Skip to content

Commit fba8b69

Browse files
committed
Lots of improvements and continuation around suggestions
- Support a new API group (mapping of endpoints to perms) - Blend the RBAC middleware into the Auth middleware (didn't want to dupe logic for protected endpoints... for now)
1 parent 7e6bc69 commit fba8b69

15 files changed

+479
-307
lines changed

apigroup-core.yml

+91
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
name: api-core
2+
endpoints:
3+
# pipelines
4+
"/api/v1/pipeline":
5+
methods:
6+
POST: pipelines/create
7+
GET: pipelines/list
8+
"/api/v1/pipeline/gitlsremote":
9+
methods:
10+
POST: pipelines/create
11+
"/api/v1/pipeline/name":
12+
methods:
13+
GET: pipelines/get
14+
"/api/v1/pipeline/githook":
15+
methods:
16+
POST: pipelines/create
17+
"/api/v1/pipeline/created":
18+
methods:
19+
GET: pipelines/list
20+
"/api/v1/pipeline/latest":
21+
methods:
22+
GET: pipelines/list
23+
"/api/v1/pipeline/:pipelineid":
24+
param: pipelineid
25+
methods:
26+
GET: pipelines/get
27+
PUT: pipelines/update
28+
DELETE: pipelines/delete
29+
"/api/v1/pipeline/:pipelineid/start":
30+
param: pipelineid
31+
methods:
32+
POST: pipelines/start
33+
34+
# pipeline-runs
35+
"/api/v1/pipelinerun/:pipelineid/:runid/stop":
36+
param: pipelineid
37+
methods:
38+
POST: pipeline-runs/stop
39+
"/api/v1/pipelinerun/:pipelineid/:runid":
40+
param: pipelineid
41+
methods:
42+
GET: pipeline-runs/get
43+
"/api/v1/pipelinerun/:pipelineid/latest":
44+
param: pipelineid
45+
methods:
46+
GET: pipeline-runs/get
47+
"/api/v1/pipelinerun/:pipelineid":
48+
param: pipelineid
49+
methods:
50+
GET: pipeline-runs/list
51+
"/api/v1/pipelinerun/:pipelineid/:runid/latest":
52+
param: pipelineid
53+
methods:
54+
GET: pipeline-runs/get
55+
56+
# secrets
57+
"/api/v1/secret":
58+
POST: secrets/create
59+
"/api/v1/secrets":
60+
GET: secrets/list
61+
"/api/v1/secret/:key":
62+
param: key
63+
methods:
64+
DELETE: secrets/delete
65+
"/api/v1/secret/update":
66+
PUT: secrets/update
67+
68+
# users
69+
"/api/v1/user":
70+
POST: users/create
71+
"/api/v1/users":
72+
GET: users/list
73+
"/api/v1/user/password":
74+
POST: users/update
75+
"/api/v1/user/:username":
76+
param: username
77+
methods:
78+
DELETE: users/delete
79+
80+
# workers
81+
"/api/v1/worker/secret":
82+
GET: workers/get
83+
POST: workers/create
84+
"/api/v1/worker/status":
85+
GET: workers/get
86+
"/api/v1/worker":
87+
GET: workers/get
88+
"/api/v1/worker/:workerid":
89+
param: workerid
90+
methods:
91+
DELETE: workers/delete

gaia.go

+13-3
Original file line numberDiff line numberDiff line change
@@ -348,6 +348,17 @@ func (p PipelineType) String() string {
348348
return string(p)
349349
}
350350

351+
// RBACAPIGroup represents API group mappings.
352+
type RBACAPIGroup struct {
353+
Endpoints map[string]RBACAPIGroupEndpoint `yaml:"endpoints"`
354+
}
355+
356+
// RBACAPIGroupEndpoint represents an endpoint within an API group.
357+
type RBACAPIGroupEndpoint struct {
358+
Param string `yaml:"param"`
359+
Methods map[string]string `yaml:"methods"`
360+
}
361+
351362
// ResourceType is the base version and type for a defined resource.
352363
type ResourceType struct {
353364
Version string `yaml:"version"`
@@ -370,9 +381,8 @@ type RBACPolicyResourceV1 struct {
370381
// RBACPolicyStatementV1 is used to define an individual policy statement.
371382
type RBACPolicyStatementV1 struct {
372383
ID string `yaml:"id"`
373-
Effect string `yaml:"effect"`
374384
Action []string `yaml:"action"`
375-
Resource string `yaml:"resource"`
385+
Resource []string `yaml:"resource"`
376386
}
377387

378388
// RBACPolicyNamespace represents a policy namespace.
@@ -385,4 +395,4 @@ type RBACPolicyAction string
385395
type RBACPolicyResource string
386396

387397
// RBACEvaluatedPermissions multiple policies combined and evaluated.
388-
type RBACEvaluatedPermissions map[RBACPolicyNamespace]map[RBACPolicyAction]map[RBACPolicyResource]string
398+
type RBACEvaluatedPermissions map[RBACPolicyNamespace]map[RBACPolicyAction]map[RBACPolicyResource]interface{}

go.mod

-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ require (
1818
github.com/emirpasic/gods v1.9.0 // indirect
1919
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568 // indirect
2020
github.com/gaia-pipeline/flag v1.7.4-pre
21-
github.com/gaia-pipeline/gosdk v0.0.0-20180909192508-cc9f89055777
2221
github.com/gaia-pipeline/protobuf v0.0.0-20180812091451-7be8a901b55a
2322
github.com/gliderlabs/ssh v0.1.1 // indirect
2423
github.com/gofrs/uuid v3.2.0+incompatible

go.sum

-2
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568 h1:BHsljHzVlRcyQhjr
4444
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc=
4545
github.com/gaia-pipeline/flag v1.7.4-pre h1:/TAmHVYVQGE4Mw9xl0Qs0D5UruVDMF95thexyEFbTAY=
4646
github.com/gaia-pipeline/flag v1.7.4-pre/go.mod h1:rLpsWzqOEPa2K0Yl4aC34nmblLpIYjGqjP/srZbYvEk=
47-
github.com/gaia-pipeline/gosdk v0.0.0-20180909192508-cc9f89055777 h1:Gn3nmETr4IE44pIFLeTDNNBBRhNXXh53PqFV23CsVok=
48-
github.com/gaia-pipeline/gosdk v0.0.0-20180909192508-cc9f89055777/go.mod h1:e3TkvPdcdSdHZTgwiS89fs8lJrveYHsGLlz/Q0oXlN8=
4947
github.com/gaia-pipeline/protobuf v0.0.0-20180812091451-7be8a901b55a h1:/5XAmdAyGl4yL9BugdPdBLaXquif1zw6Hih6go8E7Xs=
5048
github.com/gaia-pipeline/protobuf v0.0.0-20180812091451-7be8a901b55a/go.mod h1:H0w7MofSuW53Nz7kesnBdVkvr437flf5B7D9Lcsb+lQ=
5149
github.com/gliderlabs/ssh v0.1.1 h1:j3L6gSLQalDETeEg/Jg0mGY0/y/N6zI2xX1978P0Uqw=

handlers/auth.go

+69-31
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ import (
1313

1414
"github.com/gaia-pipeline/gaia"
1515
"github.com/gaia-pipeline/gaia/helper/rolehelper"
16+
"github.com/gaia-pipeline/gaia/security/rbac"
1617
)
1718

1819
var (
@@ -38,17 +39,9 @@ var (
3839
}
3940
)
4041

41-
// AuthContext is the wrapped context to pass through the echo handlers and middleware. This allows us to bind the user
42-
// RBAC policy names into the server request context.
43-
type AuthContext struct {
44-
echo.Context
45-
username string
46-
policies map[string]interface{}
47-
}
48-
49-
// AuthMiddleware is middleware used for each request. Includes functionality that validates the JWT tokens and user
42+
// Do is middleware used for each request. Includes functionality that validates the JWT tokens and user
5043
// permissions.
51-
func AuthMiddleware(roleAuth *AuthConfig) echo.MiddlewareFunc {
44+
func (a *AuthMiddleware) Do() echo.MiddlewareFunc {
5245
return func(next echo.HandlerFunc) echo.HandlerFunc {
5346
return func(c echo.Context) error {
5447
// Check if it matches an explicit paths
@@ -82,49 +75,94 @@ func AuthMiddleware(roleAuth *AuthConfig) echo.MiddlewareFunc {
8275
policies, okPolicies := claims["policies"]
8376
if okUsername && okPerms && okPolicies && roles != nil {
8477
// Look through the perms until we find that the user has this permission
85-
err := roleAuth.checkRole(roles, c.Request().Method, c.Path())
86-
if err != nil {
87-
return c.String(http.StatusForbidden, fmt.Sprintf("Permission denied for user %s. %s", username, err.Error()))
78+
if err := a.checkRole(roles, c.Request().Method, c.Path()); err != nil {
79+
return c.String(http.StatusForbidden, fmt.Sprintf("Permission denied for user %s: %s", username, err.Error()))
8880
}
8981

90-
policiesFromClaims, err := getPoliciesFromClaims(policies)
91-
if err != nil {
92-
return c.String(http.StatusForbidden, fmt.Sprintf("Permission denied for user %s. %s", username, err.Error()))
82+
if err := a.enforceRBAC(c, username.(string), policies); err != nil {
83+
return c.String(http.StatusForbidden, fmt.Sprintf("Permission denied for user %s: %s", username, err.Error()))
9384
}
9485

95-
ctx := AuthContext{
96-
Context: c,
97-
username: username.(string),
98-
policies: policiesFromClaims,
99-
}
100-
return next(ctx)
86+
return next(c)
10187
}
10288
}
10389
return c.String(http.StatusUnauthorized, errNotAuthorized.Error())
10490
}
10591
}
10692
}
10793

108-
// AuthConfig is a simple config struct to be passed into AuthMiddleware. Currently allows the ability to specify
94+
func (a *AuthMiddleware) enforceRBAC(c echo.Context, username string, policiesFromClaims interface{}) error {
95+
policies, err := getPoliciesFromClaims(policiesFromClaims)
96+
if err != nil {
97+
gaia.Cfg.Logger.Warn("rbac enforcement failed", "error", err.Error(), "username", username)
98+
return errors.New("failed to get policies")
99+
}
100+
101+
group := a.rbacEnforcer.GetDefaultAPIGroup()
102+
103+
endpoint, ok := group.Endpoints[c.Path()]
104+
if !ok {
105+
gaia.Cfg.Logger.Warn("path not mapped to api group", "path", c.Path())
106+
return nil
107+
}
108+
109+
perm, ok := endpoint.Methods[c.Request().Method]
110+
if !ok {
111+
gaia.Cfg.Logger.Warn("method not mapped to api group path", "path", c.Path(), "method", c.Request().Method)
112+
return nil
113+
}
114+
115+
ns, act := rbac.ParseStatementAction(perm)
116+
117+
fullResource := ""
118+
if endpoint.Param != "" {
119+
param := c.Param(endpoint.Param)
120+
if param == "" {
121+
return fmt.Errorf("param %s missing", endpoint.Param)
122+
}
123+
fullResource = fmt.Sprintf("%s/%s/%s", ns, endpoint.Param, param)
124+
}
125+
126+
enfCfg := rbac.EnforcerConfig{
127+
User: rbac.User{
128+
Username: username,
129+
Policies: policies,
130+
},
131+
Namespace: ns,
132+
Action: act,
133+
Resource: gaia.RBACPolicyResource(fullResource),
134+
}
135+
136+
if err := a.rbacEnforcer.Enforce(enfCfg); err != nil {
137+
gaia.Cfg.Logger.Warn("rbac enforcement failed", "error", err.Error(), "username", username, "namespace", ns, "action", act)
138+
return fmt.Errorf("missing required permission %s/%s", ns, act)
139+
}
140+
141+
return nil
142+
}
143+
144+
// AuthMiddleware is a simple config struct to be passed into AuthMiddleware. Currently allows the ability to specify
109145
// the permission roles required for each echo endpoint.
110-
type AuthConfig struct {
146+
type AuthMiddleware struct {
111147
RoleCategories []*gaia.UserRoleCategory
148+
rbacEnforcer rbac.PolicyEnforcer
112149
}
113150

114151
func getPoliciesFromClaims(policyClaims interface{}) (map[string]interface{}, error) {
115152
if policyClaims == nil || reflect.ValueOf(policyClaims).IsNil() {
116-
return nil, errors.New("nil policyClaims")
153+
return nil, errors.New("policyClaims is nil")
117154
}
118-
if _, ok := policyClaims.(map[string]interface{}); !ok {
155+
pc, ok := policyClaims.(map[string]interface{})
156+
if !ok {
119157
return nil, errors.New("policyClaims is not correct type")
120158
}
121-
return policyClaims.(map[string]interface{}), nil
159+
return pc, nil
122160
}
123161

124162
// Finds the required role for the metho & path specified. If it exists we validate that the provided user roles have
125163
// the permission role. If not, error specifying the required role.
126-
func (ra *AuthConfig) checkRole(userRoles interface{}, method, path string) error {
127-
perm := ra.getRequiredRole(method, path)
164+
func (a *AuthMiddleware) checkRole(userRoles interface{}, method, path string) error {
165+
perm := a.getRequiredRole(method, path)
128166
if perm == "" {
129167
return nil
130168
}
@@ -137,8 +175,8 @@ func (ra *AuthConfig) checkRole(userRoles interface{}, method, path string) erro
137175
}
138176

139177
// Iterate over each category to find a permission (if existing) for this API endpoint.
140-
func (ra *AuthConfig) getRequiredRole(method, path string) string {
141-
for _, category := range ra.RoleCategories {
178+
func (a *AuthMiddleware) getRequiredRole(method, path string) string {
179+
for _, category := range a.RoleCategories {
142180
for _, role := range category.Roles {
143181
for _, endpoint := range role.APIEndpoint {
144182
// If the http method & path match then return the role required for this endpoint

0 commit comments

Comments
 (0)