package vault import ( "reflect" "strings" "github.com/armon/go-radix" "github.com/hashicorp/vault/logical" ) // ACL is used to wrap a set of policies to provide // an efficient interface for access control. type ACL struct { // exactRules contains the path policies that are exact exactRules *radix.Tree // globRules contains the path policies that glob globRules *radix.Tree // root is enabled if the "root" named policy is present. root bool } // New is used to construct a policy based ACL from a set of policies. func NewACL(policies []*Policy) (*ACL, error) { // Initialize a := &ACL{ exactRules: radix.New(), globRules: radix.New(), root: false, } // Inject each policy for _, policy := range policies { // Ignore a nil policy object if policy == nil { continue } // Check if this is root if policy.Name == "root" { a.root = true } for _, pc := range policy.Paths { // Check which tree to use tree := a.exactRules if pc.Glob { tree = a.globRules } // Check for an existing policy raw, ok := tree.Get(pc.Prefix) if !ok { tree.Insert(pc.Prefix, pc.Permissions) continue } // these are the ones already in the tree existingPerms := raw.(*Permissions) switch { case existingPerms.CapabilitiesBitmap&DenyCapabilityInt > 0: // If we are explicitly denied in the existing capability set, // don't save anything else continue case pc.Permissions.CapabilitiesBitmap&DenyCapabilityInt > 0: // If this new policy explicitly denies, only save the deny value pc.Permissions.CapabilitiesBitmap = DenyCapabilityInt pc.Permissions.AllowedParameters = nil pc.Permissions.DeniedParameters = nil goto INSERT default: // Insert the capabilities in this new policy into the existing // value pc.Permissions.CapabilitiesBitmap = existingPerms.CapabilitiesBitmap | pc.Permissions.CapabilitiesBitmap } // Note: In these stanzas, we're preferring minimum lifetimes. So // we take the lesser of two specified max values, or we take the // lesser of two specified min values, the idea being, allowing // token lifetime to be minimum possible. // // If we have an existing max, and we either don't have a current // max, or the current is greater than the previous, use the // existing. if existingPerms.MaxWrappingTTL > 0 && (pc.Permissions.MaxWrappingTTL == 0 || existingPerms.MaxWrappingTTL < pc.Permissions.MaxWrappingTTL) { pc.Permissions.MaxWrappingTTL = existingPerms.MaxWrappingTTL } // If we have an existing min, and we either don't have a current // min, or the current is greater than the previous, use the // existing if existingPerms.MinWrappingTTL > 0 && (pc.Permissions.MinWrappingTTL == 0 || existingPerms.MinWrappingTTL < pc.Permissions.MinWrappingTTL) { pc.Permissions.MinWrappingTTL = existingPerms.MinWrappingTTL } if len(existingPerms.AllowedParameters) > 0 { if pc.Permissions.AllowedParameters == nil { pc.Permissions.AllowedParameters = existingPerms.AllowedParameters } else { for key, value := range existingPerms.AllowedParameters { pcValue, ok := pc.Permissions.AllowedParameters[key] // If an empty array exist it should overwrite any other // value. if len(value) == 0 || (ok && len(pcValue) == 0) { pc.Permissions.AllowedParameters[key] = []interface{}{} } else { // Merge the two maps, appending values on key conflict. pc.Permissions.AllowedParameters[key] = append(value, pc.Permissions.AllowedParameters[key]...) } } } } if len(existingPerms.DeniedParameters) > 0 { if pc.Permissions.DeniedParameters == nil { pc.Permissions.DeniedParameters = existingPerms.DeniedParameters } else { for key, value := range existingPerms.DeniedParameters { pcValue, ok := pc.Permissions.DeniedParameters[key] // If an empty array exist it should overwrite any other // value. if len(value) == 0 || (ok && len(pcValue) == 0) { pc.Permissions.DeniedParameters[key] = []interface{}{} } else { // Merge the two maps, appending values on key conflict. pc.Permissions.DeniedParameters[key] = append(value, pc.Permissions.DeniedParameters[key]...) } } } } INSERT: tree.Insert(pc.Prefix, pc.Permissions) } } return a, nil } func (a *ACL) Capabilities(path string) (pathCapabilities []string) { // Fast-path root if a.root { return []string{RootCapability} } // Find an exact matching rule, look for glob if no match var capabilities uint32 raw, ok := a.exactRules.Get(path) if ok { perm := raw.(*Permissions) capabilities = perm.CapabilitiesBitmap goto CHECK } // Find a glob rule, default deny if no match _, raw, ok = a.globRules.LongestPrefix(path) if !ok { return []string{DenyCapability} } else { perm := raw.(*Permissions) capabilities = perm.CapabilitiesBitmap } CHECK: if capabilities&SudoCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, SudoCapability) } if capabilities&ReadCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, ReadCapability) } if capabilities&ListCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, ListCapability) } if capabilities&UpdateCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, UpdateCapability) } if capabilities&DeleteCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, DeleteCapability) } if capabilities&CreateCapabilityInt > 0 { pathCapabilities = append(pathCapabilities, CreateCapability) } // If "deny" is explicitly set or if the path has no capabilities at all, // set the path capabilities to "deny" if capabilities&DenyCapabilityInt > 0 || len(pathCapabilities) == 0 { pathCapabilities = []string{DenyCapability} } return } // AllowOperation is used to check if the given operation is permitted. The // first bool indicates if an op is allowed, the second whether sudo priviliges // exist for that op and path. func (a *ACL) AllowOperation(req *logical.Request) (bool, bool) { // Fast-path root if a.root { return true, true } op := req.Operation path := req.Path // Help is always allowed if op == logical.HelpOperation { return true, false } var permissions *Permissions // Find an exact matching rule, look for glob if no match var capabilities uint32 raw, ok := a.exactRules.Get(path) if ok { permissions = raw.(*Permissions) capabilities = permissions.CapabilitiesBitmap goto CHECK } // Find a glob rule, default deny if no match _, raw, ok = a.globRules.LongestPrefix(path) if !ok { return false, false } else { permissions = raw.(*Permissions) capabilities = permissions.CapabilitiesBitmap } CHECK: // Check if the minimum permissions are met // If "deny" has been explicitly set, only deny will be in the map, so we // only need to check for the existence of other values sudo := capabilities&SudoCapabilityInt > 0 operationAllowed := false switch op { case logical.ReadOperation: operationAllowed = capabilities&ReadCapabilityInt > 0 case logical.ListOperation: operationAllowed = capabilities&ListCapabilityInt > 0 case logical.UpdateOperation: operationAllowed = capabilities&UpdateCapabilityInt > 0 case logical.DeleteOperation: operationAllowed = capabilities&DeleteCapabilityInt > 0 case logical.CreateOperation: operationAllowed = capabilities&CreateCapabilityInt > 0 // These three re-use UpdateCapabilityInt since that's the most appropriate // capability/operation mapping case logical.RevokeOperation, logical.RenewOperation, logical.RollbackOperation: operationAllowed = capabilities&UpdateCapabilityInt > 0 default: return false, false } if !operationAllowed { return false, sudo } if permissions.MaxWrappingTTL > 0 { if req.WrapInfo == nil || req.WrapInfo.TTL > permissions.MaxWrappingTTL { return false, sudo } } if permissions.MinWrappingTTL > 0 { if req.WrapInfo == nil || req.WrapInfo.TTL < permissions.MinWrappingTTL { return false, sudo } } // This situation can happen because of merging, even though in a single // path statement we check on ingress if permissions.MinWrappingTTL != 0 && permissions.MaxWrappingTTL != 0 && permissions.MaxWrappingTTL < permissions.MinWrappingTTL { return false, sudo } // Only check parameter permissions for operations that can modify // parameters. if op == logical.UpdateOperation || op == logical.CreateOperation { // If there are no data fields, allow if len(req.Data) == 0 { return true, sudo } if len(permissions.DeniedParameters) == 0 { goto ALLOWED_PARAMETERS } // Check if all parameters have been denied if _, ok := permissions.DeniedParameters["*"]; ok { return false, sudo } for parameter, value := range req.Data { // Check if parameter has been explictly denied if valueSlice, ok := permissions.DeniedParameters[strings.ToLower(parameter)]; ok { // If the value exists in denied values slice, deny if valueInParameterList(value, valueSlice) { return false, sudo } } } ALLOWED_PARAMETERS: // If we don't have any allowed parameters set, allow if len(permissions.AllowedParameters) == 0 { return true, sudo } _, allowedAll := permissions.AllowedParameters["*"] if len(permissions.AllowedParameters) == 1 && allowedAll { return true, sudo } for parameter, value := range req.Data { valueSlice, ok := permissions.AllowedParameters[strings.ToLower(parameter)] // Requested parameter is not in allowed list if !ok && !allowedAll { return false, sudo } // If the value doesn't exists in the allowed values slice, // deny if ok && !valueInParameterList(value, valueSlice) { return false, sudo } } } return true, sudo } func valueInParameterList(v interface{}, list []interface{}) bool { // Empty list is equivalent to the item always existing in the list if len(list) == 0 { return true } return valueInSlice(v, list) } func valueInSlice(v interface{}, list []interface{}) bool { for _, el := range list { if reflect.DeepEqual(el, v) { return true } } return false }