-
Notifications
You must be signed in to change notification settings - Fork 11
/
Copy pathpermcheck.go
94 lines (83 loc) · 2.45 KB
/
permcheck.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
// Copyright 2015 Canonical Ltd.
// Licensed under the LGPLv3, see LICENCE file for details.
package idmclient
import (
"strings"
"time"
"gopkg.in/errgo.v1"
)
// TODO unexport this type - it's best exposed as part of the client API only.
// PermChecker provides a way to query ACLs using the identity client.
type PermChecker struct {
cache *GroupCache
}
// NewPermChecker returns a permission checker
// that uses the given identity client to check permissions.
//
// It will cache results for at most cacheTime.
func NewPermChecker(c *Client, cacheTime time.Duration) *PermChecker {
return &PermChecker{
cache: NewGroupCache(c, cacheTime),
}
}
// NewPermCheckerWithCache returns a new PermChecker using
// the given cache for its group queries.
func NewPermCheckerWithCache(cache *GroupCache) *PermChecker {
return &PermChecker{
cache: cache,
}
}
// trivialAllow reports whether the username should be allowed
// access to the given ACL based on a superficial inspection
// of the ACL. If there is a definite answer, it will return
// a true isTrivial; otherwise it will return (false, false).
func trivialAllow(username string, acl []string) (allow, isTrivial bool) {
if len(acl) == 0 {
return false, true
}
for _, name := range acl {
if name == username {
return true, true
}
suffix := strings.TrimPrefix(name, "everyone")
if len(suffix) == len(name) {
continue
}
if suffix != "" && suffix[0] != '@' {
continue
}
// name is either "everyone" or "everyone@somewhere". We consider
// the user to be part of everyone@somewhere if their username has
// the suffix @somewhere.
if strings.HasSuffix(username, suffix) {
return true, true
}
}
return false, false
}
// Allow reports whether the given ACL admits the user with the given
// name. If the user does not exist and the ACL does not allow username
// or everyone, it will return (false, nil).
func (c *PermChecker) Allow(username string, acl []string) (bool, error) {
if ok, isTrivial := trivialAllow(username, acl); isTrivial {
return ok, nil
}
groups, err := c.cache.groupMap(username)
if err != nil {
return false, errgo.Mask(err)
}
for _, a := range acl {
if groups[a] {
return true, nil
}
}
return false, nil
}
// CacheEvict evicts username from the cache.
func (c *PermChecker) CacheEvict(username string) {
c.cache.CacheEvict(username)
}
// CacheEvictAll evicts everything from the cache.
func (c *PermChecker) CacheEvictAll() {
c.cache.CacheEvictAll()
}