1. support mypy check, tox -e mypy or tox -e pep8 2. fix error of mypy check Change-Id: I41b0013d271f3c7d3a28e1ea6dd0b083893d8983
123 lines
4.2 KiB
Python
123 lines
4.2 KiB
Python
# Copyright 2021 99cloud
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
from __future__ import annotations
|
|
|
|
from collections.abc import MutableMapping
|
|
from typing import Any, Dict, Iterator, List, Union
|
|
|
|
import attr
|
|
from immutables import Map
|
|
from keystoneauth1.access.access import AccessInfoV3
|
|
from oslo_policy._checks import _check
|
|
|
|
from skyline_apiserver.config import CONF
|
|
|
|
from .manager.base import APIRule, Rule
|
|
|
|
|
|
class UserContext(MutableMapping):
|
|
def __init__(
|
|
self,
|
|
access: AccessInfoV3,
|
|
):
|
|
self._data: Dict[str, Any] = {}
|
|
self.access = access
|
|
self._data.setdefault("auth_token", getattr(access, "auth_token", None))
|
|
self._data.setdefault("user_id", getattr(access, "user_id", None))
|
|
self._data.setdefault("project_id", getattr(access, "project_id", None))
|
|
self._data.setdefault("domain_id", getattr(access, "domain_id", None))
|
|
self._data.setdefault("user_domain_id", getattr(access, "user_domain_id", None))
|
|
self._data.setdefault("project_domain_id", getattr(access, "project_domain_id", None))
|
|
self._data.setdefault("username", getattr(access, "username", None))
|
|
self._data.setdefault("project_name", getattr(access, "project_name", None))
|
|
self._data.setdefault("domain_name", getattr(access, "domain_name", None))
|
|
self._data.setdefault("user_domain_name", getattr(access, "user_domain_name", None))
|
|
self._data.setdefault("project_domain_name", getattr(access, "project_domain_name", None))
|
|
self._data.setdefault(
|
|
"system_scope",
|
|
"all"
|
|
if getattr(access, "system") and getattr(access, "system", {}).get("all", False)
|
|
else "",
|
|
)
|
|
self._data.setdefault("role_ids", getattr(access, "role_ids", []))
|
|
self._data.setdefault("roles", getattr(access, "role_names", []))
|
|
|
|
is_admin = False
|
|
for role in CONF.openstack.system_admin_roles:
|
|
if role in self._data["roles"]:
|
|
is_admin = True
|
|
break
|
|
|
|
self._data.setdefault("is_admin", is_admin)
|
|
|
|
is_reader_admin = False
|
|
for role in CONF.openstack.system_reader_roles:
|
|
if role in self._data["roles"]:
|
|
is_reader_admin = True
|
|
break
|
|
|
|
self._data.setdefault("is_reader_admin", is_reader_admin)
|
|
|
|
def __getitem__(self, k: Any) -> Any:
|
|
return self._data[k]
|
|
|
|
def __setitem__(self, k: Any, v: Any) -> None:
|
|
self._data[k] = v
|
|
|
|
def __delitem__(self, k: Any) -> None:
|
|
del self._data[k]
|
|
|
|
def __iter__(self) -> Iterator[Any]:
|
|
return iter(self._data)
|
|
|
|
def __len__(self) -> int:
|
|
return len(self._data)
|
|
|
|
def __str__(self) -> str:
|
|
return self._data.__str__()
|
|
|
|
def __repr__(self) -> str:
|
|
return self._data.__repr__()
|
|
|
|
|
|
@attr.s(kw_only=True, repr=True, frozen=False, slots=True, auto_attribs=True)
|
|
class Enforcer:
|
|
rules: Map = attr.ib(factory=Map, repr=True, init=False)
|
|
|
|
def register_rules(self, rules: List[Union[Rule, APIRule]]) -> None:
|
|
rule_map = {}
|
|
for rule in rules:
|
|
if rule.name in rule_map:
|
|
raise ValueError(f"Duplicate policy rule {rule.name}.")
|
|
|
|
rule_map[rule.name] = rule.basic_check
|
|
|
|
self.rules = Map(rule_map)
|
|
|
|
def authorize(self, rule: str, target: Dict[str, Any], context: UserContext) -> bool:
|
|
result = False
|
|
do_check = self.rules.get(rule)
|
|
if do_check is None:
|
|
raise ValueError(f"Policy {rule} not registered.")
|
|
|
|
result = _check(
|
|
rule=do_check,
|
|
target=target,
|
|
creds=context,
|
|
enforcer=self,
|
|
current_rule=rule,
|
|
)
|
|
return result
|