simple_auth_flow/
simple_auth_flow.rs

1//! Simple Authorization Flow Example
2//!
3//! This example demonstrates the core authorization workflow in p47h:
4//!
5//! 1. Create a cryptographic identity (Ed25519 keypair)
6//! 2. Define a policy with multiple rules
7//! 3. Use the PolicyAuthorizer to evaluate access requests
8//!
9//! Run with: cargo run --example simple_auth_flow
10
11use core_identity::Identity;
12use core_policy::{Action, Policy, PolicyAuthorizer, PolicyRule, Resource};
13
14fn main() -> Result<(), Box<dyn std::error::Error>> {
15    println!("p47h Open Core - Simple Authorization Flow");
16    println!("-------------------------------------------");
17    println!();
18
19    // -------------------------------------------------------------------------
20    // Step 1: Create Identities
21    // -------------------------------------------------------------------------
22    // Each user or device in the network has a unique cryptographic identity.
23    // The identity is an Ed25519 keypair. We use the public key hash as the
24    // peer identifier for policy rules.
25
26    let mut rng = rand::thread_rng();
27
28    let alice = Identity::generate(&mut rng)?;
29    let alice_id = format!("alice-{}", hex::encode(&alice.public_key_hash()[..4]));
30
31    let bob = Identity::generate(&mut rng)?;
32    let bob_id = format!("bob-{}", hex::encode(&bob.public_key_hash()[..4]));
33
34    println!("Created identities:");
35    println!("  Alice: {}", alice_id);
36    println!("  Bob:   {}", bob_id);
37    println!();
38
39    // -------------------------------------------------------------------------
40    // Step 2: Define a Policy
41    // -------------------------------------------------------------------------
42    // A policy is a collection of rules that define who can do what on which
43    // resources. Each rule specifies:
44    //   - peer_id: The identity this rule applies to
45    //   - action: What operation is allowed (Read, Write, Execute, Delete, All)
46    //   - resource: What resource pattern this applies to (supports wildcards)
47
48    // Policy parameters:
49    //   - name: Human-readable identifier
50    //   - valid_duration: How long the policy is valid (in seconds)
51    //   - current_time: Unix timestamp when the policy was created
52    let current_time = 1700000000; // Fixed timestamp for reproducibility
53    let valid_duration = 86400; // 24 hours
54
55    let policy = Policy::new("file-access-policy", valid_duration, current_time)?
56        // Rule 1: Alice can read any file under /data/
57        .add_rule(PolicyRule::new(
58            alice_id.clone(),
59            Action::Read,
60            Resource::File("/data/*".into()),
61        ))?
62        // Rule 2: Alice can write to her personal directory
63        .add_rule(PolicyRule::new(
64            alice_id.clone(),
65            Action::Write,
66            Resource::File("/home/alice/*".into()),
67        ))?
68        // Rule 3: Bob has full access to the /shared/ directory
69        .add_rule(PolicyRule::new(
70            bob_id.clone(),
71            Action::All,
72            Resource::File("/shared/*".into()),
73        ))?;
74
75    println!("Created policy: {}", policy.name());
76    println!("  Rules: {}", policy.rules().len());
77    println!("  Valid until: {} (Unix timestamp)", policy.valid_until());
78    println!();
79
80    // -------------------------------------------------------------------------
81    // Step 3: Evaluate Access Requests
82    // -------------------------------------------------------------------------
83    // The PolicyAuthorizer evaluates whether a specific peer can perform a
84    // specific action on a specific resource. It checks all rules and returns
85    // true if at least one rule allows the access.
86
87    let authorizer = PolicyAuthorizer::new(policy.rules());
88
89    // Define test cases: (peer, action, resource, expected_result)
90    let test_cases = [
91        // Alice reading from /data/ - should be ALLOWED (Rule 1)
92        (&alice_id, Action::Read, "/data/report.txt", true),
93        // Alice writing to /data/ - should be DENIED (no rule allows this)
94        (&alice_id, Action::Write, "/data/report.txt", false),
95        // Alice writing to her home - should be ALLOWED (Rule 2)
96        (&alice_id, Action::Write, "/home/alice/notes.txt", true),
97        // Bob reading from /data/ - should be DENIED (no rule for Bob on /data/)
98        (&bob_id, Action::Read, "/data/report.txt", false),
99        // Bob writing to /shared/ - should be ALLOWED (Rule 3, Action::All)
100        (&bob_id, Action::Write, "/shared/document.pdf", true),
101        // Bob deleting from /shared/ - should be ALLOWED (Rule 3, Action::All)
102        (&bob_id, Action::Delete, "/shared/old-file.txt", true),
103        // Unknown user - should be DENIED (no rules match)
104        (
105            &"unknown-user".to_string(),
106            Action::Read,
107            "/data/file.txt",
108            false,
109        ),
110    ];
111
112    println!("Evaluating access requests:");
113    println!();
114
115    for (peer_id, action, resource_path, expected) in test_cases {
116        let resource = Resource::File(resource_path.into());
117        let allowed = authorizer.is_allowed(peer_id, &action, &resource);
118
119        // Verify our expectations match the actual result
120        let status = if allowed { "ALLOWED" } else { "DENIED" };
121        let check = if allowed == expected {
122            "OK"
123        } else {
124            "MISMATCH"
125        };
126
127        println!(
128            "  {} {:?} {} -> {} [{}]",
129            peer_id, action, resource_path, status, check
130        );
131    }
132
133    println!();
134    println!("-------------------------------------------");
135    println!("Authorization flow completed successfully.");
136
137    Ok(())
138}