X-Git-Url: https://gerrit.automotivelinux.org/gerrit/gitweb?a=blobdiff_plain;f=src%2Fafb-auth.c;h=90c8ddce5113e5c0d31cafc7c37d5c0dea218173;hb=6f13ad1989875b5a0ce50b24211fd1fba093735f;hp=fc62bd594cb5d04fc53b3faadef11cc7e0a239ac;hpb=1d24a50bda149604760cdc1fd53f65b988c61f0c;p=src%2Fapp-framework-binder.git diff --git a/src/afb-auth.c b/src/afb-auth.c index fc62bd59..90c8ddce 100644 --- a/src/afb-auth.c +++ b/src/afb-auth.c @@ -1,5 +1,5 @@ /* - * Copyright (C) 2016, 2017 "IoT.bzh" + * Copyright (C) 2016-2019 "IoT.bzh" * Author "Fulup Ar Foll" * Author José Bollo * @@ -17,20 +17,20 @@ */ #define _GNU_SOURCE -#define AFB_BINDING_PRAGMA_NO_VERBOSE_MACRO #include +#include #include +#include #include "afb-auth.h" #include "afb-context.h" #include "afb-xreq.h" +#include "afb-cred.h" #include "verbose.h" -static int check_permission(const char *permission, struct afb_xreq *xreq); - -int afb_auth_check(const struct afb_auth *auth, struct afb_xreq *xreq) +int afb_auth_check(struct afb_xreq *xreq, const struct afb_auth *auth) { switch (auth->type) { default: @@ -44,46 +44,111 @@ int afb_auth_check(const struct afb_auth *auth, struct afb_xreq *xreq) return afb_context_check_loa(&xreq->context, auth->loa); case afb_auth_Permission: - return xreq->cred && auth->text && check_permission(auth->text, xreq); + return afb_auth_has_permission(xreq, auth->text); case afb_auth_Or: - return afb_auth_check(auth->first, xreq) || afb_auth_check(auth->next, xreq); + return afb_auth_check(xreq, auth->first) || afb_auth_check(xreq, auth->next); case afb_auth_And: - return afb_auth_check(auth->first, xreq) && afb_auth_check(auth->next, xreq); + return afb_auth_check(xreq, auth->first) && afb_auth_check(xreq, auth->next); case afb_auth_Not: - return !afb_auth_check(auth->first, xreq); + return !afb_auth_check(xreq, auth->first); case afb_auth_Yes: return 1; } } -#ifdef BACKEND_PERMISSION_IS_CYNARA -#include -static int check_permission(const char *permission, struct afb_xreq *xreq) +int afb_auth_has_permission(struct afb_xreq *xreq, const char *permission) +{ + return afb_cred_has_permission(xreq->cred, permission, afb_context_uuid(&xreq->context)); +} + +/*********************************************************************************/ + +static struct json_object *addperm(struct json_object *o, struct json_object *x) { - static cynara *cynara; - char uid[64]; - int rc; - - if (!cynara) { - rc = cynara_initialize(&cynara, NULL); - if (rc != CYNARA_API_SUCCESS) { - cynara = NULL; - ERROR("cynara initialisation failed with code %d", rc); - return 0; - } + struct json_object *a; + + if (!o) + return x; + + if (!json_object_object_get_ex(o, "allOf", &a)) { + a = json_object_new_array(); + json_object_array_add(a, o); + o = json_object_new_object(); + json_object_object_add(o, "allOf", a); } - rc = cynara_check(cynara, cred->label, afb_context_uuid(&xreq->context), xreq->cred->user, permission); - return rc == CYNARA_API_ACCESS_ALLOWED; + json_object_array_add(a, x); + return o; } -#else -static int check_permission(const char *permission, struct afb_xreq *xreq) + +static struct json_object *addperm_key_val(struct json_object *o, const char *key, struct json_object *val) { - WARNING("Granting permission %s by default", permission); - return 1; + struct json_object *x = json_object_new_object(); + json_object_object_add(x, key, val); + return addperm(o, x); +} + +static struct json_object *addperm_key_valstr(struct json_object *o, const char *key, const char *val) +{ + return addperm_key_val(o, key, json_object_new_string(val)); +} + +static struct json_object *addperm_key_valint(struct json_object *o, const char *key, int val) +{ + return addperm_key_val(o, key, json_object_new_int(val)); +} + +static struct json_object *addauth_or_array(struct json_object *o, const struct afb_auth *auth); + +static struct json_object *addauth(struct json_object *o, const struct afb_auth *auth) +{ + switch(auth->type) { + case afb_auth_No: return addperm(o, json_object_new_boolean(0)); + case afb_auth_Token: return addperm_key_valstr(o, "session", "check"); + case afb_auth_LOA: return addperm_key_valint(o, "LOA", auth->loa); + case afb_auth_Permission: return addperm_key_valstr(o, "permission", auth->text); + case afb_auth_Or: return addperm_key_val(o, "anyOf", addauth_or_array(json_object_new_array(), auth)); + case afb_auth_And: return addauth(addauth(o, auth->first), auth->next); + case afb_auth_Not: return addperm_key_val(o, "not", addauth(NULL, auth->first)); + case afb_auth_Yes: return addperm(o, json_object_new_boolean(1)); + } + return o; +} + +static struct json_object *addauth_or_array(struct json_object *o, const struct afb_auth *auth) +{ + if (auth->type != afb_auth_Or) + json_object_array_add(o, addauth(NULL, auth)); + else { + addauth_or_array(o, auth->first); + addauth_or_array(o, auth->next); + } + + return o; +} + +struct json_object *afb_auth_json_v2(const struct afb_auth *auth, int session) +{ + struct json_object *result = NULL; + + if (session & AFB_SESSION_CLOSE_X2) + result = addperm_key_valstr(result, "session", "close"); + + if (session & AFB_SESSION_CHECK_X2) + result = addperm_key_valstr(result, "session", "check"); + + if (session & AFB_SESSION_REFRESH_X2) + result = addperm_key_valstr(result, "token", "refresh"); + + if (session & AFB_SESSION_LOA_MASK_X2) + result = addperm_key_valint(result, "LOA", session & AFB_SESSION_LOA_MASK_X2); + + if (auth) + result = addauth(result, auth); + + return result; } -#endif