2013-09-20 01:00:54 +08:00
|
|
|
# Copyright (c) 2011 OpenStack Foundation
|
2011-05-26 02:17:42 +00:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
from contextlib import contextmanager
|
2012-10-01 21:43:34 -07:00
|
|
|
from base64 import b64encode
|
2013-03-08 19:33:27 +01:00
|
|
|
from time import time
|
2011-05-26 02:17:42 +00:00
|
|
|
|
2011-05-26 02:24:12 +00:00
|
|
|
from swift.common.middleware import tempauth as auth
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
from swift.common.middleware.acl import format_acl
|
2012-09-04 14:02:19 -07:00
|
|
|
from swift.common.swob import Request, Response
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
from swift.common.utils import split_path
|
|
|
|
|
|
|
|
NO_CONTENT_RESP = (('204 No Content', {}, ''),) # mock server response
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
|
|
|
|
class FakeMemcache(object):
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.store = {}
|
|
|
|
|
|
|
|
def get(self, key):
|
|
|
|
return self.store.get(key)
|
|
|
|
|
Swift MemcacheRing (set) interface is incompatible fixes
This patch fixes the Swift MemcacheRing set and set_multi
interface incompatible problem with python memcache. The fix
added two extra named parameters to both set and set_multi
method. When only time or timeout parameter is present, then one
of the value will be used. When both time and timeout are present,
the time parameter will be used.
Named parameter min_compress_len is added for pure compatibility
purposes. The current implementation ignores this parameter.
To make swift memcached methods all consistent cross the board,
method incr and decr have also been changed to include a new
named parameter time.
In future OpenStack releases, the named parameter timeout will be
removed, keep the named parameter timeout around for now is
to make sure that mismatched releases between client and server
will still work.
From now on, when a call is made to set, set_multi, decr, incr
by using timeout parametner, a warning message will be logged to
indicate the deprecation of the parameter.
Fixes: bug #1095730
Change-Id: I07af784a54d7d79395fc3265e74145f92f38a893
2013-02-13 13:54:51 -05:00
|
|
|
def set(self, key, value, time=0):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.store[key] = value
|
|
|
|
return True
|
|
|
|
|
Swift MemcacheRing (set) interface is incompatible fixes
This patch fixes the Swift MemcacheRing set and set_multi
interface incompatible problem with python memcache. The fix
added two extra named parameters to both set and set_multi
method. When only time or timeout parameter is present, then one
of the value will be used. When both time and timeout are present,
the time parameter will be used.
Named parameter min_compress_len is added for pure compatibility
purposes. The current implementation ignores this parameter.
To make swift memcached methods all consistent cross the board,
method incr and decr have also been changed to include a new
named parameter time.
In future OpenStack releases, the named parameter timeout will be
removed, keep the named parameter timeout around for now is
to make sure that mismatched releases between client and server
will still work.
From now on, when a call is made to set, set_multi, decr, incr
by using timeout parametner, a warning message will be logged to
indicate the deprecation of the parameter.
Fixes: bug #1095730
Change-Id: I07af784a54d7d79395fc3265e74145f92f38a893
2013-02-13 13:54:51 -05:00
|
|
|
def incr(self, key, time=0):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.store[key] = self.store.setdefault(key, 0) + 1
|
|
|
|
return self.store[key]
|
|
|
|
|
|
|
|
@contextmanager
|
|
|
|
def soft_lock(self, key, timeout=0, retries=5):
|
|
|
|
yield True
|
|
|
|
|
|
|
|
def delete(self, key):
|
|
|
|
try:
|
|
|
|
del self.store[key]
|
|
|
|
except Exception:
|
|
|
|
pass
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
|
|
class FakeApp(object):
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
def __init__(self, status_headers_body_iter=None, acl=None, sync_key=None):
|
2011-05-26 02:17:42 +00:00
|
|
|
self.calls = 0
|
|
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
|
|
if not self.status_headers_body_iter:
|
|
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
2011-06-03 00:11:32 +00:00
|
|
|
self.acl = acl
|
|
|
|
self.sync_key = sync_key
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def __call__(self, env, start_response):
|
|
|
|
self.calls += 1
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.request = Request(env)
|
2011-06-03 00:11:32 +00:00
|
|
|
if self.acl:
|
|
|
|
self.request.acl = self.acl
|
|
|
|
if self.sync_key:
|
|
|
|
self.request.environ['swift_sync_key'] = self.sync_key
|
2011-05-26 02:17:42 +00:00
|
|
|
if 'swift.authorize' in env:
|
|
|
|
resp = env['swift.authorize'](self.request)
|
|
|
|
if resp:
|
|
|
|
return resp(env, start_response)
|
|
|
|
status, headers, body = self.status_headers_body_iter.next()
|
|
|
|
return Response(status=status, headers=headers,
|
|
|
|
body=body)(env, start_response)
|
|
|
|
|
|
|
|
|
|
|
|
class FakeConn(object):
|
|
|
|
|
|
|
|
def __init__(self, status_headers_body_iter=None):
|
|
|
|
self.calls = 0
|
|
|
|
self.status_headers_body_iter = status_headers_body_iter
|
|
|
|
if not self.status_headers_body_iter:
|
|
|
|
self.status_headers_body_iter = iter([('404 Not Found', {}, '')])
|
|
|
|
|
|
|
|
def request(self, method, path, headers):
|
|
|
|
self.calls += 1
|
|
|
|
self.request_path = path
|
|
|
|
self.status, self.headers, self.body = \
|
|
|
|
self.status_headers_body_iter.next()
|
|
|
|
self.status, self.reason = self.status.split(' ', 1)
|
|
|
|
self.status = int(self.status)
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
body = self.body
|
|
|
|
self.body = ''
|
|
|
|
return body
|
|
|
|
|
|
|
|
|
|
|
|
class TestAuth(unittest.TestCase):
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.test_auth = auth.filter_factory({})(FakeApp())
|
|
|
|
|
|
|
|
def _make_request(self, path, **kwargs):
|
|
|
|
req = Request.blank(path, **kwargs)
|
|
|
|
req.environ['swift.cache'] = FakeMemcache()
|
|
|
|
return req
|
|
|
|
|
|
|
|
def test_reseller_prefix_init(self):
|
|
|
|
app = FakeApp()
|
|
|
|
ath = auth.filter_factory({})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'AUTH_')
|
|
|
|
ath = auth.filter_factory({'reseller_prefix': 'TEST'})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'TEST_')
|
|
|
|
ath = auth.filter_factory({'reseller_prefix': 'TEST_'})(app)
|
|
|
|
self.assertEquals(ath.reseller_prefix, 'TEST_')
|
|
|
|
|
|
|
|
def test_auth_prefix_init(self):
|
|
|
|
app = FakeApp()
|
|
|
|
ath = auth.filter_factory({})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': ''})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
2013-01-05 23:56:59 -08:00
|
|
|
ath = auth.filter_factory({'auth_prefix': '/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/auth/')
|
2011-05-26 02:17:42 +00:00
|
|
|
ath = auth.filter_factory({'auth_prefix': '/test/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': '/test'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': 'test/'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
ath = auth.filter_factory({'auth_prefix': 'test'})(app)
|
|
|
|
self.assertEquals(ath.auth_prefix, '/test/')
|
|
|
|
|
2012-03-13 12:01:28 -07:00
|
|
|
def test_top_level_deny(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/')
|
|
|
|
resp = req.get_response(self.test_auth)
|
2012-03-13 12:01:28 -07:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2012-03-13 12:01:28 -07:00
|
|
|
self.test_auth.denied_response)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="unknown"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_anon(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/AUTH_account')
|
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
self.test_auth.authorize)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_account"')
|
|
|
|
|
|
|
|
def test_anon_badpath(self):
|
|
|
|
req = self._make_request('/v1')
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="unknown"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
2011-12-21 13:54:07 +00:00
|
|
|
def test_override_asked_for_but_not_allowed(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'allow_overrides': 'false'})(FakeApp())
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_account"')
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-12-21 13:54:07 +00:00
|
|
|
self.test_auth.authorize)
|
|
|
|
|
|
|
|
def test_override_asked_for_and_allowed(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'allow_overrides': 'true'})(FakeApp())
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 404)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertTrue('swift.authorize' not in req.environ)
|
2011-12-21 13:54:07 +00:00
|
|
|
|
|
|
|
def test_override_default_allowed(self):
|
|
|
|
req = self._make_request('/v1/AUTH_account',
|
|
|
|
environ={'swift.authorize_override': True})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 404)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertTrue('swift.authorize' not in req.environ)
|
2011-12-21 13:54:07 +00:00
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_auth_deny_non_reseller_prefix(self):
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/BLAH_account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'BLAH_t'})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="BLAH_account"')
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
self.test_auth.denied_response)
|
|
|
|
|
|
|
|
def test_auth_deny_non_reseller_prefix_no_override(self):
|
|
|
|
fake_authorize = lambda x: Response(status='500 Fake')
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/BLAH_account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'BLAH_t'},
|
|
|
|
environ={'swift.authorize': fake_authorize}
|
|
|
|
)
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(self.test_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 500)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'], fake_authorize)
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_auth_no_reseller_prefix_deny(self):
|
|
|
|
# Ensures that when we have no reseller prefix, we don't deny a request
|
|
|
|
# outright but set up a denial swift.authorize and pass the request on
|
|
|
|
# down the chain.
|
|
|
|
local_app = FakeApp()
|
|
|
|
local_auth = auth.filter_factory({'reseller_prefix': ''})(local_app)
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 't'})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="account"')
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(local_app.calls, 1)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
local_auth.denied_response)
|
|
|
|
|
2013-10-25 08:59:37 +02:00
|
|
|
def test_auth_reseller_prefix_with_s3_deny(self):
|
|
|
|
# Ensures that when we have a reseller prefix and using a middleware
|
|
|
|
# relying on Http-Authorization (for example swift3), we don't deny a
|
|
|
|
# request outright but set up a denial swift.authorize and pass the
|
|
|
|
# request on down the chain.
|
|
|
|
local_app = FakeApp()
|
|
|
|
local_auth = auth.filter_factory({'reseller_prefix': 'PRE'})(local_app)
|
|
|
|
req = self._make_request('/v1/account',
|
|
|
|
headers={'X-Auth-Token': 't',
|
|
|
|
'Authorization': 'AWS user:pw'})
|
|
|
|
resp = req.get_response(local_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
self.assertEquals(local_app.calls, 1)
|
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
|
|
|
local_auth.denied_response)
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_auth_no_reseller_prefix_no_token(self):
|
|
|
|
# Check that normally we set up a call back to our authorize.
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
local_auth = auth.filter_factory({'reseller_prefix': ''})(FakeApp())
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account')
|
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="account"')
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'],
|
2011-05-26 02:17:42 +00:00
|
|
|
local_auth.authorize)
|
|
|
|
# Now make sure we don't override an existing swift.authorize when we
|
|
|
|
# have no reseller prefix.
|
|
|
|
local_auth = \
|
|
|
|
auth.filter_factory({'reseller_prefix': ''})(FakeApp())
|
|
|
|
local_authorize = lambda req: Response('test')
|
2012-06-06 03:39:53 +09:00
|
|
|
req = self._make_request('/v1/account', environ={'swift.authorize':
|
2012-10-11 16:52:26 -05:00
|
|
|
local_authorize})
|
2012-06-06 03:39:53 +09:00
|
|
|
resp = req.get_response(local_auth)
|
2011-05-26 02:17:42 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
2012-06-06 03:39:53 +09:00
|
|
|
self.assertEquals(req.environ['swift.authorize'], local_authorize)
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_auth_fail(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/v1/AUTH_cfa',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-Token': 'AUTH_t'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_authorize_bad_path(self):
|
|
|
|
req = self._make_request('/badpath')
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="unknown"')
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/badpath')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_authorize_account_access(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_authorize_acl_group_access(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth = auth.filter_factory({})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 3)))
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act:usr'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act2'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = 'act:usr2'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_deny_cross_reseller(self):
|
|
|
|
# Tests that cross-reseller is denied, even if ACLs/group names match
|
|
|
|
req = self._make_request('/v1/OTHER_cfa')
|
|
|
|
req.remote_user = 'act:usr,act,AUTH_cfa'
|
|
|
|
req.acl = 'act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
2013-06-25 16:43:37 +08:00
|
|
|
def test_authorize_acl_referer_after_user_groups(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr'
|
|
|
|
req.acl = '.r:*,act:usr'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_authorize_acl_referrer_access(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth = auth.filter_factory({})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 6)))
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:*,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:*' # No listings allowed
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
req.referer = 'http://www.example.com/index.html'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:*,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:*' # No listings allowed
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_cfa/c')
|
|
|
|
req.referer = 'http://www.example.com/index.html'
|
|
|
|
req.acl = '.r:.example.com,.rlistings'
|
|
|
|
self.assertEquals(self.test_auth.authorize(req), None)
|
|
|
|
|
2013-03-08 19:33:27 +01:00
|
|
|
def test_detect_reseller_request(self):
|
|
|
|
req = self._make_request('/v1/AUTH_admin',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
|
|
cache_key = 'AUTH_/token/AUTH_t'
|
2013-08-31 22:36:58 -04:00
|
|
|
cache_entry = (time() + 3600, '.reseller_admin')
|
2013-03-08 19:33:27 +01:00
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
2013-03-26 20:42:26 +00:00
|
|
|
req.get_response(self.test_auth)
|
2013-03-08 19:33:27 +01:00
|
|
|
self.assertTrue(req.environ.get('reseller_request', False))
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_account_put_permissions(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth = auth.filter_factory({})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 4)))
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# Even PUTs to your own account as account admin should fail
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_old',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
|
|
# about
|
2011-06-03 00:11:32 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_account_delete_permissions(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth = auth.filter_factory({})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 4)))
|
2011-05-26 02:17:42 +00:00
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_other'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# Even DELETEs to your own account as account admin should fail
|
|
|
|
req = self._make_request('/v1/AUTH_old',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,AUTH_old'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.reseller_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
|
|
|
# .super_admin is not something the middleware should ever see or care
|
|
|
|
# about
|
|
|
|
req = self._make_request('/v1/AUTH_new',
|
2012-10-11 16:52:26 -05:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2011-05-26 02:17:42 +00:00
|
|
|
req.remote_user = 'act:usr,act,.super_admin'
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
def test_get_token_success(self):
|
|
|
|
# Example of how to simulate the auth transaction
|
|
|
|
test_auth = auth.filter_factory({'user_ac_user': 'testing'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'ac:user', 'X-Auth-Key': 'testing'})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertTrue(resp.headers['x-storage-url'].endswith('/v1/AUTH_ac'))
|
|
|
|
self.assertTrue(resp.headers['x-auth-token'].startswith('AUTH_'))
|
|
|
|
self.assertTrue(len(resp.headers['x-auth-token']) > 10)
|
|
|
|
|
|
|
|
def test_use_token_success(self):
|
|
|
|
# Example of how to simulate an authorized request
|
|
|
|
test_auth = auth.filter_factory({'user_acct_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 1)))
|
|
|
|
req = self._make_request('/v1/AUTH_acct',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
|
|
cache_key = 'AUTH_/token/AUTH_t'
|
|
|
|
cache_entry = (time() + 3600, 'AUTH_acct')
|
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
def test_get_token_fail(self):
|
|
|
|
resp = self._make_request('/auth/v1.0').get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="unknown"')
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1.0',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertTrue('Www-Authenticate' in resp.headers)
|
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="act"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_get_token_fail_invalid_x_auth_user_format(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="act"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_get_token_fail_non_matching_account_in_request(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act2:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="act"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
|
|
|
def test_get_token_fail_bad_path(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth/invalid',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr',
|
|
|
|
'X-Auth-Key': 'key'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_get_token_fail_missing_key(self):
|
2012-10-11 16:52:26 -05:00
|
|
|
resp = self._make_request(
|
|
|
|
'/auth/v1/act/auth',
|
2011-05-26 02:17:42 +00:00
|
|
|
headers={'X-Auth-User': 'act:usr'}).get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="act"')
|
2011-05-26 02:17:42 +00:00
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
def test_object_name_containing_slash(self):
|
|
|
|
test_auth = auth.filter_factory({'user_acct_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 1)))
|
|
|
|
req = self._make_request('/v1/AUTH_acct/cont/obj/name/with/slash',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
|
|
|
cache_key = 'AUTH_/token/AUTH_t'
|
|
|
|
cache_entry = (time() + 3600, 'AUTH_acct')
|
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2012-11-10 16:39:25 +00:00
|
|
|
def test_storage_url_default(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
del req.environ['HTTP_HOST']
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'http://bob:1234/v1/AUTH_test')
|
|
|
|
|
|
|
|
def test_storage_url_based_on_host(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'http://somehost:5678/v1/AUTH_test')
|
|
|
|
|
2013-12-05 15:31:09 -05:00
|
|
|
def test_storage_url_overridden_scheme(self):
|
2012-11-10 16:39:25 +00:00
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing',
|
|
|
|
'storage_url_scheme': 'fake'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-storage-url'],
|
|
|
|
'fake://somehost:5678/v1/AUTH_test')
|
|
|
|
|
2013-07-16 16:28:32 +08:00
|
|
|
def test_use_old_token_from_memcached(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing',
|
|
|
|
'storage_url_scheme': 'fake'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
req.environ['swift.cache'].set('AUTH_/user/test:tester', 'uuid_token')
|
|
|
|
req.environ['swift.cache'].set('AUTH_/token/uuid_token',
|
|
|
|
(time() + 180, 'test,test:tester'))
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['x-auth-token'], 'uuid_token')
|
|
|
|
|
|
|
|
def test_old_token_overdate(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing',
|
|
|
|
'storage_url_scheme': 'fake'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
req.environ['swift.cache'].set('AUTH_/user/test:tester', 'uuid_token')
|
|
|
|
req.environ['swift.cache'].set('AUTH_/token/uuid_token',
|
|
|
|
(0, 'test,test:tester'))
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertNotEquals(resp.headers['x-auth-token'], 'uuid_token')
|
|
|
|
self.assertEquals(resp.headers['x-auth-token'][:7], 'AUTH_tk')
|
|
|
|
|
|
|
|
def test_old_token_with_old_data(self):
|
|
|
|
self.test_auth = \
|
|
|
|
auth.filter_factory({'user_test_tester': 'testing',
|
|
|
|
'storage_url_scheme': 'fake'})(FakeApp())
|
|
|
|
req = self._make_request(
|
|
|
|
'/auth/v1.0',
|
|
|
|
headers={'X-Auth-User': 'test:tester', 'X-Auth-Key': 'testing'})
|
|
|
|
req.environ['HTTP_HOST'] = 'somehost:5678'
|
|
|
|
req.environ['SERVER_NAME'] = 'bob'
|
|
|
|
req.environ['SERVER_PORT'] = '1234'
|
|
|
|
req.environ['swift.cache'].set('AUTH_/user/test:tester', 'uuid_token')
|
|
|
|
req.environ['swift.cache'].set('AUTH_/token/uuid_token',
|
|
|
|
(time() + 99, 'test,test:tester,.role'))
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertNotEquals(resp.headers['x-auth-token'], 'uuid_token')
|
|
|
|
self.assertEquals(resp.headers['x-auth-token'][:7], 'AUTH_tk')
|
|
|
|
|
2011-06-03 00:11:32 +00:00
|
|
|
def test_reseller_admin_is_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
|
|
|
req = self._make_request('/v1/AUTH_cfa',
|
2012-10-11 16:52:26 -05:00
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = '.reseller_admin'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [True])
|
|
|
|
|
|
|
|
def test_admin_is_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = 'AUTH_cfa'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [True])
|
|
|
|
|
|
|
|
def test_regular_is_not_owner(self):
|
|
|
|
orig_authorize = self.test_auth.authorize
|
|
|
|
owner_values = []
|
|
|
|
|
|
|
|
def mitm_authorize(req):
|
|
|
|
rv = orig_authorize(req)
|
|
|
|
owner_values.append(req.environ.get('swift_owner', False))
|
|
|
|
return rv
|
|
|
|
|
|
|
|
self.test_auth.authorize = mitm_authorize
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c',
|
|
|
|
headers={'X-Auth-Token': 'AUTH_t'})
|
2011-06-03 00:11:32 +00:00
|
|
|
req.remote_user = 'act:usr'
|
|
|
|
self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(owner_values, [False])
|
|
|
|
|
|
|
|
def test_sync_request_success(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(iter(NO_CONTENT_RESP * 1),
|
2011-06-03 00:11:32 +00:00
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
def test_sync_request_fail_key(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'wrongsecret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-06-03 00:11:32 +00:00
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(sync_key='othersecret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-06-03 00:11:32 +00:00
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(sync_key=None)
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-06-03 00:11:32 +00:00
|
|
|
|
|
|
|
def test_sync_request_fail_no_timestamp(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret'})
|
|
|
|
req.remote_addr = '127.0.0.1'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
2013-08-23 15:03:08 +01:00
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="AUTH_cfa"')
|
2011-06-03 00:11:32 +00:00
|
|
|
|
|
|
|
def test_sync_request_success_lb_sync_host(self):
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(iter(NO_CONTENT_RESP * 1),
|
2011-06-03 00:11:32 +00:00
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456',
|
|
|
|
'x-forwarded-for': '127.0.0.1'})
|
|
|
|
req.remote_addr = '127.0.0.2'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
self.test_auth.app = FakeApp(iter(NO_CONTENT_RESP * 1),
|
2011-06-03 00:11:32 +00:00
|
|
|
sync_key='secret')
|
2012-10-11 16:52:26 -05:00
|
|
|
req = self._make_request(
|
|
|
|
'/v1/AUTH_cfa/c/o',
|
2011-06-03 00:11:32 +00:00
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'x-container-sync-key': 'secret',
|
|
|
|
'x-timestamp': '123.456',
|
|
|
|
'x-cluster-client-ip': '127.0.0.1'})
|
|
|
|
req.remote_addr = '127.0.0.2'
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2012-10-11 16:52:26 -05:00
|
|
|
def test_options_call(self):
|
|
|
|
req = self._make_request('/v1/AUTH_cfa/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'OPTIONS'})
|
|
|
|
resp = self.test_auth.authorize(req)
|
|
|
|
self.assertEquals(resp, None)
|
|
|
|
|
2013-07-16 16:28:32 +08:00
|
|
|
def test_get_user_group(self):
|
|
|
|
app = FakeApp()
|
|
|
|
ath = auth.filter_factory({})(app)
|
|
|
|
|
|
|
|
ath.users = {'test:tester': {'groups': ['.admin']}}
|
|
|
|
groups = ath._get_user_groups('test', 'test:tester', 'AUTH_test')
|
|
|
|
self.assertEquals(groups, 'test,test:tester,AUTH_test')
|
|
|
|
|
|
|
|
ath.users = {'test:tester': {'groups': []}}
|
|
|
|
groups = ath._get_user_groups('test', 'test:tester', 'AUTH_test')
|
|
|
|
self.assertEquals(groups, 'test,test:tester')
|
|
|
|
|
2013-08-23 15:03:08 +01:00
|
|
|
def test_auth_scheme(self):
|
|
|
|
req = self._make_request('/v1/BLAH_account',
|
|
|
|
headers={'X-Auth-Token': 'BLAH_t'})
|
|
|
|
resp = req.get_response(self.test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 401)
|
|
|
|
self.assertTrue('Www-Authenticate' in resp.headers)
|
|
|
|
self.assertEquals(resp.headers.get('Www-Authenticate'),
|
|
|
|
'Swift realm="BLAH_account"')
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
|
2011-06-21 21:53:48 +02:00
|
|
|
class TestParseUserCreation(unittest.TestCase):
|
|
|
|
def test_parse_user_creation(self):
|
|
|
|
auth_filter = auth.filter_factory({
|
2012-10-01 21:43:34 -07:00
|
|
|
'reseller_prefix': 'ABC',
|
2011-06-21 21:53:48 +02:00
|
|
|
'user_test_tester3': 'testing',
|
2012-10-01 21:43:34 -07:00
|
|
|
'user_has_url': 'urlly .admin http://a.b/v1/DEF_has',
|
2011-06-21 21:53:48 +02:00
|
|
|
'user_admin_admin': 'admin .admin .reseller_admin',
|
|
|
|
})(FakeApp())
|
|
|
|
self.assertEquals(auth_filter.users, {
|
|
|
|
'admin:admin': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_admin',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': ['.admin', '.reseller_admin'],
|
2011-06-21 21:53:48 +02:00
|
|
|
'key': 'admin'
|
|
|
|
}, 'test:tester3': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_test',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': [],
|
2011-06-21 21:53:48 +02:00
|
|
|
'key': 'testing'
|
2012-10-01 21:43:34 -07:00
|
|
|
}, 'has:url': {
|
|
|
|
'url': 'http://a.b/v1/DEF_has',
|
|
|
|
'groups': ['.admin'],
|
|
|
|
'key': 'urlly'
|
2011-06-21 21:53:48 +02:00
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2012-10-01 21:43:34 -07:00
|
|
|
def test_base64_encoding(self):
|
|
|
|
auth_filter = auth.filter_factory({
|
|
|
|
'reseller_prefix': 'ABC',
|
|
|
|
'user64_%s_%s' % (
|
|
|
|
b64encode('test').rstrip('='),
|
|
|
|
b64encode('tester3').rstrip('=')):
|
2012-10-11 16:52:26 -05:00
|
|
|
'testing .reseller_admin',
|
2012-10-01 21:43:34 -07:00
|
|
|
'user64_%s_%s' % (
|
|
|
|
b64encode('user_foo').rstrip('='),
|
|
|
|
b64encode('ab').rstrip('=')):
|
2012-10-11 16:52:26 -05:00
|
|
|
'urlly .admin http://a.b/v1/DEF_has',
|
2012-10-01 21:43:34 -07:00
|
|
|
})(FakeApp())
|
|
|
|
self.assertEquals(auth_filter.users, {
|
|
|
|
'test:tester3': {
|
2012-11-10 16:39:25 +00:00
|
|
|
'url': '$HOST/v1/ABC_test',
|
2012-10-01 21:43:34 -07:00
|
|
|
'groups': ['.reseller_admin'],
|
|
|
|
'key': 'testing'
|
|
|
|
}, 'user_foo:ab': {
|
|
|
|
'url': 'http://a.b/v1/DEF_has',
|
|
|
|
'groups': ['.admin'],
|
|
|
|
'key': 'urlly'
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
def test_key_with_no_value(self):
|
|
|
|
self.assertRaises(ValueError, auth.filter_factory({
|
|
|
|
'user_test_tester3': 'testing',
|
|
|
|
'user_bob_bobby': '',
|
|
|
|
'user_admin_admin': 'admin .admin .reseller_admin',
|
|
|
|
}), FakeApp())
|
|
|
|
|
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
class TestAccountAcls(unittest.TestCase):
|
|
|
|
def _make_request(self, path, **kwargs):
|
|
|
|
# Our TestAccountAcls default request will have a valid auth token
|
|
|
|
version, acct, _ = split_path(path, 1, 3, True)
|
|
|
|
headers = kwargs.pop('headers', {'X-Auth-Token': 'AUTH_t'})
|
|
|
|
user_groups = kwargs.pop('user_groups', 'AUTH_firstacct')
|
|
|
|
|
|
|
|
# The account being accessed will have account ACLs
|
|
|
|
acl = {'admin': ['AUTH_admin'], 'read-write': ['AUTH_rw'],
|
|
|
|
'read-only': ['AUTH_ro']}
|
|
|
|
header_data = {'core-access-control':
|
|
|
|
format_acl(version=2, acl_dict=acl)}
|
|
|
|
acls = kwargs.pop('acls', header_data)
|
|
|
|
|
|
|
|
req = Request.blank(path, headers=headers, **kwargs)
|
|
|
|
|
|
|
|
# Authorize the token by populating the request's cache
|
|
|
|
req.environ['swift.cache'] = FakeMemcache()
|
|
|
|
cache_key = 'AUTH_/token/AUTH_t'
|
|
|
|
cache_entry = (time() + 3600, user_groups)
|
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
|
|
|
|
|
|
|
# Pretend get_account_info returned ACLs in sysmeta, and we cached that
|
|
|
|
cache_key = 'account/%s' % acct
|
|
|
|
cache_entry = {'sysmeta': acls}
|
|
|
|
req.environ['swift.cache'].set(cache_key, cache_entry)
|
|
|
|
|
|
|
|
return req
|
|
|
|
|
|
|
|
def test_account_acl_success(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 1)))
|
|
|
|
|
|
|
|
# admin (not a swift admin) wants to read from otheracct
|
|
|
|
req = self._make_request('/v1/AUTH_otheract', user_groups="AUTH_admin")
|
|
|
|
|
|
|
|
# The request returned by _make_request should be allowed
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
def test_account_acl_failures(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
|
|
|
FakeApp())
|
|
|
|
|
|
|
|
# If I'm not authed as anyone on the ACLs, I shouldn't get in
|
|
|
|
req = self._make_request('/v1/AUTH_otheract', user_groups="AUTH_bob")
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# If the target account has no ACLs, a non-owner shouldn't get in
|
|
|
|
req = self._make_request('/v1/AUTH_otheract', user_groups="AUTH_admin",
|
|
|
|
acls={})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
def test_admin_privileges(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 18)))
|
|
|
|
|
|
|
|
for target in ('/v1/AUTH_otheracct', '/v1/AUTH_otheracct/container',
|
|
|
|
'/v1/AUTH_otheracct/container/obj'):
|
|
|
|
for method in ('GET', 'HEAD', 'OPTIONS', 'PUT', 'POST', 'DELETE'):
|
|
|
|
# Admin ACL user can do anything
|
|
|
|
req = self._make_request(target, user_groups="AUTH_admin",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
# swift_owner should be set to True
|
|
|
|
if method != 'OPTIONS':
|
|
|
|
self.assertTrue(req.environ.get('swift_owner'))
|
|
|
|
|
|
|
|
def test_readwrite_privileges(self):
|
|
|
|
test_auth = auth.filter_factory({'user_rw_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 15)))
|
|
|
|
|
|
|
|
for target in ('/v1/AUTH_otheracct',):
|
|
|
|
for method in ('GET', 'HEAD', 'OPTIONS'):
|
|
|
|
# Read-Write user can read account data
|
|
|
|
req = self._make_request(target, user_groups="AUTH_rw",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
# swift_owner should NOT be set to True
|
|
|
|
self.assertFalse(req.environ.get('swift_owner'))
|
|
|
|
|
|
|
|
# RW user should NOT be able to PUT, POST, or DELETE to the account
|
|
|
|
for method in ('PUT', 'POST', 'DELETE'):
|
|
|
|
req = self._make_request(target, user_groups="AUTH_rw",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
|
|
|
|
# RW user should be able to GET, PUT, POST, or DELETE to containers
|
|
|
|
# and objects
|
|
|
|
for target in ('/v1/AUTH_otheracct/c', '/v1/AUTH_otheracct/c/o'):
|
|
|
|
for method in ('GET', 'HEAD', 'OPTIONS', 'PUT', 'POST', 'DELETE'):
|
|
|
|
req = self._make_request(target, user_groups="AUTH_rw",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
def test_readonly_privileges(self):
|
|
|
|
test_auth = auth.filter_factory({'user_ro_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 9)))
|
|
|
|
|
|
|
|
# ReadOnly user should NOT be able to PUT, POST, or DELETE to account,
|
|
|
|
# container, or object
|
|
|
|
for target in ('/v1/AUTH_otheracct', '/v1/AUTH_otheracct/cont',
|
|
|
|
'/v1/AUTH_otheracct/cont/obj'):
|
|
|
|
for method in ('GET', 'HEAD', 'OPTIONS'):
|
|
|
|
req = self._make_request(target, user_groups="AUTH_ro",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
# swift_owner should NOT be set to True for the ReadOnly ACL
|
|
|
|
self.assertFalse(req.environ.get('swift_owner'))
|
|
|
|
for method in ('PUT', 'POST', 'DELETE'):
|
|
|
|
req = self._make_request(target, user_groups="AUTH_ro",
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 403)
|
|
|
|
# swift_owner should NOT be set to True for the ReadOnly ACL
|
|
|
|
self.assertFalse(req.environ.get('swift_owner'))
|
|
|
|
|
|
|
|
def test_user_gets_best_acl(self):
|
|
|
|
test_auth = auth.filter_factory({'user_acct_username': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 18)))
|
|
|
|
|
|
|
|
mygroups = "AUTH_acct,AUTH_ro,AUTH_something,AUTH_admin"
|
|
|
|
for target in ('/v1/AUTH_otheracct', '/v1/AUTH_otheracct/container',
|
|
|
|
'/v1/AUTH_otheracct/container/obj'):
|
|
|
|
for method in ('GET', 'HEAD', 'OPTIONS', 'PUT', 'POST', 'DELETE'):
|
|
|
|
# Admin ACL user can do anything
|
|
|
|
req = self._make_request(target, user_groups=mygroups,
|
|
|
|
environ={'REQUEST_METHOD': method})
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(
|
|
|
|
resp.status_int, 204, "%s (%s) - expected 204, got %d" %
|
|
|
|
(target, method, resp.status_int))
|
|
|
|
|
|
|
|
# swift_owner should be set to True
|
|
|
|
if method != 'OPTIONS':
|
|
|
|
self.assertTrue(req.environ.get('swift_owner'))
|
|
|
|
|
|
|
|
def test_acl_syntax_verification(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
2014-02-18 14:07:37 +00:00
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 5)))
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
|
|
|
|
good_headers = {'X-Auth-Token': 'AUTH_t'}
|
|
|
|
good_acl = '{"read-only":["a","b"]}'
|
|
|
|
bad_acl = 'syntactically invalid acl -- this does not parse as JSON'
|
|
|
|
wrong_acl = '{"other-auth-system":["valid","json","but","wrong"]}'
|
|
|
|
bad_value_acl = '{"read-write":["fine"],"admin":"should be a list"}'
|
2014-02-18 14:07:37 +00:00
|
|
|
not_dict_acl = '["read-only"]'
|
|
|
|
not_dict_acl2 = 1
|
|
|
|
empty_acls = ['{}', '', '{ }']
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
target = '/v1/AUTH_firstacct'
|
|
|
|
|
|
|
|
# no acls -- no problem!
|
|
|
|
req = self._make_request(target, headers=good_headers)
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
# syntactically valid acls should go through
|
|
|
|
update = {'x-account-access-control': good_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2014-02-18 14:07:37 +00:00
|
|
|
# syntactically valid empty acls should go through
|
|
|
|
for acl in empty_acls:
|
|
|
|
update = {'x-account-access-control': acl}
|
|
|
|
req = self._make_request(target,
|
|
|
|
headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
errmsg = 'X-Account-Access-Control invalid: %s'
|
|
|
|
# syntactically invalid acls get a 400
|
|
|
|
update = {'x-account-access-control': bad_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertEquals(errmsg % "Syntax error", resp.body[:46])
|
|
|
|
|
|
|
|
# syntactically valid acls with bad keys also get a 400
|
|
|
|
update = {'x-account-access-control': wrong_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertEquals(errmsg % "Key '", resp.body[:39])
|
|
|
|
|
|
|
|
# acls with good keys but bad values also get a 400
|
|
|
|
update = {'x-account-access-control': bad_value_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertEquals(errmsg % "Value", resp.body[:39])
|
|
|
|
|
2014-02-18 14:07:37 +00:00
|
|
|
# acls with wrong json structure also get a 400
|
|
|
|
update = {'x-account-access-control': not_dict_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertEquals(errmsg % "Syntax error", resp.body[:46])
|
|
|
|
|
|
|
|
# acls with wrong json structure also get a 400
|
|
|
|
update = {'x-account-access-control': not_dict_acl2}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertEquals(errmsg % "Syntax error", resp.body[:46])
|
|
|
|
|
Privileged acct ACL header, new ACL syntax, TempAuth impl.
* Introduce a new privileged account header: X-Account-Access-Control
* Introduce JSON-based version 2 ACL syntax -- see below for discussion
* Implement account ACL authorization in TempAuth
X-Account-Access-Control Header
-------------------------------
Accounts now have a new privileged header to represent ACLs or any other
form of account-level access control. The value of the header is an opaque
string to be interpreted by the auth system, but it must be a JSON-encoded
dictionary. A reference implementation is given in TempAuth, with the
knowledge that historically other auth systems often use TempAuth as a
starting point.
The reference implementation describes three levels of account access:
"admin", "read-write", and "read-only". Adding new access control
features in a future patch (e.g. "write-only" account access) will
automatically be forward- and backward-compatible, due to the JSON
dictionary header format.
The privileged X-Account-Access-Control header may only be read or written
by a user with "swift_owner" status, traditionally the account owner but
now also any user on the "admin" ACL.
Access Levels:
Read-only access is intended to indicate to the auth system that this
list of identities can read everything (except privileged headers) in
the account. Specifically, a user with read-only account access can get
a list of containers in the account, list the contents of any container,
retrieve any object, and see the (non-privileged) headers of the
account, any container, or any object.
Read-write access is intended to indicate to the auth system that this
list of identities can read or write (or create) any container. A user
with read-write account access can create new containers, set any
unprivileged container headers, overwrite objects, delete containers,
etc. A read-write user can NOT set account headers (or perform any
PUT/POST/DELETE requests on the account).
Admin access is intended to indicate to the auth system that this list of
identities has "swift_owner" privileges. A user with admin account access
can do anything the account owner can, including setting account headers
and any privileged headers -- and thus changing the value of
X-Account-Access-Control and thereby granting read-only, read-write, or
admin access to other users.
The auth system is responsible for making decisions based on this header,
if it chooses to support its use. Therefore the above access level
descriptions are necessarily advisory only for other auth systems.
When setting the value of the header, callers are urged to use the new
format_acl() method, described below.
New ACL Format
--------------
The account ACLs introduce a new format for ACLs, rather than reusing the
existing format from X-Container-Read/X-Container-Write. There are several
reasons for this:
* Container ACL format does not support Unicode
* Container ACLs have a different structure than account ACLs
+ account ACLs have no concept of referrers or rlistings
+ accounts have additional "admin" access level
+ account access levels are structured as admin > rw > ro, which seems more
appropriate for how people access accounts, rather than reusing
container ACLs' orthogonal read and write access
In addition, the container ACL syntax is a bit arbitrary and highly custom,
so instead of parsing additional custom syntax, I'd rather propose a next
version and introduce a means for migration. The V2 ACL syntax has the
following benefits:
* JSON is a well-known standard syntax with parsers in all languages
* no artificial value restrictions (you can grant access to a user named
".rlistings" if you want)
* forward and backward compatibility: you may have extraneous keys, but
your attempt to parse the header won't raise an exception
I've introduced hooks in parse_acl and format_acl which currently default
to the old V1 syntax but tolerate the V2 syntax and can easily be flipped
to default to V2. I'm not changing the default or adding code to rewrite
V1 ACLs to V2, because this patch has suffered a lot of scope creep already,
but this seems like a sensible milestone in the migration.
TempAuth Account ACL Implementation
-----------------------------------
As stated above, core Swift is responsible for privileging the
X-Account-Access-Control header (making it only accessible to swift_owners),
for translating it to -sysmeta-* headers to trigger persistence by the
account server, and for including the header in the responses to requests
by privileged users. Core Swift puts no expectation on the *content* of
this header. Auth systems (including TempAuth) are responsible for
defining the content of the header and taking action based on it.
In addition to the changes described above, this patch defines a format
to be used by TempAuth for these headers in the common.middleware.acl
module, in the methods format_v2_acl() and parse_v2_acl(). This patch
also teaches TempAuth to take action based on the header contents. TempAuth
now sets swift_owner=True if the user is on the Admin ACL, authorizes
GET/HEAD/OPTIONS requests if the user is on any ACL, authorizes
PUT/POST/DELETE requests if the user is on the admin or read-write ACL, etc.
Note that the action of setting swift_owner=True triggers core Swift to
add or strip the privileged headers from the responses. Core Swift (not
the auth system) is responsible for that.
DocImpact: Documentation for the new ACL usage and format appears in
summary form in doc/source/overview_auth.rst, and in more detail in
swift/common/middleware/tempauth.py in the TempAuth class docstring.
I leave it to the Swift doc team to determine whether more is needed.
Change-Id: I836a99eaaa6bb0e92dc03e1ca46a474522e6e826
2013-11-13 20:55:14 +00:00
|
|
|
def test_acls_propagate_to_sysmeta(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 3)))
|
|
|
|
|
|
|
|
sysmeta_hdr = 'x-account-sysmeta-core-access-control'
|
|
|
|
target = '/v1/AUTH_firstacct'
|
|
|
|
good_headers = {'X-Auth-Token': 'AUTH_t'}
|
|
|
|
good_acl = '{"read-only":["a","b"]}'
|
|
|
|
|
|
|
|
# no acls -- no problem!
|
|
|
|
req = self._make_request(target, headers=good_headers)
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
self.assertEqual(None, req.headers.get(sysmeta_hdr))
|
|
|
|
|
|
|
|
# syntactically valid acls should go through
|
|
|
|
update = {'x-account-access-control': good_acl}
|
|
|
|
req = self._make_request(target, headers=dict(good_headers, **update))
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
self.assertEqual(good_acl, req.headers.get(sysmeta_hdr))
|
|
|
|
|
|
|
|
def test_bad_acls_get_denied(self):
|
|
|
|
test_auth = auth.filter_factory({'user_admin_user': 'testing'})(
|
|
|
|
FakeApp(iter(NO_CONTENT_RESP * 3)))
|
|
|
|
|
|
|
|
target = '/v1/AUTH_firstacct'
|
|
|
|
good_headers = {'X-Auth-Token': 'AUTH_t'}
|
|
|
|
bad_acls = (
|
|
|
|
'syntax error',
|
|
|
|
'{"bad_key":"should_fail"}',
|
|
|
|
'{"admin":"not a list, should fail"}',
|
|
|
|
'{"admin":["valid"],"read-write":"not a list, should fail"}',
|
|
|
|
)
|
|
|
|
|
|
|
|
for bad_acl in bad_acls:
|
|
|
|
hdrs = dict(good_headers, **{'x-account-access-control': bad_acl})
|
|
|
|
req = self._make_request(target, headers=hdrs)
|
|
|
|
resp = req.get_response(test_auth)
|
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
|
|
|
|
class TestUtilityMethods(unittest.TestCase):
|
|
|
|
def test_account_acls_bad_path_raises_exception(self):
|
|
|
|
auth_inst = auth.filter_factory({})(FakeApp())
|
|
|
|
req = Request({'PATH_INFO': '/'})
|
|
|
|
self.assertRaises(ValueError, auth_inst.account_acls, req)
|
|
|
|
|
2011-05-26 02:17:42 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|