blob: ed4fc0a4df2573b58939c479b67e7cf6f5802e82 [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Asim Shankarae8d4c52014-10-08 13:03:31 -07005package security
Ankur100eb272014-09-15 16:48:12 -07006
7import (
Ankur1615a7d2014-10-09 11:58:02 -07008 "bytes"
Ankur100eb272014-09-15 16:48:12 -07009 "errors"
Ankur1615a7d2014-10-09 11:58:02 -070010 "fmt"
Asim Shankarf11b1bc2014-11-12 17:18:45 -080011 "sort"
Ankur100eb272014-09-15 16:48:12 -070012 "sync"
13
Jiri Simsaffceefa2015-02-28 11:03:34 -080014 "v.io/x/ref/security/serialization"
Ankur100eb272014-09-15 16:48:12 -070015
Jiri Simsa6ac95222015-02-23 16:11:49 -080016 "v.io/v23/security"
Ankur100eb272014-09-15 16:48:12 -070017)
18
Ankur100eb272014-09-15 16:48:12 -070019// blessingRoots implements security.BlessingRoots.
20type blessingRoots struct {
gauthamt1e313bc2014-11-10 15:45:56 -080021 persistedData SerializerReaderWriter
22 signer serialization.Signer
23 mu sync.RWMutex
24 store map[string][]security.BlessingPattern // GUARDED_BY(mu)
Ankur100eb272014-09-15 16:48:12 -070025}
26
27func storeMapKey(root security.PublicKey) (string, error) {
28 rootBytes, err := root.MarshalBinary()
29 if err != nil {
30 return "", err
31 }
Ankur1615a7d2014-10-09 11:58:02 -070032 return string(rootBytes), nil
Ankur100eb272014-09-15 16:48:12 -070033}
34
35func (br *blessingRoots) Add(root security.PublicKey, pattern security.BlessingPattern) error {
36 key, err := storeMapKey(root)
37 if err != nil {
38 return err
39 }
40
41 br.mu.Lock()
42 defer br.mu.Unlock()
43 patterns := br.store[key]
44 for _, p := range patterns {
45 if p == pattern {
46 return nil
47 }
48 }
49 br.store[key] = append(patterns, pattern)
50
51 if err := br.save(); err != nil {
52 br.store[key] = patterns[:len(patterns)-1]
53 return err
54 }
55 return nil
56}
57
58func (br *blessingRoots) Recognized(root security.PublicKey, blessing string) error {
59 key, err := storeMapKey(root)
60 if err != nil {
61 return err
62 }
63
64 br.mu.RLock()
65 defer br.mu.RUnlock()
66 for _, p := range br.store[key] {
67 if p.MatchedBy(blessing) {
68 return nil
69 }
70 }
Asim Shankar3c134af2015-03-23 19:41:31 -070071 return security.NewErrUnrecognizedRoot(nil, root.String(), nil)
Ankur100eb272014-09-15 16:48:12 -070072}
73
Ankur1615a7d2014-10-09 11:58:02 -070074// DebugString return a human-readable string encoding of the roots
75// DebugString encodes all roots into a string in the following
76// format
77//
78// Public key : Pattern
Asim Shankarf11b1bc2014-11-12 17:18:45 -080079// <public key> : <patterns>
Ankur1615a7d2014-10-09 11:58:02 -070080// ...
Asim Shankarf11b1bc2014-11-12 17:18:45 -080081// <public key> : <patterns>
Ankur1615a7d2014-10-09 11:58:02 -070082func (br *blessingRoots) DebugString() string {
83 const format = "%-47s : %s\n"
84 b := bytes.NewBufferString(fmt.Sprintf(format, "Public key", "Pattern"))
Asim Shankarf11b1bc2014-11-12 17:18:45 -080085 var s rootSorter
86 for keyBytes, patterns := range br.store {
Ankur1615a7d2014-10-09 11:58:02 -070087 key, err := security.UnmarshalPublicKey([]byte(keyBytes))
88 if err != nil {
89 return fmt.Sprintf("failed to decode public key: %v", err)
90 }
Asim Shankarf11b1bc2014-11-12 17:18:45 -080091 s = append(s, &root{key, fmt.Sprintf("%v", patterns)})
92 }
93 sort.Sort(s)
94 for _, r := range s {
95 b.WriteString(fmt.Sprintf(format, r.key, r.patterns))
Ankur1615a7d2014-10-09 11:58:02 -070096 }
97 return b.String()
98}
99
Asim Shankarf11b1bc2014-11-12 17:18:45 -0800100type root struct {
101 key security.PublicKey
102 patterns string
103}
104
105type rootSorter []*root
106
107func (s rootSorter) Len() int { return len(s) }
108func (s rootSorter) Less(i, j int) bool { return s[i].patterns < s[j].patterns }
109func (s rootSorter) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
110
Ankur100eb272014-09-15 16:48:12 -0700111func (br *blessingRoots) save() error {
gauthamt1e313bc2014-11-10 15:45:56 -0800112 if (br.signer == nil) && (br.persistedData == nil) {
Ankur100eb272014-09-15 16:48:12 -0700113 return nil
114 }
gauthamt1e313bc2014-11-10 15:45:56 -0800115 data, signature, err := br.persistedData.Writers()
116 if err != nil {
117 return err
118 }
119 return encodeAndStore(br.store, data, signature, br.signer)
Ankur100eb272014-09-15 16:48:12 -0700120}
121
Ankur7c890592014-10-02 11:36:28 -0700122// newInMemoryBlessingRoots returns an in-memory security.BlessingRoots.
Ankur100eb272014-09-15 16:48:12 -0700123//
124// The returned BlessingRoots is initialized with an empty set of keys.
Ankur7c890592014-10-02 11:36:28 -0700125func newInMemoryBlessingRoots() security.BlessingRoots {
Ankur100eb272014-09-15 16:48:12 -0700126 return &blessingRoots{
127 store: make(map[string][]security.BlessingPattern),
128 }
129}
130
gauthamt1e313bc2014-11-10 15:45:56 -0800131// newPersistingBlessingRoots returns a security.BlessingRoots for a principal
132// that is initialized with the persisted data. The returned security.BlessingRoots
133// also persists any updates to its state.
134func newPersistingBlessingRoots(persistedData SerializerReaderWriter, signer serialization.Signer) (security.BlessingRoots, error) {
135 if persistedData == nil || signer == nil {
136 return nil, errors.New("persisted data or signer is not specified")
Ankur100eb272014-09-15 16:48:12 -0700137 }
138 br := &blessingRoots{
gauthamt1e313bc2014-11-10 15:45:56 -0800139 store: make(map[string][]security.BlessingPattern),
140 persistedData: persistedData,
141 signer: signer,
Ankur100eb272014-09-15 16:48:12 -0700142 }
gauthamt1e313bc2014-11-10 15:45:56 -0800143 data, signature, err := br.persistedData.Readers()
144 if err != nil {
Ankur100eb272014-09-15 16:48:12 -0700145 return nil, err
146 }
gauthamt1e313bc2014-11-10 15:45:56 -0800147 if (data != nil) && (signature != nil) {
148 if err := decodeFromStorage(&br.store, data, signature, br.signer.PublicKey()); err != nil {
149 return nil, err
150 }
151 }
Ankur100eb272014-09-15 16:48:12 -0700152 return br, nil
153}