XRootD
Loading...
Searching...
No Matches
XrdMacaroonsAuthz.cc
Go to the documentation of this file.
1
2#include <stdexcept>
3#include <sstream>
4
5#include <ctime>
6
7#include "macaroons.h"
8
9#include "XrdOuc/XrdOucEnv.hh"
13
15#include "XrdMacaroonsAuthz.hh"
16
17using namespace Macaroons;
18
19
20namespace {
21
22class AuthzCheck
23{
24public:
25 AuthzCheck(const char *req_path, const Access_Operation req_oper, ssize_t max_duration, XrdSysError &log);
26
27 const std::string &GetSecName() const {return m_sec_name;}
28 const std::string &GetErrorMessage() const {return m_emsg;}
29
30 static int verify_before_s(void *authz_ptr,
31 const unsigned char *pred,
32 size_t pred_sz);
33
34 static int verify_activity_s(void *authz_ptr,
35 const unsigned char *pred,
36 size_t pred_sz);
37
38 static int verify_path_s(void *authz_ptr,
39 const unsigned char *pred,
40 size_t pred_sz);
41
42 static int verify_name_s(void *authz_ptr,
43 const unsigned char *pred,
44 size_t pred_sz);
45
46private:
47 int verify_before(const unsigned char *pred, size_t pred_sz);
48 int verify_activity(const unsigned char *pred, size_t pred_sz);
49 int verify_path(const unsigned char *pred, size_t pred_sz);
50 int verify_name(const unsigned char *pred, size_t pred_sz);
51
52 ssize_t m_max_duration;
53 XrdSysError &m_log;
54 std::string m_emsg;
55 const std::string m_path;
56 std::string m_desired_activity;
57 std::string m_sec_name;
58 Access_Operation m_oper;
59 time_t m_now;
60};
61
62
63static XrdAccPrivs AddPriv(Access_Operation op, XrdAccPrivs privs)
64{
65 int new_privs = privs;
66 switch (op) {
67 case AOP_Any:
68 break;
69 case AOP_Chmod:
70 new_privs |= static_cast<int>(XrdAccPriv_Chmod);
71 break;
72 case AOP_Chown:
73 new_privs |= static_cast<int>(XrdAccPriv_Chown);
74 break;
75 case AOP_Excl_Create: // fallthrough
76 case AOP_Create:
77 new_privs |= static_cast<int>(XrdAccPriv_Create);
78 break;
79 case AOP_Delete:
80 new_privs |= static_cast<int>(XrdAccPriv_Delete);
81 break;
82 case AOP_Excl_Insert: // fallthrough
83 case AOP_Insert:
84 new_privs |= static_cast<int>(XrdAccPriv_Insert);
85 break;
86 case AOP_Lock:
87 new_privs |= static_cast<int>(XrdAccPriv_Lock);
88 break;
89 case AOP_Mkdir:
90 new_privs |= static_cast<int>(XrdAccPriv_Mkdir);
91 break;
92 case AOP_Read:
93 new_privs |= static_cast<int>(XrdAccPriv_Read);
94 break;
95 case AOP_Readdir:
96 new_privs |= static_cast<int>(XrdAccPriv_Readdir);
97 break;
98 case AOP_Rename:
99 new_privs |= static_cast<int>(XrdAccPriv_Rename);
100 break;
101 case AOP_Stat:
102 new_privs |= static_cast<int>(XrdAccPriv_Lookup);
103 break;
104 case AOP_Update:
105 new_privs |= static_cast<int>(XrdAccPriv_Update);
106 break;
107 };
108 return static_cast<XrdAccPrivs>(new_privs);
109}
110
111
112// Accept any value of the path, name, or activity caveats
113int validate_verify_empty(void *emsg_ptr,
114 const unsigned char *pred,
115 size_t pred_sz)
116{
117 if ((pred_sz >= 5) && (!memcmp(reinterpret_cast<const char *>(pred), "path:", 5) ||
118 !memcmp(reinterpret_cast<const char *>(pred), "name:", 5)))
119 {
120 return 0;
121 }
122 if ((pred_sz >= 9) && (!memcmp(reinterpret_cast<const char *>(pred), "activity:", 9)))
123 {
124 return 0;
125 }
126 return 1;
127}
128
129}
130
131
132Authz::Authz(XrdSysLogger *log, char const *config, XrdAccAuthorize *chain)
133 : m_max_duration(86400),
134 m_chain(chain),
135 m_log(log, "macarons_"),
136 m_authz_behavior(static_cast<int>(Handler::AuthzBehavior::PASSTHROUGH))
137{
139 XrdOucEnv env;
140 if (!Handler::Config(config, &env, &m_log, m_location, m_secret, m_max_duration, behavior))
141 {
142 throw std::runtime_error("Macaroon authorization config failed.");
143 }
144 m_authz_behavior = static_cast<int>(behavior);
145}
146
147
149Authz::OnMissing(const XrdSecEntity *Entity, const char *path,
150 const Access_Operation oper, XrdOucEnv *env)
151{
152 switch (m_authz_behavior) {
154 return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
156 return AddPriv(oper, XrdAccPriv_None);;
158 return XrdAccPriv_None;
159 }
160 // Code should be unreachable.
161 return XrdAccPriv_None;
162}
163
165Authz::Access(const XrdSecEntity *Entity, const char *path,
166 const Access_Operation oper, XrdOucEnv *env)
167{
168 // We don't allow any testing to occur in this authz module, preventing
169 // a macaroon to be used to receive further macaroons.
170 if (oper == AOP_Any)
171 {
172 return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
173 }
174
175 const char *authz = env ? env->Get("authz") : nullptr;
176 if (authz && !strncmp(authz, "Bearer%20", 9))
177 {
178 authz += 9;
179 }
180 else if (!authz && (authz = env ? env->Get("access_token") : nullptr) && !strncmp(authz, "Bearer%20", 9))
181 {
182 authz += 9;
183 }
184
185 // If there's no request-specific token, check for a ZTN session token
186 if (!authz && Entity && !strcmp("ztn", Entity->prot) && Entity->creds &&
187 Entity->credslen && Entity->creds[Entity->credslen] == '\0')
188 {
189 authz = Entity->creds;
190 }
191
192 if (!authz) {
193 return OnMissing(Entity, path, oper, env);
194 }
195
196 macaroon_returncode mac_err = MACAROON_SUCCESS;
197 struct macaroon* macaroon = macaroon_deserialize(
198 authz,
199 &mac_err);
200 if (!macaroon)
201 {
202 // Do not log - might be other token type!
203 //m_log.Emsg("Access", "Failed to parse the macaroon");
204 return OnMissing(Entity, path, oper, env);
205 }
206
207 struct macaroon_verifier *verifier = macaroon_verifier_create();
208 if (!verifier)
209 {
210 m_log.Emsg("Access", "Failed to create a new macaroon verifier");
211 return XrdAccPriv_None;
212 }
213 if (!path)
214 {
215 m_log.Emsg("Access", "Request with no provided path.");
216 macaroon_verifier_destroy(verifier);
217 return XrdAccPriv_None;
218 }
219
220 AuthzCheck check_helper(path, oper, m_max_duration, m_log);
221
222 if (macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
223 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_activity_s, &check_helper, &mac_err) ||
224 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_name_s, &check_helper, &mac_err) ||
225 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_path_s, &check_helper, &mac_err))
226 {
227 m_log.Emsg("Access", "Failed to configure caveat verifier:");
228 macaroon_verifier_destroy(verifier);
229 return XrdAccPriv_None;
230 }
231
232 const unsigned char *macaroon_loc;
233 size_t location_sz;
234 macaroon_location(macaroon, &macaroon_loc, &location_sz);
235 if (strncmp(reinterpret_cast<const char *>(macaroon_loc), m_location.c_str(), location_sz))
236 {
237 std::string location_str(reinterpret_cast<const char *>(macaroon_loc), location_sz);
238 m_log.Emsg("Access", "Macaroon is for incorrect location", location_str.c_str());
239 macaroon_verifier_destroy(verifier);
240 macaroon_destroy(macaroon);
241 return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
242 }
243
244 if (macaroon_verify(verifier, macaroon,
245 reinterpret_cast<const unsigned char *>(m_secret.c_str()),
246 m_secret.size(),
247 NULL, 0, // discharge macaroons
248 &mac_err))
249 {
250 m_log.Log(LogMask::Debug, "Access", "Macaroon verification failed");
251 macaroon_verifier_destroy(verifier);
252 macaroon_destroy(macaroon);
253 return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
254 }
255 macaroon_verifier_destroy(verifier);
256
257 const unsigned char *macaroon_id;
258 size_t id_sz;
259 macaroon_identifier(macaroon, &macaroon_id, &id_sz);
260
261 std::string macaroon_id_str(reinterpret_cast<const char *>(macaroon_id), id_sz);
262 m_log.Log(LogMask::Info, "Access", "Macaroon verification successful; ID", macaroon_id_str.c_str());
263 macaroon_destroy(macaroon);
264
265 // Copy the name, if present into the macaroon, into the credential object.
266 if (Entity && check_helper.GetSecName().size()) {
267 const std::string &username = check_helper.GetSecName();
268 m_log.Log(LogMask::Debug, "Access", "Setting the request name to", username.c_str());
269 Entity->eaAPI->Add("request.name", username,true);
270 }
271
272 // We passed verification - give the correct privilege.
273 return AddPriv(oper, XrdAccPriv_None);
274}
275
276bool Authz::Validate(const char *token,
277 std::string &emsg,
278 long long *expT,
279 XrdSecEntity *entP)
280{
281 macaroon_returncode mac_err = MACAROON_SUCCESS;
282 std::unique_ptr<struct macaroon, decltype(&macaroon_destroy)> macaroon(
283 macaroon_deserialize(token, &mac_err),
284 &macaroon_destroy);
285
286 if (!macaroon)
287 {
288 emsg = "Failed to deserialize the token as a macaroon";
289 // Purposely log at debug level in case if this validation is ever
290 // chained so we don't have overly-chatty logs.
291 m_log.Log(LogMask::Debug, "Validate", emsg.c_str());
292 return false;
293 }
294
295 std::unique_ptr<struct macaroon_verifier, decltype(&macaroon_verifier_destroy)> verifier(
296 macaroon_verifier_create(), &macaroon_verifier_destroy);
297 if (!verifier)
298 {
299 emsg = "Internal error: failed to create a verifier.";
300 m_log.Log(LogMask::Error, "Validate", emsg.c_str());
301 return false;
302 }
303
304 // Note the path and operation here are ignored as we won't use those validators
305 AuthzCheck check_helper("/", AOP_Read, m_max_duration, m_log);
306
307 if (macaroon_verifier_satisfy_general(verifier.get(), AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
308 macaroon_verifier_satisfy_general(verifier.get(), validate_verify_empty, nullptr, &mac_err))
309 {
310 emsg = "Failed to configure the verifier";
311 m_log.Log(LogMask::Error, "Validate", emsg.c_str());
312 return false;
313 }
314
315 const unsigned char *macaroon_loc;
316 size_t location_sz;
317 macaroon_location(macaroon.get(), &macaroon_loc, &location_sz);
318 if (strncmp(reinterpret_cast<const char *>(macaroon_loc), m_location.c_str(), location_sz))
319 {
320 emsg = "Macaroon contains incorrect location: " +
321 std::string(reinterpret_cast<const char *>(macaroon_loc), location_sz);
322 m_log.Log(LogMask::Warning, "Validate", emsg.c_str(), ("all.sitename is " + m_location).c_str());
323 return false;
324 }
325
326 if (macaroon_verify(verifier.get(), macaroon.get(),
327 reinterpret_cast<const unsigned char *>(m_secret.c_str()),
328 m_secret.size(),
329 nullptr, 0,
330 &mac_err))
331 {
332 emsg = "Macaroon verification error" + (check_helper.GetErrorMessage().size() ?
333 (", " + check_helper.GetErrorMessage()) : "");
334 m_log.Log(LogMask::Warning, "Validate", emsg.c_str());
335 return false;
336 }
337
338 const unsigned char *macaroon_id;
339 size_t id_sz;
340 macaroon_identifier(macaroon.get(), &macaroon_id, &id_sz);
341 m_log.Log(LogMask::Info, "Validate", ("Macaroon verification successful; ID " +
342 std::string(reinterpret_cast<const char *>(macaroon_id), id_sz)).c_str());
343
344 return true;
345}
346
347
348AuthzCheck::AuthzCheck(const char *req_path, const Access_Operation req_oper, ssize_t max_duration, XrdSysError &log)
349 : m_max_duration(max_duration),
350 m_log(log),
351 m_path(NormalizeSlashes(req_path)),
352 m_oper(req_oper),
353 m_now(time(NULL))
354{
355 switch (m_oper)
356 {
357 case AOP_Any:
358 break;
359 case AOP_Chmod:
360 case AOP_Chown:
361 m_desired_activity = "UPDATE_METADATA";
362 break;
363 case AOP_Insert:
364 case AOP_Lock:
365 case AOP_Mkdir:
366 case AOP_Update:
367 case AOP_Create:
368 m_desired_activity = "MANAGE";
369 break;
370 case AOP_Rename:
371 case AOP_Excl_Create:
372 case AOP_Excl_Insert:
373 m_desired_activity = "UPLOAD";
374 break;
375 case AOP_Delete:
376 m_desired_activity = "DELETE";
377 break;
378 case AOP_Read:
379 m_desired_activity = "DOWNLOAD";
380 break;
381 case AOP_Readdir:
382 m_desired_activity = "LIST";
383 break;
384 case AOP_Stat:
385 m_desired_activity = "READ_METADATA";
386 };
387}
388
389
390int
391AuthzCheck::verify_before_s(void *authz_ptr,
392 const unsigned char *pred,
393 size_t pred_sz)
394{
395 return static_cast<AuthzCheck*>(authz_ptr)->verify_before(pred, pred_sz);
396}
397
398
399int
400AuthzCheck::verify_activity_s(void *authz_ptr,
401 const unsigned char *pred,
402 size_t pred_sz)
403{
404 return static_cast<AuthzCheck*>(authz_ptr)->verify_activity(pred, pred_sz);
405}
406
407
408int
409AuthzCheck::verify_path_s(void *authz_ptr,
410 const unsigned char *pred,
411 size_t pred_sz)
412{
413 return static_cast<AuthzCheck*>(authz_ptr)->verify_path(pred, pred_sz);
414}
415
416
417int
418AuthzCheck::verify_name_s(void *authz_ptr,
419 const unsigned char *pred,
420 size_t pred_sz)
421{
422 return static_cast<AuthzCheck*>(authz_ptr)->verify_name(pred, pred_sz);
423}
424
425
426int
427AuthzCheck::verify_before(const unsigned char * pred, size_t pred_sz)
428{
429 std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
430 if (strncmp("before:", pred_str.c_str(), 7))
431 {
432 return 1;
433 }
434 m_log.Log(LogMask::Debug, "AuthzCheck", "Checking macaroon for expiration; caveat:", pred_str.c_str());
435
436 struct tm caveat_tm;
437 if (strptime(&pred_str[7], "%Y-%m-%dT%H:%M:%SZ", &caveat_tm) == nullptr)
438 {
439 m_emsg = "Failed to parse time string: " + pred_str.substr(7);
440 m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
441 return 1;
442 }
443 caveat_tm.tm_isdst = -1;
444
445 time_t caveat_time = timegm(&caveat_tm);
446 if (-1 == caveat_time)
447 {
448 m_emsg = "Failed to generate unix time: " + pred_str.substr(7);
449 m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
450 return 1;
451 }
452 if ((m_max_duration > 0) && (caveat_time > m_now + m_max_duration))
453 {
454 m_emsg = "Max token age is greater than configured max duration; rejecting";
455 m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
456 return 1;
457 }
458
459 int result = (m_now >= caveat_time);
460 if (!result)
461 {
462 m_log.Log(LogMask::Debug, "AuthzCheck", "Macaroon has not expired.");
463 }
464 else
465 {
466 m_emsg = "Macaroon expired at " + pred_str.substr(7);
467 m_log.Log(LogMask::Debug, "AuthzCheck", m_emsg.c_str());
468 }
469 return result;
470}
471
472
473int
474AuthzCheck::verify_activity(const unsigned char * pred, size_t pred_sz)
475{
476 if (!m_desired_activity.size()) {return 1;}
477 std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
478 if (strncmp("activity:", pred_str.c_str(), 9)) {return 1;}
479 m_log.Log(LogMask::Debug, "AuthzCheck", "running verify activity", pred_str.c_str());
480
481 std::stringstream ss(pred_str.substr(9));
482 for (std::string activity; std::getline(ss, activity, ','); )
483 {
484 // Any allowed activity also implies "READ_METADATA"
485 if (m_desired_activity == "READ_METADATA") {return 0;}
486 if ((activity == m_desired_activity) || ((m_desired_activity == "UPLOAD") && (activity == "MANAGE")))
487 {
488 m_log.Log(LogMask::Debug, "AuthzCheck", "macaroon has desired activity", activity.c_str());
489 return 0;
490 }
491 }
492 m_log.Log(LogMask::Info, "AuthzCheck", "macaroon does NOT have desired activity", m_desired_activity.c_str());
493 return 1;
494}
495
496
497int
498AuthzCheck::verify_path(const unsigned char * pred, size_t pred_sz)
499{
500 std::string pred_str_raw(reinterpret_cast<const char *>(pred), pred_sz);
501 if (strncmp("path:", pred_str_raw.c_str(), 5)) {return 1;}
502 std::string pred_str = NormalizeSlashes(pred_str_raw.substr(5));
503 m_log.Log(LogMask::Debug, "AuthzCheck", "running verify path", pred_str.c_str());
504
505 if ((m_path.find("/./") != std::string::npos) ||
506 (m_path.find("/../") != std::string::npos))
507 {
508 m_log.Log(LogMask::Info, "AuthzCheck", "invalid requested path", m_path.c_str());
509 return 1;
510 }
511
512 // Allow operations under subdirectories and not substrings
513 // For e.g. pred_str = "/data/sudir/mydir"
514 // Allows m_path = /data/subdir/mydir/newdir
515 // But rejects, m_path = /data/subdir/mydirmycoolname/newdir
516 int is_subdir = is_subdirectory(pred_str, m_path);
517 if (is_subdir)
518 {
519 m_log.Log(LogMask::Debug, "AuthzCheck", "path request verified for", m_path.c_str());
520 }
521
522 // READ_METADATA (i.e AOP_Stat) permission for /foo/bar automatically implies permission
523 // to READ_METADATA for /foo.
524 // Similarly, MKDIR Pemissions for a parent path is implied.
525 else if (m_oper == AOP_Stat || m_oper == AOP_Mkdir)
526 {
527 is_subdir = is_subdirectory(m_path, pred_str);
528 const char *opName = (m_oper == AOP_Stat) ? "READ_METADATA" : "MKDIR";
529 m_log.Log(LogMask::Debug, "AuthzCheck",
530 (std::string(opName) + (is_subdir? " Path request verified for" : " Path request NOT allowed for")).c_str(),
531 m_path.c_str());
532 }
533 else
534 {
535 m_log.Log(LogMask::Debug, "AuthzCheck", "path request NOT allowed", m_path.c_str());
536 }
537
538 return !is_subdir;
539}
540
541
542int
543AuthzCheck::verify_name(const unsigned char * pred, size_t pred_sz)
544{
545 std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
546 if (strncmp("name:", pred_str.c_str(), 5)) {return 1;}
547 if (pred_str.size() < 6) {return 1;}
548 m_log.Log(LogMask::Debug, "AuthzCheck", "Verifying macaroon with", pred_str.c_str());
549
550 // Make a copy of the name for the XrdSecEntity; this will be used later.
551 m_sec_name = pred_str.substr(5);
552
553 return 0;
554}
Access_Operation
The following are supported operations.
@ AOP_Delete
rm() or rmdir()
@ AOP_Mkdir
mkdir()
@ AOP_Update
open() r/w or append
@ AOP_Create
open() with create
@ AOP_Readdir
opendir()
@ AOP_Chmod
chmod()
@ AOP_Any
Special for getting privs.
@ AOP_Stat
exists(), stat()
@ AOP_Rename
mv() for source
@ AOP_Read
open() r/o, prepare()
@ AOP_Excl_Create
open() with O_EXCL|O_CREAT
@ AOP_Insert
mv() for target
@ AOP_Lock
n/a
@ AOP_Chown
chown()
@ AOP_Excl_Insert
mv() where destination doesn't exist.
XrdAccPrivs
@ XrdAccPriv_Mkdir
@ XrdAccPriv_Chown
@ XrdAccPriv_Insert
@ XrdAccPriv_Lookup
@ XrdAccPriv_Rename
@ XrdAccPriv_Update
@ XrdAccPriv_Read
@ XrdAccPriv_Lock
@ XrdAccPriv_None
@ XrdAccPriv_Delete
@ XrdAccPriv_Create
@ XrdAccPriv_Readdir
@ XrdAccPriv_Chmod
static bool is_subdirectory(const std::string_view dir, const std::string_view subdir)
int emsg(int rc, char *msg)
virtual bool Validate(const char *token, std::string &emsg, long long *expT, XrdSecEntity *entP) override
Authz(XrdSysLogger *lp, const char *parms, XrdAccAuthorize *chain)
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *env) override
static bool Config(const char *config, XrdOucEnv *env, XrdSysError *log, std::string &location, std::string &secret, ssize_t &max_duration, AuthzBehavior &behavior)
XrdAccAuthorize()
Constructor.
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *Env=0)=0
char * Get(const char *varname)
Definition XrdOucEnv.hh:69
bool Add(XrdSecAttr &attr)
int credslen
Length of the 'creds' data.
XrdSecEntityAttr * eaAPI
non-const API to attributes
char prot[XrdSecPROTOIDSIZE]
Auth protocol used (e.g. krb5)
char * creds
Raw entity credentials or cert.
std::string NormalizeSlashes(const std::string &)