Jiri Simsa | d7616c9 | 2015-03-24 23:44:30 -0700 | [diff] [blame] | 1 | // Copyright 2015 The Vanadium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
| 4 | |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 5 | package security |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 6 | |
| 7 | import ( |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 8 | "bytes" |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 9 | "fmt" |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 10 | "sort" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 11 | "sync" |
| 12 | |
Jiri Simsa | 6ac9522 | 2015-02-23 16:11:49 -0800 | [diff] [blame] | 13 | "v.io/v23/security" |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 14 | "v.io/v23/verror" |
Ankur | 9e5b772 | 2015-04-28 15:00:25 -0700 | [diff] [blame] | 15 | "v.io/x/lib/vlog" |
Todd Wang | b351149 | 2015-04-07 23:32:34 -0700 | [diff] [blame] | 16 | "v.io/x/ref/lib/security/serialization" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 17 | ) |
| 18 | |
Ankur | 344bbdf | 2015-05-07 18:26:15 -0700 | [diff] [blame] | 19 | var errRootsAddPattern = verror.Register(pkgPath+".errRootsAddPattern", verror.NoRetry, "{1:}{2:} a root cannot be recognized for all blessing names (i.e., the pattern '...')") |
| 20 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 21 | // blessingRoots implements security.BlessingRoots. |
| 22 | type blessingRoots struct { |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 23 | persistedData SerializerReaderWriter |
| 24 | signer serialization.Signer |
| 25 | mu sync.RWMutex |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 26 | state blessingRootsState // GUARDED_BY(mu) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 27 | } |
| 28 | |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 29 | func stateMapKey(root security.PublicKey) (string, error) { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 30 | rootBytes, err := root.MarshalBinary() |
| 31 | if err != nil { |
| 32 | return "", err |
| 33 | } |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 34 | return string(rootBytes), nil |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 35 | } |
| 36 | |
| 37 | func (br *blessingRoots) Add(root security.PublicKey, pattern security.BlessingPattern) error { |
Ankur | 344bbdf | 2015-05-07 18:26:15 -0700 | [diff] [blame] | 38 | if pattern == security.AllPrincipals { |
| 39 | return verror.New(errRootsAddPattern, nil) |
| 40 | } |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 41 | key, err := stateMapKey(root) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 42 | if err != nil { |
| 43 | return err |
| 44 | } |
| 45 | |
| 46 | br.mu.Lock() |
| 47 | defer br.mu.Unlock() |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 48 | patterns := br.state[key] |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 49 | for _, p := range patterns { |
| 50 | if p == pattern { |
| 51 | return nil |
| 52 | } |
| 53 | } |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 54 | br.state[key] = append(patterns, pattern) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 55 | |
| 56 | if err := br.save(); err != nil { |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 57 | br.state[key] = patterns[:len(patterns)-1] |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 58 | return err |
| 59 | } |
Ankur | 9e5b772 | 2015-04-28 15:00:25 -0700 | [diff] [blame] | 60 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 61 | return nil |
| 62 | } |
| 63 | |
| 64 | func (br *blessingRoots) Recognized(root security.PublicKey, blessing string) error { |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 65 | key, err := stateMapKey(root) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 66 | if err != nil { |
| 67 | return err |
| 68 | } |
| 69 | |
| 70 | br.mu.RLock() |
| 71 | defer br.mu.RUnlock() |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 72 | for _, p := range br.state[key] { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 73 | if p.MatchedBy(blessing) { |
| 74 | return nil |
| 75 | } |
| 76 | } |
Asim Shankar | 3c134af | 2015-03-23 19:41:31 -0700 | [diff] [blame] | 77 | return security.NewErrUnrecognizedRoot(nil, root.String(), nil) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 78 | } |
| 79 | |
Ankur | 9e5b772 | 2015-04-28 15:00:25 -0700 | [diff] [blame] | 80 | func (br *blessingRoots) Dump() map[security.BlessingPattern][]security.PublicKey { |
| 81 | dump := make(map[security.BlessingPattern][]security.PublicKey) |
| 82 | br.mu.RLock() |
| 83 | defer br.mu.RUnlock() |
| 84 | for keyStr, patterns := range br.state { |
| 85 | key, err := security.UnmarshalPublicKey([]byte(keyStr)) |
| 86 | if err != nil { |
| 87 | vlog.Errorf("security.UnmarshalPublicKey(%v) returned error: %v", []byte(keyStr), err) |
| 88 | return nil |
| 89 | } |
| 90 | for _, p := range patterns { |
| 91 | dump[p] = append(dump[p], key) |
| 92 | } |
| 93 | } |
| 94 | return dump |
| 95 | } |
| 96 | |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 97 | // DebugString return a human-readable string encoding of the roots |
| 98 | // DebugString encodes all roots into a string in the following |
| 99 | // format |
| 100 | // |
Suharsh Sivakumar | 4bbe8ed | 2015-04-09 14:21:44 -0700 | [diff] [blame] | 101 | // Public key Pattern |
| 102 | // <public key> <patterns> |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 103 | // ... |
Suharsh Sivakumar | 4bbe8ed | 2015-04-09 14:21:44 -0700 | [diff] [blame] | 104 | // <public key> <patterns> |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 105 | func (br *blessingRoots) DebugString() string { |
Suharsh Sivakumar | 4bbe8ed | 2015-04-09 14:21:44 -0700 | [diff] [blame] | 106 | const format = "%-47s %s\n" |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 107 | b := bytes.NewBufferString(fmt.Sprintf(format, "Public key", "Pattern")) |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 108 | var s rootSorter |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 109 | for keyBytes, patterns := range br.state { |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 110 | key, err := security.UnmarshalPublicKey([]byte(keyBytes)) |
| 111 | if err != nil { |
| 112 | return fmt.Sprintf("failed to decode public key: %v", err) |
| 113 | } |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 114 | s = append(s, &root{key, fmt.Sprintf("%v", patterns)}) |
| 115 | } |
| 116 | sort.Sort(s) |
| 117 | for _, r := range s { |
| 118 | b.WriteString(fmt.Sprintf(format, r.key, r.patterns)) |
Ankur | 1615a7d | 2014-10-09 11:58:02 -0700 | [diff] [blame] | 119 | } |
| 120 | return b.String() |
| 121 | } |
| 122 | |
Asim Shankar | f11b1bc | 2014-11-12 17:18:45 -0800 | [diff] [blame] | 123 | type root struct { |
| 124 | key security.PublicKey |
| 125 | patterns string |
| 126 | } |
| 127 | |
| 128 | type rootSorter []*root |
| 129 | |
| 130 | func (s rootSorter) Len() int { return len(s) } |
| 131 | func (s rootSorter) Less(i, j int) bool { return s[i].patterns < s[j].patterns } |
| 132 | func (s rootSorter) Swap(i, j int) { s[i], s[j] = s[j], s[i] } |
| 133 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 134 | func (br *blessingRoots) save() error { |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 135 | if (br.signer == nil) && (br.persistedData == nil) { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 136 | return nil |
| 137 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 138 | data, signature, err := br.persistedData.Writers() |
| 139 | if err != nil { |
| 140 | return err |
| 141 | } |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 142 | return encodeAndStore(br.state, data, signature, br.signer) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 143 | } |
| 144 | |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 145 | // newInMemoryBlessingRoots returns an in-memory security.BlessingRoots. |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 146 | // |
| 147 | // The returned BlessingRoots is initialized with an empty set of keys. |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 148 | func newInMemoryBlessingRoots() security.BlessingRoots { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 149 | return &blessingRoots{ |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 150 | state: make(blessingRootsState), |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 151 | } |
| 152 | } |
| 153 | |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 154 | // newPersistingBlessingRoots returns a security.BlessingRoots for a principal |
| 155 | // that is initialized with the persisted data. The returned security.BlessingRoots |
| 156 | // also persists any updates to its state. |
| 157 | func newPersistingBlessingRoots(persistedData SerializerReaderWriter, signer serialization.Signer) (security.BlessingRoots, error) { |
| 158 | if persistedData == nil || signer == nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 159 | return nil, verror.New(errDataOrSignerUnspecified, nil) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 160 | } |
| 161 | br := &blessingRoots{ |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 162 | state: make(blessingRootsState), |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 163 | persistedData: persistedData, |
| 164 | signer: signer, |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 165 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 166 | data, signature, err := br.persistedData.Readers() |
| 167 | if err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 168 | return nil, err |
| 169 | } |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 170 | if (data != nil) && (signature != nil) { |
Ankur | cc04385 | 2015-04-14 13:10:28 -0700 | [diff] [blame] | 171 | if err := decodeFromStorage(&br.state, data, signature, br.signer.PublicKey()); err != nil { |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 172 | return nil, err |
| 173 | } |
| 174 | } |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 175 | return br, nil |
| 176 | } |