mirror of
https://github.com/GNS3/gns3-server
synced 2024-12-01 20:58:12 +00:00
225 lines
5.9 KiB
Python
225 lines
5.9 KiB
Python
#!/usr/bin/env python
|
|
#
|
|
# Copyright (C) 2021 GNS3 Technologies Inc.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
API routes for roles.
|
|
"""
|
|
|
|
from fastapi import APIRouter, Depends, status
|
|
from uuid import UUID
|
|
from typing import List
|
|
|
|
from gns3server import schemas
|
|
from gns3server.controller.controller_error import (
|
|
ControllerError,
|
|
ControllerBadRequestError,
|
|
ControllerNotFoundError,
|
|
ControllerForbiddenError,
|
|
)
|
|
|
|
from gns3server.db.repositories.rbac import RbacRepository
|
|
from .dependencies.database import get_repository
|
|
from .dependencies.rbac import has_privilege
|
|
|
|
import logging
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
router = APIRouter()
|
|
|
|
|
|
@router.get(
|
|
"",
|
|
response_model=List[schemas.Role],
|
|
dependencies=[Depends(has_privilege("Role.Audit"))]
|
|
)
|
|
async def get_roles(
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
) -> List[schemas.Role]:
|
|
"""
|
|
Get all roles.
|
|
|
|
Required privilege: Role.Audit
|
|
"""
|
|
|
|
return await rbac_repo.get_roles()
|
|
|
|
|
|
@router.post(
|
|
"",
|
|
response_model=schemas.Role,
|
|
status_code=status.HTTP_201_CREATED,
|
|
dependencies=[Depends(has_privilege("Role.Allocate"))]
|
|
)
|
|
async def create_role(
|
|
role_create: schemas.RoleCreate,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
) -> schemas.Role:
|
|
"""
|
|
Create a new role.
|
|
|
|
Required privilege: Role.Allocate
|
|
"""
|
|
|
|
if await rbac_repo.get_role_by_name(role_create.name):
|
|
raise ControllerBadRequestError(f"Role '{role_create.name}' already exists")
|
|
|
|
return await rbac_repo.create_role(role_create)
|
|
|
|
|
|
@router.get(
|
|
"/{role_id}",
|
|
response_model=schemas.Role,
|
|
dependencies=[Depends(has_privilege("Role.Audit"))]
|
|
)
|
|
async def get_role(
|
|
role_id: UUID,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository)),
|
|
) -> schemas.Role:
|
|
"""
|
|
Get a role.
|
|
|
|
Required privilege: Role.Audit
|
|
"""
|
|
|
|
role = await rbac_repo.get_role(role_id)
|
|
if not role:
|
|
raise ControllerNotFoundError(f"Role '{role_id}' not found")
|
|
return role
|
|
|
|
|
|
@router.put(
|
|
"/{role_id}",
|
|
response_model=schemas.Role,
|
|
dependencies=[Depends(has_privilege("Role.Modify"))]
|
|
)
|
|
async def update_role(
|
|
role_id: UUID,
|
|
role_update: schemas.RoleUpdate,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
) -> schemas.Role:
|
|
"""
|
|
Update a role.
|
|
|
|
Required privilege: Role.Modify
|
|
"""
|
|
|
|
role = await rbac_repo.get_role(role_id)
|
|
if not role:
|
|
raise ControllerNotFoundError(f"Role '{role_id}' not found")
|
|
|
|
if role.is_builtin:
|
|
raise ControllerForbiddenError(f"Built-in role '{role_id}' cannot be updated")
|
|
|
|
return await rbac_repo.update_role(role_id, role_update)
|
|
|
|
|
|
@router.delete(
|
|
"/{role_id}",
|
|
status_code=status.HTTP_204_NO_CONTENT,
|
|
dependencies=[Depends(has_privilege("Role.Allocate"))]
|
|
)
|
|
async def delete_role(
|
|
role_id: UUID,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository)),
|
|
) -> None:
|
|
"""
|
|
Delete a role.
|
|
|
|
Required privilege: Role.Allocate
|
|
"""
|
|
|
|
role = await rbac_repo.get_role(role_id)
|
|
if not role:
|
|
raise ControllerNotFoundError(f"Role '{role_id}' not found")
|
|
|
|
if role.is_builtin:
|
|
raise ControllerForbiddenError(f"Built-in role '{role_id}' cannot be deleted")
|
|
|
|
success = await rbac_repo.delete_role(role_id)
|
|
if not success:
|
|
raise ControllerError(f"Role '{role_id}' could not be deleted")
|
|
await rbac_repo.delete_all_ace_starting_with_path(f"/roles/{role_id}")
|
|
|
|
|
|
@router.get(
|
|
"/{role_id}/privileges",
|
|
response_model=List[schemas.Privilege],
|
|
dependencies=[Depends(has_privilege("Role.Audit"))]
|
|
)
|
|
async def get_role_privileges(
|
|
role_id: UUID,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
) -> List[schemas.Privilege]:
|
|
"""
|
|
Get all role privileges.
|
|
|
|
Required privilege: Role.Audit
|
|
"""
|
|
|
|
return await rbac_repo.get_role_privileges(role_id)
|
|
|
|
|
|
@router.put(
|
|
"/{role_id}/privileges/{privilege_id}",
|
|
status_code=status.HTTP_204_NO_CONTENT,
|
|
dependencies=[Depends(has_privilege("Role.Modify"))]
|
|
)
|
|
async def add_privilege_to_role(
|
|
role_id: UUID,
|
|
privilege_id: UUID,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
) -> None:
|
|
"""
|
|
Add a privilege to a role.
|
|
|
|
Required privilege: Role.Modify
|
|
"""
|
|
|
|
privilege = await rbac_repo.get_privilege(privilege_id)
|
|
if not privilege:
|
|
raise ControllerNotFoundError(f"Privilege '{privilege_id}' not found")
|
|
|
|
role = await rbac_repo.add_privilege_to_role(role_id, privilege)
|
|
if not role:
|
|
raise ControllerNotFoundError(f"Role '{role_id}' not found")
|
|
|
|
|
|
@router.delete(
|
|
"/{role_id}/privileges/{privilege_id}",
|
|
status_code=status.HTTP_204_NO_CONTENT,
|
|
dependencies=[Depends(has_privilege("Role.Modify"))]
|
|
)
|
|
async def remove_privilege_from_role(
|
|
role_id: UUID,
|
|
privilege_id: UUID,
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository)),
|
|
) -> None:
|
|
"""
|
|
Remove privilege from a role.
|
|
|
|
Required privilege: Role.Modify
|
|
"""
|
|
|
|
privilege = await rbac_repo.get_privilege(privilege_id)
|
|
if not privilege:
|
|
raise ControllerNotFoundError(f"Privilege '{privilege_id}' not found")
|
|
|
|
role = await rbac_repo.remove_privilege_from_role(role_id, privilege)
|
|
if not role:
|
|
raise ControllerNotFoundError(f"Role '{role_id}' not found")
|