1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240
//! Biscuit authentication and authorization token
//!
//! Biscuit is an authorization token for microservices architectures with the following properties:
//!
//! * decentralized validation: any node could validate the token only with public information;
//! * offline delegation: a new, valid token can be created from another one by attenuating its rights, by its holder, without communicating with anyone;
//! * capabilities based: authorization in microservices should be tied to rights related to the request, instead of relying to an identity that might not make sense to the authorizer;
//! * flexible rights managements: the token uses a logic language to specify attenuation and add bounds on ambient data;
//! * small enough to fit anywhere (cookies, etc).
//!
//! Non goals:
//!
//! * This is not a new authentication protocol. Biscuit tokens can be used as opaque tokens delivered by other systems such as OAuth.
//! * Revocation: while tokens come with expiration dates, revocation requires external state management.
//!
//! # Usage
//!
//! Most of the interaction with this library is done through the
//! [Biscuit](`crate::token::Biscuit`) structure, that represents a valid
//! token, and the [Authorizer](`crate::token::authorizer::Authorizer`), used to
//! check authorization policies on a token.
//!
//! In this example we will see how we can create a token, add some checks,
//! serialize and deserialize a token, append more checks, and validate
//! those checks in the context of a request:
//!
//! ```rust
//! extern crate biscuit_auth as biscuit;
//!
//! use biscuit::{KeyPair, Biscuit, Authorizer, builder::*, error};
//!
//! fn main() -> Result<(), error::Token> {
//! // let's generate the root key pair. The root public key will be necessary
//! // to verify the token
//! let root = KeyPair::new();
//! let public_key = root.public();
//!
//! // creating a first token
//! let token1 = {
//! // the first block of the token is the authority block. It contains global
//! // information like which operation types are available
//! let mut builder = Biscuit::builder(&root);
//!
//! // let's define some access rights
//! builder.add_authority_fact("right(\"/a/file1.txt\", #read)")?;
//! builder.add_authority_fact("right(\"/a/file1.txt\", #write)")?;
//! builder.add_authority_fact("right(\"/a/file2.txt\", #read)")?;
//! builder.add_authority_fact("right(\"/b/file3.txt\", #write)")?;
//!
//! // we can now create the token
//! let biscuit = builder.build()?;
//! println!("biscuit (authority): {}", biscuit.print());
//!
//! biscuit.to_vec()?
//! };
//!
//! // this token is only 258 bytes, holding the authority data and the signature
//! assert_eq!(token1.len(), 258);
//!
//! // now let's add some restrictions to this token
//! // we want to limit access to `/a/file1.txt` and to read operations
//! let token2 = {
//! // the token is deserialized, the signature is verified
//! let deser = Biscuit::from(&token1, |_| root.public())?;
//!
//! let mut builder = deser.create_block();
//!
//! // checks are implemented as logic rules. If the rule produces something,
//! // the check is successful
//! builder.add_check("check if resource(\"/a/file1.txt\"), operation(#read)")?;
//!
//! // we can now create a new token
//! let biscuit = deser.append(builder)?;
//! println!("biscuit (authority): {}", biscuit.print());
//!
//! biscuit.to_vec()?
//! };
//!
//! // this new token fits in 400 bytes
//! assert_eq!(token2.len(), 400);
//!
//! /************** VERIFICATION ****************/
//!
//! // let's deserialize the token:
//! let biscuit2 = Biscuit::from(&token2, |_| root.public())?;
//!
//! // let's define 3 authorizers (corresponding to 3 different requests):
//! // - one for /a/file1.txt and a read operation
//! // - one for /a/file1.txt and a write operation
//! // - one for /a/file2.txt and a read operation
//!
//! let mut v1 = biscuit2.authorizer()?;
//! v1.add_fact("resource(\"/a/file1.txt\")")?;
//! v1.add_fact("operation(\"read\")")?;
//! // we will check that the token has the corresponding right
//! v1.add_check("check if right(\"/a/file1.txt\", #read)")?;
//!
//! // we choose if we want to allow or deny access
//! // we can define a serie of allow/deny policies in the same
//! // format as checks
//! v1.allow();
//!
//! // the token restricts to read operations:
//! assert!(v1.authorize().is_ok());
//!
//! let mut v2 = biscuit2.authorizer()?;
//! v2.add_fact("resource(\"/a/file1.txt\")")?;
//! v2.add_fact("operation(\"write\")")?;
//! v2.add_check("check if right(\"/a/file1.txt\", #write)")?;
//!
//! // the second authorizer requested a read operation
//! assert!(v2.authorize().is_err());
//!
//! let mut v3 = biscuit2.authorizer()?;
//! v3.add_fact("resource(\"/a/file2.txt\")")?;
//! v3.add_fact("operation(\"read\")")?;
//! v3.add_check("check if right(\"/a/file2.txt\", #read)")?;
//!
//! // the third authorizer requests /a/file2.txt
//! assert!(v3.authorize().is_err());
//!
//! Ok(())
//! }
//! ```
//!
//! # Concepts
//!
//! ## blocks
//!
//! A Biscuit token is made with a list of blocks defining data and checks that
//! must be validated upon reception with a request. Any failed check will invalidate
//! the entire token.
//!
//! If you hold a valid token, it is possible to add a new block to restrict further
//! the token, like limiting access to one particular resource, or adding a short
//! expiration date. This will generate a new, valid token. This can be done offline,
//! without asking the original token creator.
//!
//! On the other hand, if a block is modified or removed, the token will fail the
//! cryptographic signature verification.
//!
//! ## Cryptography
//!
//! Biscuit tokens get inspiration from macaroons and JSON Web Tokens, reproducing
//! useful features from both:
//!
//! - offline delegation like macaroons
//! - based on public key cryptography like JWT, so any application holding the root public key can verify a token (while macaroons are based on a root shared secret)
//!
//! ## A logic language for authorization policies: Datalog with constraints
//!
//! We rely on a modified version of Datalog, that can represent complex behaviours
//! in a compact form, and add flexible constraints on data.
//!
//! Here are examples of checks that can be implemented with that language:
//!
//! - valid if the requested resource is "file.txt" and the operation is "read"
//! - valid if current time is before January 1st 2030, 00h00mn00s UTC
//! - source IP is in set [1.2.3.4, 5.6.7.8]
//! - resource matches prefix "/home/biscuit/data/"
//!
//! But it can also combine into more complex patterns, like: right is read *if*
//! user has read *or* user is member of organisation and organisation has read right
//! *or* other user with read right has delegated to user.
//!
//! Like Datalog, this language is based around facts and rules, but with some
//! slight modifications: a block's rules and checks can only apply to facts
//! from the current or previous blocks. The authorizer executes its checks and
//! policies in the context of the first block. This allows Biscuit to carry
//! basic rights in the first block while preventing later blocks from
//! inreasing the token's rights.
//!
//! ### Checks
//!
//! A check requires the presence of one or more facts, and can have additional
//! constraints on these facts (the constraints are implemented separately to simplify
//! the language implementation: among other things, it avoids implementing negation).
//! It is possible to create rules like these ones:
//!
//! - `check if resource("file1")`
//! - `check if resource($0), owner("user1", $0)` the $0 represents a "hole" that must be filled with the correct value
//! - `check if time($0), $0 < 2019-02-05T23:00:00Z` expiration date
//! - `check if application($0), operation($1), user($2), right(#app, $0, $1), owner($2, $0), credit($2, $3), $3 > 0` verifies that the user owns the applications, the application has the right on the operation, there's a credit information for the operation, and the credit is larger than 0
//!
//! ### Allow/deny policies
//!
//! On the verification side, we can define *allow/deny policies*, which are tested
//! after all checks passed, one by one in order until one of them matches.
//!
//! * if an *allow* matches, verification succeeds
//! * if a *deny* matches, verification fails
//! * if there's no *allow* or *deny*, verification fails
//!
//! They can be written as follows:
//!
//! ```ignore
//! // verify that we have the right for this request
//! allow if
//! resource($res),
//! operation($op),
//! right($res, $op);
//!
//! deny if true;
//! ```
//!
//! ## Symbols and symbol tables
//!
//! To reduce the size of tokens, the language supports a data type called "symbol".
//! A symbol is a string that we can refer to with a number, an index in the symbol
//! table that is carried with the token. Symbols can be checked for equality, or
//! presence in a set, but lack the other constraints on strings like prefix or suffix
//! matching.
//!
//! They can be used for pretty printing of a fact or rule. As an example, with a table
//! containing `["resource", "operation", "read", "rule1"]`, we could have the following rule:
//! `#4() <- #0("file.txt"), #1(#2)` that would be printed as `rule1() <- resource("file.txt"), operation(#read)`
//!
//! biscuit implementations come with a default symbol table to avoid transmitting
//! frequent values with every token.
mod crypto;
pub mod datalog;
pub mod error;
pub mod format;
pub mod parser;
mod token;
pub use crypto::{KeyPair, PrivateKey, PublicKey};
pub use token::authorizer::{Authorizer, AuthorizerLimits};
pub use token::builder;
pub use token::unverified::UnverifiedBiscuit;
pub use token::Biscuit;
#[cfg(cargo_c)]
mod capi;
#[cfg(cargo_c)]
pub use capi::*;
mod time;
