
Imported code till commit f64a3354185f32928e2568d9ece4a52fa4746c05 Changed a code bit to import correct definitions. kerbauth unit tests do run along with gluster-swift. Install script does install swiftkerbauth. import swiftkerbauth from http://review.gluster.org/swiftkrbauth.git Change-Id: Ia89f2b77cc68df10dee2f41ce074f3381ac3c408 Signed-off-by: Chetan Risbud <crisbud@redhat.com> Reviewed-on: http://review.gluster.org/6597 Reviewed-by: Prashanth Pai <ppai@redhat.com> Reviewed-by: Luis Pabon <lpabon@redhat.com> Tested-by: Luis Pabon <lpabon@redhat.com>
108 lines
3.7 KiB
Python
108 lines
3.7 KiB
Python
# Copyright (c) 2013 Red Hat, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import re
|
|
import random
|
|
import grp
|
|
import subprocess
|
|
from time import time
|
|
from gluster.swift.common.middleware.swiftkerbauth \
|
|
import TOKEN_LIFE, RESELLER_PREFIX
|
|
|
|
|
|
def get_remote_user(env):
|
|
"""Retrieve REMOTE_USER set by Apache from environment."""
|
|
remote_user = env.get('REMOTE_USER', "")
|
|
matches = re.match('([^@]+)@.*', remote_user)
|
|
if not matches:
|
|
raise RuntimeError("Malformed REMOTE_USER \"%s\"" % remote_user)
|
|
return matches.group(1)
|
|
|
|
|
|
def get_auth_data(mc, username):
|
|
"""
|
|
Returns the token, expiry time and groups for the user if it already exists
|
|
on memcache. Returns None otherwise.
|
|
|
|
:param mc: MemcacheRing object
|
|
:param username: swift user
|
|
"""
|
|
token, expires, groups = None, None, None
|
|
memcache_user_key = '%s/user/%s' % (RESELLER_PREFIX, username)
|
|
candidate_token = mc.get(memcache_user_key)
|
|
if candidate_token:
|
|
memcache_token_key = '%s/token/%s' % (RESELLER_PREFIX, candidate_token)
|
|
cached_auth_data = mc.get(memcache_token_key)
|
|
if cached_auth_data:
|
|
expires, groups = cached_auth_data
|
|
if expires > time():
|
|
token = candidate_token
|
|
else:
|
|
expires, groups = None, None
|
|
return (token, expires, groups)
|
|
|
|
|
|
def set_auth_data(mc, username, token, expires, groups):
|
|
"""
|
|
Stores the following key value pairs on Memcache:
|
|
(token, expires+groups)
|
|
(user, token)
|
|
"""
|
|
auth_data = (expires, groups)
|
|
memcache_token_key = "%s/token/%s" % (RESELLER_PREFIX, token)
|
|
mc.set(memcache_token_key, auth_data, time=TOKEN_LIFE)
|
|
|
|
# Record the token with the user info for future use.
|
|
memcache_user_key = '%s/user/%s' % (RESELLER_PREFIX, username)
|
|
mc.set(memcache_user_key, token, time=TOKEN_LIFE)
|
|
|
|
|
|
def generate_token():
|
|
"""Generates a random token."""
|
|
# We don't use uuid.uuid4() here because importing the uuid module
|
|
# causes (harmless) SELinux denials in the audit log on RHEL 6. If this
|
|
# is a security concern, a custom SELinux policy module could be
|
|
# written to not log those denials.
|
|
r = random.SystemRandom()
|
|
token = '%stk%s' % \
|
|
(RESELLER_PREFIX,
|
|
''.join(r.choice('abcdef0123456789') for x in range(32)))
|
|
return token
|
|
|
|
|
|
def get_groups(username):
|
|
"""Return a set of groups to which the user belongs to."""
|
|
# Retrieve the numerical group IDs. We cannot list the group names
|
|
# because group names from Active Directory may contain spaces, and
|
|
# we wouldn't be able to split the list of group names into its
|
|
# elements.
|
|
p = subprocess.Popen(['id', '-G', username], stdout=subprocess.PIPE)
|
|
if p.wait() != 0:
|
|
raise RuntimeError("Failure running id -G for %s" % username)
|
|
(p_stdout, p_stderr) = p.communicate()
|
|
|
|
# Convert the group numbers into group names.
|
|
groups = []
|
|
for gid in p_stdout.strip().split(" "):
|
|
groups.append(grp.getgrgid(int(gid))[0])
|
|
|
|
# The first element of the list is considered a unique identifier
|
|
# for the user. We add the username to accomplish this.
|
|
if username in groups:
|
|
groups.remove(username)
|
|
groups = [username] + groups
|
|
groups = ','.join(groups)
|
|
return groups
|