xenadmin/XenModel/Actions/HealthCheck/SaveHealthCheckSettingsAction.cs
Mihaela Stoica 53b01c425c CP-13077: Changes to the Health Check feature to work properly with RBAC
Changed all the health check actions to perform the necessary role checks
- HealthCheckAuthenticationAction: changed so it does not save the tokens, so no role checks required in this action (all the checks are performed in SaveHealthCheckSettingsAction)
- GetHealthCheckAnalysisActions: added role checks

On the Health Check Overview dialog, a pool is displayed as read-only if connected as a user with roles that don't permit changing the health check settings:
- the following actions are not available: enroll, edit settings, disable health check, request upload, get analysis result
2015-09-03 11:49:53 +01:00

131 lines
5.5 KiB
C#

/* Copyright (c) Citrix Systems Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms,
* with or without modification, are permitted provided
* that the following conditions are met:
*
* * Redistributions of source code must retain the above
* copyright notice, this list of conditions and the
* following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the
* following disclaimer in the documentation and/or other
* materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
using System;
using System.Collections.Generic;
using System.Net;
using XenAdmin.Model;
using XenAPI;
namespace XenAdmin.Actions
{
public class SaveHealthCheckSettingsAction : PureAsyncAction
{
private static readonly log4net.ILog log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
private readonly Pool pool;
HealthCheckSettings healthCheckSettings;
private string authenticationToken;
private string diagnosticToken;
private string username;
private string password;
public SaveHealthCheckSettingsAction(Pool pool, HealthCheckSettings healthCheckSettings, string authenticationToken, string diagnosticToken, string userName, string passWord, bool suppressHistory)
: base(pool.Connection, Messages.ACTION_SAVE_HEALTHCHECK_SETTINGS, string.Format(Messages.ACTION_SAVING_HEALTHCHECK_SETTINGS, pool.Name), suppressHistory)
{
this.pool = pool;
this.healthCheckSettings = healthCheckSettings;
this.authenticationToken = authenticationToken;
this.diagnosticToken = diagnosticToken;
this.username = healthCheckSettings.Status == HealthCheckStatus.Enabled ? userName : null;
this.password = healthCheckSettings.Status == HealthCheckStatus.Enabled ? passWord : null;
}
protected override void Run()
{
Dictionary<string, string> newConfig = healthCheckSettings.ToDictionary(pool.health_check_config);
if (!string.IsNullOrEmpty(authenticationToken))
{
log.Info("Saving upload token as xapi secret");
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_TOKEN_SECRET, authenticationToken);
}
if (!string.IsNullOrEmpty(diagnosticToken))
{
log.Info("Saving diagnostic token as xapi secret");
SetSecretInfo(Session, newConfig, HealthCheckSettings.DIAGNOSTIC_TOKEN_SECRET, diagnosticToken);
}
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_CREDENTIAL_USER_SECRET, username);
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_CREDENTIAL_PASSWORD_SECRET, password);
Pool.set_health_check_config(Session, pool.opaque_ref, newConfig);
}
public static void SetSecretInfo(Session session, Dictionary<string, string> config, string infoKey, string infoValue)
{
if (string.IsNullOrEmpty(infoKey))
return;
if (infoValue == null)
{
if (config.ContainsKey(infoKey))
{
TryToDestroySecret(session, config[infoKey]);
config.Remove(infoKey);
}
}
else if (config.ContainsKey(infoKey))
{
try
{
string secretRef = Secret.get_by_uuid(session, config[infoKey]);
Secret.set_value(session, secretRef, infoValue);
}
catch (Failure)
{
config[infoKey] = Secret.CreateSecret(session, infoValue);
}
catch (WebException)
{
config[infoKey] = Secret.CreateSecret(session, infoValue);
}
}
else
{
config[infoKey] = Secret.CreateSecret(session, infoValue);
}
}
private static void TryToDestroySecret(Session session, string secret_uuid)
{
try
{
var secret = Secret.get_by_uuid(session, secret_uuid);
Secret.destroy(session, secret.opaque_ref);
log.DebugFormat("Successfully destroyed secret {0}", secret_uuid);
}
catch (Exception exn)
{
log.Error(string.Format("Failed to destroy secret {0}", secret_uuid), exn);
}
}
}
}