DavidPurcell | b25f93d | 2017-01-27 12:46:27 -0500 | [diff] [blame] | 1 | # Copyright 2017 AT&T Corporation. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 16 | import logging |
| 17 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 18 | from tempest import config |
| 19 | from tempest.lib import exceptions |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 20 | from tempest import test |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 21 | |
| 22 | from patrole_tempest_plugin import rbac_auth |
| 23 | from patrole_tempest_plugin import rbac_exceptions |
| 24 | |
| 25 | CONF = config.CONF |
| 26 | LOG = logging.getLogger(__name__) |
| 27 | |
| 28 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 29 | def action(service, rule): |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 30 | def decorator(func): |
| 31 | def wrapper(*args, **kwargs): |
Felipe Monteiro | cbd0617 | 2017-01-24 13:49:16 -0500 | [diff] [blame] | 32 | try: |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 33 | caller_ref = None |
| 34 | if args and isinstance(args[0], test.BaseTestCase): |
| 35 | caller_ref = args[0] |
| 36 | tenant_id = caller_ref.auth_provider.credentials.tenant_id |
| 37 | user_id = caller_ref.auth_provider.credentials.user_id |
| 38 | except AttributeError as e: |
Felipe Monteiro | 889264e | 2017-03-01 17:19:35 -0500 | [diff] [blame] | 39 | msg = ("{0}: tenant_id/user_id not found in " |
Felipe Monteiro | cbd0617 | 2017-01-24 13:49:16 -0500 | [diff] [blame] | 40 | "cls.auth_provider.credentials".format(e)) |
| 41 | LOG.error(msg) |
| 42 | raise rbac_exceptions.RbacResourceSetupFailed(msg) |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 43 | |
Felipe Monteiro | 889264e | 2017-03-01 17:19:35 -0500 | [diff] [blame] | 44 | authority = rbac_auth.RbacAuthority(tenant_id, user_id, service) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 45 | allowed = authority.get_permission(rule, CONF.rbac.rbac_test_role) |
| 46 | |
| 47 | try: |
| 48 | func(*args) |
Rick Bartra | 503c557 | 2017-03-09 13:49:58 -0500 | [diff] [blame] | 49 | except rbac_exceptions.RbacInvalidService as e: |
Felipe Monteiro | 48c913d | 2017-03-15 12:07:48 -0400 | [diff] [blame] | 50 | msg = ("%s is not a valid service." % service) |
| 51 | LOG.error(msg) |
| 52 | raise exceptions.NotFound( |
| 53 | "%s RbacInvalidService was: %s" % |
| 54 | (msg, e)) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 55 | except exceptions.Forbidden as e: |
| 56 | if allowed: |
| 57 | msg = ("Role %s was not allowed to perform %s." % |
| 58 | (CONF.rbac.rbac_test_role, rule)) |
| 59 | LOG.error(msg) |
| 60 | raise exceptions.Forbidden( |
| 61 | "%s exception was: %s" % |
| 62 | (msg, e)) |
| 63 | except rbac_exceptions.RbacActionFailed as e: |
| 64 | if allowed: |
| 65 | msg = ("Role %s was not allowed to perform %s." % |
| 66 | (CONF.rbac.rbac_test_role, rule)) |
| 67 | LOG.error(msg) |
| 68 | raise exceptions.Forbidden( |
| 69 | "%s RbacActionFailed was: %s" % |
| 70 | (msg, e)) |
| 71 | else: |
| 72 | if not allowed: |
| 73 | LOG.error("Role %s was allowed to perform %s" % |
| 74 | (CONF.rbac.rbac_test_role, rule)) |
| 75 | raise rbac_exceptions.RbacOverPermission( |
| 76 | "OverPermission: Role %s was allowed to perform %s" % |
| 77 | (CONF.rbac.rbac_test_role, rule)) |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 78 | finally: |
| 79 | caller_ref.rbac_utils.switch_role(caller_ref, |
| 80 | switchToRbacRole=False) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 81 | return wrapper |
| 82 | return decorator |