A vibe coded tangled fork which supports pijul.
at master 326 lines 8.5 kB view raw
1package rbac 2 3import ( 4 "database/sql" 5 "slices" 6 "strings" 7 8 adapter "github.com/Blank-Xu/sql-adapter" 9 "github.com/casbin/casbin/v2" 10 "github.com/casbin/casbin/v2/model" 11) 12 13const ( 14 ThisServer = "thisserver" // resource identifier for local rbac enforcement 15) 16 17const ( 18 Model = ` 19[request_definition] 20r = sub, dom, obj, act 21 22[policy_definition] 23p = sub, dom, obj, act 24 25[role_definition] 26g = _, _, _ 27 28[policy_effect] 29e = some(where (p.eft == allow)) 30 31[matchers] 32m = r.act == p.act && r.dom == p.dom && r.obj == p.obj && g(r.sub, p.sub, r.dom) 33` 34) 35 36type Enforcer struct { 37 E *casbin.Enforcer 38} 39 40func NewEnforcer(path string) (*Enforcer, error) { 41 m, err := model.NewModelFromString(Model) 42 if err != nil { 43 return nil, err 44 } 45 46 db, err := sql.Open("sqlite3", path+"?_foreign_keys=1") 47 if err != nil { 48 return nil, err 49 } 50 51 a, err := adapter.NewAdapter(db, "sqlite3", "acl") 52 if err != nil { 53 return nil, err 54 } 55 56 e, err := casbin.NewEnforcer(m, a) 57 if err != nil { 58 return nil, err 59 } 60 61 e.EnableAutoSave(false) 62 63 return &Enforcer{e}, nil 64} 65 66func (e *Enforcer) AddKnot(knot string) error { 67 // Add policies with patterns 68 _, err := e.E.AddPolicies([][]string{ 69 {"server:owner", knot, knot, "server:invite"}, 70 {"server:member", knot, knot, "repo:create"}, 71 }) 72 if err != nil { 73 return err 74 } 75 76 // all owners are also members 77 _, err = e.E.AddGroupingPolicy("server:owner", "server:member", knot) 78 return err 79} 80 81func (e *Enforcer) AddSpindle(spindle string) error { 82 // the internal repr for spindles is spindle:foo.com 83 spindle = intoSpindle(spindle) 84 85 _, err := e.E.AddPolicies([][]string{ 86 {"server:owner", spindle, spindle, "server:invite"}, 87 }) 88 if err != nil { 89 return err 90 } 91 92 // all owners are also members 93 _, err = e.E.AddGroupingPolicy("server:owner", "server:member", spindle) 94 return err 95} 96 97func (e *Enforcer) RemoveSpindle(spindle string) error { 98 spindle = intoSpindle(spindle) 99 _, err := e.E.DeleteDomains(spindle) 100 return err 101} 102 103func (e *Enforcer) RemoveKnot(knot string) error { 104 _, err := e.E.DeleteDomains(knot) 105 return err 106} 107 108func (e *Enforcer) GetKnotsForUser(did string) ([]string, error) { 109 keepFunc := isNotSpindle 110 stripFunc := unSpindle 111 return e.getDomainsForUser(did, keepFunc, stripFunc) 112} 113 114func (e *Enforcer) GetSpindlesForUser(did string) ([]string, error) { 115 keepFunc := isSpindle 116 stripFunc := unSpindle 117 return e.getDomainsForUser(did, keepFunc, stripFunc) 118} 119 120func (e *Enforcer) AddKnotOwner(domain, owner string) error { 121 return e.addOwner(domain, owner) 122} 123 124func (e *Enforcer) RemoveKnotOwner(domain, owner string) error { 125 return e.removeOwner(domain, owner) 126} 127 128func (e *Enforcer) AddKnotMember(domain, member string) error { 129 return e.addMember(domain, member) 130} 131 132func (e *Enforcer) RemoveKnotMember(domain, member string) error { 133 return e.removeMember(domain, member) 134} 135 136func (e *Enforcer) AddSpindleOwner(domain, owner string) error { 137 return e.addOwner(intoSpindle(domain), owner) 138} 139 140func (e *Enforcer) RemoveSpindleOwner(domain, owner string) error { 141 return e.removeOwner(intoSpindle(domain), owner) 142} 143 144func (e *Enforcer) AddSpindleMember(domain, member string) error { 145 return e.addMember(intoSpindle(domain), member) 146} 147 148func (e *Enforcer) RemoveSpindleMember(domain, member string) error { 149 return e.removeMember(intoSpindle(domain), member) 150} 151 152func repoPolicies(member, domain, repo string) [][]string { 153 return [][]string{ 154 {member, domain, repo, "repo:settings"}, 155 {member, domain, repo, "repo:push"}, 156 {member, domain, repo, "repo:owner"}, 157 {member, domain, repo, "repo:invite"}, 158 {member, domain, repo, "repo:delete"}, 159 {member, domain, repo, RepoCreateDiscussion}, 160 {member, domain, repo, RepoEditDiscussion}, 161 {member, domain, repo, RepoTagDiscussion}, 162 {"server:owner", domain, repo, "repo:delete"}, // server owner can delete any repo 163 } 164} 165func (e *Enforcer) AddRepo(member, domain, repo string) error { 166 err := checkRepoFormat(repo) 167 if err != nil { 168 return err 169 } 170 171 _, err = e.E.AddPolicies(repoPolicies(member, domain, repo)) 172 return err 173} 174func (e *Enforcer) RemoveRepo(member, domain, repo string) error { 175 err := checkRepoFormat(repo) 176 if err != nil { 177 return err 178 } 179 180 _, err = e.E.RemovePolicies(repoPolicies(member, domain, repo)) 181 return err 182} 183 184var ( 185 collaboratorPolicies = func(collaborator, domain, repo string) [][]string { 186 return [][]string{ 187 {collaborator, domain, repo, "repo:collaborator"}, 188 {collaborator, domain, repo, "repo:settings"}, 189 {collaborator, domain, repo, "repo:push"}, 190 {collaborator, domain, repo, RepoCreateDiscussion}, 191 {collaborator, domain, repo, RepoEditDiscussion}, 192 {collaborator, domain, repo, RepoTagDiscussion}, 193 } 194 } 195) 196 197func (e *Enforcer) AddCollaborator(collaborator, domain, repo string) error { 198 err := checkRepoFormat(repo) 199 if err != nil { 200 return err 201 } 202 203 _, err = e.E.AddPolicies(collaboratorPolicies(collaborator, domain, repo)) 204 return err 205} 206 207func (e *Enforcer) RemoveCollaborator(collaborator, domain, repo string) error { 208 err := checkRepoFormat(repo) 209 if err != nil { 210 return err 211 } 212 213 _, err = e.E.RemovePolicies(collaboratorPolicies(collaborator, domain, repo)) 214 return err 215} 216 217func (e *Enforcer) GetUserByRole(role, domain string) ([]string, error) { 218 var membersWithoutRoles []string 219 220 // this includes roles too, casbin does not differentiate. 221 // the filtering criteria is to remove strings not starting with `did:` 222 members, err := e.E.GetImplicitUsersForRole(role, domain) 223 for _, m := range members { 224 if strings.HasPrefix(m, "did:") { 225 membersWithoutRoles = append(membersWithoutRoles, m) 226 } 227 } 228 if err != nil { 229 return nil, err 230 } 231 232 slices.Sort(membersWithoutRoles) 233 return slices.Compact(membersWithoutRoles), nil 234} 235 236func (e *Enforcer) GetKnotUsersByRole(role, domain string) ([]string, error) { 237 return e.GetUserByRole(role, domain) 238} 239 240func (e *Enforcer) GetSpindleUsersByRole(role, domain string) ([]string, error) { 241 return e.GetUserByRole(role, intoSpindle(domain)) 242} 243 244func (e *Enforcer) GetUserByRoleInRepo(role, domain, repo string) ([]string, error) { 245 var users []string 246 247 policies, err := e.E.GetImplicitUsersForResourceByDomain(repo, domain) 248 for _, p := range policies { 249 user := p[0] 250 if strings.HasPrefix(user, "did:") { 251 users = append(users, user) 252 } 253 } 254 if err != nil { 255 return nil, err 256 } 257 258 slices.Sort(users) 259 return slices.Compact(users), nil 260} 261 262func (e *Enforcer) IsKnotOwner(user, domain string) (bool, error) { 263 return e.isRole(user, "server:owner", domain) 264} 265 266func (e *Enforcer) IsKnotMember(user, domain string) (bool, error) { 267 return e.isRole(user, "server:member", domain) 268} 269 270func (e *Enforcer) IsSpindleOwner(user, domain string) (bool, error) { 271 return e.isRole(user, "server:owner", intoSpindle(domain)) 272} 273 274func (e *Enforcer) IsSpindleMember(user, domain string) (bool, error) { 275 return e.isRole(user, "server:member", intoSpindle(domain)) 276} 277 278func (e *Enforcer) IsKnotInviteAllowed(user, domain string) (bool, error) { 279 return e.isInviteAllowed(user, domain) 280} 281 282func (e *Enforcer) IsSpindleInviteAllowed(user, domain string) (bool, error) { 283 return e.isInviteAllowed(user, intoSpindle(domain)) 284} 285 286func (e *Enforcer) IsRepoCreateAllowed(user, domain string) (bool, error) { 287 return e.E.Enforce(user, domain, domain, "repo:create") 288} 289 290func (e *Enforcer) IsRepoDeleteAllowed(user, domain, repo string) (bool, error) { 291 return e.E.Enforce(user, domain, repo, "repo:delete") 292} 293 294func (e *Enforcer) IsRepoOwner(user, domain, repo string) (bool, error) { 295 return e.E.Enforce(user, domain, repo, "repo:owner") 296} 297 298func (e *Enforcer) IsRepoCollaborator(user, domain, repo string) (bool, error) { 299 return e.E.Enforce(user, domain, repo, "repo:collaborator") 300} 301 302func (e *Enforcer) IsPushAllowed(user, domain, repo string) (bool, error) { 303 return e.E.Enforce(user, domain, repo, "repo:push") 304} 305 306func (e *Enforcer) IsSettingsAllowed(user, domain, repo string) (bool, error) { 307 return e.E.Enforce(user, domain, repo, "repo:settings") 308} 309 310func (e *Enforcer) IsCollaboratorInviteAllowed(user, domain, repo string) (bool, error) { 311 return e.E.Enforce(user, domain, repo, "repo:invite") 312} 313 314// given a repo, what permissions does this user have? repo:owner? repo:invite? etc. 315func (e *Enforcer) GetPermissionsInRepo(user, domain, repo string) []string { 316 var permissions []string 317 res := e.E.GetPermissionsForUserInDomain(user, domain) 318 for _, p := range res { 319 // get only permissions for this resource/repo 320 if p[2] == repo { 321 permissions = append(permissions, p[3]) 322 } 323 } 324 325 return permissions 326}