DavidPurcell | b25f93d | 2017-01-27 12:46:27 -0500 | [diff] [blame] | 1 | # Copyright 2017 AT&T Corporation. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 16 | import collections |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 17 | import copy |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 18 | import glob |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 19 | import os |
| 20 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 21 | from oslo_log import log as logging |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 22 | from oslo_policy import policy |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 23 | import stevedore |
Felipe Monteiro | 7be94e8 | 2017-07-26 02:17:08 +0100 | [diff] [blame] | 24 | from tempest import config |
Rick Bartra | 503c557 | 2017-03-09 13:49:58 -0500 | [diff] [blame] | 25 | |
Felipe Monteiro | 31e308e | 2018-05-22 12:05:10 -0700 | [diff] [blame] | 26 | from patrole_tempest_plugin.rbac_authority import RbacAuthority |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 27 | from patrole_tempest_plugin import rbac_exceptions |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 28 | |
Felipe Monteiro | 7be94e8 | 2017-07-26 02:17:08 +0100 | [diff] [blame] | 29 | CONF = config.CONF |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 30 | LOG = logging.getLogger(__name__) |
| 31 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 32 | |
Felipe Monteiro | 88a5bab | 2017-08-31 04:00:32 +0100 | [diff] [blame] | 33 | class PolicyAuthority(RbacAuthority): |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 34 | """A class that uses ``oslo.policy`` for validating RBAC.""" |
Lingxian Kong | 27f671f | 2020-12-30 21:23:03 +1300 | [diff] [blame^] | 35 | os_admin = None |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 36 | |
Felipe Monteiro | 0854ded | 2017-05-05 16:30:55 +0100 | [diff] [blame] | 37 | def __init__(self, project_id, user_id, service, extra_target_data=None): |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 38 | """Initialization of Policy Authority class. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 39 | |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 40 | Validates whether a test role can perform a policy action by querying |
| 41 | ``oslo.policy`` with necessary test data. |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 42 | |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 43 | If a policy file does not exist, checks whether the policy file is |
| 44 | registered as a namespace under "oslo.policy.policies". Nova, for |
| 45 | example, doesn't use a policy file by default; its policies are |
| 46 | implemented in code and registered as "nova" under |
| 47 | "oslo.policy.policies". |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 48 | |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 49 | If the policy file is not found in either code or in a policy file, |
| 50 | then an exception is raised. |
| 51 | |
| 52 | Additionally, if a custom policy file exists along with the default |
| 53 | policy in code implementation, the custom policy is prioritized. |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 54 | |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 55 | :param uuid project_id: project_id of object performing API call |
| 56 | :param uuid user_id: user_id of object performing API call |
| 57 | :param string service: service of the policy file |
| 58 | :param dict extra_target_data: dictionary containing additional object |
| 59 | data needed by oslo.policy to validate generic checks |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 60 | |
| 61 | Example: |
| 62 | |
| 63 | .. code-block:: python |
| 64 | |
| 65 | # Below is the default policy implementation in code, defined in |
| 66 | # a service like Nova. |
| 67 | test_policies = [ |
| 68 | policy.DocumentedRuleDefault( |
| 69 | 'service:test_rule', |
| 70 | base.RULE_ADMIN_OR_OWNER, |
| 71 | "This is a description for a test policy", |
| 72 | [ |
| 73 | { |
| 74 | 'method': 'POST', |
| 75 | 'path': '/path/to/test/resource' |
| 76 | } |
| 77 | ]), |
| 78 | 'service:another_test_rule', |
| 79 | base.RULE_ADMIN_OR_OWNER, |
| 80 | "This is a description for another test policy", |
| 81 | [ |
| 82 | { |
| 83 | 'method': 'GET', |
| 84 | 'path': '/path/to/test/resource' |
| 85 | } |
| 86 | ]), |
| 87 | ] |
| 88 | |
| 89 | .. code-block:: yaml |
| 90 | |
| 91 | # Below is the custom override of the default policy in a YAML |
| 92 | # policy file. Note that the default rule is "rule:admin_or_owner" |
| 93 | # and the custom rule is "rule:admin_api". The `PolicyAuthority` |
| 94 | # class will use the "rule:admin_api" definition for this policy |
| 95 | # action. |
| 96 | "service:test_rule" : "rule:admin_api" |
| 97 | |
| 98 | # Note below that no override is provided for |
| 99 | # "service:another_test_rule", which means that the default policy |
| 100 | # rule is used: "rule:admin_or_owner". |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 101 | """ |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 102 | |
Felipe Monteiro | 0854ded | 2017-05-05 16:30:55 +0100 | [diff] [blame] | 103 | if extra_target_data is None: |
| 104 | extra_target_data = {} |
| 105 | |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 106 | self.service = self.validate_service(service) |
Rick Bartra | 503c557 | 2017-03-09 13:49:58 -0500 | [diff] [blame] | 107 | |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 108 | # Prioritize dynamically searching for policy files over relying on |
| 109 | # deprecated service-specific policy file locations. |
Felipe Monteiro | f6eb862 | 2017-08-06 06:08:02 +0100 | [diff] [blame] | 110 | if CONF.patrole.custom_policy_files: |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 111 | self.discover_policy_files() |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 112 | |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 113 | self.rules = self.get_rules() |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 114 | self.project_id = project_id |
Felipe Monteiro | 889264e | 2017-03-01 17:19:35 -0500 | [diff] [blame] | 115 | self.user_id = user_id |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 116 | self.extra_target_data = extra_target_data |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 117 | |
Felipe Monteiro | d9607c4 | 2017-06-12 19:28:45 +0100 | [diff] [blame] | 118 | @classmethod |
| 119 | def validate_service(cls, service): |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 120 | """Validate whether the service passed to ``__init__`` exists.""" |
Felipe Monteiro | d9607c4 | 2017-06-12 19:28:45 +0100 | [diff] [blame] | 121 | service = service.lower().strip() if service else None |
| 122 | |
| 123 | # Cache the list of available services in memory to avoid needlessly |
| 124 | # doing an API call every time. |
Lingxian Kong | 27f671f | 2020-12-30 21:23:03 +1300 | [diff] [blame^] | 125 | if not hasattr(cls, 'available_services') and cls.os_admin: |
| 126 | services_client = (cls.os_admin.identity_services_v3_client |
Felipe Monteiro | 7be94e8 | 2017-07-26 02:17:08 +0100 | [diff] [blame] | 127 | if CONF.identity_feature_enabled.api_v3 |
Lingxian Kong | 27f671f | 2020-12-30 21:23:03 +1300 | [diff] [blame^] | 128 | else cls.os_admin.identity_services_client) |
Felipe Monteiro | 7be94e8 | 2017-07-26 02:17:08 +0100 | [diff] [blame] | 129 | services = services_client.list_services()['services'] |
Felipe Monteiro | d9607c4 | 2017-06-12 19:28:45 +0100 | [diff] [blame] | 130 | cls.available_services = [s['name'] for s in services] |
| 131 | |
| 132 | if not service or service not in cls.available_services: |
| 133 | LOG.debug("%s is NOT a valid service.", service) |
Felipe Monteiro | 51299a1 | 2018-06-28 20:03:27 -0400 | [diff] [blame] | 134 | raise rbac_exceptions.RbacInvalidServiceException( |
Felipe Monteiro | d9607c4 | 2017-06-12 19:28:45 +0100 | [diff] [blame] | 135 | "%s is NOT a valid service." % service) |
| 136 | |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 137 | return service |
| 138 | |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 139 | @classmethod |
| 140 | def discover_policy_files(cls): |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 141 | """Dynamically discover the policy file for each service in |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 142 | ``cls.available_services``. Pick all candidate paths found |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 143 | out of the potential paths in ``[patrole] custom_policy_files``. |
| 144 | """ |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 145 | if not hasattr(cls, 'policy_files'): |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 146 | cls.policy_files = collections.defaultdict(list) |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 147 | for service in cls.available_services: |
Felipe Monteiro | f6eb862 | 2017-08-06 06:08:02 +0100 | [diff] [blame] | 148 | for candidate_path in CONF.patrole.custom_policy_files: |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 149 | path = candidate_path % service |
| 150 | for filename in glob.iglob(path): |
| 151 | if os.path.isfile(filename): |
| 152 | cls.policy_files[service].append(filename) |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 153 | |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 154 | def allowed(self, rule_name, roles): |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 155 | """Checks if a given rule in a policy is allowed with given role. |
| 156 | |
Felipe Monteiro | 778b780 | 2018-05-31 19:52:58 -0400 | [diff] [blame] | 157 | :param string rule_name: Policy name to pass to``oslo.policy``. |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 158 | :param List[string] roles: List of roles to validate for authorization. |
Felipe Monteiro | 778b780 | 2018-05-31 19:52:58 -0400 | [diff] [blame] | 159 | :raises RbacParsingException: If ``rule_name`` does not exist in the |
Felipe Monteiro | 4ef7e53 | 2018-03-11 07:17:11 -0400 | [diff] [blame] | 160 | cloud (in policy file or among registered in-code policy defaults). |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 161 | """ |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 162 | is_admin_context = self._is_admin_context(roles) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 163 | is_allowed = self._allowed( |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 164 | access=self._get_access_token(roles), |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 165 | apply_rule=rule_name, |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 166 | is_admin=is_admin_context) |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 167 | return is_allowed |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 168 | |
Sergey Vilgelm | 55e5dfe | 2019-01-07 11:59:41 -0600 | [diff] [blame] | 169 | def _handle_deprecated_rule(self, default): |
| 170 | deprecated_rule = default.deprecated_rule |
| 171 | deprecated_msg = ( |
| 172 | 'Policy "%(old_name)s":"%(old_check_str)s" was deprecated in ' |
| 173 | '%(release)s in favor of "%(name)s":"%(check_str)s". Reason: ' |
| 174 | '%(reason)s. Either ensure your deployment is ready for the new ' |
| 175 | 'default or copy/paste the deprecated policy into your policy ' |
| 176 | 'file and maintain it manually.' % { |
| 177 | 'old_name': deprecated_rule.name, |
| 178 | 'old_check_str': deprecated_rule.check_str, |
| 179 | 'release': default.deprecated_since, |
| 180 | 'name': default.name, |
| 181 | 'check_str': default.check_str, |
| 182 | 'reason': default.deprecated_reason |
| 183 | } |
| 184 | ) |
| 185 | LOG.warn(deprecated_msg) |
Ghanshyam Mann | ee53f84 | 2020-04-16 11:52:57 -0500 | [diff] [blame] | 186 | default.check = policy.OrCheck( |
| 187 | [policy._parser.parse_rule(cs) for cs in |
| 188 | [default.check_str, |
| 189 | deprecated_rule.check_str]]) |
Sergey Vilgelm | 55e5dfe | 2019-01-07 11:59:41 -0600 | [diff] [blame] | 190 | |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 191 | def get_rules(self): |
| 192 | rules = policy.Rules() |
Felipe Monteiro | 3ab2c35 | 2017-07-05 22:25:34 +0100 | [diff] [blame] | 193 | # Check whether policy file exists and attempt to read it. |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 194 | for path in self.policy_files[self.service]: |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 195 | try: |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 196 | with open(path, 'r') as fp: |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 197 | for k, v in policy.Rules.load(fp.read()).items(): |
| 198 | if k not in rules: |
| 199 | rules[k] = v |
| 200 | # If the policy name and rule are the same, no |
| 201 | # ambiguity, so no reason to warn. |
| 202 | elif str(v) != str(rules[k]): |
| 203 | msg = ("The same policy name: %s was found in " |
| 204 | "multiple policies files for service %s. " |
| 205 | "This can lead to policy rule ambiguity. " |
| 206 | "Using rule: %s; Rule from file: %s") |
| 207 | LOG.warning(msg, k, self.service, rules[k], v) |
| 208 | except (ValueError, IOError): |
| 209 | LOG.warning("Failed to read policy file '%s' for service %s.", |
| 210 | path, self.service) |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 211 | |
| 212 | # Check whether policy actions are defined in code. Nova and Keystone, |
| 213 | # for example, define their default policy actions in code. |
| 214 | mgr = stevedore.named.NamedExtensionManager( |
| 215 | 'oslo.policy.policies', |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 216 | names=[self.service], |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 217 | invoke_on_load=True, |
| 218 | warn_on_missing_entrypoint=False) |
| 219 | |
| 220 | if mgr: |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 221 | policy_generator = {plc.name: plc.obj for plc in mgr} |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 222 | if self.service in policy_generator: |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 223 | for rule in policy_generator[self.service]: |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 224 | if rule.name not in rules: |
Sergey Vilgelm | 55e5dfe | 2019-01-07 11:59:41 -0600 | [diff] [blame] | 225 | if CONF.patrole.validate_deprecated_rules: |
| 226 | # NOTE (sergey.vilgelm): |
| 227 | # The `DocumentedRuleDefault` object has no |
| 228 | # `deprecated_rule` attribute in Pike |
| 229 | if getattr(rule, 'deprecated_rule', False): |
Ghanshyam Mann | ee53f84 | 2020-04-16 11:52:57 -0500 | [diff] [blame] | 230 | self._handle_deprecated_rule(rule) |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 231 | rules[rule.name] = rule.check |
| 232 | elif str(rule.check) != str(rules[rule.name]): |
| 233 | msg = ("The same policy name: %s was found in the " |
| 234 | "policies files and in the code for service " |
| 235 | "%s. This can lead to policy rule ambiguity. " |
| 236 | "Using rule: %s; Rule from code: %s") |
| 237 | LOG.warning(msg, rule.name, self.service, |
| 238 | rules[rule.name], rule.check) |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 239 | |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 240 | if not rules: |
| 241 | msg = ( |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 242 | 'Policy files for {0} service were not found among the ' |
Felipe Monteiro | 4ef7e53 | 2018-03-11 07:17:11 -0400 | [diff] [blame] | 243 | 'registered in-code policies or in any of the possible policy ' |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 244 | 'files: {1}.'.format( |
| 245 | self.service, |
| 246 | [loc % self.service |
| 247 | for loc in CONF.patrole.custom_policy_files])) |
| 248 | raise rbac_exceptions.RbacParsingException(msg) |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 249 | |
Sergey Vilgelm | ef7047d | 2018-09-11 14:48:55 -0500 | [diff] [blame] | 250 | return rules |
Felipe Monteiro | ae2ebab | 2017-03-23 22:49:06 +0000 | [diff] [blame] | 251 | |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 252 | def _is_admin_context(self, roles): |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 253 | """Checks whether a role has admin context. |
| 254 | |
| 255 | If context_is_admin is contained in the policy file, then checks |
| 256 | whether the given role is contained in context_is_admin. If it is not |
| 257 | in the policy file, then default to context_is_admin: admin. |
| 258 | """ |
Manik Bindlish | 0868ded | 2018-12-20 08:44:50 +0000 | [diff] [blame] | 259 | if 'context_is_admin' in self.rules: |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 260 | return self._allowed( |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 261 | access=self._get_access_token(roles), |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 262 | apply_rule='context_is_admin') |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 263 | return CONF.identity.admin_role in roles |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 264 | |
Mykola Yakovliev | e0f3550 | 2018-09-26 18:26:57 -0500 | [diff] [blame] | 265 | def _get_access_token(self, roles): |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 266 | access_token = { |
| 267 | "token": { |
Sergey Vilgelm | 55e5dfe | 2019-01-07 11:59:41 -0600 | [diff] [blame] | 268 | "roles": [{'name': r} for r in roles], |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 269 | "project_id": self.project_id, |
| 270 | "tenant_id": self.project_id, |
Felipe Monteiro | 889264e | 2017-03-01 17:19:35 -0500 | [diff] [blame] | 271 | "user_id": self.user_id |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 272 | } |
| 273 | } |
| 274 | return access_token |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 275 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 276 | def _allowed(self, access, apply_rule, is_admin=False): |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 277 | """Checks if a given rule in a policy is allowed with given ``access``. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 278 | |
Felipe Monteiro | f2b58d7 | 2017-08-31 22:40:36 +0100 | [diff] [blame] | 279 | :param dict access: Dictionary from ``_get_access_token``. |
| 280 | :param string apply_rule: Rule to be checked using ``oslo.policy``. |
| 281 | :param bool is_admin: Whether admin context is used. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 282 | """ |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 283 | access_data = copy.copy(access['token']) |
| 284 | access_data['roles'] = [role['name'] for role in access_data['roles']] |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 285 | access_data['is_admin'] = is_admin |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 286 | # TODO(felipemonteiro): Dynamically calculate is_admin_project rather |
| 287 | # than hard-coding it to True. is_admin_project cannot be determined |
Felipe Monteiro | 94fc2ca | 2018-05-22 12:08:43 -0700 | [diff] [blame] | 288 | # from the role, but rather from project and domain names. For more |
| 289 | # information, see: |
Luigi Toscano | 6da06ed | 2019-01-07 17:50:41 +0100 | [diff] [blame] | 290 | # https://git.openstack.org/cgit/openstack/keystone/tree/keystone/token/providers/common.py?id=37ce5417418f8acbd27f3dacb70c605b0fe48301#n150 |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 291 | access_data['is_admin_project'] = True |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 292 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 293 | class Object(object): |
| 294 | pass |
| 295 | o = Object() |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 296 | o.rules = self.rules |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 297 | |
Felipe Monteiro | 9fc782e | 2017-02-01 15:38:46 -0500 | [diff] [blame] | 298 | target = {"project_id": access_data['project_id'], |
| 299 | "tenant_id": access_data['project_id'], |
Felipe Monteiro | 889264e | 2017-03-01 17:19:35 -0500 | [diff] [blame] | 300 | "network:tenant_id": access_data['project_id'], |
| 301 | "user_id": access_data['user_id']} |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 302 | if self.extra_target_data: |
| 303 | target.update(self.extra_target_data) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 304 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 305 | result = self._try_rule(apply_rule, target, access_data, o) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 306 | return result |
| 307 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame] | 308 | def _try_rule(self, apply_rule, target, access_data, o): |
Samantha Blanco | 0d88008 | 2017-03-23 18:14:37 -0400 | [diff] [blame] | 309 | if apply_rule not in self.rules: |
Sergey Vilgelm | 062fb15 | 2018-09-06 20:51:57 -0500 | [diff] [blame] | 310 | message = ('Policy action "{0}" not found in policy files: ' |
| 311 | '{1} or among registered policy in code defaults for ' |
| 312 | '{2} service.').format(apply_rule, |
| 313 | self.policy_files[self.service], |
| 314 | self.service) |
Felipe Monteiro | 48c913d | 2017-03-15 12:07:48 -0400 | [diff] [blame] | 315 | LOG.debug(message) |
| 316 | raise rbac_exceptions.RbacParsingException(message) |
Samantha Blanco | 0d88008 | 2017-03-23 18:14:37 -0400 | [diff] [blame] | 317 | else: |
| 318 | rule = self.rules[apply_rule] |
| 319 | return rule(target, access_data, o) |