-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpermissions.acl
102 lines (88 loc) · 3.07 KB
/
permissions.acl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
/**
* Access control rules. These rules allow anyone to submit AuthorizeAccess
* and RevokeAccess transaction as well as granting full access to a member's
* own record. A member can access another member's details if the member has
* added them to their authorized list.
*/
rule AuthorizeAccessTransaction {
description: "Allow all participants to submit AuthorizeAccess transactions"
participant: "ANY"
operation: CREATE
resource: "org.cse.piinet.AuthorizeAccess"
action: ALLOW
}
rule RevokeAccessTransaction {
description: "Allow all participants to submit RevokeAccess transactions"
participant: "ANY"
operation: CREATE
resource: "org.cse.piinet.RevokeAccess"
action: ALLOW
}
rule GetDataTransaction {
description: "Allow a participant to submit GetData transaction"
participant: "ANY"
operation: CREATE
resource: "org.cse.piinet.GetData"
action: ALLOW
}
rule CreateDataAssetAccess {
description: "Only Members can create a Data Asset"
participant: "org.cse.piinet.Member"
operation: ALL
resource: "org.cse.piinet.Data"
action: ALLOW
}
rule OwnAssetFullAccess {
description: "Allow all participants full access to their own data asset"
participant(p): "org.cse.piinet.Member"
operation: ALL
resource(r): "org.cse.piinet.Data"
condition: (r.owner.getIdentifier() === p.getIdentifier())
action: ALLOW
}
rule ForeignAssetConditionalAccess {
description: "Allow participants access to other people's Data assets if granted"
participant(p): "org.cse.piinet.Member"
operation: READ
resource(r): "org.cse.piinet.Data"
transaction(tx): "org.cse.piinet.GetData"
condition: (r.owner.authorized && r.owner.authorized.indexOf(p.getIdentifier()) > -1)
action: ALLOW
}
rule OwnRecordFullAccess {
description: "Allow all participants full access to their own record"
participant(p): "org.cse.piinet.Member"
operation: ALL
resource(r): "org.cse.piinet.Member"
condition: (r.getIdentifier() === p.getIdentifier())
action: ALLOW
}
rule ForeignRecordInitialReadAccess {
description: "Allow participants to perform the GetData tranaction as it reads other member data."
participant(p): "org.cse.piinet.Member"
operation: READ
resource(r): "org.cse.piinet.Member"
condition: (r.authorized && r.authorized.indexOf(p.getIdentifier()) > -1)
action: ALLOW
}
rule SystemACL {
description: "System ACL to permit all access"
participant: "org.hyperledger.composer.system.Participant"
operation: ALL
resource: "org.hyperledger.composer.system.**"
action: ALLOW
}
rule NetworkAdminUser {
description: "Grant business network administrators full access to user resources"
participant: "org.hyperledger.composer.system.NetworkAdmin"
operation: ALL
resource: "**"
action: ALLOW
}
rule NetworkAdminSystem {
description: "Grant business network administrators full access to system resources"
participant: "org.hyperledger.composer.system.NetworkAdmin"
operation: ALL
resource: "org.hyperledger.composer.system.**"
action: ALLOW
}