DavidPurcell | b25f93d | 2017-01-27 12:46:27 -0500 | [diff] [blame] | 1 | # Copyright 2017 AT&T Corporation. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 16 | import copy |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 17 | import os |
| 18 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 19 | from oslo_log import log as logging |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 20 | from oslo_policy import generator |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 21 | from oslo_policy import policy |
| 22 | from tempest import config |
| 23 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 24 | from patrole_tempest_plugin import rbac_exceptions |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 25 | |
| 26 | CONF = config.CONF |
| 27 | LOG = logging.getLogger(__name__) |
| 28 | |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 29 | |
| 30 | class RbacPolicyConverter(object): |
| 31 | """A class for parsing policy rules into lists of allowed roles. |
| 32 | |
| 33 | RBAC testing requires that each rule in a policy file be broken up into |
| 34 | the roles that constitute it. This class automates that process. |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 35 | |
| 36 | The list of roles per rule can be reverse-engineered by checking, for |
| 37 | each role, whether a given rule is allowed using oslo policy. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 38 | """ |
| 39 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 40 | def __init__(self, tenant_id, service, path=None): |
| 41 | """Initialization of Policy Converter. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 42 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 43 | Parses a policy file to create a dictionary, mapping policy actions to |
| 44 | roles. If a policy file does not exist, checks whether the policy file |
| 45 | is registered as a namespace under oslo.policy.policies. Nova, for |
| 46 | example, doesn't use a policy.json file by default; its policy is |
| 47 | implemented in code and registered as 'nova' under |
| 48 | oslo.policy.policies. |
| 49 | |
| 50 | If the policy file is not found in either place, raises an exception. |
| 51 | |
| 52 | Additionally, if the policy file exists in both code and as a |
| 53 | policy.json (for example, by creating a custom nova policy.json file), |
| 54 | the custom policy file over the default policy implementation is |
| 55 | prioritized. |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 56 | |
| 57 | :param tenant_id: type uuid |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 58 | :param service: type string |
| 59 | :param path: type string |
| 60 | """ |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 61 | service = service.lower().strip() |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 62 | if path is None: |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 63 | self.path = '/etc/{0}/policy.json'.format(service) |
| 64 | else: |
| 65 | self.path = path |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 66 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 67 | policy_data = "{}" |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 68 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 69 | # First check whether policy file exists. |
| 70 | if os.path.isfile(self.path): |
| 71 | policy_data = open(self.path, 'r').read() |
| 72 | # Otherwise use oslo_policy to fetch the rules for provided service. |
| 73 | else: |
| 74 | policy_generator = generator._get_policies_dict([service]) |
| 75 | if policy_generator and service in policy_generator: |
| 76 | policy_data = "{\n" |
| 77 | for r in policy_generator[service]: |
| 78 | policy_data = policy_data + r.__str__() + ",\n" |
| 79 | policy_data = policy_data[:-2] + "\n}" |
| 80 | # Otherwise raise an exception. |
| 81 | else: |
| 82 | raise rbac_exceptions.RbacResourceSetupFailed( |
| 83 | 'Policy file for service: {0}, {1} not found.' |
| 84 | .format(service, self.path)) |
| 85 | |
| 86 | self.rules = policy.Rules.load(policy_data, "default") |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 87 | self.tenant_id = tenant_id |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 88 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 89 | def allowed(self, rule_name, role): |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 90 | is_admin_context = self._is_admin_context(role) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 91 | is_allowed = self._allowed( |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 92 | access=self._get_access_token(role), |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 93 | apply_rule=rule_name, |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 94 | is_admin=is_admin_context) |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 95 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 96 | return is_allowed |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 97 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 98 | def _is_admin_context(self, role): |
| 99 | """Checks whether a role has admin context. |
| 100 | |
| 101 | If context_is_admin is contained in the policy file, then checks |
| 102 | whether the given role is contained in context_is_admin. If it is not |
| 103 | in the policy file, then default to context_is_admin: admin. |
| 104 | """ |
| 105 | if 'context_is_admin' in self.rules.keys(): |
| 106 | return self._allowed( |
| 107 | access=self._get_access_token(role), |
| 108 | apply_rule='context_is_admin') |
| 109 | return role == 'admin' |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 110 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 111 | def _get_access_token(self, role): |
| 112 | access_token = { |
| 113 | "token": { |
| 114 | "roles": [ |
| 115 | { |
| 116 | "name": role |
| 117 | } |
| 118 | ], |
| 119 | "project": { |
| 120 | "id": self.tenant_id |
| 121 | } |
| 122 | } |
| 123 | } |
| 124 | return access_token |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 125 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 126 | def _allowed(self, access, apply_rule, is_admin=False): |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 127 | """Checks if a given rule in a policy is allowed with given access. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 128 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 129 | Adapted from oslo_policy.shell. |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 130 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 131 | :param access: type dict: dictionary from ``_get_access_token`` |
| 132 | :param apply_rule: type string: rule to be checked |
| 133 | :param is_admin: type bool: whether admin context is used |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 134 | """ |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 135 | access_data = copy.copy(access['token']) |
| 136 | access_data['roles'] = [role['name'] for role in access_data['roles']] |
| 137 | access_data['project_id'] = access_data['project']['id'] |
| 138 | access_data['is_admin'] = is_admin |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 139 | # TODO(felipemonteiro): Dynamically calculate is_admin_project rather |
| 140 | # than hard-coding it to True. is_admin_project cannot be determined |
| 141 | # from the role, but rather from project and domain names. See |
| 142 | # _populate_is_admin_project in keystone.token.providers.common |
| 143 | # for more information. |
| 144 | access_data['is_admin_project'] = True |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 145 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 146 | class Object(object): |
| 147 | pass |
| 148 | o = Object() |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 149 | o.rules = self.rules |
DavidPurcell | 029d8c3 | 2017-01-06 15:27:41 -0500 | [diff] [blame] | 150 | |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 151 | target = {"project_id": access_data['project_id']} |
| 152 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 153 | result = self._try_rule(apply_rule, target, access_data, o) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 154 | return result |
| 155 | |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 156 | def _try_rule(self, apply_rule, target, access_data, o): |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 157 | try: |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 158 | rule = self.rules[apply_rule] |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 159 | return rule(target, access_data, o) |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 160 | except KeyError as e: |
| 161 | LOG.debug("{0} not found in policy file.".format(apply_rule)) |
| 162 | return False |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 163 | except Exception as e: |
Felipe Monteiro | 9c97850 | 2017-01-27 17:07:54 -0500 | [diff] [blame^] | 164 | LOG.debug("Exception: {0} for rule: {1}.".format(e, rule)) |
Felipe Monteiro | b059565 | 2017-01-23 16:51:58 -0500 | [diff] [blame] | 165 | return False |