DavidPurcell | b25f93d | 2017-01-27 12:46:27 -0500 | [diff] [blame] | 1 | # Copyright 2017 AT&T Corporation. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 16 | import logging |
Felipe Monteiro | 8eda8cc | 2017-03-22 14:15:14 +0000 | [diff] [blame] | 17 | import sys |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 18 | import testtools |
Felipe Monteiro | 8eda8cc | 2017-03-22 14:15:14 +0000 | [diff] [blame] | 19 | |
| 20 | import six |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 21 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 22 | from tempest import config |
| 23 | from tempest.lib import exceptions |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 24 | from tempest import test |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 25 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 26 | from patrole_tempest_plugin import rbac_exceptions |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 27 | from patrole_tempest_plugin import rbac_policy_parser |
Rick Bartra | ed95005 | 2017-06-29 17:20:33 -0400 | [diff] [blame] | 28 | from patrole_tempest_plugin import requirements_authority |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 29 | |
| 30 | CONF = config.CONF |
| 31 | LOG = logging.getLogger(__name__) |
| 32 | |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 33 | _SUPPORTED_ERROR_CODES = [403, 404] |
| 34 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 35 | |
Felipe Monteiro | e7e552e | 2017-05-02 17:04:12 +0100 | [diff] [blame] | 36 | def action(service, rule='', admin_only=False, expected_error_code=403, |
Felipe Monteiro | 0854ded | 2017-05-05 16:30:55 +0100 | [diff] [blame] | 37 | extra_target_data=None): |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 38 | """A decorator which does a policy check and matches it against test run. |
| 39 | |
| 40 | A decorator which allows for positive and negative RBAC testing. Given |
| 41 | an OpenStack service and a policy action enforced by that service, an |
| 42 | oslo.policy lookup is performed by calling `authority.get_permission`. |
Rick Bartra | ed95005 | 2017-06-29 17:20:33 -0400 | [diff] [blame] | 43 | Alternatively, the RBAC tests can run against a YAML file that defines |
| 44 | policy requirements. |
| 45 | |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 46 | The following cases are possible: |
| 47 | |
| 48 | * If `allowed` is True and the test passes, this is a success. |
| 49 | * If `allowed` is True and the test fails, this is a failure. |
| 50 | * If `allowed` is False and the test passes, this is a failure. |
| 51 | * If `allowed` is False and the test fails, this is a success. |
| 52 | |
| 53 | :param service: A OpenStack service: for example, "nova" or "neutron". |
| 54 | :param rule: A policy action defined in a policy.json file (or in code). |
| 55 | :param admin_only: Skips over oslo.policy check because the policy action |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 56 | defined by `rule` is not enforced by the service's policy enforcement |
| 57 | logic. For example, Keystone v2 performs an admin check for most of its |
| 58 | endpoints. If True, `rule` is effectively ignored. |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 59 | :param expected_error_code: Overrides default value of 403 (Forbidden) |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 60 | with endpoint-specific error code. Currently only supports 403 and 404. |
| 61 | Support for 404 is needed because some services, like Neutron, |
| 62 | intentionally throw a 404 for security reasons. |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 63 | |
| 64 | :raises NotFound: if `service` is invalid or |
| 65 | if Tempest credentials cannot be found. |
| 66 | :raises Forbidden: for bullet (2) above. |
| 67 | :raises RbacOverPermission: for bullet (3) above. |
| 68 | """ |
Felipe Monteiro | 0854ded | 2017-05-05 16:30:55 +0100 | [diff] [blame] | 69 | |
| 70 | if extra_target_data is None: |
| 71 | extra_target_data = {} |
| 72 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 73 | def decorator(func): |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 74 | role = CONF.rbac.rbac_test_role |
| 75 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 76 | def wrapper(*args, **kwargs): |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 77 | if args and isinstance(args[0], test.BaseTestCase): |
| 78 | test_obj = args[0] |
| 79 | else: |
| 80 | raise rbac_exceptions.RbacResourceSetupFailed( |
| 81 | '`rbac_rule_validation` decorator can only be applied to ' |
| 82 | 'an instance of `tempest.test.BaseTestCase`.') |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 83 | |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 84 | if admin_only: |
| 85 | LOG.info("As admin_only is True, only admin role should be " |
| 86 | "allowed to perform the API. Skipping oslo.policy " |
| 87 | "check for policy action {0}.".format(rule)) |
Felipe Monteiro | 17e9b49 | 2017-05-27 05:45:20 +0100 | [diff] [blame] | 88 | allowed = test_obj.rbac_utils.is_admin |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 89 | else: |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 90 | allowed = _is_authorized(test_obj, service, rule, |
| 91 | extra_target_data) |
Felipe Monteiro | d5d76b8 | 2017-03-20 23:18:50 +0000 | [diff] [blame] | 92 | |
Rick Bartra | 1299894 | 2017-03-17 17:35:45 -0400 | [diff] [blame] | 93 | expected_exception, irregular_msg = _get_exception_type( |
| 94 | expected_error_code) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 95 | |
| 96 | try: |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 97 | func(*args, **kwargs) |
Rick Bartra | 503c557 | 2017-03-09 13:49:58 -0500 | [diff] [blame] | 98 | except rbac_exceptions.RbacInvalidService as e: |
Felipe Monteiro | 48c913d | 2017-03-15 12:07:48 -0400 | [diff] [blame] | 99 | msg = ("%s is not a valid service." % service) |
| 100 | LOG.error(msg) |
| 101 | raise exceptions.NotFound( |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 102 | "%s RbacInvalidService was: %s" % (msg, e)) |
Samantha Blanco | 36bea05 | 2017-07-19 12:01:59 -0400 | [diff] [blame^] | 103 | except (expected_exception, |
| 104 | rbac_exceptions.RbacConflictingPolicies, |
| 105 | rbac_exceptions.RbacMalformedResponse) as e: |
Felipe Monteiro | 8eda8cc | 2017-03-22 14:15:14 +0000 | [diff] [blame] | 106 | if irregular_msg: |
| 107 | LOG.warning(irregular_msg.format(rule, service)) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 108 | if allowed: |
| 109 | msg = ("Role %s was not allowed to perform %s." % |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 110 | (role, rule)) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 111 | LOG.error(msg) |
| 112 | raise exceptions.Forbidden( |
Felipe Monteiro | 4bf66a2 | 2017-05-07 14:44:21 +0100 | [diff] [blame] | 113 | "%s Exception was: %s" % (msg, e)) |
Felipe Monteiro | 8eda8cc | 2017-03-22 14:15:14 +0000 | [diff] [blame] | 114 | except Exception as e: |
| 115 | exc_info = sys.exc_info() |
| 116 | error_details = exc_info[1].__str__() |
| 117 | msg = ("%s An unexpected exception has occurred: Expected " |
| 118 | "exception was %s, which was not thrown." |
| 119 | % (error_details, expected_exception.__name__)) |
| 120 | LOG.error(msg) |
| 121 | six.reraise(exc_info[0], exc_info[0](msg), exc_info[2]) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 122 | else: |
| 123 | if not allowed: |
Felipe Monteiro | 4bf66a2 | 2017-05-07 14:44:21 +0100 | [diff] [blame] | 124 | LOG.error("Role %s was allowed to perform %s", |
Felipe Monteiro | e52cbc6 | 2017-05-24 17:48:59 +0100 | [diff] [blame] | 125 | role, rule) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 126 | raise rbac_exceptions.RbacOverPermission( |
| 127 | "OverPermission: Role %s was allowed to perform %s" % |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 128 | (role, rule)) |
raiesmh08 | 8590c0c | 2017-03-14 18:06:52 +0530 | [diff] [blame] | 129 | finally: |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 130 | test_obj.rbac_utils.switch_role(test_obj, |
| 131 | toggle_rbac_role=False) |
| 132 | |
| 133 | _wrapper = testtools.testcase.attr(role)(wrapper) |
| 134 | return _wrapper |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 135 | return decorator |
Rick Bartra | 1299894 | 2017-03-17 17:35:45 -0400 | [diff] [blame] | 136 | |
| 137 | |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 138 | def _is_authorized(test_obj, service, rule_name, extra_target_data): |
Felipe Monteiro | dea1384 | 2017-07-05 04:11:18 +0100 | [diff] [blame] | 139 | """Validates whether current RBAC role has permission to do policy action. |
| 140 | |
| 141 | :param test_obj: type BaseTestCase (tempest base test class) |
| 142 | :param service: the OpenStack service that enforces ``rule_name`` |
| 143 | :param rule_name: the name of the policy action |
| 144 | :param extra_target_data: dictionary with unresolved string literals that |
| 145 | reference nested BaseTestCase attributes |
| 146 | :returns: True if the current RBAC role can perform the policy action else |
| 147 | False |
Felipe Monteiro | 7be94e8 | 2017-07-26 02:17:08 +0100 | [diff] [blame] | 148 | |
| 149 | :raises RbacResourceSetupFailed: if project_id or user_id are missing from |
| 150 | the Tempest test object's `auth_provider` |
Felipe Monteiro | dea1384 | 2017-07-05 04:11:18 +0100 | [diff] [blame] | 151 | :raises RbacParsingException: if ``CONF.rbac.strict_policy_check`` is |
| 152 | enabled and the ``rule_name`` does not exist in the system |
| 153 | :raises skipException: if ``CONF.rbac.strict_policy_check`` is |
| 154 | disabled and the ``rule_name`` does not exist in the system |
| 155 | """ |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 156 | try: |
Felipe Monteiro | e8d93e0 | 2017-07-19 20:52:20 +0100 | [diff] [blame] | 157 | project_id = test_obj.os_primary.credentials.project_id |
| 158 | user_id = test_obj.os_primary.credentials.user_id |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 159 | except AttributeError as e: |
Felipe Monteiro | e8d93e0 | 2017-07-19 20:52:20 +0100 | [diff] [blame] | 160 | msg = ("{0}: project_id or user_id not found in os_primary.credentials" |
| 161 | .format(e)) |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 162 | LOG.error(msg) |
| 163 | raise rbac_exceptions.RbacResourceSetupFailed(msg) |
| 164 | |
| 165 | try: |
| 166 | role = CONF.rbac.rbac_test_role |
Rick Bartra | ed95005 | 2017-06-29 17:20:33 -0400 | [diff] [blame] | 167 | # Test RBAC against custom requirements. Otherwise use oslo.policy |
| 168 | if CONF.rbac.test_custom_requirements: |
| 169 | authority = requirements_authority.RequirementsAuthority( |
| 170 | CONF.rbac.custom_requirements_file, service) |
| 171 | else: |
| 172 | formatted_target_data = _format_extra_target_data( |
| 173 | test_obj, extra_target_data) |
| 174 | authority = rbac_policy_parser.RbacPolicyParser( |
| 175 | project_id, user_id, service, |
| 176 | extra_target_data=formatted_target_data) |
| 177 | is_allowed = authority.allowed(rule_name, role) |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 178 | |
| 179 | if is_allowed: |
| 180 | LOG.debug("[Action]: %s, [Role]: %s is allowed!", rule_name, |
| 181 | role) |
| 182 | else: |
| 183 | LOG.debug("[Action]: %s, [Role]: %s is NOT allowed!", |
| 184 | rule_name, role) |
| 185 | return is_allowed |
| 186 | except rbac_exceptions.RbacParsingException as e: |
| 187 | if CONF.rbac.strict_policy_check: |
| 188 | raise e |
| 189 | else: |
| 190 | raise testtools.TestCase.skipException(str(e)) |
| 191 | return False |
| 192 | |
| 193 | |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 194 | def _get_exception_type(expected_error_code=403): |
| 195 | """Dynamically calculate the expected exception to be caught. |
| 196 | |
| 197 | Dynamically calculate the expected exception to be caught by the test case. |
| 198 | Only `Forbidden` and `NotFound` exceptions are permitted. `NotFound` is |
| 199 | supported because Neutron, for security reasons, masks `Forbidden` |
| 200 | exceptions as `NotFound` exceptions. |
| 201 | |
| 202 | :param expected_error_code: the integer representation of the expected |
| 203 | exception to be caught. Must be contained in `_SUPPORTED_ERROR_CODES`. |
| 204 | :returns: tuple of the exception type corresponding to |
| 205 | `expected_error_code` and a message explaining that a non-Forbidden |
| 206 | exception was expected, if applicable. |
| 207 | """ |
Rick Bartra | 1299894 | 2017-03-17 17:35:45 -0400 | [diff] [blame] | 208 | expected_exception = None |
| 209 | irregular_msg = None |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 210 | |
| 211 | if not isinstance(expected_error_code, six.integer_types) \ |
| 212 | or expected_error_code not in _SUPPORTED_ERROR_CODES: |
| 213 | msg = ("Please pass an expected error code. Currently " |
| 214 | "supported codes: {0}".format(_SUPPORTED_ERROR_CODES)) |
| 215 | LOG.error(msg) |
| 216 | raise rbac_exceptions.RbacInvalidErrorCode(msg) |
Felipe Monteiro | 78fc489 | 2017-04-12 21:33:39 +0100 | [diff] [blame] | 217 | |
Rick Bartra | 1299894 | 2017-03-17 17:35:45 -0400 | [diff] [blame] | 218 | if expected_error_code == 403: |
| 219 | expected_exception = exceptions.Forbidden |
| 220 | elif expected_error_code == 404: |
| 221 | expected_exception = exceptions.NotFound |
| 222 | irregular_msg = ("NotFound exception was caught for policy action " |
| 223 | "{0}. The service {1} throws a 404 instead of a 403, " |
| 224 | "which is irregular.") |
Rick Bartra | 1299894 | 2017-03-17 17:35:45 -0400 | [diff] [blame] | 225 | |
| 226 | return expected_exception, irregular_msg |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 227 | |
| 228 | |
| 229 | def _format_extra_target_data(test_obj, extra_target_data): |
| 230 | """Formats the "extra_target_data" dictionary with correct test data. |
| 231 | |
| 232 | Before being formatted, "extra_target_data" is a dictionary that maps a |
| 233 | policy string like "trust.trustor_user_id" to a nested list of BaseTestCase |
| 234 | attributes. For example, the attribute list in: |
| 235 | |
| 236 | "trust.trustor_user_id": "os.auth_provider.credentials.user_id" |
| 237 | |
| 238 | is parsed by iteratively calling `getattr` until the value of "user_id" |
| 239 | is resolved. The resulting dictionary returns: |
| 240 | |
| 241 | "trust.trustor_user_id": "the user_id of the `primary` credential" |
| 242 | |
| 243 | :param test_obj: type BaseTestCase (tempest base test class) |
| 244 | :param extra_target_data: dictionary with unresolved string literals that |
Felipe Monteiro | 973a1bc | 2017-06-14 21:23:54 +0100 | [diff] [blame] | 245 | reference nested BaseTestCase attributes |
Felipe Monteiro | dea1384 | 2017-07-05 04:11:18 +0100 | [diff] [blame] | 246 | :returns: dictionary containing additional object data needed by |
| 247 | oslo.policy to validate generic checks |
Felipe Monteiro | fd1db98 | 2017-04-13 21:19:41 +0100 | [diff] [blame] | 248 | """ |
| 249 | attr_value = test_obj |
| 250 | formatted_target_data = {} |
| 251 | |
| 252 | for user_attribute, attr_string in extra_target_data.items(): |
| 253 | attrs = attr_string.split('.') |
| 254 | for attr in attrs: |
| 255 | attr_value = getattr(attr_value, attr) |
| 256 | formatted_target_data[user_attribute] = attr_value |
| 257 | |
| 258 | return formatted_target_data |