A resource policy evaluation library
Project description
resource-policy-evaluation-library
rpe-lib is made up of Policy Engines (rpe.engines.Engine)
, Resources (rpe.resources.Resource)
, and Extractors (rpe.resources.Extractor)
.
Resources
produce details about the current state of a given type of resource. A resource can be just about anything, but the initial goal of the project was to support Google Cloud Platform (GCP) resources. The implemention is intentionally generic to allow support for other resource types
Policy Engines
evaluate Resources
against their configured policies. Given a resource, they can return a list of Evaluations (rpe.policy.Evaluation)
indicating the name of each policy that applies to the resource (by resource type), and whether or not the resource is compliant. Resource
also define a remediate()
function, that should be able to take a dictionary description of how to manipulate a resource to make it compliant.
Extractors
parse structured data and return a list of resources, and optionally metadata about the data source.
As an example, for GCP resources, the remediate()
function expects details about what method to call in the Google REST API for the given resource, and what parameters to pass. So for a Google Cloud Storage Bucket, a policy that enforces bucket versioning could define remediation as a call to the buckets patch()
method with the appropriate arguments to enable versioning.
Policy Engines
There are currently 2 Policy Engines
included with rpe-lib:
Open Policy Agent (opa) Engine
The Open Policy Agent engine uses the Open Policy Agent REST API to evalute policy for a given resource. In order to use this engine, you'll need to run the opa server with the rpe-lib base policies, and whatever policies you'd like to evaluate and optionally enforce. The opa engine passes the result of Resource.get()
to the opa server as input. All policies need to be defined in the rpe.policy
namespace, include a few specific rules, and operate on the input
document:
- applies_to: a list of resource types the policy applies to
- description: a human-readable description of the policy
- compliant: returns true if the resource defined in the
input
document adheres to the policy - excluded: returns true if there is a reason to exclude the resource from evaluation, for GCP we define resource labels that can mark a resource as excluded
- remediate (optional): returns a JSON object explaining how to remediate the resource for the given policy
Example policy:
# This is a real policy included with rpe-lib though slightly simplified
package rpe.policy.storage_buckets_require_object_versioning
description = "Require object versioning for storage buckets"
applies_to = ["storage.googleapis.com/Bucket"]
default compliant = false
default excluded = false
compliant {
input.resource.versioning.enabled = true
}
excluded {
input.resource.labels["forseti-enforcer"] = "disabled"
}
remediate = {
"_remediation_spec": "v2",
"steps": [
"method": "patch",
"params": {
"bucket": input.resource.name,
"body": {"versioning": {"enabled": true}},
}
]
}
Python Engine
The OPA engine is very powerful, but is limited by what OPA is capable of. For use-cases that are more complicated, you might want to use the python engine. This engine expects the path to a python package that contains classes that perform the evaluation, and optionally remediation.
As mentioned, the python policies are actually classes. Here is an example python policy class:
# Stubbed out example of the above OPA engine policy as a python engine policy
class GCPBucketVersioningPolicy:
description = 'Require object versioning for storage buckets'
applies_to = ['cloudresourcemanager.googleapis.com/Project']
@classmethod
def compliant(cls, resource):
return resource.get()['resource']['versioning']['enabled'] == True
@classmethod
def excluded(cls, resource):
return resource.get()['resource']['labels']['forseti-enforcer'] == 'disabled'
@classmethod
def remediate(cls, resource):
# execute cloudfuntion to enable versioning,
# or shell execute gsutil,
# or anything you can do with python
pass
When you configure your RPE object, you provide the path to your python package. That package doesn't need to be installed, it will be loaded dynamically. The path you provide should contain an __init__.py
file with every policy class you wish to use. These can be defined directly in that file, or imported. Since RPElib takes care of importing the package, you will be able to use relative imports in your python files. For example your directory structure might look like this:
/etc/rpe/policies-python
* __init__.py
* policy1.py
* policy2.py
And your __init__.py
might look like this:
# __init__.py
from .policy1 import MyFirstPythonPolicy
from .policy2 import AnotherPythonPolicy, YetAnotherPolicy
Resources
Resources
must define the following functions
get()
: returns metadata describing the current state of the resourceremediate(remediation_spec)
: applies the remediation (the spec is specific to the resource type/implementation)type()
: returns the type of resource, used by policy engines to determine which policies apply to a given resource
Examples
Using the OPA engine
This assumes you have the opa
binary in your path
# First, start opa with our policies
opa run --server ./policy/
Now we need to create an RPE instance with the opa engine configured to use the local OPA server:
from rpe import RPE
from rpe.resources import GoogleAPIResource
config = {
'policy_engines': [
{
'type': 'opa',
'url': 'http://localhost:8181/v1/data'
}
]
}
rpe = RPE(config)
# Create a resource object for the resource we want to evaluate
res = GoogleAPIResource.from_cai_data(
'//storage.googleapis.com/my-test-bucket',
'storage.googleapis.com/Bucket',
project_id='my-test-project',
)
evals = rpe.evaluate(res)
for e in evals:
print(f'Policy: {e.policy_id}, Compliant: {e.compliant}')
if not e.compliant and e.remediable:
e.remediate()
Using the Python engine
Using the Python policy engine is similar to the above:
from rpe import RPE
from rpe.resources import GoogleAPIResource
config = {
'policy_engines': [
{
'type': 'python',
'path': '/etc/rpe/policies-python'
}
]
}
rpe = RPE(config)
# Create resource objects, and evaluate as needed
And your policies may look like this:
/etc/rpe/policies-python/init.py
from .gcs_policy import GCPBucketVersioningPolicy
/etc/rpe/policies-python/gcs_policy.py
class GCPBucketVersioningPolicy:
description = 'Require object versioning for storage buckets'
applies_to = ['cloudresourcemanager.googleapis.com/Project']
@classmethod
def compliant(cls, resource):
# Return true/false if the resource is compliant
@classmethod
def excluded(cls, resource):
# Return true/false if the resource is excluded
@classmethod
def remediate(cls, resource):
# Enable versioning
Applications using rpe-lib
- Forseti Real-time Enforcer - The Forseti Real-time enforcer uses rpe-lib for the evaluation and enforcement of policy for Google Cloud resources. It uses a Stackdriver log export to a Pub/Sub topic to trigger enforcement.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file rpe-lib-3.1.2.tar.gz
.
File metadata
- Download URL: rpe-lib-3.1.2.tar.gz
- Upload date:
- Size: 62.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.8.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | cdfc1007183545d833fd99b90da6ea50edeb17ff06a919e9ec542df6783e22b7 |
|
MD5 | c7e5b94ca0e04b77049e8d9963fbbd7a |
|
BLAKE2b-256 | 88c0f376d815d803ddd1d5709a01e20f5099e9ebd5fb13236d79900c52b3652a |
File details
Details for the file rpe_lib-3.1.2-py3-none-any.whl
.
File metadata
- Download URL: rpe_lib-3.1.2-py3-none-any.whl
- Upload date:
- Size: 31.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.8.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | d535f1bf180b4ad19985e9ad58713e2dc8a358bde0a42640811ab4121c979196 |
|
MD5 | a91f11ae92ddb35a429574ebbb09d2a0 |
|
BLAKE2b-256 | c83b348b10bd10168b3bfba7812355a0d0dc8602d8356938ea6ef92e0e1aeda5 |