summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGage Hugo <gagehugo@gmail.com>2019-12-13 14:25:28 -0600
committerGage Hugo <gagehugo@gmail.com>2020-02-04 17:05:02 +0000
commitb33f71e21f1b17fff6b8f34e595ca8ef093acda4 (patch)
tree389f3231f7bacbb59d2d715f3719b4d947f6aa82
parent200dda218de19c19ee1f5d1a735da7e0a4fc7db5 (diff)
downloadkeystone-b33f71e21f1b17fff6b8f34e595ca8ef093acda4.tar.gz
Always have username in CADF initiator
The current initiator object for CADF notifications does not include the username of the user who initiated the action, which leads to issues when using an LDAP backend and not having a direct way to map a username to a user id. This change makes it so that the initiator object for CADF notifications always contains the username for a user as well as the user id. This follows along with the CADF standard for OpenStack[0]. [0] https://www.dmtf.org/sites/default/files/standards/documents/DSP2038_1.1.0.pdf#page=12 Closes-Bug: #1856904 Change-Id: I833e6e0d7792acf49f816050ad7a63e8ea4f702f (cherry picked from commit 95edaaab06c6da761411ef97bc2545d86d579215)
-rw-r--r--keystone/notifications.py18
-rw-r--r--keystone/tests/unit/common/test_notifications.py13
-rw-r--r--releasenotes/notes/bug-1856904-101af15bb48eb3ca.yaml9
3 files changed, 39 insertions, 1 deletions
diff --git a/keystone/notifications.py b/keystone/notifications.py
index 62d065a1c..9b83716ac 100644
--- a/keystone/notifications.py
+++ b/keystone/notifications.py
@@ -70,6 +70,7 @@ SAML_AUDIT_TYPE = 'http://docs.oasis-open.org/security/saml/v2.0'
_SUBSCRIBERS = {}
_notifier = None
SERVICE = 'identity'
+PROVIDERS = provider_api.ProviderAPIs
CONF = keystone.conf.CONF
@@ -483,6 +484,7 @@ def _get_request_audit_info(context, user_id=None):
if user_id:
initiator.user_id = user_id
initiator.id = utils.resource_uuid(user_id)
+ initiator = _add_username_to_initiator(initiator)
if project_id:
initiator.project_id = project_id
@@ -519,6 +521,7 @@ class CadfNotificationWrapper(object):
target = resource.Resource(typeURI=taxonomy.ACCOUNT_USER)
initiator = request.audit_initiator
initiator.user_id = user_id
+ initiator = _add_username_to_initiator(initiator)
initiator.id = utils.resource_uuid(user_id)
try:
result = f(wrapped_self, request, user_id, *args, **kwargs)
@@ -721,6 +724,8 @@ def _send_audit_notification(action, initiator, outcome, target,
service_id = i['id']
break
+ initiator = _add_username_to_initiator(initiator)
+
event = eventfactory.EventFactory().new_event(
eventType=cadftype.EVENTTYPE_ACTIVITY,
outcome=outcome,
@@ -778,6 +783,19 @@ def _check_notification_opt_out(event_type, outcome):
return False
+def _add_username_to_initiator(initiator):
+ """Add the username to the initiator if missing."""
+ if hasattr(initiator, 'username'):
+ return initiator
+ try:
+ user_ref = PROVIDERS.identity_api.get_user(initiator.user_id)
+ initiator.username = user_ref['name']
+ except (exception.UserNotFound, AttributeError):
+ # Either user not found or no user_id, move along
+ pass
+
+ return initiator
+
emit_event = CadfNotificationWrapper
diff --git a/keystone/tests/unit/common/test_notifications.py b/keystone/tests/unit/common/test_notifications.py
index 5a5b8d503..86dbc8246 100644
--- a/keystone/tests/unit/common/test_notifications.py
+++ b/keystone/tests/unit/common/test_notifications.py
@@ -1085,7 +1085,7 @@ class CadfNotificationsWrapperTestCase(test_v3.RestfulTestCase):
'typeURI': 'service/security/account/user',
'host': {'address': 'localhost'},
'id': 'openstack:0a90d95d-582c-4efb-9cbc-e2ca7ca9c341',
- 'name': u'bccc2d9bfc2a46fd9e33bcf82f0b5c21'
+ 'username': u'admin'
},
'target': {
'typeURI': 'service/security/account/user',
@@ -1131,6 +1131,17 @@ class CadfNotificationsWrapperTestCase(test_v3.RestfulTestCase):
self.assertEqual(self.user_id, initiator.id)
self.assertEqual(self.user_id, initiator.user_id)
+ def test_initiator_always_contains_username(self):
+ # Clear notifications
+ while self._notifications:
+ self._notifications.pop()
+
+ self.get_scoped_token()
+ self.assertEqual(len(self._notifications), 1)
+ note = self._notifications.pop()
+ initiator = note['initiator']
+ self.assertEqual(self.user['name'], initiator.username)
+
def test_v3_authenticate_user_name_and_domain_id(self):
user_id = self.user_id
user_name = self.user['name']
diff --git a/releasenotes/notes/bug-1856904-101af15bb48eb3ca.yaml b/releasenotes/notes/bug-1856904-101af15bb48eb3ca.yaml
new file mode 100644
index 000000000..634b86a03
--- /dev/null
+++ b/releasenotes/notes/bug-1856904-101af15bb48eb3ca.yaml
@@ -0,0 +1,9 @@
+---
+fixes:
+ - |
+ [`Bug 1856904 <https://bugs.launchpad.net/keystone/+bug/1856904>`_]
+ The initiator object for CADF notifications now will always contain the
+ username for the user who initated the action. Previously, the initator
+ object only contained the user_id, which lead to issues mapping to users
+ when using LDAP-backed identity providers. This also helps the initiator
+ object better conform to the OpenStack standard for CADF.