package auth import ( "fmt" "sort" "strings" ) // VerifyAccess an account has access to a resource using the rules provided. If the account does not have // access an error will be returned. If there are no rules provided which match the resource, an error // will be returned func VerifyAccess(rules []*Rule, acc *Account, res *Resource) error { // the rule is only to be applied if the type matches the resource or is catch-all (*) validTypes := []string{"*", res.Type} // the rule is only to be applied if the name matches the resource or is catch-all (*) validNames := []string{"*", res.Name} // rules can have wildcard excludes on endpoints since this can also be a path for web services, // e.g. /foo/* would include /foo/bar. We also want to check for wildcards and the exact endpoint validEndpoints := []string{"*", res.Endpoint} if comps := strings.Split(res.Endpoint, "/"); len(comps) > 1 { for i := 1; i < len(comps)+1; i++ { wildcard := fmt.Sprintf("%v/*", strings.Join(comps[0:i], "/")) validEndpoints = append(validEndpoints, wildcard) } } // filter the rules to the ones which match the criteria above filteredRules := make([]*Rule, 0) for _, rule := range rules { if !include(validTypes, rule.Resource.Type) { continue } if !include(validNames, rule.Resource.Name) { continue } if !include(validEndpoints, rule.Resource.Endpoint) { continue } filteredRules = append(filteredRules, rule) } // sort the filtered rules by priority, highest to lowest sort.SliceStable(filteredRules, func(i, j int) bool { return filteredRules[i].Priority > filteredRules[j].Priority }) // loop through the rules and check for a rule which applies to this account for _, rule := range filteredRules { // a blank scope indicates the rule applies to everyone, even nil accounts if rule.Scope == ScopePublic && rule.Access == AccessDenied { return ErrForbidden } else if rule.Scope == ScopePublic && rule.Access == AccessGranted { return nil } // all further checks require an account if acc == nil { continue } // this rule applies to any account if rule.Scope == ScopeAccount && rule.Access == AccessDenied { return ErrForbidden } else if rule.Scope == ScopeAccount && rule.Access == AccessGranted { return nil } // if the account has the necessary scope if include(acc.Scopes, rule.Scope) && rule.Access == AccessDenied { return ErrForbidden } else if include(acc.Scopes, rule.Scope) && rule.Access == AccessGranted { return nil } } // if no rules matched then return forbidden return ErrForbidden } // include is a helper function which checks to see if the slice contains the value. includes is // not case sensitive. func include(slice []string, val string) bool { for _, s := range slice { if strings.EqualFold(s, val) { return true } } return false }