1
|
|
|
# -*- coding: utf-8 -*- |
2
|
|
|
# |
3
|
|
|
# Copyright (c) 2013-2016 Online SAS and Contributors. All Rights Reserved. |
4
|
|
|
# Julien Castets <[email protected]> |
5
|
|
|
# Romain Gay <[email protected]> |
6
|
|
|
# Kevin Deldycke <[email protected]> |
7
|
|
|
# |
8
|
|
|
# Licensed under the BSD 2-Clause License (the "License"); you may not use this |
9
|
|
|
# file except in compliance with the License. You may obtain a copy of the |
10
|
|
|
# License at https://opensource.org/licenses/BSD-2-Clause |
11
|
|
|
|
12
|
|
|
import slumber |
13
|
|
|
from six.moves import zip_longest |
14
|
|
|
|
15
|
|
|
from . import API |
16
|
|
|
|
17
|
|
|
|
18
|
|
|
class InvalidToken(Exception): |
19
|
|
|
pass |
20
|
|
|
|
21
|
|
|
|
22
|
|
|
class ExpiredToken(InvalidToken): |
23
|
|
|
pass |
24
|
|
|
|
25
|
|
|
|
26
|
|
|
class BadToken(InvalidToken): |
27
|
|
|
pass |
28
|
|
|
|
29
|
|
|
|
30
|
|
|
class AccountAPI(API): |
31
|
|
|
""" Interacts with Scaleway Account API. |
32
|
|
|
""" |
33
|
|
|
base_url = 'https://account.scaleway.com/' |
34
|
|
|
|
35
|
|
|
def perm_matches(self, request_perm, effective_perm): |
36
|
|
|
""" Evaluates whether `request_perm` is granted by `effective_perm`. |
37
|
|
|
|
38
|
|
|
Permissions are string separated by semi-colon characters. |
39
|
|
|
Checking of permissions is performed from left to right and stops at |
40
|
|
|
the first mismatch between `effective_perm` and `request_perm`. |
41
|
|
|
|
42
|
|
|
The `*` character is used to match all permissions at a given step in |
43
|
|
|
the permission validation process. |
44
|
|
|
|
45
|
|
|
Examples: |
46
|
|
|
>>> perm_matches('request:auth:read', 'request:auth:*') |
47
|
|
|
True |
48
|
|
|
>>> perm_matches('request:auth:read', 'request:*') |
49
|
|
|
True |
50
|
|
|
>>> perm_matches('request:auth:read', 'request:log:*') |
51
|
|
|
False |
52
|
|
|
>>> perm_matches('request:log:write', 'request:log:read') |
53
|
|
|
False |
54
|
|
|
|
55
|
|
|
:param request_perm: Currently granted permissions |
56
|
|
|
:param effective_perm: Actual permission granted to the token |
57
|
|
|
""" |
58
|
|
|
if request_perm is None: |
59
|
|
|
return True |
60
|
|
|
|
61
|
|
|
request_perm_parts = request_perm.split(':') |
62
|
|
|
effective_perm_parts = effective_perm.split(':') |
63
|
|
|
|
64
|
|
|
for (request_perm_part, |
65
|
|
|
effective_perm_part) in zip_longest(request_perm_parts, |
66
|
|
|
effective_perm_parts): |
67
|
|
|
|
68
|
|
|
if ( |
69
|
|
|
request_perm_part != effective_perm_part and |
70
|
|
|
effective_perm_part != '*' and |
71
|
|
|
effective_perm_part is not None |
72
|
|
|
): |
73
|
|
|
return False |
74
|
|
|
|
75
|
|
|
return True |
76
|
|
|
|
77
|
|
|
def get_resources(self, service=None, name=None, resource=None, |
78
|
|
|
include_locked=False): |
79
|
|
|
""" Gets a list of resources for which the auth token is granted. |
80
|
|
|
|
81
|
|
|
The permissions of a token is the sum of: |
82
|
|
|
|
83
|
|
|
- token's permissions |
84
|
|
|
- user's permissions |
85
|
|
|
- user's roles permissions |
86
|
|
|
- token's roles permissions |
87
|
|
|
|
88
|
|
|
Roles are linked to organizations. |
89
|
|
|
|
90
|
|
|
This function doesn't return the permissions retrieved from locked |
91
|
|
|
organizations unless `include_locked` is True. Setting `include_lock` |
92
|
|
|
to True is useful when you need to check the permissions of a token, |
93
|
|
|
but don't care if the owner's organization is locked or not. |
94
|
|
|
|
95
|
|
|
Note: If you - the reader - are not a staff member, this pydoc might be |
96
|
|
|
a little confusing. Roles and permissions are not yet fully exposed by |
97
|
|
|
our APIs, but I promise we will try to expose and document them very |
98
|
|
|
soon. Anyway, if you have questions, we'll be glad to answer you guys! |
99
|
|
|
""" |
100
|
|
|
assert isinstance(include_locked, bool) |
101
|
|
|
|
102
|
|
|
if not self.auth_token: |
103
|
|
|
return [] |
104
|
|
|
|
105
|
|
|
# GET /tokens/:id/permissions on account-api |
106
|
|
|
try: |
107
|
|
|
response = self.query() \ |
108
|
|
|
.tokens(self.auth_token) \ |
109
|
|
|
.permissions.get(include_locked=include_locked) |
110
|
|
|
except slumber.exceptions.HttpClientError as exc: |
111
|
|
|
if exc.response.status_code in (400, 404): |
112
|
|
|
raise BadToken() |
113
|
|
|
|
114
|
|
|
if exc.response.status_code == 410: |
115
|
|
|
raise ExpiredToken() |
116
|
|
|
|
117
|
|
|
raise |
118
|
|
|
|
119
|
|
|
# Apply filters on effective permissions |
120
|
|
|
# |
121
|
|
|
# >>> print response.get('permissions') |
122
|
|
|
# { |
123
|
|
|
# 'service_name': { |
124
|
|
|
# 'perm_name': ['resource1', 'resource2', ...], |
125
|
|
|
# ... |
126
|
|
|
# }, |
127
|
|
|
# ... |
128
|
|
|
# } |
129
|
|
|
ret = [] |
130
|
|
|
|
131
|
|
|
for (eff_service_name, |
132
|
|
|
eff_service_perms) in response.get('permissions', {}).items(): |
133
|
|
|
|
134
|
|
|
# Filter on service |
135
|
|
|
if eff_service_name == service or service is None: |
136
|
|
|
|
137
|
|
|
# Filter on perms |
138
|
|
|
for (eff_perm_name, |
139
|
|
|
eff_perm_resources) in eff_service_perms.items(): |
140
|
|
|
|
141
|
|
|
if self.perm_matches(name, eff_perm_name): |
142
|
|
|
|
143
|
|
|
# Filter on resources |
144
|
|
|
ret.extend([ |
145
|
|
|
eff_perm_resource |
146
|
|
|
for eff_perm_resource in eff_perm_resources |
147
|
|
|
if self.perm_matches(resource, eff_perm_resource) |
148
|
|
|
]) |
149
|
|
|
|
150
|
|
|
return list(set(ret)) |
151
|
|
|
|
152
|
|
|
def has_perm(self, service=None, name=None, resource=None, |
153
|
|
|
include_locked=False): |
154
|
|
|
""" Checks if the token has a permission. |
155
|
|
|
""" |
156
|
|
|
return bool( |
157
|
|
|
self.get_resources(service=service, name=name, resource=resource, |
158
|
|
|
include_locked=include_locked) |
159
|
|
|
) |
160
|
|
|
|
161
|
|
|
def get_quotas(self, organization): |
162
|
|
|
""" Gets a list of quotas for the given organization. |
163
|
|
|
""" |
164
|
|
|
response = self.query().organizations(organization).quotas.get() |
165
|
|
|
return response['quotas'] |
166
|
|
|
|
167
|
|
|
def get_quota(self, organization, resource): |
168
|
|
|
""" Gets one quota for the given organization. |
169
|
|
|
""" |
170
|
|
|
quotas = self.get_quotas(organization) |
171
|
|
|
return quotas.get(resource) |
172
|
|
|
|
173
|
|
|
def has_quota(self, organization, resource, used=None): |
174
|
|
|
""" Checks if `organization` has the quota set for `resource`, and if |
175
|
|
|
`used` is not None, also checks if the quota value is higher than |
176
|
|
|
`used`. |
177
|
|
|
""" |
178
|
|
|
quotas = self.get_quotas(organization=organization) |
179
|
|
|
|
180
|
|
|
# Check if the quota is set |
181
|
|
|
quota_value = quotas.get(resource) |
182
|
|
|
if quota_value is None: |
183
|
|
|
return False |
184
|
|
|
|
185
|
|
|
# If `used` is not None, check it is lower than `quota_value` |
186
|
|
|
if used is not None and used >= quota_value: |
187
|
|
|
return False |
188
|
|
|
|
189
|
|
|
return True |
190
|
|
|
|