2019-04-24 21:52:08 +00:00
|
|
|
package authorization
|
|
|
|
|
|
|
|
import (
|
2020-02-18 22:15:09 +00:00
|
|
|
"fmt"
|
2019-04-24 21:52:08 +00:00
|
|
|
"net"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
|
2019-12-24 02:14:52 +00:00
|
|
|
"github.com/authelia/authelia/internal/configuration/schema"
|
2020-02-18 22:15:09 +00:00
|
|
|
"github.com/authelia/authelia/internal/logging"
|
2019-04-24 21:52:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const userPrefix = "user:"
|
|
|
|
const groupPrefix = "group:"
|
|
|
|
|
|
|
|
// Authorizer the component in charge of checking whether a user can access a given resource.
|
|
|
|
type Authorizer struct {
|
|
|
|
configuration schema.AccessControlConfiguration
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewAuthorizer create an instance of authorizer with a given access control configuration.
|
|
|
|
func NewAuthorizer(configuration schema.AccessControlConfiguration) *Authorizer {
|
|
|
|
return &Authorizer{
|
|
|
|
configuration: configuration,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subject subject who to check access control for.
|
|
|
|
type Subject struct {
|
|
|
|
Username string
|
|
|
|
Groups []string
|
|
|
|
IP net.IP
|
|
|
|
}
|
|
|
|
|
2020-02-18 22:15:09 +00:00
|
|
|
func (s Subject) String() string {
|
|
|
|
return fmt.Sprintf("username=%s groups=%s ip=%s", s.Username, strings.Join(s.Groups, ","), s.IP.String())
|
|
|
|
}
|
|
|
|
|
2020-05-02 05:06:39 +00:00
|
|
|
// Object object to check access control for.
|
2019-04-24 21:52:08 +00:00
|
|
|
type Object struct {
|
|
|
|
Domain string
|
|
|
|
Path string
|
|
|
|
}
|
|
|
|
|
|
|
|
// selectMatchingSubjectRules take a set of rules and select only the rules matching the subject constraints.
|
2021-01-04 10:55:23 +00:00
|
|
|
func selectMatchingSubjectRules(rules []schema.ACLRule, networks []schema.ACLNetwork, subject Subject) []schema.ACLRule {
|
2019-04-24 21:52:08 +00:00
|
|
|
selectedRules := []schema.ACLRule{}
|
|
|
|
|
|
|
|
for _, rule := range rules {
|
2020-05-06 00:52:06 +00:00
|
|
|
switch {
|
|
|
|
case len(rule.Subjects) > 0:
|
2020-04-16 00:18:11 +00:00
|
|
|
for _, subjectRule := range rule.Subjects {
|
2021-01-04 10:55:23 +00:00
|
|
|
if isSubjectMatching(subject, subjectRule) && isIPMatching(subject.IP, rule.Networks, networks) {
|
2020-04-16 00:18:11 +00:00
|
|
|
selectedRules = append(selectedRules, rule)
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 00:52:06 +00:00
|
|
|
default:
|
2021-01-04 10:55:23 +00:00
|
|
|
if isIPMatching(subject.IP, rule.Networks, networks) {
|
2020-04-16 00:18:11 +00:00
|
|
|
selectedRules = append(selectedRules, rule)
|
|
|
|
}
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return selectedRules
|
|
|
|
}
|
|
|
|
|
|
|
|
func selectMatchingObjectRules(rules []schema.ACLRule, object Object) []schema.ACLRule {
|
|
|
|
selectedRules := []schema.ACLRule{}
|
|
|
|
|
|
|
|
for _, rule := range rules {
|
2020-05-04 19:39:25 +00:00
|
|
|
if isDomainMatching(object.Domain, rule.Domains) && isPathMatching(object.Path, rule.Resources) {
|
|
|
|
selectedRules = append(selectedRules, rule)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
return selectedRules
|
|
|
|
}
|
|
|
|
|
2021-01-04 10:55:23 +00:00
|
|
|
func selectMatchingRules(rules []schema.ACLRule, networks []schema.ACLNetwork, subject Subject, object Object) []schema.ACLRule {
|
|
|
|
matchingRules := selectMatchingSubjectRules(rules, networks, subject)
|
2019-04-24 21:52:08 +00:00
|
|
|
return selectMatchingObjectRules(matchingRules, object)
|
|
|
|
}
|
|
|
|
|
2020-04-20 21:03:38 +00:00
|
|
|
// PolicyToLevel converts a string policy to int authorization level.
|
2020-02-04 21:18:02 +00:00
|
|
|
func PolicyToLevel(policy string) Level {
|
2019-04-24 21:52:08 +00:00
|
|
|
switch policy {
|
|
|
|
case "bypass":
|
|
|
|
return Bypass
|
|
|
|
case "one_factor":
|
|
|
|
return OneFactor
|
|
|
|
case "two_factor":
|
|
|
|
return TwoFactor
|
|
|
|
case "deny":
|
|
|
|
return Denied
|
|
|
|
}
|
|
|
|
// By default the deny policy applies.
|
|
|
|
return Denied
|
|
|
|
}
|
|
|
|
|
2020-03-06 00:31:09 +00:00
|
|
|
// IsSecondFactorEnabled return true if at least one policy is set to second factor.
|
|
|
|
func (p *Authorizer) IsSecondFactorEnabled() bool {
|
|
|
|
if PolicyToLevel(p.configuration.DefaultPolicy) == TwoFactor {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, r := range p.configuration.Rules {
|
|
|
|
if PolicyToLevel(r.Policy) == TwoFactor {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
// GetRequiredLevel retrieve the required level of authorization to access the object.
|
|
|
|
func (p *Authorizer) GetRequiredLevel(subject Subject, requestURL url.URL) Level {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger := logging.Logger()
|
|
|
|
logger.Tracef("Check authorization of subject %s and url %s.", subject.String(), requestURL.String())
|
2020-02-18 22:15:09 +00:00
|
|
|
|
2021-01-04 10:55:23 +00:00
|
|
|
matchingRules := selectMatchingRules(p.configuration.Rules, p.configuration.Networks, subject, Object{
|
2019-04-24 21:52:08 +00:00
|
|
|
Domain: requestURL.Hostname(),
|
|
|
|
Path: requestURL.Path,
|
|
|
|
})
|
|
|
|
|
|
|
|
if len(matchingRules) > 0 {
|
2020-02-04 21:18:02 +00:00
|
|
|
return PolicyToLevel(matchingRules[0].Policy)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Tracef("No matching rule for subject %s and url %s... Applying default policy.", subject.String(), requestURL.String())
|
2020-02-18 22:15:09 +00:00
|
|
|
|
2020-02-04 21:18:02 +00:00
|
|
|
return PolicyToLevel(p.configuration.DefaultPolicy)
|
2019-04-24 21:52:08 +00:00
|
|
|
}
|