2011-06-22 19:22:52 +02:00
/* -------------------------------------------------------------------------- */
2014-01-09 11:51:20 +01:00
/* Copyright 2002-2014, OpenNebula Project (OpenNebula.org), C12G Labs */
2011-06-22 19:22:52 +02:00
/* */
/* Licensed under the Apache License, Version 2.0 (the "License"); you may */
/* not use this file except in compliance with the License. You may obtain */
/* a copy of the License at */
/* */
/* http://www.apache.org/licenses/LICENSE-2.0 */
/* */
/* Unless required by applicable law or agreed to in writing, software */
/* distributed under the License is distributed on an "AS IS" BASIS, */
/* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */
/* See the License for the specific language governing permissions and */
/* limitations under the License. */
/* -------------------------------------------------------------------------- */
# ifndef ACL_MANAGER_H_
# define ACL_MANAGER_H_
# include "AuthManager.h"
2012-05-31 16:51:07 +02:00
# include "AuthRequest.h"
2012-01-03 02:58:23 +01:00
# include "PoolObjectSQL.h"
2011-06-22 19:22:52 +02:00
# include "AclRule.h"
2011-07-03 13:12:00 +02:00
# include "SqlDB.h"
2011-06-22 19:22:52 +02:00
using namespace std ;
2012-01-03 02:58:23 +01:00
class PoolObjectAuth ;
2011-06-27 18:41:16 +02:00
/**
* This class manages the ACL rules and the authorization engine
*/
class AclManager : public Callbackable
2011-06-22 19:22:52 +02:00
{
public :
2011-06-29 18:41:49 +02:00
AclManager ( SqlDB * _db ) ;
2011-06-22 19:22:52 +02:00
2011-07-05 16:32:18 +02:00
AclManager ( ) : db ( 0 ) , lastOID ( 0 )
{
pthread_mutex_init ( & mutex , 0 ) ;
} ;
virtual ~ AclManager ( ) ;
2011-06-24 13:22:17 +02:00
2011-06-27 18:41:16 +02:00
/**
* Loads the ACL rule set from the DB
* @ return 0 on success .
*/
int start ( ) ;
2011-06-22 19:22:52 +02:00
/* ---------------------------------------------------------------------- */
/* Rule management */
/* ---------------------------------------------------------------------- */
2011-06-27 18:41:16 +02:00
/**
* Takes an authorization request and checks if any rule in the ACL
* authorizes the operation .
*
* @ param uid The user ID requesting to be authorized
2013-08-23 12:39:14 +02:00
* @ param user_groups Set of group IDs that the user is part of
2011-12-29 22:05:11 +01:00
* @ param obj_perms The object ' s permission attributes
2011-06-27 18:41:16 +02:00
* @ param op The operation to be authorized
* @ return true if the authorization is granted by any rule
*/
2012-01-02 19:21:54 +01:00
const bool authorize ( int uid ,
2013-08-23 12:39:14 +02:00
const set < int > & user_groups ,
2012-01-03 02:58:23 +01:00
const PoolObjectAuth & obj_perms ,
2012-01-02 19:21:54 +01:00
AuthRequest : : Operation op ) ;
2011-12-29 22:05:11 +01:00
2011-06-27 18:41:16 +02:00
/**
* Adds a new rule to the ACL rule set
*
* @ param user 64 bit ID and flags
* @ param resource 64 bit ID and flags
* @ param rights 64 bit flags
* @ param error_str Returns the error reason , if any
2011-06-29 18:41:49 +02:00
*
* @ return the oid assigned to the rule on success ,
* - 1 if the rule exists ,
* - 2 if the rule is malformed ,
* - 3 if the DB insert failed
2011-06-27 18:41:16 +02:00
*/
2011-07-05 16:32:18 +02:00
virtual int add_rule ( long long user ,
long long resource ,
long long rights ,
string & error_str ) ;
2011-06-27 18:41:16 +02:00
/**
* Deletes a rule from the ACL rule set
*
2011-06-29 18:41:49 +02:00
* @ param oid Rule id
2011-06-27 18:41:16 +02:00
* @ param error_str Returns the error reason , if any
* @ return 0 on success
*/
2011-07-05 16:32:18 +02:00
virtual int del_rule ( int oid , string & error_str ) ;
2011-06-22 19:22:52 +02:00
2012-04-11 14:45:46 +02:00
/**
* Deletes rules that apply to this user id
*
* @ param uid The user id
*/
void del_uid_rules ( int uid ) ;
/**
* Deletes rules that apply to this group id
*
* @ param gid The group id
*/
void del_gid_rules ( int gid ) ;
2013-01-23 16:46:14 +01:00
/**
* Deletes rules that apply to this cluster id
*
* @ param cid The cluster id
*/
void del_cid_rules ( int cid ) ;
2012-04-16 16:24:42 +02:00
/**
* Deletes all rules that apply to this resource
*
* @ param oid Id of the deleted object
* @ param obj_type Object type
*/
void del_resource_rules ( int oid , PoolObjectSQL : : ObjectType obj_type ) ;
2011-12-01 09:56:29 -08:00
/**
* Searches what resources of type obj_type the ACL rules set allows
* the given user to perform the operation .
*
* @ param uid The user ID
2013-08-23 15:36:43 +02:00
* @ param user_groups Set of group IDs that the user is part of
2011-12-01 09:56:29 -08:00
* @ param obj_type The object over which the search will be performed
* @ param op The operation to be searched
* @ param all True if the user can perform the operation over any object
* @ param oids Set of object IDs over which the user can operate
* @ param gids Set of object group IDs over which the user can operate
2013-01-17 12:33:33 +01:00
* @ param cids Set of object cluster IDs over which the user can operate
2011-12-01 09:56:29 -08:00
*/
2012-01-03 02:58:23 +01:00
void reverse_search ( int uid ,
2013-08-23 15:36:43 +02:00
const set < int > & user_groups ,
2012-01-03 02:58:23 +01:00
PoolObjectSQL : : ObjectType obj_type ,
AuthRequest : : Operation op ,
bool & all ,
vector < int > & oids ,
2013-01-17 12:33:33 +01:00
vector < int > & gids ,
vector < int > & cids ) ;
2011-12-01 09:56:29 -08:00
2011-06-22 19:22:52 +02:00
/* ---------------------------------------------------------------------- */
/* DB management */
/* ---------------------------------------------------------------------- */
/**
2011-06-27 18:41:16 +02:00
* Bootstraps the database table ( s ) associated to the ACL Manager
2011-10-10 06:14:46 -07:00
* @ return 0 on success
2011-06-22 19:22:52 +02:00
*/
2011-10-10 06:14:46 -07:00
static int bootstrap ( SqlDB * _db ) ;
2011-06-22 19:22:52 +02:00
/**
2011-06-27 18:41:16 +02:00
* Dumps the rule set in XML format .
* @ param oss The output stream to dump the rule set contents
2011-06-22 19:22:52 +02:00
* @ return 0 on success
*/
2011-07-05 16:32:18 +02:00
virtual int dump ( ostringstream & oss ) ;
2011-06-22 19:22:52 +02:00
2011-07-05 16:32:18 +02:00
protected :
2011-06-29 18:41:49 +02:00
2011-06-30 11:41:27 +02:00
// ----------------------------------------
// ACL rules management
// ----------------------------------------
2011-06-29 18:41:49 +02:00
/**
* ACL rules . Each rule is indexed by its ' user ' long long attibute ,
* several rules can apply to the same user
*/
2011-06-27 18:41:16 +02:00
multimap < long long , AclRule * > acl_rules ;
2011-06-22 19:22:52 +02:00
2011-06-29 18:41:49 +02:00
/**
* Rules indexed by oid . Stores the same rules as acl_rules
*/
map < int , AclRule * > acl_rules_oids ;
2011-07-05 16:32:18 +02:00
private :
2011-06-29 12:50:16 +02:00
/**
* Gets all rules that apply to the user_req and , if any of them grants
* permission , returns true .
*
* @ param user_req user / group id and flags
* @ param resource_oid_req 64 bit request , ob . type and individual oid
* @ param resource_gid_req 64 bit request , ob . type and group id
2013-01-16 18:27:36 +01:00
* @ param resource_cid_req 64 bit request , ob . type and cluster id
2011-06-29 12:50:16 +02:00
* @ param resource_all_req 64 bit request , ob . type and all flag
* @ param rights_req Requested rights
* @ param individual_obj_type Mask with ob . type and individual flags
2011-12-30 16:27:42 +01:00
* @ param group_obj_type Mask with ob . type and group flags
2013-01-16 18:27:36 +01:00
* @ param cluster_obj_type Mask with ob . type and cluster flags
2011-12-30 16:27:42 +01:00
* @ param rules ACL rules to match
2011-06-29 12:50:16 +02:00
*
* @ return true if any rule grants permission
*/
bool match_rules (
long long user_req ,
long long resource_oid_req ,
long long resource_gid_req ,
2013-01-16 18:27:36 +01:00
long long resource_cid_req ,
2011-06-29 12:50:16 +02:00
long long resource_all_req ,
long long rights_req ,
long long individual_obj_type ,
2011-12-30 16:27:42 +01:00
long long group_obj_type ,
2013-01-16 18:27:36 +01:00
long long cluster_obj_type ,
2011-12-30 16:27:42 +01:00
multimap < long long , AclRule * > & rules ) ;
/**
* Wrapper for match_rules . It will check if any rules in the temporary
* multimap or in the internal one grants permission .
*
* @ param user_req user / group id and flags
* @ param resource_oid_req 64 bit request , ob . type and individual oid
* @ param resource_gid_req 64 bit request , ob . type and group id
2013-01-16 18:27:36 +01:00
* @ param resource_cid_req 64 bit request , ob . type and cluster id
2011-12-30 16:27:42 +01:00
* @ param resource_all_req 64 bit request , ob . type and all flag
* @ param rights_req Requested rights
* @ param individual_obj_type Mask with ob . type and individual flags
* @ param group_obj_type Mask with ob . type and group flags
2013-01-16 18:27:36 +01:00
* @ param cluster_obj_type Mask with ob . type and cluster flags
2011-12-30 16:27:42 +01:00
* @ param tmp_rules Temporary map group of ACL rules
*
* @ return true if any rule grants permission
*/
bool match_rules_wrapper (
long long user_req ,
long long resource_oid_req ,
long long resource_gid_req ,
2013-01-16 18:27:36 +01:00
long long resource_cid_req ,
2011-12-30 16:27:42 +01:00
long long resource_all_req ,
long long rights_req ,
long long individual_obj_type ,
long long group_obj_type ,
2013-01-16 18:27:36 +01:00
long long cluster_obj_type ,
2011-12-30 16:27:42 +01:00
multimap < long long , AclRule * > & tmp_rules ) ;
2011-06-29 12:50:16 +02:00
2012-04-11 14:45:46 +02:00
/**
* Deletes all rules that match the user mask
*
* @ param user_req Mask to match
*/
void del_user_matching_rules ( long long user_req ) ;
2012-04-16 15:06:06 +02:00
/**
* Deletes all rules that match the resource mask
*
* @ param resource_req 64 bit request , ob . type and group id
* @ param resource_mask Mask with ob . type and group flags
*/
void del_resource_matching_rules (
long long resource_req ,
long long resource_mask ) ;
2011-06-30 11:41:27 +02:00
// ----------------------------------------
// Mutex synchronization
// ----------------------------------------
pthread_mutex_t mutex ;
/**
* Function to lock the manager
*/
void lock ( )
{
pthread_mutex_lock ( & mutex ) ;
} ;
/**
* Function to unlock the manager
*/
void unlock ( )
{
pthread_mutex_unlock ( & mutex ) ;
} ;
2011-06-27 18:41:16 +02:00
// ----------------------------------------
// DataBase implementation variables
// ----------------------------------------
2011-06-22 19:22:52 +02:00
2011-06-27 18:41:16 +02:00
/**
* Pointer to the database .
*/
SqlDB * db ;
2011-06-22 19:22:52 +02:00
2011-06-29 18:41:49 +02:00
/**
* Last object ID assigned to a rule .
*/
int lastOID ;
/**
* Tablename for the ACL rules
*/
2011-06-27 18:41:16 +02:00
static const char * table ;
2011-06-22 19:22:52 +02:00
2011-06-27 18:41:16 +02:00
static const char * db_names ;
2011-06-22 19:22:52 +02:00
2011-06-27 18:41:16 +02:00
static const char * db_bootstrap ;
2011-06-29 18:41:49 +02:00
/**
* Inserts the last oid into the pool_control table
*/
void update_lastOID ( ) ;
2011-06-27 18:41:16 +02:00
/**
* Callback function to unmarshall the ACL rules
* @ param num the number of columns read from the DB
* @ param names the column names
* @ param vaues the column values
* @ return 0 on success
*/
int select_cb ( void * nil , int num , char * * values , char * * names ) ;
/**
* Reads the ACL rule set from the database .
* @ param db pointer to the db
* @ return 0 on success
*/
int select ( ) ;
/**
* Inserts the ACL rule in the database .
* @ param rule to insert
* @ return 0 on success
*/
2011-07-04 19:14:43 +02:00
int insert ( AclRule * rule )
{
return insert ( rule , db ) ;
} ;
/**
* Inserts the ACL rule in the database .
* @ param rule to insert
* @ db db pointer
*
* @ return 0 on success
*/
static int insert ( AclRule * rule , SqlDB * db ) ;
2011-06-27 18:41:16 +02:00
/**
* Drops an ACL rule from the database
2011-06-29 18:41:49 +02:00
*
* @ param oid Rule id
2011-06-27 18:41:16 +02:00
* @ return 0 on success
*/
2011-06-29 18:41:49 +02:00
int drop ( int oid ) ;
/**
* Callback to set the lastOID
*/
int init_cb ( void * nil , int num , char * * values , char * * names ) ;
2011-06-22 19:22:52 +02:00
} ;
# endif /*ACL_MANAGER_H*/