/* Copyright (c) Cloud Software Group, Inc.
*
* Redistribution and use in source and binary forms,
* with or without modification, are permitted provided
* that the following conditions are met:
*
* * Redistributions of source code must retain the above
* copyright notice, this list of conditions and the
* following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the
* following disclaimer in the documentation and/or other
* materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
using System;
using System.Collections.Generic;
using XenAdmin.Core;
using XenAdmin.Network;
namespace XenAPI
{
// Note that the Role object represents both the high-level roles (such as "VM Operator" etc.)
// and their subroles, i.e., the individual calls they are allowed to make (such as "vm.create").
public partial class Role
{
private static readonly log4net.ILog log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
public const string MR_ROLE_READ_ONLY = "read-only";
public const string MR_ROLE_VM_OPERATOR = "vm-operator";
public const string MR_ROLE_VM_ADMIN = "vm-admin";
public const string MR_ROLE_VM_POWER_ADMIN = "vm-power-admin";
public const string MR_ROLE_POOL_OPERATOR = "pool-operator";
public const string MR_ROLE_POOL_ADMIN = "pool-admin";
public string FriendlyName()
{
return FriendlyNameManager.GetFriendlyName(string.Format("Role.{0}.NameLabel", name_label.ToLowerInvariant()));
}
public static string FriendlyName(string role)
{
return FriendlyNameManager.GetFriendlyName(string.Format("Role.{0}.NameLabel", role.ToLowerInvariant()));
}
public string FriendlyDescription()
{
return FriendlyNameManager.GetFriendlyName(string.Format("Role.{0}.Description", this.name_label.ToLowerInvariant()));
}
public override string Name()
{
return name_label;
}
///
/// Currently all RBAC roles can be arranged in a rank so that each one has all the privileges of the next. Use this function for sorting based on this ordering.
///
public int RoleRank()
{
switch (name_label.ToLowerInvariant())
{
case MR_ROLE_READ_ONLY: return 0;
case MR_ROLE_VM_OPERATOR: return 1;
case MR_ROLE_VM_ADMIN: return 2;
case MR_ROLE_VM_POWER_ADMIN: return 3;
case MR_ROLE_POOL_OPERATOR: return 4;
case MR_ROLE_POOL_ADMIN: return 5;
}
return -1;
}
///
/// logout, login_with_password
///
public static readonly RbacMethodList CommonSessionApiList = new RbacMethodList(
"session.logout",
"session.login_with_password"
);
///
/// add_to_other_config, destroy
///
public static readonly RbacMethodList CommonTaskApiList = new RbacMethodList(
new RbacMethod("task.add_to_other_config", "XenCenterUUID"), // See AsyncAction.RelatedTask
new RbacMethod("task.add_to_other_config", "applies_to"),
new RbacMethod("task.destroy")
);
///
/// Takes a list of role objects and returns as a comma separated friendly string
///
public static string FriendlyCSVRoleList(List roles)
{
if (roles == null)
return "";
return String.Join(", ", roles.ConvertAll(r => r.FriendlyName()).ToArray());
}
///
/// Retrieves all the server RBAC roles which are able to complete all the api methods supplied.
/// If on George or less this will return an empty list.
///
/// list of RbacMethods to check
/// server connection to retrieve roles from
public static List ValidRoleList(RbacMethodList apiMethodsToRoleCheck, IXenConnection connection)
{
log.DebugFormat("Checking roles required to complete the following calls: {0}",
string.Join(", ", apiMethodsToRoleCheck.ToStringArray()));
var rolesAbleToCompleteAction = new List();
foreach (RbacMethod method in apiMethodsToRoleCheck)
{
List rolesAbleToCompleteApiCall = ValidRoleList(method, connection);
if (rolesAbleToCompleteAction.Count == 0)
{
rolesAbleToCompleteAction.AddRange(rolesAbleToCompleteApiCall);
continue;
}
//the permissions to run a list of API calls should be those of the
//most restricted call in the list; if more permissions have been added
//by the previous calls in the list, these have to be removed
if (rolesAbleToCompleteApiCall.Count > 0)
rolesAbleToCompleteAction.RemoveAll(r => !rolesAbleToCompleteApiCall.Contains(r));
}
return rolesAbleToCompleteAction;
}
///
/// Retrieves all the server RBAC roles which are able to complete the api method supplied.
/// If on George or less this will return an empty list.
///
/// RbacMethod to check
/// server connection to retrieve roles from
private static List ValidRoleList(RbacMethod apiMethodToRoleCheck, IXenConnection connection)
{
List rolesAbleToCompleteApiCall = new List();
foreach (Role role in connection.Cache.Roles)
{
List subroles = connection.ResolveAll(role.subroles);
if (subroles.Find(r => r.CanPerform(apiMethodToRoleCheck)) != null)
{
rolesAbleToCompleteApiCall.Add(role);
}
}
// On connections with roles (i.e. non-simulator connections), each API call
// should be available to at least Pool Admins (because the latter can do
// everything). No roles is usually caused by a typo in the apiMethodToRoleCheck,
// or by running a new action against an old server without checking.
if (!connection.HostnameWithPort.EndsWith(".xml", StringComparison.InvariantCultureIgnoreCase))
{
var msg = $"No roles able to perform API call {apiMethodToRoleCheck}";
if (rolesAbleToCompleteApiCall.Count < 1)
log.Debug(msg);
System.Diagnostics.Debug.Assert(rolesAbleToCompleteApiCall.Count > 0, msg);
}
return rolesAbleToCompleteApiCall;
}
///
/// Retrieves all the server RBAC roles which are able to complete the api method supplied.
/// If on George or less this will return an empty list.
///
/// object.method
/// server connection to retrieve roles from
public static List ValidRoleList(string apiMethodToRoleCheck, IXenConnection connection)
{
return ValidRoleList(new RbacMethod(apiMethodToRoleCheck), connection);
}
///
/// Can the main session on this connection already perform all the API methods? If on George or less this will return false.
/// Also return the list of valid roles.
///
/// The methods to check
/// The connection on which to perform the methods
/// The list of roles which can perform all the methods
public static bool CanPerform(RbacMethodList apiMethodsToRoleCheck, IXenConnection connection, out List validRoleList)
{
if (!connection.IsConnected)
{
validRoleList = new List();
return false;
}
validRoleList = ValidRoleList(apiMethodsToRoleCheck, connection);
if (connection.Session != null && connection.Session.IsLocalSuperuser)
return true;
foreach (Role role in validRoleList)
{
if (connection.Session != null && connection.Session.Roles != null && connection.Session.Roles.Contains(role))
return true;
}
return false;
}
///
/// Can this subrole perform this API call?
///
/// The API call which we want to perform
private bool CanPerform(RbacMethod rbacMethod)
{
// Does the method name match?
if (name_label == rbacMethod.Method)
return true;
// Is the call a hash table modification, and if so, does the
// more specific name match?
if (!String.IsNullOrEmpty(rbacMethod.Key))
{
string whole = rbacMethod.ToString();
if (name_label.EndsWith("*")) // e.g. vm.add_to_other_config/key:Foo*
{
string stripped_name = name_label.TrimEnd('*');
if (whole.StartsWith(stripped_name))
return true;
}
else // e.g. vm.add_to_other_config/key:Foo
{
if (name_label == whole)
return true;
}
}
return false;
}
#region XenObjectComparable Members
public override int CompareTo(Role other)
{
int rank = RoleRank();
int otherRank = other.RoleRank();
return rank > otherRank ? 1 : rank < otherRank ? -1 : 0;
}
public override bool Equals(object obj)
{
return obj is Role r ? r.opaque_ref == opaque_ref : base.Equals(obj);
}
public override int GetHashCode()
{
return opaque_ref.GetHashCode();
}
#endregion
}
}