Coverage report for Casbin.
Generated at 18/02/2019 12:10:18 by DelphiCodeCoverage - an open source tool for Delphi Code Coverage.
Statistics for Casbin.pas
| Number of lines covered | 172 |
| Number of lines with code gen | 187 |
| Line coverage | 91% |
| 1 | // Copyright 2018 by John Kouraklis and Contributors. All Rights Reserved. |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | unit Casbin; |
| 15 | |
| 16 | interface |
| 17 | |
| 18 | uses |
| 19 | Casbin.Core.Base.Types, Casbin.Types, Casbin.Model.Types, |
| 20 | Casbin.Adapter.Types, Casbin.Core.Logger.Types, Casbin.Functions.Types, Casbin.Policy.Types, System.TypInfo; |
| 21 | |
| 22 | type |
| 23 | TCasbin = class (TBaseInterfacedObject, ICasbin) |
| 24 | private |
| 25 | fModel: IModel; |
| 26 | fPolicy: IPolicyManager; |
| 27 | fLogger: ILogger; |
| 28 | fEnabled: boolean; |
| 29 | fFunctions: IFunctions; |
| 30 | |
| 31 | function rolesGsInternal(const Args: array of string): Boolean; |
| 32 | function rolesG(const Args: array of string): Boolean; |
| 33 | function rolesG2(const Args: array of string): Boolean; |
| 34 | private |
| 35 | {$REGION 'Interface'} |
| 36 | function getModel: IModel; |
| 37 | function getPolicy: IPolicyManager; |
| 38 | procedure setModel(const aValue: IModel); |
| 39 | procedure setPolicy(const aValue: IPolicyManager); |
| 40 | function getLogger: ILogger; |
| 41 | procedure setLogger(const aValue: ILogger); |
| 42 | function getEnabled: Boolean; |
| 43 | procedure setEnabled(const aValue: Boolean); |
| 44 | |
| 45 | function enforce (const aParams: TEnforceParameters): boolean; overload; |
| 46 | function enforce(const aParams: TEnforceParameters; const aPointer: PTypeInfo; |
| 47 | const aRec): boolean; overload; |
| 48 | {$ENDREGION} |
| 49 | public |
| 50 | constructor Create; overload; |
| 51 | constructor Create(const aModelFile, aPolicyFile: string); overload; //PALOFF |
| 52 | constructor Create(const aModel: IModel; const aPolicyAdapter: IPolicyManager); |
| 53 | overload; |
| 54 | constructor Create(const aModelFile: string; const aPolicyAdapter: IPolicyManager); |
| 55 | overload; |
| 56 | constructor Create(const aModel: IModel; const aPolicyFile: string); |
| 57 | overload; |
| 58 | end; |
| 59 | |
| 60 | implementation |
| 61 | |
| 62 | uses |
| 63 | Casbin.Exception.Types, Casbin.Model, Casbin.Policy, |
| 64 | Casbin.Core.Logger.Default, System.Generics.Collections, System.SysUtils, |
| 65 | Casbin.Resolve, Casbin.Resolve.Types, Casbin.Model.Sections.Types, |
| 66 | Casbin.Core.Utilities, System.Rtti, Casbin.Effect.Types, Casbin.Effect, |
| 67 | Casbin.Functions, Casbin.Adapter.Memory, Casbin.Adapter.Memory.Policy, System.SyncObjs, System.Types, System.StrUtils, Casbin.Core.Defaults, |
| 68 | ArrayHelper; |
| 69 | |
| 70 | var |
| 71 | criticalSection: TCriticalSection; |
| 72 | |
| 73 | constructor TCasbin.Create(const aModelFile, aPolicyFile: string); |
| 74 | var |
| 75 | model: IModel; |
| 76 | policy: IPolicyManager; |
| 77 | begin |
| 78 | if trim(aModelFile)='' then |
| 79 | model:=TModel.Create(TMemoryAdapter.Create) |
| 80 | else |
| 81 | model:=TModel.Create(aModelFile); |
| 82 | |
| 83 | if Trim(aPolicyFile)='' then |
| 84 | policy:=TPolicyManager.Create(TPolicyMemoryAdapter.Create) |
| 85 | else |
| 86 | policy:=TPolicyManager.Create(aPolicyFile); |
| 87 | |
| 88 | Create(model, policy); |
| 89 | end; |
| 90 | |
| 91 | constructor TCasbin.Create(const aModel: IModel; const aPolicyAdapter: |
| 92 | IPolicyManager); |
| 93 | begin |
| 94 | if not Assigned(aModel) then |
| 95 | raise ECasbinException.Create('Model Adapter is nil'); |
| 96 | if not Assigned(aPolicyAdapter) then |
| 97 | raise ECasbinException.Create('Policy Manager is nil'); |
| 98 | inherited Create; |
| 99 | fModel:=aModel; |
| 100 | fPolicy:=aPolicyAdapter; |
| 101 | fLogger:=TDefaultLogger.Create; |
| 102 | fEnabled:=True; |
| 103 | fFunctions:=TFunctions.Create; |
| 104 | fFunctions.registerFunction('g', rolesG); |
| 105 | fFunctions.registerFunction('g2', rolesG2); |
| 106 | end; |
| 107 | |
| 108 | function TCasbin.enforce(const aParams: TEnforceParameters): boolean; |
| 109 | var |
| 110 | rec: string; |
| 111 | begin |
| 112 | Result:=enforce(aParams, nil, rec); |
| 113 | end; |
| 114 | |
| 115 | constructor TCasbin.Create; |
| 116 | begin |
| 117 | Create(TModel.Create(TMemoryAdapter.Create), TPolicyManager.Create( |
| 118 | TPolicyMemoryAdapter.Create)); |
| 119 | end; |
| 120 | |
| 121 | constructor TCasbin.Create(const aModelFile: string; |
| 122 | const aPolicyAdapter: IPolicyManager); |
| 123 | var |
| 124 | model: IModel; |
| 125 | begin |
| 126 | if trim(aModelFile)='' then |
| 127 | model:=TModel.Create(TMemoryAdapter.Create) |
| 128 | else |
| 129 | model:=TModel.Create(aModelFile); |
| 130 | |
| 131 | Create(model, aPolicyAdapter); |
| 132 | end; |
| 133 | |
| 134 | function TCasbin.enforce(const aParams: TEnforceParameters; const aPointer: |
| 135 | PTypeInfo; const aRec): boolean; |
| 136 | var |
| 137 | item: string; |
| 138 | request: TList<string>; |
| 139 | requestDict: TDictionary<string, string>; |
| 140 | policyDict: TDictionary<string, string>; |
| 141 | requestStr: string; |
| 142 | matcherResult: TEffectResult; |
| 143 | policyList: TList<string>; |
| 144 | effectArray: TEffectArray; |
| 145 | matchString: string; |
| 146 | reqDomain: string; |
| 147 | domainsArrayRec: TArrayRecord<string>; |
| 148 | requestArrayRec: TArrayRecord<string>; |
| 149 | ctx: TRttiContext; |
| 150 | cType: TRttiType; |
| 151 | cField: TRttiField; |
| 152 | abacList: TList<string>; |
| 153 | begin |
| 154 | result:=true; |
| 155 | if Length(aParams) = 0 then |
| 156 | Exit; |
| 157 | if not fEnabled then |
| 158 | Exit; |
| 159 | |
| 160 | criticalSection.Acquire; |
| 161 | try |
| 162 | requestArrayRec:=TArrayRecord<string>.Create(aParams); |
| 163 | |
| 164 | request:=TList<string>.Create; |
| 165 | requestArrayRec.List(request); |
| 166 | |
| 167 | requestStr:=string.Join(',', aParams); |
| 168 | |
| 169 | fLogger.log('Enforcing request '''+requestStr+''''); |
| 170 | |
| 171 | fLogger.log(' Resolving Request...'); |
| 172 | |
| 173 | // Resolve Request |
| 174 | {$IFDEF DEBUG} |
| 175 | fLogger.log(' Request: '+requestStr); |
| 176 | fLogger.log(' Assertions: '); |
| 177 | if fModel.assertions(stRequestDefinition).Count=0 then |
| 178 | fLogger.log(' No Request Assertions found') |
| 179 | else |
| 180 | for item in fModel.assertions(stRequestDefinition) do |
| 181 | fLogger.log(' '+item); |
| 182 | {$ENDIF} |
| 183 | requestDict:=resolve(request, rtRequest, |
| 184 | fModel.assertions(stRequestDefinition)); |
| 185 | |
| 186 | // Resolve ABAC record |
| 187 | abacList:=TList<string>.Create; |
| 188 | if Assigned(aPointer) and Assigned(@aRec) then |
| 189 | begin |
| 190 | fLogger.log('Record Identified'); |
| 191 | ctx:=TRttiContext.Create; |
| 192 | cType:=ctx.GetType(aPointer); |
| 193 | |
| 194 | if fModel.assertions(stRequestDefinition).Count>0 then |
| 195 | begin |
| 196 | abacList.AddRange(fModel.assertions(stRequestDefinition)); |
| 197 | fLogger.log('Request identifiers retrieved ('+string.Join(',', abacList.ToArray)+')'); |
| 198 | end |
| 199 | else |
| 200 | begin |
| 201 | // This assumes the request uses the letter 'r' and typical 'sub,obj,act' |
| 202 | abacList.Add('r.sub'); |
| 203 | abacList.Add('r.obj'); |
| 204 | abacList.Add('r.act'); |
| 205 | fLogger.log('Default identifiers used (r)'); |
| 206 | end; |
| 207 | |
| 208 | fLogger.log('Retrieving content of '+cType.Name+' record'); |
| 209 | for cField in cType.GetFields do |
| 210 | begin |
| 211 | for item in abacList do |
| 212 | begin |
| 213 | requestDict.Add(UpperCase(item)+'.'+UpperCase(cField.Name), |
| 214 | UpperCase(cField.GetValue(@aRec).AsString)); |
| 215 | end; |
| 216 | end; |
| 217 | end; |
| 218 | |
| 219 | fLogger.log(' Resolving Policies...'); |
| 220 | |
| 221 | {$IFDEF DEBUG} |
| 222 | fLogger.log(' Policies: '); |
| 223 | fLogger.log(' Assertions: '); |
| 224 | if fPolicy.policies.Count=0 then |
| 225 | fLogger.log(' No Policy Assertions found') |
| 226 | else |
| 227 | for item in fPolicy.policies do |
| 228 | fLogger.log(' '+item); |
| 229 | |
| 230 | fLogger.log(' Assertions: '+requestStr); |
| 231 | for item in fModel.assertions(stPolicyDefinition) do |
| 232 | fLogger.log(' '+item); |
| 233 | {$ENDIF} |
| 234 | |
| 235 | {$IFDEF DEBUG} |
| 236 | fLogger.log(' Matchers: '+requestStr); |
| 237 | fLogger.log(' Assertions: '); |
| 238 | if fModel.assertions(stMatchers).Count=0 then |
| 239 | fLogger.log(' No Matcher Assertions found') |
| 240 | else |
| 241 | for item in fModel.assertions(stMatchers) do |
| 242 | fLogger.log(' '+item); |
| 243 | {$ENDIF} |
| 244 | if fModel.assertions(stMatchers).Count>0 then |
| 245 | begin |
| 246 | matchString:=fModel.assertions(stMatchers).Items[0]; |
| 247 | |
| 248 | // Check for builtin accounts |
| 249 | for item in builtinAccounts do |
| 250 | if matchString.Contains(item) and requestStr.Contains(item) then |
| 251 | Exit; |
| 252 | |
| 253 | end |
| 254 | else |
| 255 | matchString:=''; |
| 256 | |
| 257 | domainsArrayRec:=TArrayRecord<string>.Create(fPolicy.domains.ToArray); |
| 258 | for item in fPolicy.policies do |
| 259 | begin |
| 260 | fLogger.log(' Processing policy: '+item); |
| 261 | // Resolve Policy |
| 262 | policyList:=TList<string>.Create; //PALOFF |
| 263 | policyList.AddRange(item.Split([','])); //PALOFF |
| 264 | |
| 265 | // Item 0 has p,g, etc |
| 266 | policyList.Delete(0); |
| 267 | // We look at the relevant policies only |
| 268 | // by working out the domains |
| 269 | reqDomain:=DefaultDomain; |
| 270 | domainsArrayRec.ForEach(procedure(var Value: string; Index: integer) |
| 271 | var |
| 272 | item: string; |
| 273 | begin |
| 274 | for item in policyList do |
| 275 | if Trim(Value) = Trim(item) then |
| 276 | begin |
| 277 | reqDomain:=Trim(Value); |
| 278 | Break; |
| 279 | end; |
| 280 | end); |
| 281 | |
| 282 | if fPolicy.linkExists(request[0], reqDomain, policyList[0]) or |
| 283 | soundexSimilar(Trim(request[0]), Trim(policyList[0]), |
| 284 | Trunc(0.50 * Length(request[0]))) then |
| 285 | begin |
| 286 | policyDict:=resolve(policyList, rtPolicy, |
| 287 | fModel.assertions(stPolicyDefinition)); |
| 288 | |
| 289 | fLogger.log(' Resolving Functions and Matcher...'); |
| 290 | |
| 291 | // Resolve Matcher |
| 292 | if string.Compare('indeterminate', Trim(policyList[policyList.Count-1]), |
| 293 | [coIgnoreCase])=0 then |
| 294 | matcherResult:=erIndeterminate |
| 295 | else |
| 296 | if matchString<>'' then |
| 297 | matcherResult:=resolve(requestDict, policyDict, fFunctions, matchString) |
| 298 | else |
| 299 | matcherResult:=erIndeterminate; |
| 300 | SetLength(effectArray, Length(effectArray)+1); |
| 301 | effectArray[Length(effectArray)-1]:=matcherResult; //PALOFF |
| 302 | |
| 303 | policyDict.Free; |
| 304 | end; |
| 305 | policyList.Free; |
| 306 | end; |
| 307 | |
| 308 | //Resolve Effector |
| 309 | fLogger.log(' Merging effects...'); |
| 310 | |
| 311 | Result:=mergeEffects(fModel.effectCondition, effectArray); |
| 312 | |
| 313 | fLogger.log('Enforcement completed (Result: '+BoolToStr(Result, true)+')'); |
| 314 | |
| 315 | abacList.Free; |
| 316 | request.Free; |
| 317 | requestDict.Free; |
| 318 | |
| 319 | finally |
| 320 | criticalSection.Release; |
| 321 | end; |
| 322 | end; |
| 323 | |
| 324 | { TCasbin } |
| 325 | |
| 326 | function TCasbin.getEnabled: Boolean; |
| 327 | begin |
| 328 | Result:=fEnabled; |
| 329 | end; |
| 330 | |
| 331 | function TCasbin.getLogger: ILogger; |
| 332 | begin |
| 333 | Result:=fLogger; |
| 334 | end; |
| 335 | |
| 336 | function TCasbin.getModel: IModel; |
| 337 | begin |
| 338 | Result:=fModel; |
| 339 | end; |
| 340 | |
| 341 | function TCasbin.getPolicy: IPolicyManager; |
| 342 | begin |
| 343 | Result:=fPolicy; |
| 344 | end; |
| 345 | |
| 346 | function TCasbin.rolesG(const Args: array of string): Boolean; |
| 347 | begin |
| 348 | Result:=rolesGsInternal(Args); |
| 349 | end; |
| 350 | |
| 351 | function TCasbin.rolesG2(const Args: array of string): Boolean; |
| 352 | begin |
| 353 | Result:=rolesGsInternal(Args); |
| 354 | end; |
| 355 | |
| 356 | function TCasbin.rolesGsInternal(const Args: array of string): Boolean; |
| 357 | begin |
| 358 | result:=False; |
| 359 | if (Length(Args)<2) or (Length(Args)>3) then |
| 360 | raise ECasbinException.Create('The arguments are different than expected in '+ |
| 361 | 'g''s functions'); |
| 362 | if Length(Args)=3 then |
| 363 | Result:=fPolicy.linkExists(Args[0], Args[2], Args[1]); |
| 364 | if Length(Args)=2 then |
| 365 | Result:=fPolicy.linkExists(Args[0], Args[1]); |
| 366 | end; |
| 367 | |
| 368 | procedure TCasbin.setEnabled(const aValue: Boolean); |
| 369 | begin |
| 370 | fEnabled:=aValue; |
| 371 | end; |
| 372 | |
| 373 | procedure TCasbin.setLogger(const aValue: ILogger); |
| 374 | begin |
| 375 | fLogger:=nil; |
| 376 | if Assigned(aValue) then |
| 377 | fLogger:=aValue |
| 378 | else |
| 379 | fLogger:=TDefaultLogger.Create; |
| 380 | end; |
| 381 | |
| 382 | procedure TCasbin.setModel(const aValue: IModel); |
| 383 | begin |
| 384 | if not Assigned(aValue) then |
| 385 | raise ECasbinException.Create('Model in nil'); |
| 386 | fModel:=aValue; |
| 387 | end; |
| 388 | |
| 389 | procedure TCasbin.setPolicy(const aValue: IPolicyManager); |
| 390 | begin |
| 391 | if not Assigned(aValue) then |
| 392 | raise ECasbinException.Create('Policy Manager in nil'); |
| 393 | fPolicy:=aValue; |
| 394 | end; |
| 395 | |
| 396 | constructor TCasbin.Create(const aModel: IModel; const aPolicyFile: string); |
| 397 | var |
| 398 | policy: IPolicyManager; |
| 399 | begin |
| 400 | if Trim(aPolicyFile)='' then |
| 401 | policy:=TPolicyManager.Create(TPolicyMemoryAdapter.Create) |
| 402 | else |
| 403 | policy:=TPolicyManager.Create(aPolicyFile); |
| 404 | |
| 405 | Create(aModel, policy); |
| 406 | end; |
| 407 | |
| 408 | initialization |
| 409 | criticalSection:=TCriticalSection.Create; |
| 410 | |
| 411 | finalization |
| 412 | criticalSection.Free; |
| 413 | |
| 414 | end. |