dragonfly/manager/permission/rbac/rbac.go

183 lines
4.1 KiB
Go

/*
* Copyright 2020 The Dragonfly Authors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package rbac
import (
"errors"
"fmt"
"net/http"
"regexp"
"github.com/casbin/casbin/v2"
"github.com/casbin/casbin/v2/model"
gormadapter "github.com/casbin/gorm-adapter/v3"
"github.com/gin-gonic/gin"
"golang.org/x/crypto/bcrypt"
"gorm.io/gorm"
managermodels "d7y.io/dragonfly/v2/manager/models"
"d7y.io/dragonfly/v2/pkg/strings"
)
// Syntax for models see https://casbin.org/docs/en/syntax-for-models
const modelText = `
[request_definition]
r = sub, obj, act
[policy_definition]
p = sub, obj, act
[role_definition]
g = _, _
[policy_effect]
e = some(where (p.eft == allow))
[matchers]
m = g(r.sub, p.sub) && r.obj == p.obj && (r.act == p.act || p.act == "*")
`
const (
RootRole = "root"
GuestRole = "guest"
)
const (
AllAction = "*"
ReadAction = "read"
)
var (
apiGroupRegexp = regexp.MustCompile(`^/api/v[0-9]+/([-_a-zA-Z]*)[/.*]*`)
)
func NewEnforcer(gdb *gorm.DB) (*casbin.Enforcer, error) {
adapter, err := gormadapter.NewAdapterByDBWithCustomTable(gdb, &managermodels.CasbinRule{})
if err != nil {
return nil, err
}
m, err := model.NewModelFromString(modelText)
if err != nil {
return nil, err
}
enforcer, err := casbin.NewEnforcer(m, adapter)
if err != nil {
return nil, err
}
return enforcer, nil
}
func InitRBAC(e *casbin.Enforcer, g *gin.Engine, db *gorm.DB) error {
// Create roles
permissions := GetPermissions(g)
for _, permission := range permissions {
if _, err := e.AddPermissionForUser(RootRole, permission.Object, AllAction); err != nil {
return err
}
if _, err := e.AddPermissionForUser(GuestRole, permission.Object, ReadAction); err != nil {
return err
}
}
// Create root user for the first time
var rootUserCount int64
if err := db.Model(managermodels.User{}).Count(&rootUserCount).Error; err != nil {
return err
}
if rootUserCount <= 0 {
encryptedPasswordBytes, err := bcrypt.GenerateFromPassword([]byte("dragonfly"), bcrypt.MinCost)
if err != nil {
return err
}
rootUser := managermodels.User{
EncryptedPassword: string(encryptedPasswordBytes),
Name: "root",
State: managermodels.UserStateEnabled,
}
if err := db.Create(&rootUser).Error; err != nil {
return err
}
if _, err := e.AddRoleForUser(fmt.Sprint(rootUser.ID), RootRole); err != nil {
return err
}
}
return nil
}
type Permission struct {
Object string `json:"object" binding:"required"`
Action string `json:"action" binding:"required,oneof=read *"`
}
func GetPermissions(g *gin.Engine) []Permission {
permissions := []Permission{}
actions := []string{AllAction, ReadAction}
for _, permission := range GetAPIGroupNames(g) {
for _, action := range actions {
permissions = append(permissions, Permission{
Object: permission,
Action: action,
})
}
}
return permissions
}
func GetAPIGroupNames(g *gin.Engine) []string {
apiGroupNames := []string{}
for _, route := range g.Routes() {
name, err := GetAPIGroupName(route.Path)
if err != nil {
continue
}
if !strings.Contains(apiGroupNames, name) {
apiGroupNames = append(apiGroupNames, name)
}
}
return apiGroupNames
}
func GetAPIGroupName(path string) (string, error) {
matchs := apiGroupRegexp.FindStringSubmatch(path)
if len(matchs) != 2 {
return "", errors.New("cannot find group name")
}
return matchs[1], nil
}
func HTTPMethodToAction(method string) string {
action := ReadAction
if method == http.MethodDelete || method == http.MethodPatch || method == http.MethodPut || method == http.MethodPost {
action = AllAction
}
return action
}