blob: 69e5c4de3efa5fdf1be4145c06dd958e921c84b0 [file] [log] [blame] [edit]
/*****************************************************************************\
* slurm_auth.c - implementation-independent authentication API definitions
*****************************************************************************
* Copyright (C) 2002-2007 The Regents of the University of California.
* Copyright (C) 2008-2009 Lawrence Livermore National Security.
* Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
* Written by Jay Windley <jwindley@lnxi.com>
* CODE-OCEC-09-009. All rights reserved.
*
* This file is part of Slurm, a resource management program.
* For details, see <https://slurm.schedmd.com/>.
* Please also read the included file: DISCLAIMER.
*
* Slurm is free software; you can redistribute it and/or modify it under
* the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*
* In addition, as a special exception, the copyright holders give permission
* to link the code of portions of this program with the OpenSSL library under
* certain conditions as described in each individual source file, and
* distribute linked combinations including the two. You must obey the GNU
* General Public License in all respects for all of the code used other than
* OpenSSL. If you modify file(s) with this exception, you may extend this
* exception to your version of the file(s), but you are not obligated to do
* so. If you do not wish to do so, delete this exception statement from your
* version. If you delete this exception statement from all source files in
* the program, then also delete it here.
*
* Slurm is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License along
* with Slurm; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
\*****************************************************************************/
#include <stdlib.h>
#include <string.h>
#include <pthread.h>
#include "src/common/macros.h"
#include "src/common/plugin.h"
#include "src/common/plugrack.h"
#include "src/common/read_config.h"
#include "src/common/slurm_auth.h"
#include "src/common/slurm_protocol_api.h"
#include "src/common/xassert.h"
#include "src/common/xmalloc.h"
#include "src/common/xstring.h"
static bool init_run = false;
typedef struct {
int index;
char data[];
} cred_wrapper_t;
typedef struct {
uint32_t (*plugin_id);
char (*plugin_type);
void * (*create) (char *auth_info);
int (*destroy) (void *cred);
int (*verify) (void *cred, char *auth_info);
uid_t (*get_uid) (void *cred);
gid_t (*get_gid) (void *cred);
char * (*get_host) (void *cred);
int (*pack) (void *cred, Buf buf,
uint16_t protocol_version);
void * (*unpack) (Buf buf, uint16_t protocol_version);
int (*thread_config) (const char *token, const char *username);
void (*thread_clear) (void);
char * (*token_generate) (const char *username, int lifespan);
} slurm_auth_ops_t;
/*
* These strings must be kept in the same order as the fields
* declared for slurm_auth_ops_t.
*/
static const char *syms[] = {
"plugin_id",
"plugin_type",
"slurm_auth_create",
"slurm_auth_destroy",
"slurm_auth_verify",
"slurm_auth_get_uid",
"slurm_auth_get_gid",
"slurm_auth_get_host",
"slurm_auth_pack",
"slurm_auth_unpack",
"slurm_auth_thread_config",
"slurm_auth_thread_clear",
"slurm_auth_token_generate",
};
/*
* A global authentication context. "Global" in the sense that there's
* only one, with static bindings. We don't export it.
*/
static slurm_auth_ops_t *ops = NULL;
static plugin_context_t **g_context = NULL;
static int g_context_num = -1;
static pthread_mutex_t context_lock = PTHREAD_MUTEX_INITIALIZER;
extern int slurm_auth_init(char *auth_type)
{
int retval = SLURM_SUCCESS;
char *auth_alt_types = NULL, *list = NULL;
char *auth_plugin_type = NULL, *type, *last = NULL;
char *plugin_type = "auth";
static bool daemon_run = false, daemon_set = false;
if (init_run && (g_context_num > 0))
return retval;
slurm_mutex_lock(&context_lock);
if (g_context_num > 0)
goto done;
if (getenv("SLURM_JWT")) {
slurm_set_auth_type("auth/jwt");
} else if (auth_type)
slurm_set_auth_type(auth_type);
type = auth_plugin_type = slurm_get_auth_type();
if (run_in_daemon(&daemon_run, &daemon_set, "slurmctld,slurmdbd"))
list = auth_alt_types = slurm_get_auth_alt_types();
g_context_num = 0;
if (!auth_plugin_type || auth_plugin_type[0] == '\0')
goto done;
/*
* This loop construct ensures that the AuthType is in position zero
* of the ops and g_context arrays, followed by any AuthAltTypes that
* have been defined. This ensures that the most common type is found
* first in g_slurm_auth_unpack(), and that we can default to
* the zeroth element rather than tracking the primary plugin
* through some other index.
* One other side effect is that the AuthAltTypes are permitted to
* be comma separated, vs. AuthType which can have only one value.
*/
while (type) {
xrecalloc(ops, g_context_num + 1, sizeof(slurm_auth_ops_t));
xrecalloc(g_context, g_context_num + 1,
sizeof(plugin_context_t));
g_context[g_context_num] = plugin_context_create(
plugin_type, type, (void **)&ops[g_context_num],
syms, sizeof(syms));
if (!g_context[g_context_num]) {
error("cannot create %s context for %s", plugin_type, type);
retval = SLURM_ERROR;
goto done;
}
g_context_num++;
if (auth_alt_types) {
type = strtok_r(list, ",", &last);
list = NULL; /* for next iteration */
} else {
type = NULL;
}
}
init_run = true;
done:
xfree(auth_plugin_type);
xfree(auth_alt_types);
slurm_mutex_unlock(&context_lock);
return retval;
}
/* Release all global memory associated with the plugin */
extern int slurm_auth_fini(void)
{
int i, rc = SLURM_SUCCESS, rc2;
slurm_mutex_lock(&context_lock);
if (!g_context)
goto done;
init_run = false;
for (i = 0; i < g_context_num; i++) {
rc2 = plugin_context_destroy(g_context[i]);
if (rc2) {
debug("%s: %s: %s",
__func__, g_context[i]->type,
slurm_strerror(rc2));
rc = SLURM_ERROR;
}
}
xfree(ops);
xfree(g_context);
g_context_num = -1;
done:
slurm_mutex_unlock(&context_lock);
return rc;
}
/*
* Retrieve the auth_index corresponding to the authentication
* plugin used to create a given credential.
*
* Note that this works because all plugin credential types
* are required to store the auth_index as an int first in their
* internal (opaque) structures.
*
* The cast through cred_wrapper_t then gives us convenient access
* to that auth_index value.
*/
int slurm_auth_index(void *cred)
{
cred_wrapper_t *wrapper = (cred_wrapper_t *) cred;
if (wrapper)
return wrapper->index;
return 0;
}
/*
* Static bindings for the global authentication context. The test
* of the function pointers is omitted here because the global
* context initialization includes a test for the completeness of
* the API function dispatcher.
*/
void *g_slurm_auth_create(int index, char *auth_info)
{
cred_wrapper_t *cred;
if (slurm_auth_init(NULL) < 0)
return NULL;
cred = (*(ops[index].create))(auth_info);
if (cred)
cred->index = index;
return cred;
}
int g_slurm_auth_destroy(void *cred)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return SLURM_ERROR;
return (*(ops[wrap->index].destroy))(cred);
}
int g_slurm_auth_verify(void *cred, char *auth_info)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return SLURM_ERROR;
return (*(ops[wrap->index].verify))(cred, auth_info);
}
uid_t g_slurm_auth_get_uid(void *cred)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return SLURM_AUTH_NOBODY;
return (*(ops[wrap->index].get_uid))(cred);
}
gid_t g_slurm_auth_get_gid(void *cred)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return SLURM_AUTH_NOBODY;
return (*(ops[wrap->index].get_gid))(cred);
}
char *g_slurm_auth_get_host(void *cred)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return NULL;
return (*(ops[wrap->index].get_host))(cred);
}
int g_slurm_auth_pack(void *cred, Buf buf, uint16_t protocol_version)
{
cred_wrapper_t *wrap = (cred_wrapper_t *) cred;
if (!wrap || slurm_auth_init(NULL) < 0)
return SLURM_ERROR;
if (protocol_version >= SLURM_19_05_PROTOCOL_VERSION) {
pack32(*ops[wrap->index].plugin_id, buf);
return (*(ops[wrap->index].pack))(cred, buf, protocol_version);
} else if (protocol_version >= SLURM_MIN_PROTOCOL_VERSION) {
packstr(ops[wrap->index].plugin_type, buf);
/*
* This next field was packed with plugin_version within each
* individual auth plugin, but upon unpack was never checked
* against anything. Rather than expose the protocol_version
* symbol, just pack a zero here instead.
*/
pack32(0, buf);
return (*(ops[wrap->index].pack))(cred, buf, protocol_version);
} else {
error("%s: protocol_version %hu not supported",
__func__, protocol_version);
return SLURM_ERROR;
}
}
void *g_slurm_auth_unpack(Buf buf, uint16_t protocol_version)
{
uint32_t plugin_id = 0;
cred_wrapper_t *cred;
if (!buf || slurm_auth_init(NULL) < 0)
return NULL;
if (protocol_version >= SLURM_19_05_PROTOCOL_VERSION) {
safe_unpack32(&plugin_id, buf);
for (int i = 0; i < g_context_num; i++) {
if (plugin_id == *(ops[i].plugin_id)) {
cred = (*(ops[i].unpack))(buf,
protocol_version);
if (cred)
cred->index = i;
return cred;
}
}
error("%s: remote plugin_id %u not found",
__func__, plugin_id);
return NULL;
} else if (protocol_version >= SLURM_MIN_PROTOCOL_VERSION) {
char *plugin_type;
uint32_t uint32_tmp, version;
safe_unpackmem_ptr(&plugin_type, &uint32_tmp, buf);
safe_unpack32(&version, buf);
for (int i = 0; i < g_context_num; i++) {
if (!xstrcmp(plugin_type, ops[i].plugin_type)) {
cred = (*(ops[i].unpack))(buf,
protocol_version);
if (cred)
cred->index = i;
return cred;
}
}
error("%s: remote plugin_type %s not found",
__func__, plugin_type);
return NULL;
} else {
error("%s: protocol_version %hu not supported",
__func__, protocol_version);
return NULL;
}
unpack_error:
return NULL;
}
int g_slurm_auth_thread_config(const char *token, const char *username)
{
if (slurm_auth_init(NULL) < 0)
return SLURM_ERROR;
return (*(ops[0].thread_config))(token, username);
}
void g_slurm_auth_thread_clear(void)
{
if (slurm_auth_init(NULL) < 0)
return;
(*(ops[0].thread_clear))();
}
char *g_slurm_auth_token_generate(int plugin_id, const char *username,
int lifespan)
{
if (slurm_auth_init(NULL) < 0)
return NULL;
for (int i = 0; i < g_context_num; i++) {
if (plugin_id == *(ops[i].plugin_id)) {
return (*(ops[i].token_generate))(username, lifespan);
}
}
return NULL;
}