apply_auth.go 2.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package etcdserver
  15. import (
  16. "github.com/coreos/etcd/auth"
  17. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  18. )
  19. type authApplierV3 struct {
  20. applierV3
  21. as auth.AuthStore
  22. user string
  23. }
  24. func newAuthApplierV3(as auth.AuthStore, base applierV3) *authApplierV3 {
  25. return &authApplierV3{base, as, ""}
  26. }
  27. func (aa *authApplierV3) Apply(r *pb.InternalRaftRequest) *applyResult {
  28. user := r.Header.Username
  29. if needAdminPermission(r) && !aa.as.IsAdminPermitted(user) {
  30. return &applyResult{err: auth.ErrPermissionDenied}
  31. }
  32. aa.user = user
  33. ret := aa.applierV3.Apply(r)
  34. aa.user = ""
  35. return ret
  36. }
  37. func (aa *authApplierV3) Put(txnID int64, r *pb.PutRequest) (*pb.PutResponse, error) {
  38. if !aa.as.IsPutPermitted(aa.user, r.Key) {
  39. return nil, auth.ErrPermissionDenied
  40. }
  41. return aa.applierV3.Put(txnID, r)
  42. }
  43. func (aa *authApplierV3) Range(txnID int64, r *pb.RangeRequest) (*pb.RangeResponse, error) {
  44. if !aa.as.IsRangePermitted(aa.user, r.Key, r.RangeEnd) {
  45. return nil, auth.ErrPermissionDenied
  46. }
  47. return aa.applierV3.Range(txnID, r)
  48. }
  49. func (aa *authApplierV3) DeleteRange(txnID int64, r *pb.DeleteRangeRequest) (*pb.DeleteRangeResponse, error) {
  50. if !aa.as.IsDeleteRangePermitted(aa.user, r.Key, r.RangeEnd) {
  51. return nil, auth.ErrPermissionDenied
  52. }
  53. return aa.applierV3.DeleteRange(txnID, r)
  54. }
  55. func needAdminPermission(r *pb.InternalRaftRequest) bool {
  56. switch {
  57. case r.AuthEnable != nil:
  58. return true
  59. case r.AuthDisable != nil:
  60. return true
  61. case r.AuthUserAdd != nil:
  62. return true
  63. case r.AuthUserDelete != nil:
  64. return true
  65. case r.AuthUserChangePassword != nil:
  66. return true
  67. case r.AuthUserGrantRole != nil:
  68. return true
  69. case r.AuthUserGet != nil:
  70. return true
  71. case r.AuthUserRevokeRole != nil:
  72. return true
  73. case r.AuthRoleAdd != nil:
  74. return true
  75. case r.AuthRoleGrantPermission != nil:
  76. return true
  77. case r.AuthRoleGet != nil:
  78. return true
  79. case r.AuthRoleRevokePermission != nil:
  80. return true
  81. case r.AuthRoleDelete != nil:
  82. return true
  83. default:
  84. return false
  85. }
  86. }