blob: 570c5288d0adfc5c4d01015c2db7a02e1d83e440 [file] [log] [blame]
/*****************************************************************************\
* auth.c - implementation-independent authentication API definitions
*****************************************************************************
* Copyright (C) 2002-2007 The Regents of the University of California.
* Copyright (C) 2008-2009 Lawrence Livermore National Security.
* Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
* Written by Jay Windley <jwindley@lnxi.com>
* CODE-OCEC-09-009. All rights reserved.
*
* This file is part of Slurm, a resource management program.
* For details, see <https://slurm.schedmd.com/>.
* Please also read the included file: DISCLAIMER.
*
* Slurm is free software; you can redistribute it and/or modify it under
* the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*
* In addition, as a special exception, the copyright holders give permission
* to link the code of portions of this program with the OpenSSL library under
* certain conditions as described in each individual source file, and
* distribute linked combinations including the two. You must obey the GNU
* General Public License in all respects for all of the code used other than
* OpenSSL. If you modify file(s) with this exception, you may extend this
* exception to your version of the file(s), but you are not obligated to do
* so. If you do not wish to do so, delete this exception statement from your
* version. If you delete this exception statement from all source files in
* the program, then also delete it here.
*
* Slurm is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License along
* with Slurm; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
\*****************************************************************************/
#include <pthread.h>
#include <stdlib.h>
#include <string.h>
#include <sys/socket.h>
#include "src/common/macros.h"
#include "src/common/plugin.h"
#include "src/common/plugrack.h"
#include "src/common/read_config.h"
#include "src/common/slurm_protocol_api.h"
#include "src/common/util-net.h"
#include "src/common/xassert.h"
#include "src/common/xmalloc.h"
#include "src/common/xstring.h"
#include "src/interfaces/auth.h"
#include "src/interfaces/conn.h"
typedef struct {
int index;
char data[];
} cred_wrapper_t;
typedef struct {
uint32_t (*plugin_id);
char (*plugin_type);
bool (*hash_enable);
void * (*create) (char *auth_info, uid_t r_uid,
void *data, int dlen);
void (*destroy) (void *cred);
int (*verify) (void *cred, char *auth_info);
void (*get_ids) (void *cred, uid_t *uid, gid_t *gid);
char * (*get_host) (void *cred);
int (*get_data) (void *cred, char **data,
uint32_t *len);
void * (*get_identity) (void *cred);
int (*pack) (void *cred, buf_t *buf,
uint16_t protocol_version);
void * (*unpack) (buf_t *buf, uint16_t protocol_version);
int (*thread_config) (const char *token, const char *username);
void (*thread_clear) (void);
char * (*token_generate) (const char *username, int lifespan);
int (*get_reconfig_fd)(void);
} auth_ops_t;
/*
* These strings must be kept in the same order as the fields
* declared for auth_ops_t.
*/
static const char *syms[] = {
"plugin_id",
"plugin_type",
"hash_enable",
"auth_p_create",
"auth_p_destroy",
"auth_p_verify",
"auth_p_get_ids",
"auth_p_get_host",
"auth_p_get_data",
"auth_p_get_identity",
"auth_p_pack",
"auth_p_unpack",
"auth_p_thread_config",
"auth_p_thread_clear",
"auth_p_token_generate",
"auth_p_get_reconfig_fd",
};
typedef struct {
int plugin_id;
char *type;
} auth_plugin_types_t;
auth_plugin_types_t auth_plugin_types[] = {
{ AUTH_PLUGIN_NONE, "auth/none" },
{ AUTH_PLUGIN_MUNGE, "auth/munge" },
{ AUTH_PLUGIN_JWT, "auth/jwt" },
{ AUTH_PLUGIN_SLURM, "auth/slurm" },
};
/*
* A global authentication context. "Global" in the sense that there's
* only one, with static bindings. We don't export it.
*/
static auth_ops_t *ops = NULL;
static plugin_context_t **g_context = NULL;
static int g_context_num = -1;
static pthread_rwlock_t context_lock = PTHREAD_RWLOCK_INITIALIZER;
static bool at_forked = false;
static bool externally_locked = false;
static void _atfork_child()
{
slurm_rwlock_init(&context_lock);
/*
* If we're in _drop_privileges() when we fork we need to hold the lock
* in the child process to prevent any other auth plugin calls until
* _reclaim_privileges(). However, for rwlocks, you cannot simply call
* slurm_rwlock_unlock() in the pthread_atfork() child handler -
* testing demonstrated that this won't unlock and you'll be deadlocked
* on the next lock acquisition.
*
* (This does work for slurm_mutex_unlock() - as is used in other
* pthread_atfork() child handlers within Slurm. This appears to be
* something specific to pthread_rwlock_t's construction.)
*
* Instead, reacquire the lock immediately after the
* slurm_rwlock_init() call. Since we're in the child process here, the
* eventual _reclaim_privileges() call to auth_setuid_unlock() will
* behave as expected.
*/
if (externally_locked)
slurm_rwlock_wrlock(&context_lock);
}
extern const char *auth_get_plugin_name(int plugin_id)
{
for (int i = 0; i < ARRAY_SIZE(auth_plugin_types); i++)
if (plugin_id == auth_plugin_types[i].plugin_id)
return auth_plugin_types[i].type;
return "unknown";
}
extern bool slurm_get_plugin_hash_enable(int index)
{
xassert(g_context_num > 0);
if (g_context_num <= 0)
fatal("No hash plugins loaded. Was slurm_init() called before calling any Slurm API functions?");
return *(ops[index].hash_enable);
}
extern bool auth_is_plugin_type_inited(int plugin_id)
{
for (int i = 0; i < g_context_num; i++)
if (plugin_id == *(ops[i].plugin_id))
return true;
return false;
}
extern int auth_g_init(void)
{
int retval = SLURM_SUCCESS;
char *auth_alt_types = NULL, *list = NULL;
char *type, *last = NULL;
char *plugin_type = "auth";
slurm_rwlock_wrlock(&context_lock);
if (g_context_num > 0)
goto done;
if (getenv("SLURM_JWT")) {
xfree(slurm_conf.authtype);
slurm_conf.authtype = xstrdup(
auth_get_plugin_name(AUTH_PLUGIN_JWT));
}
if (getenv("SLURM_SACK_KEY") || getenv("SLURM_SACK_JWKS")) {
xfree(slurm_conf.authtype);
slurm_conf.authtype = xstrdup(
auth_get_plugin_name(AUTH_PLUGIN_SLURM));
}
type = slurm_conf.authtype;
if (!type || type[0] == '\0')
goto done;
if (run_in_daemon(IS_SLURMCTLD | IS_SLURMDBD))
list = auth_alt_types = xstrdup(slurm_conf.authalttypes);
g_context_num = 0;
/*
* This loop construct ensures that the AuthType is in position zero
* of the ops and g_context arrays, followed by any AuthAltTypes that
* have been defined. This ensures that the most common type is found
* first in auth_g_unpack(), and that we can default to
* the zeroth element rather than tracking the primary plugin
* through some other index.
* One other side effect is that the AuthAltTypes are permitted to
* be comma separated, vs. AuthType which can have only one value.
*/
while (type) {
xrecalloc(ops, g_context_num + 1, sizeof(auth_ops_t));
xrecalloc(g_context, g_context_num + 1,
sizeof(plugin_context_t));
if (!xstrncmp(type, "auth/", 5))
type += 5;
type = xstrdup_printf("auth/%s", type);
g_context[g_context_num] = plugin_context_create(
plugin_type, type, (void **)&ops[g_context_num],
syms, sizeof(syms));
if (!g_context[g_context_num]) {
error("cannot create %s context for %s", plugin_type, type);
retval = SLURM_ERROR;
xfree(type);
goto done;
}
g_context_num++;
xfree(type);
if (auth_alt_types) {
type = strtok_r(list, ",", &last);
list = NULL; /* for next iteration */
}
}
done:
if (!at_forked) {
pthread_atfork(NULL, NULL, _atfork_child);
at_forked = true;
}
xfree(auth_alt_types);
slurm_rwlock_unlock(&context_lock);
return retval;
}
/* Release all global memory associated with the plugin */
extern int auth_g_fini(void)
{
int i, rc = SLURM_SUCCESS, rc2;
slurm_rwlock_wrlock(&context_lock);
if (!g_context)
goto done;
for (i = 0; i < g_context_num; i++) {
rc2 = plugin_context_destroy(g_context[i]);
if (rc2) {
debug("%s: %s: %s",
__func__, g_context[i]->type,
slurm_strerror(rc2));
rc = SLURM_ERROR;
}
}
xfree(ops);
xfree(g_context);
g_context_num = -1;
done:
slurm_rwlock_unlock(&context_lock);
return rc;
}
/*
* Retrieve the auth_index corresponding to the authentication
* plugin used to create a given credential.
*
* Note that this works because all plugin credential types
* are required to store the auth_index as an int first in their
* internal (opaque) structures.
*
* The cast through cred_wrapper_t then gives us convenient access
* to that auth_index value.
*/
extern int auth_index(void *cred)
{
cred_wrapper_t *wrapper = cred;
if (wrapper)
return wrapper->index;
return 0;
}
extern void auth_setuid_lock(void)
{
slurm_rwlock_wrlock(&context_lock);
/*
* If running under _drop_privileges(), we want the locked state
* to persist after fork() as it is still not safe to use the
* rest of the auth API until after _reclaim_privileges().
*/
externally_locked = true;
}
extern void auth_setuid_unlock(void)
{
externally_locked = false;
slurm_rwlock_unlock(&context_lock);
}
/*
* Static bindings for the global authentication context. The test
* of the function pointers is omitted here because the global
* context initialization includes a test for the completeness of
* the API function dispatcher.
*/
void *auth_g_create(int index, char *auth_info, uid_t r_uid,
void *data, int dlen)
{
cred_wrapper_t *cred;
xassert(g_context_num > 0);
if (r_uid == SLURM_AUTH_NOBODY)
return NULL;
slurm_rwlock_rdlock(&context_lock);
cred = (*(ops[index].create))(auth_info, r_uid, data, dlen);
slurm_rwlock_unlock(&context_lock);
if (cred)
cred->index = index;
return cred;
}
extern void auth_g_destroy(void *cred)
{
cred_wrapper_t *wrap = cred;
xassert(g_context_num > 0);
if (!wrap)
return;
(*(ops[wrap->index].destroy))(cred);
}
extern int auth_g_verify(void *cred, char *auth_info)
{
int rc = SLURM_ERROR;
cred_wrapper_t *wrap = cred;
xassert(g_context_num > 0);
if (!wrap)
return SLURM_ERROR;
slurm_rwlock_rdlock(&context_lock);
rc = (*(ops[wrap->index].verify))(cred, auth_info);
slurm_rwlock_unlock(&context_lock);
return rc;
}
extern void auth_g_get_ids(void *cred, uid_t *uid, gid_t *gid)
{
cred_wrapper_t *wrap = cred;
xassert(g_context_num > 0);
*uid = SLURM_AUTH_NOBODY;
*gid = SLURM_AUTH_NOBODY;
if (!wrap)
return;
slurm_rwlock_rdlock(&context_lock);
(*(ops[wrap->index].get_ids))(cred, uid, gid);
slurm_rwlock_unlock(&context_lock);
}
extern uid_t auth_g_get_uid(void *cred)
{
cred_wrapper_t *wrap = cred;
uid_t uid = SLURM_AUTH_NOBODY;
gid_t gid = SLURM_AUTH_NOBODY;
xassert(g_context_num > 0);
if (!wrap)
return SLURM_AUTH_NOBODY;
slurm_rwlock_rdlock(&context_lock);
(*(ops[wrap->index].get_ids))(cred, &uid, &gid);
slurm_rwlock_unlock(&context_lock);
return uid;
}
extern char *auth_g_get_host(void *slurm_msg)
{
slurm_msg_t *msg = slurm_msg;
slurm_addr_t *addr = &msg->address;
cred_wrapper_t *wrap = NULL;
char *host = NULL;
xassert(g_context_num > 0);
if (!msg || !(wrap = msg->auth_cred))
return NULL;
slurm_rwlock_rdlock(&context_lock);
host = (*(ops[wrap->index].get_host))(wrap);
slurm_rwlock_unlock(&context_lock);
if (host) {
debug3("%s: using auth token: %s", __func__, host);
return host;
}
if (msg->conn && msg->conn->rem_host) {
/* use remote host name if persistent connection */
host = xstrdup(msg->conn->rem_host);
debug3("%s: using remote hostname: %s", __func__, host);
return host;
}
if (addr->ss_family == AF_UNSPEC) {
int rc;
int fd = conn_g_get_fd(msg->tls_conn);
if ((rc = slurm_get_peer_addr(fd, addr))) {
error("%s: [fd:%d] unable to determine socket remote host: %s",
__func__, fd, slurm_strerror(rc));
return NULL;
}
xassert(addr->ss_family != AF_UNSPEC);
}
/* use remote host IP, then look it up */
if ((host = xgetnameinfo(addr))) {
debug3("%s: looked up from connection's IP address: %s",
__func__, host);
} else {
host = xmalloc(INET6_ADDRSTRLEN);
slurm_get_ip_str(addr, host, INET6_ADDRSTRLEN);
debug3("%s: using connection's IP address: %s", __func__, host);
}
return host;
}
extern int auth_g_get_data(void *cred, char **data, uint32_t *len)
{
cred_wrapper_t *wrap = cred;
int rc = SLURM_ERROR;
xassert(g_context_num > 0);
if (!wrap)
return SLURM_ERROR;
slurm_rwlock_rdlock(&context_lock);
rc = (*(ops[wrap->index].get_data))(cred, data, len);
slurm_rwlock_unlock(&context_lock);
return rc;
}
extern void *auth_g_get_identity(void *cred)
{
cred_wrapper_t *wrap = cred;
void *id = NULL;
xassert(g_context_num > 0);
if (!wrap)
return NULL;
slurm_rwlock_rdlock(&context_lock);
id = (*(ops[wrap->index].get_identity))(cred);
slurm_rwlock_unlock(&context_lock);
return id;
}
extern int auth_g_pack(void *cred, buf_t *buf, uint16_t protocol_version)
{
cred_wrapper_t *wrap = cred;
xassert(g_context_num > 0);
if (!wrap)
return SLURM_ERROR;
if (protocol_version >= SLURM_MIN_PROTOCOL_VERSION) {
pack32(*ops[wrap->index].plugin_id, buf);
return (*(ops[wrap->index].pack))(cred, buf, protocol_version);
} else {
error("%s: protocol_version %hu not supported",
__func__, protocol_version);
return SLURM_ERROR;
}
}
extern void *auth_g_unpack(buf_t *buf, uint16_t protocol_version)
{
uint32_t plugin_id = 0;
cred_wrapper_t *cred;
xassert(g_context_num > 0);
if (!buf)
return NULL;
if (protocol_version >= SLURM_MIN_PROTOCOL_VERSION) {
safe_unpack32(&plugin_id, buf);
for (int i = 0; i < g_context_num; i++) {
if (plugin_id == *(ops[i].plugin_id)) {
cred = (*(ops[i].unpack))(buf,
protocol_version);
if (cred)
cred->index = i;
return cred;
}
}
error("%s: authentication plugin %s(%u) not found",
__func__, auth_get_plugin_name(plugin_id), plugin_id);
return NULL;
} else {
error("%s: protocol_version %hu not supported",
__func__, protocol_version);
return NULL;
}
unpack_error:
return NULL;
}
extern int auth_g_thread_config(const char *token, const char *username)
{
int rc = SLURM_SUCCESS;
xassert(g_context_num > 0);
slurm_rwlock_rdlock(&context_lock);
rc = (*(ops[0].thread_config))(token, username);
slurm_rwlock_unlock(&context_lock);
return rc;
}
extern void auth_g_thread_clear(void)
{
xassert(g_context_num > 0);
slurm_rwlock_rdlock(&context_lock);
(*(ops[0].thread_clear))();
slurm_rwlock_unlock(&context_lock);
}
extern char *auth_g_token_generate(int plugin_id, const char *username,
int lifespan)
{
char *token = NULL;
xassert(g_context_num > 0);
slurm_rwlock_rdlock(&context_lock);
for (int i = 0; i < g_context_num; i++) {
if (plugin_id == *(ops[i].plugin_id)) {
token = (*(ops[i].token_generate))(username, lifespan);
break;
}
}
slurm_rwlock_unlock(&context_lock);
return token;
}
extern int auth_g_get_reconfig_fd(int plugin_id)
{
int fd = -1;
xassert(g_context_num > 0);
slurm_rwlock_rdlock(&context_lock);
for (int i = 0; i < g_context_num; i++) {
if (plugin_id == *(ops[i].plugin_id)) {
fd = (*(ops[i].get_reconfig_fd))();
break;
}
}
slurm_rwlock_unlock(&context_lock);
return fd;
}