pub struct Policy { /* private fields */ }Expand description
A policy containing multiple rules
§Security
Fields are private to enforce validation through deserialization.
Use Policy::new() or deserialize from TOML/JSON to create instances.
The #[serde(try_from)] attribute ensures all deserialized policies
are validated against T20 limits (max rules, max name length, etc.).
Implementations§
Source§impl Policy
impl Policy
Sourcepub fn name(&self) -> &str
pub fn name(&self) -> &str
Get the policy name
Examples found in repository?
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}Sourcepub const fn valid_until(&self) -> u64
pub const fn valid_until(&self) -> u64
Get the expiration timestamp
Examples found in repository?
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}Sourcepub fn rules(&self) -> &[PolicyRule]
pub fn rules(&self) -> &[PolicyRule]
Get a reference to the policy rules
Examples found in repository?
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}Sourcepub fn new(
name: impl Into<String>,
valid_duration_secs: u64,
current_time: u64,
) -> Result<Policy, PolicyError>
pub fn new( name: impl Into<String>, valid_duration_secs: u64, current_time: u64, ) -> Result<Policy, PolicyError>
Create a new empty policy with version 1
§Arguments
name- Policy identifiervalid_duration_secs- How long this policy is valid (in seconds)current_time- Current Unix timestamp (injected for purity/determinism)
§Errors
Returns PolicyError::NameTooLong if name exceeds MAX_POLICY_NAME_LENGTH
Examples found in repository?
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}Sourcepub fn new_unversioned(name: impl Into<String>) -> Result<Policy, PolicyError>
pub fn new_unversioned(name: impl Into<String>) -> Result<Policy, PolicyError>
Create a policy without timestamps (for testing/legacy)
§Errors
Returns PolicyError::NameTooLong if name exceeds MAX_POLICY_NAME_LENGTH
Sourcepub fn add_rule(self, rule: PolicyRule) -> Result<Policy, PolicyError>
pub fn add_rule(self, rule: PolicyRule) -> Result<Policy, PolicyError>
Add a rule to this policy
§Errors
Returns PolicyError::TooManyRules if adding this rule would exceed MAX_RULES_PER_POLICY
Examples found in repository?
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15 println!("p47h Open Core - Simple Authorization Flow");
16 println!("-------------------------------------------");
17 println!();
18
19 // -------------------------------------------------------------------------
20 // Step 1: Create Identities
21 // -------------------------------------------------------------------------
22 // Each user or device in the network has a unique cryptographic identity.
23 // The identity is an Ed25519 keypair. We use the public key hash as the
24 // peer identifier for policy rules.
25
26 let mut rng = rand::thread_rng();
27
28 let alice = Identity::generate(&mut rng)?;
29 let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31 let bob = Identity::generate(&mut rng)?;
32 let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34 println!("Created identities:");
35 println!(" Alice: {}", alice_id);
36 println!(" Bob: {}", bob_id);
37 println!();
38
39 // -------------------------------------------------------------------------
40 // Step 2: Define a Policy
41 // -------------------------------------------------------------------------
42 // A policy is a collection of rules that define who can do what on which
43 // resources. Each rule specifies:
44 // - peer_id: The identity this rule applies to
45 // - action: What operation is allowed (Read, Write, Execute, Delete, All)
46 // - resource: What resource pattern this applies to (supports wildcards)
47
48 // Policy parameters:
49 // - name: Human-readable identifier
50 // - valid_duration: How long the policy is valid (in seconds)
51 // - current_time: Unix timestamp when the policy was created
52 let current_time = 1700000000; // Fixed timestamp for reproducibility
53 let valid_duration = 86400; // 24 hours
54
55 let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56 // Rule 1: Alice can read any file under /data/
57 .add_rule(PolicyRule::new(
58 alice_id.clone(),
59 Action::Read,
60 Resource::File("/data/*".into()),
61 ))?
62 // Rule 2: Alice can write to her personal directory
63 .add_rule(PolicyRule::new(
64 alice_id.clone(),
65 Action::Write,
66 Resource::File("/home/alice/*".into()),
67 ))?
68 // Rule 3: Bob has full access to the /shared/ directory
69 .add_rule(PolicyRule::new(
70 bob_id.clone(),
71 Action::All,
72 Resource::File("/shared/*".into()),
73 ))?;
74
75 println!("Created policy: {}", policy.name());
76 println!(" Rules: {}", policy.rules().len());
77 println!(" Valid until: {} (Unix timestamp)", policy.valid_until());
78 println!();
79
80 // -------------------------------------------------------------------------
81 // Step 3: Evaluate Access Requests
82 // -------------------------------------------------------------------------
83 // The PolicyAuthorizer evaluates whether a specific peer can perform a
84 // specific action on a specific resource. It checks all rules and returns
85 // true if at least one rule allows the access.
86
87 let authorizer = PolicyAuthorizer::new(policy.rules());
88
89 // Define test cases: (peer, action, resource, expected_result)
90 let test_cases = [
91 // Alice reading from /data/ - should be ALLOWED (Rule 1)
92 (&alice_id, Action::Read, "/data/report.txt", true),
93 // Alice writing to /data/ - should be DENIED (no rule allows this)
94 (&alice_id, Action::Write, "/data/report.txt", false),
95 // Alice writing to her home - should be ALLOWED (Rule 2)
96 (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97 // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98 (&bob_id, Action::Read, "/data/report.txt", false),
99 // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100 (&bob_id, Action::Write, "/shared/document.pdf", true),
101 // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102 (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103 // Unknown user - should be DENIED (no rules match)
104 (
105 &"unknown-user".to_string(),
106 Action::Read,
107 "/data/file.txt",
108 false,
109 ),
110 ];
111
112 println!("Evaluating access requests:");
113 println!();
114
115 for (peer_id, action, resource_path, expected) in test_cases {
116 let resource = Resource::File(resource_path.into());
117 let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119 // Verify our expectations match the actual result
120 let status = if allowed { "ALLOWED" } else { "DENIED" };
121 let check = if allowed == expected {
122 "OK"
123 } else {
124 "MISMATCH"
125 };
126
127 println!(
128 " {} {:?} {} -> {} [{}]",
129 peer_id, action, resource_path, status, check
130 );
131 }
132
133 println!();
134 println!("-------------------------------------------");
135 println!("Authorization flow completed successfully.");
136
137 Ok(())
138}Sourcepub fn with_metadata(
self,
key: impl Into<String>,
value: impl Into<String>,
) -> Policy
pub fn with_metadata( self, key: impl Into<String>, value: impl Into<String>, ) -> Policy
Add metadata to this policy
Sourcepub fn is_allowed(
&self,
peer_id: &str,
action: &Action,
resource: &Resource,
) -> bool
pub fn is_allowed( &self, peer_id: &str, action: &Action, resource: &Resource, ) -> bool
Check if a peer is allowed to perform an action on a resource
This method delegates to PolicyAuthorizer (SRP - Single Responsibility Principle).
The Policy struct focuses on construction and management, while authorization
logic is handled by the dedicated PolicyAuthorizer.
Sourcepub fn validate(&self) -> Result<(), PolicyError>
pub fn validate(&self) -> Result<(), PolicyError>
Validate policy (check for conflicts, invalid rules, etc.)
§Errors
Returns PolicyError::InvalidRule if:
- Policy name is empty
- Policy has no rules
- Any rule has an empty peer ID
Trait Implementations§
Source§impl<'de> Deserialize<'de> for Policy
impl<'de> Deserialize<'de> for Policy
Source§fn deserialize<__D>(
__deserializer: __D,
) -> Result<Policy, <__D as Deserializer<'de>>::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(
__deserializer: __D,
) -> Result<Policy, <__D as Deserializer<'de>>::Error>where
__D: Deserializer<'de>,
Source§impl Serialize for Policy
impl Serialize for Policy
Source§fn serialize<__S>(
&self,
__serializer: __S,
) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>where
__S: Serializer,
fn serialize<__S>(
&self,
__serializer: __S,
) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>where
__S: Serializer,
Source§impl TryFrom<PolicyRaw> for Policy
Convert PolicyRaw to Policy with validation
impl TryFrom<PolicyRaw> for Policy
Convert PolicyRaw to Policy with validation
This is called automatically during deserialization due to the
#[serde(try_from = "PolicyRaw")] attribute on Policy.
§Errors
Returns PolicyError if validation fails:
TooManyRules: More thanMAX_RULES_PER_POLICYrulesNameTooLong: Policy name exceedsMAX_POLICY_NAME_LENGTHInvalidRule: Other validation failures (empty name, no rules, etc.)