
Since some clients use different format of client id not only uuid, so Zaqar will support this function. Add one option 'client_id_uuid_safe' to allow user to control the validation of client id. Add two options 'min_length_client_id' and 'max_length_client_id' to allow user to control the length of client id if not using uuid. This also requires user to ensure the client id is immutable. Implements: blueprint remove-format-constraint-of-client-id Change-Id: I96bc2620b09394419b66a733484ff3d8f0d56313
280 lines
10 KiB
Python
280 lines
10 KiB
Python
# Copyright (c) 2013 Rackspace Hosting, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
"""wsgi transport helpers."""
|
|
|
|
from distutils import version
|
|
import re
|
|
import uuid
|
|
|
|
import falcon
|
|
from oslo_log import log as logging
|
|
import six
|
|
|
|
from zaqar.common import urls
|
|
from zaqar import context
|
|
from zaqar.i18n import _
|
|
from zaqar.transport import validation
|
|
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
def verify_pre_signed_url(key, req, resp, params):
|
|
headers = req.headers
|
|
project = headers.get('X-PROJECT-ID')
|
|
expires = headers.get('URL-EXPIRES')
|
|
methods = headers.get('URL-METHODS', '').split(',')
|
|
paths = headers.get('URL-PATHS', '').split(',')
|
|
signature = headers.get('URL-SIGNATURE')
|
|
|
|
if not signature:
|
|
return
|
|
|
|
if req.method not in methods:
|
|
raise falcon.HTTPNotFound()
|
|
|
|
# Support to query single resource with pre-signed url
|
|
if not any([p for p in paths if re.search(p, req.path)]):
|
|
raise falcon.HTTPNotFound()
|
|
|
|
try:
|
|
verified = urls.verify_signed_headers_data(key, paths,
|
|
project=project,
|
|
methods=methods,
|
|
expires=expires,
|
|
signature=signature)
|
|
except ValueError:
|
|
raise falcon.HTTPNotFound()
|
|
|
|
if not verified:
|
|
raise falcon.HTTPNotFound()
|
|
|
|
|
|
def get_client_uuid(req):
|
|
"""Read a required Client-ID from a request.
|
|
|
|
:param req: A falcon.Request object
|
|
:returns: A UUID object or A string of client id
|
|
"""
|
|
|
|
try:
|
|
return uuid.UUID(req.get_header('Client-ID', required=True))
|
|
except ValueError:
|
|
return req.get_header('Client-ID', required=True)
|
|
|
|
|
|
def extract_project_id(req, resp, params):
|
|
"""Adds `project_id` to the list of params for all responders
|
|
|
|
Meant to be used as a `before` hook.
|
|
|
|
:param req: request sent
|
|
:type req: falcon.request.Request
|
|
:param resp: response object to return
|
|
:type resp: falcon.response.Response
|
|
:param params: additional parameters passed to responders
|
|
:type params: dict
|
|
:rtype: None
|
|
"""
|
|
api_version_string = req.path.split('/')[1]
|
|
params['project_id'] = req.get_header('X-PROJECT-ID')
|
|
if not api_version_string:
|
|
# NOTE(jaosorior): The versions resource is public and shouldn't need
|
|
# a check for the project-id.
|
|
return
|
|
if params['project_id'] == "":
|
|
raise falcon.HTTPBadRequest('Empty project header not allowed',
|
|
_(u'X-PROJECT-ID cannot be an empty '
|
|
u'string. Specify the right header '
|
|
u'X-PROJECT-ID and retry.'))
|
|
|
|
api_version = version.LooseVersion(api_version_string)
|
|
if (not params['project_id'] and api_version >=
|
|
version.LooseVersion('v1.1')):
|
|
raise falcon.HTTPBadRequest('Project-Id Missing',
|
|
_(u'The header X-PROJECT-ID was missing'))
|
|
|
|
|
|
def require_client_id(validate, req, resp, params):
|
|
"""Makes sure the header `Client-ID` is present in the request
|
|
|
|
Use as a before hook.
|
|
:param validate: A validator function that will
|
|
be used to check the format of client id against configured
|
|
limits.
|
|
:param req: request sent
|
|
:type req: falcon.request.Request
|
|
:param resp: response object to return
|
|
:type resp: falcon.response.Response
|
|
:param params: additional parameters passed to responders
|
|
:type params: dict
|
|
:rtype: None
|
|
"""
|
|
|
|
if req.path.startswith('/v1.1/') or req.path.startswith('/v2/'):
|
|
try:
|
|
validate(req.get_header('Client-ID', required=True))
|
|
except ValueError:
|
|
description = _(u'Malformed hexadecimal UUID.')
|
|
raise falcon.HTTPBadRequest('Wrong UUID value', description)
|
|
except validation.ValidationFailed as ex:
|
|
raise falcon.HTTPBadRequest(six.text_type(ex))
|
|
else:
|
|
# NOTE(wanghao): Since we changed the get_client_uuid to support
|
|
# other format of client id, so need to check the uuid here for
|
|
# v1 API.
|
|
try:
|
|
client_id = req.get_header('Client-ID')
|
|
if client_id or client_id == '':
|
|
uuid.UUID(client_id)
|
|
except ValueError:
|
|
description = _(u'Malformed hexadecimal UUID.')
|
|
raise falcon.HTTPBadRequest('Wrong UUID value', description)
|
|
|
|
|
|
def validate_queue_identification(validate, req, resp, params):
|
|
"""Hook for validating the queue name and project id in requests.
|
|
|
|
The queue name validation is short-circuited if 'queue_name' does
|
|
not exist in `params`.
|
|
|
|
This hook depends on the `get_project` hook, which must be
|
|
installed upstream.
|
|
|
|
|
|
:param validate: A validator function that will
|
|
be used to check the queue name against configured
|
|
limits. functools.partial or a closure must be used to
|
|
set this first arg, and expose the remaining ones as
|
|
a Falcon hook interface.
|
|
:param req: Falcon request object
|
|
:param resp: Falcon response object
|
|
:param params: Responder params dict
|
|
"""
|
|
|
|
try:
|
|
validate(params['queue_name'],
|
|
params['project_id'])
|
|
except KeyError:
|
|
# NOTE(kgriffs): queue_name not in params, so nothing to do
|
|
pass
|
|
except validation.ValidationFailed:
|
|
project = params['project_id']
|
|
queue = params['queue_name']
|
|
if six.PY2:
|
|
queue = queue.decode('utf-8', 'replace')
|
|
|
|
LOG.debug(u'Invalid queue name "%(queue)s" submitted for '
|
|
u'project: %(project)s',
|
|
{'queue': queue, 'project': project})
|
|
|
|
raise falcon.HTTPBadRequest(_(u'Invalid queue identification'),
|
|
_(u'The format of the submitted queue '
|
|
u'name or project id is not valid.'))
|
|
|
|
|
|
def require_accepts_json(req, resp, params):
|
|
"""Raises an exception if the request does not accept JSON
|
|
|
|
Meant to be used as a `before` hook.
|
|
|
|
:param req: request sent
|
|
:type req: falcon.request.Request
|
|
:param resp: response object to return
|
|
:type resp: falcon.response.Response
|
|
:param params: additional parameters passed to responders
|
|
:type params: dict
|
|
:rtype: None
|
|
:raises HTTPNotAcceptable: if the request does not accept JSON
|
|
"""
|
|
if not req.client_accepts('application/json'):
|
|
raise falcon.HTTPNotAcceptable(
|
|
u'''
|
|
Endpoint only serves `application/json`; specify client-side
|
|
media type support with the "Accept" header.''',
|
|
href=u'http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html',
|
|
href_text=u'14.1 Accept, Hypertext Transfer Protocol -- HTTP/1.1')
|
|
|
|
|
|
def require_content_type_be_non_urlencoded(req, resp, params):
|
|
"""Raises an exception on "x-www-form-urlencoded" content type of request.
|
|
|
|
If request has body and "Content-Type" header has
|
|
"application/x-www-form-urlencoded" value (case-insensitive), this function
|
|
raises falcon.HTTPBadRequest exception.
|
|
|
|
This strange function exists only to prevent bug/1547100 in a backward
|
|
compatible way.
|
|
|
|
Meant to be used as a `before` hook.
|
|
|
|
:param req: request sent
|
|
:type req: falcon.request.Request
|
|
:param resp: response object to return
|
|
:type resp: falcon.response.Response
|
|
:param params: additional parameters passed to responders
|
|
:type params: dict
|
|
:rtype: None
|
|
:raises HTTPBadRequest: if request has body and "Content-Type" header has
|
|
"application/x-www-form-urlencoded" value
|
|
"""
|
|
if req.content_length is None:
|
|
return
|
|
if req.content_type and (req.content_type.lower() ==
|
|
'application/x-www-form-urlencoded'):
|
|
title = _(u'Invalid Content-Type')
|
|
description = _(u'Endpoint does not accept '
|
|
u'`application/x-www-form-urlencoded` content; '
|
|
u'currently supported media type is '
|
|
u'`application/json`; specify proper client-side '
|
|
u'media type with the "Content-Type" header.')
|
|
raise falcon.HTTPBadRequest(title, description)
|
|
|
|
|
|
def inject_context(req, resp, params):
|
|
"""Inject context value into request environment.
|
|
|
|
:param req: request sent
|
|
:type req: falcon.request.Request
|
|
:param resp: response object
|
|
:type resp: falcon.response.Response
|
|
:param params: additional parameters passed to responders
|
|
:type params: dict
|
|
:rtype: None
|
|
|
|
"""
|
|
client_id = req.get_header('Client-ID')
|
|
request_id = req.headers.get('X-Openstack-Request-ID')
|
|
auth_token = req.headers.get('X-AUTH-TOKEN')
|
|
project_id = params.get('project_id')
|
|
user_id = req.headers.get('X-USER-ID')
|
|
domain_id = req.headers.get('X-DOMAIN-ID')
|
|
project_domain_id = req.headers.get('X-PROJECT-DOMAIN-ID')
|
|
user_domain_id = req.headers.get('X-USER-DOMAIN-ID')
|
|
roles = req.headers.get('X-ROLES')
|
|
roles = roles and roles.split(',') or []
|
|
|
|
ctxt = context.RequestContext(project_id=project_id,
|
|
client_id=client_id,
|
|
request_id=request_id,
|
|
auth_token=auth_token,
|
|
user_id=user_id,
|
|
roles=roles,
|
|
domain_id=domain_id,
|
|
project_domain_id=project_domain_id,
|
|
user_domain_id=user_domain_id)
|
|
req.env['zaqar.context'] = ctxt
|