2014-08-06 22:08:17 +00:00
|
|
|
package acl
|
|
|
|
|
|
|
|
import (
|
|
|
|
"github.com/armon/go-radix"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2014-08-12 22:09:01 +00:00
|
|
|
// allowAll is a singleton policy which allows all
|
|
|
|
// non-management actions
|
2014-08-06 22:08:17 +00:00
|
|
|
allowAll ACL
|
|
|
|
|
|
|
|
// denyAll is a singleton policy which denies all actions
|
|
|
|
denyAll ACL
|
2014-08-12 22:09:01 +00:00
|
|
|
|
|
|
|
// manageAll is a singleton policy which allows all
|
|
|
|
// actions, including management
|
|
|
|
manageAll ACL
|
2014-08-06 22:08:17 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
// Setup the singletons
|
2014-08-12 22:09:01 +00:00
|
|
|
allowAll = &StaticACL{
|
|
|
|
allowManage: false,
|
|
|
|
defaultAllow: true,
|
|
|
|
}
|
|
|
|
denyAll = &StaticACL{
|
|
|
|
allowManage: false,
|
|
|
|
defaultAllow: false,
|
|
|
|
}
|
|
|
|
manageAll = &StaticACL{
|
|
|
|
allowManage: true,
|
|
|
|
defaultAllow: true,
|
|
|
|
}
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ACL is the interface for policy enforcement.
|
|
|
|
type ACL interface {
|
2014-08-14 22:53:02 +00:00
|
|
|
// KeyRead checks for permission to read a given key
|
2014-08-06 22:08:17 +00:00
|
|
|
KeyRead(string) bool
|
2014-08-14 22:53:02 +00:00
|
|
|
|
|
|
|
// KeyWrite checks for permission to write a given key
|
2014-08-06 22:08:17 +00:00
|
|
|
KeyWrite(string) bool
|
2014-08-14 22:53:02 +00:00
|
|
|
|
|
|
|
// KeyWritePrefix checks for permission to write to an
|
|
|
|
// entire key prefix. This means there must be no sub-policies
|
|
|
|
// that deny a write.
|
|
|
|
KeyWritePrefix(string) bool
|
|
|
|
|
2014-12-01 03:33:46 +00:00
|
|
|
// ServiceWrite checks for permission to read a given service
|
|
|
|
ServiceWrite(string) bool
|
|
|
|
|
|
|
|
// ServiceRead checks for permission to read a given service
|
|
|
|
ServiceRead(string) bool
|
|
|
|
|
2015-06-18 01:56:29 +00:00
|
|
|
// EventRead determines if a specific event can be queried.
|
|
|
|
EventRead(string) bool
|
|
|
|
|
|
|
|
// EventWrite determines if a specific event may be fired.
|
|
|
|
EventWrite(string) bool
|
|
|
|
|
2015-07-07 00:28:09 +00:00
|
|
|
// KeyringRead determines if the encryption keyring used in
|
|
|
|
// the gossip layer can be read.
|
|
|
|
KeyringRead() bool
|
|
|
|
|
|
|
|
// KeyringWrite determines if the keyring can be manipulated
|
|
|
|
KeyringWrite() bool
|
|
|
|
|
2014-08-14 22:53:02 +00:00
|
|
|
// ACLList checks for permission to list all the ACLs
|
2014-08-12 22:09:01 +00:00
|
|
|
ACLList() bool
|
2014-08-14 22:53:02 +00:00
|
|
|
|
|
|
|
// ACLModify checks for permission to manipulate ACLs
|
2014-08-12 22:09:01 +00:00
|
|
|
ACLModify() bool
|
2015-11-04 23:16:21 +00:00
|
|
|
|
|
|
|
// QueryList checks for permission to list all the prepared queries.
|
|
|
|
QueryList() bool
|
|
|
|
|
|
|
|
// QueryModify checks for permission to modify any prepared query.
|
|
|
|
QueryModify() bool
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// StaticACL is used to implement a base ACL policy. It either
|
|
|
|
// allows or denies all requests. This can be used as a parent
|
|
|
|
// ACL to act in a blacklist or whitelist mode.
|
|
|
|
type StaticACL struct {
|
2014-08-12 22:09:01 +00:00
|
|
|
allowManage bool
|
2014-08-06 22:08:17 +00:00
|
|
|
defaultAllow bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) KeyRead(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) KeyWrite(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
2014-08-14 22:53:02 +00:00
|
|
|
func (s *StaticACL) KeyWritePrefix(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
2014-12-01 03:33:46 +00:00
|
|
|
func (s *StaticACL) ServiceRead(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) ServiceWrite(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
2015-06-18 01:56:29 +00:00
|
|
|
func (s *StaticACL) EventRead(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) EventWrite(string) bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
2015-07-07 00:28:09 +00:00
|
|
|
func (s *StaticACL) KeyringRead() bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) KeyringWrite() bool {
|
|
|
|
return s.defaultAllow
|
|
|
|
}
|
|
|
|
|
2014-08-12 22:09:01 +00:00
|
|
|
func (s *StaticACL) ACLList() bool {
|
|
|
|
return s.allowManage
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) ACLModify() bool {
|
|
|
|
return s.allowManage
|
|
|
|
}
|
|
|
|
|
2015-11-04 23:16:21 +00:00
|
|
|
func (s *StaticACL) QueryList() bool {
|
|
|
|
return s.allowManage
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StaticACL) QueryModify() bool {
|
|
|
|
return s.allowManage
|
|
|
|
}
|
|
|
|
|
2014-08-06 22:08:17 +00:00
|
|
|
// AllowAll returns an ACL rule that allows all operations
|
|
|
|
func AllowAll() ACL {
|
|
|
|
return allowAll
|
|
|
|
}
|
|
|
|
|
|
|
|
// DenyAll returns an ACL rule that denies all operations
|
|
|
|
func DenyAll() ACL {
|
|
|
|
return denyAll
|
|
|
|
}
|
|
|
|
|
2014-08-12 22:09:01 +00:00
|
|
|
// ManageAll returns an ACL rule that can manage all resources
|
|
|
|
func ManageAll() ACL {
|
|
|
|
return manageAll
|
|
|
|
}
|
|
|
|
|
2014-08-12 17:35:27 +00:00
|
|
|
// RootACL returns a possible ACL if the ID matches a root policy
|
|
|
|
func RootACL(id string) ACL {
|
|
|
|
switch id {
|
|
|
|
case "allow":
|
|
|
|
return allowAll
|
|
|
|
case "deny":
|
|
|
|
return denyAll
|
2014-08-12 22:09:01 +00:00
|
|
|
case "manage":
|
|
|
|
return manageAll
|
2014-08-12 17:35:27 +00:00
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-06 22:08:17 +00:00
|
|
|
// PolicyACL is used to wrap a set of ACL policies to provide
|
|
|
|
// the ACL interface.
|
|
|
|
type PolicyACL struct {
|
|
|
|
// parent is used to resolve policy if we have
|
|
|
|
// no matching rule.
|
|
|
|
parent ACL
|
|
|
|
|
2014-08-11 05:01:03 +00:00
|
|
|
// keyRules contains the key policies
|
|
|
|
keyRules *radix.Tree
|
2014-12-01 03:33:46 +00:00
|
|
|
|
|
|
|
// serviceRules contains the service policies
|
2015-05-05 06:25:19 +00:00
|
|
|
serviceRules *radix.Tree
|
2015-06-18 01:56:29 +00:00
|
|
|
|
|
|
|
// eventRules contains the user event policies
|
|
|
|
eventRules *radix.Tree
|
2015-07-07 00:28:09 +00:00
|
|
|
|
|
|
|
// keyringRules contains the keyring policies. The keyring has
|
2015-09-15 12:22:08 +00:00
|
|
|
// a very simple yes/no without prefix matching, so here we
|
2015-07-07 00:28:09 +00:00
|
|
|
// don't need to use a radix tree.
|
2015-07-07 16:45:38 +00:00
|
|
|
keyringRule string
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// New is used to construct a policy based ACL from a set of policies
|
|
|
|
// and a parent policy to resolve missing cases.
|
|
|
|
func New(parent ACL, policy *Policy) (*PolicyACL, error) {
|
|
|
|
p := &PolicyACL{
|
2014-12-01 03:33:46 +00:00
|
|
|
parent: parent,
|
|
|
|
keyRules: radix.New(),
|
2015-05-05 06:25:19 +00:00
|
|
|
serviceRules: radix.New(),
|
2015-06-18 01:56:29 +00:00
|
|
|
eventRules: radix.New(),
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Load the key policy
|
|
|
|
for _, kp := range policy.Keys {
|
2014-08-11 05:01:03 +00:00
|
|
|
p.keyRules.Insert(kp.Prefix, kp.Policy)
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
2014-12-01 03:33:46 +00:00
|
|
|
|
|
|
|
// Load the service policy
|
|
|
|
for _, sp := range policy.Services {
|
2015-05-05 06:25:19 +00:00
|
|
|
p.serviceRules.Insert(sp.Name, sp.Policy)
|
2014-12-01 03:33:46 +00:00
|
|
|
}
|
2015-06-18 01:56:29 +00:00
|
|
|
|
|
|
|
// Load the event policy
|
|
|
|
for _, ep := range policy.Events {
|
|
|
|
p.eventRules.Insert(ep.Event, ep.Policy)
|
|
|
|
}
|
|
|
|
|
2015-07-07 00:28:09 +00:00
|
|
|
// Load the keyring policy
|
2015-07-07 16:45:38 +00:00
|
|
|
p.keyringRule = policy.Keyring
|
2015-07-07 00:28:09 +00:00
|
|
|
|
2014-08-06 22:08:17 +00:00
|
|
|
return p, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyRead returns if a key is allowed to be read
|
|
|
|
func (p *PolicyACL) KeyRead(key string) bool {
|
|
|
|
// Look for a matching rule
|
2014-08-11 05:01:03 +00:00
|
|
|
_, rule, ok := p.keyRules.LongestPrefix(key)
|
2014-08-06 22:08:17 +00:00
|
|
|
if ok {
|
2014-08-11 05:01:03 +00:00
|
|
|
switch rule.(string) {
|
|
|
|
case KeyPolicyRead:
|
|
|
|
return true
|
|
|
|
case KeyPolicyWrite:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// No matching rule, use the parent.
|
|
|
|
return p.parent.KeyRead(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyWrite returns if a key is allowed to be written
|
|
|
|
func (p *PolicyACL) KeyWrite(key string) bool {
|
|
|
|
// Look for a matching rule
|
2014-08-11 05:01:03 +00:00
|
|
|
_, rule, ok := p.keyRules.LongestPrefix(key)
|
2014-08-06 22:08:17 +00:00
|
|
|
if ok {
|
2014-08-11 05:01:03 +00:00
|
|
|
switch rule.(string) {
|
|
|
|
case KeyPolicyWrite:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
2014-08-06 22:08:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// No matching rule, use the parent.
|
|
|
|
return p.parent.KeyWrite(key)
|
|
|
|
}
|
2014-08-12 22:09:01 +00:00
|
|
|
|
2014-08-14 22:53:02 +00:00
|
|
|
// KeyWritePrefix returns if a prefix is allowed to be written
|
|
|
|
func (p *PolicyACL) KeyWritePrefix(prefix string) bool {
|
|
|
|
// Look for a matching rule that denies
|
|
|
|
_, rule, ok := p.keyRules.LongestPrefix(prefix)
|
|
|
|
if ok && rule.(string) != KeyPolicyWrite {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look if any of our children have a deny policy
|
|
|
|
deny := false
|
|
|
|
p.keyRules.WalkPrefix(prefix, func(path string, rule interface{}) bool {
|
|
|
|
// We have a rule to prevent a write in a sub-directory!
|
|
|
|
if rule.(string) != KeyPolicyWrite {
|
|
|
|
deny = true
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
})
|
|
|
|
|
|
|
|
// Deny the write if any sub-rules may be violated
|
|
|
|
if deny {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we had a matching rule, done
|
|
|
|
if ok {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// No matching rule, use the parent.
|
|
|
|
return p.parent.KeyWritePrefix(prefix)
|
|
|
|
}
|
|
|
|
|
2014-12-01 03:33:46 +00:00
|
|
|
// ServiceRead checks if reading (discovery) of a service is allowed
|
|
|
|
func (p *PolicyACL) ServiceRead(name string) bool {
|
|
|
|
// Check for an exact rule or catch-all
|
2015-05-05 06:25:19 +00:00
|
|
|
_, rule, ok := p.serviceRules.LongestPrefix(name)
|
|
|
|
|
2014-12-01 03:33:46 +00:00
|
|
|
if ok {
|
|
|
|
switch rule {
|
|
|
|
case ServicePolicyWrite:
|
|
|
|
return true
|
|
|
|
case ServicePolicyRead:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// No matching rule, use the parent.
|
|
|
|
return p.parent.ServiceRead(name)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServiceWrite checks if writing (registering) a service is allowed
|
|
|
|
func (p *PolicyACL) ServiceWrite(name string) bool {
|
|
|
|
// Check for an exact rule or catch-all
|
2015-05-05 06:25:19 +00:00
|
|
|
_, rule, ok := p.serviceRules.LongestPrefix(name)
|
|
|
|
|
2014-12-01 03:33:46 +00:00
|
|
|
if ok {
|
|
|
|
switch rule {
|
|
|
|
case ServicePolicyWrite:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// No matching rule, use the parent.
|
|
|
|
return p.parent.ServiceWrite(name)
|
|
|
|
}
|
|
|
|
|
2015-06-18 01:56:29 +00:00
|
|
|
// EventRead is used to determine if the policy allows for a
|
|
|
|
// specific user event to be read.
|
|
|
|
func (p *PolicyACL) EventRead(name string) bool {
|
|
|
|
// Longest-prefix match on event names
|
|
|
|
if _, rule, ok := p.eventRules.LongestPrefix(name); ok {
|
|
|
|
switch rule {
|
|
|
|
case EventPolicyRead:
|
|
|
|
return true
|
|
|
|
case EventPolicyWrite:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Nothing matched, use parent
|
|
|
|
return p.parent.EventRead(name)
|
|
|
|
}
|
|
|
|
|
|
|
|
// EventWrite is used to determine if new events can be created
|
|
|
|
// (fired) by the policy.
|
|
|
|
func (p *PolicyACL) EventWrite(name string) bool {
|
|
|
|
// Longest-prefix match event names
|
|
|
|
if _, rule, ok := p.eventRules.LongestPrefix(name); ok {
|
|
|
|
return rule == EventPolicyWrite
|
|
|
|
}
|
|
|
|
|
|
|
|
// No match, use parent
|
|
|
|
return p.parent.EventWrite(name)
|
|
|
|
}
|
|
|
|
|
2015-07-07 00:28:09 +00:00
|
|
|
// KeyringRead is used to determine if the keyring can be
|
|
|
|
// read by the current ACL token.
|
|
|
|
func (p *PolicyACL) KeyringRead() bool {
|
2015-07-07 16:45:38 +00:00
|
|
|
switch p.keyringRule {
|
|
|
|
case KeyringPolicyRead, KeyringPolicyWrite:
|
|
|
|
return true
|
2015-07-07 17:07:37 +00:00
|
|
|
case KeyringPolicyDeny:
|
2015-07-07 00:28:09 +00:00
|
|
|
return false
|
2015-07-07 17:07:37 +00:00
|
|
|
default:
|
|
|
|
return p.parent.KeyringRead()
|
2015-07-07 00:28:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// KeyringWrite determines if the keyring can be manipulated.
|
|
|
|
func (p *PolicyACL) KeyringWrite() bool {
|
2015-07-07 17:07:37 +00:00
|
|
|
if p.keyringRule == KeyringPolicyWrite {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return p.parent.KeyringWrite()
|
2015-07-07 00:28:09 +00:00
|
|
|
}
|
|
|
|
|
2014-08-12 22:09:01 +00:00
|
|
|
// ACLList checks if listing of ACLs is allowed
|
|
|
|
func (p *PolicyACL) ACLList() bool {
|
2014-08-12 22:10:45 +00:00
|
|
|
return p.parent.ACLList()
|
2014-08-12 22:09:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ACLModify checks if modification of ACLs is allowed
|
|
|
|
func (p *PolicyACL) ACLModify() bool {
|
2014-08-12 22:10:45 +00:00
|
|
|
return p.parent.ACLModify()
|
2014-08-12 22:09:01 +00:00
|
|
|
}
|
2015-11-04 23:16:21 +00:00
|
|
|
|
|
|
|
// QueryList checks if listing of all prepared queries is allowed.
|
|
|
|
func (p *PolicyACL) QueryList() bool {
|
|
|
|
return p.parent.QueryList()
|
|
|
|
}
|
|
|
|
|
|
|
|
// QueryModify checks if modifying of any prepared query is allowed.
|
|
|
|
func (p *PolicyACL) QueryModify() bool {
|
|
|
|
return p.parent.QueryModify()
|
|
|
|
}
|