2011-05-26 02:17:42 +00:00
|
|
|
# Copyright (c) 2011 OpenStack, LLC.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
from contextlib import contextmanager
|
2012-10-01 21:43:34 -07:00
|
|
|
from base64 import b64encode
|
2013-03-08 19:33:27 +01:00
|
|
|
from time import time
|
2011-05-26 02:17:42 +00:00
|
|
|
|
2011-05-26 02:24:12 +00:00
|
|
|
from swift.common.middleware import tempauth as auth
|
2012-09-04 14:02:19 -07:00
|
|
|
from swift.common.swob import Request, Response
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
|
|
|
|
class FakeMemcache(object):
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.store = {}
|
|
|
|
|
|
|
|
def get(self, key):
|
|
|
|
return self.store.get(key)
|
|
|
|
|
Swift MemcacheRing (set) interface is incompatible fixes
This patch fixes the Swift MemcacheRing set and set_multi
interface incompatible problem with python memcache. The fix
added two extra named parameters to both set and set_multi
method. When only time or timeout parameter is present, then one
of the value will be used. When both time and timeout are present,
the time parameter will be used.
Named parameter min_compress_len is added for pure compatibility
purposes. The current implementation ignores this parameter.
To make swift memcached methods all consistent cross the board,
method incr and decr have also been changed to include a new
named parameter time.
In future OpenStack releases, the named parameter timeout will be
removed, keep the named parameter timeout around for now is
to make sure that mismatched releases between client and server
will still work.
From now on, when a call is made to set, set_multi, decr, incr
by using timeout parametner, a warning message will be logged to
indicate the deprecation of the parameter.
Fixes: bug #1095730
Change-Id: I07af784a54d7d79395fc3265e74145f92f38a893
2013-02-13 13:54:51 -05:00
|
|
|
def set(self, key, value, time=0):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.store[key] = value
|
|
|
|
return True
|
|
|
|
|
Swift MemcacheRing (set) interface is incompatible fixes
This patch fixes the Swift MemcacheRing set and set_multi
interface incompatible problem with python memcache. The fix
added two extra named parameters to both set and set_multi
method. When only time or timeout parameter is present, then one
of the value will be used. When both time and timeout are present,
the time parameter will be used.
Named parameter min_compress_len is added for pure compatibility
purposes. The current implementation ignores this parameter.
To make swift memcached methods all consistent cross the board,
method incr and decr have also been changed to include a new
named parameter time.
In future OpenStack releases, the named parameter timeout will be
removed, keep the named parameter timeout around for now is
to make sure that mismatched releases between client and server
will still work.
From now on, when a call is made to set, set_multi, decr, incr
by using timeout parametner, a warning message will be logged to
indicate the deprecation of the parameter.
Fixes: bug #1095730
Change-Id: I07af784a54d7d79395fc3265e74145f92f38a893
2013-02-13 13:54:51 -05:00
|
|
|
def incr(self, key, time=0):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.store[key] = self.store.setdefault(key, 0) + 1
|
|
|
|
return self.store[key]
|
|
|
|
|
|
|
|
@contextmanager
|
|
|
|
def soft_lock(self, key, timeout=0, retries=5):
|
|
|
|
yield True
|
|
|
|
|
|
|
|
def delete(self, key):
|
|
|
|
try:
|
|
|
|
del self.store[key]
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
|
|
class FakeApp(object):
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
def __init__(self, status_headers_body_iter=None, acl=None, sync_key=None):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.calls = 0
|
|
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
|
|
if not self.status_headers_body_iter:
|
|
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
2011-06-03 00:11:32 +00:00
|
|
|
self.acl = acl
|
|
|
|
self.sync_key = sync_key
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def __call__(self, env, start_response):
|
|
|
|
self.calls += 1
|
|
|
|
self.request = Request.blank('', environ=env)
|
2011-06-03 00:11:32 +00:00
|
|
|
if self.acl:
|
|
|
|
self.request.acl = self.acl
|
|
|
|
if self.sync_key:
|
|
|
|
self.request.environ['swift_sync_key'] = self.sync_key
|
2011-05-26 02:17:42 +00:00
|
|
|
if 'swift.authorize' in env:
|
|
|
|
resp = env['swift.authorize'](self.request)
|
|
|
|
if resp:
|
|
|
|
return resp(env, start_response)
|
|
|
|
status, headers, body = self.status_headers_body_iter.next()
|
|
|
|
return Response(status=status, headers=headers,
|
|
|
|
body=body)(env, start_response)
|
|
|
|
|
|
|
|
|
|
|
|
class FakeConn(object):
|
|
|
|
|
|
|
|
def __init__(self, status_headers_body_iter=None):
|
|
|
|
self.calls = 0
|
|
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
|
|
if not self.status_headers_body_iter:
|
|
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
|
|
|
|
|
|
|
def request(self, method, path, headers):
|
|
|
|
self.calls += 1
|
|
|
|
self.request_path = path
|
|
|
|
self.status, self.headers, self.body = \
|
|
|
|
self.status_headers_body_iter.next()
|
|
|
|
self.status, self.reason = self.status.split(' ', 1)
|
|
|
|
self.status = int(self.status)
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
body = self.body
|
|
|
|
self.body = ''
|
|
|
|
return body
|
|
|
|
|
|
|
|
|
|
|
|
class TestAuth(unittest.TestCase):
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.test_auth = auth.filter_factory({})(FakeApp())
|
|
|
|
|
|
|
|
def _make_request(self, path, **kwargs):
|
|
|
|
req = Request.blank(path, **kwargs)
|
|
|
|
req.environ['swift.cache'] = FakeMemcache()
|
|
|
|
return req
|
|
|
|
|
|
|
|
def test_reseller_prefix_init(self):
|
|
|
|
app = FakeApp()
|
|
|
|
ath = auth.filter_factory({})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'AUTH_')
|
|
|
|
ath = auth.filter_factory({'reseller_prefix': 'TEST'})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'TEST_')
|
|
|
|
ath = auth.filter_factory({'reseller_prefix': 'TEST_'})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'TEST_')
|
|
|
|
|
|
|
|
def test_auth_prefix_init(self):
|
|
|
|
app = FakeApp()
|
|
|
|
ath = auth.filter_factory({})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': ''})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
2013-01-05 23:56:59 -08:00
|
|
|
ath = auth.filter_factory({'auth_prefix': '/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
2011-05-26 02:17:42 +00:00
|
|
|
ath = auth.filter_factory({'auth_prefix': '/test/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': '/test'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': 'test/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': 'test'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
|
2012-03-13 12:01:28 -07:00
|
|
|
def test_top_level_deny(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/')
|
|
|
|
resp = req.get_response(self.test_auth)
|
2012-03-13 12:01:28 -07:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2012-03-13 12:01:28 -07:00
|
|
|
self.test_auth.denied_response)
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_anon(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/AUTH_account')
|
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
self.test_auth.authorize)
|
|
|
|
|
2011-12-21 13:54:07 +00:00
|
|
|
def test_override_asked_for_but_not_allowed(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'allow_overrides': 'false'})(FakeApp())
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-12-21 13:54:07 +00:00
|
|
|
self.test_auth.authorize)
|
|
|
|
|
|
|
|
def test_override_asked_for_and_allowed(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'allow_overrides': 'true'})(FakeApp())
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 404)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertTrue('swift.authorize' not in req.environ)
|
2011-12-21 13:54:07 +00:00
|
|
|
|
|
|
|
def test_override_default_allowed(self):
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 404)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertTrue('swift.authorize' not in req.environ)
|
2011-12-21 13:54:07 +00:00
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_auth_deny_non_reseller_prefix(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/BLAH_account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'BLAH_t'})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
self.test_auth.denied_response)
|
|
|
|
|
|
|
|
def test_auth_deny_non_reseller_prefix_no_override(self):
|
|
|
|
fake_authorize = lambda x: Response(status='500 Fake')
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/BLAH_account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'BLAH_t'},
|
|
|
|
environ={'swift.authorize': fake_authorize}
|
|
|
|
)
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 500)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'], fake_authorize)
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_auth_no_reseller_prefix_deny(self):
|
|
|
|
# Ensures that when we have no reseller prefix, we don't deny a request
|
|
|
|
# outright but set up a denial swift.authorize and pass the request on
|
|
|
|
# down the chain.
|
|
|
|
local_app = FakeApp()
|
|
|
|
local_auth = auth.filter_factory({'reseller_prefix': ''})(local_app)
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 't'})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
self.assertEquals(local_app.calls, 1)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
local_auth.denied_response)
|
|
|
|
|
|
|
|
def test_auth_no_reseller_prefix_no_token(self):
|
|
|
|
# Check that normally we set up a call back to our authorize.
|
|
|
|
local_auth = \
|
|
|
|
auth.filter_factory({'reseller_prefix': ''})(FakeApp(iter([])))
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account')
|
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
local_auth.authorize)
|
|
|
|
# Now make sure we don't override an existing swift.authorize when we
|
|
|
|
# have no reseller prefix.
|
|
|
|
local_auth = \
|
|
|
|
auth.filter_factory({'reseller_prefix': ''})(FakeApp())
|
|
|
|
local_authorize = lambda req: Response('test')
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account', environ={'swift.authorize':
|
2012-10-11 16:52:26 -05:00
|
|
|
local_authorize})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'], local_authorize)
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_auth_fail(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/v1/AUTH_cfa',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_authorize_bad_path(self):
|
|
|
|
req = self._make_request('/badpath')
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
req = self._make_request('/badpath')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_authorize_account_access(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_authorize_acl_group_access(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act:usr'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act2'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act:usr2'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_deny_cross_reseller(self):
|
|
|
|
# Tests that cross-reseller is denied, even if ACLs/group names match
|
|
|
|
req = self._make_request('/v1/OTHER_cfa')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
req.acl = 'act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_authorize_acl_referrer_access(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:*,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:*' # No listings allowed
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.referer = 'http://www.example.com/index.html'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:*,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:*' # No listings allowed
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.referer = 'http://www.example.com/index.html'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
|
2013-03-08 19:33:27 +01:00
|
|
|
def test_detect_reseller_request(self):
|
|
|
|
req = self._make_request('/v1/AUTH_admin',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
|
|
cache_key = 'AUTH_/token/AUTH_t'
|
|
|
|
cache_entry = (time()+3600, '.reseller_admin')
|
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
2013-03-26 20:42:26 +00:00
|
|
|
req.get_response(self.test_auth)
|
2013-03-08 19:33:27 +01:00
|
|
|
self.assertTrue(req.environ.get('reseller_request', False))
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_account_put_permissions(self):
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# Even PUTs to your own account as account admin should fail
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_old',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
|
|
# about
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_account_delete_permissions(self):
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# Even DELETEs to your own account as account admin should fail
|
|
|
|
req = self._make_request('/v1/AUTH_old',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
|
|
# about
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_get_token_fail(self):
|
|
|
|
resp = self._make_request('/auth/v1.0').get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1.0',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_get_token_fail_invalid_x_auth_user_format(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_get_token_fail_non_matching_account_in_request(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act2:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_get_token_fail_bad_path(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth/invalid',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_get_token_fail_missing_key(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
2012-11-10 16:39:25 +00:00
|
|
|
def test_storage_url_default(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
del req.environ['HTTP_HOST']
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'http://bob:1234/v1/AUTH_test')
|
|
|
|
|
|
|
|
def test_storage_url_based_on_host(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'http://somehost:5678/v1/AUTH_test')
|
|
|
|
|
|
|
|
def test_storage_url_overriden_scheme(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing',
|
|
|
|
'storage_url_scheme': 'fake'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'fake://somehost:5678/v1/AUTH_test')
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
def test_reseller_admin_is_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_cfa',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = '.reseller_admin'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [True])
|
|
|
|
|
|
|
|
def test_admin_is_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = 'AUTH_cfa'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [True])
|
|
|
|
|
|
|
|
def test_regular_is_not_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = 'act:usr'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [False])
|
|
|
|
|
|
|
|
def test_sync_request_success(self):
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
def test_sync_request_fail_key(self):
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'wrongsecret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='othersecret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key=None)
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_sync_request_fail_no_timestamp(self):
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
|
|
|
|
def test_sync_request_success_lb_sync_host(self):
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456',
|
|
|
|
'x-forwarded-for': '127.0.0.1'})
|
|
|
|
req.remote_addr = '127.0.0.2'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
self.test_auth.app = FakeApp(iter([('204 No Content', {}, '')]),
|
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456',
|
|
|
|
'x-cluster-client-ip': '127.0.0.1'})
|
|
|
|
req.remote_addr = '127.0.0.2'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
def test_options_call(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'OPTIONS'})
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
|
2011-06-21 21:53:48 +02:00
|
|
|
class TestParseUserCreation(unittest.TestCase):
|
|
|
|
def test_parse_user_creation(self):
|
|
|
|
auth_filter = auth.filter_factory({
|
2012-10-01 21:43:34 -07:00
|
|
|
'reseller_prefix': 'ABC',
|
2011-06-21 21:53:48 +02:00
|
|
|
'user_test_tester3': 'testing',
|
2012-10-01 21:43:34 -07:00
|
|
|
'user_has_url': 'urlly .admin http://a.b/v1/DEF_has',
|
2011-06-21 21:53:48 +02:00
|
|
|
'user_admin_admin': 'admin .admin .reseller_admin',
|
|
|
|
})(FakeApp())
|
|
|
|
self.assertEquals(auth_filter.users, {
|
|
|
|
'admin:admin': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_admin',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': ['.admin', '.reseller_admin'],
|
2011-06-21 21:53:48 +02:00
|
|
|
'key': 'admin'
|
|
|
|
}, 'test:tester3': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_test',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': [],
|
2011-06-21 21:53:48 +02:00
|
|
|
'key': 'testing'
|
2012-10-01 21:43:34 -07:00
|
|
|
}, 'has:url': {
|
|
|
|
'url': 'http://a.b/v1/DEF_has',
|
|
|
|
'groups': ['.admin'],
|
|
|
|
'key': 'urlly'
|
2011-06-21 21:53:48 +02:00
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2012-10-01 21:43:34 -07:00
|
|
|
def test_base64_encoding(self):
|
|
|
|
auth_filter = auth.filter_factory({
|
|
|
|
'reseller_prefix': 'ABC',
|
|
|
|
'user64_%s_%s' % (
|
|
|
|
b64encode('test').rstrip('='),
|
|
|
|
b64encode('tester3').rstrip('=')):
|
2012-10-11 16:52:26 -05:00
|
|
|
'testing .reseller_admin',
|
2012-10-01 21:43:34 -07:00
|
|
|
'user64_%s_%s' % (
|
|
|
|
b64encode('user_foo').rstrip('='),
|
|
|
|
b64encode('ab').rstrip('=')):
|
2012-10-11 16:52:26 -05:00
|
|
|
'urlly .admin http://a.b/v1/DEF_has',
|
2012-10-01 21:43:34 -07:00
|
|
|
})(FakeApp())
|
|
|
|
self.assertEquals(auth_filter.users, {
|
|
|
|
'test:tester3': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_test',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': ['.reseller_admin'],
|
|
|
|
'key': 'testing'
|
|
|
|
}, 'user_foo:ab': {
|
|
|
|
'url': 'http://a.b/v1/DEF_has',
|
|
|
|
'groups': ['.admin'],
|
|
|
|
'key': 'urlly'
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
def test_key_with_no_value(self):
|
|
|
|
self.assertRaises(ValueError, auth.filter_factory({
|
|
|
|
'user_test_tester3': 'testing',
|
|
|
|
'user_bob_bobby': '',
|
|
|
|
'user_admin_admin': 'admin .admin .reseller_admin',
|
|
|
|
}), FakeApp())
|
|
|
|
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|