582dee6fb9
This PS implements oslo.policy integration in Deckhand. The policy.py file implements 2 types of functions for performing policy enforcement in Deckhand: authorize, which is a decorator that is used directly around falcon on_HTTP_VERB methods that raises a 403 immediately if policy enforcement fails; and conditional_authorize, to be used inside controller code conditionally. For example, since Deckhand has two types of documents with respect to security -- encrypted and cleartext documents -- policy enforcement is conditioned on the type of the documents' metadata.storagePolicy. Included in this PS: - policy framework implementation - policy in code and policy documentation for all Deckhand policies - modification of functional test script to override default admin-only policies with custom policy file dynamically created using lax permissions - bug fix for filtering out deleted documents (and its predecessors in previous revisions) for PUT /revisions/{revision_id}/documents - policy documentation - basic unit tests for policy enforcement framework - allow functional tests to be filtered via regex Due to the size of this PS, functional tests related to policy enforcement will be done in a follow up. Change-Id: If418129f9b401091e098c0bd6c7336b8a5cd2359
120 lines
4.6 KiB
Python
120 lines
4.6 KiB
Python
# Copyright 2017 AT&T Intellectual Property. All other rights reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import yaml
|
|
|
|
import falcon
|
|
from oslo_log import log as logging
|
|
|
|
from deckhand.control import base as api_base
|
|
from deckhand.control.views import revision_tag as revision_tag_view
|
|
from deckhand.db.sqlalchemy import api as db_api
|
|
from deckhand import errors
|
|
from deckhand import policy
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class RevisionTagsResource(api_base.BaseResource):
|
|
"""API resource for realizing CRUD for revision tags."""
|
|
|
|
@policy.authorize('deckhand:create_tag')
|
|
def on_post(self, req, resp, revision_id, tag=None):
|
|
"""Creates a revision tag."""
|
|
body = req.stream.read(req.content_length or 0)
|
|
|
|
try:
|
|
tag_data = yaml.safe_load(body)
|
|
except yaml.YAMLError as e:
|
|
error_msg = ("Could not parse the request body into YAML data. "
|
|
"Details: %s." % e)
|
|
LOG.error(error_msg)
|
|
raise falcon.HTTPBadRequest(description=e)
|
|
|
|
try:
|
|
resp_tag = db_api.revision_tag_create(revision_id, tag, tag_data)
|
|
except errors.RevisionNotFound as e:
|
|
raise falcon.HTTPNotFound(description=e.format_message())
|
|
except errors.RevisionTagBadFormat as e:
|
|
raise falcon.HTTPBadRequest(description=e.format_message())
|
|
|
|
resp_body = revision_tag_view.ViewBuilder().show(resp_tag)
|
|
resp.status = falcon.HTTP_201
|
|
resp.append_header('Content-Type', 'application/x-yaml')
|
|
resp.body = self.to_yaml_body(resp_body)
|
|
|
|
def on_get(self, req, resp, revision_id, tag=None):
|
|
"""Show tag details or list all tags for a revision."""
|
|
if tag:
|
|
self._show_tag(req, resp, revision_id, tag)
|
|
else:
|
|
self._list_all_tags(req, resp, revision_id)
|
|
|
|
@policy.authorize('deckhand:show_tag')
|
|
def _show_tag(self, req, resp, revision_id, tag):
|
|
"""Retrieve details for a specified tag."""
|
|
try:
|
|
resp_tag = db_api.revision_tag_get(revision_id, tag)
|
|
except (errors.RevisionNotFound,
|
|
errors.RevisionTagNotFound) as e:
|
|
raise falcon.HTTPNotFound(description=e.format_message())
|
|
|
|
resp_body = revision_tag_view.ViewBuilder().show(resp_tag)
|
|
resp.status = falcon.HTTP_200
|
|
resp.append_header('Content-Type', 'application/x-yaml')
|
|
resp.body = self.to_yaml_body(resp_body)
|
|
|
|
@policy.authorize('deckhand:list_tags')
|
|
def _list_all_tags(self, req, resp, revision_id):
|
|
"""List all tags for a revision."""
|
|
try:
|
|
resp_tags = db_api.revision_tag_get_all(revision_id)
|
|
except errors.RevisionNotFound as e:
|
|
raise falcon.HTTPNotFound(e.format_message())
|
|
|
|
resp_body = revision_tag_view.ViewBuilder().list(resp_tags)
|
|
resp.status = falcon.HTTP_200
|
|
resp.append_header('Content-Type', 'application/x-yaml')
|
|
resp.body = self.to_yaml_body(resp_body)
|
|
|
|
def on_delete(self, req, resp, revision_id, tag=None):
|
|
"""Deletes a single tag or deletes all tags for a revision."""
|
|
if tag:
|
|
self._delete_tag(req, resp, revision_id, tag)
|
|
else:
|
|
self._delete_all_tags(req, resp, revision_id)
|
|
|
|
@policy.authorize('deckhand:delete_tag')
|
|
def _delete_tag(self, req, resp, revision_id, tag):
|
|
"""Delete a specified tag."""
|
|
try:
|
|
db_api.revision_tag_delete(revision_id, tag)
|
|
except (errors.RevisionNotFound,
|
|
errors.RevisionTagNotFound) as e:
|
|
raise falcon.HTTPNotFound(description=e.format_message())
|
|
|
|
resp.append_header('Content-Type', 'application/x-yaml')
|
|
resp.status = falcon.HTTP_204
|
|
|
|
@policy.authorize('deckhand:delete_tags')
|
|
def _delete_all_tags(self, req, resp, revision_id):
|
|
"""Delete all tags for a revision."""
|
|
try:
|
|
db_api.revision_tag_delete_all(revision_id)
|
|
except errors.RevisionNotFound as e:
|
|
raise falcon.HTTPNotFound(description=e.format_message())
|
|
|
|
resp.append_header('Content-Type', 'application/x-yaml')
|
|
resp.status = falcon.HTTP_204
|