blob: 34919559d76e1f3b3ee0440e2df5ee591af2fe6b [file] [log] [blame]
Alexander Afanasyeve96538a2018-06-13 20:32:53 -04001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesaventod51d9602019-07-20 23:33:06 -04002/*
3 * Copyright (c) 2014-2019, Regents of the University of California
Alexander Afanasyeve96538a2018-06-13 20:32:53 -04004 *
5 * NAC library is free software: you can redistribute it and/or modify it under the
6 * terms of the GNU Lesser General Public License as published by the Free Software
7 * Foundation, either version 3 of the License, or (at your option) any later version.
8 *
9 * NAC library is distributed in the hope that it will be useful, but WITHOUT ANY
10 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
11 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
12 *
13 * You should have received copies of the GNU General Public License and GNU Lesser
14 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
15 * <http://www.gnu.org/licenses/>.
16 *
17 * See AUTHORS.md for complete list of NAC library authors and contributors.
18 */
19
20#ifndef NDN_NAC_ACCESS_MANAGER_HPP
21#define NDN_NAC_ACCESS_MANAGER_HPP
22
23#include "common.hpp"
24
25#include <ndn-cxx/face.hpp>
26
27namespace ndn {
28namespace nac {
29
30/**
31 * @brief Access Manager
32 *
33 * Access Manager controls decryption policy by publishing granular per-namespace access
34 * policies in the form of key encryption (KEK, plaintext public) and key decryption (KDK,
Alexander Afanasyev1a21e102018-06-13 20:33:21 -040035 * encrypted private key) key pair.
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040036 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -040037 * @todo Rolling KEK
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040038 */
39class AccessManager
40{
41public:
42 class Error : public std::runtime_error
43 {
44 public:
45 using std::runtime_error::runtime_error;
46 };
47
48public:
49 /**
50 * @param identity Identity of the namespace (i.e., public and private keys)
51 *
52 * @param identity Data owner's namespace identity (will be used to sign KEK and KDK)
53 * @param dataset Name of dataset that this manager is controlling
54 * @param keyChain KeyChain
55 * @param face Face that will be used to publish KEK and KDKs
56 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -040057 * KEK and KDK naming:
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040058 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -040059 * [identity]/NAC/[dataset]/KEK /[key-id] (== KEK, public key)
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040060 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -040061 * [identity]/NAC/[dataset]/KDK/[key-id] /ENCRYPTED-BY/[user]/KEY/[key-id] (== KDK, encrypted private key)
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040062 *
63 * \_____________ ______________/
64 * \/
65 * registered with NFD
66 *
67 * AccessManager serves NAC public key for data producers to fetch and encrypted versions of
68 * private keys (as safe bags) for authorized consumers to fetch.
69 */
70 AccessManager(const Identity& identity, const Name& dataset,
71 KeyChain& keyChain, Face& face);
72
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040073 /**
74 * @brief Authorize a member identified by its certificate @p memberCert to decrypt data
75 * under the policy
Alexander Afanasyev2b57aeb2018-06-15 18:32:28 -040076 * @return published KDK
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040077 */
Alexander Afanasyev2b57aeb2018-06-15 18:32:28 -040078 Data
Alexander Afanasyeve96538a2018-06-13 20:32:53 -040079 addMember(const Certificate& memberCert);
80
81 // void
82 // addMemberWithKey(const Name& keyName);
83
84 // void
85 // addMemberWithIdentity(const Name& identityName);
86
87 /**
88 * @brief Remove member with name @p identity from the group
89 */
90 void
91 removeMember(const Name& identity);
92
93public: // accessor interface for published data packets
94
95 /** @return{ number of packets stored in in-memory storage }
96 */
97 size_t
98 size() const
99 {
100 return m_ims.size();
101 }
102
Alexander Afanasyev1a21e102018-06-13 20:33:21 -0400103 /** @brief Returns begin iterator of the in-memory storage ordered by
Alexander Afanasyeve96538a2018-06-13 20:32:53 -0400104 * name with digest
105 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -0400106 * @return{ const_iterator pointing to the beginning of m_cache }
Alexander Afanasyeve96538a2018-06-13 20:32:53 -0400107 */
108 InMemoryStorage::const_iterator
109 begin() const
110 {
111 return m_ims.begin();
112 }
113
Alexander Afanasyev1a21e102018-06-13 20:33:21 -0400114 /** @brief Returns end iterator of the in-memory storage ordered by
Alexander Afanasyeve96538a2018-06-13 20:32:53 -0400115 * name with digest
116 *
Alexander Afanasyev1a21e102018-06-13 20:33:21 -0400117 * @return{ const_iterator pointing to the end of m_cache }
Alexander Afanasyeve96538a2018-06-13 20:32:53 -0400118 */
119 InMemoryStorage::const_iterator
120 end() const
121 {
122 return m_ims.end();
123 }
124
125private:
126 Identity m_identity;
127 Key m_nacKey;
128 KeyChain& m_keyChain;
129 Face& m_face;
130
Alexander Afanasyev1a21e102018-06-13 20:33:21 -0400131 InMemoryStoragePersistent m_ims; // for KEK and KDKs
Davide Pesaventod51d9602019-07-20 23:33:06 -0400132 ScopedRegisteredPrefixHandle m_kekReg;
133 ScopedRegisteredPrefixHandle m_kdkReg;
Alexander Afanasyeve96538a2018-06-13 20:32:53 -0400134};
135
136} // namespace nac
137} // namespace ndn
138
139#endif // NDN_NAC_ACCESS_MANAGER_HPP