2018-10-09 17:00:01 -04:00
|
|
|
/*
|
2019-04-09 14:39:42 -04:00
|
|
|
* MinIO Cloud Storage, (C) 2018 MinIO, Inc.
|
2018-10-09 17:00:01 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package iampolicy
|
|
|
|
|
|
|
|
import (
|
|
|
|
"strings"
|
|
|
|
|
2020-01-27 17:12:34 -05:00
|
|
|
"github.com/minio/minio/pkg/bucket/policy"
|
|
|
|
"github.com/minio/minio/pkg/bucket/policy/condition"
|
2018-10-09 17:00:01 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// Statement - iam policy statement.
|
|
|
|
type Statement struct {
|
|
|
|
SID policy.ID `json:"Sid,omitempty"`
|
|
|
|
Effect policy.Effect `json:"Effect"`
|
|
|
|
Actions ActionSet `json:"Action"`
|
2019-11-19 05:03:18 -05:00
|
|
|
Resources ResourceSet `json:"Resource,omitempty"`
|
2018-10-09 17:00:01 -04:00
|
|
|
Conditions condition.Functions `json:"Condition,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsAllowed - checks given policy args is allowed to continue the Rest API.
|
|
|
|
func (statement Statement) IsAllowed(args Args) bool {
|
|
|
|
check := func() bool {
|
|
|
|
if !statement.Actions.Match(args.Action) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
resource := args.BucketName
|
|
|
|
if args.ObjectName != "" {
|
|
|
|
if !strings.HasPrefix(args.ObjectName, "/") {
|
|
|
|
resource += "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource += args.ObjectName
|
2018-10-13 03:18:43 -04:00
|
|
|
} else {
|
|
|
|
resource += "/"
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
// For admin statements, resource match can be ignored.
|
|
|
|
if !statement.Resources.Match(resource, args.ConditionValues) && !statement.isAdmin() {
|
2018-10-09 17:00:01 -04:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return statement.Conditions.Evaluate(args.ConditionValues)
|
|
|
|
}
|
|
|
|
|
|
|
|
return statement.Effect.IsAllowed(check())
|
|
|
|
}
|
2019-11-19 05:03:18 -05:00
|
|
|
func (statement Statement) isAdmin() bool {
|
|
|
|
for action := range statement.Actions {
|
2020-05-10 13:55:28 -04:00
|
|
|
if AdminAction(action).IsValid() {
|
|
|
|
return true
|
2019-11-19 05:03:18 -05:00
|
|
|
}
|
|
|
|
}
|
2020-05-10 13:55:28 -04:00
|
|
|
return false
|
2019-11-19 05:03:18 -05:00
|
|
|
}
|
2018-10-09 17:00:01 -04:00
|
|
|
|
|
|
|
// isValid - checks whether statement is valid or not.
|
|
|
|
func (statement Statement) isValid() error {
|
|
|
|
if !statement.Effect.IsValid() {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("invalid Effect %v", statement.Effect)
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(statement.Actions) == 0 {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("Action must not be empty")
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
2019-11-19 05:03:18 -05:00
|
|
|
if statement.isAdmin() {
|
2020-05-10 13:55:28 -04:00
|
|
|
if err := statement.Actions.ValidateAdmin(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-11-19 05:03:18 -05:00
|
|
|
for action := range statement.Actions {
|
|
|
|
keys := statement.Conditions.Keys()
|
|
|
|
keyDiff := keys.Difference(adminActionConditionKeyMap[action])
|
|
|
|
if !keyDiff.IsEmpty() {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("unsupported condition keys '%v' used for action '%v'", keyDiff, action)
|
2019-11-19 05:03:18 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-10 13:55:28 -04:00
|
|
|
if !statement.SID.IsValid() {
|
|
|
|
return Errorf("invalid SID %v", statement.SID)
|
|
|
|
}
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
if len(statement.Resources) == 0 {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("Resource must not be empty")
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := statement.Resources.Validate(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-10 13:55:28 -04:00
|
|
|
if err := statement.Actions.Validate(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
for action := range statement.Actions {
|
|
|
|
if !statement.Resources.objectResourceExists() && !statement.Resources.bucketResourceExists() {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("unsupported Resource found %v for action %v", statement.Resources, action)
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
|
2021-02-13 02:05:09 -05:00
|
|
|
condKeys, ok := iamActionConditionKeyMap.Lookup(action)
|
|
|
|
if !ok {
|
|
|
|
return Errorf("conditions are not supported for action %v", action)
|
|
|
|
}
|
|
|
|
|
2018-10-09 17:00:01 -04:00
|
|
|
keys := statement.Conditions.Keys()
|
2021-02-13 02:05:09 -05:00
|
|
|
keyDiff := keys.Difference(condKeys)
|
2018-10-09 17:00:01 -04:00
|
|
|
if !keyDiff.IsEmpty() {
|
2020-01-03 14:28:52 -05:00
|
|
|
return Errorf("unsupported condition keys '%v' used for action '%v'", keyDiff, action)
|
2018-10-09 17:00:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate - validates Statement is for given bucket or not.
|
|
|
|
func (statement Statement) Validate() error {
|
|
|
|
return statement.isValid()
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewStatement - creates new statement.
|
|
|
|
func NewStatement(effect policy.Effect, actionSet ActionSet, resourceSet ResourceSet, conditions condition.Functions) Statement {
|
|
|
|
return Statement{
|
|
|
|
Effect: effect,
|
|
|
|
Actions: actionSet,
|
|
|
|
Resources: resourceSet,
|
|
|
|
Conditions: conditions,
|
|
|
|
}
|
|
|
|
}
|