Files
cloudpods/pkg/util/rbacutils/policygroup.go
2020-10-24 22:46:46 +08:00

89 lines
2.4 KiB
Go

// Copyright 2019 Yunion
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package rbacutils
import (
"yunion.io/x/jsonutils"
"yunion.io/x/pkg/errors"
"yunion.io/x/onecloud/pkg/httperrors"
)
/*
type SPolicyInfo struct {
Id string `json:"id"`
Name string `json:"name"`
Enabled bool `json:"enabled"`
DomainId string `json:"domain_id"`
IsPublic bool `json:"is_public"`
PublicScope string `json:"public_scope"`
SharedDomainIds []string `json:"shared_domain_ids"`
Scope TRbacScope `json:"scope"`
Policy *SRbacPolicyCore `json:"policy"`
}
func GetMatchedPolicies(policies []SPolicyInfo, userCred IRbacIdentity) (TPolicySet, []string) {
matchedPolicies := make([]*SRbacPolicyCore, 0)
matchedNames := make([]string, 0)
for i := range policies {
isMatched, _ := policies[i].Policy.Match(userCred)
if !isMatched {
continue
}
matchedPolicies = append(matchedPolicies, policies[i].Policy)
matchedNames = append(matchedNames, policies[i].Name)
}
return matchedPolicies, matchedNames
}*/
type TPolicyGroup map[TRbacScope]TPolicySet
func DecodePolicyGroup(json jsonutils.JSONObject) (TPolicyGroup, error) {
jmap, err := json.GetMap()
if err != nil {
return nil, errors.Wrap(httperrors.ErrInvalidFormat, "invalid json: not a map")
}
group := TPolicyGroup{}
for k := range jmap {
group[TRbacScope(k)], err = DecodePolicySet(jmap[k])
if err != nil {
return nil, errors.Wrapf(err, "decode %s", k)
}
}
return group, nil
}
func (sets TPolicyGroup) HighestScope() TRbacScope {
for _, s := range []TRbacScope{
ScopeSystem,
ScopeDomain,
ScopeProject,
ScopeUser,
} {
if _, ok := sets[s]; ok {
return s
}
}
return ScopeNone
}
func (sets TPolicyGroup) Encode() jsonutils.JSONObject {
j := jsonutils.NewDict()
for k := range sets {
j.Set(string(k), sets[k].Encode())
}
return j
}