deb-gnocchi/gnocchi/rest/auth_helper.py

126 lines
4.1 KiB
Python

# -*- encoding: utf-8 -*-
#
# Copyright © 2016 Red Hat, Inc.
# Copyright © 2014-2015 eNovance
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import webob
import werkzeug.http
from gnocchi import rest
class KeystoneAuthHelper(object):
@staticmethod
def get_current_user(headers):
# FIXME(jd) should have domain but should not break existing :(
user_id = headers.get("X-User-Id", "")
project_id = headers.get("X-Project-Id", "")
return user_id + ":" + project_id
@staticmethod
def get_auth_info(headers):
user_id = headers.get("X-User-Id")
project_id = headers.get("X-Project-Id")
return {
"user": (user_id or "") + ":" + (project_id or ""),
"user_id": user_id,
"project_id": project_id,
'domain_id': headers.get("X-Domain-Id"),
'roles': headers.get("X-Roles", "").split(","),
}
@staticmethod
def get_resource_policy_filter(headers, rule, resource_type):
try:
# Check if the policy allows the user to list any resource
rest.enforce(rule, {
"resource_type": resource_type,
})
except webob.exc.HTTPForbidden:
policy_filter = []
project_id = headers.get("X-Project-Id")
try:
# Check if the policy allows the user to list resources linked
# to their project
rest.enforce(rule, {
"resource_type": resource_type,
"project_id": project_id,
})
except webob.exc.HTTPForbidden:
pass
else:
policy_filter.append({"=": {"project_id": project_id}})
try:
# Check if the policy allows the user to list resources linked
# to their created_by_project
rest.enforce(rule, {
"resource_type": resource_type,
"created_by_project_id": project_id,
})
except webob.exc.HTTPForbidden:
pass
else:
if project_id:
policy_filter.append(
{"like": {"creator": "%:" + project_id}})
else:
policy_filter.append({"=": {"creator": None}})
if not policy_filter:
# We need to have at least one policy filter in place
rest.abort(403, "Insufficient privileges")
return {"or": policy_filter}
class NoAuthHelper(KeystoneAuthHelper):
@staticmethod
def get_current_user(headers):
# FIXME(jd) Should be a single header
user_id = headers.get("X-User-Id")
project_id = headers.get("X-Project-Id")
if user_id:
if project_id:
return user_id + ":" + project_id
return user_id
if project_id:
return project_id
rest.abort(401, "Unable to determine current user")
class BasicAuthHelper(object):
@staticmethod
def get_current_user(headers):
auth = werkzeug.http.parse_authorization_header(
headers.get("Authorization"))
if auth is None:
rest.abort(401)
return auth.username
def get_auth_info(self, headers):
user = self.get_current_user(headers)
roles = []
if user == "admin":
roles.append("admin")
return {
"user": user,
"roles": roles
}
@staticmethod
def get_resource_policy_filter(headers, rule, resource_type):
return None