mirror of
https://github.com/bjc/prosody.git
synced 2025-04-04 21:57:45 +03:00
mod_authz_internal, and more: New iteration of role API
These changes to the API (hopefully the last) introduce a cleaner separation between the user's primary (default) role, and their secondary (optional) roles. To keep the code sane and reduce complexity, a data migration is needed for people using stored roles in 0.12. This can be performed with prosodyctl mod_authz_internal migrate <host>
This commit is contained in:
parent
2b0676396d
commit
f5768f63c9
6 changed files with 188 additions and 63 deletions
|
@ -538,6 +538,7 @@ function api:load_resource(path, mode)
|
||||||
end
|
end
|
||||||
|
|
||||||
function api:open_store(name, store_type)
|
function api:open_store(name, store_type)
|
||||||
|
if self.host == "*" then return nil, "global-storage-not-supported"; end
|
||||||
return require"core.storagemanager".open(self.host, name or self.name, store_type);
|
return require"core.storagemanager".open(self.host, name or self.name, store_type);
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -629,7 +630,7 @@ function api:may(action, context)
|
||||||
local role;
|
local role;
|
||||||
local node, host = jid_split(context);
|
local node, host = jid_split(context);
|
||||||
if host == self.host then
|
if host == self.host then
|
||||||
role = hosts[host].authz.get_user_default_role(node);
|
role = hosts[host].authz.get_user_role(node);
|
||||||
else
|
else
|
||||||
role = hosts[self.host].authz.get_jid_role(context);
|
role = hosts[self.host].authz.get_jid_role(context);
|
||||||
end
|
end
|
||||||
|
|
|
@ -135,7 +135,7 @@ local function make_authenticated(session, username, role_name)
|
||||||
if role_name then
|
if role_name then
|
||||||
role = hosts[session.host].authz.get_role_by_name(role_name);
|
role = hosts[session.host].authz.get_role_by_name(role_name);
|
||||||
else
|
else
|
||||||
role = hosts[session.host].authz.get_user_default_role(username);
|
role = hosts[session.host].authz.get_user_role(username);
|
||||||
end
|
end
|
||||||
if role then
|
if role then
|
||||||
sessionlib.set_role(session, role);
|
sessionlib.set_role(session, role);
|
||||||
|
|
|
@ -37,13 +37,17 @@ end
|
||||||
local fallback_authz_provider = {
|
local fallback_authz_provider = {
|
||||||
get_user_roles = function (user) end; --luacheck: ignore 212/user
|
get_user_roles = function (user) end; --luacheck: ignore 212/user
|
||||||
get_jids_with_role = function (role) end; --luacheck: ignore 212
|
get_jids_with_role = function (role) end; --luacheck: ignore 212
|
||||||
set_user_roles = function (user, roles) end; -- luacheck: ignore 212
|
|
||||||
set_jid_roles = function (jid, roles) end; -- luacheck: ignore 212
|
|
||||||
|
|
||||||
get_user_default_role = function (user) end; -- luacheck: ignore 212
|
get_user_role = function (user) end; -- luacheck: ignore 212
|
||||||
get_users_with_role = function (role_name) end; -- luacheck: ignore 212
|
set_user_role = function (user, roles) end; -- luacheck: ignore 212
|
||||||
|
|
||||||
|
add_user_secondary_role = function (user, host, role_name) end; --luacheck: ignore 212
|
||||||
|
remove_user_secondary_role = function (user, host, role_name) end; --luacheck: ignore 212
|
||||||
|
|
||||||
get_jid_role = function (jid) end; -- luacheck: ignore 212
|
get_jid_role = function (jid) end; -- luacheck: ignore 212
|
||||||
set_jid_role = function (jid) end; -- luacheck: ignore 212
|
set_jid_role = function (jid, role) end; -- luacheck: ignore 212
|
||||||
|
|
||||||
|
get_users_with_role = function (role_name) end; -- luacheck: ignore 212
|
||||||
add_default_permission = function (role_name, action, policy) end; -- luacheck: ignore 212
|
add_default_permission = function (role_name, action, policy) end; -- luacheck: ignore 212
|
||||||
get_role_by_name = function (role_name) end; -- luacheck: ignore 212
|
get_role_by_name = function (role_name) end; -- luacheck: ignore 212
|
||||||
};
|
};
|
||||||
|
@ -140,39 +144,63 @@ local function get_provider(host)
|
||||||
return hosts[host].users;
|
return hosts[host].users;
|
||||||
end
|
end
|
||||||
|
|
||||||
-- Returns a map of { [role_name] = role, ... } that a user is allowed to assume
|
local function get_user_role(user, host)
|
||||||
local function get_user_roles(user, host)
|
|
||||||
if host and not hosts[host] then return false; end
|
if host and not hosts[host] then return false; end
|
||||||
if type(user) ~= "string" then return false; end
|
if type(user) ~= "string" then return false; end
|
||||||
|
|
||||||
return hosts[host].authz.get_user_roles(user);
|
return hosts[host].authz.get_user_role(user);
|
||||||
end
|
end
|
||||||
|
|
||||||
local function get_user_default_role(user, host)
|
local function set_user_role(user, host, role_name)
|
||||||
if host and not hosts[host] then return false; end
|
if host and not hosts[host] then return false; end
|
||||||
if type(user) ~= "string" then return false; end
|
if type(user) ~= "string" then return false; end
|
||||||
|
|
||||||
return hosts[host].authz.get_user_default_role(user);
|
local role, err = hosts[host].authz.set_user_role(user, role_name);
|
||||||
|
if role then
|
||||||
|
prosody.events.fire_event("user-role-changed", {
|
||||||
|
username = user, host = host, role = role;
|
||||||
|
});
|
||||||
|
end
|
||||||
|
return role, err;
|
||||||
end
|
end
|
||||||
|
|
||||||
-- Accepts a set of role names which the user is allowed to assume
|
local function add_user_secondary_role(user, host, role_name)
|
||||||
local function set_user_roles(user, host, roles)
|
|
||||||
if host and not hosts[host] then return false; end
|
if host and not hosts[host] then return false; end
|
||||||
if type(user) ~= "string" then return false; end
|
if type(user) ~= "string" then return false; end
|
||||||
|
|
||||||
local ok, err = hosts[host].authz.set_user_roles(user, roles);
|
local role, err = hosts[host].authz.add_user_secondary_role(user, role_name);
|
||||||
|
if role then
|
||||||
|
prosody.events.fire_event("user-role-added", {
|
||||||
|
username = user, host = host, role = role;
|
||||||
|
});
|
||||||
|
end
|
||||||
|
return role, err;
|
||||||
|
end
|
||||||
|
|
||||||
|
local function remove_user_secondary_role(user, host, role_name)
|
||||||
|
if host and not hosts[host] then return false; end
|
||||||
|
if type(user) ~= "string" then return false; end
|
||||||
|
|
||||||
|
local ok, err = hosts[host].authz.remove_user_secondary_role(user, role_name);
|
||||||
if ok then
|
if ok then
|
||||||
prosody.events.fire_event("user-roles-changed", {
|
prosody.events.fire_event("user-role-removed", {
|
||||||
username = user, host = host
|
username = user, host = host, role_name = role_name;
|
||||||
});
|
});
|
||||||
end
|
end
|
||||||
return ok, err;
|
return ok, err;
|
||||||
end
|
end
|
||||||
|
|
||||||
|
local function get_user_secondary_roles(user, host)
|
||||||
|
if host and not hosts[host] then return false; end
|
||||||
|
if type(user) ~= "string" then return false; end
|
||||||
|
|
||||||
|
return hosts[host].authz.get_user_secondary_roles(user);
|
||||||
|
end
|
||||||
|
|
||||||
local function get_jid_role(jid, host)
|
local function get_jid_role(jid, host)
|
||||||
local jid_node, jid_host = jid_split(jid);
|
local jid_node, jid_host = jid_split(jid);
|
||||||
if host == jid_host and jid_node then
|
if host == jid_host and jid_node then
|
||||||
return hosts[host].authz.get_user_default_role(jid_node);
|
return hosts[host].authz.get_user_role(jid_node);
|
||||||
end
|
end
|
||||||
return hosts[host].authz.get_jid_role(jid);
|
return hosts[host].authz.get_jid_role(jid);
|
||||||
end
|
end
|
||||||
|
@ -230,9 +258,11 @@ return {
|
||||||
users = users;
|
users = users;
|
||||||
get_sasl_handler = get_sasl_handler;
|
get_sasl_handler = get_sasl_handler;
|
||||||
get_provider = get_provider;
|
get_provider = get_provider;
|
||||||
get_user_default_role = get_user_default_role;
|
get_user_role = get_user_role;
|
||||||
get_user_roles = get_user_roles;
|
set_user_role = set_user_role;
|
||||||
set_user_roles = set_user_roles;
|
add_user_secondary_role = add_user_secondary_role;
|
||||||
|
remove_user_secondary_role = remove_user_secondary_role;
|
||||||
|
get_user_secondary_roles = get_user_secondary_roles;
|
||||||
get_users_with_role = get_users_with_role;
|
get_users_with_role = get_users_with_role;
|
||||||
get_jid_role = get_jid_role;
|
get_jid_role = get_jid_role;
|
||||||
set_jid_role = set_jid_role;
|
set_jid_role = set_jid_role;
|
||||||
|
|
|
@ -8,8 +8,9 @@ local roles = require "util.roles";
|
||||||
local config_global_admin_jids = module:context("*"):get_option_set("admins", {}) / normalize;
|
local config_global_admin_jids = module:context("*"):get_option_set("admins", {}) / normalize;
|
||||||
local config_admin_jids = module:get_option_inherited_set("admins", {}) / normalize;
|
local config_admin_jids = module:get_option_inherited_set("admins", {}) / normalize;
|
||||||
local host = module.host;
|
local host = module.host;
|
||||||
local role_store = module:open_store("roles");
|
|
||||||
local role_map_store = module:open_store("roles", "map");
|
local role_store = module:open_store("account_roles");
|
||||||
|
local role_map_store = module:open_store("account_roles", "map");
|
||||||
|
|
||||||
local role_registry = {};
|
local role_registry = {};
|
||||||
|
|
||||||
|
@ -98,52 +99,96 @@ end
|
||||||
|
|
||||||
-- Public API
|
-- Public API
|
||||||
|
|
||||||
local config_operator_role_set = {
|
-- Get the primary role of a user
|
||||||
["prosody:operator"] = role_registry["prosody:operator"];
|
function get_user_role(user)
|
||||||
};
|
|
||||||
local config_admin_role_set = {
|
|
||||||
["prosody:admin"] = role_registry["prosody:admin"];
|
|
||||||
};
|
|
||||||
local default_role_set = {
|
|
||||||
["prosody:user"] = role_registry["prosody:user"];
|
|
||||||
};
|
|
||||||
|
|
||||||
function get_user_roles(user)
|
|
||||||
local bare_jid = user.."@"..host;
|
local bare_jid = user.."@"..host;
|
||||||
|
|
||||||
|
-- Check config first
|
||||||
if config_global_admin_jids:contains(bare_jid) then
|
if config_global_admin_jids:contains(bare_jid) then
|
||||||
return config_operator_role_set;
|
return role_registry["prosody:operator"];
|
||||||
elseif config_admin_jids:contains(bare_jid) then
|
elseif config_admin_jids:contains(bare_jid) then
|
||||||
return config_admin_role_set;
|
return role_registry["prosody:admin"];
|
||||||
end
|
end
|
||||||
local role_names = role_store:get(user);
|
|
||||||
if not role_names then return default_role_set; end
|
|
||||||
local user_roles = {};
|
|
||||||
for role_name in pairs(role_names) do
|
|
||||||
user_roles[role_name] = role_registry[role_name];
|
|
||||||
end
|
|
||||||
return user_roles;
|
|
||||||
end
|
|
||||||
|
|
||||||
function set_user_roles(user, user_roles)
|
-- Check storage
|
||||||
role_store:set(user, user_roles)
|
local stored_roles, err = role_store:get(user);
|
||||||
return true;
|
if not stored_roles then
|
||||||
end
|
if err then
|
||||||
|
-- Unable to fetch role, fail
|
||||||
function get_user_default_role(user)
|
return nil, err;
|
||||||
local user_roles = get_user_roles(user);
|
|
||||||
if not user_roles then return nil; end
|
|
||||||
local default_role;
|
|
||||||
for role_name, role_info in pairs(user_roles) do --luacheck: ignore 213/role_name
|
|
||||||
if role_info.default ~= false and (not default_role or role_info.priority > default_role.priority) then
|
|
||||||
default_role = role_info;
|
|
||||||
end
|
end
|
||||||
|
-- No role set, use default role
|
||||||
|
return role_registry["prosody:user"];
|
||||||
end
|
end
|
||||||
if not default_role then return nil; end
|
if stored_roles._default == nil then
|
||||||
return default_role;
|
-- No primary role explicitly set, return default
|
||||||
|
return role_registry["prosody:user"];
|
||||||
|
end
|
||||||
|
local primary_stored_role = role_registry[stored_roles._default];
|
||||||
|
if not primary_stored_role then
|
||||||
|
return nil, "unknown-role";
|
||||||
|
end
|
||||||
|
return primary_stored_role;
|
||||||
end
|
end
|
||||||
|
|
||||||
|
-- Set the primary role of a user
|
||||||
|
function set_user_role(user, role_name)
|
||||||
|
local role = role_registry[role_name];
|
||||||
|
if not role then
|
||||||
|
return error("Cannot assign default user an unknown role: "..tostring(role_name));
|
||||||
|
end
|
||||||
|
local keys_update = {
|
||||||
|
_default = role_name;
|
||||||
|
-- Primary role cannot be secondary role
|
||||||
|
[role_name] = role_map_store.remove;
|
||||||
|
};
|
||||||
|
if role_name == "prosody:user" then
|
||||||
|
-- Don't store default
|
||||||
|
keys_update._default = role_map_store.remove;
|
||||||
|
end
|
||||||
|
local ok, err = role_map_store:set_keys(user, keys_update);
|
||||||
|
if not ok then
|
||||||
|
return nil, err;
|
||||||
|
end
|
||||||
|
return role;
|
||||||
|
end
|
||||||
|
|
||||||
|
function add_user_secondary_role(user, role_name)
|
||||||
|
if not role_registry[role_name] then
|
||||||
|
return error("Cannot assign default user an unknown role: "..tostring(role_name));
|
||||||
|
end
|
||||||
|
role_map_store:set(user, role_name, true);
|
||||||
|
end
|
||||||
|
|
||||||
|
function remove_user_secondary_role(user, role_name)
|
||||||
|
role_map_store:set(user, role_name, nil);
|
||||||
|
end
|
||||||
|
|
||||||
|
function get_user_secondary_roles(user)
|
||||||
|
local stored_roles, err = role_store:get(user);
|
||||||
|
if not stored_roles then
|
||||||
|
if err then
|
||||||
|
-- Unable to fetch role, fail
|
||||||
|
return nil, err;
|
||||||
|
end
|
||||||
|
-- No role set
|
||||||
|
return {};
|
||||||
|
end
|
||||||
|
stored_roles._default = nil;
|
||||||
|
for role_name in pairs(stored_roles) do
|
||||||
|
stored_roles[role_name] = role_registry[role_name];
|
||||||
|
end
|
||||||
|
return stored_roles;
|
||||||
|
end
|
||||||
|
|
||||||
|
-- This function is *expensive*
|
||||||
function get_users_with_role(role_name)
|
function get_users_with_role(role_name)
|
||||||
local storage_role_users = it.to_array(it.keys(role_map_store:get_all(role_name) or {}));
|
local function role_filter(username, default_role) --luacheck: ignore 212/username
|
||||||
|
return default_role == role_name;
|
||||||
|
end
|
||||||
|
local primary_role_users = set.new(it.to_array(it.filter(role_filter, pairs(role_map_store:get_all("_default") or {}))));
|
||||||
|
local secondary_role_users = set.new(it.to_array(it.keys(role_map_store:get_all(role_name) or {})));
|
||||||
|
|
||||||
local config_set;
|
local config_set;
|
||||||
if role_name == "prosody:admin" then
|
if role_name == "prosody:admin" then
|
||||||
config_set = config_admin_jids;
|
config_set = config_admin_jids;
|
||||||
|
@ -157,9 +202,9 @@ function get_users_with_role(role_name)
|
||||||
return j_node;
|
return j_node;
|
||||||
end
|
end
|
||||||
end;
|
end;
|
||||||
return it.to_array(config_admin_users + set.new(storage_role_users));
|
return it.to_array(config_admin_users + primary_role_users + secondary_role_users);
|
||||||
end
|
end
|
||||||
return storage_role_users;
|
return it.to_array(primary_role_users + secondary_role_users);
|
||||||
end
|
end
|
||||||
|
|
||||||
function get_jid_role(jid)
|
function get_jid_role(jid)
|
||||||
|
@ -203,3 +248,52 @@ end
|
||||||
function get_role_by_name(role_name)
|
function get_role_by_name(role_name)
|
||||||
return assert(role_registry[role_name], role_name);
|
return assert(role_registry[role_name], role_name);
|
||||||
end
|
end
|
||||||
|
|
||||||
|
-- COMPAT: Migrate from 0.12 role storage
|
||||||
|
local function do_migration(migrate_host)
|
||||||
|
local old_role_store = assert(module:context(migrate_host):open_store("roles"));
|
||||||
|
local new_role_store = assert(module:context(migrate_host):open_store("account_roles"));
|
||||||
|
|
||||||
|
local migrated, failed, skipped = 0, 0, 0;
|
||||||
|
-- Iterate all users
|
||||||
|
for username in assert(old_role_store:users()) do
|
||||||
|
local old_roles = it.to_array(it.filter(function (k) return k:sub(1,1) ~= "_"; end, it.keys(old_role_store:get(username))));
|
||||||
|
if #old_roles == 1 then
|
||||||
|
local ok, err = new_role_store:set(username, {
|
||||||
|
_default = old_roles[1];
|
||||||
|
});
|
||||||
|
if ok then
|
||||||
|
migrated = migrated + 1;
|
||||||
|
else
|
||||||
|
failed = failed + 1;
|
||||||
|
print("EE: Failed to store new role info for '"..username.."': "..err);
|
||||||
|
end
|
||||||
|
else
|
||||||
|
print("WW: User '"..username.."' has multiple roles and cannot be automatically migrated");
|
||||||
|
skipped = skipped + 1;
|
||||||
|
end
|
||||||
|
end
|
||||||
|
return migrated, failed, skipped;
|
||||||
|
end
|
||||||
|
|
||||||
|
function module.command(arg)
|
||||||
|
if arg[1] == "migrate" then
|
||||||
|
table.remove(arg, 1);
|
||||||
|
local migrate_host = arg[1];
|
||||||
|
if not migrate_host or not prosody.hosts[migrate_host] then
|
||||||
|
print("EE: Please supply a valid host to migrate to the new role storage");
|
||||||
|
return 1;
|
||||||
|
end
|
||||||
|
|
||||||
|
-- Initialize storage layer
|
||||||
|
require "core.storagemanager".initialize_host(migrate_host);
|
||||||
|
|
||||||
|
print("II: Migrating roles...");
|
||||||
|
local migrated, failed, skipped = do_migration(migrate_host);
|
||||||
|
print(("II: %d migrated, %d failed, %d skipped"):format(migrated, failed, skipped));
|
||||||
|
return (failed + skipped == 0) and 0 or 1;
|
||||||
|
else
|
||||||
|
print("EE: Unknown command: "..(arg[1] or "<none given>"));
|
||||||
|
print(" Hint: try 'migrate'?");
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
|
@ -259,7 +259,7 @@ local function disconnect_user_sessions(reason, leave_resource)
|
||||||
end
|
end
|
||||||
|
|
||||||
module:hook_global("user-password-changed", disconnect_user_sessions({ condition = "reset", text = "Password changed" }, true), 200);
|
module:hook_global("user-password-changed", disconnect_user_sessions({ condition = "reset", text = "Password changed" }, true), 200);
|
||||||
module:hook_global("user-roles-changed", disconnect_user_sessions({ condition = "reset", text = "Roles changed" }), 200);
|
module:hook_global("user-role-changed", disconnect_user_sessions({ condition = "reset", text = "Role changed" }), 200);
|
||||||
module:hook_global("user-deleted", disconnect_user_sessions({ condition = "not-authorized", text = "Account deleted" }), 200);
|
module:hook_global("user-deleted", disconnect_user_sessions({ condition = "not-authorized", text = "Account deleted" }), 200);
|
||||||
|
|
||||||
function runner_callbacks:ready()
|
function runner_callbacks:ready()
|
||||||
|
|
|
@ -10,7 +10,7 @@ local function select_role(username, host, role)
|
||||||
if role then
|
if role then
|
||||||
return prosody.hosts[host].authz.get_role_by_name(role);
|
return prosody.hosts[host].authz.get_role_by_name(role);
|
||||||
end
|
end
|
||||||
return usermanager.get_user_default_role(username, host);
|
return usermanager.get_user_role(username, host);
|
||||||
end
|
end
|
||||||
|
|
||||||
function create_jid_token(actor_jid, token_jid, token_role, token_ttl)
|
function create_jid_token(actor_jid, token_jid, token_role, token_ttl)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue