Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[WIP] Resource yaml based rbac #246

Closed
wants to merge 15 commits into from

Conversation

speza
Copy link
Contributor

@speza speza commented May 8, 2020

Massive WIP.

Description TBD.

Todo:

  • Refinement
  • Proper testing
  • Cache eviction
  • UI (another branch/PR maybe?)

Copy link
Member

@Skarlso Skarlso left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First glance comments. I'll have to do another rounds for a deeper inspection. These are surface remarks for now. :) Generally, I saw what I expect I would see mostly, things I think are missing yet right? Like calling the cache eviction and the likes. Unless my glance missed that :)

handlers/auth.go Outdated
@@ -89,6 +101,17 @@ type AuthConfig struct {
RoleCategories []*gaia.UserRoleCategory
}

func getPoliciesFromClaims(policyClaims interface{}) []string {
policies := []string{}
if policyClaims == nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this could potentially be nil inside the interface, this check will not be enough.

You'll have to also check the value in the interface to be nil or not using reflection.

if policyClaims == nil || reflect.ValueOf(policyClaims).IsNil() {

handlers/auth.go Outdated
if policyClaims == nil {
return policies
}
for _, p := range policyClaims.([]interface{}) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do a type assert here on []interface{} to make sure it doesn't throw a type exception.

handlers/auth.go Outdated
return policies
}
for _, p := range policyClaims.([]interface{}) {
policies = append(policies, p.(string))
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here

handlers/auth.go Outdated
@@ -89,6 +101,17 @@ type AuthConfig struct {
RoleCategories []*gaia.UserRoleCategory
}

func getPoliciesFromClaims(policyClaims interface{}) []string {
policies := []string{}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In this case, I'd prefer a named return value for clarity. But I'll leave it up to you. :)

@@ -2,6 +2,14 @@ package handlers

import (
"net/http"
"time"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please sort the includes according to ( in all other files too ):

  1. stdlib
    empty line
  2. outside libraries
    empty line
  3. external gaia libraries
    empty line
  4. internal gaia libraries.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just need to sort my fmt out, np :)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Skarlso are you doing these manually or using a formatter?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By hand, I'm afraid. 😁

)

// Cache represents the interface for a simple cache.
type Cache interface {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since we know that these will be string values, I think this cache doesn't need to be interface valued, right? Unless I'm missing something and there could be other types values?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought the cache could be generic enough that we could reuse if required?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we'll alter it when we get there I think. :) We might never reuse it. :)

If we would, it's very easy to change it to interface.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure thing 👍

}

type cacheItem struct {
Value interface{}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why are these exported?

// iterate through the user policy names provided
for _, policy := range policyNames {
// get the policy from the service/cache
policyResource, _ := s.svc.GetPolicy(policy)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do check for errors here though... If the policy doesn't exists, this should throw some kind of warning.

for _, stmt := range policyResource.Statement {
// iterate through the actions in the statement
for _, stmtAction := range stmt.Action {
// parse the namespace and action from the statement value
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should refactor this O(n^3)... :))) This should be very quick considering this will happen for every request.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah agreed! This was the first basic impl. Now I have some passing tests I will refactor it for sure,

@speza
Copy link
Contributor Author

speza commented May 10, 2020

First glance comments. I'll have to do another rounds for a deeper inspection. These are surface remarks for now. :) Generally, I saw what I expect I would see mostly, things I think are missing yet right? Like calling the cache eviction and the likes. Unless my glance missed that :)

Yep, correct mate. This was a rough PR that is definitely not ready. I just wanted some thoughts before I carried on. Its suprsingly a lot of code to get this system in! Especially to then refine it. I'd usually do this sort of work in many multiple PRs!

I left a short list of the required work still:

  • Code refinement
  • Testing
  • Cache eviction and update when a resource has been modified
  • UI (another branch/PR maybe?)
  • Think about how we handle default policies for existing users...

@Skarlso
Copy link
Member

Skarlso commented May 10, 2020

@speza Quick question. Did we ever consider using Casbin with echo: https://echo.labstack.com/middleware/casbin-auth

@Skarlso
Copy link
Member

Skarlso commented May 10, 2020

casbin and it's configration based role set + middleware actually looks kind of interesting....
https://casbin.org/docs/en/syntax-for-models

@speza
Copy link
Contributor Author

speza commented May 10, 2020

Hmm @Skarlso. I do remember seeing this in the past. Not for Gaia though. I wonder if this seemed a little heavy weight... but arguably we’re heading towards this now.

speza added 4 commits May 10, 2020 22:23
- Cache evaluated user permissions (all permissions from all policies combined)
- Clear cache when any policy resource is changed
- Rename some bits from Auth to RBAC
- Store RBAC bindings (user policy bindings)
@speza speza force-pushed the resource-yaml-rbac branch from b2c88cc to 18e1884 Compare May 17, 2020 13:15
…encapsulate in service)

- Fixed more failing tests
@speza speza force-pushed the resource-yaml-rbac branch from 18e1884 to 7e6bc69 Compare May 17, 2020 13:34
Copy link
Member

@Skarlso Skarlso left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have some general comments for now and one question regarding the rbac stuff. What do you think?

handlers/auth.go Outdated
Comment on lines 118 to 121
if _, ok := policyClaims.(map[string]interface{}); !ok {
return nil, errors.New("policyClaims is not correct type")
}
return policyClaims.(map[string]interface{}), nil
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
if _, ok := policyClaims.(map[string]interface{}); !ok {
return nil, errors.New("policyClaims is not correct type")
}
return policyClaims.(map[string]interface{}), nil
v, ok := policyClaims.(map[string]interface{})
if !ok {
return nil, errors.New("policyClaims is not correct type")
}
return v, nil

e.DELETE(p+"pipeline/:pipelineid", pipelineProvider.PipelineDelete)
e.POST(p+"pipeline/:pipelineid/start", pipelineProvider.PipelineStart)

e.POST(p+"pipeline", pipelineProvider.CreatePipeline, policyEnforcer.do(rbac.PipelineNamespace, rbac.CreateAction))
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So, I don't think we need this here. You can register a high level rbac middleware and that should just get what resources and actions are available from the rbac policy based on the URI that the middleware gets.

There could be another yaml mapping providing this information. That way, we can change things on the fly and there won't be any need for rebuilding.

What do you think?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let me have a think mate. I did something similar, albeit structs instead of YAML with the old system.

handlers/rbac.go Outdated
}

// RBACPolicyResourcePut creates or updates a new authorization.policy resource.
func (h rbacHandler) RBACPolicyResourcePut(c echo.Context) error {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Handlers in here should be pointer receivers.

func (pe *policyEnforcerMiddleware) do(namespace gaia.RBACPolicyNamespace, action gaia.RBACPolicyAction) echo.MiddlewareFunc {
return func(next echo.HandlerFunc) echo.HandlerFunc {
return func(c echo.Context) error {
if ctx, ok := c.(AuthContext); ok {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is just style, but I would prefer to bail out early if !ok and continue otherwise.

ctx, ok := c.(AuthContext)
if ! ok {
    return c.String(http.StatusInternalServerError, "An error has occurred.")
}
.... rest of the things with `ctx`.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Completely agree. I would usually do this 👍🏻

Comment on lines 30 to 48
func NewCache(expiration time.Duration, interval time.Duration) Cache {
c := &cache{
items: make(map[string]cacheItem),
expiration: expiration,
mu: sync.Mutex{},
}

ticker := time.NewTicker(interval)
go func() {
for {
select {
case <-ticker.C:
c.EvictExpired()
}
}
}()

return c
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this will work the way you think it would. Make it look something like this...

First, have something like Run on cache. With a * function receiver. And there, do this:

	for {
                 c.EvictExpired()

		select {
		case <-time.After(15 * time.Minute):
			// Continue
		}
	}

This will now properly block and wait. And once you return the pointer to cache it will still have a context. So later on, when we want to cancel it for whatever reason, we can do something like this:

	for {
                 c.EvictExpired()

		select {
		case <-time.After(15 * time.Minute):
			// Continue
		case <-ctx.Done():
			// Context canceled
			return
		}
	}

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will take a look. Still getting my head around channels and goroutines!

Comment on lines 52 to 53
defer c.mu.Unlock()
c.mu.Lock()
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please reverse the order to follow sequential reading.

This is probably okay, but first, throws off the reader, second, it's actually risky as in, if there is another defer, and the lock fails with inconsistent mutex state for some reason, you call defer unlock which will case further problems. So, lock then defer unlock please. :)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree here. I think this was just a mistake on my part!

return errActionNotFound
}

if cfg.Resource == "" {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If the resource is empty it's all resources? I would think if the resource is empty, we shouldn't automatically allow all. * should be something very explicit. If new resources are defined, that means nothing is allowed.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep, this was just temporary. I hadn’t got to implementing proper resource authentication yet mate 👍🏻 Was just to unblock testing on!

eval := make(gaia.RBACEvaluatedPermissions)

// Evaluate all the policies, creating a single map and point of reference fro the user.
// This is not particularly efficient O(n2), but we have to parse all namespaces and actions.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

*fro -> for
O(n2) -> O(n^2)

- Support a new API group (mapping of endpoints to perms)
- Blend the RBAC middleware into the Auth middleware (didn't want to dupe logic for protected endpoints... for now)
@speza speza force-pushed the resource-yaml-rbac branch from c2447a3 to fba8b69 Compare May 24, 2020 22:04
@hsluoyz
Copy link

hsluoyz commented May 25, 2020

Hmm @Skarlso. I do remember seeing this in the past. Not for Gaia though. I wonder if this seemed a little heavy weight... but arguably we’re heading towards this now.

@Skarlso @speza Hi guys! I'm Casbin author. I looked through the committed files. And it seems Casbin has already got all functionalities you need. Casbin only has 1 dependency (the evaluator) so it isn't very "heavy" in my sense. Of course, Casbin's code is complex than this PR's code but its correctness is proved by hundreds of test cases in the CI and production use of many companies. But your customized authz code may contain bugs and it's not easy to find them all via code review only. If one bug is not found here, maybe it will be a severe security vulnerability. If we can switch to using Casbin, we are very happy to solve your issues using it and then you can concentrate on your main directions instead of authz.

@Skarlso
Copy link
Member

Skarlso commented May 25, 2020

@hsluoyz Hi!

Absolutely awesome from you to reach out to us. :)

Let us formulate an answer for you and we'll see if you can help out with that or maybe we misunderstood something about Casbin that you could clarify. :)

@speza
Copy link
Contributor Author

speza commented May 25, 2020

Yeah thanks for reaching out @hsluoyz!

I will try and remember my reasons for thinking Casbin was heavy. I definitely think the code I have written here isn’t particularly simple anymore to be honest, and also 100% not a fan of not reinventing the wheel that’s for sure.

@Skarlso Skarlso self-requested a review May 28, 2020 18:52
@speza speza closed this Jun 8, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants