summaryrefslogtreecommitdiff
path: root/src/mongo/db/security.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/mongo/db/security.h')
-rwxr-xr-xsrc/mongo/db/security.h113
1 files changed, 113 insertions, 0 deletions
diff --git a/src/mongo/db/security.h b/src/mongo/db/security.h
new file mode 100755
index 00000000000..f193f305def
--- /dev/null
+++ b/src/mongo/db/security.h
@@ -0,0 +1,113 @@
+// security.h
+
+/**
+* Copyright (C) 2009 10gen Inc.
+*
+* This program is free software: you can redistribute it and/or modify
+* it under the terms of the GNU Affero General Public License, version 3,
+* as published by the Free Software Foundation.
+*
+* This program is distributed in the hope that it will be useful,
+* but WITHOUT ANY WARRANTY; without even the implied warranty of
+* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+* GNU Affero General Public License for more details.
+*
+* You should have received a copy of the GNU Affero General Public License
+* along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#pragma once
+
+#include "nonce.h"
+#include "concurrency.h"
+#include "security_common.h"
+#include "../util/concurrency/spin_lock.h"
+
+// this is used by both mongos and mongod
+
+namespace mongo {
+
+ /*
+ * for a particular db
+ * levels
+ * 0 : none
+ * 1 : read
+ * 2 : write
+ */
+ struct Auth {
+
+ enum Level { NONE = 0 , READ = 1 , WRITE = 2 };
+
+ Auth() { level = NONE; }
+ Level level;
+ string user;
+ };
+
+ class AuthenticationInfo : boost::noncopyable {
+ public:
+ bool isLocalHost;
+
+ AuthenticationInfo(){ isLocalHost = false; }
+ ~AuthenticationInfo() {}
+
+ // -- modifiers ----
+
+ void logout(const string& dbname ) {
+ scoped_spinlock lk(_lock);
+ _dbs.erase(dbname);
+ }
+ void authorize(const string& dbname , const string& user ) {
+ scoped_spinlock lk(_lock);
+ _dbs[dbname].level = Auth::WRITE;
+ _dbs[dbname].user = user;
+ }
+ void authorizeReadOnly(const string& dbname , const string& user ) {
+ scoped_spinlock lk(_lock);
+ _dbs[dbname].level = Auth::READ;
+ _dbs[dbname].user = user;
+ }
+
+ // -- accessors ---
+
+ bool isAuthorized(const string& dbname) const {
+ return _isAuthorized( dbname, Auth::WRITE );
+ }
+
+ bool isAuthorizedReads(const string& dbname) const {
+ return _isAuthorized( dbname, Auth::READ );
+ }
+
+ /**
+ * @param lockType - this is from dbmutex 1 is write, 0 is read
+ */
+ bool isAuthorizedForLock(const string& dbname, int lockType ) const {
+ return _isAuthorized( dbname , lockType > 0 ? Auth::WRITE : Auth::READ );
+ }
+
+ bool isAuthorizedForLevel( const string& dbname , Auth::Level level ) const {
+ return _isAuthorized( dbname , level );
+ }
+
+ string getUser( const string& dbname ) const;
+
+ void print() const;
+
+ protected:
+ /** takes a lock */
+ bool _isAuthorized(const string& dbname, Auth::Level level) const;
+
+ bool _isAuthorizedSingle_inlock(const string& dbname, Auth::Level level) const;
+
+ /** cannot call this locked */
+ bool _isAuthorizedSpecialChecks( const string& dbname ) const ;
+
+ private:
+ mutable SpinLock _lock;
+
+ typedef map<string,Auth> MA;
+ MA _dbs; // dbname -> auth
+
+ static bool _warned;
+ };
+
+} // namespace mongo