diff --git a/.flake8 b/.flake8 index 1e46891975afedab71ce333d8be84cb9692cf41f..db234bdd12f196f109da823525b07fd5afe967d1 100644 --- a/.flake8 +++ b/.flake8 @@ -1,3 +1,4 @@ [flake8] max-line-length = 120 exclude = .git,__pycache__,__init__.py,.mypy_cache,.pytest_cache +extend-ignore = E203 diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 113c8cacb82aee2bfb57eb3fb345179836437282..94e00b948fca934313529e240866160e6128e544 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -6,6 +6,7 @@ variables: OBJECT_GATEWAY_URI: "http://127.0.0.1:8000" CEPH_ACCESS_KEY: "" CEPH_SECRET_KEY: "" + CEPH_USERNAME: "" OIDC_CLIENT_SECRET: "" OIDC_CLIENT_ID: "" OIDC_BASE_URI: "http://127.0.0.1:8000" diff --git a/CHANGELOG.md b/CHANGELOG.md new file mode 100644 index 0000000000000000000000000000000000000000..6f5f7999a750ce4ec34d8083921347452a26bcf5 --- /dev/null +++ b/CHANGELOG.md @@ -0,0 +1,14 @@ +## Version 1.1.0 + +### Features +* Inject additional metadata to `BucketOut` and `S3ObjectMetaInformation` response #22 +* Add name of user in the `BucketPermissionOut` response #29 +* Add endpoint to search for user #28 +* Enforce that always a S3 Key is present #27 +### Fixes +* Use `max-age` for cookies instead of `expires` #32 +* Give useful response when encountering a error during login instead of sending a `500` response #21 +* Remove dependence on other services during health check #31 +### General +* Bump dependencies +* Bump version of dev OIDC service and adapt configuration #24 diff --git a/DEVELOPING.md b/DEVELOPING.md index 18bfe6785f651baa6555b95197d2c22aeb4c4f5a..06fd9ce5cd53ffd3ba6a1edf92829866736826bf 100644 --- a/DEVELOPING.md +++ b/DEVELOPING.md @@ -111,6 +111,8 @@ The provided configuration does the following things * It forwards all request to http://localhost:9999/api/* to http://localhost:8080 (this backend) * It strips the prefix `/api` before it forwards the request to the backend * All other request will be forwarded to http://localhost:5173, the corresponding dev [Frontend](https://gitlab.ub.uni-bielefeld.de/denbi/object-storage-access-ui) + * Hides all the RADOS Gateways behind http://localhost:9998 and distributes all requests equally to the Gateways + * Takes care of the CORS header for the RADOS Gateway You don't have to use Traefik for that. You can use any reverse proxy for this task, like [Caddy](https://caddyserver.com/), [HAProxy](https://www.haproxy.org/) or [nginx](https://nginx.org/en/).<br> diff --git a/README.md b/README.md index 2b338cbd4ce106f16b42dd2dd6b8dcad20fe1e8d..5333fe64da5b67e566926a7ec925f53b5fd8aaa3 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # S3 Proxy API ## Description -Openstack is shipping with an integrated UI to access the Object Store provided by ceph. Unfortunately, this UI does not allow +Openstack is shipping with an integrated UI to access the Object Store provided by Ceph. Unfortunately, this UI does not allow fine-grained control who can access a bucket or object. You can either make it accessible for everyone or nobody, but Ceph can do this and much more. 👎 This is the backend for a new UI which can leverage the additional powerful functionality provided by Ceph in a @@ -32,6 +32,7 @@ user-friendly manner. 👠| `OBJECT_GATEWAY_URI` | unset | HTTP URL | HTTP URL of the Ceph Object Gateway | | `CEPH_ACCESS_KEY` | unset | \<access key> | Ceph access key with admin privileges | | `CEPH_SECRET_KEY` | unset | \<secret key> | Ceph secret key with admin privileges | +| `CEPH_USERNAME` | unset | \<ceph username> | Username in Ceph of the backend user | | `OIDC_CLIENT_ID` | unset | \<OIDC client id> | Client ID from the OIDC provider | | `OIDC_CLIENT_SECRET` | unset | \<OIDC client secret> | Client Secret from the OIDC provider | | `OIDC_BASE_URI` | unset | HTTP URL | HTTP URL of the OIDC Provider | @@ -47,3 +48,7 @@ user-friendly manner. 👠| `BACKEND_CORS_ORIGINS` | `[]` | json formatted list of urls | List of valid CORS origins | | `SQLALCHEMY_VERBOSE_LOGGER` | `false` | `<"true"|"false">` | Enables verbose SQL output.<br>Should be `false` in production | | `OIDC_META_INFO_PATH` | `/.well-known/openid-configuration` | URL path | Path to the OIDC configuration file<br> Will be concatenated with the `OIDC_BASE_URI` | + +## Getting started +This service depends on multiple other services. See [DEVELOPING.md](DEVELOPING.md) ho to set these up for developing on +your local machine. diff --git a/alembic/versions/6c64f020818b_make_display_name_for_users_mandatory.py b/alembic/versions/6c64f020818b_make_display_name_for_users_mandatory.py new file mode 100644 index 0000000000000000000000000000000000000000..9b70f67ffa093ba5f172e2c4aff61ceb5211f6e1 --- /dev/null +++ b/alembic/versions/6c64f020818b_make_display_name_for_users_mandatory.py @@ -0,0 +1,28 @@ +"""Make display_name for users mandatory + +Revision ID: 6c64f020818b +Revises: 9fa582febebe +Create Date: 2022-10-21 13:53:44.446799 + +""" +from sqlalchemy.dialects import mysql + +from alembic import op + +# revision identifiers, used by Alembic. +revision = "6c64f020818b" +down_revision = "9fa582febebe" +branch_labels = None +depends_on = None + + +def upgrade(): + # ### commands auto generated by Alembic - please adjust! ### + op.alter_column("user", "display_name", existing_type=mysql.VARCHAR(length=256), nullable=False) + # ### end Alembic commands ### + + +def downgrade(): + # ### commands auto generated by Alembic - please adjust! ### + op.alter_column("user", "display_name", existing_type=mysql.VARCHAR(length=256), nullable=True) + # ### end Alembic commands ### diff --git a/alembic/versions/9fa582febebe_delete_username_from_user.py b/alembic/versions/9fa582febebe_delete_username_from_user.py index 2b5eaa9c89ddcf5b05296953b7be26e37ec74598..76e72f0c1a0010d7902f01a8a0a93ba455f1badf 100644 --- a/alembic/versions/9fa582febebe_delete_username_from_user.py +++ b/alembic/versions/9fa582febebe_delete_username_from_user.py @@ -5,10 +5,11 @@ Revises: 83a3a47a6351 Create Date: 2022-07-27 11:10:53.440935 """ -from alembic import op import sqlalchemy as sa from sqlalchemy.dialects import mysql +from alembic import op + # revision identifiers, used by Alembic. revision = "9fa582febebe" down_revision = "83a3a47a6351" diff --git a/app/api/dependencies.py b/app/api/dependencies.py index 8aaf24c2d9080d867001083e1aeceeb43b5d4655..8423802c6b86dde94c8e22d499fbd07eb15f6798 100644 --- a/app/api/dependencies.py +++ b/app/api/dependencies.py @@ -1,5 +1,6 @@ from typing import TYPE_CHECKING, Any, AsyncGenerator +from authlib.integrations.base_client.errors import OAuthError from authlib.jose.errors import BadSignatureError, DecodeError, ExpiredTokenError from fastapi import Depends, HTTPException, Path, status from fastapi.requests import Request @@ -26,6 +27,11 @@ else: bearer_token = HTTPBearer(description="JWT Token") +class LoginException(Exception): + def __init__(self, error_source: str): + self.error_source = error_source + + def get_rgw_admin() -> RGWAdmin: return rgw # pragma: no cover @@ -224,6 +230,13 @@ async def get_userinfo_from_access_token(request: Request) -> dict[str, Any]: # userinfo : dict[str, Any] Info about the corresponding user. """ - claims = await oauth.lifescience.authorize_access_token(request) - # ID token doesn't have all necessary information, call userinfo endpoint - return await oauth.lifescience.userinfo(token=claims) + try: + if "error" in request.query_params.keys(): + # if there is an error in the login flow, like a canceld login request, then notify the client + raise LoginException(error_source=request.query_params["error"]) + claims = await oauth.lifescience.authorize_access_token(request) + # ID token doesn't have all necessary information, call userinfo endpoint + return await oauth.lifescience.userinfo(token=claims) + except OAuthError: + # if there is an error in the oauth flow, like an expired token, then notify the client + raise LoginException(error_source="oidc") diff --git a/app/api/endpoints/bucket_permissions.py b/app/api/endpoints/bucket_permissions.py index 33d0e7d7e0e20bc38102d0149c617298e6b70b94..176647598f6325da8ee48c0327735df7763c3ce9 100644 --- a/app/api/endpoints/bucket_permissions.py +++ b/app/api/endpoints/bucket_permissions.py @@ -13,9 +13,11 @@ from app.api.dependencies import ( get_user_by_path_uid, ) from app.crud.crud_bucket_permission import CRUDBucketPermission, DuplicateError +from app.crud.crud_user import CRUDUser from app.models.bucket import Bucket as BucketDB from app.models.user import User as UserDB -from app.schemas.bucket_permission import BucketPermission as PermissionSchema +from app.schemas.bucket_permission import BucketPermissionIn as PermissionSchemaIn +from app.schemas.bucket_permission import BucketPermissionOut as PermissionSchemaOut from app.schemas.bucket_permission import BucketPermissionParameters as PermissionParametersSchema router = APIRouter(prefix="/permissions", tags=["BucketPermissions"]) @@ -28,7 +30,7 @@ else: @router.get( "/bucket/{bucket_name}/user/{uid}", - response_model=PermissionSchema, + response_model=PermissionSchemaOut, summary="Get permission for bucket and user combination.", response_model_exclude_none=True, ) @@ -36,7 +38,7 @@ async def get_permission_for_bucket( bucket: BucketDB = Depends(get_current_bucket), db: AsyncSession = Depends(get_db), user: UserDB = Depends(get_authorized_user_for_permission), -) -> PermissionSchema: +) -> PermissionSchemaOut: """ Get the bucket permissions for the specific combination of bucket and user.\n The owner of the bucket and the grantee of the permission can view it. @@ -52,12 +54,14 @@ async def get_permission_for_bucket( Returns ------- - permissions : app.schemas.bucket_permission.BucketPermission + permissions : app.schemas.bucket_permission.BucketPermissionOut Permission for this bucket and user combination. """ bucket_permission = await CRUDBucketPermission.get(db, bucket.name, user.uid) if bucket_permission: - return PermissionSchema.from_db_model(bucket_permission, uid=user.uid) + return PermissionSchemaOut.from_db_model( + bucket_permission, uid=user.uid, grantee_display_name=user.display_name + ) raise HTTPException( status.HTTP_404_NOT_FOUND, detail=f"Permission for combination of bucket={bucket.name} and user={user.uid} doesn't exists", @@ -92,7 +96,7 @@ async def delete_permission_for_bucket( Returns ------- - permissions : app.schemas.bucket_permission.BucketPermission + permissions : app.schemas.bucket_permission.BucketPermissionOut Permission for this bucket and user combination. """ bucket_permission = await CRUDBucketPermission.get(db, bucket.name, user.uid) @@ -102,7 +106,7 @@ async def delete_permission_for_bucket( detail=f"Permission for combination of bucket={bucket.name} and user={user.uid} doesn't exists", ) await CRUDBucketPermission.delete(db, bucket_permission) - bucket_permission_schema = PermissionSchema.from_db_model(bucket_permission, user.uid) + bucket_permission_schema = PermissionSchemaOut.from_db_model(bucket_permission, user.uid, user.display_name) s3_policy = s3.Bucket(bucket_permission_schema.bucket_name).Policy() policy = json.loads(s3_policy.policy) policy["Statement"] = [ @@ -113,7 +117,7 @@ async def delete_permission_for_bucket( @router.get( "/bucket/{bucket_name}", - response_model=list[PermissionSchema], + response_model=list[PermissionSchemaOut], summary="Get all permissions for a bucket.", response_model_exclude_none=True, ) @@ -121,7 +125,7 @@ async def list_permissions_per_bucket( bucket: BucketDB = Depends(get_current_bucket), db: AsyncSession = Depends(get_db), current_user: UserDB = Depends(get_current_user), -) -> list[PermissionSchema]: +) -> list[PermissionSchemaOut]: """ List all the bucket permissions for the given bucket. \f @@ -136,24 +140,24 @@ async def list_permissions_per_bucket( Returns ------- - permissions : list[app.schemas.bucket_permission.BucketPermission] + permissions : list[app.schemas.bucket_permission.BucketPermissionOut] List of all permissions for this bucket. """ if not await CRUDBucketPermission.check_permission(db, bucket.name, current_user.uid, only_own=True): raise HTTPException(status.HTTP_403_FORBIDDEN, "You can only view your own bucket permissions") bucket_permissions = await CRUDBucketPermission.get_permissions_for_bucket(db, bucket.name) - return [PermissionSchema.from_db_model(p) for p in bucket_permissions] + return [PermissionSchemaOut.from_db_model(p) for p in bucket_permissions] @router.get( "/user/{uid}", - response_model=list[PermissionSchema], + response_model=list[PermissionSchemaOut], summary="Get all permissions for a user.", response_model_exclude_none=True, ) async def list_permissions_per_user( user: UserDB = Depends(get_user_by_path_uid), db: AsyncSession = Depends(get_db) -) -> list[PermissionSchema]: +) -> list[PermissionSchemaOut]: """ List all the bucket permissions for the given user. \f @@ -166,32 +170,35 @@ async def list_permissions_per_user( Returns ------- - permissions : list[app.schemas.bucket_permission.BucketPermission] + permissions : list[app.schemas.bucket_permission.BucketPermissionOut] List of all permissions for this user. """ bucket_permissions = await CRUDBucketPermission.get_permissions_for_user(db, user.uid) - return [PermissionSchema.from_db_model(p, uid=user.uid) for p in bucket_permissions] + return [ + PermissionSchemaOut.from_db_model(p, uid=user.uid, grantee_display_name=user.display_name) + for p in bucket_permissions + ] @router.post( "/", - response_model=PermissionSchema, + response_model=PermissionSchemaOut, status_code=status.HTTP_201_CREATED, summary="Create a permission.", response_model_exclude_none=True, ) async def create_permission( - permission: PermissionSchema = Body(..., description="Permission to create"), + permission: PermissionSchemaIn = Body(..., description="Permission to create"), db: AsyncSession = Depends(get_db), current_user: UserDB = Depends(get_current_user), s3: S3ServiceResource = Depends(get_s3_resource), -) -> PermissionSchema: +) -> PermissionSchemaOut: """ Create a permission for a bucket and user. \f Parameters ---------- - permission : app.schemas.bucket_permission.BucketPermission + permission : app.schemas.bucket_permission.BucketPermissionOut Information about the permission which should be created. HTTP Body parameter. db : sqlalchemy.ext.asyncio.AsyncSession. Async database session to perform query on. Dependency Injection. @@ -202,12 +209,15 @@ async def create_permission( Returns ------- - permissions : app.schemas.bucket_permission.BucketPermission + permissions : app.schemas.bucket_permission.BucketPermissionOut Newly created permission. """ await get_current_bucket(permission.bucket_name, db=db, current_user=current_user) try: permission_db = await CRUDBucketPermission.create(db, permission) + grantee = await CRUDUser.get(db, permission.uid) + if grantee is None: # pragma: no cover + raise KeyError() except ValueError: raise HTTPException( status.HTTP_400_BAD_REQUEST, detail="The owner of the bucket can't get any more permissions" @@ -225,13 +235,14 @@ async def create_permission( json_policy["Statement"] += permission.map_to_bucket_policy_statement(permission_db.user_id) new_policy = json.dumps(json_policy) s3_policy.put(Policy=new_policy) - return PermissionSchema.from_db_model(permission_db, uid=permission.uid) + + return PermissionSchemaOut.from_db_model(permission_db, uid=grantee.uid, grantee_display_name=grantee.display_name) @router.put( "/bucket/{bucket_name}/user/{uid}", status_code=status.HTTP_200_OK, - response_model=PermissionSchema, + response_model=PermissionSchemaOut, summary="Update a bucket permission", response_model_exclude_none=True, ) @@ -242,13 +253,13 @@ async def update_permission( db: AsyncSession = Depends(get_db), current_user: UserDB = Depends(get_current_user), s3: S3ServiceResource = Depends(get_s3_resource), -) -> PermissionSchema: +) -> PermissionSchemaOut: """ Update a permission for a bucket and user. \f Parameters ---------- - permission_parameters : app.schemas.bucket_permission.BucketPermission + permission_parameters : app.schemas.bucket_permission.BucketPermissionOut Information about the permission which should be updated. HTTP Body parameter. user : app.models.user.User User with the uid in the URL. Dependency Injection. @@ -263,7 +274,7 @@ async def update_permission( Returns ------- - permissions : app.schemas.bucket_permission.BucketPermission + permissions : app.schemas.bucket_permission.BucketPermissionOut Updated permission. """ if not await CRUDBucketPermission.check_permission(db, bucket.name, current_user.uid, only_own=True): @@ -276,7 +287,7 @@ async def update_permission( detail=f"Permission for combination of bucket={bucket.name} and user={user.uid} doesn't exists", ) updated_permission = await CRUDBucketPermission.update_permission(db, bucket_permission, permission_parameters) - updated_permission_schema = PermissionSchema.from_db_model(updated_permission) + updated_permission_schema = PermissionSchemaOut.from_db_model(updated_permission) s3_policy = s3.Bucket(updated_permission_schema.bucket_name).Policy() policy = json.loads(s3_policy.policy) policy["Statement"] = [ diff --git a/app/api/endpoints/buckets.py b/app/api/endpoints/buckets.py index d91760aa759f7e0f42e17ecf34019fce17ae8a86..3de9e27ed164038d71fa05553211e39c197ef577 100644 --- a/app/api/endpoints/buckets.py +++ b/app/api/endpoints/buckets.py @@ -1,4 +1,5 @@ import json +from functools import reduce from typing import TYPE_CHECKING from botocore.exceptions import ClientError @@ -6,6 +7,7 @@ from fastapi import APIRouter, Depends, HTTPException, Path, Query, status from sqlalchemy.ext.asyncio import AsyncSession from app.api.dependencies import get_current_bucket, get_current_user, get_db, get_s3_resource +from app.core.config import settings from app.crud.crud_bucket import CRUDBucket from app.crud.crud_bucket_permission import CRUDBucketPermission from app.models.bucket import Bucket as BucketDB @@ -15,9 +17,10 @@ from app.schemas.bucket import BucketOut as BucketOutSchema from app.schemas.bucket import S3ObjectMetaInformation if TYPE_CHECKING: - from mypy_boto3_s3.service_resource import S3ServiceResource + from mypy_boto3_s3.service_resource import ObjectSummary, S3ServiceResource else: S3ServiceResource = object + ObjectSummary = object router = APIRouter(prefix="/buckets", tags=["Bucket"]) @@ -52,6 +55,10 @@ async def list_buckets( "name": bucket.name, "created_at": s3.Bucket(name=bucket.name).creation_date, "owner": bucket.owner.uid, + "num_objects": sum( + 1 for obj in s3.Bucket(name=bucket.name).objects.all() if not obj.key.endswith(".s3keep") + ), + "size": reduce(lambda x, y: x + y.size, list(s3.Bucket(name=bucket.name).objects.all()), 0), } ) for bucket in await CRUDBucket.get_for_user(db, user.uid) @@ -107,13 +114,20 @@ async def create_bucket( { "Version": "2012-10-17", "Statement": [ + { + "Sid": "ProxyOwnerPerm", + "Effect": "Allow", + "Principal": {"AWS": [f"arn:aws:iam:::user/{settings.CEPH_USERNAME}"]}, + "Action": ["s3:GetObject"], + "Resource": [f"arn:aws:s3:::{db_bucket.name}/*"], + }, { "Sid": "PseudoOwnerPerm", "Effect": "Allow", "Principal": {"AWS": [f"arn:aws:iam:::user/{user.uid}"]}, "Action": ["s3:GetObject", "s3:DeleteObject", "s3:PutObject", "s3:ListBucket"], "Resource": [f"arn:aws:s3:::{db_bucket.name}/*", f"arn:aws:s3:::{db_bucket.name}"], - } + }, ], } ) @@ -124,6 +138,8 @@ async def create_bucket( "name": db_bucket.name, "created_at": s3.Bucket(name=db_bucket.name).creation_date, "owner": db_bucket.owner.uid, + "num_objects": 0, + "size": 0, } ) @@ -147,12 +163,16 @@ async def get_bucket( bucket : app.schemas.bucket.BucketOut Bucket with the provided name. """ + s3bucket = s3.Bucket(name=bucket.name) + objects: list[ObjectSummary] = list(s3bucket.objects.all()) return BucketOutSchema( **{ "description": bucket.description, "name": bucket.name, - "created_at": s3.Bucket(name=bucket.name).creation_date, + "created_at": s3bucket.creation_date, "owner": bucket.owner.uid, + "num_objects": sum(1 for obj in objects if not obj.key.endswith(".s3keep")), + "size": reduce(lambda x, y: x + y.size, objects, 0), } ) @@ -215,6 +235,10 @@ async def get_bucket_objects( Bucket with the name provided in the URL path. Dependency Injection. s3 : boto3_type_annotations.s3.ServiceResource S3 Service to perform operations on buckets in Ceph. Dependency Injection. + current_user : app.models.user.User + Current user. Dependency Injection. + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. Dependency Injection. Returns ------- @@ -269,6 +293,10 @@ async def get_bucket_object( S3 Service to perform operations on buckets in Ceph. Dependency Injection. object_path : str Key of a specific object in the bucket. URL Path Parameter. + current_user : app.models.user.User + Current user. Dependency Injection. + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. Dependency Injection. Returns ------- diff --git a/app/api/endpoints/login.py b/app/api/endpoints/login.py index 7d0d511c3acb115f9d29e481ae145e1b48e55829..5f55bd550b3a60429ecc4c172dad2db35e0739a2 100644 --- a/app/api/endpoints/login.py +++ b/app/api/endpoints/login.py @@ -1,12 +1,11 @@ from typing import Any -from fastapi import APIRouter, Depends, status -from fastapi.requests import Request +from fastapi import APIRouter, Depends, Request, Response, status from fastapi.responses import RedirectResponse from rgwadmin import RGWAdmin from sqlalchemy.ext.asyncio import AsyncSession -from app.api.dependencies import get_db, get_rgw_admin, get_userinfo_from_access_token +from app.api.dependencies import LoginException, get_db, get_rgw_admin, get_userinfo_from_access_token from app.core.config import settings from app.core.security import create_access_token, oauth from app.crud.crud_user import CRUDUser @@ -91,22 +90,44 @@ async def login_callback( path : str Redirect path after successful login. """ - lifescience_id = ( - user_info["voperson_id"] if isinstance(user_info["voperson_id"], str) else user_info["voperson_id"][0] - ) - uid = lifescience_id.split("@")[0] - user = await CRUDUser.get(db, uid) - if user is None: - new_user = User(uid=uid, display_name=user_info["name"]) - user = await CRUDUser.create(db, new_user) - rgw.create_user(uid=user.uid, max_buckets=-1, display_name=user.display_name) - token = create_access_token(uid) - response.set_cookie( - key="bearer", - value=token, - samesite="strict", - expires=settings.JWT_TOKEN_EXPIRE_MINUTES, - secure=True, - domain=settings.DOMAIN, - ) + try: + lifescience_id = ( + user_info["voperson_id"] if isinstance(user_info["voperson_id"], str) else user_info["voperson_id"][0] + ) + uid = lifescience_id.split("@")[0] + user = await CRUDUser.get(db, uid) + if user is None: + new_user = User(uid=uid, display_name=user_info["name"]) + user = await CRUDUser.create(db, new_user) + rgw.create_user(uid=user.uid, max_buckets=-1, display_name=user.display_name) + token = create_access_token(uid) + response.set_cookie( + key="bearer", + value=token, + samesite="strict", + max_age=settings.JWT_TOKEN_EXPIRE_MINUTES, + secure=True, + domain=settings.DOMAIN, + ) + except Exception: # pragma: no cover + raise LoginException(error_source="server") return "/" + + +def login_exception_handler(request: Request, exc: LoginException) -> Response: + """ + Exception handler for all kinds of login errors. + + Parameters + ---------- + request : fastapi.Request + Original request where the exception occurred. + exc : LoginException + The exception that was raised. + + Returns + ------- + redirect : fastapi.Response + Redirect to base URL with error as query parameter + """ + return RedirectResponse(f"/?login_error={exc.error_source}", status_code=status.HTTP_302_FOUND) diff --git a/app/api/endpoints/users.py b/app/api/endpoints/users.py index b6f649a832901d12c4b6580af524b0d8d1acc442..e5e6cb3a82e332abcb463d1202c0976592cacea5 100644 --- a/app/api/endpoints/users.py +++ b/app/api/endpoints/users.py @@ -1,8 +1,10 @@ -from fastapi import APIRouter, Depends, HTTPException, Path, status +from fastapi import APIRouter, Depends, HTTPException, Path, Query, status from rgwadmin import RGWAdmin from rgwadmin.exceptions import RGWAdminException +from sqlalchemy.ext.asyncio import AsyncSession -from app.api.dependencies import get_current_user, get_rgw_admin, get_user_by_path_uid +from app.api.dependencies import get_current_user, get_db, get_rgw_admin, get_user_by_path_uid +from app.crud.crud_user import CRUDUser from app.models.user import User as UserDB from app.schemas.user import S3Key from app.schemas.user import User as UserSchema @@ -30,6 +32,29 @@ def get_logged_in_user( return current_user +@router.get("/", response_model=list[UserSchema], summary="Search for users by their name") +async def search_users( + name_like: str = Query(..., min_length=3, max_length=30), + db: AsyncSession = Depends(get_db), +) -> list[UserDB]: + """ + Return the users that have a specific substring in their name. + \f + Parameters + ---------- + name_like : string + Substring of a name to search users for. Query Parameter. + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. Dependency Injection. + + Returns + ------- + users: list[app.models.user.User] + Users who have the substring in their name. + """ + return await CRUDUser.search_for_name(db, name_like) + + @router.get("/{uid}", response_model=UserSchema, summary="Get a user by its uid") def get_user(user: UserDB = Depends(get_user_by_path_uid)) -> UserDB: """ @@ -175,6 +200,8 @@ def delete_user_key( user : app.models.user.User User with given uid. Dependency Injection. """ + if len(rgw.get_user(uid=user.uid, stats=False)["keys"]) <= 1: + raise HTTPException(status.HTTP_400_BAD_REQUEST, detail="It's not possible to delete the last key") try: rgw.remove_key(access_key=access_id, uid=user.uid) except RGWAdminException: diff --git a/app/api/miscellaneous_endpoints.py b/app/api/miscellaneous_endpoints.py index 00fa05b100ea8d9138c23aa3415a4c3904a5694d..6a0bd8e827fe063e5dd8b4a53ab2e243ebdd1fe9 100644 --- a/app/api/miscellaneous_endpoints.py +++ b/app/api/miscellaneous_endpoints.py @@ -1,10 +1,4 @@ -import httpx -from fastapi import APIRouter, Depends, HTTPException, status -from sqlalchemy.ext.asyncio import AsyncSession - -from app.api.dependencies import get_db -from app.core.config import settings -from app.schemas.security import ErrorDetail +from fastapi import APIRouter, status miscellaneous_router = APIRouter(include_in_schema=True) @@ -17,33 +11,16 @@ miscellaneous_router = APIRouter(include_in_schema=True) "description": "Service Health is OK", "content": {"application/json": {"example": {"status": "OK"}}}, }, - status.HTTP_500_INTERNAL_SERVER_ERROR: { - "model": ErrorDetail, - "description": "Service Health is not OK", - "content": {"application/json": {"example": {"detail": "Connection to RGW lost"}}}, - }, }, ) -async def health_check(db: AsyncSession = Depends(get_db)) -> dict[str, str]: +def health_check() -> dict[str, str]: """ - Check the health of the service. + Check if the service is reachable. \f - Parameters - ---------- - db : sqlalchemy.ext.asyncio.AsyncSession. - Async database session to perform query on. Dependency Injection. Returns ------- response : dict[str, str] status ok """ - try: - assert db.is_active - except Exception: - raise HTTPException(status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, detail="Connection to database lost") - try: - httpx.get(settings.OBJECT_GATEWAY_URI, timeout=3.5) - except Exception: - raise HTTPException(status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, detail="Connection to RGW lost") return {"status": "OK"} diff --git a/app/core/config.py b/app/core/config.py index 28716cf28abc110235330ab9711085d3da2dc45a..b64fb4825ea92eb79cd26b242e27e40a93c6fa91 100644 --- a/app/core/config.py +++ b/app/core/config.py @@ -17,14 +17,12 @@ def _assemble_db_uri(values: Dict[str, Any], async_flag: bool = True) -> Any: class Settings(BaseSettings): DOMAIN: str = Field("localhost", description="Domain of the service.") - SSL_TERMINATION: bool = Field("False", description="Flag if the service runs behind a SSL termination proxy") + SSL_TERMINATION: bool = Field(False, description="Flag if the service runs behind a SSL termination proxy") API_PREFIX: str = Field("/api", description="Path Prefix for all API endpoints.") SECRET_KEY: str = Field(secrets.token_urlsafe(32), description="Secret key to sign the JWTs.") # 60 minutes * 24 hours * 8 days = 8 days JWT_TOKEN_EXPIRE_MINUTES: int = Field(60 * 24 * 8, description="JWT lifespan in minutes.") # BACKEND_CORS_ORIGINS is a JSON-formatted list of origins - # e.g: '["http://localhost", "http://localhost:4200", "http://localhost:3000", \ - # "http://localhost:8080", "http://local.dockertoolbox.tiangolo.com"]' BACKEND_CORS_ORIGINS: List[AnyHttpUrl] = Field([], description="List of all valid CORS origins") @validator("BACKEND_CORS_ORIGINS", pre=True) @@ -60,6 +58,7 @@ class Settings(BaseSettings): OBJECT_GATEWAY_URI: AnyHttpUrl = Field(..., description="URI of the Ceph Object Gateway.") CEPH_ACCESS_KEY: str = Field(..., description="Access key for the Ceph Object Gateway with admin privileges.") CEPH_SECRET_KEY: str = Field(..., description="Secret key for the Ceph Object Gateway with admin privileges.") + CEPH_USERNAME: str = Field(..., description="ID of the Proxy user in Ceph.") OIDC_CLIENT_SECRET: str = Field(..., description="OIDC Client secret") OIDC_CLIENT_ID: str = Field(..., description="OIDC Client ID") diff --git a/app/crud/crud_bucket_permission.py b/app/crud/crud_bucket_permission.py index 2b0a47b0dea84fc9685419c0a51238aca45c5139..b983c64179cea9fbfcae79c8050a6f8427e957aa 100644 --- a/app/crud/crud_bucket_permission.py +++ b/app/crud/crud_bucket_permission.py @@ -6,7 +6,7 @@ from sqlalchemy.orm import joinedload from app.crud.crud_bucket import CRUDBucket from app.crud.crud_user import CRUDUser from app.models.bucket_permission import BucketPermission as BucketPermissionDB -from app.schemas.bucket_permission import BucketPermission as BucketPermissionSchema +from app.schemas.bucket_permission import BucketPermissionIn as BucketPermissionSchema from app.schemas.bucket_permission import BucketPermissionParameters as BucketPermissionParametersSchema @@ -98,7 +98,7 @@ class CRUDBucketPermission: ---------- db : sqlalchemy.ext.asyncio.AsyncSession Async database session to perform query on. - permission : app.schemas.bucket_permission.BucketPermission + permission : app.schemas.bucket_permission.BucketPermissionOut The permission to create. Returns ------- @@ -147,7 +147,7 @@ class CRUDBucketPermission: ---------- db : sqlalchemy.ext.asyncio.AsyncSession Async database session to perform query on. - permission : app.schemas.bucket_permission.BucketPermission + permission : app.schemas.bucket_permission.BucketPermissionOut The permission to create. Returns ------- @@ -168,7 +168,7 @@ class CRUDBucketPermission: ---------- db : sqlalchemy.ext.asyncio.AsyncSession Async database session to perform query on. - permission : app.schemas.bucket_permission.BucketPermission + permission : app.schemas.bucket_permission.BucketPermissionOut The permission to update. new_params : app.schemas.bucket_permission.BucketPermissionParameters The parameters which should be updated. diff --git a/app/crud/crud_user.py b/app/crud/crud_user.py index 4ae8eca4acf2d5b7086dfd0b03e5e6ad6ff05245..01244e9c7d546b7b50e5f391b3482a95b268e30b 100644 --- a/app/crud/crud_user.py +++ b/app/crud/crud_user.py @@ -46,3 +46,23 @@ class CRUDUser: """ stmt = select(User).where(User.uid == uid) return (await db.execute(stmt)).scalar() + + @staticmethod + async def search_for_name(db: AsyncSession, name_substring: str) -> list[User]: + """ + Search for users that contain a specific substring in their name. + + Parameters + ---------- + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. + name_substring : str + Substring to search for in the name of a user. + + Returns + ------- + users : list[app.models.user.User] + List of users which have the given substring in their name. + """ + stmt = select(User).where(User.display_name.contains(name_substring)) + return (await db.execute(stmt)).scalars().all() diff --git a/app/main.py b/app/main.py index 59d3135840a832a943f4945da3a172899a5c293f..aa2ede0ce39deba9c0e9cb95a64ab614d6a49f4e 100644 --- a/app/main.py +++ b/app/main.py @@ -7,6 +7,7 @@ from fastapi.routing import APIRoute from starlette.middleware.sessions import SessionMiddleware from app.api.api import api_router +from app.api.endpoints.login import LoginException, login_exception_handler from app.api.miscellaneous_endpoints import miscellaneous_router from app.core.config import settings @@ -49,6 +50,7 @@ app.add_middleware(GZipMiddleware, minimum_size=500) # Include all routes app.include_router(api_router) app.include_router(miscellaneous_router) +app.add_exception_handler(LoginException, login_exception_handler) app.add_middleware(SessionMiddleware, secret_key=settings.SECRET_KEY) diff --git a/app/models/user.py b/app/models/user.py index b32f8d939017f69224dec5a4b0f3289f7dda0675..cebd54af3bdbcbbcac54ae6a631a085c1004ccb6 100644 --- a/app/models/user.py +++ b/app/models/user.py @@ -17,7 +17,7 @@ class User(Base): __tablename__: str = "user" uid: str = Column(String(64), primary_key=True, index=True, unique=True) - display_name: str | None = Column(String(256), nullable=True) + display_name: str = Column(String(256), nullable=False) buckets: list["Bucket"] = relationship("Bucket", back_populates="owner") permissions: list["BucketPermission"] = relationship("BucketPermission", back_populates="grantee") diff --git a/app/schemas/bucket.py b/app/schemas/bucket.py index 7f1109e1c1cce4641cc4950faad164f509cae0d4..01fd83fd646b335eec70e8a6f3471eb3f5346258 100644 --- a/app/schemas/bucket.py +++ b/app/schemas/bucket.py @@ -51,6 +51,8 @@ class BucketOut(_BaseBucket): description="Time when the bucket was created", ) owner: str = Field(..., description="UID of the owner", example="28c5353b8bb34984a8bd4169ba94c606") + num_objects: int = Field(..., description="Number of Objects in this bucket", example=6) + size: int = Field(..., description="Total size of objects in this bucket in bytes", example=3256216) class Config: orm_mode = True @@ -73,6 +75,7 @@ class S3ObjectMetaInformation(BaseModel): example="test-bucket", max_length=256, ) + content_type: str = Field(..., description="MIME type of the object", example="text/plain") size: int = Field(..., description="Size of the object in Bytes", example=123456) last_modified: datetime = Field( ..., @@ -96,5 +99,9 @@ class S3ObjectMetaInformation(BaseModel): Converted S3objectMetaInformation. """ return S3ObjectMetaInformation( - key=obj.key, bucket=obj.bucket_name, size=obj.size, last_modified=obj.last_modified + key=obj.key, + bucket=obj.bucket_name, + size=obj.size, + last_modified=obj.last_modified, + content_type=obj.Object().content_type, ) diff --git a/app/schemas/bucket_permission.py b/app/schemas/bucket_permission.py index 4378ac0a4929f5bad34ed947281557345a5424fb..1af02fae5d2daf4a56961250ef2ae6b7f6db5523 100644 --- a/app/schemas/bucket_permission.py +++ b/app/schemas/bucket_permission.py @@ -23,40 +23,10 @@ class BucketPermissionParameters(BaseModel): permission: PermissionEnum | str = Field(PermissionEnum.READ, description="Permission", example=PermissionEnum.READ) -class BucketPermission(BucketPermissionParameters): - """ - Schema for the bucket permissions. - """ - +class BucketPermissionIn(BucketPermissionParameters): uid: str = Field(..., description="UID of the grantee", example="28c5353b8bb34984a8bd4169ba94c606") bucket_name: str = Field(..., description="Name of Bucket", example="test-bucket") - @staticmethod - def from_db_model(permission: BucketPermissionDB, uid: str | None = None) -> "BucketPermission": - """ - Create a bucket permission schema from the database model. - - Parameters - ---------- - permission : app.models.bucket_permission.BucketPermission - DB model for the permission. - uid : str | None, default None - Sets the uid in the schema. If None it will be taken from the database model. - - Returns - ------- - permission_schema : app.schemas.bucket_permission.BucketPermission - Schema populated with the values from the database model. - """ - return BucketPermission( - uid=uid if uid else permission.grantee.uid, - bucket_name=permission.bucket_name, - from_timestamp=permission.from_, - to_timestamp=permission.to, - file_prefix=permission.file_prefix, - permission=permission.permissions, - ) - def to_hash(self, user_id: str) -> str: """ Combine the bucket name and user id and produce the MD5 hash of it. @@ -127,3 +97,42 @@ class BucketPermission(BucketPermissionParameters): if len(obj_policy["Condition"]) == 0: del obj_policy["Condition"] return [obj_policy] if self.permission == PermissionEnum.WRITE else [obj_policy, bucket_policy] + + +class BucketPermissionOut(BucketPermissionIn): + """ + Schema for the bucket permissions. + """ + + grantee_display_name: str = Field(..., description="Display Name of the grantee", example="Bilbo Baggins") + + @staticmethod + def from_db_model( + permission: BucketPermissionDB, uid: str | None = None, grantee_display_name: str | None = None + ) -> "BucketPermissionOut": + """ + Create a bucket permission schema from the database model. + + Parameters + ---------- + permission : app.models.bucket_permission.BucketPermission + DB model for the permission. + uid : str | None, default None + Sets the uid in the schema. If None it will be taken from the database model. + grantee_display_name: str | None, default None + Sets the display name of the grantee in the schema. If None it will be taken from the database model. + + Returns + ------- + permission_schema : app.schemas.bucket_permission.BucketPermissionOut + Schema populated with the values from the database model. + """ + return BucketPermissionOut( + uid=uid if uid else permission.grantee.uid, + grantee_display_name=grantee_display_name if grantee_display_name else permission.grantee.display_name, + bucket_name=permission.bucket_name, + from_timestamp=permission.from_, + to_timestamp=permission.to, + file_prefix=permission.file_prefix, + permission=permission.permissions, + ) diff --git a/app/tests/api/test_bucket_permissions.py b/app/tests/api/test_bucket_permissions.py index 261fa86cdb93ff06daab2c66bf8e3fe12cff493d..f13b4af39279055e2ea0ce1cdbd5690c6a31210f 100644 --- a/app/tests/api/test_bucket_permissions.py +++ b/app/tests/api/test_bucket_permissions.py @@ -9,7 +9,7 @@ from sqlalchemy.ext.asyncio import AsyncSession from app.models.bucket import Bucket from app.models.bucket_permission import PermissionEnum from app.models.user import User -from app.schemas.bucket_permission import BucketPermission as BucketPermissionSchema +from app.schemas.bucket_permission import BucketPermissionIn as BucketPermissionSchema from app.schemas.bucket_permission import BucketPermissionParameters as BucketPermissionParametersSchema from app.tests.utils.bucket import add_permission_for_bucket from app.tests.utils.user import get_authorization_headers @@ -37,7 +37,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. user_token_headers : dict[str,str] HTTP Headers to authorize the request. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ response = await client.get( @@ -68,7 +68,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. user_token_headers : dict[str,str] HTTP Headers to authorize the request. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ response = await client.get( @@ -112,7 +112,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. random_second_user : app.models.user.User Random second user for testing. pytest fixture. @@ -146,7 +146,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): Async database session to perform query on. pytest fixture. client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. random_third_user : app.models.user.User Random third user who has no permissions for the bucket. pytest fixture. @@ -172,7 +172,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. random_second_user : app.models.user.User Random second user for testing. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ user_token_headers = get_authorization_headers(random_second_user.uid) @@ -204,7 +204,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. user_token_headers : dict[str,str] HTTP Headers to authorize the request. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ response = await client.get( @@ -232,7 +232,7 @@ class TestBucketPermissionRoutesGet(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. random_second_user : app.models.user.User Random second user for testing. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ user_token_headers = get_authorization_headers(random_second_user.uid) @@ -302,7 +302,7 @@ class TestBucketPermissionRoutesCreate(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. user_token_headers : dict[str,str] HTTP Headers to authorize the request. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ permission = BucketPermissionSchema( @@ -336,6 +336,7 @@ class TestBucketPermissionRoutesCreate(_TestBucketPermissionRoutes): created_permission = response.json() assert created_permission["uid"] == random_second_user.uid assert created_permission["bucket_name"] == random_bucket.name + assert created_permission["grantee_display_name"] == random_second_user.display_name class TestBucketPermissionRoutesDelete(_TestBucketPermissionRoutes): @@ -355,7 +356,7 @@ class TestBucketPermissionRoutesDelete(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. user_token_headers : dict[str,str] HTTP Headers to authorize the request. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ response = await client.delete( @@ -377,7 +378,7 @@ class TestBucketPermissionRoutesDelete(_TestBucketPermissionRoutes): HTTP Client to perform the request on. pytest fixture. random_second_user : app.models.user.User Random second user for testing. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ user_token_headers = get_authorization_headers(random_second_user.uid) @@ -401,7 +402,7 @@ class TestBucketPermissionRoutesDelete(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ response = await client.delete( @@ -449,7 +450,7 @@ class TestBucketPermissionRoutesDelete(_TestBucketPermissionRoutes): Async database session to perform query on. pytest fixture. client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. random_third_user : app.models.user.User Random third user who has no permissions for the bucket. pytest fixture. @@ -478,7 +479,7 @@ class TestBucketPermissionRoutesUpdate(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ new_from_time = datetime(2022, 1, 1, 0, 0) @@ -517,7 +518,7 @@ class TestBucketPermissionRoutesUpdate(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ new_params = BucketPermissionParametersSchema( @@ -569,7 +570,7 @@ class TestBucketPermissionRoutesUpdate(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. random_second_user : app.models.user.User Random second user for testing. pytest fixture. @@ -597,7 +598,7 @@ class TestBucketPermissionRoutesUpdate(_TestBucketPermissionRoutes): ---------- client : httpx.AsyncClient HTTP Client to perform the request on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. random_third_user : app.models.user.User Random second user for testing. pytest fixture. diff --git a/app/tests/api/test_login.py b/app/tests/api/test_login.py index 6b7532a759d85b3972a3475e6288135747d45eb7..1ac4e480838875ab10a902c36137a1f9742c9526 100644 --- a/app/tests/api/test_login.py +++ b/app/tests/api/test_login.py @@ -66,6 +66,26 @@ class TestLoginRoute: claim = decode_token(right_header.split("=")[1]) assert claim["sub"] == random_user.uid + @pytest.mark.asyncio + async def test_login_with_error(self, client: AsyncClient) -> None: + """ + Test for login callback route with an existing user. + + Parameters + ---------- + client : httpx.AsyncClient + HTTP Client to perform the request on. pytest fixture. + """ + r = await client.get( + self.login_path + "callback", + params={"voperson_id": "", "name": "", "error": True}, + follow_redirects=False, + ) + assert r.status_code == status.HTTP_302_FOUND + assert "set-cookie" in r.headers.keys() + assert find_cookie(searched_cookie_name="bearer", cookie_header=r.headers["set-cookie"]) is None + assert r.headers["location"].startswith("/?login_error") + @pytest.mark.asyncio async def test_successful_login_with_non_existing_user( self, client: AsyncClient, mock_rgw_admin: MockRGWAdmin, db: AsyncSession @@ -92,14 +112,9 @@ class TestLoginRoute: # Check response and valid/right jwt token assert r.status_code == status.HTTP_302_FOUND assert "set-cookie" in r.headers.keys() - cookie_header = r.headers["set-cookie"] - right_header = None - for t in cookie_header.split(";"): - if t.startswith("bearer"): - right_header = t - break - assert right_header - claim = decode_token(right_header.split("=")[1]) + cookie = find_cookie(searched_cookie_name="bearer", cookie_header=r.headers["set-cookie"]) + assert cookie is not None + claim = decode_token(cookie.split("=")[1]) assert claim["sub"] == uid # Check that user is created in RGW @@ -114,3 +129,10 @@ class TestLoginRoute: await db.delete(db_user) await db.commit() mock_rgw_admin.delete_user(uid) + + +def find_cookie(searched_cookie_name: str, cookie_header: str) -> str | None: + for cookie in cookie_header.split(";"): + if cookie.startswith(searched_cookie_name): + return cookie + return None diff --git a/app/tests/api/test_s3_keys.py b/app/tests/api/test_s3_keys.py index 538063a1c22c11ecf7022146122475468cb908d9..e2148dbe158554bc7de2b6b371be8a672f52f4df 100644 --- a/app/tests/api/test_s3_keys.py +++ b/app/tests/api/test_s3_keys.py @@ -154,7 +154,33 @@ class TestS3KeyRoutesDelete(_TestS3KeyRoutes): assert len(mock_rgw_admin.get_user(uid=random_user.uid)["keys"]) == 1 @pytest.mark.asyncio - async def test_delete_unknown_s3_key_for_user(self, client: AsyncClient, random_user: User) -> None: + async def test_delete_last_s3_key_for_user( + self, client: AsyncClient, random_user: User, mock_rgw_admin: MockRGWAdmin + ) -> None: + """ + Test for deleting the last S3 key from a user. + + Parameters + ---------- + client : httpx.AsyncClient + HTTP Client to perform the request on. pytest fixture. + random_user : app.models.user.User + Random user for testing. pytest fixture. + mock_rgw_admin : app.tests.mocks.mock_rgw_admin.MockRGWAdmin + Mock class for rgwadmin package. pytest fixture. + """ + headers = get_authorization_headers(random_user.uid) + assert len(mock_rgw_admin.get_user(uid=random_user.uid)["keys"]) == 1 + key_id = mock_rgw_admin.get_user(uid=random_user.uid)["keys"][0] + response = await client.delete(f"{self.base_path}{random_user.uid}/keys/{key_id}", headers=headers) + + assert response.status_code == status.HTTP_400_BAD_REQUEST + assert len(mock_rgw_admin.get_user(uid=random_user.uid)["keys"]) == 1 + + @pytest.mark.asyncio + async def test_delete_unknown_s3_key_for_user( + self, client: AsyncClient, random_user: User, mock_rgw_admin: MockRGWAdmin + ) -> None: """ Test for deleting an unknown S3 key from a user. @@ -164,7 +190,10 @@ class TestS3KeyRoutesDelete(_TestS3KeyRoutes): HTTP Client to perform the request on. pytest fixture. random_user : app.models.user.User Random user for testing. pytest fixture. + mock_rgw_admin : app.tests.mocks.mock_rgw_admin.MockRGWAdmin + Mock class for rgwadmin package. pytest fixture. """ headers = get_authorization_headers(random_user.uid) + mock_rgw_admin.create_key(uid=random_user.uid) response = await client.delete(f"{self.base_path}{random_user.uid}/keys/impossible", headers=headers) assert response.status_code == status.HTTP_404_NOT_FOUND diff --git a/app/tests/api/test_users.py b/app/tests/api/test_users.py index 8611742a8e1bf20bd4f43931e5a585e7aebb9e0c..4ab0399647374feb6ddd4ef2c39d94d5a4fbf3b4 100644 --- a/app/tests/api/test_users.py +++ b/app/tests/api/test_users.py @@ -1,3 +1,5 @@ +import random + import pytest from fastapi import status from httpx import AsyncClient @@ -88,3 +90,31 @@ class TestUserRoutesGet(_TestUserRoutes): response = await client.get(f"{self.base_path}{random_second_user.uid}", headers=user_token_headers) assert response.status_code == status.HTTP_403_FORBIDDEN + + @pytest.mark.asyncio + async def test_search_user_by_name_substring( + self, client: AsyncClient, random_user: User, user_token_headers: dict[str, str] + ) -> None: + """ + Test for searching a user by its name + + Parameters + ---------- + client : httpx.AsyncClient + HTTP Client to perform the request on. pytest fixture. + random_user : app.models.user.User + Random user for testing. pytest fixture. + """ + substring_indices = [0, 0] + while substring_indices[1] - substring_indices[0] < 3: + substring_indices = sorted(random.choices(range(len(random_user.display_name)), k=2)) + + random_substring = random_user.display_name[substring_indices[0] : substring_indices[1]] + + response = await client.get( + f"{self.base_path}", params={"name_like": random_substring}, headers=user_token_headers + ) + users = response.json() + assert response.status_code == status.HTTP_200_OK + assert len(users) > 0 + assert sum(1 for u in users if u["uid"] == random_user.uid) == 1 diff --git a/app/tests/conftest.py b/app/tests/conftest.py index e975fd46d243ba744ba5c9890188f32104036faf..a038ade1a8d2389dd0bcee9a4912243920773124 100644 --- a/app/tests/conftest.py +++ b/app/tests/conftest.py @@ -7,13 +7,13 @@ import pytest_asyncio from httpx import AsyncClient from sqlalchemy.ext.asyncio import AsyncSession -from app.api.dependencies import get_rgw_admin, get_s3_resource, get_userinfo_from_access_token +from app.api.dependencies import LoginException, get_rgw_admin, get_s3_resource, get_userinfo_from_access_token from app.db.session import SessionAsync as Session from app.main import app from app.models.bucket import Bucket from app.models.bucket_permission import BucketPermission as BucketPermissionDB from app.models.user import User -from app.schemas.bucket_permission import BucketPermission as BucketPermissionSchema +from app.schemas.bucket_permission import BucketPermissionOut as BucketPermissionSchema from app.tests.mocks.mock_rgw_admin import MockRGWAdmin from app.tests.mocks.mock_s3_resource import MockS3ServiceResource from app.tests.utils.bucket import create_random_bucket @@ -59,7 +59,9 @@ async def client(mock_rgw_admin: MockRGWAdmin, mock_s3_service: MockS3ServiceRes def get_mock_s3() -> MockS3ServiceResource: return mock_s3_service - def get_mock_userinfo(voperson_id: str, name: str) -> dict[str, str]: + def get_mock_userinfo(voperson_id: str, name: str, error: bool = False) -> dict[str, str]: + if error: + raise LoginException(error_source="mock_error") return {"voperson_id": voperson_id + "@lifescience-ri.eu", "name": name} app.dependency_overrides[get_rgw_admin] = get_mock_rgw diff --git a/app/tests/crud/test_bucket_permission.py b/app/tests/crud/test_bucket_permission.py index d58307ebaa5da519438412c578dc1eb2661be29c..75099b7aaf5d528050153dcd45a07e69e6fec7fa 100644 --- a/app/tests/crud/test_bucket_permission.py +++ b/app/tests/crud/test_bucket_permission.py @@ -10,7 +10,7 @@ from app.models.bucket import Bucket from app.models.bucket_permission import BucketPermission as BucketPermissionDB from app.models.bucket_permission import PermissionEnum from app.models.user import User -from app.schemas.bucket_permission import BucketPermission as BucketPermissionSchema +from app.schemas.bucket_permission import BucketPermissionIn as BucketPermissionSchema from app.schemas.bucket_permission import BucketPermissionParameters as BucketPermissionParametersSchema @@ -132,7 +132,7 @@ class TestBucketPermissionCRUDCreate: ---------- db : sqlalchemy.ext.asyncio.AsyncSession. Async database session to perform query on. pytest fixture. - random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermission + random_bucket_permission_schema : app.schemas.bucket_permission.BucketPermissionOut Bucket permission for a random bucket for testing. pytest fixture. """ permission = BucketPermissionSchema( diff --git a/app/tests/crud/test_user.py b/app/tests/crud/test_user.py index 46d83dda670099faad10eaa5e6bc4afb221c87ca..9166dda5300a0f3761cc97996b7dbf45b5028e3e 100644 --- a/app/tests/crud/test_user.py +++ b/app/tests/crud/test_user.py @@ -1,3 +1,5 @@ +import random + import pytest from sqlalchemy.ext.asyncio import AsyncSession from sqlalchemy.future import select @@ -46,7 +48,10 @@ class TestUserCRUD: assert random_user.display_name == user.display_name @pytest.mark.asyncio - async def test_get_unknown_user_by_id(self, db: AsyncSession) -> None: + async def test_get_unknown_user_by_id( + self, + db: AsyncSession, + ) -> None: """ Test for getting an unknown user by id from the User CRUD Repository. @@ -57,3 +62,39 @@ class TestUserCRUD: """ user = await CRUDUser.get(db, random_lower_string(length=16)) assert user is None + + @pytest.mark.asyncio + async def test_search_successful_user_by_name(self, db: AsyncSession, random_user: User) -> None: + """ + Test for searching a user by a substring of his name in the User CRUD Repository. + + Parameters + ---------- + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. pytest fixture. + random_user : app.models.user.User + Random user for testing. pytest fixture. + """ + substring_indices = [0, 0] + while substring_indices[0] == substring_indices[1]: + substring_indices = sorted(random.choices(range(len(random_user.display_name)), k=2)) + + random_substring = random_user.display_name[substring_indices[0] : substring_indices[1]] + users = await CRUDUser.search_for_name(db, random_substring) + assert len(users) > 0 + assert sum(1 for u in users if u.uid == random_user.uid) == 1 + + @pytest.mark.asyncio + async def test_search_non_existing_user_by_name(self, db: AsyncSession, random_user: User) -> None: + """ + Test for searching a non-existing user by a substring of his name in the User CRUD Repository. + + Parameters + ---------- + db : sqlalchemy.ext.asyncio.AsyncSession. + Async database session to perform query on. pytest fixture. + random_user : app.models.user.User + Random user for testing. pytest fixture. + """ + users = await CRUDUser.search_for_name(db, 2 * random_user.display_name) + assert sum(1 for u in users if u.uid == random_user.uid) == 0 diff --git a/app/tests/mocks/mock_s3_resource.py b/app/tests/mocks/mock_s3_resource.py index a1de1b9c63ed15068362dcd856241369d376340e..3561daaabdd68f2d5994882208f499fe7d894816 100644 --- a/app/tests/mocks/mock_s3_resource.py +++ b/app/tests/mocks/mock_s3_resource.py @@ -3,9 +3,45 @@ from datetime import datetime from botocore.exceptions import ClientError +class MockS3Object: + """ + Mock S3 object for the boto3 S3Object for testing purposes. + + Attributes + ---------- + key : str + Key of the S3 object. + bucket_name : str + Name of the corresponding bucket. + """ + + def __init__(self, bucket_name: str, key: str) -> None: + """ + Initialize a MockS3Object. + + Parameters + ---------- + bucket_name : str + Name of the corresponding bucket. + key : str + Key of the S3 object. + """ + self.key = key + self.bucket_name = bucket_name + self.content_type = "text/plain" + + def __repr__(self) -> str: + return f"MockS3Object(key={self.key}, bucket={self.bucket_name})" + + class MockS3ObjectSummary: """ - Mock S3 object for the boto3 S3ObjectSummary for testing purposes. + Mock S3 object summary for the boto3 S3ObjectSummary for testing purposes. + + Functions + --------- + Object() -> MockS3Object + Save a new bucket policy. Attributes ---------- @@ -38,6 +74,17 @@ class MockS3ObjectSummary: def __repr__(self) -> str: return f"MockS3ObjectSummary(key={self.key}, bucket={self.bucket_name})" + def Object(self) -> MockS3Object: + """ + Get the S3 Object from the summary. + + Returns + ------- + sObject : app.tests.mocks.mock_s3_resource.MockS3Object + The corresponding S3Object. + """ + return MockS3Object(self.bucket_name, self.key) + class MockS3BucketPolicy: """ diff --git a/app/tests/unit/test_bucket_permission_scheme.py b/app/tests/unit/test_bucket_permission_scheme.py index b0d237752806e07b0cd3afb9754acd0c06bc8c77..817b149361d82b8b1bdc373c59292400eaa64dae 100644 --- a/app/tests/unit/test_bucket_permission_scheme.py +++ b/app/tests/unit/test_bucket_permission_scheme.py @@ -3,29 +3,29 @@ from datetime import datetime import pytest from app.models.bucket_permission import PermissionEnum -from app.schemas.bucket_permission import BucketPermission +from app.schemas.bucket_permission import BucketPermissionIn from app.tests.utils.utils import random_lower_string class _TestPermissionPolicy: @pytest.fixture(scope="function") - def random_base_permission(self) -> BucketPermission: + def random_base_permission(self) -> BucketPermissionIn: """ Generate a base READ bucket permission schema. """ - return BucketPermission( + return BucketPermissionIn( uid=random_lower_string(), bucket_name=random_lower_string(), permission=PermissionEnum.READ ) class TestPermissionPolicyPermissionType(_TestPermissionPolicy): - def test_READ_permission(self, random_base_permission: BucketPermission) -> None: + def test_READ_permission(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a READ Permission into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ uid = random_lower_string() @@ -52,13 +52,13 @@ class TestPermissionPolicyPermissionType(_TestPermissionPolicy): assert len(bucket_stmt["Action"]) == 1 assert bucket_stmt["Action"][0] == "s3:ListBucket" - def test_WRITE_permission(self, random_base_permission: BucketPermission) -> None: + def test_WRITE_permission(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a WRITE Permission into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ random_base_permission.permission = PermissionEnum.WRITE @@ -72,13 +72,13 @@ class TestPermissionPolicyPermissionType(_TestPermissionPolicy): assert "s3:PutObject" in object_stmt["Action"] assert "s3:DeleteObject" in object_stmt["Action"] - def test_READWRITE_permission(self, random_base_permission: BucketPermission) -> None: + def test_READWRITE_permission(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a READWRITE Permission into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ random_base_permission.permission = PermissionEnum.READWRITE @@ -101,13 +101,13 @@ class TestPermissionPolicyPermissionType(_TestPermissionPolicy): class TestPermissionPolicyCondition(_TestPermissionPolicy): - def test_to_timestamp_condition(self, random_base_permission: BucketPermission) -> None: + def test_to_timestamp_condition(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a READ Permission with end time condition into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ time = datetime.now() @@ -128,13 +128,13 @@ class TestPermissionPolicyCondition(_TestPermissionPolicy): with pytest.raises(KeyError): assert bucket_stmt["Condition"]["DateGreaterThan"] - def test_from_timestamp_condition(self, random_base_permission: BucketPermission) -> None: + def test_from_timestamp_condition(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a READ Permission with start time condition into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ time = datetime.now() @@ -155,13 +155,13 @@ class TestPermissionPolicyCondition(_TestPermissionPolicy): with pytest.raises(KeyError): assert bucket_stmt["Condition"]["DateLessThan"] - def test_file_prefix_condition(self, random_base_permission: BucketPermission) -> None: + def test_file_prefix_condition(self, random_base_permission: BucketPermissionIn) -> None: """ Test for converting a READ Permission with file prefix condition into a bucket policy statement. Parameters ---------- - random_base_permission : app.schemas.bucket_permission.BucketPermission + random_base_permission : app.schemas.bucket_permission.BucketPermissionOut Random base bucket permission for testing. pytest fixture. """ random_base_permission.file_prefix = random_lower_string(length=8) + "/" + random_lower_string(length=8) + "/" diff --git a/requirements-dev.txt b/requirements-dev.txt index abaace2b4f54833c12926357630abb9b01bd9bea..9ee5b04147344ef7f7a2644d3cb6e328e4ab1b7a 100644 --- a/requirements-dev.txt +++ b/requirements-dev.txt @@ -1,18 +1,18 @@ # test packages -pytest>=7.1.0,<7.2.0 -pytest-asyncio>=0.18.0,<0.19.0 -pytest-cov>=3.0.0,<3.1.0 -coverage[toml]>=6.4.0,<6.5.0 +pytest>=7.2.0,<7.3.0 +pytest-asyncio>=0.20.0,<0.21.0 +pytest-cov>=4.0.0,<4.1.0 +coverage[toml]>=6.5.0,<6.6.0 # Linters -flake8>=4.0.0,<4.1.0 -autoflake>=1.4.0,<1.5.0 -black>=22.3.0,<22.4.0 +flake8>=5.0.0,<5.1.0 +autoflake>=1.7.0,<1.8.0 +black>=22.10.0,<22.11.0 isort>=5.10.0,<5.11.0 -mypy>=0.960,<0.970 +mypy>=0.990,<0.999 # stubs for mypy -boto3-stubs-lite[s3]>=1.24.0,<1.25.0 +boto3-stubs-lite[s3]>=1.26.0,<1.27.0 sqlalchemy2-stubs types-requests # Miscellaneous -pre-commit>=2.19.0,<2.20.0 +pre-commit>=2.20.0,<2.21.0 python-dotenv diff --git a/requirements.txt b/requirements.txt index 479abb18700bd0e22e366a663be00acbd292388f..6b971d09cda581e1ffc33fa2b30a881f3d7b9947 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,19 +1,19 @@ # Webserver packages -anyio>=3.5.0,<3.6.0 -fastapi>=0.79.0,<0.80.0 +anyio>=3.6.0,<3.7.0 +fastapi>=0.87.0,<0.88.0 pydantic>=1.9.0,<2.0.0 -uvicorn>=0.17.0,<0.18.0 +uvicorn>=0.19.0,<0.20.0 # Database packages PyMySQL>=1.0.2,<1.1.0 SQLAlchemy>=1.4.0,<1.5.0 -alembic>=1.7.0,<1.8.0 +alembic>=1.8.0,<1.9.0 aiomysql>=0.1.0,<0.2.0 # Security packages -authlib +authlib>=1.1.0,<1.2.0 # Ceph and S3 packages -boto3>=1.24.0,<1.25.0 +boto3>=1.26.0,<1.27.0 rgwadmin>=2.3.0,<2.4.0 # Miscellaneous -tenacity>=8.0.0,<8.1.0 +tenacity>=8.1.0,<8.2.0 httpx>=0.23.0,<0.24.0 itsdangerous diff --git a/traefik_dev/routes.toml b/traefik_dev/routes.toml index 666c1886a9e84a17746a94405ef094d2bd404046..eee1645616c5e125ab533fadbea1c78ebc6072d3 100644 --- a/traefik_dev/routes.toml +++ b/traefik_dev/routes.toml @@ -3,18 +3,17 @@ [http.middlewares.api-stripprefix.stripPrefix] prefixes = ["/api"] [http.middlewares.cors-header.headers] - accessControlAllowMethods= ["GET", "OPTIONS", "PUT", "POST"] + accessControlAllowMethods= ["GET", "OPTIONS", "PUT", "POST", "DELETE"] accessControlAllowOriginList = ["http://localhost:9999"] - accessControlAllowHeaders = ["amz-sdk-invocation-id","amz-sdk-request","authorization","content-type","x-amz-content-sha256","x-amz-date","x-amz-user-agent"] + accessControlAllowHeaders = ["amz-sdk-invocation-id","amz-sdk-request","authorization","content-type","x-amz-content-sha256","x-amz-copy-source","x-amz-date","x-amz-user-agent", "content-md5"] accessControlExposeHeaders = ["Etag"] accessControlMaxAge = 100 addVaryHeader = true isDevelopment = true - [http.middlewares.testHeader.headers.customRequestHeaders] - X-Script-Name = "test" # Adds + [http.middlewares.cors-header.headers.customResponseHeaders] + Content-Disposition = "attachment" [http.routers] - [http.routers.api-http] entryPoints = ["http"] service = "proxyapi" @@ -31,7 +30,6 @@ rule = "!PathPrefix(`/api`)" [http.services] - [http.services.proxyapi] [http.services.proxyapi.loadBalancer] [[http.services.proxyapi.loadBalancer.servers]] @@ -44,4 +42,8 @@ [http.services.rgw] [http.services.rgw.loadBalancer] [[http.services.rgw.loadBalancer.servers]] - url = "http://192.168.192.102:8000" + url = "http://192.168.192.102:8000/" + [[http.services.rgw.loadBalancer.servers]] + url = "http://192.168.192.118:8000/" + [http.services.rgw.loadBalancer.healthCheck] + path = "/"