2021-05-25 12:04:59 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# Copyright (C) 2021 GNS3 Technologies Inc.
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2021-05-27 10:58:44 +03:00
|
|
|
from sqlalchemy import Table, Column, String, ForeignKey, event
|
2021-05-25 12:04:59 +03:00
|
|
|
from sqlalchemy.orm import relationship
|
|
|
|
|
|
|
|
from .base import Base, BaseTable, generate_uuid, GUID, ListType
|
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
permission_role_link = Table(
|
|
|
|
"permissions_roles_link",
|
|
|
|
Base.metadata,
|
|
|
|
Column("permission_id", GUID, ForeignKey("permissions.permission_id", ondelete="CASCADE")),
|
|
|
|
Column("role_id", GUID, ForeignKey("roles.role_id", ondelete="CASCADE"))
|
|
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class Permission(BaseTable):
|
|
|
|
|
|
|
|
__tablename__ = "permissions"
|
|
|
|
|
|
|
|
permission_id = Column(GUID, primary_key=True, default=generate_uuid)
|
2021-05-27 10:58:44 +03:00
|
|
|
description = Column(String)
|
2021-05-25 12:04:59 +03:00
|
|
|
methods = Column(ListType)
|
|
|
|
path = Column(String)
|
|
|
|
action = Column(String)
|
2021-05-27 10:58:44 +03:00
|
|
|
user_id = Column(GUID, ForeignKey('users.user_id', ondelete="CASCADE"))
|
2021-05-25 12:04:59 +03:00
|
|
|
roles = relationship("Role", secondary=permission_role_link, back_populates="permissions")
|
2021-05-27 10:58:44 +03:00
|
|
|
|
|
|
|
|
|
|
|
@event.listens_for(Permission.__table__, 'after_create')
|
|
|
|
def create_default_roles(target, connection, **kw):
|
|
|
|
|
|
|
|
default_permissions = [
|
|
|
|
{
|
|
|
|
"description": "Allow access to all endpoints",
|
2021-08-17 17:17:32 +03:00
|
|
|
"methods": ["GET", "POST", "PUT", "DELETE"],
|
2021-05-27 10:58:44 +03:00
|
|
|
"path": "/",
|
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
2021-11-01 08:15:14 +02:00
|
|
|
{
|
|
|
|
"description": "Allow to receive controller notifications",
|
|
|
|
"methods": ["GET"],
|
|
|
|
"path": "/notifications",
|
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
2021-05-27 10:58:44 +03:00
|
|
|
{
|
2021-06-03 09:10:12 +03:00
|
|
|
"description": "Allow to create and list projects",
|
2021-08-17 17:17:32 +03:00
|
|
|
"methods": ["GET", "POST"],
|
2021-06-03 09:10:12 +03:00
|
|
|
"path": "/projects",
|
2021-05-27 10:58:44 +03:00
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
|
|
|
{
|
2021-06-03 09:10:12 +03:00
|
|
|
"description": "Allow to create and list templates",
|
2021-08-17 17:17:32 +03:00
|
|
|
"methods": ["GET", "POST"],
|
2021-06-03 09:10:12 +03:00
|
|
|
"path": "/templates",
|
2021-05-27 10:58:44 +03:00
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
|
|
|
{
|
2021-06-03 09:10:12 +03:00
|
|
|
"description": "Allow to list computes",
|
|
|
|
"methods": ["GET"],
|
|
|
|
"path": "/computes/*",
|
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"description": "Allow access to all symbol endpoints",
|
2021-08-17 17:17:32 +03:00
|
|
|
"methods": ["GET", "POST"],
|
2021-06-03 09:10:12 +03:00
|
|
|
"path": "/symbols/*",
|
2021-05-27 10:58:44 +03:00
|
|
|
"action": "ALLOW"
|
|
|
|
},
|
|
|
|
]
|
|
|
|
|
|
|
|
stmt = target.insert().values(default_permissions)
|
|
|
|
connection.execute(stmt)
|
|
|
|
connection.commit()
|
|
|
|
log.debug("The default permissions have been created in the database")
|
|
|
|
|
|
|
|
|
|
|
|
@event.listens_for(permission_role_link, 'after_create')
|
|
|
|
def add_permissions_to_role(target, connection, **kw):
|
|
|
|
|
|
|
|
from .roles import Role
|
|
|
|
roles_table = Role.__table__
|
|
|
|
stmt = roles_table.select().where(roles_table.c.name == "Administrator")
|
|
|
|
result = connection.execute(stmt)
|
|
|
|
role_id = result.first().role_id
|
|
|
|
|
|
|
|
permissions_table = Permission.__table__
|
|
|
|
stmt = permissions_table.select().where(permissions_table.c.path == "/")
|
|
|
|
result = connection.execute(stmt)
|
|
|
|
permission_id = result.first().permission_id
|
|
|
|
|
|
|
|
# add root path to the "Administrator" role
|
|
|
|
stmt = target.insert().values(permission_id=permission_id, role_id=role_id)
|
|
|
|
connection.execute(stmt)
|
|
|
|
|
|
|
|
stmt = roles_table.select().where(roles_table.c.name == "User")
|
|
|
|
result = connection.execute(stmt)
|
|
|
|
role_id = result.first().role_id
|
|
|
|
|
|
|
|
# add minimum required paths to the "User" role
|
2021-11-01 08:15:14 +02:00
|
|
|
for path in ("/notifications", "/projects", "/templates", "/computes/*", "/symbols/*"):
|
2021-05-27 10:58:44 +03:00
|
|
|
stmt = permissions_table.select().where(permissions_table.c.path == path)
|
|
|
|
result = connection.execute(stmt)
|
|
|
|
permission_id = result.first().permission_id
|
|
|
|
stmt = target.insert().values(permission_id=permission_id, role_id=role_id)
|
|
|
|
connection.execute(stmt)
|
|
|
|
|
|
|
|
connection.commit()
|