aserto 0.0.6 → 0.20.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +14 -11
- data/VERSION +1 -1
- data/lib/aserto/auth_client.rb +42 -17
- data/lib/aserto/config.rb +5 -3
- data/lib/aserto.rb +1 -1
- metadata +7 -7
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8cd1fbe04f5ef1cc23eba3a78db1fd4476f9daca53af402611a16f74d69c8d5b
|
4
|
+
data.tar.gz: 40ec68f4f792946a19e18076ebbac3d4f3bbf00c5f876c6044d5875572eda9ec
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: facf115849a759091eac8a8f722c26f7f8a90d74a6fa158a6d3d63ef8225e1117d87015e4db7bf940a8d4c9561d198af6a27a1a40a603b95a7978663a9fea40c
|
7
|
+
data.tar.gz: 75d16d943d2fc2589009ea1aac863d45ef1ada1663acca38a5cd96abc73584f4843d958f7c3f2635a9e01223c7404146eb33927247151cbd49d2a425a234e5a5
|
data/README.md
CHANGED
@@ -29,9 +29,6 @@ gem install aserto
|
|
29
29
|
|
30
30
|
## Configuration
|
31
31
|
The following configuration settings are required for the authorization middleware:
|
32
|
-
- policy_id
|
33
|
-
- tenant_id
|
34
|
-
- authorizer_api_key
|
35
32
|
- policy_root
|
36
33
|
|
37
34
|
These settings can be retrieved from the [Policy Settings](https://console.aserto.com/ui/policies) page of your Aserto account.
|
@@ -41,7 +38,12 @@ The middleware accepts the following optional parameters:
|
|
41
38
|
| Parameter name | Default value | Description |
|
42
39
|
| -------------- | ------------- | ----------- |
|
43
40
|
| enabled | true | Enables or disables Aserto Authorization |
|
44
|
-
|
|
41
|
+
| policy_name | `""` | The Aserto policy name. |
|
42
|
+
| instance_label | `""` | The label of the active policy runtime. |
|
43
|
+
| authorizer_api_key | "" | The authorizer API Key |
|
44
|
+
| tenant_id | "" | The Aserto Tenant ID |
|
45
|
+
| service_url | `"localhost:8282"` | Sets the URL for the authorizer endpoint. |
|
46
|
+
| cert_path | `""` | Path to the grpc service certificate when connecting to local topaz instance. |
|
45
47
|
| decision | `"allowed"` | The decision that will be used by the middleware when creating an authorizer request. |
|
46
48
|
| logger | `STDOUT` | The logger to be used by the middleware. |
|
47
49
|
| identity_mapping | `{ type: :none }` | The strategy for retrieving the identity, possible values: `:jwt, :sub, :none` |
|
@@ -95,7 +97,6 @@ This behaviour can be overwritten by providing a custom function:
|
|
95
97
|
Aserto.with_policy_path_mapper do |policy_root, request|
|
96
98
|
method = request.request_method
|
97
99
|
path = request.path_info
|
98
|
-
|
99
100
|
"custom: #{policy_root}.#{method}.#{path}"
|
100
101
|
end
|
101
102
|
```
|
@@ -149,11 +150,12 @@ config.disabled_for = [
|
|
149
150
|
|
150
151
|
Rails.application.config.middleware.use Aserto::Authorization do |config|
|
151
152
|
config.enabled = true
|
152
|
-
config.
|
153
|
-
config.
|
153
|
+
config.policy_name = "my-policy-name"
|
154
|
+
config.instance_label = "my-instance"
|
154
155
|
config.authorizer_api_key = Rails.application.credentials.aserto[:authorizer_api_key]
|
155
156
|
config.policy_root = "peoplefinder"
|
156
|
-
config.service_url = "
|
157
|
+
config.service_url = "localhost:8282"
|
158
|
+
config.cert_path = "/path/to/topaz/cert.crt"
|
157
159
|
config.decision = "allowed"
|
158
160
|
config.logger = Rails.logger
|
159
161
|
config.identity_mapping = {
|
@@ -184,11 +186,12 @@ end
|
|
184
186
|
# aserto middleware
|
185
187
|
use Aserto::Authorization do |config|
|
186
188
|
config.enabled = true
|
187
|
-
config.
|
188
|
-
config.tenant_id = "my-tenant-id"
|
189
|
+
config.policy_name = "my-policy-name"
|
189
190
|
config.authorizer_api_key = ENV['authorizer_api_key']
|
190
191
|
config.policy_root = "peoplefinder"
|
191
|
-
config.
|
192
|
+
config.instance_label = "my-instance"
|
193
|
+
config.service_url = "localhost:8282"
|
194
|
+
config.cert_path = "/path/to/topaz/cert.crt"
|
192
195
|
config.decision = "allowed"
|
193
196
|
config.disabled_for = [
|
194
197
|
{
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
0.
|
1
|
+
0.20.3
|
data/lib/aserto/auth_client.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
-
require "aserto
|
3
|
+
require "aserto/authorizer"
|
4
4
|
|
5
5
|
require_relative "identity_mapper"
|
6
6
|
require_relative "policy_path_mapper"
|
@@ -11,10 +11,10 @@ module Aserto
|
|
11
11
|
attr_reader :client, :config, :request
|
12
12
|
|
13
13
|
INTERNAL_MAPPING = {
|
14
|
-
unknown: Aserto::Api::
|
15
|
-
none: Aserto::Api::
|
16
|
-
sub: Aserto::Api::
|
17
|
-
jwt: Aserto::Api::
|
14
|
+
unknown: Aserto::Authorizer::V2::Api::IdentityType::IDENTITY_TYPE_UNKNOWN,
|
15
|
+
none: Aserto::Authorizer::V2::Api::IdentityType::IDENTITY_TYPE_NONE,
|
16
|
+
sub: Aserto::Authorizer::V2::Api::IdentityType::IDENTITY_TYPE_SUB,
|
17
|
+
jwt: Aserto::Authorizer::V2::Api::IdentityType::IDENTITY_TYPE_JWT
|
18
18
|
}.freeze
|
19
19
|
|
20
20
|
private_constant :INTERNAL_MAPPING
|
@@ -22,9 +22,9 @@ module Aserto
|
|
22
22
|
def initialize(request)
|
23
23
|
@request = request
|
24
24
|
@config = Aserto.config
|
25
|
-
@client = Aserto::Authorizer::
|
25
|
+
@client = Aserto::Authorizer::V2::Authorizer::Stub.new(
|
26
26
|
config.service_url,
|
27
|
-
|
27
|
+
load_creds
|
28
28
|
)
|
29
29
|
end
|
30
30
|
|
@@ -46,14 +46,18 @@ module Aserto
|
|
46
46
|
|
47
47
|
private
|
48
48
|
|
49
|
+
def load_creds
|
50
|
+
cert_path = config.cert_path
|
51
|
+
if cert_path && File.file?(cert_path)
|
52
|
+
GRPC::Core::ChannelCredentials.new(File.read(cert_path))
|
53
|
+
else
|
54
|
+
GRPC::Core::ChannelCredentials.new
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
49
58
|
def exec_is(decision)
|
50
59
|
begin
|
51
|
-
response = client.is(
|
52
|
-
request_is(decision), { metadata: {
|
53
|
-
"aserto-tenant-id": config.tenant_id,
|
54
|
-
authorization: "basic #{config.authorizer_api_key}"
|
55
|
-
} }
|
56
|
-
)
|
60
|
+
response = client.is(request_is(decision), headers)
|
57
61
|
rescue GRPC::BadStatus => e
|
58
62
|
Aserto.logger.error(e.inspect)
|
59
63
|
return false
|
@@ -65,23 +69,44 @@ module Aserto
|
|
65
69
|
decision.is
|
66
70
|
end
|
67
71
|
|
72
|
+
def headers
|
73
|
+
headers = {
|
74
|
+
authorization: "basic #{config.authorizer_api_key}"
|
75
|
+
}
|
76
|
+
|
77
|
+
headers["aserto-tenant-id"] = config.tenant_id if config.tenant_id && config.tenant_id != ""
|
78
|
+
|
79
|
+
{ metadata: headers }
|
80
|
+
end
|
81
|
+
|
68
82
|
def request_is(decision)
|
69
|
-
Aserto::Authorizer::
|
83
|
+
Aserto::Authorizer::V2::IsRequest.new(
|
70
84
|
{
|
71
85
|
policy_context: policy_context(decision),
|
86
|
+
policy_instance: policy_instance,
|
72
87
|
identity_context: identity_context,
|
73
88
|
resource_context: resource_context
|
74
89
|
}
|
75
90
|
)
|
76
91
|
end
|
77
92
|
|
93
|
+
def policy_instance
|
94
|
+
return unless config.policy_name && config.instance_label
|
95
|
+
|
96
|
+
Aserto::Authorizer::V2::Api::PolicyInstance.new(
|
97
|
+
{
|
98
|
+
name: config.policy_name,
|
99
|
+
instance_label: config.instance_label
|
100
|
+
}
|
101
|
+
)
|
102
|
+
end
|
103
|
+
|
78
104
|
def policy_context(decision)
|
79
105
|
path = Aserto::PolicyPathMapper.execute(config.policy_root, request)
|
80
106
|
Aserto.logger.debug "aserto authorizing: #{path}"
|
81
107
|
|
82
|
-
Aserto::Api::
|
108
|
+
Aserto::Authorizer::V2::Api::PolicyContext.new(
|
83
109
|
{
|
84
|
-
id: config.policy_id,
|
85
110
|
path: path,
|
86
111
|
decisions: [decision]
|
87
112
|
}
|
@@ -90,7 +115,7 @@ module Aserto
|
|
90
115
|
|
91
116
|
def identity_context
|
92
117
|
identity = Aserto::IdentityMapper.execute(request)
|
93
|
-
Aserto::Api::
|
118
|
+
Aserto::Authorizer::V2::Api::IdentityContext.new(
|
94
119
|
{
|
95
120
|
identity: identity.fetch(:identity, "null"),
|
96
121
|
type: INTERNAL_MAPPING[identity.fetch(:type, :unknown)]
|
data/lib/aserto/config.rb
CHANGED
@@ -25,7 +25,8 @@ module Aserto
|
|
25
25
|
|
26
26
|
DEFAULT_ATTRS = {
|
27
27
|
authorizer_api_key: "",
|
28
|
-
|
28
|
+
tenant_id: "",
|
29
|
+
service_url: "localhost:8282",
|
29
30
|
decision: "allowed",
|
30
31
|
disabled_for: [{}],
|
31
32
|
enabled: true,
|
@@ -33,9 +34,10 @@ module Aserto
|
|
33
34
|
type: :none
|
34
35
|
},
|
35
36
|
logger: Config.default_logger,
|
36
|
-
|
37
|
+
policy_name: "",
|
38
|
+
instance_label: "",
|
37
39
|
policy_root: "",
|
38
|
-
|
40
|
+
cert_path: "",
|
39
41
|
on_unauthorized: lambda do |_env|
|
40
42
|
return [403, {}, ["Forbidden"]]
|
41
43
|
end
|
data/lib/aserto.rb
CHANGED
metadata
CHANGED
@@ -1,29 +1,29 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aserto
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.20.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Aserto
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-11-04 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
|
-
name: aserto-
|
14
|
+
name: aserto-authorizer
|
15
15
|
requirement: !ruby/object:Gem::Requirement
|
16
16
|
requirements:
|
17
|
-
- - "
|
17
|
+
- - ">="
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 0.0.
|
19
|
+
version: 0.0.3
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
|
-
- - "
|
24
|
+
- - ">="
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 0.0.
|
26
|
+
version: 0.0.3
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: jwt
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|