUID is generetd.')
time_help = ('The {} of the query in the format of %Y-%m-%dT%H:%M:%SZ, e.g. 2000-12-31T12:59:59Z. Defaults to {}')
with self.argument_context('role assignment list-changelogs') as c:
c.argument('start_time', help=time_help.format('start time', '1 Hour prior to the current time'))
c.argument('end_time', help=time_help.format('end time', 'the current time'))
with self.argument_context('role assignment create') as c:
# PrincipalType = self.get_models('PrincipalType', resource_type=ResourceType.MGMT_AUTHORIZATION)
# A temporary fix for https://github.com/Azure/azure-cli/issues/11594
# As only 'User', 'Group' or 'ServicePrincipal' are allowed values, the REST spec contains invalid values
# (like MSI) which are used only internally by the service. So hide them.
# https://github.com/Azure/azure-rest-api-specs/blob/962013a1cf9bf5b87e3aad75a14c7dd620acda62/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-04-01-preview/authorization-RoleAssignmentsCalls.json#L508-L522
from enum import Enum
class PrincipalType(str, Enum):
user = "User"
group = "Group"
service_principal = "ServicePrincipal"
foreign_group = "ForeignGroup"
c.argument('assignee_principal_type', min_api='2018-09-01-preview', arg_type=get_enum_type(PrincipalType),
help='use with --assignee-object-id to avoid errors caused by propagation latency in AAD Graph')
with self.argument_context('role assignment update') as c:
c.argument('role_assignment',
help='Description of an existing role assignment as JSON, or a path to a file containing a '
'JSON description.')
with self.argument_context('role assignment delete') as c:
c.argument('yes', options_list=['--yes', '-y'], action='store_true', help='Continue to delete all assignments under the subscription')
with self.argument_context('role definition') as c:
c.argument('role_definition_id', options_list=['--name', '-n'], help='the role definition name')
c.argument('custom_role_only', arg_type=get_three_state_flag(), help='custom roles only(vs. build-in ones)')
c.argument('role_definition', help="json formatted content which defines the new role.")
c.argument('name', arg_type=name_arg_type, completer=get_role_definition_name_completion_list, help="the role's name")