d8579828a7
Organize imports in the way described in [1] [1]: http://docs.openstack.org/developer/hacking/#imports Change-Id: I53c1f7fa7271aaa953b72142f5cca8162aa06ff0 Partially-Bug: 1472597
97 lines
2.9 KiB
Python
97 lines
2.9 KiB
Python
# Copyright (c) 2014 Hewlett-Packard Development Company, L.P.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
# Based on designate/policy.py
|
|
|
|
from oslo_config import cfg
|
|
from oslo_policy import policy
|
|
from webob import exc as exceptions
|
|
|
|
from murano.common.i18n import _
|
|
import murano.openstack.common.log as logging
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
CONF = cfg.CONF
|
|
|
|
_ENFORCER = None
|
|
|
|
|
|
def reset():
|
|
global _ENFORCER
|
|
if _ENFORCER:
|
|
_ENFORCER.clear()
|
|
_ENFORCER = None
|
|
|
|
|
|
def set_rules(data, default_rule=None, overwrite=True):
|
|
default_rule = default_rule or cfg.CONF.policy_default_rule
|
|
if not _ENFORCER:
|
|
LOG.debug("Enforcer not present, recreating at rules stage.")
|
|
init()
|
|
|
|
if default_rule:
|
|
_ENFORCER.default_rule = default_rule
|
|
|
|
msg = "Loading rules %s, default: %s, overwrite: %s"
|
|
LOG.debug(msg, data, default_rule, overwrite)
|
|
|
|
if isinstance(data, dict):
|
|
rules = policy.Rules.from_dict(data, default_rule)
|
|
else:
|
|
rules = policy.Rules.load_json(data, default_rule)
|
|
|
|
_ENFORCER.set_rules(rules, overwrite=overwrite)
|
|
|
|
|
|
def init(default_rule=None, use_conf=True):
|
|
global _ENFORCER
|
|
if not _ENFORCER:
|
|
LOG.debug("Enforcer is not present, recreating.")
|
|
_ENFORCER = policy.Enforcer(CONF, use_conf=use_conf)
|
|
_ENFORCER.load_rules()
|
|
|
|
|
|
def check(rule, ctxt, target={}, do_raise=True, exc=exceptions.HTTPForbidden):
|
|
creds = ctxt.to_dict()
|
|
|
|
try:
|
|
result = _ENFORCER.enforce(rule, target, creds, do_raise, exc)
|
|
except Exception:
|
|
result = False
|
|
raise
|
|
else:
|
|
return result
|
|
finally:
|
|
extra = {'policy': {'rule': rule, 'target': target}}
|
|
|
|
if result:
|
|
LOG.audit(_("Policy check succeeded for rule "
|
|
"'%(rule)s' on target %(target)s"),
|
|
{'rule': rule, 'target': repr(target)}, extra=extra)
|
|
else:
|
|
LOG.audit(_("Policy check failed for rule "
|
|
"'%(rule)s' on target: %(target)s"),
|
|
{'rule': rule, 'target': repr(target)}, extra=extra)
|
|
|
|
|
|
def check_is_admin(context):
|
|
"""Check if the given context is associated with an admin role.
|
|
|
|
:param context: Murano request context
|
|
:returns: A non-False value if context role is admin.
|
|
"""
|
|
return check('context_is_admin', context,
|
|
context.to_dict(), do_raise=False)
|