mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-28 18:06:34 +02:00
Add a new option for filtering to a subset of directory groups in the Pomerium JWT and Impersonate-Group headers. Add a JWTGroupsFilter field to both the Options struct (for a global filter) and to the Policy struct (for per-route filter). These will be populated only from the config protos, and not from a config file. If either filter is set, then for each of a user's groups, the group name or group ID will be added to the JWT groups claim only if it is an exact string match with one of the elements of either filter.
150 lines
5.1 KiB
Go
150 lines
5.1 KiB
Go
// Package authorize is a pomerium service that is responsible for determining
|
|
// if a given request should be authorized (AuthZ).
|
|
package authorize
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"slices"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/rs/zerolog"
|
|
|
|
"github.com/pomerium/pomerium/authorize/evaluator"
|
|
"github.com/pomerium/pomerium/authorize/internal/store"
|
|
"github.com/pomerium/pomerium/config"
|
|
"github.com/pomerium/pomerium/internal/atomicutil"
|
|
"github.com/pomerium/pomerium/internal/log"
|
|
"github.com/pomerium/pomerium/internal/telemetry/metrics"
|
|
"github.com/pomerium/pomerium/internal/telemetry/trace"
|
|
"github.com/pomerium/pomerium/pkg/cryptutil"
|
|
"github.com/pomerium/pomerium/pkg/grpc/databroker"
|
|
"github.com/pomerium/pomerium/pkg/storage"
|
|
)
|
|
|
|
// Authorize struct holds
|
|
type Authorize struct {
|
|
state *atomicutil.Value[*authorizeState]
|
|
store *store.Store
|
|
currentOptions *atomicutil.Value[*config.Options]
|
|
accessTracker *AccessTracker
|
|
globalCache storage.Cache
|
|
|
|
// The stateLock prevents updating the evaluator store simultaneously with an evaluation.
|
|
// This should provide a consistent view of the data at a given server/record version and
|
|
// avoid partial updates.
|
|
stateLock sync.RWMutex
|
|
}
|
|
|
|
// New validates and creates a new Authorize service from a set of config options.
|
|
func New(ctx context.Context, cfg *config.Config) (*Authorize, error) {
|
|
a := &Authorize{
|
|
currentOptions: config.NewAtomicOptions(),
|
|
store: store.New(),
|
|
globalCache: storage.NewGlobalCache(time.Minute),
|
|
}
|
|
a.accessTracker = NewAccessTracker(a, accessTrackerMaxSize, accessTrackerDebouncePeriod)
|
|
|
|
state, err := newAuthorizeStateFromConfig(ctx, cfg, a.store, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
a.state = atomicutil.NewValue(state)
|
|
|
|
return a, nil
|
|
}
|
|
|
|
// GetDataBrokerServiceClient returns the current DataBrokerServiceClient.
|
|
func (a *Authorize) GetDataBrokerServiceClient() databroker.DataBrokerServiceClient {
|
|
return a.state.Load().dataBrokerClient
|
|
}
|
|
|
|
// Run runs the authorize service.
|
|
func (a *Authorize) Run(ctx context.Context) error {
|
|
a.accessTracker.Run(ctx)
|
|
return nil
|
|
}
|
|
|
|
func validateOptions(o *config.Options) error {
|
|
sharedKey, err := o.GetSharedKey()
|
|
if err != nil {
|
|
return fmt.Errorf("authorize: bad 'SHARED_SECRET': %w", err)
|
|
}
|
|
if _, err := cryptutil.NewAEADCipher(sharedKey); err != nil {
|
|
return fmt.Errorf("authorize: bad 'SHARED_SECRET': %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// newPolicyEvaluator returns an policy evaluator.
|
|
func newPolicyEvaluator(
|
|
ctx context.Context,
|
|
opts *config.Options, store *store.Store, previous *evaluator.Evaluator,
|
|
) (*evaluator.Evaluator, error) {
|
|
metrics.AddPolicyCountCallback("pomerium-authorize", func() int64 {
|
|
return int64(opts.NumPolicies())
|
|
})
|
|
ctx = log.WithContext(ctx, func(c zerolog.Context) zerolog.Context {
|
|
return c.Str("service", "authorize")
|
|
})
|
|
ctx, span := trace.StartSpan(ctx, "authorize.newPolicyEvaluator")
|
|
defer span.End()
|
|
|
|
clientCA, err := opts.DownstreamMTLS.GetCA()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("authorize: invalid client CA: %w", err)
|
|
}
|
|
|
|
clientCRL, err := opts.DownstreamMTLS.GetCRL()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("authorize: invalid client CRL: %w", err)
|
|
}
|
|
|
|
authenticateURL, err := opts.GetInternalAuthenticateURL()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("authorize: invalid authenticate url: %w", err)
|
|
}
|
|
|
|
signingKey, err := opts.GetSigningKey()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("authorize: invalid signing key: %w", err)
|
|
}
|
|
|
|
// It is important to add an invalid_client_certificate rule even when the
|
|
// mTLS enforcement behavior is set to reject connections at the listener
|
|
// level, because of the per-route TLSDownstreamClientCA setting.
|
|
addDefaultClientCertificateRule := opts.HasAnyDownstreamMTLSClientCA() &&
|
|
opts.DownstreamMTLS.GetEnforcement() != config.MTLSEnforcementPolicy
|
|
|
|
clientCertConstraints, err := evaluator.ClientCertConstraintsFromConfig(&opts.DownstreamMTLS)
|
|
if err != nil {
|
|
return nil, fmt.Errorf(
|
|
"authorize: internal error: couldn't build client cert constraints: %w", err)
|
|
}
|
|
|
|
allPolicies := slices.Collect(opts.GetAllPolicies())
|
|
return evaluator.New(ctx, store, previous,
|
|
evaluator.WithPolicies(allPolicies),
|
|
evaluator.WithClientCA(clientCA),
|
|
evaluator.WithAddDefaultClientCertificateRule(addDefaultClientCertificateRule),
|
|
evaluator.WithClientCRL(clientCRL),
|
|
evaluator.WithClientCertConstraints(clientCertConstraints),
|
|
evaluator.WithSigningKey(signingKey),
|
|
evaluator.WithAuthenticateURL(authenticateURL.String()),
|
|
evaluator.WithGoogleCloudServerlessAuthenticationServiceAccount(opts.GetGoogleCloudServerlessAuthenticationServiceAccount()),
|
|
evaluator.WithJWTClaimsHeaders(opts.JWTClaimsHeaders),
|
|
evaluator.WithJWTGroupsFilter(opts.JWTGroupsFilter),
|
|
)
|
|
}
|
|
|
|
// OnConfigChange updates internal structures based on config.Options
|
|
func (a *Authorize) OnConfigChange(ctx context.Context, cfg *config.Config) {
|
|
currentState := a.state.Load()
|
|
a.currentOptions.Store(cfg.Options)
|
|
if state, err := newAuthorizeStateFromConfig(ctx, cfg, a.store, currentState.evaluator); err != nil {
|
|
log.Ctx(ctx).Error().Err(err).Msg("authorize: error updating state")
|
|
} else {
|
|
a.state.Store(state)
|
|
}
|
|
}
|