-
Notifications
You must be signed in to change notification settings - Fork 244
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP] Resource yaml based rbac #246
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
First glance comments. I'll have to do another rounds for a deeper inspection. These are surface remarks for now. :) Generally, I saw what I expect I would see mostly, things I think are missing yet right? Like calling the cache eviction and the likes. Unless my glance missed that :)
handlers/auth.go
Outdated
@@ -89,6 +101,17 @@ type AuthConfig struct { | |||
RoleCategories []*gaia.UserRoleCategory | |||
} | |||
|
|||
func getPoliciesFromClaims(policyClaims interface{}) []string { | |||
policies := []string{} | |||
if policyClaims == nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If this could potentially be nil inside the interface, this check will not be enough.
You'll have to also check the value in the interface to be nil or not using reflection.
if policyClaims == nil || reflect.ValueOf(policyClaims).IsNil() {
handlers/auth.go
Outdated
if policyClaims == nil { | ||
return policies | ||
} | ||
for _, p := range policyClaims.([]interface{}) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do a type assert here on []interface{}
to make sure it doesn't throw a type exception.
handlers/auth.go
Outdated
return policies | ||
} | ||
for _, p := range policyClaims.([]interface{}) { | ||
policies = append(policies, p.(string)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same here
handlers/auth.go
Outdated
@@ -89,6 +101,17 @@ type AuthConfig struct { | |||
RoleCategories []*gaia.UserRoleCategory | |||
} | |||
|
|||
func getPoliciesFromClaims(policyClaims interface{}) []string { | |||
policies := []string{} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In this case, I'd prefer a named return value for clarity. But I'll leave it up to you. :)
@@ -2,6 +2,14 @@ package handlers | |||
|
|||
import ( | |||
"net/http" | |||
"time" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please sort the includes according to ( in all other files too ):
- stdlib
empty line - outside libraries
empty line - external gaia libraries
empty line - internal gaia libraries.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just need to sort my fmt out, np :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Skarlso are you doing these manually or using a formatter?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
By hand, I'm afraid. 😁
helper/cachehelper/cachehelper.go
Outdated
) | ||
|
||
// Cache represents the interface for a simple cache. | ||
type Cache interface { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since we know that these will be string values, I think this cache doesn't need to be interface valued, right? Unless I'm missing something and there could be other types values?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I thought the cache could be generic enough that we could reuse if required?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we'll alter it when we get there I think. :) We might never reuse it. :)
If we would, it's very easy to change it to interface.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure thing 👍
helper/cachehelper/cachehelper.go
Outdated
} | ||
|
||
type cacheItem struct { | ||
Value interface{} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why are these exported?
security/rbac/enforcer.go
Outdated
// iterate through the user policy names provided | ||
for _, policy := range policyNames { | ||
// get the policy from the service/cache | ||
policyResource, _ := s.svc.GetPolicy(policy) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do check for errors here though... If the policy doesn't exists, this should throw some kind of warning.
security/rbac/enforcer.go
Outdated
for _, stmt := range policyResource.Statement { | ||
// iterate through the actions in the statement | ||
for _, stmtAction := range stmt.Action { | ||
// parse the namespace and action from the statement value |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should refactor this O(n^3)... :))) This should be very quick considering this will happen for every request.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah agreed! This was the first basic impl. Now I have some passing tests I will refactor it for sure,
Yep, correct mate. This was a rough PR that is definitely not ready. I just wanted some thoughts before I carried on. Its suprsingly a lot of code to get this system in! Especially to then refine it. I'd usually do this sort of work in many multiple PRs! I left a short list of the required work still:
|
@speza Quick question. Did we ever consider using Casbin with echo: https://echo.labstack.com/middleware/casbin-auth |
casbin and it's configration based role set + middleware actually looks kind of interesting.... |
Hmm @Skarlso. I do remember seeing this in the past. Not for Gaia though. I wonder if this seemed a little heavy weight... but arguably we’re heading towards this now. |
- Cache evaluated user permissions (all permissions from all policies combined) - Clear cache when any policy resource is changed - Rename some bits from Auth to RBAC - Store RBAC bindings (user policy bindings)
…encapsulate in service) - Fixed more failing tests
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have some general comments for now and one question regarding the rbac stuff. What do you think?
handlers/auth.go
Outdated
if _, ok := policyClaims.(map[string]interface{}); !ok { | ||
return nil, errors.New("policyClaims is not correct type") | ||
} | ||
return policyClaims.(map[string]interface{}), nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if _, ok := policyClaims.(map[string]interface{}); !ok { | |
return nil, errors.New("policyClaims is not correct type") | |
} | |
return policyClaims.(map[string]interface{}), nil | |
v, ok := policyClaims.(map[string]interface{}) | |
if !ok { | |
return nil, errors.New("policyClaims is not correct type") | |
} | |
return v, nil |
handlers/handler.go
Outdated
e.DELETE(p+"pipeline/:pipelineid", pipelineProvider.PipelineDelete) | ||
e.POST(p+"pipeline/:pipelineid/start", pipelineProvider.PipelineStart) | ||
|
||
e.POST(p+"pipeline", pipelineProvider.CreatePipeline, policyEnforcer.do(rbac.PipelineNamespace, rbac.CreateAction)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So, I don't think we need this here. You can register a high level rbac middleware and that should just get what resources and actions are available from the rbac policy based on the URI that the middleware gets.
There could be another yaml mapping providing this information. That way, we can change things on the fly and there won't be any need for rebuilding.
What do you think?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let me have a think mate. I did something similar, albeit structs instead of YAML with the old system.
handlers/rbac.go
Outdated
} | ||
|
||
// RBACPolicyResourcePut creates or updates a new authorization.policy resource. | ||
func (h rbacHandler) RBACPolicyResourcePut(c echo.Context) error { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Handlers in here should be pointer receivers.
handlers/rbacmiddleware.go
Outdated
func (pe *policyEnforcerMiddleware) do(namespace gaia.RBACPolicyNamespace, action gaia.RBACPolicyAction) echo.MiddlewareFunc { | ||
return func(next echo.HandlerFunc) echo.HandlerFunc { | ||
return func(c echo.Context) error { | ||
if ctx, ok := c.(AuthContext); ok { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is just style, but I would prefer to bail out early if !ok and continue otherwise.
ctx, ok := c.(AuthContext)
if ! ok {
return c.String(http.StatusInternalServerError, "An error has occurred.")
}
.... rest of the things with `ctx`.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Completely agree. I would usually do this 👍🏻
security/rbac/cache.go
Outdated
func NewCache(expiration time.Duration, interval time.Duration) Cache { | ||
c := &cache{ | ||
items: make(map[string]cacheItem), | ||
expiration: expiration, | ||
mu: sync.Mutex{}, | ||
} | ||
|
||
ticker := time.NewTicker(interval) | ||
go func() { | ||
for { | ||
select { | ||
case <-ticker.C: | ||
c.EvictExpired() | ||
} | ||
} | ||
}() | ||
|
||
return c | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think this will work the way you think it would. Make it look something like this...
First, have something like Run
on cache
. With a * function receiver. And there, do this:
for {
c.EvictExpired()
select {
case <-time.After(15 * time.Minute):
// Continue
}
}
This will now properly block and wait. And once you return the pointer to cache it will still have a context. So later on, when we want to cancel it for whatever reason, we can do something like this:
for {
c.EvictExpired()
select {
case <-time.After(15 * time.Minute):
// Continue
case <-ctx.Done():
// Context canceled
return
}
}
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will take a look. Still getting my head around channels and goroutines!
security/rbac/cache.go
Outdated
defer c.mu.Unlock() | ||
c.mu.Lock() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please reverse the order to follow sequential reading.
This is probably okay, but first, throws off the reader, second, it's actually risky as in, if there is another defer, and the lock fails with inconsistent mutex state for some reason, you call defer unlock which will case further problems. So, lock then defer unlock please. :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree here. I think this was just a mistake on my part!
return errActionNotFound | ||
} | ||
|
||
if cfg.Resource == "" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If the resource is empty it's all resources? I would think if the resource is empty, we shouldn't automatically allow all. *
should be something very explicit. If new resources are defined, that means nothing is allowed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yep, this was just temporary. I hadn’t got to implementing proper resource authentication yet mate 👍🏻 Was just to unblock testing on!
security/rbac/enforcer.go
Outdated
eval := make(gaia.RBACEvaluatedPermissions) | ||
|
||
// Evaluate all the policies, creating a single map and point of reference fro the user. | ||
// This is not particularly efficient O(n2), but we have to parse all namespaces and actions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
*fro -> for
O(n2)
-> O(n^2)
- Support a new API group (mapping of endpoints to perms) - Blend the RBAC middleware into the Auth middleware (didn't want to dupe logic for protected endpoints... for now)
@Skarlso @speza Hi guys! I'm Casbin author. I looked through the committed files. And it seems Casbin has already got all functionalities you need. Casbin only has 1 dependency (the evaluator) so it isn't very "heavy" in my sense. Of course, Casbin's code is complex than this PR's code but its correctness is proved by hundreds of test cases in the CI and production use of many companies. But your customized authz code may contain bugs and it's not easy to find them all via code review only. If one bug is not found here, maybe it will be a severe security vulnerability. If we can switch to using Casbin, we are very happy to solve your issues using it and then you can concentrate on your main directions instead of authz. |
@hsluoyz Hi! Absolutely awesome from you to reach out to us. :) Let us formulate an answer for you and we'll see if you can help out with that or maybe we misunderstood something about Casbin that you could clarify. :) |
Yeah thanks for reaching out @hsluoyz! I will try and remember my reasons for thinking Casbin was heavy. I definitely think the code I have written here isn’t particularly simple anymore to be honest, and also 100% not a fan of not reinventing the wheel that’s for sure. |
Massive WIP.
Description TBD.
Todo: