package perms /* A really useful page to be aware of when looking at ACLs is https://hashicorp.atlassian.net/wiki/spaces/ICU/pages/866976600/API+Actions+and+Permissions speaking of which: TODO: put that chart in public docs. Anyways, from that page you can see that there are really only a few patterns of ACLs that are ever allowed: * type=;actions= * id=;actions= * id=;type=;actions= and of course a matching scope. This makes it actually quite simple to perform the ACL checking. Much of ACL construction is thus synthesizing something reasonable from a set of Grants. */ import ( "github.com/hashicorp/watchtower/internal/iam" ) // ACL provides an entry point into the permissions engine for determining if an // action is allowed on a resource based on a principal's (user or group) grants. type ACL struct { scopeMap map[string][]Grant } // ACLResults provides a type for the permission's engine results so that we can // pass more detailed information along in the future if we want. It was useful // in Vault, may be useful here. type ACLResults struct { Allowed bool // This is included but unexported for testing/debugging scopeMap map[string][]Grant } // Resource defines something within watchtower that requires authorization // capabilities. Resources must have a ScopeId. type Resource struct { // ScopeId is the scope that contains the Resource. ScopeId string // Id is the public id of the resource. Id string // Type of resource. Type string // Pin if defined would constrain the resource within the collection of the // pin id. Pin string } // NewACL creates an ACL from the grants provided. func NewACL(grants ...Grant) ACL { ret := ACL{ scopeMap: make(map[string][]Grant, len(grants)), } for _, grant := range grants { ret.scopeMap[grant.scope.Id] = append(ret.scopeMap[grant.scope.Id], grant) } return ret } // Allowed determines if the grants for an ACL allow an action for a resource. func (a ACL) Allowed(resource Resource, action iam.Action) (results ACLResults) { // First, get the grants within the specified scope grants := a.scopeMap[resource.ScopeId] results.scopeMap = a.scopeMap // Now, go through and check the cases indicated above for _, grant := range grants { if !(grant.actions[action] || grant.actions[iam.ActionAll]) { continue } switch { // type=;actions= case grant.id == "" && grant.typ == resource.Type: results.Allowed = true return // id=;actions= case (grant.id == resource.Id || grant.id == "*") && grant.typ == "": results.Allowed = true return // id=;type=;actions= case grant.id == resource.Pin && grant.typ == resource.Type: results.Allowed = true return } } return }