| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "database/sql"
- "time"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/gotypes"
- "yunion.io/x/pkg/tristate"
- "yunion.io/x/pkg/util/netutils"
- "yunion.io/x/pkg/util/rbacscope"
- "yunion.io/x/pkg/utils"
- "yunion.io/x/sqlchemy"
- "yunion.io/x/onecloud/pkg/apis"
- api "yunion.io/x/onecloud/pkg/apis/identity"
- "yunion.io/x/onecloud/pkg/cloudcommon/consts"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
- policyman "yunion.io/x/onecloud/pkg/cloudcommon/policy"
- "yunion.io/x/onecloud/pkg/cloudcommon/validators"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/keystone/locale"
- "yunion.io/x/onecloud/pkg/keystone/options"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/rbacutils"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- "yunion.io/x/onecloud/pkg/util/tagutils"
- )
- type SPolicyManager struct {
- SEnabledIdentityBaseResourceManager
- db.SSharableBaseResourceManager
- }
- var PolicyManager *SPolicyManager
- func init() {
- PolicyManager = &SPolicyManager{
- SEnabledIdentityBaseResourceManager: NewEnabledIdentityBaseResourceManager(
- SPolicy{},
- "policy",
- "policy",
- "policies",
- ),
- }
- PolicyManager.SetVirtualObject(PolicyManager)
- }
- /*
- +-------+--------------+------+-----+---------+-------+
- | Field | Type | Null | Key | Default | Extra |
- +-------+--------------+------+-----+---------+-------+
- | id | varchar(64) | NO | PRI | NULL | |
- | type | varchar(255) | NO | | NULL | |
- | blob | text | NO | | NULL | |
- | extra | text | YES | | NULL | |
- +-------+--------------+------+-----+---------+-------+
- */
- type SPolicy struct {
- SEnabledIdentityBaseResource
- db.SSharableBaseResource `"is_public->create":"domain_optional" "public_scope->create":"domain_optional"`
- // swagger:ignore
- // Deprecated
- Type string `width:"255" charset:"utf8" nullable:"false" list:"user" create:"domain_required" update:"domain"`
- // 权限定义
- Blob jsonutils.JSONObject `nullable:"false" list:"user" create:"domain_required" update:"domain"`
- // 权限范围
- Scope rbacscope.TRbacScope `nullable:"true" list:"user" create:"domain_required" update:"domain"`
- // 是否为系统权限
- IsSystem tristate.TriState `default:"false" list:"domain" update:"admin" create:"admin_optional"`
- // 匹配的项目标签
- ProjectTags tagutils.TTagSet `nullable:"true" list:"user" update:"domain" create:"domain_optional"`
- // 匹配的域标签
- DomainTags tagutils.TTagSet `nullable:"true" list:"user" update:"admin" create:"admin_optional"`
- // 匹配的资源标签
- ObjectTags tagutils.TTagSet `nullable:"true" list:"user" update:"domain" create:"domain_optional"`
- // 匹配的组织架构节点
- OrgNodeId []string `nullable:"true" list:"user" update:"domain" create:"domain_optional"`
- }
- func (manager *SPolicyManager) InitializeData() error {
- q := manager.Query()
- q = q.IsNullOrEmpty("name")
- policies := make([]SPolicy, 0)
- err := db.FetchModelObjects(manager, q, &policies)
- if err != nil {
- return err
- }
- for i := range policies {
- if !gotypes.IsNil(policies[i].Extra) {
- continue
- }
- db.Update(&policies[i], func() error {
- policies[i].Name = policies[i].Type
- policies[i].Description, _ = policies[i].Extra.GetString("description")
- return nil
- })
- }
- err = manager.initializeRolePolicyGroup()
- if err != nil {
- return err
- }
- return nil
- }
- func (manager *SPolicyManager) initializeRolePolicyGroup() error {
- ctx := context.Background()
- q := manager.Query()
- q = q.IsNullOrEmpty("scope")
- policies := make([]SPolicy, 0)
- err := db.FetchModelObjects(manager, q, &policies)
- if err != nil {
- return err
- }
- for i := range policies {
- var policy rbacutils.SRbacPolicy
- err := policy.Decode(policies[i].Blob)
- if err != nil {
- log.Errorf("Decode policy %s failed %s", policies[i].Name, err)
- continue
- }
- failed := false
- if len(policy.Roles) == 0 && len(policy.Projects) == 0 {
- // match any
- roles, err := policies[i].fetchMatchableRoles()
- if err != nil {
- log.Errorf("policy fetchMatchableRoles fail %s", err)
- failed = true
- } else {
- for _, r := range roles {
- err = RolePolicyManager.newRecord(ctx, r.Id, "", policies[i].Id, tristate.NewFromBool(policy.Auth), policy.Ips, time.Time{}, time.Time{})
- if err != nil {
- log.Errorf("insert role policy fail %s", err)
- failed = true
- }
- }
- }
- } else if len(policy.Roles) > 0 && len(policy.Projects) == 0 {
- for _, r := range policy.Roles {
- role, err := RoleManager.FetchRoleByName(r, policies[i].DomainId, "")
- if err != nil {
- log.Errorf("fetch role %s fail %s", r, err)
- continue
- }
- err = RolePolicyManager.newRecord(ctx, role.Id, "", policies[i].Id, tristate.True, policy.Ips, time.Time{}, time.Time{})
- if err != nil {
- log.Errorf("insert role policy fail %s", err)
- failed = true
- }
- }
- } else if len(policy.Roles) == 0 && len(policy.Projects) > 0 {
- for _, p := range policy.Projects {
- project, err := ProjectManager.FetchProjectByName(p, policies[i].DomainId, "")
- if err != nil {
- log.Errorf("fetch porject %s fail %s", p, err)
- continue
- }
- roles, err := policies[i].fetchMatchableRoles()
- if err != nil {
- log.Errorf("policy fetchMatchableRoles fail %s", err)
- failed = true
- } else {
- for _, r := range roles {
- err = RolePolicyManager.newRecord(ctx, r.Id, project.Id, policies[i].Id, tristate.True, policy.Ips, time.Time{}, time.Time{})
- if err != nil {
- log.Errorf("insert role policy fail %s", err)
- failed = true
- }
- }
- }
- }
- } else if len(policy.Roles) > 0 && len(policy.Projects) > 0 {
- for _, r := range policy.Roles {
- role, err := RoleManager.FetchRoleByName(r, policies[i].DomainId, "")
- if err != nil {
- log.Errorf("fetch role %s fail %s", r, err)
- continue
- }
- for _, p := range policy.Projects {
- project, err := ProjectManager.FetchProjectByName(p, policies[i].DomainId, "")
- if err != nil {
- log.Errorf("fetch project %s fail %s", p, err)
- continue
- }
- err = RolePolicyManager.newRecord(ctx, role.Id, project.Id, policies[i].Id, tristate.True, policy.Ips, time.Time{}, time.Time{})
- if err != nil {
- log.Errorf("insert role policy fail %s", err)
- failed = true
- }
- }
- }
- }
- if !failed {
- db.Update(&policies[i], func() error {
- policies[i].Scope = policy.Scope
- // do not rewrite blob, make backward compatible
- // policies[i].Blob = policy.Rules.Encode()
- return nil
- })
- }
- }
- return nil
- }
- func (manager *SPolicyManager) FetchEnabledPolicies() ([]SPolicy, error) {
- q := manager.Query().IsTrue("enabled")
- policies := make([]SPolicy, 0)
- err := db.FetchModelObjects(manager, q, &policies)
- if err != nil && err != sql.ErrNoRows {
- return nil, err
- }
- return policies, nil
- }
- func validatePolicyVioldatePrivilege(userCred mcclient.TokenCredential, policyScope rbacscope.TRbacScope, policy *rbacutils.SPolicy) error {
- if options.Options.NoPolicyViolationCheck || options.Options.ThreeAdminRoleSystem {
- return nil
- }
- if userCred.GetUserName() == api.SystemAdminUser && userCred.GetDomainId() == api.DEFAULT_DOMAIN_ID {
- return nil
- }
- _, policyGroup, err := RolePolicyManager.GetMatchPolicyGroup(userCred, time.Time{}, false)
- if err != nil {
- return errors.Wrap(err, "GetMatchPolicyGroup")
- }
- noViolate := false
- assignPolicySet := rbacutils.TPolicySet{*policy}
- for _, scope := range []rbacscope.TRbacScope{
- rbacscope.ScopeSystem,
- rbacscope.ScopeDomain,
- rbacscope.ScopeProject,
- } {
- isViolate := false
- policySet, ok := policyGroup[scope]
- if !ok || len(policySet) == 0 || !policySet.Contains(assignPolicySet) {
- isViolate = true
- }
- if !isViolate {
- noViolate = true
- }
- if scope == policyScope {
- break
- }
- }
- if !noViolate {
- return errors.Wrap(httperrors.ErrNotSufficientPrivilege, "policy violates operator's policy")
- }
- return nil
- }
- func (manager *SPolicyManager) ValidateCreateData(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- ownerId mcclient.IIdentityProvider,
- query jsonutils.JSONObject,
- input api.PolicyCreateInput,
- ) (api.PolicyCreateInput, error) {
- var err error
- if len(input.Type) == 0 && len(input.Name) == 0 {
- return input, httperrors.NewInputParameterError("missing input field type")
- }
- if len(input.Name) == 0 {
- input.Name = input.Type
- }
- var domainTags, projectTags, objectTags tagutils.TTagSetList
- if len(input.OrgNodeId) > 0 {
- for i := range input.OrgNodeId {
- orgNodeObj, err := OrganizationNodeManager.FetchById(input.OrgNodeId[i])
- if err != nil {
- if errors.Cause(err) == sql.ErrNoRows {
- return input, httperrors.NewResourceNotFoundError2(OrganizationNodeManager.Keyword(), input.OrgNodeId[i])
- } else {
- return input, errors.Wrap(err, "OrganizationNodeManager.FetchById")
- }
- }
- orgNode := orgNodeObj.(*SOrganizationNode)
- input.OrgNodeId[i] = orgNode.Id
- org, err := orgNode.GetOrganization()
- if err != nil {
- return input, errors.Wrap(err, "orgNode.GetOrganization")
- }
- switch org.Type {
- case api.OrgTypeDomain:
- domainTags = domainTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeProject:
- projectTags = projectTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeObject:
- objectTags = objectTags.Append(orgNode.GetTagSet(org))
- }
- }
- }
- if len(input.DomainTags) > 0 {
- domainTags = domainTags.Append(input.DomainTags)
- }
- if len(input.ProjectTags) > 0 {
- projectTags = projectTags.Append(input.ProjectTags)
- }
- if len(input.ObjectTags) > 0 {
- objectTags = objectTags.Append(input.ObjectTags)
- }
- policy, err := rbacutils.DecodePolicyData(domainTags, projectTags, objectTags, input.Blob)
- if err != nil {
- return input, httperrors.NewInputParameterError("fail to decode policy data")
- }
- input.Scope = rbacscope.String2ScopeDefault(string(input.Scope), rbacscope.ScopeProject)
- err = validatePolicyVioldatePrivilege(userCred, input.Scope, policy)
- if err != nil {
- return input, errors.Wrap(err, "validatePolicyVioldatePrivilege")
- }
- err = db.ValidateCreateDomainId(ownerId.GetProjectDomainId())
- if err != nil {
- return input, errors.Wrap(err, "ValidateCreateDomainId")
- }
- input.EnabledIdentityBaseResourceCreateInput, err = manager.SEnabledIdentityBaseResourceManager.ValidateCreateData(ctx, userCred, ownerId, query, input.EnabledIdentityBaseResourceCreateInput)
- if err != nil {
- return input, errors.Wrap(err, "SEnabledIdentityBaseResourceManager.ValidateCreateData")
- }
- input.SharableResourceBaseCreateInput, err = db.SharableManagerValidateCreateData(manager, ctx, userCred, ownerId, query, input.SharableResourceBaseCreateInput)
- if err != nil {
- return input, errors.Wrap(err, "SharableManagerValidateCreateData")
- }
- quota := &SIdentityQuota{
- SBaseDomainQuotaKeys: quotas.SBaseDomainQuotaKeys{DomainId: ownerId.GetProjectDomainId()},
- Policy: 1,
- }
- err = quotas.CheckSetPendingQuota(ctx, userCred, quota)
- if err != nil {
- return input, errors.Wrap(err, "CheckSetPendingQuota")
- }
- requireScope := input.Scope
- if input.IsSystem != nil && *input.IsSystem {
- requireScope = rbacscope.ScopeSystem
- }
- allowScope, _ := policyman.PolicyManager.AllowScope(userCred, api.SERVICE_TYPE, manager.KeywordPlural(), policyman.PolicyActionCreate)
- if requireScope.HigherThan(allowScope) {
- return input, errors.Wrapf(httperrors.ErrNotSufficientPrivilege, "require %s allow %s", requireScope, allowScope)
- }
- return input, nil
- }
- func (policy *SPolicy) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.PolicyUpdateInput) (api.PolicyUpdateInput, error) {
- var requireScope rbacscope.TRbacScope
- if len(input.Scope) > 0 {
- input.Scope = rbacscope.String2ScopeDefault(string(input.Scope), rbacscope.ScopeProject)
- requireScope = input.Scope
- }
- if input.IsSystem != nil && *input.IsSystem {
- requireScope = rbacscope.ScopeSystem
- }
- if len(requireScope) > 0 {
- allowScope, _ := policyman.PolicyManager.AllowScope(userCred, api.SERVICE_TYPE, policy.KeywordPlural(), policyman.PolicyActionUpdate)
- if requireScope.HigherThan(allowScope) {
- return input, errors.Wrapf(httperrors.ErrNotSufficientPrivilege, "require %s allow %s", requireScope, allowScope)
- }
- }
- var tagChanged bool
- switch input.TagUpdatePolicy {
- case api.TAG_UPDATE_POLICY_REMOVE:
- var domainChanged, projectChanged, objectChanged bool
- input.DomainTags, domainChanged = policy.DomainTags.Remove(input.DomainTags...)
- input.ProjectTags, projectChanged = policy.ProjectTags.Remove(input.ProjectTags...)
- input.ObjectTags, objectChanged = policy.ObjectTags.Remove(input.ObjectTags...)
- if domainChanged || projectChanged || objectChanged {
- tagChanged = true
- }
- case api.TAG_UPDATE_POLICY_REPLACE:
- // do nothing
- tagChanged = true
- default:
- if len(input.DomainTags) > 0 || len(input.ProjectTags) > 0 || len(input.ObjectTags) > 0 {
- tagChanged = true
- }
- input.DomainTags = policy.DomainTags.Append(input.DomainTags...)
- input.ProjectTags = policy.ProjectTags.Append(input.ProjectTags...)
- input.ObjectTags = policy.ObjectTags.Append(input.ObjectTags...)
- }
- if len(input.OrgNodeId) > 0 {
- for i := range input.OrgNodeId {
- orgNode, err := OrganizationNodeManager.FetchById(input.OrgNodeId[i])
- if err != nil {
- if errors.Cause(err) == sql.ErrNoRows {
- return input, httperrors.NewResourceNotFoundError2(OrganizationNodeManager.Keyword(), input.OrgNodeId[i])
- } else {
- return input, errors.Wrap(err, "OrganizationNodeManager.FetchById")
- }
- }
- input.OrgNodeId[i] = orgNode.GetId()
- }
- }
- switch input.TagUpdatePolicy {
- case api.TAG_UPDATE_POLICY_REMOVE:
- if len(input.OrgNodeId) > 0 {
- nodeIds := make([]string, 0)
- for i := range policy.OrgNodeId {
- if !utils.IsInArray(policy.OrgNodeId[i], input.OrgNodeId) {
- nodeIds = append(nodeIds, policy.OrgNodeId[i])
- } else {
- tagChanged = true
- }
- }
- input.OrgNodeId = nodeIds
- }
- case api.TAG_UPDATE_POLICY_REPLACE:
- // do nothing
- tagChanged = true
- default:
- // add
- if len(input.OrgNodeId) > 0 {
- for i := range policy.OrgNodeId {
- if !utils.IsInArray(policy.OrgNodeId[i], input.OrgNodeId) {
- input.OrgNodeId = append(input.OrgNodeId, policy.OrgNodeId[i])
- tagChanged = true
- }
- }
- }
- }
- if input.Blob != nil || tagChanged {
- var domainTags, projectTags, objectTags tagutils.TTagSetList
- if len(input.DomainTags) > 0 {
- domainTags = domainTags.Append(input.DomainTags)
- }
- if len(input.ProjectTags) > 0 {
- projectTags = projectTags.Append(input.ProjectTags)
- }
- if len(input.ObjectTags) > 0 {
- objectTags = objectTags.Append(input.DomainTags)
- }
- for i := range input.OrgNodeId {
- orgNodeObj, err := OrganizationNodeManager.FetchById(input.OrgNodeId[i])
- if err != nil {
- return input, errors.Wrapf(err, "OrganizationNodeManager.FetchById %s", input.OrgNodeId[i])
- }
- orgNode := orgNodeObj.(*SOrganizationNode)
- org, err := orgNode.GetOrganization()
- if err != nil {
- return input, errors.Wrap(err, "GetOrganization")
- }
- switch org.Type {
- case api.OrgTypeDomain:
- domainTags = domainTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeProject:
- projectTags = projectTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeObject:
- objectTags = objectTags.Append(orgNode.GetTagSet(org))
- }
- }
- if input.Blob == nil {
- input.Blob = policy.Blob
- }
- p, err := rbacutils.DecodePolicyData(domainTags, projectTags, objectTags, input.Blob)
- if err != nil {
- return input, httperrors.NewInputParameterError("fail to decode policy data")
- }
- /* if p.IsSystemWidePolicy() && policyman.PolicyManager.Allow(rbacutils.ScopeSystem, userCred, consts.GetServiceType(), policy.GetModelManager().KeywordPlural(), policyman.PolicyActionUpdate) == rbacutils.Deny {
- return nil, httperrors.NewNotSufficientPrivilegeError("not allow to update system-wide policy")
- } */
- scope := input.Scope
- if len(scope) == 0 {
- scope = policy.Scope
- }
- err = validatePolicyVioldatePrivilege(userCred, scope, p)
- if err != nil {
- return input, errors.Wrap(err, "validatePolicyVioldatePrivilege")
- }
- }
- if len(input.Type) > 0 {
- input.Name = input.Type
- }
- var err error
- input.EnabledIdentityBaseUpdateInput, err = policy.SEnabledIdentityBaseResource.ValidateUpdateData(ctx, userCred, query, input.EnabledIdentityBaseUpdateInput)
- if err != nil {
- return input, errors.Wrap(err, "SEnabledIdentityBaseResource.ValidateUpdateData")
- }
- return input, nil
- }
- func (policy *SPolicy) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- policy.SEnabledIdentityBaseResource.PostCreate(ctx, userCred, ownerId, query, data)
- quota := &SIdentityQuota{
- SBaseDomainQuotaKeys: quotas.SBaseDomainQuotaKeys{DomainId: ownerId.GetProjectDomainId()},
- Policy: 1,
- }
- err := quotas.CancelPendingUsage(ctx, userCred, quota, quota, true)
- if err != nil {
- log.Errorf("CancelPendingUsage fail %s", err)
- }
- // policyman.PolicyManager.SyncOnce()
- }
- func (policy *SPolicy) PostUpdate(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- policy.SEnabledIdentityBaseResource.PostUpdate(ctx, userCred, query, data)
- // policyman.PolicyManager.SyncOnce()
- }
- func (policy *SPolicy) PostDelete(ctx context.Context, userCred mcclient.TokenCredential) {
- policy.SEnabledIdentityBaseResource.PostDelete(ctx, userCred)
- // policyman.PolicyManager.SyncOnce()
- }
- func (policy *SPolicy) IsSharable(reqUsrId mcclient.IIdentityProvider) bool {
- return db.SharableModelIsSharable(policy, reqUsrId)
- }
- func (policy *SPolicy) IsShared() bool {
- return db.SharableModelIsShared(policy)
- }
- // 共享Policy
- func (policy *SPolicy) PerformPublic(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformPublicDomainInput) (jsonutils.JSONObject, error) {
- err := db.SharablePerformPublic(policy, ctx, userCred, apis.PerformPublicProjectInput{PerformPublicDomainInput: input})
- if err != nil {
- return nil, errors.Wrap(err, "SharablePerformPublic")
- }
- // policyman.PolicyManager.SyncOnce()
- return nil, nil
- }
- // 设置policy为私有
- func (policy *SPolicy) PerformPrivate(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformPrivateInput) (jsonutils.JSONObject, error) {
- err := db.SharablePerformPrivate(policy, ctx, userCred)
- if err != nil {
- return nil, errors.Wrap(err, "SharablePerformPrivate")
- }
- // policyman.PolicyManager.SyncOnce()
- return nil, nil
- }
- func (policy *SPolicy) CustomizeCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
- db.SharableModelCustomizeCreate(policy, ctx, userCred, ownerId, query, data)
- return policy.SEnabledIdentityBaseResource.CustomizeCreate(ctx, userCred, ownerId, query, data)
- }
- func (policy *SPolicy) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
- db.SharedResourceManager.CleanModelShares(ctx, userCred, policy)
- return policy.SEnabledIdentityBaseResource.RealDelete(ctx, userCred)
- }
- func (policy *SPolicy) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
- // if policy.IsShared() {
- // return httperrors.NewInvalidStatusError("cannot delete shared policy")
- // }
- rps, err := RolePolicyManager.fetchByPolicyId(policy.Id)
- if err != nil {
- return errors.Wrap(err, "FetchByPolicyId")
- }
- if len(rps) > 0 {
- return httperrors.NewNotEmptyError("policy is in associated with %d roles", len(rps))
- }
- if policy.IsSystem.IsTrue() {
- return httperrors.NewForbiddenError("cannot delete system policy")
- }
- if policy.Enabled.IsTrue() {
- return httperrors.NewInvalidStatusError("cannot delete enabled policy")
- }
- return policy.SEnabledIdentityBaseResource.ValidateDeleteCondition(ctx, nil)
- }
- // 权限策略列表
- func (manager *SPolicyManager) ListItemFilter(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.PolicyListInput,
- ) (*sqlchemy.SQuery, error) {
- q, err := manager.SEnabledIdentityBaseResourceManager.ListItemFilter(ctx, q, userCred, query.EnabledIdentityBaseResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SEnabledIdentityBaseResourceManager.ListItemFilter")
- }
- q, err = manager.SSharableBaseResourceManager.ListItemFilter(ctx, q, userCred, query.SharableResourceBaseListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SSharableBaseResourceManager.ListItemFilter")
- }
- if len(query.RoleId) > 0 {
- _, err := validators.ValidateModel(ctx, userCred, RoleManager, &query.RoleId)
- if err != nil {
- return nil, err
- }
- sq := RolePolicyManager.Query("policy_id").Equals("role_id", query.RoleId).SubQuery()
- q = q.In("id", sq)
- }
- if len(query.Type) > 0 {
- q = q.In("type", query.Type)
- }
- if query.IsSystem != nil {
- if *query.IsSystem {
- q = q.IsTrue("is_system")
- } else {
- q = q.IsFalse("is_system")
- }
- }
- if len(query.Scope) == 0 {
- allowScope, _ := policyman.PolicyManager.AllowScope(userCred, consts.GetServiceType(), manager.KeywordPlural(), policyman.PolicyActionList)
- query.Scope = string(allowScope)
- }
- switch query.Scope {
- case string(rbacscope.ScopeProject):
- q = q.Equals("scope", rbacscope.ScopeProject)
- case string(rbacscope.ScopeDomain):
- q = q.NotEquals("scope", rbacscope.ScopeSystem)
- }
- return q, nil
- }
- func (manager *SPolicyManager) OrderByExtraFields(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.PolicyListInput,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SEnabledIdentityBaseResourceManager.OrderByExtraFields(ctx, q, userCred, query.EnabledIdentityBaseResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SEnabledIdentityBaseResourceManager.OrderByExtraFields")
- }
- return q, nil
- }
- func (manager *SPolicyManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SEnabledIdentityBaseResourceManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (manager *SPolicyManager) FetchCustomizeColumns(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- query jsonutils.JSONObject,
- objs []interface{},
- fields stringutils2.SSortedStrings,
- isList bool,
- ) []api.PolicyDetails {
- rows := make([]api.PolicyDetails, len(objs))
- identRows := manager.SEnabledIdentityBaseResourceManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- shareRows := manager.SSharableBaseResourceManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- for i := range rows {
- policy := objs[i].(*SPolicy)
- rows[i] = api.PolicyDetails{
- EnabledIdentityBaseResourceDetails: identRows[i],
- SharableResourceBaseInfo: shareRows[i],
- }
- {
- var err error
- rows[i].OrgNodes, err = OrganizationNodeManager.fetchOrgNodesInfo(ctx, userCred, policy.OrgNodeId, isList)
- if err != nil {
- log.Errorf("SPolicyManager.FetchCustomizeColumns fetchOrgNodesInfo fail %s", err)
- }
- }
- }
- return rows
- }
- func (policy *SPolicy) GetUsages() []db.IUsage {
- if policy.Deleted {
- return nil
- }
- usage := SIdentityQuota{Policy: 1}
- usage.SetKeys(quotas.SBaseDomainQuotaKeys{DomainId: policy.DomainId})
- return []db.IUsage{
- &usage,
- }
- }
- func (manager *SPolicyManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
- q = db.SharableManagerFilterByOwner(ctx, manager, q, userCred, owner, scope)
- return q
- }
- func (policy *SPolicy) GetSharableTargetDomainIds() []string {
- return nil
- }
- func (policy *SPolicy) GetRequiredSharedDomainIds() []string {
- return []string{policy.DomainId}
- }
- func (policy *SPolicy) GetSharedDomains() []string {
- return db.SharableGetSharedProjects(policy, db.SharedTargetDomain)
- }
- func (policy *SPolicy) getPolicy() (*rbacutils.SPolicy, error) {
- var domainTags, projectTags, objectTags tagutils.TTagSetList
- if len(policy.DomainTags) > 0 {
- domainTags = domainTags.Append(policy.DomainTags)
- }
- if len(policy.ProjectTags) > 0 {
- projectTags = projectTags.Append(policy.ProjectTags)
- }
- if len(policy.ObjectTags) > 0 {
- objectTags = objectTags.Append(policy.ObjectTags)
- }
- var errs []error
- for i := range policy.OrgNodeId {
- orgNodeObj, err := OrganizationNodeManager.FetchById(policy.OrgNodeId[i])
- if err != nil {
- errs = append(errs, err)
- } else {
- orgNode := orgNodeObj.(*SOrganizationNode)
- org, err := orgNode.GetOrganization()
- if err != nil {
- errs = append(errs, err)
- } else {
- switch org.Type {
- case api.OrgTypeDomain:
- domainTags = domainTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeProject:
- projectTags = projectTags.Append(orgNode.GetTagSet(org))
- case api.OrgTypeObject:
- objectTags = objectTags.Append(orgNode.GetTagSet(org))
- }
- }
- }
- }
- pc, err := rbacutils.DecodePolicyData(domainTags, projectTags, objectTags, policy.Blob)
- if err != nil {
- return nil, errors.Wrap(err, "Decode")
- }
- return pc, nil
- }
- func (policy *SPolicy) GetChangeOwnerCandidateDomainIds() []string {
- return db.ISharableChangeOwnerCandidateDomainIds(policy)
- }
- func (policy *SPolicy) fetchMatchableRoles() ([]SRole, error) {
- q := RoleManager.Query()
- candDomains := policy.GetChangeOwnerCandidateDomainIds()
- if len(candDomains) > 0 {
- q = q.In("domain_id", candDomains)
- }
- roles := make([]SRole, 0)
- err := db.FetchModelObjects(RoleManager, q, &roles)
- if err != nil && errors.Cause(err) != sql.ErrNoRows {
- return nil, errors.Wrap(err, "FetchRoles")
- }
- return roles, nil
- }
- // 绑定角色
- func (policy *SPolicy) PerformBindRole(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.PolicyBindRoleInput) (jsonutils.JSONObject, error) {
- var projectId string
- prefList := make([]netutils.IPV4Prefix, 0)
- for _, ipStr := range input.Ips {
- pref, err := netutils.NewIPV4Prefix(ipStr)
- if err != nil {
- return nil, errors.Wrapf(httperrors.ErrInputParameter, "invalid prefix %s", ipStr)
- }
- prefList = append(prefList, pref)
- }
- if len(input.ProjectId) > 0 {
- proj, err := ProjectManager.FetchByIdOrName(ctx, userCred, input.ProjectId)
- if err != nil {
- if errors.Cause(err) == sql.ErrNoRows {
- return nil, errors.Wrapf(httperrors.ErrNotFound, "%s %s", ProjectManager.Keyword(), input.ProjectId)
- } else {
- return nil, errors.Wrap(err, "ProjectManager.FetchByIdOrName")
- }
- }
- projectId = proj.GetId()
- }
- if len(input.RoleId) == 0 {
- return nil, errors.Wrap(httperrors.ErrInputParameter, "missing role_id")
- }
- role, err := RoleManager.FetchByIdOrName(ctx, userCred, input.RoleId)
- if err != nil {
- if errors.Cause(err) == sql.ErrNoRows {
- return nil, errors.Wrapf(httperrors.ErrNotFound, "%s %s", RoleManager.Keyword(), input.RoleId)
- } else {
- return nil, errors.Wrap(err, "RoleManager.FetchByIdOrName")
- }
- }
- err = RolePolicyManager.newRecord(ctx, role.GetId(), projectId, policy.Id, tristate.True, prefList, input.ValidSince, input.ValidUntil)
- if err != nil {
- return nil, errors.Wrap(err, "newRecord")
- }
- return nil, nil
- }
- func (policy *SPolicy) GetI18N(ctx context.Context) *jsonutils.JSONDict {
- r := jsonutils.NewDict()
- act18 := locale.PredefinedPolicyI18nTable.Lookup(ctx, policy.Description)
- r.Set("description", jsonutils.NewString(act18))
- return r
- }
- func (policy *SPolicy) ValidateUpdateCondition(ctx context.Context) error {
- err := policy.SEnabledIdentityBaseResource.ValidateUpdateCondition(ctx)
- if err != nil {
- return errors.Wrap(err, "SEnabledIdentityBaseResource.ValidateUpdateCondition")
- }
- //if policy.IsSystem.IsTrue() {
- // return errors.Wrap(httperrors.ErrForbidden, "system policy")
- //}
- if options.Options.ThreeAdminRoleSystem {
- rps, err := RolePolicyManager.fetchByPolicyId(policy.Id)
- if err != nil {
- return errors.Wrap(err, "fetchByPolicyId")
- }
- if len(rps) > 0 {
- return errors.Wrap(httperrors.ErrForbidden, "policy in use")
- }
- }
- return nil
- }
|