raw draft of policy-manager
This commit is contained in:
31
Dockerfile
Normal file
31
Dockerfile
Normal file
@@ -0,0 +1,31 @@
|
||||
# ---- Build Stage ----
|
||||
FROM golang:latest AS builder
|
||||
|
||||
WORKDIR /app
|
||||
|
||||
# Copy go mod files first (better caching)
|
||||
COPY go.mod ./
|
||||
RUN go mod download
|
||||
|
||||
# Copy source code
|
||||
COPY . .
|
||||
|
||||
# Build static binary
|
||||
RUN CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -o server
|
||||
|
||||
# ---- Runtime Stage ----
|
||||
FROM gcr.io/distroless/base-debian12
|
||||
|
||||
WORKDIR /app
|
||||
|
||||
# Copy only the binary from builder
|
||||
COPY --from=builder /app/server .
|
||||
|
||||
# Expose port
|
||||
EXPOSE 8080
|
||||
|
||||
# Run as non-root user
|
||||
USER nonroot:nonroot
|
||||
|
||||
ENTRYPOINT ["/app/server"]
|
||||
|
||||
113
createpolicy.go
Normal file
113
createpolicy.go
Normal file
@@ -0,0 +1,113 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io"
|
||||
"log"
|
||||
"net/http"
|
||||
"time"
|
||||
)
|
||||
|
||||
type CreatePolicyRequest struct {
|
||||
PolicyName string `json:"policyname"`
|
||||
PolicyDocument Policy `json:"policy"`
|
||||
}
|
||||
|
||||
func CreatePolicy(w http.ResponseWriter, r *http.Request) {
|
||||
// Only allow POST method
|
||||
if r.Method != http.MethodPost {
|
||||
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
||||
return
|
||||
}
|
||||
|
||||
// XXX Temporary Account Handler
|
||||
accountid := r.Header.Get("Account")
|
||||
if accountid == "" {
|
||||
http.Error(w, "Account header is required", http.StatusUnauthorized)
|
||||
return
|
||||
}
|
||||
|
||||
// Optional: enforce content type
|
||||
if r.Header.Get("Content-Type") != "application/json" {
|
||||
http.Error(w, "Content-Type must be application/json", http.StatusUnsupportedMediaType)
|
||||
return
|
||||
}
|
||||
|
||||
// Read body with size limit (protect against huge requests)
|
||||
const maxBodyBytes = 1 << 20 // 1 MB
|
||||
r.Body = http.MaxBytesReader(w, r.Body, maxBodyBytes)
|
||||
|
||||
// Decode JSON into our struct
|
||||
var policydocumentrequest CreatePolicyRequest
|
||||
decoder := json.NewDecoder(r.Body)
|
||||
decoder.DisallowUnknownFields() // strict mode - reject unknown fields
|
||||
|
||||
if err := decoder.Decode(&policydocumentrequest); err != nil {
|
||||
switch {
|
||||
case err == io.EOF:
|
||||
http.Error(w, "Empty request body", http.StatusBadRequest)
|
||||
case err.Error() == "http: request body too large":
|
||||
http.Error(w, "Request body too large (max 1MB)", http.StatusRequestEntityTooLarge)
|
||||
default:
|
||||
http.Error(w, fmt.Sprintf("Invalid JSON: %v", err), http.StatusBadRequest)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// Optional: basic validation
|
||||
if policydocumentrequest.PolicyDocument.Actions == nil || policydocumentrequest.PolicyDocument.Effect == "" || policydocumentrequest.PolicyDocument.Resources == nil {
|
||||
http.Error(w, "Missing required fields: id and title", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
|
||||
// Process the results
|
||||
log.Printf("New Policy: Account:%s, PolicyIdentifier=%s, Actions=%q, Effect=%q, Resources=%q, Comment=%q",
|
||||
accountid, policydocumentrequest.PolicyDocument.PolicyIdentifier, policydocumentrequest.PolicyDocument.Actions,
|
||||
policydocumentrequest.PolicyDocument.Effect, policydocumentrequest.PolicyDocument.Resources, policydocumentrequest.PolicyDocument.Comment)
|
||||
|
||||
// Check if policy with the same name already exists for the account
|
||||
checkExisting := pool.QueryRow(context.Background(),
|
||||
"SELECT FROM policies WHERE accountid = $1 AND policyname = $2",
|
||||
accountid, policydocumentrequest.PolicyName)
|
||||
err := checkExisting.Scan()
|
||||
if err == nil {
|
||||
pri := "pri:iam::" + accountid + ":policy/" + policydocumentrequest.PolicyName
|
||||
response := map[string]interface{}{
|
||||
"status": "fail",
|
||||
"pri": pri,
|
||||
"message": "Policy " + policydocumentrequest.PolicyName + " already exists: " + pri,
|
||||
"timestamp": fmt.Sprintf("%d", time.Now().Unix()),
|
||||
}
|
||||
|
||||
json.NewEncoder(w).Encode(response)
|
||||
http.Error(w, "Policy with the same name already exists for this account", http.StatusConflict)
|
||||
return
|
||||
}
|
||||
|
||||
_, err = pool.Exec(context.Background(),
|
||||
"INSERT INTO policies (accountid, policyname, document) VALUES($1, $2, $3) ON CONFLICT DO NOTHING",
|
||||
accountid, policydocumentrequest.PolicyName, policydocumentrequest.PolicyDocument)
|
||||
if err != nil {
|
||||
log.Printf("Error inserting policy: %v", err)
|
||||
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
// Success response
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusCreated)
|
||||
|
||||
// arnservice:region:account-id:resource-type:resource-id
|
||||
pri := "pri:iam::" + accountid + ":policy/" + policydocumentrequest.PolicyName
|
||||
|
||||
response := map[string]interface{}{
|
||||
"status": "success",
|
||||
"pri": pri,
|
||||
"message": "Policy created",
|
||||
"timestamp": fmt.Sprintf("%d", time.Now().Unix()),
|
||||
}
|
||||
|
||||
json.NewEncoder(w).Encode(response)
|
||||
}
|
||||
38
db.go
Normal file
38
db.go
Normal file
@@ -0,0 +1,38 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"log"
|
||||
"os"
|
||||
|
||||
"github.com/jackc/pgx/v5/pgxpool"
|
||||
)
|
||||
|
||||
var pool *pgxpool.Pool
|
||||
|
||||
func getDbPool() *pgxpool.Pool {
|
||||
// Construct the connection string
|
||||
// Note: Ensure your Docker Compose env vars match these keys!
|
||||
dburl := fmt.Sprintf("postgres://%s:%s@%s/%s?sslmode=disable",
|
||||
os.Getenv("POSTGRES_USER"),
|
||||
os.Getenv("POSTGRES_PASSWORD"),
|
||||
os.Getenv("POSTGRES_HOSTNAME"),
|
||||
os.Getenv("POSTGRES_DB"),
|
||||
)
|
||||
|
||||
var err error
|
||||
// Use pgxpool.New instead of Connect for v5
|
||||
pool, err = pgxpool.New(context.Background(), dburl)
|
||||
if err != nil {
|
||||
log.Fatalf("Unable to create connection pool: %v", err)
|
||||
}
|
||||
|
||||
// Ping the database to verify the connection is actually live
|
||||
err = pool.Ping(context.Background())
|
||||
if err != nil {
|
||||
log.Fatalf("Unable to ping database: %v", err)
|
||||
}
|
||||
|
||||
return pool
|
||||
}
|
||||
13
go.mod
Normal file
13
go.mod
Normal file
@@ -0,0 +1,13 @@
|
||||
module policy-manager
|
||||
|
||||
go 1.25.0
|
||||
|
||||
require github.com/jackc/pgx/v5 v5.8.0
|
||||
|
||||
require (
|
||||
github.com/jackc/pgpassfile v1.0.0 // indirect
|
||||
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 // indirect
|
||||
github.com/jackc/puddle/v2 v2.2.2 // indirect
|
||||
golang.org/x/sync v0.17.0 // indirect
|
||||
golang.org/x/text v0.29.0 // indirect
|
||||
)
|
||||
26
go.sum
Normal file
26
go.sum
Normal file
@@ -0,0 +1,26 @@
|
||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=
|
||||
github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=
|
||||
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=
|
||||
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761/go.mod h1:5TJZWKEWniPve33vlWYSoGYefn3gLQRzjfDlhSJ9ZKM=
|
||||
github.com/jackc/pgx/v5 v5.8.0 h1:TYPDoleBBme0xGSAX3/+NujXXtpZn9HBONkQC7IEZSo=
|
||||
github.com/jackc/pgx/v5 v5.8.0/go.mod h1:QVeDInX2m9VyzvNeiCJVjCkNFqzsNb43204HshNSZKw=
|
||||
github.com/jackc/puddle/v2 v2.2.2 h1:PR8nw+E/1w0GLuRFSmiioY6UooMp6KJv0/61nB7icHo=
|
||||
github.com/jackc/puddle/v2 v2.2.2/go.mod h1:vriiEXHvEE654aYKXXjOvZM39qJ0q+azkZFrfEOc3H4=
|
||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
|
||||
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
|
||||
golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
|
||||
golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
||||
golang.org/x/text v0.29.0 h1:1neNs90w9YzJ9BocxfsQNHKuAT4pkghyXc4nhZ6sJvk=
|
||||
golang.org/x/text v0.29.0/go.mod h1:7MhJOA9CD2qZyOKYazxdYMF85OwPdEr9jTtBpO7ydH4=
|
||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||
71
listpolicy.go
Normal file
71
listpolicy.go
Normal file
@@ -0,0 +1,71 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"net/http"
|
||||
"time"
|
||||
)
|
||||
|
||||
type PolicyList struct {
|
||||
Status string `json:"status"`
|
||||
Policies map[string]Policy `json:"policies"`
|
||||
Count int `json:"count"`
|
||||
Timestamp string `json:"timestamp"`
|
||||
}
|
||||
|
||||
func ListPolicy(w http.ResponseWriter, r *http.Request) {
|
||||
// Only allow POST method
|
||||
if r.Method != http.MethodPost {
|
||||
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
||||
return
|
||||
}
|
||||
|
||||
// XXX Temporary Account Handler
|
||||
accountid := r.Header.Get("Account")
|
||||
if accountid == "" {
|
||||
http.Error(w, "Account header is required", http.StatusUnauthorized)
|
||||
return
|
||||
}
|
||||
|
||||
// Optional: enforce content type
|
||||
if r.Header.Get("Content-Type") != "application/json" {
|
||||
http.Error(w, "Content-Type must be application/json", http.StatusUnsupportedMediaType)
|
||||
return
|
||||
}
|
||||
|
||||
// Read body with size limit (protect against huge requests)
|
||||
const maxBodyBytes = 1 << 20 // 1 MB
|
||||
r.Body = http.MaxBytesReader(w, r.Body, maxBodyBytes)
|
||||
|
||||
// Check if policy with the same name already exists for the account
|
||||
rows, err := pool.Query(context.Background(),
|
||||
"SELECT policyname, document FROM policies WHERE accountid = $1", accountid)
|
||||
if err != nil {
|
||||
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
defer rows.Close()
|
||||
|
||||
var policylist PolicyList
|
||||
policylist.Policies = make(map[string]Policy)
|
||||
|
||||
for rows.Next() {
|
||||
var policyname string
|
||||
var document Policy
|
||||
err = rows.Scan(&policyname, &document)
|
||||
if err != nil {
|
||||
http.Error(w, "Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
policylist.Count = policylist.Count + 1
|
||||
policylist.Policies["pri:iam::"+accountid+":policy/"+policyname] = document
|
||||
}
|
||||
|
||||
policylist.Status = "success"
|
||||
policylist.Timestamp = fmt.Sprintf("%d", time.Now().Unix())
|
||||
|
||||
json.NewEncoder(w).Encode(policylist)
|
||||
}
|
||||
27
main.go
Normal file
27
main.go
Normal file
@@ -0,0 +1,27 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"log"
|
||||
"net/http"
|
||||
)
|
||||
|
||||
// Document represents the expected JSON structure
|
||||
// You can modify this struct to match your actual data needs
|
||||
type Policy struct {
|
||||
PolicyIdentifier string `json:"pid"`
|
||||
Comment string `json:"comment"`
|
||||
Effect string `json:"effect"`
|
||||
Actions []string `json:"actions"`
|
||||
Resources []string `json:"resources"`
|
||||
}
|
||||
|
||||
func main() {
|
||||
|
||||
pool = getDbPool()
|
||||
log.Println("Policy Manager service started")
|
||||
|
||||
http.HandleFunc("/iam/create-policy", CreatePolicy)
|
||||
http.HandleFunc("/iam/list-policy", ListPolicy)
|
||||
log.Println("Server running on :8080")
|
||||
log.Fatal(http.ListenAndServe(":8080", nil))
|
||||
}
|
||||
34
notes.md
Normal file
34
notes.md
Normal file
@@ -0,0 +1,34 @@
|
||||
## Create Policy
|
||||
|
||||
```
|
||||
curl -X POST \
|
||||
-H "Content-Type: application/json" \
|
||||
-H "Account: 8715694634136" \
|
||||
-d '{
|
||||
"policyname": "MyReadOnlyPolicy",
|
||||
"policy": {
|
||||
"pid": "p-12345678",
|
||||
"comment": "Allows read-only access to S3 buckets",
|
||||
"effect": "Allow",
|
||||
"actions": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation"
|
||||
],
|
||||
"resources": [
|
||||
"arn:aws:s3:::my-company-data/*",
|
||||
"arn:aws:s3:::my-company-data"
|
||||
]
|
||||
}
|
||||
}' \
|
||||
http://localhost:8080/iam/create-policy
|
||||
```
|
||||
|
||||
## List Policies
|
||||
|
||||
```
|
||||
curl -X POST \
|
||||
-H "Content-Type: application/json" \
|
||||
-H "Account: 8715694634136" \
|
||||
http://localhost:8080/iam/list-policy
|
||||
```
|
||||
Reference in New Issue
Block a user