blob: 518fca3f85a3a56a0f7799b591dcdb053e00e249 [file] [log] [blame]
// Package security contains utility testing functions related to
// v.io/v23/security.
//
// Suggested Usage:
//
// Create a new in-memory principal with an empty BlessingStore.
// p := NewPrincipal()
//
// Create a new in-memory principal with self-signed blessing for "alice".
// p := NewPrincipal("alice")
//
// Use a common "identity" provider that blesses other principals allowing
// them to share a single root of trust:
// idp := NewIDProvider("identity_provider")
// p1, p2 := NewPrincipal(), NewPrincipal()
// idp.Bless(p1, "alice") // Providing the blessing "identity_provider/alice" to p1
// idp.Bless(p2, "bob) // Providing the blessing "identity_provider/bob" to p2.
package security
import (
"io/ioutil"
"os"
vsecurity "v.io/x/ref/security"
"v.io/v23/security"
"v.io/v23/services/security/access"
)
func newCredentials() (string, security.Principal) {
dir, err := ioutil.TempDir("", "veyron_credentials")
if err != nil {
panic(err)
}
p, err := vsecurity.CreatePersistentPrincipal(dir, nil)
if err != nil {
panic(err)
}
return dir, p
}
func selfBlessings(p security.Principal, names ...string) security.Blessings {
var blessings security.Blessings
for _, name := range names {
b, err := p.BlessSelf(name)
if err != nil {
panic(err)
}
if blessings, err = security.UnionOfBlessings(blessings, b); err != nil {
panic(err)
}
}
return blessings
}
// NewCredentials generates a directory with a new principal with
// self-signed blessings.
//
// In particular, the principal is initialized with self-signed
// blessings for the provided 'names', marked as default and shareable
// with all peers on the principal's blessing store.
//
// It returns the path to the directory created and the principal.
// The directory can be used as a value for the VEYRON_CREDENTIALS
// environment variable (or the --veyron.credentials flag) used to
// initialize a Runtime.
func NewCredentials(requiredName string, otherNames ...string) (string, security.Principal) {
dir, p := newCredentials()
def := selfBlessings(p, append([]string{requiredName}, otherNames...)...)
SetDefaultBlessings(p, def)
return dir, p
}
// ForkCredentials creates a new Principal with blessings extended
// from those of the parent.
//
// In particular, the principal is initialized with blessings from
// 'parent' under the provided 'extensions', and marked as default and
// shareable with all peers on the principal's blessing store.
func ForkCredentials(parent security.Principal, requiredExtension string, otherExtensions ...string) security.Principal {
p, err := vsecurity.NewPrincipal()
if err != nil {
panic(err)
}
var def security.Blessings
for _, extension := range append([]string{requiredExtension}, otherExtensions...) {
b, err := parent.Bless(p.PublicKey(), parent.BlessingStore().Default(), extension, security.UnconstrainedUse())
if err != nil {
panic(err)
}
if def, err = security.UnionOfBlessings(def, b); err != nil {
panic(err)
}
}
SetDefaultBlessings(p, def)
return p
}
// NewPrincipal creates a new security.Principal.
//
// It also creates self-certified blessings for defaultBlessings and
// marks the union of these blessings as default and shareable with all
// peers on the principal's blessing store.
func NewPrincipal(defaultBlessings ...string) security.Principal {
p, err := vsecurity.NewPrincipal()
if err != nil {
panic(err)
}
def := selfBlessings(p, defaultBlessings...)
SetDefaultBlessings(p, def)
return p
}
// SetDefaultBlessings updates the BlessingStore and BlessingRoots of p
// so that:
// (1) b is revealed to all clients that connect to Servers operated
// by 'p' (BlessingStore.Default)
// (2) b is revealed to all servers that clients connect to on behalf
// of p (BlessingStore.Set(..., security.AllPrincipals))
// (3) p recognizes all blessings that have the same root certificate as b.
// (AddToRoots)
func SetDefaultBlessings(p security.Principal, b security.Blessings) {
if err := p.BlessingStore().SetDefault(b); err != nil {
panic(err)
}
if _, err := p.BlessingStore().Set(b, security.AllPrincipals); err != nil {
panic(err)
}
if err := p.AddToRoots(b); err != nil {
panic(err)
}
}
// SaveAccessListToFile saves the provided AccessList in JSON format to a randomly created
// temporary file, and returns the path to the file. This function is meant
// to be used for testing purposes only, it panics if there is an error. The
// caller must ensure that the created file is removed once it is no longer needed.
func SaveAccessListToFile(acl access.Permissions) string {
f, err := ioutil.TempFile("", "saved_acl")
if err != nil {
panic(err)
}
defer f.Close()
if err := acl.WriteTo(f); err != nil {
defer os.Remove(f.Name())
panic(err)
}
return f.Name()
}
// IDProvider is a convenience wrapper over security.Principal that
// makes a Principal act as an "identity provider" (i.e., provides
// other principals with a blessing from it).
type IDProvider struct {
p security.Principal
b security.Blessings
}
func NewIDProvider(name string) *IDProvider {
p, err := vsecurity.NewPrincipal()
if err != nil {
panic(err)
}
b, err := p.BlessSelf(name)
if err != nil {
panic(err)
}
return &IDProvider{p, b}
}
// Bless sets up the provided principal to use blessings from idp as its
// default.
func (idp *IDProvider) Bless(who security.Principal, extension string, caveats ...security.Caveat) error {
blessings, err := idp.NewBlessings(who, extension, caveats...)
if err != nil {
return err
}
SetDefaultBlessings(who, blessings)
return nil
}
// NewBlessings returns Blessings that extend the identity provider's blessing
// with 'extension' and binds it to 'p.PublicKey'.
func (idp *IDProvider) NewBlessings(p security.Principal, extension string, caveats ...security.Caveat) (security.Blessings, error) {
if len(caveats) == 0 {
caveats = append(caveats, security.UnconstrainedUse())
}
return idp.p.Bless(p.PublicKey(), idp.b, extension, caveats[0], caveats[1:]...)
}
// PublicKey is the public key of the identity provider.
func (idp *IDProvider) PublicKey() security.PublicKey {
return idp.p.PublicKey()
}