Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 1 | package security |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 2 | |
| 3 | import ( |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 4 | "bytes" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 5 | "errors" |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 6 | "fmt" |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 7 | "sort" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 8 | "sync" |
| 9 | |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 10 | "v.io/core/veyron/security/serialization" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 11 | |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 12 | "v.io/core/veyron2/security" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 13 | ) |
| 14 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 15 | // blessingRoots implements security.BlessingRoots. |
| 16 | type blessingRoots struct { |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 17 | persistedData SerializerReaderWriter |
| 18 | signer serialization.Signer |
| 19 | mu sync.RWMutex |
| 20 | store map[string][]security.BlessingPattern // GUARDED_BY(mu) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 21 | } |
| 22 | |
| 23 | func storeMapKey(root security.PublicKey) (string, error) { |
| 24 | rootBytes, err := root.MarshalBinary() |
| 25 | if err != nil { |
| 26 | return "", err |
| 27 | } |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 28 | return string(rootBytes), nil |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 29 | } |
| 30 | |
| 31 | func (br *blessingRoots) Add(root security.PublicKey, pattern security.BlessingPattern) error { |
| 32 | key, err := storeMapKey(root) |
| 33 | if err != nil { |
| 34 | return err |
| 35 | } |
| 36 | |
| 37 | br.mu.Lock() |
| 38 | defer br.mu.Unlock() |
| 39 | patterns := br.store[key] |
| 40 | for _, p := range patterns { |
| 41 | if p == pattern { |
| 42 | return nil |
| 43 | } |
| 44 | } |
| 45 | br.store[key] = append(patterns, pattern) |
| 46 | |
| 47 | if err := br.save(); err != nil { |
| 48 | br.store[key] = patterns[:len(patterns)-1] |
| 49 | return err |
| 50 | } |
| 51 | return nil |
| 52 | } |
| 53 | |
| 54 | func (br *blessingRoots) Recognized(root security.PublicKey, blessing string) error { |
| 55 | key, err := storeMapKey(root) |
| 56 | if err != nil { |
| 57 | return err |
| 58 | } |
| 59 | |
| 60 | br.mu.RLock() |
| 61 | defer br.mu.RUnlock() |
| 62 | for _, p := range br.store[key] { |
| 63 | if p.MatchedBy(blessing) { |
| 64 | return nil |
| 65 | } |
| 66 | } |
| 67 | return errors.New("PublicKey is not a recognized root for this blessing") |
| 68 | } |
| 69 | |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 70 | // DebugString return a human-readable string encoding of the roots |
| 71 | // DebugString encodes all roots into a string in the following |
| 72 | // format |
| 73 | // |
| 74 | // Public key : Pattern |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 75 | // <public key> : <patterns> |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 76 | // ... |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 77 | // <public key> : <patterns> |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 78 | func (br *blessingRoots) DebugString() string { |
| 79 | const format = "%-47s : %s\n" |
| 80 | b := bytes.NewBufferString(fmt.Sprintf(format, "Public key", "Pattern")) |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 81 | var s rootSorter |
| 82 | for keyBytes, patterns := range br.store { |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 83 | key, err := security.UnmarshalPublicKey([]byte(keyBytes)) |
| 84 | if err != nil { |
| 85 | return fmt.Sprintf("failed to decode public key: %v", err) |
| 86 | } |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 87 | s = append(s, &root{key, fmt.Sprintf("%v", patterns)}) |
| 88 | } |
| 89 | sort.Sort(s) |
| 90 | for _, r := range s { |
| 91 | b.WriteString(fmt.Sprintf(format, r.key, r.patterns)) |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 92 | } |
| 93 | return b.String() |
| 94 | } |
| 95 | |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 96 | type root struct { |
| 97 | key security.PublicKey |
| 98 | patterns string |
| 99 | } |
| 100 | |
| 101 | type rootSorter []*root |
| 102 | |
| 103 | func (s rootSorter) Len() int { return len(s) } |
| 104 | func (s rootSorter) Less(i, j int) bool { return s[i].patterns < s[j].patterns } |
| 105 | func (s rootSorter) Swap(i, j int) { s[i], s[j] = s[j], s[i] } |
| 106 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 107 | func (br *blessingRoots) save() error { |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 108 | if (br.signer == nil) && (br.persistedData == nil) { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 109 | return nil |
| 110 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 111 | data, signature, err := br.persistedData.Writers() |
| 112 | if err != nil { |
| 113 | return err |
| 114 | } |
| 115 | return encodeAndStore(br.store, data, signature, br.signer) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 116 | } |
| 117 | |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 118 | // newInMemoryBlessingRoots returns an in-memory security.BlessingRoots. |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 119 | // |
| 120 | // The returned BlessingRoots is initialized with an empty set of keys. |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 121 | func newInMemoryBlessingRoots() security.BlessingRoots { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 122 | return &blessingRoots{ |
| 123 | store: make(map[string][]security.BlessingPattern), |
| 124 | } |
| 125 | } |
| 126 | |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 127 | // newPersistingBlessingRoots returns a security.BlessingRoots for a principal |
| 128 | // that is initialized with the persisted data. The returned security.BlessingRoots |
| 129 | // also persists any updates to its state. |
| 130 | func newPersistingBlessingRoots(persistedData SerializerReaderWriter, signer serialization.Signer) (security.BlessingRoots, error) { |
| 131 | if persistedData == nil || signer == nil { |
| 132 | return nil, errors.New("persisted data or signer is not specified") |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 133 | } |
| 134 | br := &blessingRoots{ |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 135 | store: make(map[string][]security.BlessingPattern), |
| 136 | persistedData: persistedData, |
| 137 | signer: signer, |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 138 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 139 | data, signature, err := br.persistedData.Readers() |
| 140 | if err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 141 | return nil, err |
| 142 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 143 | if (data != nil) && (signature != nil) { |
| 144 | if err := decodeFromStorage(&br.store, data, signature, br.signer.PublicKey()); err != nil { |
| 145 | return nil, err |
| 146 | } |
| 147 | } |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 148 | return br, nil |
| 149 | } |