1
0
Fork 0
mirror of https://github.com/postmannen/ctrl.git synced 2025-03-15 10:57:42 +00:00

added initial REQ for aclDeleteCommand

This commit is contained in:
postmannen 2022-05-18 14:43:35 +02:00
parent 0ba5f6ea5d
commit 321150ac84
5 changed files with 140 additions and 47 deletions

View file

@ -144,11 +144,11 @@ func (a *accessLists) commandAsSlice(c command) []command {
return commands return commands
} }
// aclAdd will add a command for a fromNode. // aclAddCommand will add a command for a fromNode.
// If the node or the fromNode do not exist they will be created. // If the node or the fromNode do not exist they will be created.
// The json encoded schema for a node and the hash of those data // The json encoded schema for a node and the hash of those data
// will also be generated. // will also be generated.
func (a *accessLists) aclAdd(host Node, source Node, cmd command) { func (a *accessLists) aclAddCommand(host Node, source Node, cmd command) {
a.schemaMain.mu.Lock() a.schemaMain.mu.Lock()
defer a.schemaMain.mu.Unlock() defer a.schemaMain.mu.Unlock()

View file

@ -17,8 +17,8 @@ func TestACLSingleNode(t *testing.T) {
} }
a := newAccessLists() a := newAccessLists()
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd("ship101", "admin", "PIG") a.aclAddCommand("ship101", "admin", "PIG")
// --- TESTS --- // --- TESTS ---
@ -59,10 +59,10 @@ func TestACLWithGroups(t *testing.T) {
a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg") a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg")
a.groupCommandsAddCommand(grp_commands_commandset1, "date") a.groupCommandsAddCommand(grp_commands_commandset1, "date")
a.aclAdd(grp_nodes_ships, "admin", "useradd -m kongen") a.aclAddCommand(grp_nodes_ships, "admin", "useradd -m kongen")
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1) a.aclAddCommand(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1)
mapOfFromNodeCommands := make(map[Node]map[command]struct{}) mapOfFromNodeCommands := make(map[Node]map[command]struct{})
err := cbor.Unmarshal(a.schemaGenerated.GeneratedACLsMap["ship101"].Data, &mapOfFromNodeCommands) err := cbor.Unmarshal(a.schemaGenerated.GeneratedACLsMap["ship101"].Data, &mapOfFromNodeCommands)
@ -118,10 +118,10 @@ func TestACLNodesGroupDeleteNode(t *testing.T) {
a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg") a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg")
a.groupCommandsAddCommand(grp_commands_commandset1, "date") a.groupCommandsAddCommand(grp_commands_commandset1, "date")
a.aclAdd(grp_nodes_ships, "admin", "useradd -m kongen") a.aclAddCommand(grp_nodes_ships, "admin", "useradd -m kongen")
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1) a.aclAddCommand(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1)
a.groupNodesDeleteNode(grp_nodes_ships, "ship101") a.groupNodesDeleteNode(grp_nodes_ships, "ship101")
@ -175,10 +175,10 @@ func TestGroupNodesDeleteGroup(t *testing.T) {
a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg") a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg")
a.groupCommandsAddCommand(grp_commands_commandset1, "date") a.groupCommandsAddCommand(grp_commands_commandset1, "date")
a.aclAdd(grp_nodes_ships, "admin", "useradd -m kongen") a.aclAddCommand(grp_nodes_ships, "admin", "useradd -m kongen")
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1) a.aclAddCommand(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1)
a.groupNodesDeleteGroup(grp_nodes_operators) a.groupNodesDeleteGroup(grp_nodes_operators)
@ -232,10 +232,10 @@ func TestGroupCommandDeleteGroup(t *testing.T) {
a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg") a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg")
a.groupCommandsAddCommand(grp_commands_commandset1, "date") a.groupCommandsAddCommand(grp_commands_commandset1, "date")
a.aclAdd(grp_nodes_ships, "admin", "useradd -m kongen") a.aclAddCommand(grp_nodes_ships, "admin", "useradd -m kongen")
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1) a.aclAddCommand(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1)
a.groupCommandDeleteGroup(grp_commands_commandset1) a.groupCommandDeleteGroup(grp_commands_commandset1)
@ -274,14 +274,14 @@ func TestACLGenerated(t *testing.T) {
a := newAccessLists() a := newAccessLists()
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.groupNodesAddNode("grp_nodes_ships", "ship101") a.groupNodesAddNode("grp_nodes_ships", "ship101")
a.aclAdd("grp_nodes_ships", "admin", "HEN") a.aclAddCommand("grp_nodes_ships", "admin", "HEN")
a.groupCommandsAddCommand("grp_commands_test", "echo") a.groupCommandsAddCommand("grp_commands_test", "echo")
a.groupCommandsAddCommand("grp_commands_test", "dmesg") a.groupCommandsAddCommand("grp_commands_test", "dmesg")
a.aclAdd("grp_nodes_ships", "admin", "grp_commands_test") a.aclAddCommand("grp_nodes_ships", "admin", "grp_commands_test")
a.groupCommandsDeleteCommand("grp_commands_test", "echo") a.groupCommandsDeleteCommand("grp_commands_test", "echo")
@ -325,8 +325,8 @@ func TestACLSchemaMainACLMap(t *testing.T) {
//a.aclNodeFromnodeCommandAdd("ship101", "admin", "PIG") //a.aclNodeFromnodeCommandAdd("ship101", "admin", "PIG")
// fmt.Printf("---------------ADDING COMMAND-------------\n") // fmt.Printf("---------------ADDING COMMAND-------------\n")
a.aclAdd("ship0", "admin", "systemctl") a.aclAddCommand("ship0", "admin", "systemctl")
a.aclAdd("ship1", "admin", "tcpdump") a.aclAddCommand("ship1", "admin", "tcpdump")
if _, ok := a.schemaMain.ACLMap["ship0"]["admin"]["systemctl"]; !ok { if _, ok := a.schemaMain.ACLMap["ship0"]["admin"]["systemctl"]; !ok {
t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship0, admin, systemctl") t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship0, admin, systemctl")
@ -338,14 +338,14 @@ func TestACLSchemaMainACLMap(t *testing.T) {
// fmt.Printf("---------------ADDING COMMAND-------------\n") // fmt.Printf("---------------ADDING COMMAND-------------\n")
a.groupNodesAddNode("grp_nodes_ships", "ship1") a.groupNodesAddNode("grp_nodes_ships", "ship1")
a.groupNodesAddNode("grp_nodes_ships", "ship2") a.groupNodesAddNode("grp_nodes_ships", "ship2")
a.aclAdd("grp_nodes_ships", "admin", "dmesg") a.aclAddCommand("grp_nodes_ships", "admin", "dmesg")
if _, ok := a.schemaMain.ACLMap["grp_nodes_ships"]["admin"]["dmesg"]; !ok { if _, ok := a.schemaMain.ACLMap["grp_nodes_ships"]["admin"]["dmesg"]; !ok {
t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship1, admin, tcpdump") t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship1, admin, tcpdump")
} }
// fmt.Printf("---------------ADDING COMMAND-------------\n") // fmt.Printf("---------------ADDING COMMAND-------------\n")
a.aclAdd("ship2", "admin", "echo") a.aclAddCommand("ship2", "admin", "echo")
if _, ok := a.schemaMain.ACLMap["ship2"]["admin"]["echo"]; !ok { if _, ok := a.schemaMain.ACLMap["ship2"]["admin"]["echo"]; !ok {
t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship1, admin, tcpdump") t.Fatalf(" \U0001F631 [FAILED]: missing map entry: ship1, admin, tcpdump")
@ -402,10 +402,10 @@ func TestACLHash(t *testing.T) {
a := newAccessLists() a := newAccessLists()
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.groupNodesAddNode("grp_nodes_ships", "ship101") a.groupNodesAddNode("grp_nodes_ships", "ship101")
a.aclAdd("grp_nodes_ships", "admin", "HEN") a.aclAddCommand("grp_nodes_ships", "admin", "HEN")
hash := [32]uint8{0xa4, 0x99, 0xbd, 0xa3, 0x18, 0x26, 0x52, 0xc2, 0x92, 0x60, 0x23, 0x19, 0x3c, 0xa, 0x7, 0xa9, 0xb7, 0x77, 0x4f, 0x11, 0x34, 0xd5, 0x2d, 0xd1, 0x8d, 0xab, 0x6c, 0x4b, 0x2, 0xfa, 0x5c, 0x7a} hash := [32]uint8{0xa4, 0x99, 0xbd, 0xa3, 0x18, 0x26, 0x52, 0xc2, 0x92, 0x60, 0x23, 0x19, 0x3c, 0xa, 0x7, 0xa9, 0xb7, 0x77, 0x4f, 0x11, 0x34, 0xd5, 0x2d, 0xd1, 0x8d, 0xab, 0x6c, 0x4b, 0x2, 0xfa, 0x5c, 0x7a}
value := a.schemaGenerated.GeneratedACLsMap["ship101"].Hash value := a.schemaGenerated.GeneratedACLsMap["ship101"].Hash
@ -427,12 +427,12 @@ func TestACLConcurrent(t *testing.T) {
wg.Add(1) wg.Add(1)
go func() { go func() {
defer wg.Done() defer wg.Done()
a.aclAdd("ship1", "operator2", "rm -rf") a.aclAddCommand("ship1", "operator2", "rm -rf")
a.aclAdd("ship1", "operator1", "ls -lt") a.aclAddCommand("ship1", "operator1", "ls -lt")
a.aclAdd("ship1", "operator1", "ls -lt") a.aclAddCommand("ship1", "operator1", "ls -lt")
a.aclAdd("ship1", "operator2", "ls -l") a.aclAddCommand("ship1", "operator2", "ls -l")
a.aclAdd("ship3", "operator3", "ls -lt") a.aclAddCommand("ship3", "operator3", "ls -lt")
a.aclAdd("ship3", "operator3", "vi /etc/hostname") a.aclAddCommand("ship3", "operator3", "vi /etc/hostname")
a.aclDeleteCommand("ship3", "operator2", "ls -lt") a.aclDeleteCommand("ship3", "operator2", "ls -lt")
a.aclDeleteSource("ship3", "operator3") a.aclDeleteSource("ship3", "operator3")
}() }()
@ -477,10 +477,10 @@ func TestExportACLs(t *testing.T) {
a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg") a.groupCommandsAddCommand(grp_commands_commandset1, "dmesg")
a.groupCommandsAddCommand(grp_commands_commandset1, "date") a.groupCommandsAddCommand(grp_commands_commandset1, "date")
a.aclAdd(grp_nodes_ships, "admin", "useradd -m kongen") a.aclAddCommand(grp_nodes_ships, "admin", "useradd -m kongen")
a.aclAdd("ship101", "admin", "HORSE") a.aclAddCommand("ship101", "admin", "HORSE")
a.aclAdd(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1) a.aclAddCommand(grp_nodes_ships, grp_nodes_operators, grp_commands_commandset1)
js, err := a.exportACLs() js, err := a.exportACLs()
if err != nil { if err != nil {

View file

@ -173,7 +173,8 @@ func (p *processes) Start(proc process) {
if proc.configuration.IsCentralAuth { if proc.configuration.IsCentralAuth {
proc.startup.subREQPublicKeysGet(proc) proc.startup.subREQPublicKeysGet(proc)
proc.startup.subREQPublicKeysAllow(proc) proc.startup.subREQPublicKeysAllow(proc)
proc.startup.subREQAclAddAccessList(proc) proc.startup.subREQAclAddCommand(proc)
proc.startup.subREQAclDeleteCommand(proc)
} }
if proc.configuration.StartSubREQPublicKeysToNode { if proc.configuration.StartSubREQPublicKeysToNode {
@ -376,9 +377,16 @@ func (s startup) subREQPublicKeysToNode(p process) {
go proc.spawnWorker() go proc.spawnWorker()
} }
func (s startup) subREQAclAddAccessList(p process) { func (s startup) subREQAclAddCommand(p process) {
log.Printf("Starting Add Access List subscriber: %#v\n", p.node) log.Printf("Starting Acl Add Command subscriber: %#v\n", p.node)
sub := newSubject(REQAclAddAccessList, string(p.node)) sub := newSubject(REQAclAddCommand, string(p.node))
proc := newProcess(p.ctx, s.server, sub, processKindSubscriber, nil)
go proc.spawnWorker()
}
func (s startup) subREQAclDeleteCommand(p process) {
log.Printf("Starting Acl Delete Command subscriber: %#v\n", p.node)
sub := newSubject(REQAclDeleteCommand, string(p.node))
proc := newProcess(p.ctx, s.server, sub, processKindSubscriber, nil) proc := newProcess(p.ctx, s.server, sub, processKindSubscriber, nil)
go proc.spawnWorker() go proc.spawnWorker()
} }

View file

@ -6,16 +6,16 @@ import (
// --- // ---
type methodREQAclAddAccessList struct { type methodREQAclAddCommand struct {
event Event event Event
} }
func (m methodREQAclAddAccessList) getKind() Event { func (m methodREQAclAddCommand) getKind() Event {
return m.event return m.event
} }
func (m methodREQAclAddAccessList) handler(proc process, message Message, node string) ([]byte, error) { func (m methodREQAclAddCommand) handler(proc process, message Message, node string) ([]byte, error) {
inf := fmt.Errorf("<--- methodREQAclAddAccessList received from: %v, containing: %v", message.FromNode, message.MethodArgs) inf := fmt.Errorf("<--- methodREQAclAddCommand received from: %v, containing: %v", message.FromNode, message.MethodArgs)
proc.errorKernel.logConsoleOnlyIfDebug(inf, proc.configuration) proc.errorKernel.logConsoleOnlyIfDebug(inf, proc.configuration)
proc.processes.wg.Add(1) proc.processes.wg.Add(1)
@ -43,7 +43,7 @@ func (m methodREQAclAddAccessList) handler(proc process, message Message, node s
source := message.MethodArgs[1] source := message.MethodArgs[1]
cmd := message.MethodArgs[2] cmd := message.MethodArgs[2]
proc.centralAuth.accessLists.aclAdd(Node(host), Node(source), command(cmd)) proc.centralAuth.accessLists.aclAddCommand(Node(host), Node(source), command(cmd))
// Just print out for testing. // Just print out for testing.
proc.centralAuth.accessLists.schemaMain.mu.Lock() proc.centralAuth.accessLists.schemaMain.mu.Lock()
@ -51,7 +51,87 @@ func (m methodREQAclAddAccessList) handler(proc process, message Message, node s
proc.centralAuth.accessLists.schemaMain.mu.Unlock() proc.centralAuth.accessLists.schemaMain.mu.Unlock()
proc.centralAuth.accessLists.schemaGenerated.mu.Lock() proc.centralAuth.accessLists.schemaGenerated.mu.Lock()
fmt.Printf("\n ---------- content of generated acl map: %s-----------\n", proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap) fmt.Printf("\n ---------- content of generated acl map: %v-----------\n", proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap)
proc.centralAuth.accessLists.schemaGenerated.mu.Unlock()
outString := fmt.Sprintf("acl added: host=%v, source=%v, command=%v\n", host, source, cmd)
out := []byte(outString)
select {
case outCh <- out:
case <-ctx.Done():
return
}
}()
select {
case <-ctx.Done():
cancel()
er := fmt.Errorf("error: methodREQAclAddAccessList: method timed out: %v", message.MethodArgs)
proc.errorKernel.errSend(proc, message, er)
case out := <-outCh:
// Prepare and queue for sending a new message with the output
// of the action executed.
newReplyMessage(proc, message, out)
}
}()
ackMsg := []byte("confirmed from: " + node + ": " + fmt.Sprint(message.ID))
return ackMsg, nil
}
// ---
type methodREQAclDeleteCommand struct {
event Event
}
func (m methodREQAclDeleteCommand) getKind() Event {
return m.event
}
func (m methodREQAclDeleteCommand) handler(proc process, message Message, node string) ([]byte, error) {
inf := fmt.Errorf("<--- methodREQAclAddAccessList received from: %v, containing: %v", message.FromNode, message.MethodArgs)
proc.errorKernel.logConsoleOnlyIfDebug(inf, proc.configuration)
proc.processes.wg.Add(1)
go func() {
defer proc.processes.wg.Done()
switch {
case len(message.MethodArgs) < 3:
er := fmt.Errorf("error: methodREQAclAddAccessList: got <3 number methodArgs, want 3")
proc.errorKernel.errSend(proc, message, er)
return
}
// Get a context with the timeout specified in message.MethodTimeout.
ctx, cancel := getContextForMethodTimeout(proc.ctx, message)
outCh := make(chan []byte)
proc.processes.wg.Add(1)
go func() {
defer proc.processes.wg.Done()
host := message.MethodArgs[0]
source := message.MethodArgs[1]
cmd := message.MethodArgs[2]
proc.centralAuth.accessLists.aclDeleteCommand(Node(host), Node(source), command(cmd))
// Just print out for testing.
proc.centralAuth.accessLists.schemaMain.mu.Lock()
fmt.Printf("\n ---------- content of main acl map: %v-----------\n", proc.centralAuth.accessLists.schemaMain.ACLMap)
proc.centralAuth.accessLists.schemaMain.mu.Unlock()
proc.centralAuth.accessLists.schemaGenerated.mu.Lock()
fmt.Printf("\n ---------- content of generated acl map: %v-----------\n", proc.centralAuth.accessLists.schemaGenerated.GeneratedACLsMap)
proc.centralAuth.accessLists.schemaGenerated.mu.Unlock() proc.centralAuth.accessLists.schemaGenerated.mu.Unlock()
outString := fmt.Sprintf("acl added: host=%v, source=%v, command=%v\n", host, source, cmd) outString := fmt.Sprintf("acl added: host=%v, source=%v, command=%v\n", host, source, cmd)

View file

@ -144,8 +144,10 @@ const (
REQPublicKeysToNode Method = "REQPublicKeysToNode" REQPublicKeysToNode Method = "REQPublicKeysToNode"
// REQAuthPublicKeysAllow // REQAuthPublicKeysAllow
REQPublicKeysAllow Method = "REQPublicKeysAllow" REQPublicKeysAllow Method = "REQPublicKeysAllow"
// REQAclAddAcl // REQAclAddCommand
REQAclAddAccessList = "REQAclAddAccessList" REQAclAddCommand = "REQAclAddCommand"
// REQAclDeleteCommand
REQAclDeleteCommand = "REQAclDeleteCommand"
) )
// The mapping of all the method constants specified, what type // The mapping of all the method constants specified, what type
@ -236,7 +238,10 @@ func (m Method) GetMethodsAvailable() MethodsAvailable {
REQPublicKeysAllow: methodREQPublicKeysAllow{ REQPublicKeysAllow: methodREQPublicKeysAllow{
event: EventACK, event: EventACK,
}, },
REQAclAddAccessList: methodREQAclAddAccessList{ REQAclAddCommand: methodREQAclAddCommand{
event: EventACK,
},
REQAclDeleteCommand: methodREQAclDeleteCommand{
event: EventACK, event: EventACK,
}, },
}, },