Merge "Improve is_image_available"
This commit is contained in:
commit
621338e967
@ -22,6 +22,7 @@ from oslo_utils import timeutils
|
||||
from oslo_utils import uuidutils
|
||||
|
||||
from ironic.common import exception
|
||||
from ironic.common import keystone
|
||||
from ironic.conf import CONF
|
||||
|
||||
_IMAGE_ATTRIBUTES = ['size', 'disk_format', 'owner',
|
||||
@ -34,6 +35,7 @@ _IMAGE_ATTRIBUTES = ['size', 'disk_format', 'owner',
|
||||
|
||||
|
||||
LOG = log.getLogger(__name__)
|
||||
_GLANCE_SESSION = None
|
||||
|
||||
|
||||
def _extract_attributes(image):
|
||||
@ -123,28 +125,40 @@ def is_image_available(context, image):
|
||||
This check is needed in case Nova and Glance are deployed
|
||||
without authentication turned on.
|
||||
"""
|
||||
# NOTE: Any support for private/shared images in Ironic requires a secure
|
||||
# way for ironic to know the original requester:
|
||||
# - If we trust node[instance_info][project_id], we are susceptible to a
|
||||
# node.owner stealing another project's private image by lying in
|
||||
# instance_info.
|
||||
# - As of 2025.1, the project_id attached to the auth context at this
|
||||
# point is more likely to be the nova-computes service user rather
|
||||
# than the original requester. This is a missing feature from the
|
||||
# Ironic/Nova virt driver.
|
||||
|
||||
auth_token = getattr(context, 'auth_token', None)
|
||||
conductor_project_id = get_conductor_project_id()
|
||||
image_visibility = getattr(image, 'visibility', None)
|
||||
image_owner = getattr(image, 'owner', None)
|
||||
image_id = getattr(image, 'id', 'unknown')
|
||||
is_admin = 'admin' in getattr(context, 'roles', [])
|
||||
project_id = getattr(context, 'project_id', None)
|
||||
project = getattr(context, 'project', 'unknown')
|
||||
# The presence of an auth token implies this is an authenticated
|
||||
# request and we need not handle the noauth use-case.
|
||||
if auth_token:
|
||||
# If an auth token is present and the config allows access via auth token,
|
||||
# allow image access.
|
||||
if CONF.allow_image_access_via_auth_token and auth_token:
|
||||
# We return true here since we want the *user* request context to
|
||||
# be able to be used.
|
||||
return True
|
||||
|
||||
if image_visibility == 'public':
|
||||
# If the image visibility is public or community, allow access.
|
||||
if image_visibility in ['public', 'community']:
|
||||
return True
|
||||
|
||||
if project_id and image_owner == project_id:
|
||||
return True
|
||||
|
||||
# If the user is an admin and the config allows ignoring project checks for
|
||||
# admin tasks, allow access.
|
||||
if is_admin and CONF.ignore_project_check_for_admin_tasks:
|
||||
return True
|
||||
# If the image is private and the owner is the conductor project,
|
||||
# allow access.
|
||||
if image_visibility == 'private' and image_owner == conductor_project_id:
|
||||
return True
|
||||
|
||||
LOG.info(
|
||||
'Access to %s owned by %s denied to requester %s',
|
||||
@ -167,3 +181,20 @@ def is_glance_image(image_href):
|
||||
return False
|
||||
return (image_href.startswith('glance://')
|
||||
or uuidutils.is_uuid_like(image_href))
|
||||
|
||||
|
||||
def get_conductor_project_id():
|
||||
global _GLANCE_SESSION
|
||||
if not _GLANCE_SESSION:
|
||||
_GLANCE_SESSION = keystone.get_session('glance')
|
||||
session = _GLANCE_SESSION
|
||||
service_auth = keystone.get_auth('glance')
|
||||
|
||||
try:
|
||||
if service_auth and hasattr(service_auth, 'get_project_id'):
|
||||
return service_auth.get_project_id(session)
|
||||
elif hasattr(session, 'get_project_id') and session.auth:
|
||||
return session.get_project_id()
|
||||
except Exception as e:
|
||||
LOG.debug("Error getting conductor project ID: %s", str(e))
|
||||
return None
|
||||
|
@ -69,6 +69,12 @@ api_opts = [
|
||||
default='/etc/ironic/htpasswd',
|
||||
help=_('Path to Apache format user authentication file used '
|
||||
'when auth_strategy=http_basic')),
|
||||
cfg.BoolOpt('allow_image_access_via_auth_token',
|
||||
default=False,
|
||||
deprecated_for_removal=True,
|
||||
help=_('If True, Ironic allows access to Glance images if an '
|
||||
'auth_token is present in the request context.')
|
||||
),
|
||||
cfg.BoolOpt(
|
||||
'ignore_project_check_for_admin_tasks',
|
||||
default=True,
|
||||
|
@ -102,7 +102,8 @@ class TestGlanceImageService(base.TestCase):
|
||||
fixture = {'name': None,
|
||||
'owner': None,
|
||||
'properties': {},
|
||||
'status': "active"}
|
||||
'status': "active",
|
||||
'visibility': "public"}
|
||||
fixture.update(kwargs)
|
||||
return openstack.image.v2.image.Image.new(**fixture)
|
||||
|
||||
@ -146,7 +147,7 @@ class TestGlanceImageService(base.TestCase):
|
||||
'status': "active",
|
||||
'tags': [],
|
||||
'updated_at': None,
|
||||
'visibility': None,
|
||||
'visibility': "public",
|
||||
'os_hash_algo': None,
|
||||
'os_hash_value': None,
|
||||
}
|
||||
@ -188,6 +189,7 @@ class TestGlanceImageService(base.TestCase):
|
||||
|
||||
class MyGlanceStubClient(stubs.StubGlanceClient):
|
||||
"""A client that fails the first time, then succeeds."""
|
||||
|
||||
def get_image(self, image_id):
|
||||
if tries[0] == 0:
|
||||
tries[0] = 1
|
||||
@ -229,10 +231,12 @@ class TestGlanceImageService(base.TestCase):
|
||||
'image contains no data',
|
||||
self.service.download, image_id)
|
||||
|
||||
@mock.patch.object(service_utils, '_GLANCE_SESSION', autospec=True)
|
||||
@mock.patch('os.sendfile', autospec=True)
|
||||
@mock.patch('os.path.getsize', autospec=True)
|
||||
@mock.patch('%s.open' % __name__, new=mock.mock_open(), create=True)
|
||||
def test_download_file_url(self, mock_getsize, mock_sendfile):
|
||||
def test_download_file_url(self, mock_getsize, mock_sendfile,
|
||||
mock_serviceutils_glance):
|
||||
# NOTE: only in v2 API
|
||||
class MyGlanceStubClient(stubs.StubGlanceClient):
|
||||
|
||||
@ -241,8 +245,9 @@ class TestGlanceImageService(base.TestCase):
|
||||
s_tmpfname = '/whatever/source'
|
||||
|
||||
def get_image(self, image_id):
|
||||
direct_url = "file://%s" + self.s_tmpfname
|
||||
return type('GlanceTestDirectUrlMeta', (object,),
|
||||
{'direct_url': 'file://%s' + self.s_tmpfname})
|
||||
dict(visibility='public', direct_url=direct_url))
|
||||
|
||||
stub_context = context.RequestContext(auth_token=True)
|
||||
stub_context.user_id = 'fake'
|
||||
@ -251,6 +256,7 @@ class TestGlanceImageService(base.TestCase):
|
||||
|
||||
stub_service = image_service.GlanceImageService(stub_client,
|
||||
context=stub_context)
|
||||
mock_serviceutils_glance.return_value = stub_service
|
||||
image_id = uuidutils.generate_uuid()
|
||||
|
||||
self.config(allowed_direct_url_schemes=['file'], group='glance')
|
||||
@ -278,6 +284,7 @@ class TestGlanceImageService(base.TestCase):
|
||||
def test_client_forbidden_converts_to_imagenotauthed(self):
|
||||
class MyGlanceStubClient(stubs.StubGlanceClient):
|
||||
"""A client that raises a Forbidden exception."""
|
||||
|
||||
def get_image(self, image_id):
|
||||
raise openstack_exc.ForbiddenException()
|
||||
|
||||
@ -295,6 +302,7 @@ class TestGlanceImageService(base.TestCase):
|
||||
def test_client_notfound_converts_to_imagenotfound(self):
|
||||
class MyGlanceStubClient(stubs.StubGlanceClient):
|
||||
"""A client that raises a NotFound exception."""
|
||||
|
||||
def get_image(self, image_id):
|
||||
raise openstack_exc.NotFoundException()
|
||||
|
||||
@ -995,3 +1003,55 @@ class TestServiceUtils(base.TestCase):
|
||||
self.assertFalse(service_utils.is_glance_image(image_href))
|
||||
image_href = None
|
||||
self.assertFalse(service_utils.is_glance_image(image_href))
|
||||
|
||||
|
||||
class TestIsImageAvailable(base.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestIsImageAvailable, self).setUp()
|
||||
self.image = mock.Mock()
|
||||
self.context = context.RequestContext()
|
||||
self.context.roles = []
|
||||
|
||||
def test_allow_access_via_auth_token_enabled(self):
|
||||
self.context.auth_token = 'fake-token'
|
||||
self.config(allow_image_access_via_auth_token=True)
|
||||
self.assertTrue(service_utils.is_image_available(
|
||||
self.context, self.image))
|
||||
|
||||
def test_allow_public_image(self):
|
||||
self.image.visibility = 'public'
|
||||
self.assertTrue(service_utils.is_image_available(
|
||||
self.context, self.image))
|
||||
|
||||
def test_allow_community_image(self):
|
||||
self.image.visibility = 'community'
|
||||
self.assertTrue(service_utils.is_image_available(
|
||||
self.context, self.image))
|
||||
|
||||
def test_allow_admin_if_config_enabled(self):
|
||||
self.context.roles = ['admin']
|
||||
self.config(ignore_project_check_for_admin_tasks=True)
|
||||
self.assertTrue(service_utils.is_image_available(
|
||||
self.context, self.image))
|
||||
|
||||
def test_allow_private_image_owned_by_conductor(self):
|
||||
self.image.visibility = 'private'
|
||||
self.image.owner = service_utils.get_conductor_project_id()
|
||||
self.assertTrue(service_utils.is_image_available(
|
||||
self.context, self.image))
|
||||
|
||||
def test_deny_private_image_different_owner(self):
|
||||
self.config(allow_image_access_via_auth_token=False)
|
||||
self.config(ignore_project_check_for_admin_tasks=False)
|
||||
|
||||
self.image.visibility = 'private'
|
||||
self.image.owner = 'other-owner'
|
||||
self.image.id = 'fake-id'
|
||||
|
||||
self.context.project = 'test-project'
|
||||
self.context.roles = []
|
||||
self.context.auth_token = None
|
||||
|
||||
result = service_utils.is_image_available(self.context, self.image)
|
||||
self.assertFalse(result)
|
||||
|
@ -0,0 +1,14 @@
|
||||
---
|
||||
features:
|
||||
- |
|
||||
If `allow_image_access_via_auth_token` is set to `True`, Ironic allows access to
|
||||
Glance images if an auth_token is present in the request context.
|
||||
upgrade:
|
||||
- |
|
||||
CONF.allow_image_access_via_auth_token is set to `True` in this Ironic release.
|
||||
OpenStack integrated operators should ensure images for Ironic use are using image
|
||||
visibility "public" or "community" for the most reliable results.
|
||||
deprecation:
|
||||
- |
|
||||
CONF.allow_image_access_via_auth_token is deprecated, and will be removed,
|
||||
along with legacy image access logic, in or after the OpenStack 2026.2 release.
|
Loading…
x
Reference in New Issue
Block a user