| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package rbacutils
- import (
- "yunion.io/x/jsonutils"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/onecloud/pkg/httperrors"
- )
- type TPolicySet []SPolicy
- func (policies TPolicySet) GetMatchRules(service string, resource string, action string, extra ...string) []SPolicyMatch {
- matchRules := make([]SPolicyMatch, 0)
- for i := range policies {
- rule := policies[i].GetMatchRule(service, resource, action, extra...)
- if rule != nil {
- matchRules = append(matchRules, *rule)
- }
- }
- return matchRules
- }
- func DecodePolicySet(jsonObj jsonutils.JSONObject) (TPolicySet, error) {
- jsonArr, err := jsonObj.GetArray()
- if err != nil {
- return nil, errors.Wrap(httperrors.ErrInvalidFormat, "invalid json: not an array")
- }
- set := TPolicySet{}
- for i := range jsonArr {
- policy, err := DecodePolicy(jsonArr[i])
- if err != nil {
- return nil, errors.Wrapf(err, "decode %d", i)
- }
- set = append(set, *policy)
- }
- return set, nil
- }
- func (policies TPolicySet) Encode() jsonutils.JSONObject {
- obj := make([]jsonutils.JSONObject, len(policies))
- for i := range policies {
- obj[i] = policies[i].Encode()
- }
- return jsonutils.NewArray(obj...)
- }
- // Contains of TPolicySet
- //
- // TPolicySet ps1 contains ps2 means any member of ps2 is contained by one of the members of ps1
- func (policies1 TPolicySet) Contains(policies2 TPolicySet) bool {
- for _, ps2 := range policies2 {
- contained := false
- for _, ps1 := range policies1 {
- if ps1.Contains(ps2) {
- contained = true
- break
- }
- }
- if !contained {
- return false
- }
- }
- return true
- }
- // ViolatedBy: policies中deny的权限,但是assign中却是allow
- // if any assign allow, but policies deny
- // OR
- // assign allow, if any policies deny
- /* func (policies TPolicySet) ViolatedBy(assign TPolicySet) bool {
- if policies.violatedBySet(assign, Allow) {
- return true
- }
- if assign.violatedBySet(policies, Deny) {
- return true
- }
- return false
- }
- func (policies TPolicySet) violatedBySet(assign TPolicySet, expect TRbacResult) bool {
- for i := range assign {
- if policies.violatedByPolicy(assign[i], expect) {
- return true
- }
- }
- return false
- }
- func (policies TPolicySet) violatedByPolicy(policy SPolicy, expect TRbacResult) bool {
- for i := range policy.Rules {
- rule := policy.Rules[i]
- if rule.Result != expect {
- continue
- }
- matchRules := policies.GetMatchRules(rule.Service, rule.Resource, rule.Action, rule.Extra...)
- for i := range matchRules {
- }
- matchRule := GetMatchRule(matchRules, rule.Service, rule.Resource, rule.Action, rule.Extra...)
- if expect == Allow && (matchRule == nil || matchRule.Result == Deny) {
- return true
- } else if expect == Deny && matchRule != nil && matchRule.Result == Allow {
- return true
- }
- }
- return false
- }
- */
|