25 AuthzCheck(
const char *req_path,
const Access_Operation req_oper, ssize_t max_duration, XrdSysError &log);
27 const std::string &GetSecName()
const {
return m_sec_name;}
28 const std::string &GetErrorMessage()
const {
return m_emsg;}
30 static int verify_before_s(
void *authz_ptr,
31 const unsigned char *pred,
34 static int verify_activity_s(
void *authz_ptr,
35 const unsigned char *pred,
38 static int verify_path_s(
void *authz_ptr,
39 const unsigned char *pred,
42 static int verify_name_s(
void *authz_ptr,
43 const unsigned char *pred,
47 int verify_before(
const unsigned char *pred,
size_t pred_sz);
48 int verify_activity(
const unsigned char *pred,
size_t pred_sz);
49 int verify_path(
const unsigned char *pred,
size_t pred_sz);
50 int verify_name(
const unsigned char *pred,
size_t pred_sz);
52 ssize_t m_max_duration;
55 const std::string m_path;
56 std::string m_desired_activity;
57 std::string m_sec_name;
65 int new_privs = privs;
113int validate_verify_empty(
void *emsg_ptr,
114 const unsigned char *pred,
117 if ((pred_sz >= 5) && (!memcmp(
reinterpret_cast<const char *
>(pred),
"path:", 5) ||
118 !memcmp(
reinterpret_cast<const char *
>(pred),
"name:", 5)))
122 if ((pred_sz >= 9) && (!memcmp(
reinterpret_cast<const char *
>(pred),
"activity:", 9)))
133 : m_max_duration(86400),
135 m_log(log,
"macarons_"),
136 m_authz_behavior(static_cast<int>(
Handler::AuthzBehavior::PASSTHROUGH))
140 if (!
Handler::Config(config, &env, &m_log, m_location, m_secret, m_max_duration, behavior))
142 throw std::runtime_error(
"Macaroon authorization config failed.");
144 m_authz_behavior =
static_cast<int>(behavior);
149Authz::OnMissing(
const XrdSecEntity *Entity,
const char *path,
152 switch (m_authz_behavior) {
172 return m_chain ? m_chain->Access(Entity, path, oper, env) :
XrdAccPriv_None;
175 const char *authz = env ? env->
Get(
"authz") :
nullptr;
176 if (authz && !strncmp(authz,
"Bearer%20", 9))
180 else if (!authz && (authz = env ? env->
Get(
"access_token") :
nullptr) && !strncmp(authz,
"Bearer%20", 9))
186 if (!authz && Entity && !strcmp(
"ztn", Entity->
prot) && Entity->
creds &&
189 authz = Entity->
creds;
193 return OnMissing(Entity, path, oper, env);
196 macaroon_returncode mac_err = MACAROON_SUCCESS;
197 struct macaroon* macaroon = macaroon_deserialize(
204 return OnMissing(Entity, path, oper, env);
207 struct macaroon_verifier *verifier = macaroon_verifier_create();
210 m_log.Emsg(
"Access",
"Failed to create a new macaroon verifier");
215 m_log.Emsg(
"Access",
"Request with no provided path.");
216 macaroon_verifier_destroy(verifier);
220 AuthzCheck check_helper(path, oper, m_max_duration, m_log);
222 if (macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
223 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_activity_s, &check_helper, &mac_err) ||
224 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_name_s, &check_helper, &mac_err) ||
225 macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_path_s, &check_helper, &mac_err))
227 m_log.Emsg(
"Access",
"Failed to configure caveat verifier:");
228 macaroon_verifier_destroy(verifier);
232 const unsigned char *macaroon_loc;
234 macaroon_location(macaroon, &macaroon_loc, &location_sz);
235 if (strncmp(
reinterpret_cast<const char *
>(macaroon_loc), m_location.c_str(), location_sz))
237 std::string location_str(
reinterpret_cast<const char *
>(macaroon_loc), location_sz);
238 m_log.Emsg(
"Access",
"Macaroon is for incorrect location", location_str.c_str());
239 macaroon_verifier_destroy(verifier);
240 macaroon_destroy(macaroon);
241 return m_chain ? m_chain->Access(Entity, path, oper, env) :
XrdAccPriv_None;
244 if (macaroon_verify(verifier, macaroon,
245 reinterpret_cast<const unsigned char *
>(m_secret.c_str()),
250 m_log.Log(
LogMask::Debug,
"Access",
"Macaroon verification failed");
251 macaroon_verifier_destroy(verifier);
252 macaroon_destroy(macaroon);
253 return m_chain ? m_chain->Access(Entity, path, oper, env) :
XrdAccPriv_None;
255 macaroon_verifier_destroy(verifier);
257 const unsigned char *macaroon_id;
259 macaroon_identifier(macaroon, &macaroon_id, &id_sz);
261 std::string macaroon_id_str(
reinterpret_cast<const char *
>(macaroon_id), id_sz);
262 m_log.Log(
LogMask::Info,
"Access",
"Macaroon verification successful; ID", macaroon_id_str.c_str());
263 macaroon_destroy(macaroon);
266 if (Entity && check_helper.GetSecName().size()) {
267 const std::string &username = check_helper.GetSecName();
268 m_log.Log(
LogMask::Debug,
"Access",
"Setting the request name to", username.c_str());
269 Entity->
eaAPI->
Add(
"request.name", username,
true);
281 macaroon_returncode mac_err = MACAROON_SUCCESS;
282 std::unique_ptr<
struct macaroon, decltype(&macaroon_destroy)> macaroon(
283 macaroon_deserialize(token, &mac_err),
288 emsg =
"Failed to deserialize the token as a macaroon";
295 std::unique_ptr<
struct macaroon_verifier, decltype(&macaroon_verifier_destroy)> verifier(
296 macaroon_verifier_create(), &macaroon_verifier_destroy);
299 emsg =
"Internal error: failed to create a verifier.";
305 AuthzCheck check_helper(
"/",
AOP_Read, m_max_duration, m_log);
307 if (macaroon_verifier_satisfy_general(verifier.get(), AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
308 macaroon_verifier_satisfy_general(verifier.get(), validate_verify_empty,
nullptr, &mac_err))
310 emsg =
"Failed to configure the verifier";
315 const unsigned char *macaroon_loc;
317 macaroon_location(macaroon.get(), &macaroon_loc, &location_sz);
318 if (strncmp(
reinterpret_cast<const char *
>(macaroon_loc), m_location.c_str(), location_sz))
320 emsg =
"Macaroon contains incorrect location: " +
321 std::string(
reinterpret_cast<const char *
>(macaroon_loc), location_sz);
322 m_log.Log(
LogMask::Warning,
"Validate",
emsg.c_str(), (
"all.sitename is " + m_location).c_str());
326 if (macaroon_verify(verifier.get(), macaroon.get(),
327 reinterpret_cast<const unsigned char *
>(m_secret.c_str()),
332 emsg =
"Macaroon verification error" + (check_helper.GetErrorMessage().size() ?
333 (
", " + check_helper.GetErrorMessage()) :
"");
338 const unsigned char *macaroon_id;
340 macaroon_identifier(macaroon.get(), &macaroon_id, &id_sz);
341 m_log.Log(
LogMask::Info,
"Validate", (
"Macaroon verification successful; ID " +
342 std::string(
reinterpret_cast<const char *
>(macaroon_id), id_sz)).c_str());
349 : m_max_duration(max_duration),
361 m_desired_activity =
"UPDATE_METADATA";
368 m_desired_activity =
"MANAGE";
373 m_desired_activity =
"UPLOAD";
376 m_desired_activity =
"DELETE";
379 m_desired_activity =
"DOWNLOAD";
382 m_desired_activity =
"LIST";
385 m_desired_activity =
"READ_METADATA";
391AuthzCheck::verify_before_s(
void *authz_ptr,
392 const unsigned char *pred,
395 return static_cast<AuthzCheck*
>(authz_ptr)->verify_before(pred, pred_sz);
400AuthzCheck::verify_activity_s(
void *authz_ptr,
401 const unsigned char *pred,
404 return static_cast<AuthzCheck*
>(authz_ptr)->verify_activity(pred, pred_sz);
409AuthzCheck::verify_path_s(
void *authz_ptr,
410 const unsigned char *pred,
413 return static_cast<AuthzCheck*
>(authz_ptr)->verify_path(pred, pred_sz);
418AuthzCheck::verify_name_s(
void *authz_ptr,
419 const unsigned char *pred,
422 return static_cast<AuthzCheck*
>(authz_ptr)->verify_name(pred, pred_sz);
427AuthzCheck::verify_before(
const unsigned char * pred,
size_t pred_sz)
429 std::string pred_str(
reinterpret_cast<const char *
>(pred), pred_sz);
430 if (strncmp(
"before:", pred_str.c_str(), 7))
434 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"Checking macaroon for expiration; caveat:", pred_str.c_str());
437 if (strptime(&pred_str[7],
"%Y-%m-%dT%H:%M:%SZ", &caveat_tm) ==
nullptr)
439 m_emsg =
"Failed to parse time string: " + pred_str.substr(7);
443 caveat_tm.tm_isdst = -1;
445 time_t caveat_time = timegm(&caveat_tm);
446 if (-1 == caveat_time)
448 m_emsg =
"Failed to generate unix time: " + pred_str.substr(7);
452 if ((m_max_duration > 0) && (caveat_time > m_now + m_max_duration))
454 m_emsg =
"Max token age is greater than configured max duration; rejecting";
459 int result = (m_now >= caveat_time);
462 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"Macaroon has not expired.");
466 m_emsg =
"Macaroon expired at " + pred_str.substr(7);
474AuthzCheck::verify_activity(
const unsigned char * pred,
size_t pred_sz)
476 if (!m_desired_activity.size()) {
return 1;}
477 std::string pred_str(
reinterpret_cast<const char *
>(pred), pred_sz);
478 if (strncmp(
"activity:", pred_str.c_str(), 9)) {
return 1;}
479 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"running verify activity", pred_str.c_str());
481 std::stringstream ss(pred_str.substr(9));
482 for (std::string activity; std::getline(ss, activity,
','); )
485 if (m_desired_activity ==
"READ_METADATA") {
return 0;}
486 if ((activity == m_desired_activity) || ((m_desired_activity ==
"UPLOAD") && (activity ==
"MANAGE")))
488 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"macaroon has desired activity", activity.c_str());
492 m_log.Log(
LogMask::Info,
"AuthzCheck",
"macaroon does NOT have desired activity", m_desired_activity.c_str());
498AuthzCheck::verify_path(
const unsigned char * pred,
size_t pred_sz)
500 std::string pred_str_raw(
reinterpret_cast<const char *
>(pred), pred_sz);
501 if (strncmp(
"path:", pred_str_raw.c_str(), 5)) {
return 1;}
503 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"running verify path", pred_str.c_str());
505 if ((m_path.find(
"/./") != std::string::npos) ||
506 (m_path.find(
"/../") != std::string::npos))
508 m_log.Log(
LogMask::Info,
"AuthzCheck",
"invalid requested path", m_path.c_str());
519 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"path request verified for", m_path.c_str());
528 const char *opName = (m_oper ==
AOP_Stat) ?
"READ_METADATA" :
"MKDIR";
530 (std::string(opName) + (is_subdir?
" Path request verified for" :
" Path request NOT allowed for")).c_str(),
535 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"path request NOT allowed", m_path.c_str());
543AuthzCheck::verify_name(
const unsigned char * pred,
size_t pred_sz)
545 std::string pred_str(
reinterpret_cast<const char *
>(pred), pred_sz);
546 if (strncmp(
"name:", pred_str.c_str(), 5)) {
return 1;}
547 if (pred_str.size() < 6) {
return 1;}
548 m_log.Log(
LogMask::Debug,
"AuthzCheck",
"Verifying macaroon with", pred_str.c_str());
551 m_sec_name = pred_str.substr(5);
Access_Operation
The following are supported operations.
@ AOP_Delete
rm() or rmdir()
@ AOP_Update
open() r/w or append
@ AOP_Create
open() with create
@ AOP_Any
Special for getting privs.
@ AOP_Stat
exists(), stat()
@ AOP_Rename
mv() for source
@ AOP_Read
open() r/o, prepare()
@ AOP_Excl_Create
open() with O_EXCL|O_CREAT
@ AOP_Insert
mv() for target
@ AOP_Excl_Insert
mv() where destination doesn't exist.
static bool is_subdirectory(const std::string_view dir, const std::string_view subdir)
int emsg(int rc, char *msg)
virtual bool Validate(const char *token, std::string &emsg, long long *expT, XrdSecEntity *entP) override
Authz(XrdSysLogger *lp, const char *parms, XrdAccAuthorize *chain)
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *env) override
static bool Config(const char *config, XrdOucEnv *env, XrdSysError *log, std::string &location, std::string &secret, ssize_t &max_duration, AuthzBehavior &behavior)
XrdAccAuthorize()
Constructor.
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *Env=0)=0
char * Get(const char *varname)
bool Add(XrdSecAttr &attr)
int credslen
Length of the 'creds' data.
XrdSecEntityAttr * eaAPI
non-const API to attributes
char prot[XrdSecPROTOIDSIZE]
Auth protocol used (e.g. krb5)
char * creds
Raw entity credentials or cert.
std::string NormalizeSlashes(const std::string &)