
Add support for the domain_id attribute in the role entity. Partially Implements: blueprint domain-specific-roles Change-Id: I06af7647e15aa742609b3fe1b9b222fbeaeb5735
245 lines
9.3 KiB
Python
245 lines
9.3 KiB
Python
# Copyright 2011 OpenStack Foundation
|
|
# Copyright 2011 Nebula, Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from positional import positional
|
|
|
|
from keystoneclient import base
|
|
from keystoneclient import exceptions
|
|
from keystoneclient.i18n import _
|
|
|
|
|
|
class Role(base.Resource):
|
|
"""Represents an Identity role.
|
|
|
|
Attributes:
|
|
* id: a uuid that identifies the role
|
|
* name: user-facing identifier
|
|
* domain: optional domain for the role
|
|
|
|
"""
|
|
pass
|
|
|
|
|
|
class InferenceRule(base.Resource):
|
|
"""Represents an Rule that states one ROle implies another
|
|
|
|
Attributes:
|
|
* prior_role: this role implies the other
|
|
* implied_role: this role is implied by the other
|
|
|
|
"""
|
|
pass
|
|
|
|
|
|
class RoleManager(base.CrudManager):
|
|
"""Manager class for manipulating Identity roles."""
|
|
resource_class = Role
|
|
collection_key = 'roles'
|
|
key = 'role'
|
|
|
|
def _role_grants_base_url(self, user, group, domain, project,
|
|
use_inherit_extension):
|
|
# When called, we have already checked that only one of user & group
|
|
# and one of domain & project have been specified
|
|
params = {}
|
|
|
|
if project:
|
|
params['project_id'] = base.getid(project)
|
|
base_url = '/projects/%(project_id)s'
|
|
elif domain:
|
|
params['domain_id'] = base.getid(domain)
|
|
base_url = '/domains/%(domain_id)s'
|
|
|
|
if use_inherit_extension:
|
|
base_url = '/OS-INHERIT' + base_url
|
|
|
|
if user:
|
|
params['user_id'] = base.getid(user)
|
|
base_url += '/users/%(user_id)s'
|
|
elif group:
|
|
params['group_id'] = base.getid(group)
|
|
base_url += '/groups/%(group_id)s'
|
|
|
|
return base_url % params
|
|
|
|
def _require_domain_xor_project(self, domain, project):
|
|
if domain and project:
|
|
msg = _('Specify either a domain or project, not both')
|
|
raise exceptions.ValidationError(msg)
|
|
elif not (domain or project):
|
|
msg = _('Must specify either a domain or project')
|
|
raise exceptions.ValidationError(msg)
|
|
|
|
def _require_user_xor_group(self, user, group):
|
|
if user and group:
|
|
msg = _('Specify either a user or group, not both')
|
|
raise exceptions.ValidationError(msg)
|
|
elif not (user or group):
|
|
msg = _('Must specify either a user or group')
|
|
raise exceptions.ValidationError(msg)
|
|
|
|
@positional(1, enforcement=positional.WARN)
|
|
def create(self, name, domain=None, **kwargs):
|
|
domain_id = None
|
|
if domain:
|
|
domain_id = base.getid(domain)
|
|
|
|
return super(RoleManager, self).create(
|
|
name=name,
|
|
domain_id=domain_id,
|
|
**kwargs)
|
|
|
|
def _implied_role_url_tail(self, prior_role, implied_role):
|
|
base_url = ('/%(prior_role_id)s/implies/%(implied_role_id)s' %
|
|
{'prior_role_id': base.getid(prior_role),
|
|
'implied_role_id': base.getid(implied_role)})
|
|
return base_url
|
|
|
|
def create_implied(self, prior_role, implied_role, **kwargs):
|
|
url_tail = self._implied_role_url_tail(prior_role, implied_role)
|
|
self.client.put("/roles" + url_tail, **kwargs)
|
|
|
|
def delete_implied(self, prior_role, implied_role, **kwargs):
|
|
url_tail = self._implied_role_url_tail(prior_role, implied_role)
|
|
return super(RoleManager, self).delete(tail=url_tail, **kwargs)
|
|
|
|
def get_implied(self, prior_role, implied_role, **kwargs):
|
|
url_tail = self._implied_role_url_tail(prior_role, implied_role)
|
|
return super(RoleManager, self).get(tail=url_tail, **kwargs)
|
|
|
|
def check_implied(self, prior_role, implied_role, **kwargs):
|
|
url_tail = self._implied_role_url_tail(prior_role, implied_role)
|
|
return super(RoleManager, self).head(tail=url_tail, **kwargs)
|
|
|
|
def list_role_inferences(self, **kwargs):
|
|
resp, body = self.client.get('/role_inferences/', **kwargs)
|
|
obj_class = InferenceRule
|
|
return [obj_class(self, res, loaded=True)
|
|
for res in body['role_inferences']]
|
|
|
|
def get(self, role):
|
|
return super(RoleManager, self).get(
|
|
role_id=base.getid(role))
|
|
|
|
@positional(enforcement=positional.WARN)
|
|
def list(self, user=None, group=None, domain=None,
|
|
project=None, os_inherit_extension_inherited=False, **kwargs):
|
|
"""Lists roles and role grants.
|
|
|
|
If no arguments are provided, all roles in the system will be
|
|
listed.
|
|
|
|
If a user or group is specified, you must also specify either a
|
|
domain or project to list role grants on that pair. And if
|
|
``**kwargs`` are provided, then also filter roles with
|
|
attributes matching ``**kwargs``.
|
|
|
|
If 'os_inherit_extension_inherited' is passed, then OS-INHERIT will be
|
|
used. It provides the ability for projects to inherit role assignments
|
|
from their domains or from projects in the hierarchy.
|
|
"""
|
|
|
|
if os_inherit_extension_inherited:
|
|
kwargs['tail'] = '/inherited_to_projects'
|
|
if user or group:
|
|
self._require_user_xor_group(user, group)
|
|
self._require_domain_xor_project(domain, project)
|
|
|
|
base_url = self._role_grants_base_url(
|
|
user, group, domain, project, os_inherit_extension_inherited)
|
|
return super(RoleManager, self).list(base_url=base_url,
|
|
**kwargs)
|
|
|
|
return super(RoleManager, self).list(**kwargs)
|
|
|
|
@positional(enforcement=positional.WARN)
|
|
def update(self, role, name=None, **kwargs):
|
|
return super(RoleManager, self).update(
|
|
role_id=base.getid(role),
|
|
name=name,
|
|
**kwargs)
|
|
|
|
def delete(self, role):
|
|
return super(RoleManager, self).delete(
|
|
role_id=base.getid(role))
|
|
|
|
@positional(enforcement=positional.WARN)
|
|
def grant(self, role, user=None, group=None, domain=None, project=None,
|
|
os_inherit_extension_inherited=False, **kwargs):
|
|
"""Grants a role to a user or group on a domain or project.
|
|
|
|
If 'os_inherit_extension_inherited' is passed, then OS-INHERIT will be
|
|
used. It provides the ability for projects to inherit role assignments
|
|
from their domains or from projects in the hierarchy.
|
|
"""
|
|
self._require_domain_xor_project(domain, project)
|
|
self._require_user_xor_group(user, group)
|
|
|
|
if os_inherit_extension_inherited:
|
|
kwargs['tail'] = '/inherited_to_projects'
|
|
|
|
base_url = self._role_grants_base_url(
|
|
user, group, domain, project, os_inherit_extension_inherited)
|
|
return super(RoleManager, self).put(base_url=base_url,
|
|
role_id=base.getid(role),
|
|
**kwargs)
|
|
|
|
@positional(enforcement=positional.WARN)
|
|
def check(self, role, user=None, group=None, domain=None, project=None,
|
|
os_inherit_extension_inherited=False, **kwargs):
|
|
"""Checks if a user or group has a role on a domain or project.
|
|
|
|
If 'os_inherit_extension_inherited' is passed, then OS-INHERIT will be
|
|
used. It provides the ability for projects to inherit role assignments
|
|
from their domains or from projects in the hierarchy.
|
|
"""
|
|
self._require_domain_xor_project(domain, project)
|
|
self._require_user_xor_group(user, group)
|
|
|
|
if os_inherit_extension_inherited:
|
|
kwargs['tail'] = '/inherited_to_projects'
|
|
|
|
base_url = self._role_grants_base_url(
|
|
user, group, domain, project, os_inherit_extension_inherited)
|
|
return super(RoleManager, self).head(
|
|
base_url=base_url,
|
|
role_id=base.getid(role),
|
|
os_inherit_extension_inherited=os_inherit_extension_inherited,
|
|
**kwargs)
|
|
|
|
@positional(enforcement=positional.WARN)
|
|
def revoke(self, role, user=None, group=None, domain=None, project=None,
|
|
os_inherit_extension_inherited=False, **kwargs):
|
|
"""Revokes a role from a user or group on a domain or project.
|
|
|
|
If 'os_inherit_extension_inherited' is passed, then OS-INHERIT will be
|
|
used. It provides the ability for projects to inherit role assignments
|
|
from their domains or from projects in the hierarchy.
|
|
"""
|
|
self._require_domain_xor_project(domain, project)
|
|
self._require_user_xor_group(user, group)
|
|
|
|
if os_inherit_extension_inherited:
|
|
kwargs['tail'] = '/inherited_to_projects'
|
|
|
|
base_url = self._role_grants_base_url(
|
|
user, group, domain, project, os_inherit_extension_inherited)
|
|
return super(RoleManager, self).delete(
|
|
base_url=base_url,
|
|
role_id=base.getid(role),
|
|
os_inherit_extension_inherited=os_inherit_extension_inherited,
|
|
**kwargs)
|