lib/conjur/base.rb in conjur-api-4.13.0 vs lib/conjur/base.rb in conjur-api-4.14.0
- old
+ new
@@ -20,12 +20,10 @@
#
require 'rest-client'
require 'json'
require 'base64'
-require 'conjur/patches/rest-client'
-
require 'conjur/exists'
require 'conjur/has_attributes'
require 'conjur/has_owner'
require 'conjur/path_based'
require 'conjur/escape'
@@ -33,17 +31,45 @@
require 'conjur/log_source'
require 'conjur/standard_methods'
require 'conjur/cast'
module Conjur
+ # NOTE: You have to put all 'class level' api docs here, because YARD is stoopid :-(
+
+ # This class provides access to Conjur services
+ # **TODO MOAR**
+ #
+ # # Conjur Services
+ #
+ # ### Public Keys Service
+ # The {http://developer.conjur.net/reference/services/pubkeys Conjur Public Keys} service provides a
+ # simple database of public keys with access controlled by Conjur. Reading a user's public keys requires
+ # no authentication at all -- the user's public keys are public information, after all.
+ #
+ # Adding or deleting a public key may only be done if you have permission to update the *public keys
+ # resource*, which is created when the appliance is launched, and has a resource id
+ # `'<organizational account>:service:pubkeys-1.0/public-keys'`. The appliance also comes with a Group named
+ # `'pubkeys-1.0/key-managers'` that has this permission. Rather than granting each user permission to
+ # modify the public keys database, you should consider adding users to this group.
+ #
+ # A very common use case is {http://developer.conjur.net/tutorials/ssh public key management for SSH}
+ #
+ #
+ # ### Audit Service
+ #
+ # The {http://developer.conjur.net/reference/services/audit Conjur Audit Service} allows you to
+ # fetch audit records.
+ #
+ # Generally you will need to have *at least one* privilege on the subject of an event in order to see it.
class API
include Escape
include LogSource
include StandardMethods
include Cast
class << self
+ # @api private
# Parse a role id into [ account, 'roles', kind, id ]
def parse_role_id(id)
id = id.role if id.respond_to?(:role)
if id.is_a?(Role)
[ id.account, 'roles', id.kind, id.identifier ]
@@ -52,10 +78,11 @@
else
parse_id id, 'roles'
end
end
+ # @api private
# Parse a resource id into [ account, 'resources', kind, id ]
def parse_resource_id(id)
id = id.resource if id.respond_to?(:resource)
if id.is_a?(Resource)
[ id.account, 'resources', id.kind, id.identifier ]
@@ -64,11 +91,12 @@
else
parse_id id, 'resources'
end
end
- # Converts flat id into path components, with mixed-in "super-kind"
+ # @api private
+ # Converts flat id into path components, with mixed-in "super-kind"
# (not that kind which is part of id)
# NOTE: name is a bit confusing, as result of 'parse' is just recombined
# representation of parts, not an object of higher abstraction level
def parse_id(id, kind)
# Structured IDs (hashes) are no more supported
@@ -81,32 +109,91 @@
end
# I would strongly recommend to encapsulate this into object
[ paths[0], kind, paths[1], paths[2..-1].join(':') ]
end
+
+ # Create a new {Conjur::API} instance from a username and a password or api key.
+ #
+ # @example Create an API with valid credentials
+ # api = Conjur::API.new_from_key 'admin', '<admin password>'
+ # api.current_role # => 'conjur:user:admin'
+ # api.token['data'] # => 'admin'
+ #
+ # @example Authentication is lazy
+ # api = Conjur::API.new_from_key 'admin', 'wrongpassword' # succeeds
+ # api.user 'foo' # raises a 401 error
+ #
+ # @param [String] username the username to use when making authenticated requests.
+ # @param [Sring] api_key the api key or password for `username`
+ # @return [Conjur::API] an api that will authenticate with the given username and api key.
def new_from_key(username, api_key)
self.new username, api_key, nil
end
+
+ # Create a new {Conjur::API} instance from a token issued by the
+ # {http://developer.conjur.net/reference/services/authentication Conjur authentication service}
+ #
+ # Generally, you will have a Conjur identitiy (username and api key), and create an {Conjur::API} instance
+ # for the identity using {.new_from_key}. This method is useful when you are performing authorization checks
+ # given a token. For example, a Conjur gateway that requires you to prove that you can 'read' a resource named
+ # 'super-secret' might get the token from a request header, create an {Conjur::API} instance with this method,
+ # and use {Conjur::Resource#permitted?} to decide whether to accept and forward the request.
+ #
+ # Note that Conjur tokens are issued as JSON. This method expects to get the token as a parsed JSON Hash.
+ # When sending tokens as headers, you will normally use base64 encoded strings. Authorization headers
+ # used by Conjur have the form `'Token token="#{b64encode token.to_json}"'`, but this format is in no way
+ # required.
+ #
+ # @example A simple gatekeeper
+ # RESOURCE_NAME = 'protected-service'
+ #
+ # def handle_request request
+ # token_header = request.header 'X-Conjur-Token'
+ # token = JSON.parse Base64.b64decode(token_header)
+ #
+ # api = Conjur::API.new_from_token token
+ # raise Forbidden unless api.resource(RESOURCE_NAME).permitted? 'read'
+ #
+ # proxy_to_service request
+ # end
+ #
+ # @param [Hash] token the authentication token as parsed JSON to use when making authenticated requests
+ # @return [Conjur::API] an api that will authenticate with the token
def new_from_token(token)
self.new nil, nil, token
end
end
+ # Create a new instance from a username and api key or a token.
+ #
+ # @note You should use {Conjur::API.new_from_token} or {Conjur::API.new_from_key} instead of calling this method
+ # directly.
+ #
+ # This method requires that you pass **either** a username and api_key **or** a token Hash.
+ #
+ # @param [String] username the username to authenticate as
+ # @param [String] api_key the api key or password to use when authenticating
+ # @param [Hash] token the token to use when making authenticated requuests.
+ #
+ # @api internal
def initialize username, api_key, token
@username = username
@api_key = api_key
@token = token
raise "Expecting ( username and api_key ) or token" unless ( username && api_key ) || token
end
- attr_reader :api_key, :username
-
+ attr_reader :api_key
+
+ #
def username
@username || @token['data']
end
-
+
+
def host
self.class.host
end
def token