mirror of
https://github.com/minio/minio.git
synced 2025-04-04 11:50:36 -04:00
Fix locking in policy attach API (#17426)
For policy attach/detach API to work correctly the server should hold a lock before reading existing policy mapping and until after writing the updated policy mapping. This is fixed in this change. A site replication bug, where LDAP policy attach/detach were not correctly propagated is also fixed in this change. Bonus: Additionally, the server responds with the actual (or net) changes performed in the attach/detach API call. For e.g. if a user already has policy A applied, and a call to attach policies A and B is performed, the server will respond that B was attached successfully.
This commit is contained in:
parent
9af6c6ceef
commit
82ce78a17c
@ -150,7 +150,7 @@ func (a adminAPIHandlers) AttachDetachPolicyLDAP(w http.ResponseWriter, r *http.
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Call IAM subsystem
|
// Call IAM subsystem
|
||||||
updatedAt, addedOrRemoved, err := globalIAMSys.PolicyDBUpdateLDAP(ctx, isAttach, par)
|
updatedAt, addedOrRemoved, _, err := globalIAMSys.PolicyDBUpdateLDAP(ctx, isAttach, par)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
||||||
return
|
return
|
||||||
|
@ -26,7 +26,6 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"sort"
|
"sort"
|
||||||
"strings"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/klauspost/compress/zip"
|
"github.com/klauspost/compress/zip"
|
||||||
@ -1771,24 +1770,40 @@ func (a adminAPIHandlers) ListPolicyMappingEntities(w http.ResponseWriter, r *ht
|
|||||||
writeSuccessResponseJSON(w, econfigData)
|
writeSuccessResponseJSON(w, econfigData)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AttachPolicyBuiltin - POST /minio/admin/v3/idp/builtin/policy/attach
|
// AttachDetachPolicyBuiltin - POST /minio/admin/v3/idp/builtin/policy/{operation}
|
||||||
func (a adminAPIHandlers) AttachPolicyBuiltin(w http.ResponseWriter, r *http.Request) {
|
func (a adminAPIHandlers) AttachDetachPolicyBuiltin(w http.ResponseWriter, r *http.Request) {
|
||||||
ctx := newContext(r, w, "AttachPolicyBuiltin")
|
ctx := newContext(r, w, "AttachPolicyBuiltin")
|
||||||
|
|
||||||
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
||||||
|
|
||||||
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.AttachPolicyAdminAction)
|
objectAPI, cred := validateAdminReq(ctx, w, r, iampolicy.UpdatePolicyAssociationAction,
|
||||||
|
iampolicy.AttachPolicyAdminAction)
|
||||||
if objectAPI == nil {
|
if objectAPI == nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
cred, _, s3Err := validateAdminSignature(ctx, r, "")
|
if r.ContentLength > maxEConfigJSONSize || r.ContentLength == -1 {
|
||||||
if s3Err != ErrNone {
|
// More than maxConfigSize bytes were available
|
||||||
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminConfigTooLarge), r.URL)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
password := cred.SecretKey
|
|
||||||
|
|
||||||
|
// Ensure body content type is opaque to ensure that request body has not
|
||||||
|
// been interpreted as form data.
|
||||||
|
contentType := r.Header.Get("Content-Type")
|
||||||
|
if contentType != "application/octet-stream" {
|
||||||
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
operation := mux.Vars(r)["operation"]
|
||||||
|
if operation != "attach" && operation != "detach" {
|
||||||
|
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAdminInvalidArgument), r.URL)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
isAttach := operation == "attach"
|
||||||
|
|
||||||
|
password := cred.SecretKey
|
||||||
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
||||||
@ -1806,235 +1821,42 @@ func (a adminAPIHandlers) AttachPolicyBuiltin(w http.ResponseWriter, r *http.Req
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
userOrGroup := par.User
|
updatedAt, addedOrRemoved, _, err := globalIAMSys.PolicyDBUpdateBuiltin(ctx, isAttach, par)
|
||||||
isGroup := false
|
if err != nil {
|
||||||
|
if err == errNoSuchUser || err == errNoSuchGroup {
|
||||||
if userOrGroup == "" {
|
|
||||||
userOrGroup = par.Group
|
|
||||||
isGroup = true
|
|
||||||
}
|
|
||||||
|
|
||||||
if isGroup {
|
|
||||||
_, err := globalIAMSys.GetGroupDescription(userOrGroup)
|
|
||||||
if err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
ok, _, err := globalIAMSys.IsTempUser(userOrGroup)
|
|
||||||
if err != nil && err != errNoSuchUser {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if ok {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// When the user is root credential you are not allowed to
|
|
||||||
// add policies for root user.
|
|
||||||
if userOrGroup == globalActiveCred.AccessKey {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Validate that user exists.
|
|
||||||
_, ok = globalIAMSys.GetUser(ctx, userOrGroup)
|
|
||||||
if !ok {
|
|
||||||
if globalIAMSys.LDAPConfig.Enabled() {
|
if globalIAMSys.LDAPConfig.Enabled() {
|
||||||
// When LDAP is enabled, warn user that they are using the wrong
|
// When LDAP is enabled, warn user that they are using the wrong
|
||||||
// API.
|
// API. FIXME: error can be no such group as well - fix errNoSuchUserLDAPWarn
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUserLDAPWarn), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUserLDAPWarn), r.URL)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUser), r.URL)
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
var existingPolicies []string
|
|
||||||
if isGroup {
|
|
||||||
existingPolicies, err = globalIAMSys.PolicyDBGet(userOrGroup, true)
|
|
||||||
} else {
|
|
||||||
existingPolicies, err = globalIAMSys.GetUserPolicies(userOrGroup)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
policyMap := make(map[string]bool)
|
respBody := madmin.PolicyAssociationResp{
|
||||||
for _, p := range existingPolicies {
|
|
||||||
policyMap[p] = true
|
|
||||||
}
|
|
||||||
|
|
||||||
policiesToAttach := par.Policies
|
|
||||||
|
|
||||||
// Check if policy is already attached to user.
|
|
||||||
for _, p := range policiesToAttach {
|
|
||||||
if _, ok := policyMap[p]; ok {
|
|
||||||
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrPolicyAlreadyAttached), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
existingPolicies = append(existingPolicies, policiesToAttach...)
|
|
||||||
newPolicies := strings.Join(existingPolicies, ",")
|
|
||||||
|
|
||||||
userType := regUser
|
|
||||||
updatedAt, err := globalIAMSys.PolicyDBSet(ctx, userOrGroup, newPolicies, userType, isGroup)
|
|
||||||
if err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
|
||||||
Type: madmin.SRIAMItemPolicyMapping,
|
|
||||||
PolicyMapping: &madmin.SRPolicyMapping{
|
|
||||||
UserOrGroup: userOrGroup,
|
|
||||||
UserType: int(userType),
|
|
||||||
IsGroup: isGroup,
|
|
||||||
Policy: strings.Join(policiesToAttach, ","),
|
|
||||||
},
|
|
||||||
UpdatedAt: updatedAt,
|
UpdatedAt: updatedAt,
|
||||||
}))
|
|
||||||
|
|
||||||
writeResponse(w, http.StatusCreated, nil, mimeNone)
|
|
||||||
}
|
|
||||||
|
|
||||||
// DetachPolicyBuiltin - POST /minio/admin/v3/idp/builtin/policy/detach
|
|
||||||
func (a adminAPIHandlers) DetachPolicyBuiltin(w http.ResponseWriter, r *http.Request) {
|
|
||||||
ctx := newContext(r, w, "DetachPolicyBuiltin")
|
|
||||||
|
|
||||||
defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
|
|
||||||
|
|
||||||
objectAPI, _ := validateAdminReq(ctx, w, r, iampolicy.AttachPolicyAdminAction)
|
|
||||||
if objectAPI == nil {
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
if isAttach {
|
||||||
cred, _, s3Err := validateAdminSignature(ctx, r, "")
|
respBody.PoliciesAttached = addedOrRemoved
|
||||||
if s3Err != ErrNone {
|
|
||||||
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
password := cred.SecretKey
|
|
||||||
|
|
||||||
reqBytes, err := madmin.DecryptData(password, io.LimitReader(r.Body, r.ContentLength))
|
|
||||||
if err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
var par madmin.PolicyAssociationReq
|
|
||||||
if err = json.Unmarshal(reqBytes, &par); err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = par.IsValid(); err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
userOrGroup := par.User
|
|
||||||
isGroup := false
|
|
||||||
|
|
||||||
if userOrGroup == "" {
|
|
||||||
userOrGroup = par.Group
|
|
||||||
isGroup = true
|
|
||||||
}
|
|
||||||
|
|
||||||
if isGroup {
|
|
||||||
_, err := globalIAMSys.GetGroupDescription(userOrGroup)
|
|
||||||
if err != nil {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
ok, _, err := globalIAMSys.IsTempUser(userOrGroup)
|
respBody.PoliciesDetached = addedOrRemoved
|
||||||
if err != nil && err != errNoSuchUser {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if ok {
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errIAMActionNotAllowed), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Validate that user exists.
|
|
||||||
_, ok = globalIAMSys.GetUser(ctx, userOrGroup)
|
|
||||||
if !ok {
|
|
||||||
if globalIAMSys.LDAPConfig.Enabled() {
|
|
||||||
// When LDAP is enabled, warn user that they are using the wrong
|
|
||||||
// API.
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUserLDAPWarn), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, errNoSuchUser), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
userType := regUser
|
data, err := json.Marshal(respBody)
|
||||||
if globalIAMSys.GetUsersSysType() == LDAPUsersSysType {
|
|
||||||
userType = stsUser
|
|
||||||
}
|
|
||||||
|
|
||||||
var existingPolicies []string
|
|
||||||
if isGroup {
|
|
||||||
existingPolicies, err = globalIAMSys.PolicyDBGet(userOrGroup, true)
|
|
||||||
} else {
|
|
||||||
existingPolicies, err = globalIAMSys.GetUserPolicies(userOrGroup)
|
|
||||||
}
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
policyMap := make(map[string]bool)
|
encryptedData, err := madmin.EncryptData(password, data)
|
||||||
for _, p := range existingPolicies {
|
|
||||||
policyMap[p] = true
|
|
||||||
}
|
|
||||||
|
|
||||||
policiesToDetach := par.Policies
|
|
||||||
|
|
||||||
// Check if policy is already attached to user.
|
|
||||||
for _, p := range policiesToDetach {
|
|
||||||
if _, ok := policyMap[p]; ok {
|
|
||||||
delete(policyMap, p)
|
|
||||||
} else {
|
|
||||||
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrPolicyNotAttached), r.URL)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
newPoliciesSl := []string{}
|
|
||||||
for p := range policyMap {
|
|
||||||
newPoliciesSl = append(newPoliciesSl, p)
|
|
||||||
}
|
|
||||||
|
|
||||||
newPolicies := strings.Join(newPoliciesSl, ",")
|
|
||||||
|
|
||||||
updatedAt, err := globalIAMSys.PolicyDBSet(ctx, userOrGroup, newPolicies, userType, isGroup)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
writeSuccessResponseJSON(w, encryptedData)
|
||||||
Type: madmin.SRIAMItemPolicyMapping,
|
|
||||||
PolicyMapping: &madmin.SRPolicyMapping{
|
|
||||||
UserOrGroup: userOrGroup,
|
|
||||||
UserType: int(userType),
|
|
||||||
IsGroup: isGroup,
|
|
||||||
Policy: newPolicies,
|
|
||||||
},
|
|
||||||
UpdatedAt: updatedAt,
|
|
||||||
}))
|
|
||||||
|
|
||||||
// Return successful JSON response
|
|
||||||
writeSuccessNoContent(w)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -162,11 +162,8 @@ func registerAdminRouter(router *mux.Router, enableConfigOps bool) {
|
|||||||
HandlerFunc(gz(httpTraceHdrs(adminAPI.SetPolicyForUserOrGroup))).
|
HandlerFunc(gz(httpTraceHdrs(adminAPI.SetPolicyForUserOrGroup))).
|
||||||
Queries("policyName", "{policyName:.*}", "userOrGroup", "{userOrGroup:.*}", "isGroup", "{isGroup:true|false}")
|
Queries("policyName", "{policyName:.*}", "userOrGroup", "{userOrGroup:.*}", "isGroup", "{isGroup:true|false}")
|
||||||
|
|
||||||
// Attach policies to user or group
|
// Attach/Detach policies to/from user or group
|
||||||
adminRouter.Methods(http.MethodPost).Path(adminVersion + "/idp/builtin/policy/attach").HandlerFunc(gz(httpTraceHdrs(adminAPI.AttachPolicyBuiltin)))
|
adminRouter.Methods(http.MethodPost).Path(adminVersion + "/idp/builtin/policy/{operation}").HandlerFunc(gz(httpTraceHdrs(adminAPI.AttachDetachPolicyBuiltin)))
|
||||||
|
|
||||||
// Detach policies from user or group
|
|
||||||
adminRouter.Methods(http.MethodPost).Path(adminVersion + "/idp/builtin/policy/detach").HandlerFunc(gz(httpTraceHdrs(adminAPI.DetachPolicyBuiltin)))
|
|
||||||
|
|
||||||
// Remove user IAM
|
// Remove user IAM
|
||||||
adminRouter.Methods(http.MethodDelete).Path(adminVersion+"/remove-user").HandlerFunc(gz(httpTraceHdrs(adminAPI.RemoveUser))).Queries("accessKey", "{accessKey:.*}")
|
adminRouter.Methods(http.MethodDelete).Path(adminVersion+"/remove-user").HandlerFunc(gz(httpTraceHdrs(adminAPI.RemoveUser))).Queries("accessKey", "{accessKey:.*}")
|
||||||
|
@ -914,11 +914,12 @@ func (store *IAMStoreSys) listGroups(ctx context.Context) (res []string, err err
|
|||||||
// PolicyDBUpdate - adds or removes given policies to/from the user or group's
|
// PolicyDBUpdate - adds or removes given policies to/from the user or group's
|
||||||
// policy associations.
|
// policy associations.
|
||||||
func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGroup bool,
|
func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGroup bool,
|
||||||
userType IAMUserType, policies []string, isAttach bool) (updatedAt time.Time, addedOrRemoved []string,
|
userType IAMUserType, policies []string, isAttach bool) (updatedAt time.Time,
|
||||||
err error,
|
addedOrRemoved, effectivePolicies []string, err error,
|
||||||
) {
|
) {
|
||||||
if name == "" {
|
if name == "" {
|
||||||
return updatedAt, nil, errInvalidArgument
|
err = errInvalidArgument
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
cache := store.lock()
|
cache := store.lock()
|
||||||
@ -932,11 +933,13 @@ func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGro
|
|||||||
if store.getUsersSysType() == MinIOUsersSysType {
|
if store.getUsersSysType() == MinIOUsersSysType {
|
||||||
g, ok := cache.iamGroupsMap[name]
|
g, ok := cache.iamGroupsMap[name]
|
||||||
if !ok {
|
if !ok {
|
||||||
return updatedAt, nil, errNoSuchGroup
|
err = errNoSuchGroup
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if g.Status == statusDisabled {
|
if g.Status == statusDisabled {
|
||||||
return updatedAt, nil, errGroupDisabled
|
err = errGroupDisabled
|
||||||
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
mp = cache.iamGroupPolicyMap[name]
|
mp = cache.iamGroupPolicyMap[name]
|
||||||
@ -945,6 +948,7 @@ func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGro
|
|||||||
// Compute net policy change effect and updated policy mapping
|
// Compute net policy change effect and updated policy mapping
|
||||||
existingPolicySet := mp.policySet()
|
existingPolicySet := mp.policySet()
|
||||||
policiesToUpdate := set.CreateStringSet(policies...)
|
policiesToUpdate := set.CreateStringSet(policies...)
|
||||||
|
var newPolicySet set.StringSet
|
||||||
newPolicyMapping := mp
|
newPolicyMapping := mp
|
||||||
if isAttach {
|
if isAttach {
|
||||||
// new policies to attach => inputPolicies - existing (set difference)
|
// new policies to attach => inputPolicies - existing (set difference)
|
||||||
@ -952,26 +956,29 @@ func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGro
|
|||||||
// validate that new policies to add are defined.
|
// validate that new policies to add are defined.
|
||||||
for _, p := range policiesToUpdate.ToSlice() {
|
for _, p := range policiesToUpdate.ToSlice() {
|
||||||
if _, found := cache.iamPolicyDocsMap[p]; !found {
|
if _, found := cache.iamPolicyDocsMap[p]; !found {
|
||||||
return updatedAt, nil, errNoSuchPolicy
|
err = errNoSuchPolicy
|
||||||
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
newPolicyMapping.Policies = strings.Join(existingPolicySet.Union(policiesToUpdate).ToSlice(), ",")
|
newPolicySet = existingPolicySet.Union(policiesToUpdate)
|
||||||
} else {
|
} else {
|
||||||
// policies to detach => inputPolicies ∩ existing (intersection)
|
// policies to detach => inputPolicies ∩ existing (intersection)
|
||||||
policiesToUpdate = policiesToUpdate.Intersection(existingPolicySet)
|
policiesToUpdate = policiesToUpdate.Intersection(existingPolicySet)
|
||||||
newPolicyMapping.Policies = strings.Join(existingPolicySet.Difference(policiesToUpdate).ToSlice(), ",")
|
newPolicySet = existingPolicySet.Difference(policiesToUpdate)
|
||||||
}
|
}
|
||||||
newPolicyMapping.UpdatedAt = UTCNow()
|
|
||||||
|
|
||||||
// We return an error if the requested policy update will have no effect.
|
// We return an error if the requested policy update will have no effect.
|
||||||
if policiesToUpdate.IsEmpty() {
|
if policiesToUpdate.IsEmpty() {
|
||||||
return updatedAt, nil, errNoPolicyToAttachOrDetach
|
err = errNoPolicyToAttachOrDetach
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
newPolicies := newPolicySet.ToSlice()
|
||||||
|
newPolicyMapping.Policies = strings.Join(newPolicies, ",")
|
||||||
|
newPolicyMapping.UpdatedAt = UTCNow()
|
||||||
addedOrRemoved = policiesToUpdate.ToSlice()
|
addedOrRemoved = policiesToUpdate.ToSlice()
|
||||||
|
|
||||||
if err := store.saveMappedPolicy(ctx, name, userType, isGroup, newPolicyMapping); err != nil {
|
if err = store.saveMappedPolicy(ctx, name, userType, isGroup, newPolicyMapping); err != nil {
|
||||||
return updatedAt, addedOrRemoved, err
|
return
|
||||||
}
|
}
|
||||||
if !isGroup {
|
if !isGroup {
|
||||||
cache.iamUserPolicyMap[name] = newPolicyMapping
|
cache.iamUserPolicyMap[name] = newPolicyMapping
|
||||||
@ -979,7 +986,7 @@ func (store *IAMStoreSys) PolicyDBUpdate(ctx context.Context, name string, isGro
|
|||||||
cache.iamGroupPolicyMap[name] = newPolicyMapping
|
cache.iamGroupPolicyMap[name] = newPolicyMapping
|
||||||
}
|
}
|
||||||
cache.updatedAt = UTCNow()
|
cache.updatedAt = UTCNow()
|
||||||
return cache.updatedAt, addedOrRemoved, nil
|
return cache.updatedAt, addedOrRemoved, newPolicies, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// PolicyDBSet - update the policy mapping for the given user or group in
|
// PolicyDBSet - update the policy mapping for the given user or group in
|
||||||
@ -1451,23 +1458,6 @@ func (store *IAMStoreSys) GetUserInfo(name string) (u madmin.UserInfo, err error
|
|||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetUserPolicies - returns the policies attached to a user.
|
|
||||||
func (store *IAMStoreSys) GetUserPolicies(name string) ([]string, error) {
|
|
||||||
if name == "" {
|
|
||||||
return nil, errInvalidArgument
|
|
||||||
}
|
|
||||||
|
|
||||||
cache := store.rlock()
|
|
||||||
defer store.runlock()
|
|
||||||
|
|
||||||
if cache.iamUserPolicyMap[name].Policies == "" {
|
|
||||||
return []string{}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
policies := cache.iamUserPolicyMap[name].toSlice()
|
|
||||||
return policies, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// PolicyMappingNotificationHandler - handles updating a policy mapping from storage.
|
// PolicyMappingNotificationHandler - handles updating a policy mapping from storage.
|
||||||
func (store *IAMStoreSys) PolicyMappingNotificationHandler(ctx context.Context, userOrGroup string, isGroup bool, userType IAMUserType) error {
|
func (store *IAMStoreSys) PolicyMappingNotificationHandler(ctx context.Context, userOrGroup string, isGroup bool, userType IAMUserType) error {
|
||||||
if userOrGroup == "" {
|
if userOrGroup == "" {
|
||||||
|
125
cmd/iam.go
125
cmd/iam.go
@ -813,7 +813,7 @@ func (sys *IAMSys) QueryLDAPPolicyEntities(ctx context.Context, q madmin.PolicyE
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// IsTempUser - returns if given key is a temporary user.
|
// IsTempUser - returns if given key is a temporary user and parent user.
|
||||||
func (sys *IAMSys) IsTempUser(name string) (bool, string, error) {
|
func (sys *IAMSys) IsTempUser(name string) (bool, string, error) {
|
||||||
if !sys.Initialized() {
|
if !sys.Initialized() {
|
||||||
return false, "", errServerNotInitialized
|
return false, "", errServerNotInitialized
|
||||||
@ -889,15 +889,6 @@ func (sys *IAMSys) QueryPolicyEntities(ctx context.Context, q madmin.PolicyEntit
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetUserPolicies - get policies attached to a user.
|
|
||||||
func (sys *IAMSys) GetUserPolicies(name string) (p []string, err error) {
|
|
||||||
if !sys.Initialized() {
|
|
||||||
return p, errServerNotInitialized
|
|
||||||
}
|
|
||||||
|
|
||||||
return sys.store.GetUserPolicies(name)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SetUserStatus - sets current user status, supports disabled or enabled.
|
// SetUserStatus - sets current user status, supports disabled or enabled.
|
||||||
func (sys *IAMSys) SetUserStatus(ctx context.Context, accessKey string, status madmin.AccountStatus) (updatedAt time.Time, err error) {
|
func (sys *IAMSys) SetUserStatus(ctx context.Context, accessKey string, status madmin.AccountStatus) (updatedAt time.Time, err error) {
|
||||||
if !sys.Initialized() {
|
if !sys.Initialized() {
|
||||||
@ -1582,13 +1573,93 @@ func (sys *IAMSys) PolicyDBSet(ctx context.Context, name, policy string, userTyp
|
|||||||
return updatedAt, nil
|
return updatedAt, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PolicyDBUpdateBuiltin - adds or removes policies from a user or a group
|
||||||
|
// verified to be an internal IDP user.
|
||||||
|
func (sys *IAMSys) PolicyDBUpdateBuiltin(ctx context.Context, isAttach bool,
|
||||||
|
r madmin.PolicyAssociationReq,
|
||||||
|
) (updatedAt time.Time, addedOrRemoved, effectivePolicies []string, err error) {
|
||||||
|
if !sys.Initialized() {
|
||||||
|
err = errServerNotInitialized
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
userOrGroup := r.User
|
||||||
|
var isGroup bool
|
||||||
|
if userOrGroup == "" {
|
||||||
|
isGroup = true
|
||||||
|
userOrGroup = r.Group
|
||||||
|
}
|
||||||
|
|
||||||
|
if isGroup {
|
||||||
|
_, err = sys.GetGroupDescription(userOrGroup)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
var isTemp bool
|
||||||
|
isTemp, _, err = sys.IsTempUser(userOrGroup)
|
||||||
|
if err != nil && err != errNoSuchUser {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if isTemp {
|
||||||
|
err = errIAMActionNotAllowed
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// When the user is root credential you are not allowed to
|
||||||
|
// add policies for root user.
|
||||||
|
if userOrGroup == globalActiveCred.AccessKey {
|
||||||
|
err = errIAMActionNotAllowed
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate that user exists.
|
||||||
|
var userExists bool
|
||||||
|
_, userExists = sys.GetUser(ctx, userOrGroup)
|
||||||
|
if !userExists {
|
||||||
|
err = errNoSuchUser
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
updatedAt, addedOrRemoved, effectivePolicies, err = sys.store.PolicyDBUpdate(ctx, userOrGroup, isGroup,
|
||||||
|
regUser, r.Policies, isAttach)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Notify all other MinIO peers to reload policy
|
||||||
|
if !sys.HasWatcher() {
|
||||||
|
for _, nerr := range globalNotificationSys.LoadPolicyMapping(userOrGroup, regUser, isGroup) {
|
||||||
|
if nerr.Err != nil {
|
||||||
|
logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String())
|
||||||
|
logger.LogIf(ctx, nerr.Err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
||||||
|
Type: madmin.SRIAMItemPolicyMapping,
|
||||||
|
PolicyMapping: &madmin.SRPolicyMapping{
|
||||||
|
UserOrGroup: userOrGroup,
|
||||||
|
UserType: int(regUser),
|
||||||
|
IsGroup: isGroup,
|
||||||
|
Policy: strings.Join(effectivePolicies, ","),
|
||||||
|
},
|
||||||
|
UpdatedAt: updatedAt,
|
||||||
|
}))
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
// PolicyDBUpdateLDAP - adds or removes policies from a user or a group verified
|
// PolicyDBUpdateLDAP - adds or removes policies from a user or a group verified
|
||||||
// to be in the LDAP directory.
|
// to be in the LDAP directory.
|
||||||
func (sys *IAMSys) PolicyDBUpdateLDAP(ctx context.Context, isAttach bool,
|
func (sys *IAMSys) PolicyDBUpdateLDAP(ctx context.Context, isAttach bool,
|
||||||
r madmin.PolicyAssociationReq,
|
r madmin.PolicyAssociationReq,
|
||||||
) (updatedAt time.Time, addedOrRemoved []string, err error) {
|
) (updatedAt time.Time, addedOrRemoved, effectivePolicies []string, err error) {
|
||||||
if !sys.Initialized() {
|
if !sys.Initialized() {
|
||||||
return updatedAt, nil, errServerNotInitialized
|
err = errServerNotInitialized
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
var dn string
|
var dn string
|
||||||
@ -1597,28 +1668,31 @@ func (sys *IAMSys) PolicyDBUpdateLDAP(ctx context.Context, isAttach bool,
|
|||||||
dn, err = sys.LDAPConfig.DoesUsernameExist(r.User)
|
dn, err = sys.LDAPConfig.DoesUsernameExist(r.User)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.LogIf(ctx, err)
|
logger.LogIf(ctx, err)
|
||||||
return updatedAt, nil, err
|
return
|
||||||
}
|
}
|
||||||
if dn == "" {
|
if dn == "" {
|
||||||
return updatedAt, nil, errNoSuchUser
|
err = errNoSuchUser
|
||||||
|
return
|
||||||
}
|
}
|
||||||
isGroup = false
|
isGroup = false
|
||||||
} else {
|
} else {
|
||||||
if exists, err := sys.LDAPConfig.DoesGroupDNExist(r.Group); err != nil {
|
var exists bool
|
||||||
|
if exists, err = sys.LDAPConfig.DoesGroupDNExist(r.Group); err != nil {
|
||||||
logger.LogIf(ctx, err)
|
logger.LogIf(ctx, err)
|
||||||
return updatedAt, nil, err
|
return
|
||||||
} else if !exists {
|
} else if !exists {
|
||||||
return updatedAt, nil, errNoSuchGroup
|
err = errNoSuchGroup
|
||||||
|
return
|
||||||
}
|
}
|
||||||
dn = r.Group
|
dn = r.Group
|
||||||
isGroup = true
|
isGroup = true
|
||||||
}
|
}
|
||||||
|
|
||||||
userType := stsUser
|
userType := stsUser
|
||||||
updatedAt, addedOrRemoved, err = sys.store.PolicyDBUpdate(ctx, dn, isGroup,
|
updatedAt, addedOrRemoved, effectivePolicies, err = sys.store.PolicyDBUpdate(ctx, dn, isGroup,
|
||||||
userType, r.Policies, isAttach)
|
userType, r.Policies, isAttach)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return updatedAt, nil, err
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Notify all other MinIO peers to reload policy
|
// Notify all other MinIO peers to reload policy
|
||||||
@ -1631,7 +1705,18 @@ func (sys *IAMSys) PolicyDBUpdateLDAP(ctx context.Context, isAttach bool,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return updatedAt, addedOrRemoved, nil
|
logger.LogIf(ctx, globalSiteReplicationSys.IAMChangeHook(ctx, madmin.SRIAMItem{
|
||||||
|
Type: madmin.SRIAMItemPolicyMapping,
|
||||||
|
PolicyMapping: &madmin.SRPolicyMapping{
|
||||||
|
UserOrGroup: dn,
|
||||||
|
UserType: int(userType),
|
||||||
|
IsGroup: isGroup,
|
||||||
|
Policy: strings.Join(effectivePolicies, ","),
|
||||||
|
},
|
||||||
|
UpdatedAt: updatedAt,
|
||||||
|
}))
|
||||||
|
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// PolicyDBGet - gets policy set on a user or group. If a list of groups is
|
// PolicyDBGet - gets policy set on a user or group. If a list of groups is
|
||||||
|
Loading…
x
Reference in New Issue
Block a user