Skip to content

Commit 9946735

Browse files
New definition set transformation: username obfuscation
1 parent 46d6ed4 commit 9946735

File tree

2 files changed

+83
-0
lines changed

2 files changed

+83
-0
lines changed

src/responses.rs

+38
Original file line numberDiff line numberDiff line change
@@ -473,6 +473,32 @@ pub struct User {
473473
pub password_hash: String,
474474
}
475475

476+
impl User {
477+
pub fn with_name(&self, name: String) -> Self {
478+
Self {
479+
name,
480+
tags: self.tags.clone(),
481+
password_hash: self.password_hash.clone(),
482+
}
483+
}
484+
485+
pub fn with_tags(&self, tags: TagList) -> Self {
486+
Self {
487+
name: self.name.clone(),
488+
tags,
489+
password_hash: self.password_hash.clone(),
490+
}
491+
}
492+
493+
pub fn with_password_hash(&self, password_hash: String) -> Self {
494+
Self {
495+
name: self.name.clone(),
496+
tags: self.tags.clone(),
497+
password_hash,
498+
}
499+
}
500+
}
501+
476502
/// Represents a client connection.
477503
#[derive(Debug, Deserialize, Clone)]
478504
#[cfg_attr(feature = "tabled", derive(Tabled))]
@@ -1231,6 +1257,18 @@ pub struct Permissions {
12311257
pub write: String,
12321258
}
12331259

1260+
impl Permissions {
1261+
pub fn with_username(&self, username: &str) -> Self {
1262+
Permissions {
1263+
user: username.to_owned(),
1264+
vhost: self.vhost.clone(),
1265+
configure: self.configure.clone(),
1266+
read: self.read.clone(),
1267+
write: self.write.clone(),
1268+
}
1269+
}
1270+
}
1271+
12341272
/// Represents definitions of an entire cluster (all virtual hosts).
12351273
#[derive(Debug, Serialize, Deserialize, Clone)]
12361274
#[allow(dead_code)]

src/transformers.rs

+45
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,13 @@
1212
// See the License for the specific language governing permissions and
1313
// limitations under the License.
1414

15+
use std::collections::HashMap;
16+
1517
use crate::commons::QueueType;
1618
use crate::responses::{ClusterDefinitionSet, Policy, PolicyDefinitionOps};
1719

20+
use crate::password_hashing;
21+
1822
pub trait DefinitionSetTransformer {
1923
fn transform<'a>(&'a self, defs: &'a mut ClusterDefinitionSet) -> &'a mut ClusterDefinitionSet;
2024
}
@@ -66,6 +70,44 @@ impl DefinitionSetTransformer for DropEmptyPolicies {
6670
}
6771
}
6872

73+
#[derive(Default, Debug)]
74+
pub struct ObfuscateUsernames {}
75+
76+
impl DefinitionSetTransformer for ObfuscateUsernames {
77+
fn transform<'a>(&'a self, defs: &'a mut ClusterDefinitionSet) -> &'a mut ClusterDefinitionSet {
78+
// keeps track of name changes
79+
let mut obfuscated = HashMap::<String, String>::new();
80+
let mut i = 1u16;
81+
for u in &defs.users {
82+
let new_name = format!("obfuscated-user-{}", i);
83+
i += 1;
84+
obfuscated.insert(u.name.clone(), new_name.clone());
85+
}
86+
let obfuscated2 = obfuscated.clone();
87+
88+
let updated_users = defs.users.clone().into_iter().map(|u| {
89+
let new_name = obfuscated.get(&u.name).unwrap_or(&u.name).as_str();
90+
let salt = password_hashing::salt();
91+
let new_password = format!("password-{}", i);
92+
let hash =
93+
password_hashing::base64_encoded_salted_password_hash_sha256(&salt, &new_password);
94+
95+
u.with_name(new_name.to_owned()).with_password_hash(hash)
96+
});
97+
98+
let updated_permissions = defs.permissions.clone().into_iter().map(|p| {
99+
let new_new = obfuscated2.get(&p.user).unwrap_or(&p.user).as_str();
100+
101+
p.with_username(new_new)
102+
});
103+
104+
defs.users = updated_users.collect::<Vec<_>>();
105+
defs.permissions = updated_permissions.collect::<Vec<_>>();
106+
107+
defs
108+
}
109+
}
110+
69111
#[derive(Default, Debug)]
70112
pub struct ExcludeUsers {}
71113

@@ -126,6 +168,9 @@ impl From<Vec<&str>> for TransformationChain {
126168
"drop_empty_policies" => {
127169
vec.push(Box::new(DropEmptyPolicies::default()));
128170
}
171+
"obfuscate_usernames" => {
172+
vec.push(Box::new(ObfuscateUsernames::default()));
173+
}
129174
"exclude_users" => {
130175
vec.push(Box::new(ExcludeUsers::default()));
131176
}

0 commit comments

Comments
 (0)