Skip to main content

Mountain/IPC/Security/PermissionManager/
SecurityContext.rs

1#![allow(non_snake_case)]
2
3//! Security envelope used by `Manager::Struct::validate_permission`.
4//! Carries the user id, roles, direct permissions, origin IP,
5//! and request timestamp. `ipc_default` produces the loopback
6//! "ipc-connection" context used for local IPC.
7
8use serde::{Deserialize, Serialize};
9
10#[derive(Debug, Clone, Serialize, Deserialize)]
11pub struct Struct {
12	pub user_id:String,
13	pub roles:Vec<String>,
14	pub permissions:Vec<String>,
15	pub ip_address:String,
16	pub timestamp:std::time::SystemTime,
17}
18
19impl Struct {
20	pub fn new(user_id:String, roles:Vec<String>, permissions:Vec<String>, ip_address:String) -> Self {
21		Self { user_id, roles, permissions, ip_address, timestamp:std::time::SystemTime::now() }
22	}
23
24	pub fn has_role(&self, role:&str) -> bool { self.roles.iter().any(|r| r == role) }
25
26	pub fn has_permission(&self, permission:&str) -> bool { self.permissions.iter().any(|p| p == permission) }
27
28	pub fn ipc_default() -> Self {
29		Self {
30			user_id:"ipc-connection".to_string(),
31			roles:vec!["user".to_string()],
32			permissions:vec![],
33			ip_address:"127.0.0.1".to_string(),
34			timestamp:std::time::SystemTime::now(),
35		}
36	}
37}