153 lines
6.2 KiB
Python
153 lines
6.2 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from neutron_lib import policy as neutron_policy
|
|
from oslo_policy import policy
|
|
|
|
# This role is used only for communication between services, it shouldn't be
|
|
# used by human users
|
|
SERVICE = 'rule:service_api'
|
|
|
|
# For completion of the phase 1
|
|
# https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#phase-1
|
|
# there is now ADMIN role
|
|
ADMIN = "rule:admin_only"
|
|
|
|
# This check string is the primary use case for typical end-users, who are
|
|
# working with resources that belong to a project (e.g., creating ports and
|
|
# routers).
|
|
PROJECT_MEMBER = 'role:member and project_id:%(project_id)s'
|
|
|
|
# This check string should only be used to protect read-only project-specific
|
|
# resources. It should not be used to protect APIs that make writable changes
|
|
# (e.g., updating a router or deleting a port).
|
|
PROJECT_READER = 'role:reader and project_id:%(project_id)s'
|
|
|
|
# The following are common composite check strings that are useful for
|
|
# protecting APIs designed to operate with multiple scopes (e.g.,
|
|
# an administrator should be able to delete any router in the deployment, a
|
|
# project member should only be able to delete routers in their project).
|
|
ADMIN_OR_SERVICE = (
|
|
'(' + ADMIN + ') or (' + SERVICE + ')')
|
|
ADMIN_OR_PROJECT_MEMBER = (
|
|
'(' + ADMIN + ') or (' + PROJECT_MEMBER + ')')
|
|
ADMIN_OR_PROJECT_READER = (
|
|
'(' + ADMIN + ') or (' + PROJECT_READER + ')')
|
|
|
|
# Additional rules needed in Neutron
|
|
RULE_NET_OWNER = 'rule:network_owner'
|
|
RULE_PARENT_OWNER = 'rule:ext_parent_owner'
|
|
RULE_SG_OWNER = 'rule:sg_owner'
|
|
|
|
# In some cases we need to check owner of the parent resource, it's like that
|
|
# for example for QoS rules (check owner of QoS policy rule belongs to) or
|
|
# Floating IP port forwarding (check owner of FIP which PF is using). It's like
|
|
# that becasue those resources (QOS rules, FIP PFs) don't have project_id
|
|
# attribute at all and they belongs to the same project as parent resource (QoS
|
|
# policy, FIP).
|
|
PARENT_OWNER_MEMBER = 'role:member and ' + RULE_PARENT_OWNER
|
|
PARENT_OWNER_READER = 'role:reader and ' + RULE_PARENT_OWNER
|
|
ADMIN_OR_PARENT_OWNER_MEMBER = (
|
|
'(' + ADMIN + ') or (' + PARENT_OWNER_MEMBER + ')')
|
|
ADMIN_OR_PARENT_OWNER_READER = (
|
|
'(' + ADMIN + ') or (' + PARENT_OWNER_READER + ')')
|
|
|
|
# Those rules related to the network owner are very similar (almost the same)
|
|
# as parent owner defined above. The only reason why they are kept here is that
|
|
# in case of some resources like ports or subnets neutron have got policies
|
|
# related to the "network owner" and network isn't really parent of the subnet
|
|
# or port. Because of that, using parent owner in those cases may be
|
|
# missleading for users so it's better to keep also "network owner" rules.
|
|
NET_OWNER_MEMBER = 'role:member and ' + RULE_NET_OWNER
|
|
NET_OWNER_READER = 'role:reader and ' + RULE_NET_OWNER
|
|
ADMIN_OR_NET_OWNER_MEMBER = (
|
|
'(' + ADMIN + ') or (' + NET_OWNER_MEMBER + ')')
|
|
ADMIN_OR_NET_OWNER_READER = (
|
|
'(' + ADMIN + ') or (' + NET_OWNER_READER + ')')
|
|
|
|
|
|
rules = [
|
|
policy.RuleDefault(
|
|
'context_is_admin',
|
|
'role:admin',
|
|
description='Rule for cloud admin access'),
|
|
policy.RuleDefault(
|
|
"service_api",
|
|
"role:service",
|
|
description="Default rule for the service-to-service APIs."),
|
|
policy.RuleDefault(
|
|
'owner',
|
|
'tenant_id:%(tenant_id)s',
|
|
description='Rule for resource owner access'),
|
|
policy.RuleDefault(
|
|
'admin_or_owner',
|
|
neutron_policy.policy_or('rule:context_is_admin',
|
|
'rule:owner'),
|
|
description='Rule for admin or owner access'),
|
|
policy.RuleDefault(
|
|
'context_is_advsvc',
|
|
'role:advsvc',
|
|
description='Rule for advsvc role access',
|
|
deprecated_reason=('Neutron now supports service role for '
|
|
'service to service communication.'),
|
|
deprecated_since='2024.1'),
|
|
policy.RuleDefault(
|
|
'admin_or_network_owner',
|
|
neutron_policy.policy_or('rule:context_is_admin',
|
|
'tenant_id:%(network:tenant_id)s'),
|
|
description='Rule for admin or network owner access'),
|
|
policy.RuleDefault(
|
|
'admin_owner_or_network_owner',
|
|
neutron_policy.policy_or('rule:owner',
|
|
neutron_policy.RULE_ADMIN_OR_NET_OWNER),
|
|
description=('Rule for resource owner, '
|
|
'admin or network owner access')),
|
|
policy.RuleDefault(
|
|
'network_owner',
|
|
'tenant_id:%(network:tenant_id)s',
|
|
description='Rule for network owner access'),
|
|
policy.RuleDefault(
|
|
'admin_only',
|
|
'rule:context_is_admin',
|
|
description='Rule for admin-only access'),
|
|
policy.RuleDefault(
|
|
'regular_user',
|
|
'',
|
|
description='Rule for regular user access'),
|
|
# TODO(amotoki): Should be renamed to shared_network? It seems clearer.
|
|
policy.RuleDefault(
|
|
'shared',
|
|
'field:networks:shared=True',
|
|
description='Rule of shared network'),
|
|
policy.RuleDefault(
|
|
'default',
|
|
neutron_policy.RULE_ADMIN_OR_OWNER,
|
|
description='Default access rule'),
|
|
policy.RuleDefault(
|
|
'admin_or_ext_parent_owner',
|
|
neutron_policy.policy_or('rule:context_is_admin',
|
|
'tenant_id:%(ext_parent:tenant_id)s'),
|
|
description='Rule for common parent owner check'),
|
|
policy.RuleDefault(
|
|
'ext_parent_owner',
|
|
'tenant_id:%(ext_parent:tenant_id)s',
|
|
description='Rule for common parent owner check'),
|
|
policy.RuleDefault(
|
|
name='sg_owner',
|
|
check_str='tenant_id:%(security_group:tenant_id)s',
|
|
description='Rule for security group owner access'),
|
|
]
|
|
|
|
|
|
def list_rules():
|
|
return rules
|