summaryrefslogtreecommitdiffstats
path: root/acf2/model/aaa.lua
blob: 7a650a899f0a08cc1e8cbb469335c702bea132d0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
--[[
Copyright (c) 2012-2014 Kaarle Ritvanen
See LICENSE file for license details
--]]

local M = require('acf2.model')
local object = require('acf2.object')

local digest = require('crypto').digest


local Role = M.new()
Role.permissions = M.Set{type=M.Reference{scope='../../../permissions'}}


local function hash_password(algorithm, salt, password)
   return algorithm..'$'..salt..'$'..digest(algorithm, salt..password)
end

local hash_pattern = '^(%w+)%$(%w+)%$%x+$'


local Password = object.class(M.String)

function Password:init() object.super(self, Password):init{detail=true} end

function Password:normalize(context, value)
   if value:find(hash_pattern) then return value end

   local salt = ''
   for i = 1,12 do
      local c = math.random(48, 109)
      if c > 57 then c = c + 7 end
      if c > 90 then c = c + 6 end
      salt = salt..string.char(c)
   end
   return hash_password('sha256', salt, value)
end


local User = M.new()
User.password = Password
User.real_name = M.String
User.superuser = M.Boolean{default=false}
User.roles = M.Set{type=M.Reference{scope='../../../roles'}}

function User:check_password(password)
   if not self.password then return false end
   local _, _, algorithm, salt = self.password:find(hash_pattern)
   if not salt then return false end
   return hash_password(algorithm, salt, password) == self.password
end

function User:check_permission(permission)
   -- TODO audit trail
   print('check permission', permission)

   if self.superuser then return true end

   assert(getmetatable(self).txn:fetch('/auth/permissions')[permission])

   for _, role in M.node.pairs(self.roles, true) do
      for _, p in M.node.pairs(role.permissions, true) do
	 if p == permission then return true end
      end
   end
   return false
end


local Authentication = M.new()
Authentication.users = M.Collection{type=User}
Authentication.roles = M.Collection{type=Role}
Authentication.permissions = M.Set{
   type=M.String,
   addr='/volatile/aaa/permissions'
}

M.register(
   'auth',
   Authentication,
   {
      addr='/json'..require('posix').getcwd()..'/config/aaa.json',
      ui_name='Authentication'
   }
)

M.permission.defaults('/auth')