be42f2035a
This patch adds policy based Role Based Access Control to the Ceilometer V2 APIs. Validation/Enforcement of the policy is executed for the different controllers and hence it is possible to granularly control access. Co-Authored-By: Fabio Giannetti <fabio.giannetti@hp.com> Change-Id: I788b9b31c8cfba9f3caa19f1f6d465a3f81101ad
96 lines
3.0 KiB
Python
96 lines
3.0 KiB
Python
#
|
|
# Copyright 2012 New Dream Network, LLC (DreamHost)
|
|
# Copyright 2014 Hewlett-Packard Company
|
|
#
|
|
# Author: Doug Hellmann <doug.hellmann@dreamhost.com>
|
|
# Fabio Giannetti <fabio.giannetti@hp.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
"""Access Control Lists (ACL's) control access the API server."""
|
|
|
|
import pecan
|
|
|
|
from ceilometer.openstack.common import policy
|
|
|
|
_ENFORCER = None
|
|
|
|
|
|
def enforce(policy_name, request):
|
|
"""Return the user and project the request should be limited to.
|
|
|
|
:param request: HTTP request
|
|
:param policy_name: the policy name to validate authz against.
|
|
|
|
|
|
"""
|
|
global _ENFORCER
|
|
if not _ENFORCER:
|
|
_ENFORCER = policy.Enforcer()
|
|
_ENFORCER.load_rules()
|
|
|
|
rule_method = "telemetry:" + policy_name
|
|
headers = request.headers
|
|
|
|
policy_dict = dict()
|
|
policy_dict['roles'] = headers.get('X-Roles', "").split(",")
|
|
policy_dict['target.user_id'] = (headers.get('X-User-Id'))
|
|
policy_dict['target.project_id'] = (headers.get('X-Project-Id'))
|
|
|
|
for rule_name in _ENFORCER.rules.keys():
|
|
if rule_method == rule_name:
|
|
if not _ENFORCER.enforce(
|
|
rule_name,
|
|
{},
|
|
policy_dict):
|
|
pecan.core.abort(status_code=403,
|
|
detail='RBAC Authorization Failed')
|
|
|
|
|
|
# TODO(fabiog): these methods are still used because the scoping part is really
|
|
# convoluted and difficult to separate out.
|
|
|
|
def get_limited_to(headers):
|
|
"""Return the user and project the request should be limited to.
|
|
|
|
:param headers: HTTP headers dictionary
|
|
:return: A tuple of (user, project), set to None if there's no limit on
|
|
one of these.
|
|
|
|
"""
|
|
global _ENFORCER
|
|
if not _ENFORCER:
|
|
_ENFORCER = policy.Enforcer()
|
|
_ENFORCER.load_rules()
|
|
|
|
policy_dict = dict()
|
|
policy_dict['roles'] = headers.get('X-Roles', "").split(",")
|
|
policy_dict['target.user_id'] = (headers.get('X-User-Id'))
|
|
policy_dict['target.project_id'] = (headers.get('X-Project-Id'))
|
|
|
|
if not _ENFORCER.enforce('segregation',
|
|
{},
|
|
policy_dict):
|
|
return headers.get('X-User-Id'), headers.get('X-Project-Id')
|
|
return None, None
|
|
|
|
|
|
def get_limited_to_project(headers):
|
|
"""Return the project the request should be limited to.
|
|
|
|
:param headers: HTTP headers dictionary
|
|
:return: A project, or None if there's no limit on it.
|
|
|
|
"""
|
|
return get_limited_to(headers)[1]
|