コード例 #1
0
    def __init__(self,
                 dbGaP,
                 DB,
                 project_mapping,
                 storage_credentials=None,
                 db_session=None,
                 sync_from_dir=None):
        '''
        Syncs ACL files from dbGap to auth database and storage backends
        Args:
            dbGaP: a dict containing creds to access dbgap sftp
            DB: database connection string
            project_mapping: a dict containing how dbgap ids map to projects
            storage_credentials: a dict containing creds for storage backends
            sync_from_dir: path to an alternative dir to sync from instead of
                           dbGaP
        '''
        self.sync_from_dir = sync_from_dir
        if sync_from_dir is None:
            self.sftp = dbGaP['sftp']
            self.dbgap_key = dbGaP['decrypt_key']
        self.session = db_session
        self.driver = SQLAlchemyDriver(DB)
        self._projects = dict()
        self.project_mapping = project_mapping
        self.logger = get_logger('dbgap_syncer')

        if storage_credentials:
            self.storage_manager = StorageManager(storage_credentials,
                                                  logger=self.logger)
コード例 #2
0
    def __init__(
        self,
        dbGaP,
        DB,
        project_mapping,
        storage_credentials=None,
        db_session=None,
        is_sync_from_dbgap_server=False,
        sync_from_local_csv_dir=None,
        sync_from_local_yaml_file=None,
        arborist=None,
    ):
        """
        Syncs ACL files from dbGap to auth database and storage backends
        Args:
            dbGaP: a dict containing creds to access dbgap sftp
            DB: database connection string
            project_mapping: a dict containing how dbgap ids map to projects
            storage_credentials: a dict containing creds for storage backends
            sync_from_dir: path to an alternative dir to sync from instead of
                           dbGaP
            arborist:
                base URL for arborist service if the syncer should also create
                resources in arborist
        """
        self.sync_from_local_csv_dir = sync_from_local_csv_dir
        self.sync_from_local_yaml_file = sync_from_local_yaml_file
        self.is_sync_from_dbgap_server = is_sync_from_dbgap_server
        if is_sync_from_dbgap_server:
            self.server = dbGaP["info"]
            self.protocol = dbGaP["protocol"]
            self.dbgap_key = dbGaP["decrypt_key"]
        self.parse_consent_code = dbGaP.get("parse_consent_code", True)
        self.session = db_session
        self.driver = SQLAlchemyDriver(DB)
        self.project_mapping = project_mapping or {}
        self._projects = dict()
        self.logger = get_logger(
            "user_syncer",
            log_level="debug" if config["DEBUG"] == True else "info")

        self.arborist_client = None
        if arborist:
            self.arborist_client = ArboristClient(arborist_base_url=arborist,
                                                  logger=self.logger)

        if storage_credentials:
            self.storage_manager = StorageManager(storage_credentials,
                                                  logger=self.logger)
コード例 #3
0
def app_sessions(app):
    app.url_map.strict_slashes = False
    app.db = SQLAlchemyDriver(app.config["DB"])
    migrate(app.db)
    session = flask_scoped_session(app.db.Session, app)  # noqa
    app.storage_manager = StorageManager(
        app.config["STORAGE_CREDENTIALS"], logger=app.logger
    )
    enabled_idp_ids = app.config["ENABLED_IDENTITY_PROVIDERS"]["providers"].keys()
    # Add OIDC client for Google if configured.
    configured_google = (
        "OPENID_CONNECT" in app.config and "google" in app.config["OPENID_CONNECT"]
    )
    if configured_google:
        app.google_client = GoogleClient(
            app.config["OPENID_CONNECT"]["google"],
            HTTP_PROXY=app.config.get("HTTP_PROXY"),
            logger=app.logger,
        )
    # Add OIDC client for multi-tenant fence if configured.
    configured_fence = (
        "OPENID_CONNECT" in app.config
        and "fence" in app.config["OPENID_CONNECT"]
        and "fence" in enabled_idp_ids
    )
    if configured_fence:
        app.fence_client = OAuthClient(**app.config["OPENID_CONNECT"]["fence"])
    app.session_interface = UserSessionInterface()
    if app.config.get("ARBORIST"):
        app.arborist = ArboristClient(arborist_base_url=app.config["ARBORIST"])
コード例 #4
0
ファイル: __init__.py プロジェクト: plooploops/fence
def app_config(
    app,
    settings="fence.settings",
    root_dir=None,
    config_path=None,
    file_name=None,
):
    """
    Set up the config for the Flask app.
    """
    if root_dir is None:
        root_dir = os.path.dirname(os.path.dirname(os.path.realpath(__file__)))

    logger.info("Loading settings...")
    # not using app.config.from_object because we don't want all the extra flask cfg
    # vars inside our singleton when we pass these through in the next step
    settings_cfg = flask.Config(app.config.root_path)
    settings_cfg.from_object(settings)

    # dump the settings into the config singleton before loading a configuration file
    config.update(dict(settings_cfg))

    # load the configuration file, this overwrites anything from settings/local_settings
    config.load(
        config_path=config_path,
        search_folders=CONFIG_SEARCH_FOLDERS,
        file_name=file_name,
    )

    # load all config back into flask app config for now, we should PREFER getting config
    # directly from the fence config singleton in the code though.
    app.config.update(**config._configs)

    _setup_arborist_client(app)
    _setup_audit_service_client(app)
    _setup_data_endpoint_and_boto(app)
    _load_keys(app, root_dir)
    _set_authlib_cfgs(app)

    app.prometheus_counters = {}
    if config["ENABLE_PROMETHEUS_METRICS"]:
        logger.info("Enabling Prometheus metrics...")
        _setup_prometheus(app)
    else:
        logger.info("Prometheus metrics are NOT enabled.")

    app.storage_manager = StorageManager(config["STORAGE_CREDENTIALS"],
                                         logger=logger)

    app.debug = config["DEBUG"]
    # Following will update logger level, propagate, and handlers
    get_logger(__name__,
               log_level="debug" if config["DEBUG"] is True else "info")

    _setup_oidc_clients(app)

    with app.app_context():
        _check_aws_creds_and_region(app)
        _check_azure_storage(app)
コード例 #5
0
def app_config(app,
               settings="fence.settings",
               root_dir=None,
               config_path=None,
               file_name=None):
    """
    Set up the config for the Flask app.
    """
    if root_dir is None:
        root_dir = os.path.dirname(os.path.dirname(os.path.realpath(__file__)))

    logger.info("Loading settings...")
    # not using app.config.from_object because we don't want all the extra flask cfg
    # vars inside our singleton when we pass these through in the next step
    settings_cfg = flask.Config(app.config.root_path)
    settings_cfg.from_object(settings)

    # dump the settings into the config singleton before loading a configuration file
    config.update(dict(settings_cfg))

    # load the configuration file, this overwrites anything from settings/local_settings
    config.load(config_path, file_name)

    # load all config back into flask app config for now, we should PREFER getting config
    # directly from the fence config singleton in the code though.
    app.config.update(**config._configs)

    _setup_arborist_client(app)
    _setup_data_endpoint_and_boto(app)
    _load_keys(app, root_dir)
    _set_authlib_cfgs(app)

    app.storage_manager = StorageManager(config["STORAGE_CREDENTIALS"],
                                         logger=logger)

    app.debug = config["DEBUG"]
    # Following will update logger level, propagate, and handlers
    get_logger(__name__,
               log_level="debug" if config["DEBUG"] == True else "info")

    _setup_oidc_clients(app)
コード例 #6
0
ファイル: __init__.py プロジェクト: damirkrstanovic/fence
def app_sessions(app):
    app.url_map.strict_slashes = False
    app.db = SQLAlchemyDriver(app.config['DB'])
    migrate(app.db)
    session = flask_scoped_session(app.db.Session, app)  # noqa
    app.jinja_env.globals['csrf_token'] = generate_csrf_token
    app.storage_manager = StorageManager(
        app.config['STORAGE_CREDENTIALS'],
        logger=app.logger
    )
    enabled_idp_ids = (
        fence.settings
        .ENABLED_IDENTITY_PROVIDERS['providers']
        .keys()
    )
    # Add OIDC client for Google if configured.
    configured_google = (
        'OPENID_CONNECT' in app.config
        and 'google' in app.config['OPENID_CONNECT']
        and 'google' in enabled_idp_ids
    )
    if configured_google:
        app.google_client = GoogleClient(
            app.config['OPENID_CONNECT']['google'],
            HTTP_PROXY=app.config.get('HTTP_PROXY'),
            logger=app.logger
        )
    # Add OIDC client for multi-tenant fence if configured.
    configured_fence = (
        'OPENID_CONNECT' in app.config
        and 'fence' in app.config['OPENID_CONNECT']
        and 'fence' in enabled_idp_ids
    )
    if configured_fence:
        app.fence_client = OAuthClient(**app.config['OPENID_CONNECT']['fence'])
    app.session_interface = UserSessionInterface()
コード例 #7
0
class UserSyncer(object):
    def __init__(
        self,
        dbGaP,
        DB,
        project_mapping,
        storage_credentials=None,
        db_session=None,
        is_sync_from_dbgap_server=False,
        sync_from_local_csv_dir=None,
        sync_from_local_yaml_file=None,
        arborist=None,
    ):
        """
        Syncs ACL files from dbGap to auth database and storage backends
        Args:
            dbGaP: a dict containing creds to access dbgap sftp
            DB: database connection string
            project_mapping: a dict containing how dbgap ids map to projects
            storage_credentials: a dict containing creds for storage backends
            sync_from_dir: path to an alternative dir to sync from instead of
                           dbGaP
            arborist:
                base URL for arborist service if the syncer should also create
                resources in arborist
        """
        self.sync_from_local_csv_dir = sync_from_local_csv_dir
        self.sync_from_local_yaml_file = sync_from_local_yaml_file
        self.is_sync_from_dbgap_server = is_sync_from_dbgap_server
        if is_sync_from_dbgap_server:
            self.server = dbGaP["info"]
            self.protocol = dbGaP["protocol"]
            self.dbgap_key = dbGaP["decrypt_key"]
        self.parse_consent_code = dbGaP.get("parse_consent_code", True)
        self.session = db_session
        self.driver = SQLAlchemyDriver(DB)
        self.project_mapping = project_mapping or {}
        self._projects = dict()
        self.logger = get_logger(
            "user_syncer",
            log_level="debug" if config["DEBUG"] == True else "info")

        self.arborist_client = None
        if arborist:
            self.arborist_client = ArboristClient(arborist_base_url=arborist,
                                                  logger=self.logger)

        if storage_credentials:
            self.storage_manager = StorageManager(storage_credentials,
                                                  logger=self.logger)

    @staticmethod
    def _match_pattern(filepath, encrypted=True):
        """
        Check if the filename match dbgap access control file patern

        Args:
            filepath (str): path to file
            encrypted (bool): whether the file is encrypted

        Returns:
            bool: whether the pattern matches
        """
        pattern = r"authentication_file_phs(\d{6}).(csv|txt)"
        if encrypted:
            pattern += ".enc"
        pattern += "$"
        return re.match(pattern, os.path.basename(filepath))

    def _get_from_sftp_with_proxy(self, path):
        """
        Download all data from sftp sever to a local dir

        Args:
            path (str): path to local directory

        Returns:
            None
        """
        proxy = None
        if self.server.get("proxy", "") != "":
            proxy = ProxyCommand(
                "ssh -i ~/.ssh/id_rsa {user}@{proxy} nc {host} {port}".format(
                    user=self.server.get("proxy_user", ""),
                    proxy=self.server.get("proxy", ""),
                    host=self.server.get("host", ""),
                    port=self.server.get("port", 22),
                ))

        with paramiko.SSHClient() as client:
            client.set_missing_host_key_policy(paramiko.WarningPolicy())
            parameters = {
                "hostname": self.server.get("host", ""),
                "username": self.server.get("username", ""),
                "password": self.server.get("password", ""),
                "port": self.server.get("port", 22),
            }
            if proxy:
                parameters["sock"] = proxy
            client.connect(**parameters)
            with client.open_sftp() as sftp:
                download_dir(sftp, "./", path)

        if proxy:
            proxy.close()

    def _get_from_ftp_with_proxy(self, path):
        """
        Download data from ftp sever to alocal dir

        Args:
            path(str): path to local files

        Returns:
            None
        """
        execstr = 'lftp -u {},{}  {} -e "set ftp:proxy http://{}; mirror . {}; exit"'.format(
            self.server.get("username", ""),
            self.server.get("password", ""),
            self.server.get("host", ""),
            self.server.get("proxy", ""),
            path,
        )
        os.system(execstr)

    def _parse_csv(self, file_dict, sess, encrypted=True):
        """
        parse csv files to python dict

        Args:
            fild_dict: a dictionary with key(file path) and value(privileges)
            encrypted: whether those files are encrypted
            sess: sqlalchemy session

        Return:
            Tuple[[dict, dict]]:
                (user_project, user_info) where user_project is a mapping from
                usernames to project permissions and user_info is a mapping
                from usernames to user details, such as email

        Example:

            (
                {
                    username: {
                        'project1': {'read-storage','write-storage'},
                        'project2': {'read-storage'},
                        }
                },
                {
                    username: {
                        'email': '*****@*****.**',
                        'display_name': 'display name',
                        'phone_umber': '123-456-789',
                        'tags': {'dbgap_role': 'PI'}
                    }
                },
            )

        """
        user_projects = dict()
        user_info = dict()
        for filepath, privileges in file_dict.iteritems():
            self.logger.info("Reading file {}".format(filepath))
            if os.stat(filepath).st_size == 0:
                continue
            if not self._match_pattern(filepath, encrypted=encrypted):
                continue

            dbgap_key = getattr(self, "dbgap_key", None)
            with _read_file(filepath,
                            encrypted=encrypted,
                            key=dbgap_key,
                            logger=self.logger) as f:
                csv = DictReader(f, quotechar='"', skipinitialspace=True)
                for row in csv:
                    username = row.get("login", "")
                    if username == "":
                        continue

                    phsid_privileges = {}
                    phsid = row.get("phsid", "").split(".")
                    dbgap_project = phsid[0]
                    if len(phsid) > 1 and self.parse_consent_code:
                        consent_code = phsid[-1]
                        if consent_code != "c999":
                            dbgap_project += "." + consent_code

                    display_name = row.get("user name", "")
                    user_info[username] = {
                        "email": row.get("email", ""),
                        "display_name": display_name,
                        "phone_number": row.get("phone", ""),
                        "tags": {
                            "dbgap_role": row.get("role", "")
                        },
                    }

                    if dbgap_project not in self.project_mapping:
                        if dbgap_project not in self._projects:
                            project = self._get_or_create(
                                sess, Project, auth_id=dbgap_project)
                            if project.name is None:
                                project.name = dbgap_project
                            self._projects[dbgap_project] = project
                        phsid_privileges = {dbgap_project: set(privileges)}
                        if username in user_projects:
                            user_projects[username].update(phsid_privileges)
                        else:
                            user_projects[username] = phsid_privileges

                    for element_dict in self.project_mapping.get(
                            dbgap_project, []):
                        try:
                            phsid_privileges = {
                                element_dict["auth_id"]: set(privileges)
                            }
                            if username not in user_projects:
                                user_projects[username] = {}
                            user_projects[username].update(phsid_privileges)
                        except ValueError as e:
                            self.logger.info(e)
        return user_projects, user_info

    def _parse_yaml(self, filepath, encrypted=True):
        """
        parse yaml files to python nested dictionary
        Args:
            filepath: yaml file
            encrypted: whether those files are encrypted
        Returns:
            user_project: a nested dict of
            {
                username: {
                    'project1': {'read-storage','write-storage'},
                    'project2': {'read-storage'},
                    }
            }
            user_info: a dict of
            {
                username: {
                    'email': email,
                    'display_name': display_name,
                    'phone_number': phonenum,
                    'tags': {'k1':'v1', 'k2': 'v2'}
                    'admin': is_admin
                }
            }
        """
        user_project = dict()
        user_info = dict()
        user_policies = dict()

        dbgap_key = getattr(self, "dbgap_key", None)
        with _read_file(filepath,
                        encrypted=encrypted,
                        key=dbgap_key,
                        logger=self.logger) as f:
            data = yaml.safe_load(f)

        users = data.get("users", {})
        for username, details in users.iteritems():
            # users should occur only once each; skip if already processed
            if username in user_project:
                self.logger.error(
                    "user `{}` occurs multiple times".format(username))
                raise EnvironmentError("invalid yaml file")

            privileges = {}
            try:
                for project in details.get("projects", {}):
                    privileges[project["auth_id"]] = set(project["privilege"])
            except KeyError as e:
                self.logger.error("project missing field: {}".format(e))
                continue

            user_info[username] = {
                "email": details.get("email", username),
                "display_name": details.get("display_name", ""),
                "phone_number": details.get("phone_number", ""),
                "tags": details.get("tags", {}),
                "admin": details.get("admin", False),
            }
            user_project[username] = privileges

            # list of policies we want to grant to this user, which get sent to arborist
            # to check if they're allowed to do certain things
            user_policies[username] = details.get("policies", [])

        return user_project, user_info, user_policies

    @staticmethod
    def sync_two_user_info_dict(user_info1, user_info2):
        """
        Merge user_info1 into user_info2, which are both nested dicts like:

            {username: {'email': '*****@*****.**'}}

        Args:
            user_info1 (dict)
            user_info2 (dict)

        Returns:
            None
        """
        user_info2.update(user_info1)

    @staticmethod
    def sync_two_phsids_dict(phsids1, phsids2):
        """
        Merge pshid1 into phsids2

        Args:
            phsids1, phsids2: nested dicts mapping phsids to sets of permissions

            {
                username: {
                    phsid1: {'read-storage','write-storage'},
                    phsid2: {'read-storage'},
                }
            }

        Return:
            None

        Explanation:
            Consider merging projects of the same user:

                {user1: {phsid1: privillege1}}

                {user1: {phsid2: privillege2}}

            case 1: phsid1 != phsid2. Output:

                {user1: {phsid1: privillege1, phsid2: privillege2}}

            case 2: phsid1 == phsid2 and privillege1! = privillege2. Output:

                {user1: {phsid1: union(privillege1, privillege2)}}

            For the other cases, just simple addition
        """
        for user, projects1 in phsids1.iteritems():
            if not phsids2.get(user):
                phsids2[user] = projects1
            else:
                for phsid1, privilege1 in projects1.iteritems():
                    if phsid1 not in phsids2[user]:
                        phsids2[user][phsid1] = set()
                    phsids2[user][phsid1].update(privilege1)

    def sync_to_db_and_storage_backend(self, user_project, user_info,
                                       user_policies, sess):
        """
        sync user access control to database and storage backend

        Args:
            user_project (dict): a dictionary of

                {
                    username: {
                        'project1': {'read-storage','write-storage'},
                        'project2': {'read-storage'}
                    }
                }

            user_info (dict): a dictionary of {username: user_info{}}
            user_policies (List[str]): list of policies
            sess: a sqlalchemy session

        Return:
            None
        """
        self._init_projects(user_project, sess)

        auth_provider_list = [
            self._get_or_create(sess, AuthorizationProvider, name="dbGaP"),
            self._get_or_create(sess, AuthorizationProvider, name="fence"),
        ]

        cur_db_user_project_list = {
            (ua.user.username.lower(), ua.project.auth_id)
            for ua in sess.query(AccessPrivilege).all()
        }

        # we need to compare db -> whitelist case-insensitively for username
        # db stores case-sensitively, but we need to query case-insensitively
        user_project_lowercase = {}
        syncing_user_project_list = set()
        for username, projects in user_project.iteritems():
            user_project_lowercase[username.lower()] = projects
            for project, _ in projects.iteritems():
                syncing_user_project_list.add((username.lower(), project))

        user_info_lowercase = {
            username.lower(): info
            for username, info in user_info.iteritems()
        }

        to_delete = set.difference(cur_db_user_project_list,
                                   syncing_user_project_list)
        to_add = set.difference(syncing_user_project_list,
                                cur_db_user_project_list)
        to_update = set.intersection(cur_db_user_project_list,
                                     syncing_user_project_list)

        # when updating users we want to maintain case sesitivity in the username so
        # pass the original, non-lowered user_info dict
        self._upsert_userinfo(sess, user_info)
        self._revoke_from_storage(to_delete, sess)
        self._revoke_from_db(sess, to_delete)
        self._grant_from_storage(to_add, user_project_lowercase, sess)
        self._grant_from_db(
            sess,
            to_add,
            user_info_lowercase,
            user_project_lowercase,
            auth_provider_list,
        )

        # re-grant
        self._grant_from_storage(to_update, user_project_lowercase, sess)
        self._update_from_db(sess, to_update, user_project_lowercase)

        self._validate_and_update_user_admin(sess, user_info_lowercase)

        # Add policies to user models in the database. These will show up in users'
        # JWTs; services can send the JWTs to arborist.
        if user_policies:
            self.logger.info("populating RBAC information from YAML file")
        for username, policies in user_policies.iteritems():
            user = query_for_user(session=sess, username=username)
            for policy_id in policies:
                policy = self._get_or_create_policy(sess, policy_id)
                if policy not in user.policies:
                    user.policies.append(policy)
                    self.logger.info(
                        "granted policy `{}` to user `{}` ({})".format(
                            policy_id, username, user.id))
        sess.commit()

    def _revoke_from_db(self, sess, to_delete):
        """
        Revoke user access to projects in the auth database

        Args:
            sess: sqlalchemy session
            to_delete: a set of (username, project.auth_id) to be revoked from db
        Return:
            None
        """
        for (username, project_auth_id) in to_delete:
            q = (sess.query(AccessPrivilege).filter(
                AccessPrivilege.project.has(auth_id=project_auth_id)).join(
                    AccessPrivilege.user).filter(
                        func.lower(User.username) == username).all())
            for access in q:
                self.logger.info("revoke {} access to {} in db".format(
                    username, project_auth_id))
                sess.delete(access)

    def _validate_and_update_user_admin(self, sess, user_info):
        """
        Make sure there is no admin user that is not in yaml/csv files

        Args:
            sess: sqlalchemy session
            user_info: a dict of
            {
                username: {
                    'email': email,
                    'display_name': display_name,
                    'phone_number': phonenum,
                    'tags': {'k1':'v1', 'k2': 'v2'}
                    'admin': is_admin
                }
            }
        Returns:
            None
        """
        for admin_user in sess.query(User).filter_by(is_admin=True).all():
            if admin_user.username.lower() not in user_info:
                admin_user.is_admin = False
                sess.add(admin_user)
                self.logger.info("remove admin access from {} in db".format(
                    admin_user.username.lower()))

    def _update_from_db(self, sess, to_update, user_project):
        """
        Update user access to projects in the auth database

        Args:
            sess: sqlalchemy session
            to_update:
                a set of (username, project.auth_id) to be updated from db

        Return:
            None
        """

        for (username, project_auth_id) in to_update:
            q = (sess.query(AccessPrivilege).filter(
                AccessPrivilege.project.has(auth_id=project_auth_id)).join(
                    AccessPrivilege.user).filter(
                        func.lower(User.username) == username).all())
            for access in q:
                access.privilege = user_project[username][project_auth_id]
                self.logger.info("update {} with {} access to {} in db".format(
                    username, access.privilege, project_auth_id))

    def _grant_from_db(self, sess, to_add, user_info, user_project,
                       auth_provider_list):
        """
        Grant user access to projects in the auth database
        Args:
            sess: sqlalchemy session
            to_add: a set of (username, project.auth_id) to be granted
            user_project:
                a dictionary of {username: {project: {'read','write'}}
        Return:
            None
        """
        for (username, project_auth_id) in to_add:
            u = query_for_user(session=sess, username=username)

            auth_provider = auth_provider_list[0]
            if "dbgap_role" not in user_info[username]["tags"]:
                auth_provider = auth_provider_list[1]

            user_access = AccessPrivilege(
                user=u,
                project=self._projects[project_auth_id],
                privilege=list(user_project[username][project_auth_id]),
                auth_provider=auth_provider,
            )
            self.logger.info("grant user {} to {} with access {}".format(
                username, user_access.project, user_access.privilege))
            sess.add(user_access)

    def _upsert_userinfo(self, sess, user_info):
        """
        update user info to database.

        Args:
            sess: sqlalchemy session
            user_info:
                a dict of {username: {display_name, phone_number, tags, admin}

        Return:
            None
        """

        for username in user_info:
            u = query_for_user(session=sess, username=username)

            if u is None:
                self.logger.info("create user {}".format(username))
                u = User(username=username)
                sess.add(u)

            u.email = user_info[username].get("email", "")
            u.display_name = user_info[username].get("display_name", "")
            u.phone_number = user_info[username].get("phone_number", "")
            u.is_admin = user_info[username].get("admin", False)

            # do not update if there is no tag
            if user_info[username]["tags"] == {}:
                continue

            # remove user db tags if they are not shown in new tags
            for tag in u.tags:
                if tag.key not in user_info[username]["tags"]:
                    u.tags.remove(tag)

            # sync
            for k, v in user_info[username]["tags"].iteritems():
                found = False
                for tag in u.tags:
                    if tag.key == k:
                        found = True
                        tag.value = v
                # create new tag if not found
                if not found:
                    tag = Tag(key=k, value=v)
                    u.tags.append(tag)

    def _revoke_from_storage(self, to_delete, sess):
        """
        If a project have storage backend, revoke user's access to buckets in
        the storage backend.

        Args:
            to_delete: a set of (username, project.auth_id) to be revoked

        Return:
            None
        """
        for (username, project_auth_id) in to_delete:
            project = (sess.query(Project).filter(
                Project.auth_id == project_auth_id).first())
            for sa in project.storage_access:
                self.logger.info("revoke {} access to {} in {}".format(
                    username, project_auth_id, sa.provider.name))
                self.storage_manager.revoke_access(
                    provider=sa.provider.name,
                    username=username,
                    project=project,
                    session=sess,
                )

    def _grant_from_storage(self, to_add, user_project, sess):
        """
        If a project have storage backend, grant user's access to buckets in
        the storage backend.

        Args:
            to_add: a set of (username, project.auth_id)  to be granted
            user_project: a dictionary like:

                    {username: {phsid: {'read-storage','write-storage'}}}

        Return:
            None
        """
        for (username, project_auth_id) in to_add:
            project = self._projects[project_auth_id]
            for sa in project.storage_access:
                access = list(user_project[username][project_auth_id])
                self.logger.info("grant {} access {} to {} in {}".format(
                    username, access, project_auth_id, sa.provider.name))
                self.storage_manager.grant_access(
                    provider=sa.provider.name,
                    username=username,
                    project=project,
                    access=access,
                    session=sess,
                )

    def _init_projects(self, user_project, sess):
        """
        initialize projects
        """
        if self.project_mapping:
            for projects in self.project_mapping.values():
                for p in projects:
                    project = self._get_or_create(sess, Project, **p)
                    self._projects[p["auth_id"]] = project
        for _, projects in user_project.iteritems():
            for auth_id in projects.keys():
                project = sess.query(Project).filter(
                    Project.auth_id == auth_id).first()
                if not project:
                    data = {"name": auth_id, "auth_id": auth_id}
                    try:
                        project = self._get_or_create(sess, Project, **data)
                    except IntegrityError as e:
                        sess.rollback()
                        self.logger.error(str(e))
                        raise Exception(
                            "Project {} already exists. Detail {}. Please contact your system administrator."
                            .format(auth_id, str(e)))
                if auth_id not in self._projects:
                    self._projects[auth_id] = project

    @staticmethod
    def _get_or_create(sess, model, **kwargs):
        instance = sess.query(model).filter_by(**kwargs).first()
        if not instance:
            instance = model(**kwargs)
            sess.add(instance)
        return instance

    def sync(self):
        if self.session:
            self._sync(self.session)
        else:
            with self.driver.session as s:
                self._sync(s)

    def _sync(self, sess):
        """
        Collect files from dbgap server, sync csv and yaml files to storage
        backend and fence DB
        """
        dbgap_file_list = []
        tmpdir = tempfile.mkdtemp()
        if self.is_sync_from_dbgap_server:
            self.logger.info("Download from server")
            try:
                if self.protocol == "sftp":
                    self._get_from_sftp_with_proxy(tmpdir)
                else:
                    self._get_from_ftp_with_proxy(tmpdir)
                dbgap_file_list = glob.glob(os.path.join(tmpdir, "*"))
            except Exception as e:
                self.logger.error(e)
                exit(1)

        permissions = [{"read-storage"} for _ in dbgap_file_list]
        user_projects, user_info = self._parse_csv(dict(
            zip(dbgap_file_list, permissions)),
                                                   encrypted=True,
                                                   sess=sess)
        try:
            shutil.rmtree(tmpdir)
        except OSError as e:
            self.logger.info(e)
            if e.errno != errno.ENOENT:
                raise

        local_csv_file_list = []
        if self.sync_from_local_csv_dir:
            local_csv_file_list = glob.glob(
                os.path.join(self.sync_from_local_csv_dir, "*"))

        permissions = [{"read-storage"} for _ in local_csv_file_list]
        user_projects_csv, user_info_csv = self._parse_csv(dict(
            zip(local_csv_file_list, permissions)),
                                                           encrypted=False,
                                                           sess=sess)

        try:
            user_yaml = UserYAML.from_file(self.sync_from_local_yaml_file,
                                           encrypted=False,
                                           logger=self.logger)
        except EnvironmentError as e:
            self.logger.error(str(e))
            self.logger.error("aborting early")
            return

        user_projects_csv = {
            key.lower(): value
            for key, value in user_projects_csv.iteritems()
        }
        user_projects = {
            key.lower(): value
            for key, value in user_projects.iteritems()
        }
        user_yaml.projects = {
            key.lower(): value
            for key, value in user_yaml.projects.iteritems()
        }

        self.sync_two_phsids_dict(user_projects_csv, user_projects)
        self.sync_two_user_info_dict(user_info_csv, user_info)

        # privilleges in yaml files overide ones in csv files
        self.sync_two_phsids_dict(user_yaml.projects, user_projects)
        self.sync_two_user_info_dict(user_yaml.user_info, user_info)

        self._reset_user_access(sess)

        if user_projects:
            self.logger.info("Sync to db and storage backend")
            self.sync_to_db_and_storage_backend(user_projects, user_info,
                                                user_yaml.policies, sess)
            self.logger.info("Finish syncing to db and storage backend")
        else:
            self.logger.info("No users for syncing")

        if user_yaml.rbac:
            self.logger.info("Synchronizing arborist")
            success = self._update_arborist(sess, user_yaml)
            if success:
                self.logger.info("Finished synchronizing arborist")
            else:
                self.logger.error("Could not synchronize successfully")
                exit(1)
        else:
            self.logger.info("No resources specified; skipping arborist sync")

    @staticmethod
    def _reset_user_access(session):
        session.execute(users_to_policies.delete())
        # TODO (rudyardrichter 2018-09-10): revoke admin access etc

    def _update_arborist(self, session, user_yaml):
        """
        Create roles and resources in arborist from the information in
        ``user_projects``.

        The projects are sent to arborist as resources with paths like
        ``/projects/{project}``. Roles are created with just the original names
        for the privileges like ``"read-storage"`` etc.

        Args:
            session (sqlalchemy.Session)
            user_yaml (UserYAML)

        Return:
            bool: success
        """
        if not self.arborist_client:
            self.logger.warn("no arborist client set; skipping arborist sync")
            return False
        if not self.arborist_client.healthy():
            # TODO (rudyardrichter, 2019-01-07): add backoff/retry here
            self.logger.error(
                "arborist service is unavailable; skipping arborist sync")
            return False

        # Set up the resource tree in arborist
        resources = user_yaml.rbac.get("resources", [])
        for resource in resources:
            try:
                self.arborist_client.create_resource("/",
                                                     resource,
                                                     overwrite=True)
            except ArboristError as e:
                self.logger.error(e)
                # keep going; maybe just some conflicts from things existing already

        created_roles = set()
        roles = user_yaml.rbac.get("roles", [])
        for role in roles:
            try:
                response = self.arborist_client.create_role(role)
                if response:
                    created_roles.add(role["id"])
            except ArboristError as e:
                self.logger.error(e)
                # keep going; maybe just some conflicts from things existing already

        created_policies = set()
        policies = user_yaml.rbac.get("policies", [])
        for policy in policies:
            try:
                response = self.arborist_client.create_policy(policy)
                if response:
                    created_policies.add(policy["id"])
            except ArboristError as e:
                self.logger.error(e)
                # keep going; maybe just some conflicts from things existing already

        user_projects = user_yaml.user_rbac
        for username, user_resources in user_projects.iteritems():
            self.logger.info("processing user `{}`".format(username))
            user = query_for_user(session=session, username=username)

            for path, permissions in user_resources.iteritems():
                for permission in permissions:
                    # "permission" in the dbgap sense, not the arborist sense
                    if permission not in created_roles:
                        try:
                            self.arborist_client.create_role(
                                arborist_role_for_permission(permission))
                        except ArboristError as e:
                            self.logger.info(
                                "not creating role for permission `{}`; {}".
                                format(permission, str(e)))
                        created_roles.add(permission)

                    # If everything was created fine, grant a policy to
                    # this user which contains exactly just this resource,
                    # with this permission as a role.

                    # format project '/x/y/z' -> 'x.y.z'
                    # so the policy id will be something like 'x.y.z-create'
                    policy_id = _format_policy_id(path, permission)
                    if policy_id not in created_policies:
                        try:
                            self.arborist_client.create_policy({
                                "id":
                                policy_id,
                                "description":
                                "policy created by fence sync",
                                "role_ids": [permission],
                                "resource_paths": [path],
                            })
                        except ArboristError as e:
                            self.logger.info(
                                "not creating policy in arborist; {}".format(
                                    str(e)))
                        created_policies.add(policy_id)
                    policy = self._get_or_create_policy(session, policy_id)
                    user.policies.append(policy)
                    self.logger.info("granted policy `{}` to user `{}`".format(
                        policy_id, user.username))

        return True

    def _get_or_create_policy(self, session, policy_id):
        policy = session.query(Policy).filter_by(id=policy_id).first()
        if not policy:
            policy = Policy(id=policy_id)
            session.add(policy)
            self.logger.info("created policy `{}`".format(policy_id))
        return policy
コード例 #8
0
class DbGapSyncer(object):
    def __init__(self,
                 dbGaP,
                 DB,
                 project_mapping,
                 storage_credentials=None,
                 db_session=None,
                 sync_from_dir=None):
        '''
        Syncs ACL files from dbGap to auth database and storage backends
        Args:
            dbGaP: a dict containing creds to access dbgap sftp
            DB: database connection string
            project_mapping: a dict containing how dbgap ids map to projects
            storage_credentials: a dict containing creds for storage backends
            sync_from_dir: path to an alternative dir to sync from instead of
                           dbGaP
        '''
        self.sync_from_dir = sync_from_dir
        if sync_from_dir is None:
            self.sftp = dbGaP['sftp']
            self.dbgap_key = dbGaP['decrypt_key']
        self.session = db_session
        self.driver = SQLAlchemyDriver(DB)
        self._projects = dict()
        self.project_mapping = project_mapping
        self.logger = get_logger('dbgap_syncer')

        if storage_credentials:
            self.storage_manager = StorageManager(storage_credentials,
                                                  logger=self.logger)

    def _match_pattern(self, filepath, encrypted=True):
        """
        Check if the filename match dbgap access control file patern
        Args:
            filepath (str): path to file
            encrypted (bool): whether the file is encrypted
        Returns:
            bool: whether the pattern matches
        """
        pattern = "authentication_file_phs(\d{6}).txt"
        if encrypted:
            pattern += '.enc'
        return (re.match(pattern, os.path.basename(filepath)))

    def _get_from_sftp(self, path):
        """
        Copy all data from sftp to a local dir
        Args:
            path (str): path to local directory
        Returns:
            None
        """
        cnopts = pysftp.CnOpts()
        cnopts.hostkeys = None
        with pysftp.Connection(self.sftp['host'],
                               username=self.sftp['username'],
                               password=self.sftp['password'],
                               cnopts=cnopts) as sftp:
            sftp.get_r('.', path)

    @contextmanager
    def _read_file(self, filepath, encrypted=True):
        """
        Context manager for reading and optionally decrypting file
        it only decrypts files encrypted by unix 'crypt' tool
        which is used by dbGaP.
        Args:
            filepath (str): path to the file
            encrypted (bool): whether the file is encrypted
        Returns:
            Generator[file-like class]: file like object for the file
        """

        if encrypted:
            has_crypt = sp.call(['which', 'crypt'])
            if has_crypt != 0:
                self.logger.error(
                    'Need to install crypt to decrypt files from dbgap')
                exit(1)
            p = sp.Popen(["crypt", self.dbgap_key],
                         stdin=open(filepath, 'r'),
                         stdout=sp.PIPE,
                         stderr=open(os.devnull, 'w'))
            yield StringIO(p.communicate()[0])
        else:
            f = open(filepath, 'r')
            yield f
            f.close()

    def _sync_csv(self, file_list, encrypted=True):
        '''
        parse csv files to python dict
        Args:
            file_list: a list of file paths
            encrypted: whether those files are encrypted
        Return:
            phsids: a dict of {username: [phsids]}
            userinfo: a dict of {username: {email: email}}
        '''
        phsids = defaultdict(set)
        userinfo = dict()
        for filepath in file_list:
            if os.stat(filepath).st_size == 0:
                continue
            if self._match_pattern(filepath, encrypted=encrypted):
                with self._read_file(filepath, encrypted=encrypted) as f:
                    csv = DictReader(f, quotechar='"', skipinitialspace=True)
                    for row in csv:
                        username = row['login']
                        phsid = row['phsid'].split('.')[0]
                        userinfo[username] = {'email': row['email']}
                        phsids[username].add(phsid)
        return phsids, userinfo

    def sync_to_db_and_storage_backend(self, phsids, userinfo, s):
        """
        sync user access control to database and storage backend
        Args:
            phsids: a dictionary of {username: phsids[]}
            userinfo: a dictionary of {username: userinfo{}}
            s: a sqlalchemy session
        Return:
            None

        """
        self._init_projects(s)

        auth_provider = self._get_or_create(s,
                                            AuthorizationProvider,
                                            name='dbGaP')

        privilege_list = {(ua.user.username, ua.project.auth_id)
                          for ua in s.query(AccessPrivilege).filter_by(
                              auth_provider=auth_provider).all()}

        list_from_dbgap = set()
        for username, ids in phsids.iteritems():
            for phsid in ids:
                for project in self.project_mapping[phsid]:
                    list_from_dbgap.add((username, project['auth_id']))
        to_delete = set.difference(privilege_list, list_from_dbgap)
        to_add = set.difference(list_from_dbgap, privilege_list)
        self._revoke_from_storage(to_delete)
        self._revoke_from_db(s, to_delete, auth_provider)
        self._grant_from_storage(to_add)
        self._grant_from_db(s, userinfo, to_add, auth_provider)

    def _revoke_from_db(self, s, to_delete, auth_provider):
        '''
        Revoke user access to projects in the auth database
        Args:
            s: sqlalchemy session
            to_add: a set of (username, project.auth_id) to be granted
        Return:
            None
        '''

        for (username, project_auth_id) in to_delete:
            q = (s.query(AccessPrivilege).filter(
                AccessPrivilege.user.has(username=username)).filter(
                    AccessPrivilege.project.has(
                        auth_id=project_auth_id)).filter_by(
                            auth_provider=auth_provider).all())
            for access in q:
                self.logger.info("revoke {} access to {} in db".format(
                    username, project_auth_id))
                s.delete(access)

    def _grant_from_db(self, s, userinfo, to_add, auth_provider):
        '''
        Grant user access to projects in the auth database
        Args:
            s: sqlalchemy session
            to_add: a set of (username, project.auth_id) to be granted
        Return:
            None
        '''
        for (username, project_auth_id) in to_add:
            u = s.query(User).filter(User.username == username).first()
            if not u:
                self.logger.info('create user {}'.format(username))
                u = User(username=username)
            u.email = userinfo[username]['email']
            s.add(u)
            self.logger.info('grant {} access to {} in db'.format(
                username, project_auth_id))
            user_access = AccessPrivilege(
                user=u,
                project=self._projects[project_auth_id],
                privilege=['read-storage'],
                auth_provider=auth_provider)
            s.add(user_access)

    def _revoke_from_storage(self, to_delete):
        '''
        If a project have storage backend,
        revoke user's access to buckets in the storage backend
        Args:
            to_delete: a set of (username, project.auth_id) to be revoked
        Return:
            None
        '''
        for (username, project_auth_id) in to_delete:
            project = self._projects[project_auth_id]
            for sa in project.storage_access:
                self.logger.info('revoke {} access to {} in {}'.format(
                    username, project, sa.provider.name))
                self.storage_manager.revoke_access(provider=sa.provider.name,
                                                   username=username,
                                                   project=project)

    def _grant_from_storage(self, to_add):
        '''
        If a project have storage backend,
        grant user's access to buckets in the storage backend
        Args:
            to_add: a set of (username, project.auth_id)  to be granted
        Return:
            None
        '''
        for (username, project_auth_id) in to_add:
            project = self._projects[project_auth_id]
            for sa in project.storage_access:
                self.logger.info('grant {} access to {} in {}'.format(
                    username, project, sa.provider.name))
                self.storage_manager.grant_access(provider=sa.provider.name,
                                                  username=username,
                                                  project=project,
                                                  access='read-storage')

    def _init_projects(self, s):
        for projects in self.project_mapping.values():
            for p in projects:
                project = self._get_or_create(s, Project, **p)
                self._projects[project.auth_id] = project

    def _get_or_create(self, s, model, **kwargs):
        instance = s.query(model).filter_by(**kwargs).first()
        if not instance:
            instance = model(**kwargs)
            s.add(instance)
        return instance

    def sync(self):
        if self.session:
            self._sync(self.session)
        else:
            with self.driver.session as s:
                self._sync(s)

    def _sync(self, s):
        if self.sync_from_dir is None:
            with temps.tmpdir() as workdir:
                self._get_from_sftp(workdir)
                phsids, userinfo = self._sync_csv(
                    glob.glob(os.path.join(workdir, '*')))
        else:
            phsids, userinfo = self._sync_csv(
                glob.glob(os.path.join(self.sync_from_dir, '*')),
                encrypted=False,
            )
        self.sync_to_db_and_storage_backend(phsids, userinfo, s)