Documentation ¶
Index ¶
- Constants
- Variables
- func AssertPolicyEqual(t *testing.T, expected, got Policy)
- func NewErrResourceNotFound(err error) error
- func TestHelperCreateGetDelete(s Manager) func(t *testing.T)
- func TestHelperFindPoliciesForSubject(k string, s Manager) func(t *testing.T)
- func TestHelperGetErrors(s Manager) func(t *testing.T)
- type AuditLogger
- type AuditLoggerInfo
- type AuditLoggerNoOp
- type CIDRCondition
- type Condition
- type Conditions
- type Context
- type DefaultPolicy
- func (p *DefaultPolicy) AllowAccess() bool
- func (p *DefaultPolicy) GetActions() []string
- func (p *DefaultPolicy) GetConditions() Conditions
- func (p *DefaultPolicy) GetDescription() string
- func (p *DefaultPolicy) GetEffect() string
- func (p *DefaultPolicy) GetEndDelimiter() byte
- func (p *DefaultPolicy) GetID() string
- func (p *DefaultPolicy) GetResources() []string
- func (p *DefaultPolicy) GetStartDelimiter() byte
- func (p *DefaultPolicy) GetSubjects() []string
- func (p *DefaultPolicy) UnmarshalJSON(data []byte) error
- type EqualsSubjectCondition
- type Ladon
- type Manager
- type ManagerMigrator
- type Policies
- type Policy
- type RegexpMatcher
- type Request
- type StringEqualCondition
- type StringMatchCondition
- type StringPairsEqualCondition
- type Warden
Constants ¶
const AllowAccess = "allow"
AllowAccess should be used as effect for policies that allow access.
const DenyAccess = "deny"
DenyAccess should be used as effect for policies that deny access.
Variables ¶
var ( // ErrRequestDenied is returned when an access request can not be satisfied by any policy. ErrRequestDenied = errors.WithStack(&errorWithContext{ error: errors.New("Request was denied by default"), code: http.StatusForbidden, status: http.StatusText(http.StatusForbidden), reason: "The request was denied because no matching policy was found.", }) // ErrRequestForcefullyDenied is returned when an access request is explicitly denied by a policy. ErrRequestForcefullyDenied = errors.WithStack(&errorWithContext{ error: errors.New("Request was forcefully denied"), code: http.StatusForbidden, status: http.StatusText(http.StatusForbidden), reason: "The request was denied because a policy denied request.", }) // ErrNotFound is returned when a resource can not be found. ErrNotFound = errors.WithStack(&errorWithContext{ error: errors.New("Resource could not be found"), code: http.StatusNotFound, status: http.StatusText(http.StatusNotFound), }) )
var ConditionFactories = map[string]func() Condition{ new(StringEqualCondition).GetName(): func() Condition { return new(StringEqualCondition) }, new(CIDRCondition).GetName(): func() Condition { return new(CIDRCondition) }, new(EqualsSubjectCondition).GetName(): func() Condition { return new(EqualsSubjectCondition) }, new(StringPairsEqualCondition).GetName(): func() Condition { return new(StringPairsEqualCondition) }, new(StringMatchCondition).GetName(): func() Condition { return new(StringMatchCondition) }, }
ConditionFactories is where you can add custom conditions
var DefaultAuditLogger = &AuditLoggerNoOp{}
var DefaultMatcher = NewRegexpMatcher(512)
var TestManagerPolicies = []*DefaultPolicy{ { ID: uuid.New(), Description: "description", Subjects: []string{"user", "anonymous"}, Effect: AllowAccess, Resources: []string{"article", "user"}, Actions: []string{"create", "update"}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{}, Effect: AllowAccess, Resources: []string{"<article|user>"}, Actions: []string{"view"}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{}, Effect: AllowAccess, Resources: []string{}, Actions: []string{"view"}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{}, Effect: AllowAccess, Resources: []string{}, Actions: []string{}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{}, Effect: AllowAccess, Resources: []string{"foo"}, Actions: []string{}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{"foo"}, Effect: AllowAccess, Resources: []string{"foo"}, Actions: []string{}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{"foo"}, Effect: AllowAccess, Resources: []string{}, Actions: []string{}, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Effect: AllowAccess, Conditions: Conditions{}, }, { ID: uuid.New(), Description: "description", Subjects: []string{"<peter|max>"}, Effect: DenyAccess, Resources: []string{"article", "user"}, Actions: []string{"view"}, Conditions: Conditions{ "owner": &EqualsSubjectCondition{}, }, }, { ID: uuid.New(), Description: "description", Subjects: []string{"<user|max|anonymous>", "peter"}, Effect: DenyAccess, Resources: []string{".*"}, Actions: []string{"disable"}, Conditions: Conditions{ "ip": &CIDRCondition{ CIDR: "1234", }, "owner": &EqualsSubjectCondition{}, }, }, { ID: uuid.New(), Description: "description", Subjects: []string{"<.*>"}, Effect: AllowAccess, Resources: []string{"<article|user>"}, Actions: []string{"view"}, Conditions: Conditions{ "ip": &CIDRCondition{ CIDR: "1234", }, "owner": &EqualsSubjectCondition{}, }, }, { ID: uuid.New(), Description: "description", Subjects: []string{"<us[er]+>"}, Effect: AllowAccess, Resources: []string{"<article|user>"}, Actions: []string{"view"}, Conditions: Conditions{ "ip": &CIDRCondition{ CIDR: "1234", }, "owner": &EqualsSubjectCondition{}, }, }, }
Functions ¶
func AssertPolicyEqual ¶ added in v0.7.6
func NewErrResourceNotFound ¶ added in v0.6.0
func TestHelperCreateGetDelete ¶ added in v0.7.6
func TestHelperFindPoliciesForSubject ¶ added in v0.7.6
func TestHelperGetErrors ¶ added in v0.7.6
Types ¶
type AuditLogger ¶ added in v0.8.5
type AuditLogger interface { LogRejectedAccessRequest(request *Request, pool Policies, deciders Policies) LogGrantedAccessRequest(request *Request, pool Policies, deciders Policies) }
AuditLogger tracks denied and granted authorizations.
type AuditLoggerInfo ¶ added in v0.8.5
AuditLoggerInfo outputs information about granting or rejecting policies.
func (*AuditLoggerInfo) LogGrantedAccessRequest ¶ added in v0.8.5
func (a *AuditLoggerInfo) LogGrantedAccessRequest(r *Request, p Policies, d Policies)
func (*AuditLoggerInfo) LogRejectedAccessRequest ¶ added in v0.8.5
func (a *AuditLoggerInfo) LogRejectedAccessRequest(r *Request, p Policies, d Policies)
type AuditLoggerNoOp ¶ added in v0.8.5
type AuditLoggerNoOp struct{}
AuditLoggerNoOp is the default AuditLogger, that tracks nothing.
func (*AuditLoggerNoOp) LogGrantedAccessRequest ¶ added in v0.8.5
func (*AuditLoggerNoOp) LogGrantedAccessRequest(r *Request, p Policies, d Policies)
func (*AuditLoggerNoOp) LogRejectedAccessRequest ¶ added in v0.8.5
func (*AuditLoggerNoOp) LogRejectedAccessRequest(r *Request, p Policies, d Policies)
type CIDRCondition ¶
type CIDRCondition struct {
CIDR string `json:"cidr"`
}
CIDRCondition makes sure that the warden requests' IP address is in the given CIDR.
func (*CIDRCondition) Fulfills ¶
func (c *CIDRCondition) Fulfills(value interface{}, _ *Request) bool
Fulfills returns true if the the request is fulfilled by the condition.
func (*CIDRCondition) GetName ¶
func (c *CIDRCondition) GetName() string
GetName returns the condition's name.
type Condition ¶
type Condition interface { // GetName returns the condition's name. GetName() string // Fulfills returns true if the request is fulfilled by the condition. Fulfills(interface{}, *Request) bool }
Condition either do or do not fulfill an access request.
type Conditions ¶
Conditions is a collection of conditions.
func (Conditions) AddCondition ¶
func (cs Conditions) AddCondition(key string, c Condition)
AddCondition adds a condition to the collection.
func (Conditions) MarshalJSON ¶
func (cs Conditions) MarshalJSON() ([]byte, error)
MarshalJSON marshals a list of conditions to json.
func (Conditions) UnmarshalJSON ¶
func (cs Conditions) UnmarshalJSON(data []byte) error
UnmarshalJSON unmarshals a list of conditions from json.
type DefaultPolicy ¶
type DefaultPolicy struct { ID string `json:"id" gorethink:"id"` Description string `json:"description" gorethink:"description"` Subjects []string `json:"subjects" gorethink:"subjects"` Effect string `json:"effect" gorethink:"effect"` Resources []string `json:"resources" gorethink:"resources"` Actions []string `json:"actions" gorethink:"actions"` Conditions Conditions `json:"conditions" gorethink:"conditions"` }
DefaultPolicy is the default implementation of the policy interface.
func (*DefaultPolicy) AllowAccess ¶
func (p *DefaultPolicy) AllowAccess() bool
AllowAccess returns true if the policy effect is allow, otherwise false.
func (*DefaultPolicy) GetActions ¶
func (p *DefaultPolicy) GetActions() []string
GetActions returns the policies actions.
func (*DefaultPolicy) GetConditions ¶
func (p *DefaultPolicy) GetConditions() Conditions
GetConditions returns the policies conditions.
func (*DefaultPolicy) GetDescription ¶
func (p *DefaultPolicy) GetDescription() string
GetDescription returns the policies description.
func (*DefaultPolicy) GetEffect ¶
func (p *DefaultPolicy) GetEffect() string
GetEffect returns the policies effect which might be 'allow' or 'deny'.
func (*DefaultPolicy) GetEndDelimiter ¶
func (p *DefaultPolicy) GetEndDelimiter() byte
GetEndDelimiter returns the delimiter which identifies the end of a regular expression.
func (*DefaultPolicy) GetResources ¶
func (p *DefaultPolicy) GetResources() []string
GetResources returns the policies resources.
func (*DefaultPolicy) GetStartDelimiter ¶
func (p *DefaultPolicy) GetStartDelimiter() byte
GetStartDelimiter returns the delimiter which identifies the beginning of a regular expression.
func (*DefaultPolicy) GetSubjects ¶
func (p *DefaultPolicy) GetSubjects() []string
GetSubjects returns the policies subjects.
func (*DefaultPolicy) UnmarshalJSON ¶
func (p *DefaultPolicy) UnmarshalJSON(data []byte) error
UnmarshalJSON overwrite own policy with values of the given in policy in JSON format
type EqualsSubjectCondition ¶
type EqualsSubjectCondition struct{}
EqualsSubjectCondition is a condition which is fulfilled if the request's subject is equal to the given value string
func (*EqualsSubjectCondition) Fulfills ¶
func (c *EqualsSubjectCondition) Fulfills(value interface{}, r *Request) bool
Fulfills returns true if the request's subject is equal to the given value string
func (*EqualsSubjectCondition) GetName ¶
func (c *EqualsSubjectCondition) GetName() string
GetName returns the condition's name.
type Ladon ¶
type Ladon struct { Manager Manager Matcher matcher AuditLogger AuditLogger }
Ladon is an implementation of Warden.
func (*Ladon) DoPoliciesAllow ¶ added in v0.8.3
DoPoliciesAllow returns nil if subject s has permission p on resource r with context c for a given policy list or an error otherwise. The IsAllowed interface should be preferred since it uses the manager directly. This is a lower level interface for when you don't want to use the ladon manager.
type Manager ¶
type Manager interface { // Create persists the policy. Create(policy Policy) error // Update updates an existing policy. Update(policy Policy) error // Get retrieves a policy. Get(id string) (Policy, error) // Delete removes a policy. Delete(id string) error // GetAll retrieves all policies. GetAll(limit, offset int64) (Policies, error) // FindRequestCandidates returns candidates that could match the request object. It either returns // a set that exactly matches the request, or a superset of it. If an error occurs, it returns nil and // the error. FindRequestCandidates(r *Request) (Policies, error) }
Manager is responsible for managing and persisting policies.
type ManagerMigrator ¶ added in v0.6.0
type Policy ¶
type Policy interface { // GetID returns the policies id. GetID() string // GetDescription returns the policies description. GetDescription() string // GetSubjects returns the policies subjects. GetSubjects() []string // AllowAccess returns true if the policy effect is allow, otherwise false. AllowAccess() bool // GetEffect returns the policies effect which might be 'allow' or 'deny'. GetEffect() string // GetResources returns the policies resources. GetResources() []string // GetActions returns the policies actions. GetActions() []string // GetConditions returns the policies conditions. GetConditions() Conditions // GetStartDelimiter returns the delimiter which identifies the beginning of a regular expression. GetStartDelimiter() byte // GetEndDelimiter returns the delimiter which identifies the end of a regular expression. GetEndDelimiter() byte }
Policy represent a policy model.
type RegexpMatcher ¶ added in v0.6.0
func NewRegexpMatcher ¶ added in v0.6.0
func NewRegexpMatcher(size int) *RegexpMatcher
type Request ¶
type Request struct { // Resource is the resource that access is requested to. Resource string `json:"resource"` // Action is the action that is requested on the resource. Action string `json:"action"` // Subejct is the subject that is requesting access. Subject string `json:"subject"` // Context is the request's environmental context. Context Context `json:"context"` }
Request is the warden's request object.
type StringEqualCondition ¶
type StringEqualCondition struct {
Equals string `json:"equals"`
}
StringEqualCondition is a condition which is fulfilled if the given string value is the same as specified in StringEqualCondition
func (*StringEqualCondition) Fulfills ¶
func (c *StringEqualCondition) Fulfills(value interface{}, _ *Request) bool
Fulfills returns true if the given value is a string and is the same as in StringEqualCondition.Equals
func (*StringEqualCondition) GetName ¶
func (c *StringEqualCondition) GetName() string
GetName returns the condition's name.
type StringMatchCondition ¶ added in v0.8.2
type StringMatchCondition struct {
Matches string `json:"matches"`
}
StringMatchCondition is a condition which is fulfilled if the given string value matches the regex pattern specified in StringMatchCondition
func (*StringMatchCondition) Fulfills ¶ added in v0.8.2
func (c *StringMatchCondition) Fulfills(value interface{}, _ *Request) bool
Fulfills returns true if the given value is a string and matches the regex pattern in StringMatchCondition.Matches
func (*StringMatchCondition) GetName ¶ added in v0.8.2
func (c *StringMatchCondition) GetName() string
GetName returns the condition's name.
type StringPairsEqualCondition ¶ added in v0.4.3
type StringPairsEqualCondition struct{}
StringPairsEqualCondition is a condition which is fulfilled if the given array of pairs contains two-element string arrays where both elements in the string array are equal
func (*StringPairsEqualCondition) Fulfills ¶ added in v0.4.3
func (c *StringPairsEqualCondition) Fulfills(value interface{}, _ *Request) bool
Fulfills returns true if the given value is an array of string arrays and each string array has exactly two values which are equal
func (*StringPairsEqualCondition) GetName ¶ added in v0.4.3
func (c *StringPairsEqualCondition) GetName() string
GetName returns the condition's name.
type Warden ¶
type Warden interface { // IsAllowed returns nil if subject s can perform action a on resource r with context c or an error otherwise. // if err := guard.IsAllowed(&Request{Resource: "article/1234", Action: "update", Subject: "peter"}); err != nil { // return errors.New("Not allowed") // } IsAllowed(r *Request) error }
Warden is responsible for deciding if subject s can perform action a on resource r with context c.
Source Files ¶
- audit_logger.go
- audit_logger_info.go
- audit_logger_noop.go
- condition.go
- condition_cidr.go
- condition_string_equal.go
- condition_string_match.go
- condition_string_pairs_equal.go
- condition_subject_equal.go
- const.go
- context.go
- errors.go
- ladon.go
- manager.go
- manager_migrator.go
- manager_test_helper.go
- matcher.go
- matcher_regexp.go
- policy.go
- warden.go