mirror of
https://github.com/lightningnetwork/lnd.git
synced 2025-05-03 16:30:18 +02:00
rpcperms: set CustomCaveatCondition on middleware req
This sets the `CustomCaveatCondition` value on rpc middleware requests if one exists. Previously, this value was always blank even if the macaroon had a value set for its custom caveat condition.
This commit is contained in:
parent
a4474447c2
commit
4a573b18cf
@ -92,6 +92,10 @@ Postgres](https://github.com/lightningnetwork/lnd/pull/6111)
|
||||
exposed](https://github.com/lightningnetwork/lnd/pull/6146) inside
|
||||
WaitingCloseResp from calling `PendingChannels`.
|
||||
|
||||
* [CustomCaveatCondition is now properly
|
||||
set](https://github.com/lightningnetwork/lnd/pull/6185) on
|
||||
`RPCMiddlewareRequest` messages.
|
||||
|
||||
|
||||
## Routing
|
||||
|
||||
@ -104,6 +108,7 @@ Postgres](https://github.com/lightningnetwork/lnd/pull/6111)
|
||||
|
||||
* Andras Banki-Horvath
|
||||
* Bjarne Magnussen
|
||||
* Daniel McNally
|
||||
* Elle Mouton
|
||||
* Harsha Goli
|
||||
* Joost Jager
|
||||
|
@ -195,7 +195,7 @@ func middlewareInterceptionTest(t *testing.T, node *lntest.HarnessNode,
|
||||
// block the execution of the main task otherwise.
|
||||
req := &lnrpc.ListChannelsRequest{ActiveOnly: true}
|
||||
go registration.interceptUnary(
|
||||
"/lnrpc.Lightning/ListChannels", req, nil,
|
||||
"/lnrpc.Lightning/ListChannels", req, nil, readOnly,
|
||||
)
|
||||
|
||||
// Do the actual call now and wait for the interceptor to do its thing.
|
||||
@ -208,7 +208,7 @@ func middlewareInterceptionTest(t *testing.T, node *lntest.HarnessNode,
|
||||
// Let's test the same for a streaming endpoint.
|
||||
req2 := &lnrpc.PeerEventSubscription{}
|
||||
go registration.interceptStream(
|
||||
"/lnrpc.Lightning/SubscribePeerEvents", req2, nil,
|
||||
"/lnrpc.Lightning/SubscribePeerEvents", req2, nil, readOnly,
|
||||
)
|
||||
|
||||
// Do the actual call now and wait for the interceptor to do its thing.
|
||||
@ -327,6 +327,7 @@ func middlewareManipulationTest(t *testing.T, node *lntest.HarnessNode,
|
||||
req := &lnrpc.ListChannelsRequest{ActiveOnly: true}
|
||||
go registration.interceptUnary(
|
||||
"/lnrpc.Lightning/ListChannels", req, replacementResponse,
|
||||
readOnly,
|
||||
)
|
||||
|
||||
// Do the actual call now and wait for the interceptor to do its thing.
|
||||
@ -349,7 +350,7 @@ func middlewareManipulationTest(t *testing.T, node *lntest.HarnessNode,
|
||||
req2 := &lnrpc.PeerEventSubscription{}
|
||||
go registration.interceptStream(
|
||||
"/lnrpc.Lightning/SubscribePeerEvents", req2,
|
||||
replacementResponse2,
|
||||
replacementResponse2, readOnly,
|
||||
)
|
||||
|
||||
// Do the actual call now and wait for the interceptor to do its thing.
|
||||
@ -522,11 +523,21 @@ func registerMiddleware(t *testing.T, node *lntest.HarnessNode,
|
||||
// NOTE: Must be called in a goroutine as this will block until the response is
|
||||
// read from the response channel.
|
||||
func (h *middlewareHarness) interceptUnary(methodURI string,
|
||||
expectedRequest proto.Message, responseReplacement proto.Message) {
|
||||
expectedRequest proto.Message, responseReplacement proto.Message,
|
||||
readOnly bool) {
|
||||
|
||||
// Read intercept message and make sure it's for an RPC request.
|
||||
reqIntercept, err := h.stream.Recv()
|
||||
require.NoError(h.t, err)
|
||||
|
||||
// Make sure the custom condition is populated correctly (if we're using
|
||||
// a macaroon with a custom condition).
|
||||
if !readOnly {
|
||||
require.Equal(
|
||||
h.t, "itest-value", reqIntercept.CustomCaveatCondition,
|
||||
)
|
||||
}
|
||||
|
||||
req := reqIntercept.GetRequest()
|
||||
require.NotNil(h.t, req)
|
||||
|
||||
@ -564,11 +575,21 @@ func (h *middlewareHarness) interceptUnary(methodURI string,
|
||||
// NOTE: Must be called in a goroutine as this will block until the first
|
||||
// response is read from the response channel.
|
||||
func (h *middlewareHarness) interceptStream(methodURI string,
|
||||
expectedRequest proto.Message, responseReplacement proto.Message) {
|
||||
expectedRequest proto.Message, responseReplacement proto.Message,
|
||||
readOnly bool) {
|
||||
|
||||
// Read intercept message and make sure it's for an RPC stream auth.
|
||||
authIntercept, err := h.stream.Recv()
|
||||
require.NoError(h.t, err)
|
||||
|
||||
// Make sure the custom condition is populated correctly (if we're using
|
||||
// a macaroon with a custom condition).
|
||||
if !readOnly {
|
||||
require.Equal(
|
||||
h.t, "itest-value", authIntercept.CustomCaveatCondition,
|
||||
)
|
||||
}
|
||||
|
||||
auth := authIntercept.GetStreamAuth()
|
||||
require.NotNil(h.t, auth)
|
||||
|
||||
|
@ -910,7 +910,7 @@ func (r *InterceptorChain) middlewareRegistered() bool {
|
||||
|
||||
// acceptRequest sends an intercept request to all middlewares that have
|
||||
// registered for it. This means either a middleware has requested read-only
|
||||
// access or the request actually has a macaroon which a caveat the middleware
|
||||
// access or the request actually has a macaroon with a caveat the middleware
|
||||
// registered for.
|
||||
func (r *InterceptorChain) acceptRequest(requestID uint64,
|
||||
msg *InterceptionRequest) error {
|
||||
@ -929,6 +929,10 @@ func (r *InterceptorChain) acceptRequest(requestID uint64,
|
||||
continue
|
||||
}
|
||||
|
||||
msg.CustomCaveatCondition = macaroons.GetCustomCaveatCondition(
|
||||
msg.Macaroon, middleware.customCaveatName,
|
||||
)
|
||||
|
||||
resp, err := middleware.intercept(requestID, msg)
|
||||
|
||||
// Error during interception itself.
|
||||
@ -975,6 +979,10 @@ func (r *InterceptorChain) interceptResponse(ctx context.Context,
|
||||
continue
|
||||
}
|
||||
|
||||
msg.CustomCaveatCondition = macaroons.GetCustomCaveatCondition(
|
||||
msg.Macaroon, middleware.customCaveatName,
|
||||
)
|
||||
|
||||
resp, err := middleware.intercept(requestID, msg)
|
||||
|
||||
// Error during interception itself.
|
||||
|
Loading…
x
Reference in New Issue
Block a user