| [2559] | 1 | import errno | 
|---|
|  | 2 |  | 
|---|
|  | 3 | from afs import acl | 
|---|
|  | 4 | from afs import fs | 
|---|
|  | 5 | from afs import pts | 
|---|
|  | 6 |  | 
|---|
| [2562] | 7 | from invirt import common | 
|---|
| [2559] | 8 | from invirt.config import structs as config | 
|---|
| [2562] | 9 | from invirt import remctl | 
|---|
| [2559] | 10 |  | 
|---|
| [2562] | 11 |  | 
|---|
| [2559] | 12 | # | 
|---|
|  | 13 | # expandOwner and expandAdmin form the API that needs to be exported | 
|---|
|  | 14 | # for all authz modules. | 
|---|
|  | 15 | # | 
|---|
|  | 16 |  | 
|---|
| [2562] | 17 |  | 
|---|
| [2559] | 18 | def expandOwner(name): | 
|---|
|  | 19 | """Expand an owner to a list of authorized users. | 
|---|
|  | 20 |  | 
|---|
|  | 21 | For the locker authz module, an owner is an Athena locker. Those | 
|---|
|  | 22 | users who have been given the administrator ('a') bit on the root | 
|---|
|  | 23 | of a locker are given access to any VM owned by that locker, | 
|---|
|  | 24 | unless they also have been given a negative administrator bit. | 
|---|
|  | 25 |  | 
|---|
|  | 26 | If a locker doesn't exist, or we can't access the permissions, we | 
|---|
|  | 27 | assume the ACL is empty. | 
|---|
|  | 28 | """ | 
|---|
|  | 29 | try: | 
|---|
|  | 30 | path = _lockerPath(name) | 
|---|
|  | 31 | cell = fs.whichcell(path) | 
|---|
| [2562] | 32 | auth = _authenticate(cell) | 
|---|
| [2559] | 33 | a = acl.ACL.retrieve(path) | 
|---|
|  | 34 |  | 
|---|
|  | 35 | allowed = set() | 
|---|
|  | 36 | for ent in a.pos: | 
|---|
|  | 37 | if a.pos[ent] & acl.ADMINISTER: | 
|---|
| [2562] | 38 | allowed.update(_expandGroup(ent, cell=cell, auth=auth)) | 
|---|
| [2559] | 39 | for ent in a.neg: | 
|---|
|  | 40 | if a.neg[ent] & acl.ADMINISTER: | 
|---|
| [2562] | 41 | allowed.difference_update(_expandGroup(ent, cell=cell, auth=auth)) | 
|---|
| [2559] | 42 |  | 
|---|
|  | 43 | return allowed | 
|---|
|  | 44 | except OSError, e: | 
|---|
|  | 45 | if e.errno in (errno.ENOENT, errno.EACCES): | 
|---|
|  | 46 | return [] | 
|---|
|  | 47 | else: | 
|---|
|  | 48 | raise | 
|---|
|  | 49 |  | 
|---|
|  | 50 |  | 
|---|
|  | 51 | def expandAdmin(name, owner): | 
|---|
|  | 52 | """Expand an administrator to a list of authorized users. | 
|---|
|  | 53 |  | 
|---|
|  | 54 | Because the interpretation of an administrator might depend on the | 
|---|
|  | 55 | owner, the owner is passed in as an argument. | 
|---|
|  | 56 |  | 
|---|
|  | 57 | However, in the case of locker-based authentication, the | 
|---|
|  | 58 | administrator is always interpreted as an AFS entry (either a user | 
|---|
|  | 59 | or a group) in the home cell (athena.mit.edu for XVM). | 
|---|
|  | 60 | """ | 
|---|
| [2562] | 61 | cell = config.authz.cells[0].cell | 
|---|
|  | 62 | auth = _authenticate(cell) | 
|---|
|  | 63 | return _expandGroup(name, cell=cell, auth=auth) | 
|---|
| [2559] | 64 |  | 
|---|
|  | 65 |  | 
|---|
|  | 66 | # | 
|---|
|  | 67 | # These are helper functions, and aren't part of the authz API | 
|---|
|  | 68 | # | 
|---|
|  | 69 |  | 
|---|
| [2562] | 70 |  | 
|---|
|  | 71 | def _authenticate(cell): | 
|---|
|  | 72 | """Acquire credentials if possible for a particular cell. | 
|---|
|  | 73 |  | 
|---|
|  | 74 | This function returns True if an authenticated connection to the | 
|---|
|  | 75 | cell should be established; False otherwise. | 
|---|
|  | 76 |  | 
|---|
|  | 77 | If a cell isn't explicitly listed in the configuration file, | 
|---|
|  | 78 | _authenticate will assume that it /should/ authenticate to the | 
|---|
|  | 79 | cell. | 
|---|
|  | 80 |  | 
|---|
|  | 81 | The assumption is that choosing to authenticate to a cell will | 
|---|
|  | 82 | fail in two cases: (a) the cell authenticates against the | 
|---|
|  | 83 | machine's home realm and there is no PTS ID in the cell, or (b) | 
|---|
|  | 84 | the cell doesn't authenticate against the machine's home realm and | 
|---|
|  | 85 | doesn't have cross-realm authentication setup. | 
|---|
|  | 86 |  | 
|---|
|  | 87 | In the former case, it should be possible for the sysadmins to | 
|---|
|  | 88 | list all cells that authenticate against the home realm (including | 
|---|
|  | 89 | those where attempting authentication would be problematic). In | 
|---|
|  | 90 | the latter case, such a cell would be at best distantly connected | 
|---|
|  | 91 | to the home cell, and we probably don't want to give it quota | 
|---|
|  | 92 | anyway. | 
|---|
|  | 93 | """ | 
|---|
|  | 94 | for c in config.authz.cells: | 
|---|
|  | 95 | if c.cell == cell and not c.auth: | 
|---|
|  | 96 | return False | 
|---|
|  | 97 |  | 
|---|
|  | 98 | remctl.checkKinit() | 
|---|
|  | 99 | common.captureOutput(['aklog', '-c', cell]) | 
|---|
|  | 100 | return True | 
|---|
|  | 101 |  | 
|---|
|  | 102 |  | 
|---|
|  | 103 | def _expandGroup(name, cell=None, auth=False): | 
|---|
| [2559] | 104 | """Expand an AFS group into a list of its members. | 
|---|
|  | 105 |  | 
|---|
|  | 106 | Because groups are not global, but can vary from cell to cell, | 
|---|
|  | 107 | this function accepts as an optional argument the cell in which | 
|---|
|  | 108 | this group should be resolved. | 
|---|
|  | 109 |  | 
|---|
|  | 110 | If no cell is specified, it is assumed that the default cell (or | 
|---|
|  | 111 | ThisCell) should be used. | 
|---|
|  | 112 |  | 
|---|
|  | 113 | If the name is a user, not a group, then a single-element set with | 
|---|
|  | 114 | the same name is returned. | 
|---|
|  | 115 |  | 
|---|
|  | 116 | As with expandOwner, if a group doesn't exist or if we're unable | 
|---|
|  | 117 | to retrieve its membership, we assume it's empty. | 
|---|
|  | 118 | """ | 
|---|
|  | 119 | try: | 
|---|
| [2562] | 120 | ent = pts.PTS(cell, 3 if auth else 0).getEntry(name) | 
|---|
| [2559] | 121 | if ent.id > 0: | 
|---|
|  | 122 | return set([ent.name]) | 
|---|
|  | 123 | else: | 
|---|
|  | 124 | return set([x.name for x in ent.members]) | 
|---|
|  | 125 | except OSError, e: | 
|---|
|  | 126 | if e.errno in (errno.ENOENT, errno.EACCESS): | 
|---|
|  | 127 | return set() | 
|---|
|  | 128 | else: | 
|---|
|  | 129 | raise | 
|---|
|  | 130 |  | 
|---|
|  | 131 |  | 
|---|
|  | 132 | def _lockerPath(owner): | 
|---|
|  | 133 | """Given the name of a locker, return a path to that locker. | 
|---|
|  | 134 |  | 
|---|
|  | 135 | This turns out to be pretty simple, thanks to the /mit | 
|---|
|  | 136 | automounter. | 
|---|
|  | 137 | """ | 
|---|
|  | 138 | return '/mit/%s' % owner | 
|---|