From f02bad65a81711f39048c035df2c031c99242860 Mon Sep 17 00:00:00 2001 From: Alex Vanin Date: Thu, 11 Apr 2024 14:31:53 +0300 Subject: [PATCH] [#362] Check user and groups during policy check Signed-off-by: Alex Vanin --- api/middleware/policy.go | 26 ++++++++++++++----- .../policy/morph_rule_chain_storage.go | 14 ++++++---- 2 files changed, 29 insertions(+), 11 deletions(-) diff --git a/api/middleware/policy.go b/api/middleware/policy.go index cde6af5..7b4a2fd 100644 --- a/api/middleware/policy.go +++ b/api/middleware/policy.go @@ -60,7 +60,7 @@ func PolicyCheck(cfg PolicyConfig) Func { func policyCheck(r *http.Request, cfg PolicyConfig) error { reqType, bktName, objName := getBucketObject(r, cfg.Domains) - req, err := getPolicyRequest(r, cfg.FrostfsID, reqType, bktName, objName, cfg.Log) + req, userKey, userGroups, err := getPolicyRequest(r, cfg.FrostfsID, reqType, bktName, objName, cfg.Log) if err != nil { return err } @@ -80,6 +80,19 @@ func policyCheck(r *http.Request, cfg PolicyConfig) error { target.Container = &cnrTarget } + if userKey != nil { + entityName := fmt.Sprintf("%s:%s", reqInfo.Namespace, userKey.Address()) + uTarget := engine.UserTarget(entityName) + target.User = &uTarget + } + + gts := make([]engine.Target, len(userGroups)) + for i, group := range userGroups { + entityName := fmt.Sprintf("%s:%s", reqInfo.Namespace, group) + gts[i] = engine.GroupTarget(entityName) + } + target.Groups = gts + st, found, err := cfg.Storage.IsAllowed(chain.S3, target, req) if err != nil { return err @@ -108,24 +121,25 @@ func policyCheck(r *http.Request, cfg PolicyConfig) error { return nil } -func getPolicyRequest(r *http.Request, frostfsid FrostFSIDInformer, reqType ReqType, bktName string, objName string, log *zap.Logger) (*testutil.Request, error) { +func getPolicyRequest(r *http.Request, frostfsid FrostFSIDInformer, reqType ReqType, bktName string, objName string, log *zap.Logger) (*testutil.Request, *keys.PublicKey, []string, error) { var ( owner string groups []string + pk *keys.PublicKey ) ctx := r.Context() bd, err := GetBoxData(ctx) if err == nil && bd.Gate.BearerToken != nil { - pk, err := keys.NewPublicKeyFromBytes(bd.Gate.BearerToken.SigningKeyBytes(), elliptic.P256()) + pk, err = keys.NewPublicKeyFromBytes(bd.Gate.BearerToken.SigningKeyBytes(), elliptic.P256()) if err != nil { - return nil, fmt.Errorf("parse pubclic key from btoken: %w", err) + return nil, nil, nil, fmt.Errorf("parse pubclic key from btoken: %w", err) } owner = pk.Address() groups, err = frostfsid.GetUserGroupIDs(pk.GetScriptHash()) if err != nil { - return nil, fmt.Errorf("get group ids: %w", err) + return nil, nil, nil, fmt.Errorf("get group ids: %w", err) } } @@ -146,7 +160,7 @@ func getPolicyRequest(r *http.Request, frostfsid FrostFSIDInformer, reqType ReqT s3.PropertyKeyOwner: owner, common.PropertyKeyFrostFSIDGroupID: chain.FormCondSliceContainsValue(groups), }, - ), nil + ), pk, groups, nil } type ReqType int diff --git a/internal/frostfs/policy/morph_rule_chain_storage.go b/internal/frostfs/policy/morph_rule_chain_storage.go index 5684729..1d82617 100644 --- a/internal/frostfs/policy/morph_rule_chain_storage.go +++ b/internal/frostfs/policy/morph_rule_chain_storage.go @@ -117,12 +117,16 @@ func (c *MorphRuleChainStorage) SaveACLChains(cid string, chains []*chain.Chain) } func getKind(target engine.Target) policycontract.Kind { - var kind policycontract.Kind = policycontract.Container - if target.Type != engine.Container { - kind = policycontract.Namespace + switch target.Type { + case engine.Container: + return policycontract.Container + case engine.User: + return 'u' + case engine.Group: + return 'g' + default: + return policycontract.Namespace } - - return kind } func getBucketPolicyName(cnrID cid.ID) []byte {