You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
89 lines
3.2 KiB
89 lines
3.2 KiB
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com>
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import ast
|
|
import json
|
|
|
|
from .permission import Permission
|
|
from .policy import Policy
|
|
from .role import Role
|
|
|
|
|
|
class Authorization:
|
|
"""
|
|
Keycloak Authorization (policies, roles, scopes and resources).
|
|
|
|
https://keycloak.gitbooks.io/documentation/authorization_services/index.html
|
|
|
|
"""
|
|
|
|
def __init__(self):
|
|
self._policies = {}
|
|
|
|
@property
|
|
def policies(self):
|
|
return self._policies
|
|
|
|
@policies.setter
|
|
def policies(self, value):
|
|
self._policies = value
|
|
|
|
def load_config(self, data):
|
|
"""
|
|
Load policies, roles and permissions (scope/resources).
|
|
|
|
:param data: keycloak authorization data (dict)
|
|
:return:
|
|
"""
|
|
for pol in data['policies']:
|
|
if pol['type'] == 'role':
|
|
policy = Policy(name=pol['name'],
|
|
type=pol['type'],
|
|
logic=pol['logic'],
|
|
decision_strategy=pol['decisionStrategy'])
|
|
|
|
config_roles = json.loads(pol['config']['roles'])
|
|
for role in config_roles:
|
|
policy.add_role(Role(name=role['id'],
|
|
required=role['required']))
|
|
|
|
self.policies[policy.name] = policy
|
|
|
|
if pol['type'] == 'scope':
|
|
permission = Permission(name=pol['name'],
|
|
type=pol['type'],
|
|
logic=pol['logic'],
|
|
decision_strategy=pol['decisionStrategy'])
|
|
|
|
permission.scopes = ast.literal_eval(pol['config']['scopes'])
|
|
|
|
for policy_name in ast.literal_eval(pol['config']['applyPolicies']):
|
|
self.policies[policy_name].add_permission(permission)
|
|
|
|
if pol['type'] == 'resource':
|
|
from pprint import pprint
|
|
permission = Permission(name=pol['name'],
|
|
type=pol['type'],
|
|
logic=pol['logic'],
|
|
decision_strategy=pol['decisionStrategy'])
|
|
|
|
permission.resources = ast.literal_eval(pol['config'].get('resources', "[]"))
|
|
|
|
for policy_name in ast.literal_eval(pol['config']['applyPolicies']):
|
|
if self.policies.get(policy_name) is not None:
|
|
self.policies[policy_name].add_permission(permission)
|
|
|