mirror of
https://github.com/ansible/awx.git
synced 2026-01-14 19:30:39 -03:30
Get users from the http_session, authorize job, workflow, and adhoc event access against RBAC
This commit is contained in:
parent
06e7bd01a7
commit
36c06020b4
@ -25,7 +25,7 @@ from awx.main.task_engine import TaskEnhancer
|
||||
from awx.conf.license import LicenseForbids
|
||||
|
||||
__all__ = ['get_user_queryset', 'check_user_access', 'check_user_access_with_errors',
|
||||
'user_accessible_objects',
|
||||
'user_accessible_objects', 'consumer_access',
|
||||
'user_admin_role', 'StateConflict',]
|
||||
|
||||
PERMISSION_TYPES = [
|
||||
@ -164,6 +164,17 @@ def check_superuser(func):
|
||||
return wrapper
|
||||
|
||||
|
||||
def consumer_access(group_name):
|
||||
'''
|
||||
consumer_access returns the proper Access class based on group_name
|
||||
for a channels consumer.
|
||||
'''
|
||||
class_map = {'job_events': JobAccess,
|
||||
'workflow_events': WorkflowJobAccess,
|
||||
'ad_hoc_command_events': AdHocCommandAccess}
|
||||
return class_map.get(group_name)
|
||||
|
||||
|
||||
class BaseAccess(object):
|
||||
'''
|
||||
Base class for checking user access to a given model. Subclasses should
|
||||
|
||||
@ -1,13 +1,11 @@
|
||||
import json
|
||||
import urlparse
|
||||
import logging
|
||||
|
||||
from channels import Group
|
||||
from channels.sessions import channel_session
|
||||
from channels.auth import channel_session_user, http_session_user, transfer_user
|
||||
|
||||
from django.contrib.auth.models import User
|
||||
from django.core.serializers.json import DjangoJSONEncoder
|
||||
from awx.main.models.organization import AuthToken
|
||||
|
||||
|
||||
logger = logging.getLogger('awx.main.consumers')
|
||||
@ -19,51 +17,32 @@ def discard_groups(message):
|
||||
Group(group).discard(message.reply_channel)
|
||||
|
||||
|
||||
def validate_token(token):
|
||||
try:
|
||||
auth_token = AuthToken.objects.get(key=token)
|
||||
if not auth_token.in_valid_tokens:
|
||||
return None
|
||||
except AuthToken.DoesNotExist:
|
||||
return None
|
||||
return auth_token
|
||||
|
||||
|
||||
def user_from_token(auth_token):
|
||||
try:
|
||||
return User.objects.get(pk=auth_token.user_id)
|
||||
except User.DoesNotExist:
|
||||
return None
|
||||
|
||||
|
||||
@http_session_user
|
||||
@channel_session
|
||||
def ws_connect(message):
|
||||
token = None
|
||||
qs = urlparse.parse_qs(message['query_string'])
|
||||
if 'token' in qs:
|
||||
if len(qs['token']) > 0:
|
||||
token = qs['token'].pop()
|
||||
message.channel_session['token'] = token
|
||||
if message.http_session:
|
||||
# our backend is not set on the http_session so we need to update the session before
|
||||
# calling transfer_user. This is why we are doing this manually instead of using the
|
||||
# all-in-one helper decorator.
|
||||
message.http_session.update({'_auth_user_backend':'django.contrib.auth.backends.ModelBackend'})
|
||||
transfer_user(message.http_session, message.channel_session)
|
||||
message.reply_channel.send({"text": json.dumps({"accept": True, "user": message.user.id})})
|
||||
else:
|
||||
message.reply_channel.send({"text": json.dumps({"accept": False, "user": None})})
|
||||
|
||||
|
||||
@channel_session
|
||||
@channel_session_user
|
||||
def ws_disconnect(message):
|
||||
discard_groups(message)
|
||||
|
||||
|
||||
@channel_session
|
||||
@channel_session_user
|
||||
def ws_receive(message):
|
||||
token = message.channel_session.get('token')
|
||||
from awx.main.access import consumer_access
|
||||
|
||||
auth_token = validate_token(token)
|
||||
if auth_token is None:
|
||||
logger.error("Authentication Failure validating user")
|
||||
message.reply_channel.send({"text": json.dumps({"error": "invalid auth token"})})
|
||||
return None
|
||||
|
||||
user = user_from_token(auth_token)
|
||||
if user is None:
|
||||
logger.error("No valid user corresponding to submitted auth_token")
|
||||
user = message.user
|
||||
if user.id is None:
|
||||
logger.error("No valid user found for websocket.")
|
||||
message.reply_channel.send({"text": json.dumps({"error": "no valid user"})})
|
||||
return None
|
||||
|
||||
@ -78,6 +57,12 @@ def ws_receive(message):
|
||||
if type(v) is list:
|
||||
for oid in v:
|
||||
name = '{}-{}'.format(group_name, oid)
|
||||
access_cls = consumer_access(group_name)
|
||||
if access_cls is not None:
|
||||
user_access = access_cls(user)
|
||||
if not user_access.get_queryset().filter(pk=oid).exists():
|
||||
message.reply_channel.send({"text": json.dumps({"error": "access denied to channel {0} for resource id {1}".format(group_name, oid)})})
|
||||
continue
|
||||
current_groups.append(name)
|
||||
Group(name).add(message.reply_channel)
|
||||
else:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user