mirror of
https://github.com/postmannen/ctrl.git
synced 2024-12-14 12:37:31 +00:00
added initial structure for nodeAcl
This commit is contained in:
parent
52e3661c21
commit
ba39e241e4
1 changed files with 94 additions and 19 deletions
113
node_auth.go
113
node_auth.go
|
@ -14,14 +14,12 @@ import (
|
||||||
"sync"
|
"sync"
|
||||||
)
|
)
|
||||||
|
|
||||||
type signature string
|
// nodeAuth is the structure that holds both keys and acl's
|
||||||
|
// that the running steward node shall use for authorization.
|
||||||
// allowedSignatures is the structure for reading and writing from
|
//It holds a mutex to use when interacting with the map.
|
||||||
// the signatures map. It holds a mutex to use when interacting with
|
|
||||||
// the map.
|
|
||||||
type nodeAuth struct {
|
type nodeAuth struct {
|
||||||
// All the allowed signatures a node is allowed to recive from.
|
// ACL that defines where a node is allowed to recieve from.
|
||||||
allowedSignatures *allowedSignatures
|
nodeAcl *nodeAcl
|
||||||
|
|
||||||
// All the public keys for nodes a node is allowed to receive from.
|
// All the public keys for nodes a node is allowed to receive from.
|
||||||
publicKeys *publicKeys
|
publicKeys *publicKeys
|
||||||
|
@ -45,10 +43,10 @@ type nodeAuth struct {
|
||||||
|
|
||||||
func newNodeAuth(configuration *Configuration, errorKernel *errorKernel) *nodeAuth {
|
func newNodeAuth(configuration *Configuration, errorKernel *errorKernel) *nodeAuth {
|
||||||
n := nodeAuth{
|
n := nodeAuth{
|
||||||
allowedSignatures: newAllowedSignatures(),
|
nodeAcl: newNodeAcl(configuration),
|
||||||
publicKeys: newPublicKeys(configuration),
|
publicKeys: newPublicKeys(configuration),
|
||||||
configuration: configuration,
|
configuration: configuration,
|
||||||
errorKernel: errorKernel,
|
errorKernel: errorKernel,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set the signing key paths.
|
// Set the signing key paths.
|
||||||
|
@ -65,20 +63,97 @@ func newNodeAuth(configuration *Configuration, errorKernel *errorKernel) *nodeAu
|
||||||
return &n
|
return &n
|
||||||
}
|
}
|
||||||
|
|
||||||
type allowedSignatures struct {
|
// --------------------- ACL ---------------------
|
||||||
// allowed is a map for holding all the allowed signatures.
|
|
||||||
allowed map[signature]Node
|
type aclAndHash struct {
|
||||||
mu sync.Mutex
|
Acl map[Node]map[command]struct{}
|
||||||
|
Hash [32]byte
|
||||||
}
|
}
|
||||||
|
|
||||||
func newAllowedSignatures() *allowedSignatures {
|
func newAclAndHash() aclAndHash {
|
||||||
a := allowedSignatures{
|
a := aclAndHash{
|
||||||
allowed: make(map[signature]Node),
|
Acl: make(map[Node]map[command]struct{}),
|
||||||
}
|
}
|
||||||
|
|
||||||
return &a
|
return a
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type nodeAcl struct {
|
||||||
|
// allowed is a map for holding all the allowed signatures.
|
||||||
|
aclAndHash aclAndHash
|
||||||
|
filePath string
|
||||||
|
mu sync.Mutex
|
||||||
|
}
|
||||||
|
|
||||||
|
func newNodeAcl(c *Configuration) *nodeAcl {
|
||||||
|
n := nodeAcl{
|
||||||
|
aclAndHash: newAclAndHash(),
|
||||||
|
filePath: filepath.Join(c.DatabaseFolder, "acl.txt"),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &n
|
||||||
|
}
|
||||||
|
|
||||||
|
// loadFromFile will try to load all the currently stored acl's from file,
|
||||||
|
// and return the error if it fails.
|
||||||
|
// If no file is found a nil error is returned.
|
||||||
|
func (n *nodeAcl) loadFromFile() error {
|
||||||
|
if _, err := os.Stat(n.filePath); os.IsNotExist(err) {
|
||||||
|
// Just logging the error since it is not crucial that a key file is missing,
|
||||||
|
// since a new one will be created on the next update.
|
||||||
|
log.Printf("no acl file found at %v\n", n.filePath)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
fh, err := os.OpenFile(n.filePath, os.O_RDONLY, 0600)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error: failed to open acl file: %v", err)
|
||||||
|
}
|
||||||
|
defer fh.Close()
|
||||||
|
|
||||||
|
b, err := io.ReadAll(fh)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
n.mu.Lock()
|
||||||
|
defer n.mu.Unlock()
|
||||||
|
err = json.Unmarshal(b, &n.aclAndHash)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("\n ***** DEBUG: Loaded existing acl's from file: %v\n\n", n.aclAndHash.Hash)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// saveToFile will save the acl to file for persistent storage.
|
||||||
|
// An error is returned if it fails.
|
||||||
|
func (n *nodeAcl) saveToFile() error {
|
||||||
|
fh, err := os.OpenFile(n.filePath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error: failed to acl file: %v", err)
|
||||||
|
}
|
||||||
|
defer fh.Close()
|
||||||
|
|
||||||
|
n.mu.Lock()
|
||||||
|
defer n.mu.Unlock()
|
||||||
|
b, err := json.Marshal(n.aclAndHash)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = fh.Write(b)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// --------------------- KEYS ---------------------
|
||||||
|
|
||||||
type keysAndHash struct {
|
type keysAndHash struct {
|
||||||
Keys map[Node][]byte
|
Keys map[Node][]byte
|
||||||
Hash [32]byte
|
Hash [32]byte
|
||||||
|
|
Loading…
Reference in a new issue