# -*- coding: utf-8 -*- # # Copyright (C) 2017 Marcos Pereira # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public License # along with this program. If not, see . import ast import json from .permission import Permission from .policy import Policy from .role import Role class Authorization: """ Keycloak Authorization (policies, roles, scopes and resources). https://keycloak.gitbooks.io/documentation/authorization_services/index.html """ def __init__(self): self._policies = {} @property def policies(self): return self._policies @policies.setter def policies(self, value): self._policies = value def load_config(self, data): """ Load policies, roles and permissions (scope/resources). :param data: keycloak authorization data (dict) :return: """ for pol in data['policies']: if pol['type'] == 'role': policy = Policy(name=pol['name'], type=pol['type'], logic=pol['logic'], decision_strategy=pol['decisionStrategy']) config_roles = json.loads(pol['config']['roles']) for role in config_roles: policy.add_role(Role(name=role['id'], required=role['required'])) self.policies[policy.name] = policy if pol['type'] == 'scope': permission = Permission(name=pol['name'], type=pol['type'], logic=pol['logic'], decision_strategy=pol['decisionStrategy']) permission.scopes = ast.literal_eval(pol['config']['scopes']) for policy_name in ast.literal_eval(pol['config']['applyPolicies']): self.policies[policy_name].add_permission(permission) if pol['type'] == 'resource': from pprint import pprint permission = Permission(name=pol['name'], type=pol['type'], logic=pol['logic'], decision_strategy=pol['decisionStrategy']) permission.resources = ast.literal_eval(pol['config'].get('resources', "[]")) for policy_name in ast.literal_eval(pol['config']['applyPolicies']): if self.policies.get(policy_name) is not None: self.policies[policy_name].add_permission(permission)