simple_auth_flow/simple_auth_flow.rs
1//! Simple Authorization Flow Example
2//!
3//! This example demonstrates the core authorization workflow in p47h:
4//!
5//! 1. Create a cryptographic identity (Ed25519 keypair)
6//! 2. Define a policy with multiple rules
7//! 3. Use the PolicyAuthorizer to evaluate access requests
8//!
9//! Run with: cargo run --example simple_auth_flow
10
11use core_identity::Identity;
12use core_policy::{Action, Policy, PolicyAuthorizer, PolicyRule, Resource};
13
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}