2019-10-01 08:17:39 +00:00
|
|
|
"""passbook policy task"""
|
|
|
|
from multiprocessing import Process
|
|
|
|
from multiprocessing.connection import Connection
|
2020-05-09 18:54:11 +00:00
|
|
|
from typing import Optional
|
2019-10-01 08:17:39 +00:00
|
|
|
|
2019-10-07 14:33:48 +00:00
|
|
|
from django.core.cache import cache
|
2020-08-20 18:39:21 +00:00
|
|
|
from sentry_sdk import start_span
|
|
|
|
from sentry_sdk.tracing import Span
|
2019-10-01 08:24:10 +00:00
|
|
|
from structlog import get_logger
|
|
|
|
|
2019-10-07 14:33:48 +00:00
|
|
|
from passbook.policies.exceptions import PolicyException
|
2020-05-28 19:45:54 +00:00
|
|
|
from passbook.policies.models import PolicyBinding
|
2020-02-20 12:52:05 +00:00
|
|
|
from passbook.policies.types import PolicyRequest, PolicyResult
|
2019-10-01 08:17:39 +00:00
|
|
|
|
2019-10-04 08:22:06 +00:00
|
|
|
LOGGER = get_logger()
|
2019-10-01 08:17:39 +00:00
|
|
|
|
|
|
|
|
2020-05-24 00:06:54 +00:00
|
|
|
def cache_key(binding: PolicyBinding, request: PolicyRequest) -> str:
|
2019-10-07 14:33:48 +00:00
|
|
|
"""Generate Cache key for policy"""
|
2020-05-28 19:45:54 +00:00
|
|
|
prefix = f"policy_{binding.policy_binding_uuid.hex}_{binding.policy.pk.hex}"
|
2020-05-24 00:06:54 +00:00
|
|
|
if request.http_request:
|
|
|
|
prefix += f"_{request.http_request.session.session_key}"
|
|
|
|
if request.user:
|
|
|
|
prefix += f"#{request.user.pk}"
|
2020-02-24 12:15:27 +00:00
|
|
|
return prefix
|
2019-10-01 08:17:39 +00:00
|
|
|
|
2019-12-31 11:51:16 +00:00
|
|
|
|
2019-10-04 08:22:06 +00:00
|
|
|
class PolicyProcess(Process):
|
2019-10-01 08:17:39 +00:00
|
|
|
"""Evaluate a single policy within a seprate process"""
|
|
|
|
|
2019-10-04 11:44:26 +00:00
|
|
|
connection: Connection
|
2020-05-28 19:45:54 +00:00
|
|
|
binding: PolicyBinding
|
2019-10-03 08:45:31 +00:00
|
|
|
request: PolicyRequest
|
2019-10-01 08:17:39 +00:00
|
|
|
|
2020-05-28 19:45:54 +00:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
binding: PolicyBinding,
|
|
|
|
request: PolicyRequest,
|
|
|
|
connection: Optional[Connection],
|
|
|
|
):
|
2019-10-04 11:44:26 +00:00
|
|
|
super().__init__()
|
2020-05-28 19:45:54 +00:00
|
|
|
self.binding = binding
|
2019-10-04 11:44:26 +00:00
|
|
|
self.request = request
|
2020-06-05 10:00:27 +00:00
|
|
|
if not isinstance(self.request, PolicyRequest):
|
|
|
|
raise ValueError(f"{self.request} is not a Policy Request.")
|
2020-05-28 19:45:54 +00:00
|
|
|
if connection:
|
|
|
|
self.connection = connection
|
2019-10-04 11:44:26 +00:00
|
|
|
|
2020-05-28 19:45:54 +00:00
|
|
|
def execute(self) -> PolicyResult:
|
|
|
|
"""Run actual policy, returns result"""
|
2020-08-20 18:39:21 +00:00
|
|
|
with start_span(op="policy.process.execute",) as span:
|
|
|
|
span: Span
|
|
|
|
span.set_data("policy", self.binding.policy)
|
|
|
|
span.set_data("request", self.request)
|
|
|
|
LOGGER.debug(
|
|
|
|
"P_ENG(proc): Running policy",
|
|
|
|
policy=self.binding.policy,
|
|
|
|
user=self.request.user,
|
|
|
|
process="PolicyProcess",
|
|
|
|
)
|
|
|
|
try:
|
|
|
|
policy_result = self.binding.policy.passes(self.request)
|
|
|
|
except PolicyException as exc:
|
|
|
|
LOGGER.debug("P_ENG(proc): error", exc=exc)
|
|
|
|
policy_result = PolicyResult(False, str(exc))
|
|
|
|
# Invert result if policy.negate is set
|
|
|
|
if self.binding.negate:
|
|
|
|
policy_result.passing = not policy_result.passing
|
|
|
|
LOGGER.debug(
|
|
|
|
"P_ENG(proc): Finished",
|
|
|
|
policy=self.binding.policy,
|
|
|
|
result=policy_result,
|
|
|
|
process="PolicyProcess",
|
|
|
|
passing=policy_result.passing,
|
|
|
|
user=self.request.user,
|
|
|
|
)
|
|
|
|
key = cache_key(self.binding, self.request)
|
|
|
|
cache.set(key, policy_result)
|
|
|
|
LOGGER.debug("P_ENG(proc): Cached policy evaluation", key=key)
|
|
|
|
return policy_result
|
2020-05-28 19:45:54 +00:00
|
|
|
|
|
|
|
def run(self):
|
|
|
|
"""Task wrapper to run policy checking"""
|
|
|
|
self.connection.send(self.execute())
|