garage/src/model/key_table.rs

253 lines
6.4 KiB
Rust
Raw Normal View History

use serde::{Deserialize, Serialize};
2023-01-03 13:44:47 +00:00
use garage_util::crdt::{self, Crdt};
2021-12-14 12:55:11 +00:00
use garage_util::data::*;
2023-01-03 13:44:47 +00:00
use garage_table::{DeletedFilter, EmptyKey, Entry, TableSchema};
2021-12-14 12:55:11 +00:00
use crate::permission::BucketKeyPerm;
2023-01-03 13:44:47 +00:00
pub(crate) mod v05 {
use garage_util::crdt;
use serde::{Deserialize, Serialize};
2023-01-03 13:44:47 +00:00
/// An api key
#[derive(PartialEq, Eq, Clone, Debug, Serialize, Deserialize)]
pub struct Key {
/// The id of the key (immutable), used as partition key
pub key_id: String,
2023-01-03 13:44:47 +00:00
/// The secret_key associated
pub secret_key: String,
2023-01-03 13:44:47 +00:00
/// Name for the key
pub name: crdt::Lww<String>,
2020-04-23 20:25:45 +00:00
2023-01-03 13:44:47 +00:00
/// Is the key deleted
pub deleted: crdt::Bool,
/// Buckets in which the key is authorized. Empty if `Key` is deleted
// CRDT interaction: deleted implies authorized_buckets is empty
pub authorized_buckets: crdt::LwwMap<String, PermissionSet>,
}
2023-01-03 13:44:47 +00:00
/// Permission given to a key in a bucket
#[derive(PartialOrd, Ord, PartialEq, Eq, Clone, Debug, Serialize, Deserialize)]
pub struct PermissionSet {
/// The key can be used to read the bucket
pub allow_read: bool,
/// The key can be used to write in the bucket
pub allow_write: bool,
}
impl crdt::AutoCrdt for PermissionSet {
const WARN_IF_DIFFERENT: bool = true;
}
2023-01-03 13:44:47 +00:00
impl garage_util::migrate::InitialFormat for Key {}
}
2023-01-03 13:44:47 +00:00
mod v08 {
use super::v05;
use crate::permission::BucketKeyPerm;
use garage_util::crdt;
use garage_util::data::Uuid;
use serde::{Deserialize, Serialize};
/// An api key
#[derive(PartialEq, Eq, Clone, Debug, Serialize, Deserialize)]
pub struct Key {
/// The id of the key (immutable), used as partition key
pub key_id: String,
/// Internal state of the key
pub state: crdt::Deletable<KeyParams>,
}
/// Configuration for a key
#[derive(PartialEq, Eq, Clone, Debug, Serialize, Deserialize)]
pub struct KeyParams {
/// The secret_key associated (immutable)
pub secret_key: String,
/// Name for the key
pub name: crdt::Lww<String>,
/// Flag to allow users having this key to create buckets
pub allow_create_bucket: crdt::Lww<bool>,
/// If the key is present: it gives some permissions,
/// a map of bucket IDs (uuids) to permissions.
/// Otherwise no permissions are granted to key
pub authorized_buckets: crdt::Map<Uuid, BucketKeyPerm>,
/// A key can have a local view of buckets names it is
/// the only one to see, this is the namespace for these aliases
pub local_aliases: crdt::LwwMap<String, Option<Uuid>>,
}
impl garage_util::migrate::Migrate for Key {
type Previous = v05::Key;
fn migrate(old_k: v05::Key) -> Key {
let name = crdt::Lww::raw(old_k.name.timestamp(), old_k.name.get().clone());
let state = if old_k.deleted.get() {
crdt::Deletable::Deleted
} else {
// Authorized buckets is ignored here,
// migration is performed in specific migration code in
// garage/migrate.rs
crdt::Deletable::Present(KeyParams {
secret_key: old_k.secret_key,
name,
allow_create_bucket: crdt::Lww::new(false),
authorized_buckets: crdt::Map::new(),
local_aliases: crdt::LwwMap::new(),
})
};
Key {
key_id: old_k.key_id,
state,
}
}
}
2021-12-14 12:55:11 +00:00
}
2023-01-03 13:44:47 +00:00
pub use v08::*;
2021-12-14 12:55:11 +00:00
impl KeyParams {
fn new(secret_key: &str, name: &str) -> Self {
2021-12-14 12:55:11 +00:00
KeyParams {
secret_key: secret_key.to_string(),
name: crdt::Lww::new(name.to_string()),
2021-12-16 10:47:58 +00:00
allow_create_bucket: crdt::Lww::new(false),
2021-12-14 12:55:11 +00:00
authorized_buckets: crdt::Map::new(),
local_aliases: crdt::LwwMap::new(),
}
}
}
impl Crdt for KeyParams {
fn merge(&mut self, o: &Self) {
self.name.merge(&o.name);
2021-12-16 10:47:58 +00:00
self.allow_create_bucket.merge(&o.allow_create_bucket);
2021-12-14 12:55:11 +00:00
self.authorized_buckets.merge(&o.authorized_buckets);
self.local_aliases.merge(&o.local_aliases);
}
}
impl Key {
2021-04-08 13:13:02 +00:00
/// Initialize a new Key, generating a random identifier and associated secret key
pub fn new(name: &str) -> Self {
2020-04-23 20:25:45 +00:00
let key_id = format!("GK{}", hex::encode(&rand::random::<[u8; 12]>()[..]));
let secret_key = hex::encode(&rand::random::<[u8; 32]>()[..]);
2020-11-20 22:20:20 +00:00
Self {
2020-04-23 20:25:45 +00:00
key_id,
state: crdt::Deletable::present(KeyParams::new(&secret_key, name)),
2020-11-20 22:20:20 +00:00
}
}
2021-03-26 20:53:28 +00:00
/// Import a key from it's parts
pub fn import(key_id: &str, secret_key: &str, name: &str) -> Self {
Self {
key_id: key_id.to_string(),
state: crdt::Deletable::present(KeyParams::new(secret_key, name)),
}
}
2021-03-26 20:53:28 +00:00
/// Create a new Key which can me merged to mark an existing key deleted
2020-04-23 20:25:45 +00:00
pub fn delete(key_id: String) -> Self {
Self {
2020-04-23 20:25:45 +00:00
key_id,
2021-12-14 12:55:11 +00:00
state: crdt::Deletable::Deleted,
}
}
2021-03-26 20:53:28 +00:00
/// Returns true if this represents a deleted bucket
pub fn is_deleted(&self) -> bool {
self.state.is_deleted()
}
/// Returns an option representing the params (None if in deleted state)
pub fn params(&self) -> Option<&KeyParams> {
self.state.as_option()
}
/// Mutable version of `.state()`
pub fn params_mut(&mut self) -> Option<&mut KeyParams> {
self.state.as_option_mut()
}
/// Get permissions for a bucket
pub fn bucket_permissions(&self, bucket: &Uuid) -> BucketKeyPerm {
self.params()
2022-03-14 11:00:23 +00:00
.and_then(|params| params.authorized_buckets.get(bucket))
.cloned()
.unwrap_or(BucketKeyPerm::NO_PERMISSIONS)
}
2021-03-26 20:53:28 +00:00
/// Check if `Key` is allowed to read in bucket
2021-12-14 12:55:11 +00:00
pub fn allow_read(&self, bucket: &Uuid) -> bool {
self.bucket_permissions(bucket).allow_read
2020-04-23 20:25:45 +00:00
}
2021-03-26 20:53:28 +00:00
/// Check if `Key` is allowed to write in bucket
2021-12-14 12:55:11 +00:00
pub fn allow_write(&self, bucket: &Uuid) -> bool {
self.bucket_permissions(bucket).allow_write
2020-04-23 20:25:45 +00:00
}
2021-12-16 10:47:58 +00:00
/// Check if `Key` is owner of bucket
pub fn allow_owner(&self, bucket: &Uuid) -> bool {
self.bucket_permissions(bucket).allow_owner
2021-12-16 10:47:58 +00:00
}
}
impl Entry<EmptyKey, String> for Key {
fn partition_key(&self) -> &EmptyKey {
&EmptyKey
}
fn sort_key(&self) -> &String {
2020-04-23 20:25:45 +00:00
&self.key_id
}
}
2021-05-02 21:13:08 +00:00
impl Crdt for Key {
fn merge(&mut self, other: &Self) {
2021-12-14 12:55:11 +00:00
self.state.merge(&other.state);
}
}
pub struct KeyTable;
#[derive(Clone, Debug, Serialize, Deserialize)]
pub enum KeyFilter {
Deleted(DeletedFilter),
2022-01-03 17:03:12 +00:00
MatchesAndNotDeleted(String),
}
impl TableSchema for KeyTable {
2021-12-14 11:34:01 +00:00
const TABLE_NAME: &'static str = "key";
type P = EmptyKey;
type S = String;
type E = Key;
type Filter = KeyFilter;
fn matches_filter(entry: &Self::E, filter: &Self::Filter) -> bool {
match filter {
2021-12-14 12:55:11 +00:00
KeyFilter::Deleted(df) => df.apply(entry.state.is_deleted()),
2022-01-03 17:03:12 +00:00
KeyFilter::MatchesAndNotDeleted(pat) => {
2021-03-15 18:16:42 +00:00
let pat = pat.to_lowercase();
entry
.params()
.map(|p| {
entry.key_id.to_lowercase().starts_with(&pat)
|| p.name.get().to_lowercase() == pat
})
.unwrap_or(false)
}
}
}
}