graphvent/policy.go

397 lines
9.2 KiB
Go

2023-07-20 23:19:10 -06:00
package graphvent
import (
"encoding/json"
"fmt"
2023-07-20 23:19:10 -06:00
)
type Policy interface {
Serializable[PolicyType]
2023-07-25 21:43:15 -06:00
Allows(context *StateContext, principal *Node, action string, node *Node) bool
}
const RequirementOfPolicyType = PolicyType("REQUIREMENT_OF")
type RequirementOfPolicy struct {
PerNodePolicy
}
func (policy *RequirementOfPolicy) Type() PolicyType {
return RequirementOfPolicyType
}
func NewRequirementOfPolicy(nodes NodeActions) RequirementOfPolicy {
return RequirementOfPolicy{
PerNodePolicy: NewPerNodePolicy(nodes),
}
}
// Check if any of principals dependencies are in the policy
func (policy *RequirementOfPolicy) Allows(context *StateContext, principal *Node, action string, node *Node) bool {
lockable_ext, err := GetExt[*LockableExt](principal)
if err != nil {
return false
}
for dep_id, _ := range(lockable_ext.Dependencies) {
for node_id, actions := range(policy.NodeActions) {
if node_id == dep_id {
if actions.Allows(action) == true {
return true
}
break
}
}
}
return false
}
2023-07-26 13:28:03 -06:00
const ChildOfPolicyType = PolicyType("CHILD_OF")
type ChildOfPolicy struct {
PerNodePolicy
2023-07-26 13:28:03 -06:00
}
func (policy *ChildOfPolicy) Type() PolicyType {
return ChildOfPolicyType
}
func (policy *ChildOfPolicy) Allows(context *StateContext, principal *Node, action string, node *Node) bool {
context.Graph.Log.Logf("policy", "CHILD_OF_POLICY: %+v", policy)
thread_ext, err := GetExt[*ThreadExt](principal)
if err != nil {
return false
}
parent := thread_ext.Parent
if parent != nil {
actions, exists := policy.NodeActions[parent.ID]
if exists == false {
return false
}
for _, a := range(actions) {
if a == action {
return true
}
}
}
return false
}
type Actions []string
func (actions Actions) Allows(action string) bool {
for _, a := range(actions) {
if a == action {
return true
}
}
return false
}
type NodeActions map[NodeID]Actions
2023-07-26 13:28:03 -06:00
func PerNodePolicyLoad(init_fn func(NodeActions)(Policy, error)) func(*Context, []byte)(Policy, error) {
return func(ctx *Context, data []byte)(Policy, error){
var j PerNodePolicyJSON
err := json.Unmarshal(data, &j)
2023-07-26 13:28:03 -06:00
if err != nil {
return nil, err
}
node_actions := NodeActions{}
for id_str, actions := range(j.NodeActions) {
id, err := ParseID(id_str)
if err != nil {
return nil, err
}
2023-07-26 13:28:03 -06:00
_, err = LoadNode(ctx, id)
if err != nil {
return nil, err
}
2023-07-26 13:28:03 -06:00
node_actions[id] = actions
}
2023-07-26 13:28:03 -06:00
return init_fn(node_actions)
2023-07-26 13:28:03 -06:00
}
}
2023-07-26 13:28:03 -06:00
func NewChildOfPolicy(node_actions NodeActions) ChildOfPolicy {
return ChildOfPolicy{
PerNodePolicy: NewPerNodePolicy(node_actions),
2023-07-26 13:28:03 -06:00
}
}
const ParentOfPolicyType = PolicyType("PARENT_OF")
type ParentOfPolicy struct {
PerNodePolicy
2023-07-26 13:28:03 -06:00
}
func (policy *ParentOfPolicy) Type() PolicyType {
return ParentOfPolicyType
}
func (policy *ParentOfPolicy) Allows(context *StateContext, principal *Node, action string, node *Node) bool {
context.Graph.Log.Logf("policy", "PARENT_OF_POLICY: %+v", policy)
for id, actions := range(policy.NodeActions) {
thread_ext, err := GetExt[*ThreadExt](context.Graph.Nodes[id])
if err != nil {
continue
}
context.Graph.Log.Logf("policy", "PARENT_OF_PARENT: %s %+v", id, thread_ext.Parent)
if thread_ext.Parent != nil {
if thread_ext.Parent.ID == principal.ID {
for _, a := range(actions) {
if a == action {
return true
}
}
}
}
}
return false
2023-07-20 23:19:10 -06:00
}
func NewParentOfPolicy(node_actions NodeActions) ParentOfPolicy {
return ParentOfPolicy{
PerNodePolicy: NewPerNodePolicy(node_actions),
2023-07-26 13:28:03 -06:00
}
2023-07-20 23:19:10 -06:00
}
func NewPerNodePolicy(node_actions NodeActions) PerNodePolicy {
2023-07-26 13:28:03 -06:00
if node_actions == nil {
node_actions = NodeActions{}
2023-07-26 13:28:03 -06:00
}
return PerNodePolicy{
2023-07-26 13:28:03 -06:00
NodeActions: node_actions,
}
}
type PerNodePolicy struct {
NodeActions NodeActions
2023-07-26 13:28:03 -06:00
}
type PerNodePolicyJSON struct {
NodeActions map[string][]string `json:"node_actions"`
}
const PerNodePolicyType = PolicyType("PER_NODE")
func (policy *PerNodePolicy) Type() PolicyType {
2023-07-26 13:28:03 -06:00
return PerNodePolicyType
}
func (policy *PerNodePolicy) Serialize() ([]byte, error) {
2023-07-26 13:28:03 -06:00
node_actions := map[string][]string{}
for id, actions := range(policy.NodeActions) {
node_actions[id.String()] = actions
}
return json.MarshalIndent(&PerNodePolicyJSON{
NodeActions: node_actions,
}, "", " ")
}
func (policy *PerNodePolicy) Allows(context *StateContext, principal *Node, action string, node *Node) bool {
2023-07-26 13:28:03 -06:00
for id, actions := range(policy.NodeActions) {
if id != principal.ID {
continue
}
for _, a := range(actions) {
if a == action {
return true
}
}
}
return false
}
2023-07-25 21:43:15 -06:00
// Extension to allow a node to hold ACL policies
2023-07-26 00:18:11 -06:00
type ACLPolicyExt struct {
2023-07-25 21:43:15 -06:00
Policies map[PolicyType]Policy
2023-07-20 23:19:10 -06:00
}
2023-07-26 00:18:11 -06:00
// The ACL extension stores a map of nodes to delegate ACL to, and a list of policies
type ACLExt struct {
Delegations NodeMap
}
func (ext *ACLExt) Process(context *StateContext, node *Node, signal Signal) error {
2023-07-26 00:18:11 -06:00
return nil
}
func LoadACLExt(ctx *Context, data []byte) (Extension, error) {
var j struct {
Delegations []string `json:"delegation"`
}
err := json.Unmarshal(data, &j)
if err != nil {
return nil, err
}
delegations, err := RestoreNodeList(ctx, j.Delegations)
if err != nil {
return nil, err
}
return &ACLExt{
2023-07-26 00:18:11 -06:00
Delegations: delegations,
}, nil
}
2023-07-26 13:28:03 -06:00
func NodeList(nodes ...*Node) NodeMap {
m := NodeMap{}
for _, node := range(nodes) {
m[node.ID] = node
}
return m
}
2023-07-26 11:56:10 -06:00
func NewACLExt(delegations NodeMap) *ACLExt {
if delegations == nil {
delegations = NodeMap{}
}
return &ACLExt{
Delegations: delegations,
}
}
func (ext *ACLExt) Serialize() ([]byte, error) {
2023-07-26 00:18:11 -06:00
delegations := make([]string, len(ext.Delegations))
i := 0
for id, _ := range(ext.Delegations) {
delegations[i] = id.String()
i += 1
}
return json.MarshalIndent(&struct{
Delegations []string `json:"delegations"`
}{
Delegations: delegations,
}, "", " ")
}
const ACLExtType = ExtType("ACL")
func (ext *ACLExt) Type() ExtType {
2023-07-26 00:18:11 -06:00
return ACLExtType
}
2023-07-20 23:19:10 -06:00
2023-07-25 21:43:15 -06:00
type PolicyLoadFunc func(*Context, []byte) (Policy, error)
type PolicyInfo struct {
Load PolicyLoadFunc
2023-07-20 23:19:10 -06:00
}
2023-07-26 00:18:11 -06:00
type ACLPolicyExtContext struct {
2023-07-25 21:43:15 -06:00
Types map[PolicyType]PolicyInfo
2023-07-20 23:19:10 -06:00
}
2023-07-26 00:18:11 -06:00
func NewACLPolicyExtContext() *ACLPolicyExtContext {
2023-07-26 13:28:03 -06:00
return &ACLPolicyExtContext{
Types: map[PolicyType]PolicyInfo{
PerNodePolicyType: PolicyInfo{
Load: PerNodePolicyLoad(func(nodes NodeActions)(Policy,error){
policy := NewPerNodePolicy(nodes)
return &policy, nil
}),
2023-07-26 13:28:03 -06:00
},
ParentOfPolicyType: PolicyInfo{
Load: PerNodePolicyLoad(func(nodes NodeActions)(Policy,error){
policy := NewParentOfPolicy(nodes)
return &policy, nil
}),
2023-07-26 13:28:03 -06:00
},
ChildOfPolicyType: PolicyInfo{
Load: PerNodePolicyLoad(func(nodes NodeActions)(Policy,error){
policy := NewChildOfPolicy(nodes)
return &policy, nil
}),
},
RequirementOfPolicyType: PolicyInfo{
Load: PerNodePolicyLoad(func(nodes NodeActions)(Policy,error){
policy := NewRequirementOfPolicy(nodes)
return &policy, nil
}),
2023-07-26 13:28:03 -06:00
},
},
}
2023-07-26 00:18:11 -06:00
}
2023-07-26 13:28:03 -06:00
func (ext *ACLPolicyExt) Serialize() ([]byte, error) {
2023-07-25 21:43:15 -06:00
policies := map[string][]byte{}
for name, policy := range(ext.Policies) {
ser, err := policy.Serialize()
2023-07-20 23:19:10 -06:00
if err != nil {
return nil, err
}
2023-07-25 21:43:15 -06:00
policies[string(name)] = ser
2023-07-20 23:19:10 -06:00
}
2023-07-25 21:43:15 -06:00
return json.MarshalIndent(&struct{
Policies map[string][]byte `json:"policies"`
}{
Policies: policies,
}, "", " ")
2023-07-21 13:55:27 -06:00
}
func (ext *ACLPolicyExt) Process(context *StateContext, node *Node, signal Signal) error {
2023-07-25 21:43:15 -06:00
return nil
2023-07-21 13:55:27 -06:00
}
2023-07-26 13:28:03 -06:00
func NewACLPolicyExt(policies map[PolicyType]Policy) *ACLPolicyExt {
if policies == nil {
policies = map[PolicyType]Policy{}
}
return &ACLPolicyExt{
Policies: policies,
}
}
2023-07-26 00:18:11 -06:00
func LoadACLPolicyExt(ctx *Context, data []byte) (Extension, error) {
2023-07-25 21:43:15 -06:00
var j struct {
Policies map[string][]byte `json:"policies"`
2023-07-24 22:52:15 -06:00
}
2023-07-25 21:43:15 -06:00
err := json.Unmarshal(data, &j)
if err != nil {
return nil, err
2023-07-21 13:55:27 -06:00
}
2023-07-25 21:43:15 -06:00
policies := map[PolicyType]Policy{}
acl_ctx := ctx.ExtByType(ACLPolicyExtType).Data.(*ACLPolicyExtContext)
2023-07-25 21:43:15 -06:00
for name, ser := range(j.Policies) {
policy_def, exists := acl_ctx.Types[PolicyType(name)]
if exists == false {
return nil, fmt.Errorf("%s is not a known policy type", name)
2023-07-24 22:52:15 -06:00
}
2023-07-25 21:43:15 -06:00
policy, err := policy_def.Load(ctx, ser)
if err != nil {
return nil, err
2023-07-24 22:52:15 -06:00
}
2023-07-25 21:43:15 -06:00
policies[PolicyType(name)] = policy
2023-07-24 22:52:15 -06:00
}
2023-07-21 13:55:27 -06:00
2023-07-26 13:28:03 -06:00
return NewACLPolicyExt(policies), nil
2023-07-24 01:12:30 -06:00
}
2023-07-25 21:43:15 -06:00
const ACLPolicyExtType = ExtType("ACL_POLICIES")
2023-07-26 13:28:03 -06:00
func (ext *ACLPolicyExt) Type() ExtType {
2023-07-25 21:43:15 -06:00
return ACLPolicyExtType
2023-07-24 01:12:30 -06:00
}
2023-07-25 21:43:15 -06:00
// Check if the extension allows the principal to perform action on node
2023-07-26 13:28:03 -06:00
func (ext *ACLPolicyExt) Allows(context *StateContext, principal *Node, action string, node *Node) bool {
context.Graph.Log.Logf("policy", "POLICY_EXT_ALLOWED: %+v", ext)
2023-07-25 21:43:15 -06:00
for _, policy := range(ext.Policies) {
2023-07-26 13:28:03 -06:00
context.Graph.Log.Logf("policy", "POLICY_CHECK_POLICY: %+v", policy)
2023-07-25 21:43:15 -06:00
if policy.Allows(context, principal, action, node) == true {
return true
2023-07-24 01:12:30 -06:00
}
}
return false
}