Source code for keycloak.authorization

# -*- coding: utf-8 -*-
#
# The MIT License (MIT)
#
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com>
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of
# this software and associated documentation files (the "Software"), to deal in
# the Software without restriction, including without limitation the rights to
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
# the Software, and to permit persons to whom the Software is furnished to do so,
# subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
# FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
# IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

import ast
import json

from .permission import Permission
from .policy import Policy
from .role import Role


[docs]class Authorization: """ Keycloak Authorization (policies, roles, scopes and resources). https://keycloak.gitbooks.io/documentation/authorization_services/index.html """ def __init__(self): self.policies = {} @property
[docs] def policies(self): return self._policies
@policies.setter def policies(self, value): self._policies = value
[docs] def load_config(self, data): """ Load policies, roles and permissions (scope/resources). :param data: keycloak authorization data (dict) :returns: None """ for pol in data["policies"]: if pol["type"] == "role": policy = Policy( name=pol["name"], type=pol["type"], logic=pol["logic"], decision_strategy=pol["decisionStrategy"], ) config_roles = json.loads(pol["config"]["roles"]) for role in config_roles: policy.add_role(Role(name=role["id"], required=role["required"])) self.policies[policy.name] = policy if pol["type"] == "scope": permission = Permission( name=pol["name"], type=pol["type"], logic=pol["logic"], decision_strategy=pol["decisionStrategy"], ) permission.scopes = ast.literal_eval(pol["config"]["scopes"]) for policy_name in ast.literal_eval(pol["config"]["applyPolicies"]): self.policies[policy_name].add_permission(permission) if pol["type"] == "resource": permission = Permission( name=pol["name"], type=pol["type"], logic=pol["logic"], decision_strategy=pol["decisionStrategy"], ) permission.resources = ast.literal_eval(pol["config"].get("resources", "[]")) for policy_name in ast.literal_eval(pol["config"]["applyPolicies"]): if self.policies.get(policy_name) is not None: self.policies[policy_name].add_permission(permission)