Writing HTTP check rules

oslo.policy has supported the following syntax for a while:

http:<target URL>, which delegates the check to a remote server

Starting with 1.29, oslo.policy will also support https url(s) as well:

https:<target URL>, which delegates the check to a remote server

Both http and https support are implemented as custom check rules. If you see the setup.cfg for oslo.policy, you can see the following entry points:

oslo.policy.rule_checks =
    http = oslo_policy._external:HttpCheck
    https = oslo_policy._external:HttpsCheck

When a policy is evaluated, when the engine encounters https like in a snippet below:

{
       ...
       "target 1" : "https://foo.bar/baz",
       ...
}

The engine will look for a plugin named https in the rule_checks entry point and will try to invoke that stevedore plugin.

This mechanism allows anyone to write their own code, in their own library with their own custom stevedore based rule check plugins and can enhance their policies with custom checks. This would be useful for example to integrate with an in-house policy server.

Example code - HttpCheck

Note

Full source located at _external.py

 1class HttpCheck(_checks.Check):
 2    """Check ``http:`` rules by calling to a remote server.
 3
 4    This example implementation simply verifies that the response
 5    is exactly ``True``.
 6    """
 7
 8    def __call__(self, target, creds, enforcer, current_rule=None):
 9        url = ('http:' + self.match) % target
10        data, json = self._construct_payload(creds, current_rule,
11                                             enforcer, target)
12        with contextlib.closing(
13                requests.post(url, json=json, data=data)
14        ) as r:
15            return r.text.lstrip('"').rstrip('"') == 'True'
16
17    @staticmethod
18    def _construct_payload(creds, current_rule, enforcer, target):
19        # Convert instances of object() in target temporarily to
20        # empty dict to avoid circular reference detection
21        # errors in jsonutils.dumps().
22        temp_target = copy.deepcopy(target)
23        for key in target.keys():
24            element = target.get(key)
25            if type(element) is object:
26                temp_target[key] = {}
27        data = json = None
28        if (enforcer.conf.oslo_policy.remote_content_type ==
29                'application/x-www-form-urlencoded'):
30            data = {'rule': jsonutils.dumps(current_rule),
31                    'target': jsonutils.dumps(temp_target),
32                    'credentials': jsonutils.dumps(creds)}
33        else:
34            json = {'rule': current_rule,
35                    'target': temp_target,
36                    'credentials': creds}
37        return data, json