110 lines
3.6 KiB
Python
110 lines
3.6 KiB
Python
# Copyright 2011-2014 OpenStack Foundation
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import copy
|
|
|
|
from keystoneauth1 import session
|
|
from keystoneauth1 import token_endpoint
|
|
from oslo_config import cfg
|
|
from oslo_context import context
|
|
|
|
from glance.api import policy
|
|
|
|
CONF = cfg.CONF
|
|
|
|
|
|
def get_ksa_client(context):
|
|
"""Returns a keystoneauth Adapter using token from context.
|
|
|
|
This will return a simple keystoneauth adapter that can be used to
|
|
make requests against a remote service using the token provided
|
|
(and already authenticated) from the user and stored in a
|
|
RequestContext.
|
|
|
|
:param context: User request context
|
|
:returns: keystoneauth1 Adapter object
|
|
"""
|
|
auth = token_endpoint.Token(CONF.keystone_authtoken.identity_uri,
|
|
context.auth_token)
|
|
return session.Session(auth=auth)
|
|
|
|
|
|
class RequestContext(context.RequestContext):
|
|
"""Stores information about the security context.
|
|
|
|
Stores how the user accesses the system, as well as additional request
|
|
information.
|
|
|
|
"""
|
|
|
|
def __init__(self, service_catalog=None, policy_enforcer=None, **kwargs):
|
|
# TODO(mriedem): Remove usage of user and tenant from old tests.
|
|
if 'tenant' in kwargs:
|
|
# Prefer project_id if passed, otherwise alias tenant as project_id
|
|
tenant = kwargs.pop('tenant')
|
|
kwargs['project_id'] = kwargs.get('project_id', tenant)
|
|
if 'user' in kwargs:
|
|
# Prefer user_id if passed, otherwise alias user as user_id
|
|
user = kwargs.pop('user')
|
|
kwargs['user_id'] = kwargs.get('user_id', user)
|
|
super(RequestContext, self).__init__(**kwargs)
|
|
self.service_catalog = service_catalog
|
|
self.policy_enforcer = policy_enforcer or policy.Enforcer()
|
|
if not self.is_admin:
|
|
self.is_admin = self.policy_enforcer.check_is_admin(self)
|
|
|
|
def to_dict(self):
|
|
d = super(RequestContext, self).to_dict()
|
|
d.update({
|
|
'roles': self.roles,
|
|
'service_catalog': self.service_catalog,
|
|
})
|
|
return d
|
|
|
|
@classmethod
|
|
def from_dict(cls, values):
|
|
return cls(**values)
|
|
|
|
@property
|
|
def owner(self):
|
|
"""Return the owner to correlate with an image."""
|
|
return self.project_id
|
|
|
|
@property
|
|
def can_see_deleted(self):
|
|
"""Admins can see deleted by default"""
|
|
return self.show_deleted or self.is_admin
|
|
|
|
def elevated(self):
|
|
"""Return a copy of this context with admin flag set."""
|
|
|
|
context = copy.copy(self)
|
|
context.roles = copy.deepcopy(self.roles)
|
|
if 'admin' not in context.roles:
|
|
context.roles.append('admin')
|
|
|
|
context.is_admin = True
|
|
|
|
return context
|
|
|
|
|
|
def get_admin_context(show_deleted=False):
|
|
"""Create an administrator context."""
|
|
return RequestContext(auth_token=None,
|
|
project_id=None,
|
|
is_admin=True,
|
|
show_deleted=show_deleted,
|
|
overwrite=False)
|