groups, filters, users, flavors
This commit is contained in:
parent
afbe4f691f
commit
31f1fd5e2b
26
devops-service/app/api2/handlers/filter.rb
Normal file
26
devops-service/app/api2/handlers/filter.rb
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
module Devops
|
||||||
|
module API2_0
|
||||||
|
module Handler
|
||||||
|
class Filter
|
||||||
|
|
||||||
|
def initialize provider
|
||||||
|
@provider = provider
|
||||||
|
end
|
||||||
|
|
||||||
|
def available_images
|
||||||
|
Devops::Db.connector.available_images(@provider)
|
||||||
|
end
|
||||||
|
|
||||||
|
def add_images images
|
||||||
|
Devops::Db.connector.add_available_images(images, @provider)
|
||||||
|
end
|
||||||
|
|
||||||
|
def delete_images images
|
||||||
|
Devops::Db.connector.delete_available_images(images, @provider)
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
20
devops-service/app/api2/handlers/group.rb
Normal file
20
devops-service/app/api2/handlers/group.rb
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
require "providers/provider_factory"
|
||||||
|
|
||||||
|
module Devops
|
||||||
|
module API2_0
|
||||||
|
module Handler
|
||||||
|
class Group
|
||||||
|
|
||||||
|
def initialize provider
|
||||||
|
@provider = provider
|
||||||
|
end
|
||||||
|
|
||||||
|
def groups params
|
||||||
|
p = ::Provider::ProviderFactory.get @provider
|
||||||
|
p.groups(params)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
15
devops-service/app/api2/handlers/provider.rb
Normal file
15
devops-service/app/api2/handlers/provider.rb
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
require "providers/provider_factory"
|
||||||
|
|
||||||
|
module Devops
|
||||||
|
module API2_0
|
||||||
|
module Handler
|
||||||
|
class Provider
|
||||||
|
|
||||||
|
def providers
|
||||||
|
::Provider::ProviderFactory.providers
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
47
devops-service/app/api2/handlers/user.rb
Normal file
47
devops-service/app/api2/handlers/user.rb
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
require "db/mongo/models/user"
|
||||||
|
|
||||||
|
module Devops
|
||||||
|
module API2_0
|
||||||
|
module Handler
|
||||||
|
class User
|
||||||
|
|
||||||
|
def users
|
||||||
|
Devops::Db.connector.users
|
||||||
|
end
|
||||||
|
|
||||||
|
def create body
|
||||||
|
Devops::Db.connector.user_insert Devops::Model::User.new(body)
|
||||||
|
end
|
||||||
|
|
||||||
|
def delete user_id
|
||||||
|
Devops::Db.connector.user_delete user_id
|
||||||
|
end
|
||||||
|
|
||||||
|
def change_user_privileges user_id, cmd, privileges
|
||||||
|
change_user(user_id) do
|
||||||
|
user.grant(cmd, privileges)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def change_email user_id, val
|
||||||
|
change_user(user_id) do
|
||||||
|
user.email = val
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def change_password user_id, val
|
||||||
|
change_user(user_id) do
|
||||||
|
user.password = val
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def change_user user_id
|
||||||
|
user = Devops::Db.connector.user user_id
|
||||||
|
yield(user)
|
||||||
|
Devops::Db.connector.user_update user
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
@ -5,7 +5,7 @@ require "sinatra/json"
|
|||||||
require "providers/provider_factory"
|
require "providers/provider_factory"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
module Version2_0
|
module API2_0
|
||||||
module Helpers
|
module Helpers
|
||||||
|
|
||||||
def create_response msg, obj=nil, rstatus=200
|
def create_response msg, obj=nil, rstatus=200
|
||||||
@ -23,11 +23,10 @@ module Devops
|
|||||||
|
|
||||||
def check_privileges cmd, p
|
def check_privileges cmd, p
|
||||||
# somewhy REMOTE_USER is missing
|
# somewhy REMOTE_USER is missing
|
||||||
user = request.env['HTTP_REMOTE_USER'] || request.env['REMOTE_USER']
|
user = request.env['USER']
|
||||||
settings.mongo.check_user_privileges(user, cmd, p)
|
user.check_privileges(cmd, p)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
def check_provider provider
|
def check_provider provider
|
||||||
list = ::Provider::ProviderFactory.providers
|
list = ::Provider::ProviderFactory.providers
|
||||||
halt_response("Invalid provider '#{provider}', available providers: '#{list.join("', '")}'", 404) unless list.include?(provider)
|
halt_response("Invalid provider '#{provider}', available providers: '#{list.join("', '")}'", 404) unless list.include?(provider)
|
||||||
@ -1,20 +1,10 @@
|
|||||||
module Devops
|
module Devops
|
||||||
module Version2_0
|
module API2_0
|
||||||
module Routes
|
module Routes
|
||||||
module FilterRoutes
|
module FilterRoutes
|
||||||
|
|
||||||
def self.registered(app)
|
def self.registered(app)
|
||||||
|
|
||||||
app.before "/filter/:provider/image" do
|
|
||||||
protect!
|
|
||||||
check_headers :accept, :content_type
|
|
||||||
check_privileges("filter", "w")
|
|
||||||
check_provider(params[:provider])
|
|
||||||
@images = create_object_from_json_body(Array)
|
|
||||||
halt_response("Request body should not be an empty array") if @images.empty?
|
|
||||||
check_array(@images, "Request body should contains an array with strings")
|
|
||||||
end
|
|
||||||
|
|
||||||
# Get list of images filters for :provider
|
# Get list of images filters for :provider
|
||||||
#
|
#
|
||||||
# Devops can works with images from filters list only
|
# Devops can works with images from filters list only
|
||||||
@ -33,7 +23,12 @@ module Devops
|
|||||||
# [
|
# [
|
||||||
# "36dc7618-4178-4e29-be43-286fbfe90f50"
|
# "36dc7618-4178-4e29-be43-286fbfe90f50"
|
||||||
# ]
|
# ]
|
||||||
app.get_with_headers "/filter/:provider/images", :headers => [:accept], &Devops::Version2_0::Handler::Filter.get_filters
|
app.get_with_headers "/filter/:provider/images", :headers => [:accept] do#, &Devops::API2_0::Handler::Filter.get_filters
|
||||||
|
check_privileges("filter", "r")
|
||||||
|
provider = params[:provider]
|
||||||
|
check_provider(provider)
|
||||||
|
json Devops::API2_0::Handler::Filter.new(provider).available_images
|
||||||
|
end
|
||||||
|
|
||||||
hash = {}
|
hash = {}
|
||||||
|
|
||||||
@ -50,7 +45,15 @@ module Devops
|
|||||||
# ] -> array of image ids to add to filter
|
# ] -> array of image ids to add to filter
|
||||||
#
|
#
|
||||||
# * *Returns* : list of images filters for :provider
|
# * *Returns* : list of images filters for :provider
|
||||||
hash["PUT"] = Devops::Version2_0::Handler::Filter.add_filter
|
hash["PUT"] = lambda { #Devops::API2_0::Handler::Filter.add_filter
|
||||||
|
check_privileges("filter", "w")
|
||||||
|
provider = params[:provider]
|
||||||
|
check_provider(provider)
|
||||||
|
images = create_object_from_json_body(Array)
|
||||||
|
halt_response("Request body should not be an empty array") if images.empty?
|
||||||
|
check_array(images, "Request body should contains an array with strings")
|
||||||
|
create_response("Updated", {:images => Devops::API2_0::Handler::Filter.new(provider).add_images(images)})
|
||||||
|
}
|
||||||
|
|
||||||
# Delete image ids from filter for :provider
|
# Delete image ids from filter for :provider
|
||||||
#
|
#
|
||||||
@ -65,7 +68,15 @@ module Devops
|
|||||||
# ] -> array of image ids to delete from filter
|
# ] -> array of image ids to delete from filter
|
||||||
#
|
#
|
||||||
# * *Returns* : list of images filters for :provider
|
# * *Returns* : list of images filters for :provider
|
||||||
hash["DELETE"] = Devops::Version2_0::Handler::Filter.delete_filter
|
hash["DELETE"] = lambda {#Devops::API2_0::Handler::Filter.delete_filter
|
||||||
|
check_privileges("filter", "w")
|
||||||
|
provider = params[:provider]
|
||||||
|
check_provider(provider)
|
||||||
|
images = create_object_from_json_body(Array)
|
||||||
|
halt_response("Request body should not be an empty array") if images.empty?
|
||||||
|
check_array(images, "Request body should contains an array with strings")
|
||||||
|
create_response("Deleted", {:images => Devops::API2_0::Handler::Filter.new(provider).delete_images(images)})
|
||||||
|
}
|
||||||
|
|
||||||
app.multi_routes "/filter/:provider/image", {:headers => [:accept, :content_type]}, hash
|
app.multi_routes "/filter/:provider/image", {:headers => [:accept, :content_type]}, hash
|
||||||
|
|
||||||
@ -1,6 +1,6 @@
|
|||||||
# encoding: UTF-8
|
# encoding: UTF-8
|
||||||
module Devops
|
module Devops
|
||||||
module Version2_0
|
module API2_0
|
||||||
module Routes
|
module Routes
|
||||||
module GroupRoutes
|
module GroupRoutes
|
||||||
|
|
||||||
@ -44,7 +44,12 @@ module Devops
|
|||||||
# }
|
# }
|
||||||
# }
|
# }
|
||||||
# TODO: vpc support for ec2
|
# TODO: vpc support for ec2
|
||||||
app.get_with_headers "/groups/:provider", :headers => [:accept], &Devops::Version2_0::Handler::Group.get_groups
|
app.get_with_headers "/groups/:provider", :headers => [:accept] do#, &Devops::Version2_0::Handler::Group.get_groups
|
||||||
|
check_privileges("group", "r")
|
||||||
|
provider = params[:provider]
|
||||||
|
check_provider(provider)
|
||||||
|
json Devops::API2_0::Handler::Group.new(provider).groups(params)
|
||||||
|
end
|
||||||
|
|
||||||
puts "Group routes initialized"
|
puts "Group routes initialized"
|
||||||
end
|
end
|
||||||
@ -1,5 +1,4 @@
|
|||||||
require "json"
|
require "json"
|
||||||
require "db/exceptions/invalid_record"
|
|
||||||
require "db/mongo/models/key"
|
require "db/mongo/models/key"
|
||||||
require "fileutils"
|
require "fileutils"
|
||||||
|
|
||||||
@ -4,7 +4,7 @@ require "json"
|
|||||||
require "providers/provider_factory"
|
require "providers/provider_factory"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
module Version2_0
|
module API2_0
|
||||||
module Routes
|
module Routes
|
||||||
module ProviderRoutes
|
module ProviderRoutes
|
||||||
|
|
||||||
@ -22,7 +22,10 @@ module Devops
|
|||||||
# "ec2",
|
# "ec2",
|
||||||
# "openstack"
|
# "openstack"
|
||||||
# ]
|
# ]
|
||||||
app.get_with_headers "/providers", :headers => [:accept], &Devops::Version2_0::Handler::Provider.get_providers
|
app.get_with_headers "/providers", :headers => [:accept] do#, &Devops::Version2_0::Handler::Provider.get_providers
|
||||||
|
check_privileges("provider", "r")
|
||||||
|
json Devops::API2_0::Handler::Provider.new.providers
|
||||||
|
end
|
||||||
|
|
||||||
puts "Provider routes initialized"
|
puts "Provider routes initialized"
|
||||||
end
|
end
|
||||||
@ -1,5 +1,5 @@
|
|||||||
module Devops
|
module Devops
|
||||||
module Version2_0
|
module API2_0
|
||||||
module Routes
|
module Routes
|
||||||
module UserRoutes
|
module UserRoutes
|
||||||
|
|
||||||
@ -33,7 +33,11 @@ module Devops
|
|||||||
# "id": "test"
|
# "id": "test"
|
||||||
# }
|
# }
|
||||||
# ]
|
# ]
|
||||||
app.get_with_headers "/users", :headers => [:accept], &Devops::Version2_0::Handler::User.get_users
|
app.get_with_headers "/users", :headers => [:accept] do#, &Devops::API2_0::Handler::User.get_users
|
||||||
|
check_privileges("user", "r")
|
||||||
|
users = Devops::API2_0::Handler::User.new.users.map {|i| h = i.to_hash; h.delete("password"); h}
|
||||||
|
json users
|
||||||
|
end
|
||||||
|
|
||||||
# Create user
|
# Create user
|
||||||
#
|
#
|
||||||
@ -51,7 +55,15 @@ module Devops
|
|||||||
#
|
#
|
||||||
# * *Returns* :
|
# * *Returns* :
|
||||||
# 201 - Created
|
# 201 - Created
|
||||||
app.post_with_headers "/user", :headers => [:accept, :content_type], &Devops::Version2_0::Handler::User.create_user
|
app.post_with_headers "/user", :headers => [:accept, :content_type] do#, &Devops::API2_0::Handler::User.create_user
|
||||||
|
check_privileges("user", "w")
|
||||||
|
user = create_object_from_json_body
|
||||||
|
["username", "password", "email"].each do |p|
|
||||||
|
check_string(user[p], "Parameter '#{p}' must be a not empty string")
|
||||||
|
end
|
||||||
|
Devops::API2_0::Handler::User.new.create(user)
|
||||||
|
create_response("Created", nil, 201)
|
||||||
|
end
|
||||||
|
|
||||||
hash = {}
|
hash = {}
|
||||||
# Delete user
|
# Delete user
|
||||||
@ -63,7 +75,24 @@ module Devops
|
|||||||
#
|
#
|
||||||
# * *Returns* :
|
# * *Returns* :
|
||||||
# 200 - Deleted
|
# 200 - Deleted
|
||||||
hash["DELETE"] = Devops::Version2_0::Handler::User.delete_user
|
hash["DELETE"] = lambda {
|
||||||
|
check_privileges("user", "w")
|
||||||
|
projects = Devops::Db.connector.projects_by_user params[:user]
|
||||||
|
if !projects.empty?
|
||||||
|
str = ""
|
||||||
|
projects.each do |p|
|
||||||
|
p.deploy_envs.each do |e|
|
||||||
|
str+="#{p.id}.#{e.identifier} " if e.users.include? params[:user]
|
||||||
|
end
|
||||||
|
end
|
||||||
|
logger.info projects
|
||||||
|
raise DependencyError.new "Deleting is forbidden: User is included in #{str}"
|
||||||
|
#return [400, "Deleting is forbidden: User is included in #{str}"]
|
||||||
|
end
|
||||||
|
|
||||||
|
Devops::API2_0::Handler::User.new.delete(params[:user])
|
||||||
|
create_response("User '#{params[:user]}' removed")
|
||||||
|
}
|
||||||
|
|
||||||
# Change user privileges
|
# Change user privileges
|
||||||
#
|
#
|
||||||
@ -80,7 +109,14 @@ module Devops
|
|||||||
#
|
#
|
||||||
# * *Returns* :
|
# * *Returns* :
|
||||||
# 200 - Updated
|
# 200 - Updated
|
||||||
hash["PUT"] = Devops::Version2_0::Handler::User.change_user_privileges
|
hash["PUT"] = lambda {
|
||||||
|
check_privileges("user", "w")
|
||||||
|
data = create_object_from_json_body
|
||||||
|
cmd = check_string(data["cmd"], "Parameter 'cmd' should be a not empty string", true) || ""
|
||||||
|
privileges = check_string(data["privileges"], "Parameter 'privileges' should be a not empty string", true) || ""
|
||||||
|
Devops::API2_0::Handler::User.new.change_user_privileges(params[:user], cmd, privileges)
|
||||||
|
create_response("Updated")
|
||||||
|
}
|
||||||
app.multi_routes "/user/:user", {:headers => [:accept, :content_type]}, hash
|
app.multi_routes "/user/:user", {:headers => [:accept, :content_type]}, hash
|
||||||
|
|
||||||
# Change user email/password
|
# Change user email/password
|
||||||
@ -97,7 +133,20 @@ module Devops
|
|||||||
#
|
#
|
||||||
# * *Returns* :
|
# * *Returns* :
|
||||||
# 200 - Updated
|
# 200 - Updated
|
||||||
app.put_with_headers %r{\A/user/#{DevopsConfig::OBJECT_NAME}/(email|password)\z}, :headers => [:accept, :content_type], &Devops::Version2_0::Handler::User.change_user_email_or_password
|
app.put_with_headers %r{\A/user/#{DevopsConfig::OBJECT_NAME}/(email|password)\z}, :headers => [:accept, :content_type] do#, &Devops::API2_0::Handler::User.change_user_email_or_password
|
||||||
|
check_privileges("user", "w")
|
||||||
|
action = File.basename(request.path)
|
||||||
|
u = File.basename(File.dirname(request.path))
|
||||||
|
raise InvalidPrivileges.new("Access denied for '#{request.env['REMOTE_USER']}'") if u == Devops::Model::User::ROOT_USER_NAME and request.env['REMOTE_USER'] != Devops::Model::User::ROOT_USER_NAME
|
||||||
|
|
||||||
|
check_privileges("user", "w") unless request.env['REMOTE_USER'] == u
|
||||||
|
|
||||||
|
body = create_object_from_json_body
|
||||||
|
p = check_string(body[action], "Parameter '#{action}' must be a not empty string")
|
||||||
|
h = Devops::API2_0::Handler::User.new
|
||||||
|
h.send("change_#{action}=", p)
|
||||||
|
create_response("Updated")
|
||||||
|
end
|
||||||
|
|
||||||
puts "User routes initialized"
|
puts "User routes initialized"
|
||||||
end
|
end
|
||||||
@ -1,25 +1,31 @@
|
|||||||
require "sinatra/base"
|
require "sinatra/base"
|
||||||
require "sinatra/streaming"
|
require "sinatra/streaming"
|
||||||
require "helpers/version_2"
|
|
||||||
require "json"
|
require "json"
|
||||||
|
|
||||||
require "fog"
|
require "fog"
|
||||||
|
|
||||||
require "auth/devops_auth"
|
require "auth/devops_auth"
|
||||||
require "db/exceptions/invalid_record"
|
require "exceptions/invalid_record"
|
||||||
require "db/exceptions/record_not_found"
|
require "exceptions/record_not_found"
|
||||||
require "exceptions/dependency_error"
|
require "exceptions/dependency_error"
|
||||||
|
require 'core/devops-logger'
|
||||||
|
|
||||||
|
require_relative "../helpers/version_2"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
class Api2 < Sinatra::Base
|
class Api2 < Sinatra::Base
|
||||||
|
|
||||||
include Sinatra::JSON
|
include Sinatra::JSON
|
||||||
helpers Sinatra::Streaming
|
helpers Sinatra::Streaming
|
||||||
helpers Devops::Version2_0::Helpers
|
helpers Devops::API2_0::Helpers
|
||||||
|
|
||||||
register Sinatra::DevopsAuth
|
register Sinatra::DevopsAuth
|
||||||
|
|
||||||
configure :production do
|
configure :production do
|
||||||
|
config = DevopsConfig.config
|
||||||
|
log_file = File.join(config[:log_dir], "devops-api2.log")
|
||||||
|
logger = DevopsLogger.create(log_file, Logger::DEBUG)
|
||||||
|
use Rack::CommonLogger, logger
|
||||||
disable :dump_errors
|
disable :dump_errors
|
||||||
disable :show_exceptions
|
disable :show_exceptions
|
||||||
set :logging, Logger::INFO
|
set :logging, Logger::INFO
|
||||||
@ -27,11 +33,14 @@ module Devops
|
|||||||
end
|
end
|
||||||
|
|
||||||
configure :development do
|
configure :development do
|
||||||
set :logging, Logger::DEBUG
|
config = DevopsConfig.config
|
||||||
|
log_file = File.join(config[:log_dir], "devops-api2.log")
|
||||||
|
logger = DevopsLogger.create(log_file, Logger::DEBUG)
|
||||||
|
use Rack::CommonLogger, logger
|
||||||
disable :raise_errors
|
disable :raise_errors
|
||||||
# disable :dump_errors
|
# disable :dump_errors
|
||||||
set :show_exceptions, :after_handler
|
set :show_exceptions, :after_handler
|
||||||
puts "Development mode"
|
logger.info "Development mode"
|
||||||
end
|
end
|
||||||
|
|
||||||
not_found do
|
not_found do
|
||||||
@ -2,13 +2,15 @@ module Devops
|
|||||||
class DevopsApi2Application < Application
|
class DevopsApi2Application < Application
|
||||||
|
|
||||||
def prepare
|
def prepare
|
||||||
require "routes/v2.0"
|
require_relative "api2/routes/v2.0"
|
||||||
require "routes/v2.0/handlers/provider"
|
require_relative "api2/handlers/provider"
|
||||||
|
require_relative "api2/handlers/flavor"
|
||||||
|
require_relative "api2/handlers/filter"
|
||||||
|
require_relative "api2/handlers/group"
|
||||||
|
require_relative "api2/handlers/user"
|
||||||
|
=begin
|
||||||
require "routes/v2.0/handlers/bootstrap_templates"
|
require "routes/v2.0/handlers/bootstrap_templates"
|
||||||
require "routes/v2.0/handlers/deploy"
|
require "routes/v2.0/handlers/deploy"
|
||||||
require "routes/v2.0/handlers/filter"
|
|
||||||
require "routes/v2.0/handlers/flavor"
|
|
||||||
require "routes/v2.0/handlers/group"
|
|
||||||
require "routes/v2.0/handlers/image"
|
require "routes/v2.0/handlers/image"
|
||||||
require "routes/v2.0/handlers/network"
|
require "routes/v2.0/handlers/network"
|
||||||
require "routes/v2.0/handlers/key"
|
require "routes/v2.0/handlers/key"
|
||||||
@ -16,12 +18,12 @@ module Devops
|
|||||||
require "routes/v2.0/handlers/script"
|
require "routes/v2.0/handlers/script"
|
||||||
require "routes/v2.0/handlers/status"
|
require "routes/v2.0/handlers/status"
|
||||||
require "routes/v2.0/handlers/tag"
|
require "routes/v2.0/handlers/tag"
|
||||||
require "routes/v2.0/handlers/user"
|
|
||||||
require "routes/v2.0/handlers/server"
|
require "routes/v2.0/handlers/server"
|
||||||
require "routes/v2.0/handlers/stack"
|
require "routes/v2.0/handlers/stack"
|
||||||
require "routes/v2.0/handlers/stack_template"
|
require "routes/v2.0/handlers/stack_template"
|
||||||
require "routes/v2.0/stack_template_presets"
|
|
||||||
require "routes/v2.0/handlers/report"
|
require "routes/v2.0/handlers/report"
|
||||||
|
require_relative "api2/routes/handlers/stack_template_preset"
|
||||||
|
=end
|
||||||
|
|
||||||
require 'lib/stubber'
|
require 'lib/stubber'
|
||||||
end
|
end
|
||||||
@ -42,27 +44,26 @@ module Devops
|
|||||||
end
|
end
|
||||||
|
|
||||||
def routes
|
def routes
|
||||||
require "routes/v2.0/flavor"
|
require_relative "api2/routes/flavor"
|
||||||
require "routes/v2.0/image"
|
require_relative "api2/routes/image"
|
||||||
require "routes/v2.0/filter"
|
require_relative "api2/routes/filter"
|
||||||
require "routes/v2.0/network"
|
require_relative "api2/routes/network"
|
||||||
require "routes/v2.0/group"
|
require_relative "api2/routes/group"
|
||||||
require "routes/v2.0/deploy"
|
require_relative "api2/routes/deploy"
|
||||||
require "routes/v2.0/project"
|
require_relative "api2/routes/project"
|
||||||
require "routes/v2.0/key"
|
require_relative "api2/routes/key"
|
||||||
require "routes/v2.0/user"
|
require_relative "api2/routes/user"
|
||||||
require "routes/v2.0/provider"
|
require_relative "api2/routes/provider"
|
||||||
require "routes/v2.0/tag"
|
require_relative "api2/routes/tag"
|
||||||
require "routes/v2.0/server"
|
require_relative "api2/routes/server"
|
||||||
require "routes/v2.0/script"
|
require_relative "api2/routes/script"
|
||||||
require "routes/v2.0/status"
|
require_relative "api2/routes/status"
|
||||||
require "routes/v2.0/bootstrap_templates"
|
require_relative "api2/routes/bootstrap_templates"
|
||||||
require "routes/v2.0/stack"
|
require_relative "api2/routes/stack"
|
||||||
require "routes/v2.0/stack_template"
|
require_relative "api2/routes/stack_template"
|
||||||
require "routes/v2.0/handlers/stack_template_preset"
|
require_relative "api2/routes/report"
|
||||||
require "routes/v2.0/report"
|
|
||||||
|
|
||||||
routes = Devops::Version2_0::Routes.constants.collect{|s| Devops::Version2_0::Routes.const_get(s)}.select {|const| const.class == Module}
|
routes = Devops::API2_0::Routes.constants.collect{|s| Devops::API2_0::Routes.const_get(s)}.select {|const| const.class == Module}
|
||||||
routes.each do |r|
|
routes.each do |r|
|
||||||
Devops::Api2.register r
|
Devops::Api2.register r
|
||||||
end
|
end
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
require "app/sidekiq_web"
|
require "app/sidekiq_web"
|
||||||
require "app/devops-client"
|
require "app/devops-client"
|
||||||
require "app/devops-version"
|
require "app/devops-version"
|
||||||
#require "app/devops-api2"
|
require "app/devops-api2"
|
||||||
|
|||||||
@ -12,8 +12,9 @@ module Sinatra
|
|||||||
if @auth.provided? and @auth.basic? and @auth.credentials
|
if @auth.provided? and @auth.basic? and @auth.credentials
|
||||||
c = @auth.credentials
|
c = @auth.credentials
|
||||||
begin
|
begin
|
||||||
Devops::Db.connector.user_auth(c[0], c[1])
|
u = Devops::Db.connector.user_auth(c[0], c[1])
|
||||||
request.env['REMOTE_USER'] = c[0]
|
request.env['REMOTE_USER'] = c[0]
|
||||||
|
request.env['USER'] = u
|
||||||
true
|
true
|
||||||
rescue RecordNotFound => e
|
rescue RecordNotFound => e
|
||||||
false
|
false
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
require "commands/knife_commands"
|
require "commands/knife_commands"
|
||||||
require "commands/deploy"
|
require "commands/deploy"
|
||||||
require "db/exceptions/record_not_found"
|
require "exceptions/record_not_found"
|
||||||
|
|
||||||
module ServerCommands
|
module ServerCommands
|
||||||
|
|
||||||
|
|||||||
@ -1,5 +1,5 @@
|
|||||||
require "db/exceptions/record_not_found"
|
require "exceptions/record_not_found"
|
||||||
require "db/exceptions/invalid_record"
|
require "exceptions/invalid_record"
|
||||||
require "exceptions/invalid_command"
|
require "exceptions/invalid_command"
|
||||||
require "exceptions/invalid_privileges"
|
require "exceptions/invalid_privileges"
|
||||||
|
|
||||||
|
|||||||
@ -1,3 +1,4 @@
|
|||||||
|
require "db/mongo/models/user"
|
||||||
module Connectors
|
module Connectors
|
||||||
class User < Base
|
class User < Base
|
||||||
include Helpers::InsertCommand,
|
include Helpers::InsertCommand,
|
||||||
@ -13,6 +14,7 @@ module Connectors
|
|||||||
def user_auth user, password
|
def user_auth user, password
|
||||||
u = collection.find('_id' => user, 'password' => password).to_a.first
|
u = collection.find('_id' => user, 'password' => password).to_a.first
|
||||||
raise RecordNotFound.new('Invalid username or password') if u.nil?
|
raise RecordNotFound.new('Invalid username or password') if u.nil?
|
||||||
|
model_from_bson(u)
|
||||||
end
|
end
|
||||||
|
|
||||||
def users(ids=nil)
|
def users(ids=nil)
|
||||||
@ -33,19 +35,6 @@ module Connectors
|
|||||||
collection.insert(root.to_mongo_hash)
|
collection.insert(root.to_mongo_hash)
|
||||||
end
|
end
|
||||||
|
|
||||||
def check_user_privileges(id, cmd, required_privelege)
|
|
||||||
user = show(id)
|
|
||||||
|
|
||||||
unless Devops::Model::User::PRIVILEGES.include?(required_privelege)
|
|
||||||
raise InvalidPrivileges.new("Access internal problem with privilege '#{required_privelege}'")
|
|
||||||
end
|
|
||||||
|
|
||||||
unless user.can?(cmd, required_privelege)
|
|
||||||
raise InvalidPrivileges.new("Access denied for '#{user.id}'")
|
|
||||||
end
|
|
||||||
true
|
|
||||||
end
|
|
||||||
|
|
||||||
private
|
private
|
||||||
|
|
||||||
def model_from_bson(bson)
|
def model_from_bson(bson)
|
||||||
|
|||||||
@ -1,7 +1,6 @@
|
|||||||
require "db/exceptions/invalid_record"
|
|
||||||
require "db/mongo/models/mongo_model"
|
require "db/mongo/models/mongo_model"
|
||||||
require "db/validators/image/bootstrap_template.rb"
|
require "db/validators/image/bootstrap_template"
|
||||||
require "db/validators/image/image_in_filter.rb"
|
require "db/validators/image/image_in_filter"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
module Model
|
module Model
|
||||||
|
|||||||
@ -1,6 +1,7 @@
|
|||||||
require "db/exceptions/invalid_record"
|
|
||||||
require "db/mongo/models/mongo_model"
|
require "db/mongo/models/mongo_model"
|
||||||
require "json"
|
require "json"
|
||||||
|
require "db/validators/key/file_existence"
|
||||||
|
require "db/validators/key/scope"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
module Model
|
module Model
|
||||||
|
|||||||
@ -1,5 +1,5 @@
|
|||||||
require "providers/provider_factory"
|
require "providers/provider_factory"
|
||||||
require "db/exceptions/invalid_record"
|
require "exceptions/invalid_record"
|
||||||
require "json"
|
require "json"
|
||||||
|
|
||||||
module Devops
|
module Devops
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
require "db/exceptions/invalid_record"
|
require "exceptions/invalid_record"
|
||||||
require "exceptions/invalid_command"
|
require "exceptions/invalid_command"
|
||||||
require "db/mongo/models/mongo_model"
|
require "db/mongo/models/mongo_model"
|
||||||
|
|
||||||
@ -70,15 +70,11 @@ module Devops
|
|||||||
o
|
o
|
||||||
end
|
end
|
||||||
|
|
||||||
def can?(command, privilege)
|
def check_privileges cmd, required_privelege
|
||||||
p = self.privileges[command] || []
|
unless PRIVILEGES.include?(required_privelege)
|
||||||
p.include?(privilege)
|
raise InvalidPrivileges.new("Access internal problem with privilege '#{required_privelege}'")
|
||||||
end
|
end
|
||||||
|
can?(cmd, required_privelege)
|
||||||
def check_privilege cmd, priv
|
|
||||||
p = self.privileges[cmd]
|
|
||||||
return false if p.nil?
|
|
||||||
return p.include?(priv)
|
|
||||||
end
|
end
|
||||||
|
|
||||||
def self.create_root
|
def self.create_root
|
||||||
@ -89,6 +85,12 @@ module Devops
|
|||||||
end
|
end
|
||||||
|
|
||||||
private
|
private
|
||||||
|
|
||||||
|
def can?(command, privilege)
|
||||||
|
p = self.privileges[command] || []
|
||||||
|
p.include?(privilege)
|
||||||
|
end
|
||||||
|
|
||||||
def privileges_with_value value, options={}
|
def privileges_with_value value, options={}
|
||||||
privileges = {}
|
privileges = {}
|
||||||
[
|
[
|
||||||
|
|||||||
@ -1,7 +1,9 @@
|
|||||||
module Validators
|
module Validators
|
||||||
class Key::FileExistence < Base
|
module Key
|
||||||
|
class FileExistence < Base
|
||||||
|
|
||||||
delegate_to_helper_validator { Helpers::FileExistence.new(@model.path) }
|
delegate_to_helper_validator { Helpers::FileExistence.new(@model.path) }
|
||||||
|
|
||||||
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
@ -1,32 +0,0 @@
|
|||||||
module Devops
|
|
||||||
module Version2_0
|
|
||||||
module Handler
|
|
||||||
class Filter
|
|
||||||
|
|
||||||
def self.get_filters
|
|
||||||
lambda {
|
|
||||||
check_privileges("filter", "r")
|
|
||||||
check_provider(params[:provider])
|
|
||||||
json settings.mongo.available_images(params[:provider])
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.add_filter
|
|
||||||
lambda {
|
|
||||||
create_response("Updated", {:images => settings.mongo.add_available_images(@images, params[:provider])})
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.delete_filter
|
|
||||||
lambda {
|
|
||||||
# f = FilterHandler.new(?) #request, params
|
|
||||||
# f.delete
|
|
||||||
# create_response("Deleted", {:images => f.delete})# settings.mongo.delete_available_images(@images, params[:provider])})
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
@ -1,19 +0,0 @@
|
|||||||
require "providers/provider_factory"
|
|
||||||
|
|
||||||
module Devops
|
|
||||||
module Version2_0
|
|
||||||
module Handler
|
|
||||||
class Group
|
|
||||||
def self.get_groups
|
|
||||||
lambda {
|
|
||||||
check_privileges("group", "r")
|
|
||||||
check_provider(params[:provider])
|
|
||||||
p = ::Provider::ProviderFactory.get params[:provider]
|
|
||||||
json p.groups(params)
|
|
||||||
}
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
@ -1,16 +0,0 @@
|
|||||||
require "providers/provider_factory"
|
|
||||||
|
|
||||||
module Devops
|
|
||||||
module Version2_0
|
|
||||||
module Handler
|
|
||||||
class Provider
|
|
||||||
def self.get_providers
|
|
||||||
lambda {
|
|
||||||
check_privileges("provider", "r")
|
|
||||||
json ::Provider::ProviderFactory.providers
|
|
||||||
}
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
@ -1,85 +0,0 @@
|
|||||||
require "db/exceptions/invalid_record"
|
|
||||||
require "db/mongo/models/user"
|
|
||||||
|
|
||||||
module Devops
|
|
||||||
module Version2_0
|
|
||||||
module Handler
|
|
||||||
class User
|
|
||||||
|
|
||||||
def self.get_users
|
|
||||||
lambda {
|
|
||||||
check_privileges("user", "r")
|
|
||||||
users = Devops::Db.connector.users.map {|i| i.to_hash}
|
|
||||||
users.each {|u| u.delete("password")}
|
|
||||||
json users
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.create_user
|
|
||||||
lambda {
|
|
||||||
check_privileges("user", "w")
|
|
||||||
user = create_object_from_json_body
|
|
||||||
["username", "password", "email"].each do |p|
|
|
||||||
check_string(user[p], "Parameter '#{p}' must be a not empty string")
|
|
||||||
end
|
|
||||||
Devops::Db.connector.user_insert Devops::Model::User.new(user)
|
|
||||||
create_response("Created", nil, 201)
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.delete_user
|
|
||||||
lambda {
|
|
||||||
check_privileges("user", "w")
|
|
||||||
projects = Devops::Db.connector.projects_by_user params[:user]
|
|
||||||
if !projects.empty?
|
|
||||||
str = ""
|
|
||||||
projects.each do |p|
|
|
||||||
p.deploy_envs.each do |e|
|
|
||||||
str+="#{p.id}.#{e.identifier} " if e.users.include? params[:user]
|
|
||||||
end
|
|
||||||
end
|
|
||||||
logger.info projects
|
|
||||||
raise DependencyError.new "Deleting is forbidden: User is included in #{str}"
|
|
||||||
#return [400, "Deleting is forbidden: User is included in #{str}"]
|
|
||||||
end
|
|
||||||
|
|
||||||
r = Devops::Db.connector.user_delete params[:user]
|
|
||||||
create_response("User '#{params[:user]}' removed")
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.change_user_privileges
|
|
||||||
lambda {
|
|
||||||
check_privileges("user", "w")
|
|
||||||
data = create_object_from_json_body
|
|
||||||
user = Devops::Db.connector.user params[:user]
|
|
||||||
cmd = check_string(data["cmd"], "Parameter 'cmd' should be a not empty string", true) || ""
|
|
||||||
privileges = check_string(data["privileges"], "Parameter 'privileges' should be a not empty string", true) || ""
|
|
||||||
user.grant(cmd, privileges)
|
|
||||||
Devops::Db.connector.user_update user
|
|
||||||
create_response("Updated")
|
|
||||||
}
|
|
||||||
end
|
|
||||||
|
|
||||||
def self.change_user_email_or_password
|
|
||||||
lambda {
|
|
||||||
check_privileges("user", "w")
|
|
||||||
action = File.basename(request.path)
|
|
||||||
u = File.basename(File.dirname(request.path))
|
|
||||||
raise InvalidPrivileges.new("Access denied for '#{request.env['REMOTE_USER']}'") if u == Devops::Model::User::ROOT_USER_NAME and request.env['REMOTE_USER'] != Devops::Model::User::ROOT_USER_NAME
|
|
||||||
|
|
||||||
check_privileges("user", "w") unless request.env['REMOTE_USER'] == u
|
|
||||||
|
|
||||||
body = create_object_from_json_body
|
|
||||||
p = check_string(body[action], "Parameter '#{action}' must be a not empty string")
|
|
||||||
user = Devops::Db.connector.user u
|
|
||||||
user.send("#{action}=", p)
|
|
||||||
Devops::Db.connector.user_update user
|
|
||||||
create_response("Updated")
|
|
||||||
}
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
Loading…
Reference in New Issue
Block a user