// Copyright IBM Corp. 2014,2019. All Rights Reserved. // Node module: loopback // This file is licensed under the MIT License. // License text available at https://opensource.org/licenses/MIT 'use strict'; /*! Schema ACL options Object level permissions, for example, an album owned by a user Factors to be authorized against: * model name: Album * model instance properties: userId of the album, friends, shared * methods * app and/or user ids/roles ** loggedIn ** roles ** userId ** appId ** none ** everyone ** relations: owner/friend/granted Class level permissions, for example, Album * model name: Album * methods URL/Route level permissions * url pattern * application id * ip addresses * http headers Map to oAuth 2.0 scopes */ const g = require('../../lib/globalize'); const loopback = require('../../lib/loopback'); const utils = require('../../lib/utils'); const async = require('async'); const extend = require('util')._extend; const assert = require('assert'); const debug = require('debug')('loopback:security:acl'); const ctx = require('../../lib/access-context'); const AccessContext = ctx.AccessContext; const Principal = ctx.Principal; const AccessRequest = ctx.AccessRequest; const Role = loopback.Role; assert(Role, 'Role model must be defined before ACL model'); /** * A Model for access control meta data. * * System grants permissions to principals (users/applications, can be grouped * into roles). * * Protected resource: the model data and operations * (model/property/method/relation/…) * * For a given principal, such as client application and/or user, is it allowed * to access (read/write/execute) * the protected resource? * * @header ACL * @property {String} model Name of the model. * @property {String} property Name of the property, method, scope, or relation. * @property {String} accessType Type of access being granted: one of READ, WRITE, or EXECUTE. * @property {String} permission Type of permission granted. One of: * * - ALARM: Generate an alarm, in a system-dependent way, the access specified in the permissions component of the ACL entry. * - ALLOW: Explicitly grants access to the resource. * - AUDIT: Log, in a system-dependent way, the access specified in the permissions component of the ACL entry. * - DENY: Explicitly denies access to the resource. * @property {String} principalType Type of the principal; one of: APPLICATION, USER, ROLE. * @property {String} principalId ID of the principal - such as appId, userId or roleId. * @property {Object} settings Extends the `Model.settings` object. * @property {String} settings.defaultPermission Default permission setting: ALLOW, DENY, ALARM, or AUDIT. Default is ALLOW. * Set to DENY to prohibit all API access by default. * * @class ACL * @inherits PersistedModel */ module.exports = function(ACL) { ACL.ALL = AccessContext.ALL; ACL.DEFAULT = AccessContext.DEFAULT; // Not specified ACL.ALLOW = AccessContext.ALLOW; // Allow ACL.ALARM = AccessContext.ALARM; // Warn - send an alarm ACL.AUDIT = AccessContext.AUDIT; // Audit - record the access ACL.DENY = AccessContext.DENY; // Deny ACL.READ = AccessContext.READ; // Read operation ACL.REPLICATE = AccessContext.REPLICATE; // Replicate (pull) changes ACL.WRITE = AccessContext.WRITE; // Write operation ACL.EXECUTE = AccessContext.EXECUTE; // Execute operation ACL.USER = Principal.USER; ACL.APP = ACL.APPLICATION = Principal.APPLICATION; ACL.ROLE = Principal.ROLE; ACL.SCOPE = Principal.SCOPE; ACL.DEFAULT_SCOPE = ctx.DEFAULT_SCOPES[0]; /** * Calculate the matching score for the given rule and request * @param {ACL} rule The ACL entry * @param {AccessRequest} req The request * @returns {Number} */ ACL.getMatchingScore = function getMatchingScore(rule, req) { const props = ['model', 'property', 'accessType']; let score = 0; for (let i = 0; i < props.length; i++) { // Shift the score by 4 for each of the properties as the weight score = score * 4; const ruleValue = rule[props[i]] || ACL.ALL; const requestedValue = req[props[i]] || ACL.ALL; const isMatchingMethodName = props[i] === 'property' && req.methodNames.indexOf(ruleValue) !== -1; let isMatchingAccessType = ruleValue === requestedValue; if (props[i] === 'accessType' && !isMatchingAccessType) { switch (ruleValue) { case ACL.EXECUTE: // EXECUTE should match READ, REPLICATE and WRITE isMatchingAccessType = true; break; case ACL.WRITE: // WRITE should match REPLICATE too isMatchingAccessType = requestedValue === ACL.REPLICATE; break; } } if (isMatchingMethodName || isMatchingAccessType) { // Exact match score += 3; } else if (ruleValue === ACL.ALL) { // Wildcard match score += 2; } else if (requestedValue === ACL.ALL) { score += 1; } else { // Doesn't match at all return -1; } } // Weigh against the principal type into 4 levels // - user level (explicitly allow/deny a given user) // - app level (explicitly allow/deny a given app) // - role level (role based authorization) // - other // user > app > role > ... score = score * 4; switch (rule.principalType) { case ACL.USER: score += 4; break; case ACL.APP: score += 3; break; case ACL.ROLE: score += 2; break; default: score += 1; } // Weigh against the roles // everyone < authenticated/unauthenticated < related < owner < ... score = score * 8; if (rule.principalType === ACL.ROLE) { switch (rule.principalId) { case Role.OWNER: score += 4; break; case Role.RELATED: score += 3; break; case Role.AUTHENTICATED: case Role.UNAUTHENTICATED: score += 2; break; case Role.EVERYONE: score += 1; break; default: score += 5; } } score = score * 4; score += AccessContext.permissionOrder[rule.permission || ACL.ALLOW] - 1; return score; }; /** * Get matching score for the given `AccessRequest`. * @param {AccessRequest} req The request * @returns {Number} score */ ACL.prototype.score = function(req) { return this.constructor.getMatchingScore(this, req); }; /*! * Resolve permission from the ACLs * @param {Object[]) acls The list of ACLs * @param {AccessRequest} req The access request * @returns {AccessRequest} result The resolved access request */ ACL.resolvePermission = function resolvePermission(acls, req) { if (!(req instanceof AccessRequest)) { req.registry = this.registry; req = new AccessRequest(req); } // Sort by the matching score in descending order acls = acls.sort(function(rule1, rule2) { return ACL.getMatchingScore(rule2, req) - ACL.getMatchingScore(rule1, req); }); let permission = ACL.DEFAULT; let score = 0; for (let i = 0; i < acls.length; i++) { const candidate = acls[i]; score = ACL.getMatchingScore(candidate, req); if (score < 0) { // the highest scored ACL did not match break; } if (!req.isWildcard()) { // We should stop from the first match for non-wildcard permission = candidate.permission; break; } else { if (req.exactlyMatches(candidate)) { permission = candidate.permission; break; } // For wildcard match, find the strongest permission const candidateOrder = AccessContext.permissionOrder[candidate.permission]; const permissionOrder = AccessContext.permissionOrder[permission]; if (candidateOrder > permissionOrder) { permission = candidate.permission; break; } } } if (debug.enabled) { debug('The following ACLs were searched: '); acls.forEach(function(acl) { acl.debug(); debug('with score:', acl.score(req)); }); } const res = new AccessRequest({ model: req.model, property: req.property, accessType: req.accessType, permission: permission || ACL.DEFAULT, registry: this.registry}); // Elucidate permission status if DEFAULT res.settleDefaultPermission(); return res; }; /*! * Get the static ACLs from the model definition * @param {String} model The model name * @param {String} property The property/method/relation name * * @return {Object[]} An array of ACLs */ ACL.getStaticACLs = function getStaticACLs(model, property) { const modelClass = this.registry.findModel(model); const staticACLs = []; if (modelClass && modelClass.settings.acls) { modelClass.settings.acls.forEach(function(acl) { let prop = acl.property; // We support static ACL property with array of string values. if (Array.isArray(prop) && prop.indexOf(property) >= 0) prop = property; if (!prop || prop === ACL.ALL || property === prop) { staticACLs.push(new ACL({ model: model, property: prop || ACL.ALL, principalType: acl.principalType, principalId: acl.principalId, // TODO: Should it be a name? accessType: acl.accessType || ACL.ALL, permission: acl.permission, })); } }); } const prop = modelClass && ( // regular property modelClass.definition.properties[property] || // relation/scope (modelClass._scopeMeta && modelClass._scopeMeta[property]) || // static method modelClass[property] || // prototype method modelClass.prototype[property]); if (prop && prop.acls) { prop.acls.forEach(function(acl) { staticACLs.push(new ACL({ model: modelClass.modelName, property: property, principalType: acl.principalType, principalId: acl.principalId, accessType: acl.accessType, permission: acl.permission, })); }); } return staticACLs; }; /** * Check if the given principal is allowed to access the model/property * @param {String} principalType The principal type. * @param {String} principalId The principal ID. * @param {String} model The model name. * @param {String} property The property/method/relation name. * @param {String} accessType The access type. * @callback {Function} callback Callback function. * @param {String|Error} err The error object. * @param {AccessRequest} result The resolved access request. */ ACL.checkPermission = function checkPermission(principalType, principalId, model, property, accessType, callback) { if (!callback) callback = utils.createPromiseCallback(); if (principalId !== null && principalId !== undefined && (typeof principalId !== 'string')) { principalId = principalId.toString(); } property = property || ACL.ALL; const propertyQuery = (property === ACL.ALL) ? undefined : {inq: [property, ACL.ALL]}; accessType = accessType || ACL.ALL; const accessTypeQuery = (accessType === ACL.ALL) ? undefined : {inq: [accessType, ACL.ALL, ACL.EXECUTE]}; const req = new AccessRequest({model, property, accessType, registry: this.registry}); let acls = this.getStaticACLs(model, property); // resolved is an instance of AccessRequest let resolved = this.resolvePermission(acls, req); if (resolved && resolved.permission === ACL.DENY) { debug('Permission denied by statically resolved permission'); debug(' Resolved Permission: %j', resolved); process.nextTick(function() { callback(null, resolved); }); return callback.promise; } const self = this; this.find({where: {principalType: principalType, principalId: principalId, model: model, property: propertyQuery, accessType: accessTypeQuery}}, function(err, dynACLs) { if (err) { return callback(err); } acls = acls.concat(dynACLs); // resolved is an instance of AccessRequest resolved = self.resolvePermission(acls, req); return callback(null, resolved); }); return callback.promise; }; ACL.prototype.debug = function() { if (debug.enabled) { debug('---ACL---'); debug('model %s', this.model); debug('property %s', this.property); debug('principalType %s', this.principalType); debug('principalId %s', this.principalId); debug('accessType %s', this.accessType); debug('permission %s', this.permission); } }; // NOTE Regarding ACL.isAllowed() and ACL.prototype.isAllowed() // Extending existing logic, including from ACL.checkAccessForContext() method, // ACL instance with missing property `permission` are not promoted to // permission = ACL.DEFAULT config. Such ACL instances will hence always be // inefective /** * Test if ACL's permission is ALLOW * @param {String} permission The permission to test, expects one of 'ALLOW', 'DENY', 'DEFAULT' * @param {String} defaultPermission The default permission to apply if not providing a finite one in the permission parameter * @returns {Boolean} true if ACL permission is ALLOW */ ACL.isAllowed = function(permission, defaultPermission) { if (permission === ACL.DEFAULT) { permission = defaultPermission || ACL.ALLOW; } return permission !== loopback.ACL.DENY; }; /** * Test if ACL's permission is ALLOW * @param {String} defaultPermission The default permission to apply if missing in ACL instance * @returns {Boolean} true if ACL permission is ALLOW */ ACL.prototype.isAllowed = function(defaultPermission) { return this.constructor.isAllowed(this.permission, defaultPermission); }; /** * Check if the request has the permission to access. * @options {AccessContext|Object} context * An AccessContext instance or a plain object with the following properties. * @property {Object[]} principals An array of principals. * @property {String|Model} model The model name or model class. * @property {*} modelId The model instance ID. * @property {String} property The property/method/relation name. * @property {String} accessType The access type: * READ, REPLICATE, WRITE, or EXECUTE. * @callback {Function} callback Callback function * @param {String|Error} err The error object. * @param {AccessRequest} result The resolved access request. */ ACL.checkAccessForContext = function(context, callback) { if (!callback) callback = utils.createPromiseCallback(); const self = this; self.resolveRelatedModels(); const roleModel = self.roleModel; if (!(context instanceof AccessContext)) { context.registry = this.registry; context = new AccessContext(context); } let authorizedRoles = {}; const remotingContext = context.remotingContext; const model = context.model; const modelDefaultPermission = model && model.settings.defaultPermission; const property = context.property; const accessType = context.accessType; const modelName = context.modelName; const methodNames = context.methodNames; const propertyQuery = (property === ACL.ALL) ? undefined : {inq: methodNames.concat([ACL.ALL])}; const accessTypeQuery = (accessType === ACL.ALL) ? undefined : (accessType === ACL.REPLICATE) ? {inq: [ACL.REPLICATE, ACL.WRITE, ACL.ALL]} : {inq: [accessType, ACL.ALL]}; const req = new AccessRequest({ model: modelName, property, accessType, permission: ACL.DEFAULT, methodNames, registry: this.registry}); if (!context.isScopeAllowed()) { req.permission = ACL.DENY; debug('--Denied by scope config--'); debug('Scopes allowed:', context.accessToken.scopes || ctx.DEFAULT_SCOPES); debug('Scope required:', context.getScopes()); context.debug(); callback(null, req); return callback.promise; } const effectiveACLs = []; const staticACLs = self.getStaticACLs(model.modelName, property); const query = { where: { model: {inq: [model.modelName, ACL.ALL]}, property: propertyQuery, accessType: accessTypeQuery, }, }; this.find(query, function(err, acls) { if (err) return callback(err); const inRoleTasks = []; acls = acls.concat(staticACLs); acls.forEach(function(acl) { // Check exact matches for (let i = 0; i < context.principals.length; i++) { const p = context.principals[i]; const typeMatch = p.type === acl.principalType; const idMatch = String(p.id) === String(acl.principalId); if (typeMatch && idMatch) { effectiveACLs.push(acl); return; } } // Check role matches if (acl.principalType === ACL.ROLE) { inRoleTasks.push(function(done) { roleModel.isInRole(acl.principalId, context, function(err, inRole) { if (!err && inRole) { effectiveACLs.push(acl); // add the role to authorizedRoles if allowed if (acl.isAllowed(modelDefaultPermission)) authorizedRoles[acl.principalId] = true; } done(err, acl); }); }); } }); async.parallel(inRoleTasks, function(err, results) { if (err) return callback(err, null); // resolved is an instance of AccessRequest const resolved = self.resolvePermission(effectiveACLs, req); debug('---Resolved---'); resolved.debug(); // set authorizedRoles in remotingContext options argument if // resolved AccessRequest permission is ALLOW, else set it to empty object authorizedRoles = resolved.isAllowed() ? authorizedRoles : {}; saveAuthorizedRolesToRemotingContext(remotingContext, authorizedRoles); return callback(null, resolved); }); }); return callback.promise; }; function saveAuthorizedRolesToRemotingContext(remotingContext, authorizedRoles) { const options = remotingContext && remotingContext.args && remotingContext.args.options; // authorizedRoles key/value map is added to the options argument only if // the latter exists and is an object. This means that the feature's availability // will depend on the app configuration if (options && typeof options === 'object') { // null is object too options.authorizedRoles = authorizedRoles; } } /** * Check if the given access token can invoke the method * @param {AccessToken} token The access token * @param {String} model The model name * @param {*} modelId The model id * @param {String} method The method name * @callback {Function} callback Callback function * @param {String|Error} err The error object * @param {Boolean} allowed is the request allowed */ ACL.checkAccessForToken = function(token, model, modelId, method, callback) { assert(token, 'Access token is required'); if (!callback) callback = utils.createPromiseCallback(); const context = new AccessContext({ registry: this.registry, accessToken: token, model: model, property: method, method: method, modelId: modelId, }); this.checkAccessForContext(context, function(err, accessRequest) { if (err) callback(err); else callback(null, accessRequest.isAllowed()); }); return callback.promise; }; ACL.resolveRelatedModels = function() { if (!this.roleModel) { const reg = this.registry; this.roleModel = reg.getModelByType('Role'); this.roleMappingModel = reg.getModelByType('RoleMapping'); this.userModel = reg.getModelByType('User'); this.applicationModel = reg.getModelByType('Application'); } }; /** * Resolve a principal by type/id * @param {String} type Principal type - ROLE/APP/USER * @param {String|Number} id Principal id or name * @callback {Function} callback Callback function * @param {String|Error} err The error object * @param {Object} result An instance of principal (Role, Application or User) */ ACL.resolvePrincipal = function(type, id, cb) { cb = cb || utils.createPromiseCallback(); type = type || ACL.ROLE; this.resolveRelatedModels(); switch (type) { case ACL.ROLE: this.roleModel.findOne({where: {or: [{name: id}, {id: id}]}}, cb); break; case ACL.USER: this.userModel.findOne( {where: {or: [{username: id}, {email: id}, {id: id}]}}, cb, ); break; case ACL.APP: this.applicationModel.findOne( {where: {or: [{name: id}, {email: id}, {id: id}]}}, cb, ); break; default: // try resolving a user model with a name matching the principalType const userModel = this.registry.findModel(type); if (userModel) { userModel.findOne( {where: {or: [{username: id}, {email: id}, {id: id}]}}, cb, ); } else { process.nextTick(function() { const err = new Error(g.f('Invalid principal type: %s', type)); err.statusCode = 400; err.code = 'INVALID_PRINCIPAL_TYPE'; cb(err); }); } } return cb.promise; }; /** * Check if the given principal is mapped to the role * @param {String} principalType Principal type * @param {String|*} principalId Principal id/name * @param {String|*} role Role id/name * @callback {Function} callback Callback function * @param {String|Error} err The error object * @param {Boolean} isMapped is the ACL mapped to the role */ ACL.isMappedToRole = function(principalType, principalId, role, cb) { cb = cb || utils.createPromiseCallback(); const self = this; this.resolvePrincipal(principalType, principalId, function(err, principal) { if (err) return cb(err); if (principal != null) { principalId = principal.id; } principalType = principalType || 'ROLE'; self.resolvePrincipal('ROLE', role, function(err, role) { if (err || !role) return cb(err, role); self.roleMappingModel.findOne({ where: { roleId: role.id, principalType: principalType, principalId: String(principalId), }, }, function(err, result) { if (err) return cb(err); return cb(null, !!result); }); }); }); return cb.promise; }; };