mirror of
https://github.com/lightninglabs/aperture.git
synced 2025-12-17 00:54:20 +01:00
auth: LsatAuthenticator -> L402Authenticator sed -i 's/LsatAuthenticator/L402Authenticator/g' aperture.go auth/authenticator.go auth/authenticator_test.go rename package lsat to l402 git mv lsat/ l402 sed 's@aperture/lsat@aperture/l402@g' -i `git grep -l aperture/lsat` sed -i 's@package lsat@package l402@' `git grep -l 'package lsat'` sed -i 's@lsat\.@l402.@g' -i `git grep -l 'lsat\.'` sed 's@l402.Id@lsat.Id@' -i mint/mint_test.go replace lsat with l402 in the code sed 's@lsat@l402@' -i mint/mint_test.go sed 's@Lsat@L402@' -i l402/client_interceptor.go sed 's@lsatstore@l402store@' -i l402/store_test.go replace LSAT to L402 in comments sed '/\/\//s@LSAT@L402@g' -i `git grep -l '//.*LSAT'` replace LSAT -> L402 in the code, skip when a string starts with it sed 's@\([^"/]\)LSAT@\1L402@g' -i `git grep -l LSAT`
181 lines
5.4 KiB
Go
181 lines
5.4 KiB
Go
package l402
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
// Satisfier provides a generic interface to satisfy a caveat based on its
|
|
// condition.
|
|
type Satisfier struct {
|
|
// Condition is the condition of the caveat we'll attempt to satisfy.
|
|
Condition string
|
|
|
|
// SatisfyPrevious ensures a caveat is in accordance with a previous one
|
|
// with the same condition. This is needed since caveats of the same
|
|
// condition can be used multiple times as long as they enforce more
|
|
// permissions than the previous.
|
|
//
|
|
// For example, we have a caveat that only allows us to use an L402 for
|
|
// 7 more days. We can add another caveat that only allows for 3 more
|
|
// days of use and lend it to another party.
|
|
SatisfyPrevious func(previous Caveat, current Caveat) error
|
|
|
|
// SatisfyFinal satisfies the final caveat of an L402. If multiple
|
|
// caveats with the same condition exist, this will only be executed
|
|
// once all previous caveats are also satisfied.
|
|
SatisfyFinal func(Caveat) error
|
|
}
|
|
|
|
// NewServicesSatisfier implements a satisfier to determine whether the target
|
|
// service is authorized for a given L402.
|
|
//
|
|
// TODO(wilmer): Add tier verification?
|
|
func NewServicesSatisfier(targetService string) Satisfier {
|
|
return Satisfier{
|
|
Condition: CondServices,
|
|
SatisfyPrevious: func(prev, cur Caveat) error {
|
|
// Construct a set of the services we were previously
|
|
// allowed to access.
|
|
prevServices, err := decodeServicesCaveatValue(prev.Value)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
prevAllowed := make(map[string]struct{}, len(prevServices))
|
|
for _, service := range prevServices {
|
|
prevAllowed[service.Name] = struct{}{}
|
|
}
|
|
|
|
// The caveat should not include any new services that
|
|
// weren't previously allowed.
|
|
currentServices, err := decodeServicesCaveatValue(cur.Value)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, service := range currentServices {
|
|
if _, ok := prevAllowed[service.Name]; !ok {
|
|
return fmt.Errorf("service %v not "+
|
|
"previously allowed", service)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
},
|
|
SatisfyFinal: func(c Caveat) error {
|
|
services, err := decodeServicesCaveatValue(c.Value)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, service := range services {
|
|
if service.Name == targetService {
|
|
return nil
|
|
}
|
|
}
|
|
return fmt.Errorf("target service %v not authorized",
|
|
targetService)
|
|
},
|
|
}
|
|
}
|
|
|
|
// NewCapabilitiesSatisfier implements a satisfier to determine whether the
|
|
// target capability for a service is authorized for a given L402.
|
|
func NewCapabilitiesSatisfier(service string,
|
|
targetCapability string) Satisfier {
|
|
|
|
return Satisfier{
|
|
Condition: service + CondCapabilitiesSuffix,
|
|
SatisfyPrevious: func(prev, cur Caveat) error {
|
|
// Construct a set of the service's capabilities we were
|
|
// previously allowed to access.
|
|
prevCapabilities := strings.Split(prev.Value, ",")
|
|
allowed := make(map[string]struct{}, len(prevCapabilities))
|
|
for _, capability := range prevCapabilities {
|
|
allowed[capability] = struct{}{}
|
|
}
|
|
|
|
// The caveat should not include any new service
|
|
// capabilities that weren't previously allowed.
|
|
currentCapabilities := strings.Split(cur.Value, ",")
|
|
for _, capability := range currentCapabilities {
|
|
if _, ok := allowed[capability]; !ok {
|
|
return fmt.Errorf("capability %v not "+
|
|
"previously allowed", capability)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
},
|
|
SatisfyFinal: func(c Caveat) error {
|
|
capabilities := strings.Split(c.Value, ",")
|
|
for _, capability := range capabilities {
|
|
if capability == targetCapability {
|
|
return nil
|
|
}
|
|
}
|
|
return fmt.Errorf("target capability %v not authorized",
|
|
targetCapability)
|
|
},
|
|
}
|
|
}
|
|
|
|
// NewTimeoutSatisfier checks if an L402 is expired or not. The Satisfier takes
|
|
// a service name to set as the condition prefix and currentTimestamp to
|
|
// compare against the expiration(s) in the caveats. The expiration time is
|
|
// retrieved from the caveat values themselves. The satisfier will also make
|
|
// sure that each subsequent caveat of the same condition only has increasingly
|
|
// strict expirations.
|
|
func NewTimeoutSatisfier(service string, now func() time.Time) Satisfier {
|
|
return Satisfier{
|
|
Condition: service + CondTimeoutSuffix,
|
|
SatisfyPrevious: func(prev, cur Caveat) error {
|
|
prevValue, err := strconv.ParseInt(prev.Value, 10, 64)
|
|
if err != nil {
|
|
return fmt.Errorf("error parsing previous "+
|
|
"caveat value: %w", err)
|
|
}
|
|
|
|
currValue, err := strconv.ParseInt(cur.Value, 10, 64)
|
|
if err != nil {
|
|
return fmt.Errorf("error parsing caveat "+
|
|
"value: %w", err)
|
|
}
|
|
|
|
prevTime := time.Unix(prevValue, 0)
|
|
currTime := time.Unix(currValue, 0)
|
|
|
|
// Satisfier should fail if a previous timestamp in the
|
|
// list is earlier than ones after it b/c that means
|
|
// they are getting more permissive.
|
|
if prevTime.Before(currTime) {
|
|
return fmt.Errorf("%s caveat violates "+
|
|
"increasing restrictiveness",
|
|
service+CondTimeoutSuffix)
|
|
}
|
|
|
|
return nil
|
|
},
|
|
SatisfyFinal: func(c Caveat) error {
|
|
expirationTimestamp, err := strconv.ParseInt(
|
|
c.Value, 10, 64,
|
|
)
|
|
if err != nil {
|
|
return fmt.Errorf("caveat value not a valid "+
|
|
"integer: %v", err)
|
|
}
|
|
|
|
expirationTime := time.Unix(expirationTimestamp, 0)
|
|
|
|
// Make sure that the final relevant caveat is not
|
|
// passed the current date/time.
|
|
if now().Before(expirationTime) {
|
|
return nil
|
|
}
|
|
|
|
return fmt.Errorf("not authorized to access " +
|
|
"service. L402 has expired")
|
|
},
|
|
}
|
|
}
|