loopback/lib/models/acl.js

443 lines
13 KiB
JavaScript
Raw Normal View History

/**
2013-11-10 06:22:16 +00:00
Schema ACL options
2013-11-10 06:22:16 +00:00
Object level permissions, for example, an album owned by a user
2013-11-10 06:22:16 +00:00
Factors to be authorized against:
2013-11-10 06:22:16 +00:00
* model name: Album
* model instance properties: userId of the album, friends, shared
* methods
* app and/or user ids/roles
** loggedIn
** roles
** userId
** appId
** none
** everyone
** relations: owner/friend/granted
2013-11-10 06:22:16 +00:00
Class level permissions, for example, Album
* model name: Album
* methods
2013-07-15 21:07:17 +00:00
2013-11-10 06:22:16 +00:00
URL/Route level permissions
* url pattern
* application id
* ip addresses
* http headers
2013-07-15 21:07:17 +00:00
2013-11-10 06:22:16 +00:00
Map to oAuth 2.0 scopes
*/
var loopback = require('../loopback');
2013-11-20 21:31:30 +00:00
var async = require('async');
var assert = require('assert');
var debug = require('debug')('loopback:security:acl');
2013-11-20 21:31:30 +00:00
var ctx = require('./access-context');
var AccessContext = ctx.AccessContext;
var Principal = ctx.Principal;
var AccessRequest = ctx.AccessRequest;
2013-11-20 21:31:30 +00:00
var role = require('./role');
var Role = role.Role;
2013-11-10 06:22:16 +00:00
2013-11-12 06:16:51 +00:00
/**
* Schema for Scope which represents the permissions that are granted to client
* applications by the resource owner
2013-11-12 06:16:51 +00:00
*/
2013-11-10 06:22:16 +00:00
var ScopeSchema = {
name: {type: String, required: true},
description: String
2013-11-04 21:19:02 +00:00
};
2013-11-10 06:22:16 +00:00
/**
2013-11-12 06:16:51 +00:00
* Resource owner grants/delegates permissions to client applications
*
* For a protected resource, does the client application have the authorization
* from the resource owner (user or system)?
2013-11-12 06:16:51 +00:00
*
2013-11-10 06:22:16 +00:00
* Scope has many resource access entries
* @type {createModel|*}
*/
2013-11-13 18:02:59 +00:00
var Scope = loopback.createModel('Scope', ScopeSchema);
2013-11-10 06:22:16 +00:00
2013-11-12 06:16:51 +00:00
/**
* System grants permissions to principals (users/applications, can be grouped
* into roles).
2013-11-12 06:16:51 +00:00
*
* Protected resource: the model data and operations
* (model/property/method/relation/)
2013-11-12 06:16:51 +00:00
*
* For a given principal, such as client application and/or user, is it allowed
* to access (read/write/execute)
2013-11-12 06:16:51 +00:00
* the protected resource?
*
*/
var ACLSchema = {
2013-11-10 06:22:16 +00:00
model: String, // The name of the model
property: String, // The name of the property, method, scope, or relation
/**
* Name of the access type - READ/WRITE/EXEC
*/
accessType: String,
/**
* ALARM - Generate an alarm, in a system dependent way, the access specified
* in the permissions component of the ACL entry.
2013-11-10 06:22:16 +00:00
* ALLOW - Explicitly grants access to the resource.
* AUDIT - Log, in a system dependent way, the access specified in the
* permissions component of the ACL entry.
2013-11-10 06:22:16 +00:00
* DENY - Explicitly denies access to the resource.
*/
permission: String,
/**
* Type of the principal - Application/User/Role
*/
principalType: String,
/**
* Id of the principal - such as appId, userId or roleId
*/
principalId: String
2013-10-28 17:44:05 +00:00
};
2013-11-04 21:19:02 +00:00
var ACL = loopback.createModel('ACL', ACLSchema);
ACL.ALL = AccessContext.ALL;
ACL.DEFAULT = AccessContext.DEFAULT; // Not specified
ACL.ALLOW = AccessContext.ALLOW; // Allow
ACL.ALARM = AccessContext.ALARM; // Warn - send an alarm
ACL.AUDIT = AccessContext.AUDIT; // Audit - record the access
ACL.DENY = AccessContext.DENY; // Deny
ACL.READ = AccessContext.READ; // Read operation
ACL.WRITE = AccessContext.WRITE; // Write operation
ACL.EXECUTE = AccessContext.EXECUTE; // Execute operation
ACL.USER = Principal.USER;
ACL.APP = ACL.APPLICATION = Principal.APPLICATION;
ACL.ROLE = Principal.ROLE;
ACL.SCOPE = Principal.SCOPE;
2013-11-10 06:22:16 +00:00
/**
* Calculate the matching score for the given rule and request
* @param {ACL} rule The ACL entry
* @param {AccessRequest} req The request
* @returns {number}
*/
ACL.getMatchingScore = function getMatchingScore(rule, req) {
var props = ['model', 'property', 'accessType'];
var score = 0;
for (var i = 0; i < props.length; i++) {
// Shift the score by 4 for each of the properties as the weight
score = score * 4;
var val1 = rule[props[i]] || ACL.ALL;
var val2 = req[props[i]] || ACL.ALL;
if (val1 === val2) {
// Exact match
score += 3;
} else if (val1 === ACL.ALL) {
// Wildcard match
score += 2;
} else if (val2 === ACL.ALL) {
// Doesn't match at all
score += 1;
} else {
return -1;
}
}
score = score * 4;
score += AccessContext.permissionOrder[rule.permission || ACL.ALLOW] - 1;
return score;
};
2013-11-12 18:10:32 +00:00
2013-11-15 17:41:26 +00:00
/*!
* Resolve permission from the ACLs
* @param {Object[]) acls The list of ACLs
* @param {Object} req The request
* @returns {Object} The effective ACL
2013-11-15 17:41:26 +00:00
*/
ACL.resolvePermission = function resolvePermission(acls, req) {
debug('resolvePermission(): %j %j', acls, req);
// Sort by the matching score in descending order
acls = acls.sort(function (rule1, rule2) {
return ACL.getMatchingScore(rule2, req) - ACL.getMatchingScore(rule1, req);
});
var permission = ACL.DEFAULT;
var score = 0;
for (var i = 0; i < acls.length; i++) {
score = ACL.getMatchingScore(acls[i], req);
if (score < 0) {
break;
}
if (!req.isWildcard()) {
// We should stop from the first match for non-wildcard
permission = acls[i].permission;
break;
} else {
if(acls[i].model === req.model &&
acls[i].property === req.property &&
acls[i].accessType === req.accessType
) {
// We should stop at the exact match
permission = acls[i].permission;
break;
}
// For wildcard match, find the strongest permission
if(AccessContext.permissionOrder[acls[i].permission]
> AccessContext.permissionOrder[permission]) {
permission = acls[i].permission;
2013-11-15 17:41:26 +00:00
}
}
}
2013-12-11 05:49:18 +00:00
var res = new AccessRequest(req.model, req.property, req.accessType,
permission || ACL.DEFAULT);
debug('resolvePermission() returns: %j', res);
return res;
};
2013-11-15 17:41:26 +00:00
2013-11-20 21:31:30 +00:00
/*!
* Get the static ACLs from the model definition
2013-11-20 21:31:30 +00:00
* @param {String} model The model name
* @param {String} property The property/method/relation name
*
* @return {Object[]} An array of ACLs
2013-11-12 06:16:51 +00:00
*/
ACL.getStaticACLs = function getStaticACLs(model, property) {
debug('getStaticACLs(): %s %s', model, property);
2013-11-20 21:31:30 +00:00
var modelClass = loopback.getModel(model);
2013-11-15 17:41:26 +00:00
var staticACLs = [];
2013-11-20 21:31:30 +00:00
if (modelClass && modelClass.settings.acls) {
modelClass.settings.acls.forEach(function (acl) {
staticACLs.push(new ACL({
2013-11-20 21:31:30 +00:00
model: model,
property: acl.property || ACL.ALL,
principalType: acl.principalType,
principalId: acl.principalId, // TODO: Should it be a name?
accessType: acl.accessType,
permission: acl.permission
}));
2013-11-20 21:31:30 +00:00
});
}
var prop = modelClass &&
(modelClass.definition.properties[property] // regular property
2013-11-15 18:08:49 +00:00
|| (modelClass._scopeMeta && modelClass._scopeMeta[property]) // relation/scope
|| modelClass[property] // static method
|| modelClass.prototype[property]); // prototype method
2013-11-20 21:31:30 +00:00
if (prop && prop.acls) {
prop.acls.forEach(function (acl) {
staticACLs.push(new ACL({
2013-11-20 21:31:30 +00:00
model: modelClass.modelName,
property: property,
principalType: acl.principalType,
principalId: acl.principalId,
accessType: acl.accessType,
permission: acl.permission
}));
2013-11-20 21:31:30 +00:00
});
2013-11-15 17:41:26 +00:00
}
debug('getStaticACLs() returns: %j', staticACLs);
return staticACLs;
};
2013-11-15 17:41:26 +00:00
2013-11-20 21:31:30 +00:00
/**
* Check if the given principal is allowed to access the model/property
* @param {String} principalType The principal type
* @param {String} principalId The principal id
* @param {String} model The model name
* @param {String} property The property/method/relation name
* @param {String} accessType The access type
* @param {Function} callback The callback function
*
* @callback callback
* @param {String|Error} err The error object
* @param {Object} the access permission
*/
ACL.checkPermission = function checkPermission(principalType, principalId,
model, property, accessType,
callback) {
debug('checkPermission(): %s %s %s %s %s', principalType, principalId, model,
property, accessType);
2013-11-20 21:31:30 +00:00
property = property || ACL.ALL;
var propertyQuery = (property === ACL.ALL) ? undefined : {inq: [property, ACL.ALL]};
accessType = accessType || ACL.ALL;
var accessTypeQuery = (accessType === ACL.ALL) ? undefined : {inq: [accessType, ACL.ALL]};
var req = new AccessRequest(model, property, accessType);
var acls = ACL.getStaticACLs(model, property);
var resolved = ACL.resolvePermission(acls, req);
if(resolved && resolved.permission === ACL.DENY) {
2013-11-15 17:41:26 +00:00
// Fail fast
debug('checkPermission(): %j', resolved);
2013-11-20 21:31:30 +00:00
process.nextTick(function() {
callback && callback(null, resolved);
2013-11-20 21:31:30 +00:00
});
2013-11-15 17:41:26 +00:00
return;
}
2013-11-12 06:16:51 +00:00
ACL.find({where: {principalType: principalType, principalId: principalId,
2013-11-14 01:14:13 +00:00
model: model, property: propertyQuery, accessType: accessTypeQuery}},
function (err, dynACLs) {
2013-11-12 06:16:51 +00:00
if (err) {
callback && callback(err);
return;
}
acls = acls.concat(dynACLs);
resolved = ACL.resolvePermission(acls, req);
if(resolved && resolved.permission === ACL.DEFAULT) {
2013-11-20 21:31:30 +00:00
var modelClass = loopback.getModel(model);
resolved.permission = (modelClass && modelClass.settings.defaultPermission) || ACL.ALLOW;
2013-11-20 21:31:30 +00:00
}
debug('checkPermission(): %j', resolved);
callback && callback(null, resolved);
2013-11-12 06:16:51 +00:00
});
};
/**
* Check if the given scope is allowed to access the model/property
2013-11-20 21:31:30 +00:00
* @param {String} scope The scope name
* @param {String} model The model name
* @param {String} property The property/method/relation name
* @param {String} accessType The access type
* @param {Function} callback The callback function
*
* @callback callback
* @param {String|Error} err The error object
* @param {Object} the access permission
2013-11-12 06:16:51 +00:00
*/
Scope.checkPermission = function (scope, model, property, accessType, callback) {
2013-11-10 06:22:16 +00:00
Scope.findOne({where: {name: scope}}, function (err, scope) {
if (err) {
callback && callback(err);
} else {
2013-11-14 01:14:13 +00:00
ACL.checkPermission(ACL.SCOPE, scope.id, model, property, accessType, callback);
2013-11-10 06:22:16 +00:00
}
});
2013-11-12 18:10:32 +00:00
};
2013-11-20 21:31:30 +00:00
/**
* Check if the request has the permission to access
* @param {Object} context
* @property {Object[]} principals An array of principals
* @property {String|Model} model The model name or model class
* @property {*} id The model instance id
* @property {String} property The property/method/relation name
* @property {String} accessType The access type
2013-11-20 21:31:30 +00:00
* @param {Function} callback
*/
ACL.checkAccess = function (context, callback) {
debug('checkAccess(): %j', context);
2013-11-15 04:19:46 +00:00
if(!(context instanceof AccessContext)) {
context = new AccessContext(context);
}
2013-11-15 04:19:46 +00:00
2013-11-20 21:31:30 +00:00
var model = context.model;
var property = context.property;
var accessType = context.accessType;
var propertyQuery = (property === ACL.ALL) ? undefined : {inq: [property, ACL.ALL]};
var accessTypeQuery = (accessType === ACL.ALL) ? undefined : {inq: [accessType, ACL.ALL]};
var req = new AccessRequest(model.modelName, property, accessType);
var effectiveACLs = [];
var staticACLs = ACL.getStaticACLs(model.modelName, property);
2013-11-20 21:31:30 +00:00
ACL.find({where: {model: model.modelName, property: propertyQuery,
accessType: accessTypeQuery}}, function (err, acls) {
2013-11-20 21:31:30 +00:00
if (err) {
callback && callback(err);
return;
}
var inRoleTasks = [];
2013-12-11 05:49:18 +00:00
acls = acls.concat(staticACLs);
2013-11-20 21:31:30 +00:00
acls.forEach(function (acl) {
// Check exact matches
for (var i = 0; i < context.principals.length; i++) {
var p = context.principals[i];
if (p.type === acl.principalType
&& String(p.id) === String(acl.principalId)) {
2013-11-20 21:31:30 +00:00
effectiveACLs.push(acl);
return;
2013-11-20 21:31:30 +00:00
}
}
// Check role matches
if (acl.principalType === ACL.ROLE) {
inRoleTasks.push(function (done) {
Role.isInRole(acl.principalId, context,
function (err, inRole) {
if (!err && inRole) {
effectiveACLs.push(acl);
}
done(err, acl);
});
});
}
2013-11-20 21:31:30 +00:00
});
async.parallel(inRoleTasks, function (err, results) {
if(err) {
callback && callback(err, null);
return;
}
var resolved = ACL.resolvePermission(effectiveACLs, req);
debug('checkAccess() returns: %j', resolved);
callback && callback(null, resolved);
2013-11-20 21:31:30 +00:00
});
});
};
/**
* Check if the given access token can invoke the method
* @param {AccessToken} token The access token
* @param {String} model The model name
* @param {*} modelId The model id
* @param {String} method The method name
* @param callback The callback function
*
* @callback callback
* @param {String|Error} err The error object
* @param {Boolean} allowed is the request allowed
*/
ACL.checkAccessForToken = function (token, model, modelId, method, callback) {
debug('checkAccessForToken(): %j %s %s %s', token, model, modelId, method);
2013-11-20 21:31:30 +00:00
assert(token, 'Access token is required');
2013-12-07 01:04:47 +00:00
var context = new AccessContext({
accessToken: token,
2013-11-20 21:31:30 +00:00
model: model,
property: method,
method: method,
modelId: modelId
});
2013-12-11 05:49:18 +00:00
context.accessType = context.model._getAccessTypeForMethod(method);
ACL.checkAccess(context, function (err, access) {
if (err) {
2013-11-20 21:31:30 +00:00
callback && callback(err);
return;
}
debug('checkAccessForToken(): %j', access);
2013-11-15 04:19:46 +00:00
callback && callback(null, access.permission !== ACL.DENY);
2013-11-20 21:31:30 +00:00
});
};
2013-11-12 18:10:32 +00:00
module.exports.ACL = ACL;
module.exports.Scope = Scope;