ipa_hbac_rules.c revision 83bf46f4066e3d5e838a32357c201de9bd6ecdfd
/*
SSSD
Authors:
Stephen Gallagher <sgallagh@redhat.com>
Copyright (C) 2011 Red Hat
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "util/util.h"
#include "providers/ipa/ipa_hbac_private.h"
#include "providers/ipa/ipa_hbac_rules.h"
#include "providers/ldap/sdap_async.h"
struct ipa_hbac_rule_state {
struct tevent_context *ev;
struct sdap_handle *sh;
struct sdap_options *opts;
int search_base_iter;
struct sdap_search_base **search_bases;
const char **attrs;
char *rules_filter;
char *cur_filter;
size_t rule_count;
struct sysdb_attrs **rules;
};
static errno_t
ipa_hbac_rule_info_next(struct tevent_req *req,
struct ipa_hbac_rule_state *state);
static void
ipa_hbac_rule_info_done(struct tevent_req *subreq);
struct tevent_req *
ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
bool get_deny_rules,
struct tevent_context *ev,
struct sdap_handle *sh,
struct sdap_options *opts,
struct sdap_search_base **search_bases,
struct sysdb_attrs *ipa_host)
{
errno_t ret;
size_t i;
struct tevent_req *req = NULL;
struct ipa_hbac_rule_state *state;
TALLOC_CTX *tmp_ctx;
const char *host_dn;
char *host_dn_clean;
char *host_group_clean;
char *rule_filter;
const char **memberof_list;
if (ipa_host == NULL) {
DEBUG(SSSDBG_CRIT_FAILURE, "Missing host\n");
return NULL;
}
tmp_ctx = talloc_new(mem_ctx);
if (tmp_ctx == NULL) return NULL;
ret = sysdb_attrs_get_string(ipa_host, SYSDB_ORIG_DN, &host_dn);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE, "Could not identify IPA hostname\n");
goto error;
}
ret = sss_filter_sanitize(tmp_ctx, host_dn, &host_dn_clean);
if (ret != EOK) goto error;
req = tevent_req_create(mem_ctx, &state, struct ipa_hbac_rule_state);
if (req == NULL) {
DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create failed.\n");
return NULL;
}
state->ev = ev;
state->sh = sh;
state->opts = opts;
state->search_bases = search_bases;
state->search_base_iter = 0;
state->attrs = talloc_zero_array(state, const char *, 15);
if (state->attrs == NULL) {
ret = ENOMEM;
goto immediate;
}
state->attrs[0] = OBJECTCLASS;
state->attrs[1] = IPA_CN;
state->attrs[2] = IPA_UNIQUE_ID;
state->attrs[3] = IPA_ENABLED_FLAG;
state->attrs[4] = IPA_ACCESS_RULE_TYPE;
state->attrs[5] = IPA_MEMBER_USER;
state->attrs[6] = IPA_USER_CATEGORY;
state->attrs[7] = IPA_MEMBER_SERVICE;
state->attrs[8] = IPA_SERVICE_CATEGORY;
state->attrs[9] = IPA_SOURCE_HOST;
state->attrs[10] = IPA_SOURCE_HOST_CATEGORY;
state->attrs[11] = IPA_EXTERNAL_HOST;
state->attrs[12] = IPA_MEMBER_HOST;
state->attrs[13] = IPA_HOST_CATEGORY;
state->attrs[14] = NULL;
if (get_deny_rules) {
rule_filter = talloc_asprintf(tmp_ctx,
"(&(objectclass=%s)"
"(%s=%s)(|(%s=%s)(%s=%s)",
IPA_HBAC_RULE,
IPA_ENABLED_FLAG, IPA_TRUE_VALUE,
IPA_HOST_CATEGORY, "all",
IPA_MEMBER_HOST, host_dn_clean);
} else {
rule_filter = talloc_asprintf(tmp_ctx,
"(&(objectclass=%s)"
"(%s=%s)(%s=%s)"
"(|(%s=%s)(%s=%s)",
IPA_HBAC_RULE,
IPA_ENABLED_FLAG, IPA_TRUE_VALUE,
IPA_ACCESS_RULE_TYPE, IPA_HBAC_ALLOW,
IPA_HOST_CATEGORY, "all",
IPA_MEMBER_HOST, host_dn_clean);
}
if (rule_filter == NULL) {
ret = ENOMEM;
goto immediate;
}
/* Add all parent groups of ipa_hostname to the filter */
ret = sysdb_attrs_get_string_array(ipa_host, SYSDB_ORIG_MEMBEROF,
tmp_ctx, &memberof_list);
if (ret != EOK && ret != ENOENT) {
DEBUG(SSSDBG_CRIT_FAILURE, "Could not identify ");
} if (ret == ENOENT) {
/* This host is not a member of any hostgroups */
memberof_list = talloc_array(tmp_ctx, const char *, 1);
if (memberof_list == NULL) {
ret = ENOMEM;
goto immediate;
}
memberof_list[0] = NULL;
}
for (i = 0; memberof_list[i]; i++) {
ret = sss_filter_sanitize(tmp_ctx,
memberof_list[i],
&host_group_clean);
if (ret != EOK) goto immediate;
rule_filter = talloc_asprintf_append(rule_filter, "(%s=%s)",
IPA_MEMBER_HOST,
host_group_clean);
if (rule_filter == NULL) {
ret = ENOMEM;
goto immediate;
}
}
rule_filter = talloc_asprintf_append(rule_filter, "))");
if (rule_filter == NULL) {
ret = ENOMEM;
goto immediate;
}
state->rules_filter = talloc_steal(state, rule_filter);
ret = ipa_hbac_rule_info_next(req, state);
if (ret == EOK) {
ret = EINVAL;
}
if (ret != EAGAIN) {
goto immediate;
}
talloc_free(tmp_ctx);
return req;
immediate:
if (ret == EOK) {
tevent_req_done(req);
} else {
tevent_req_error(req, ret);
}
tevent_req_post(req, ev);
talloc_free(tmp_ctx);
return req;
error:
talloc_free(tmp_ctx);
return NULL;
}
static errno_t
ipa_hbac_rule_info_next(struct tevent_req *req,
struct ipa_hbac_rule_state *state)
{
struct tevent_req *subreq;
struct sdap_search_base *base;
base = state->search_bases[state->search_base_iter];
if (base == NULL) {
return EOK;
}
talloc_zfree(state->cur_filter);
state->cur_filter = sdap_get_id_specific_filter(state,
state->rules_filter,
base->filter);
if (state->cur_filter == NULL) {
return ENOMEM;
}
DEBUG(SSSDBG_TRACE_FUNC, "Sending request for next search base: "
"[%s][%d][%s]\n", base->basedn, base->scope,
state->cur_filter);
subreq = sdap_get_generic_send(state, state->ev, state->opts, state->sh,
base->basedn, base->scope,
state->cur_filter, state->attrs,
NULL, 0,
dp_opt_get_int(state->opts->basic,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
DEBUG(SSSDBG_CRIT_FAILURE, "sdap_get_generic_send failed.\n");
return ENOMEM;
}
tevent_req_set_callback(subreq, ipa_hbac_rule_info_done, req);
return EAGAIN;
}
static void
ipa_hbac_rule_info_done(struct tevent_req *subreq)
{
errno_t ret;
struct tevent_req *req =
tevent_req_callback_data(subreq, struct tevent_req);
struct ipa_hbac_rule_state *state =
tevent_req_data(req, struct ipa_hbac_rule_state);
int i;
size_t rule_count;
size_t total_count;
struct sysdb_attrs **rules;
struct sysdb_attrs **target;
ret = sdap_get_generic_recv(subreq, state,
&rule_count,
&rules);
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE, "Could not retrieve HBAC rules\n");
goto fail;
}
if (rule_count > 0) {
total_count = rule_count + state->rule_count;
state->rules = talloc_realloc(state, state->rules,
struct sysdb_attrs *,
total_count);
if (state->rules == NULL) {
ret = ENOMEM;
goto fail;
}
i = 0;
while (state->rule_count < total_count) {
target = &state->rules[state->rule_count];
*target = talloc_steal(state->rules, rules[i]);
state->rule_count++;
i++;
}
}
state->search_base_iter++;
ret = ipa_hbac_rule_info_next(req, state);
if (ret == EAGAIN) {
return;
} else if (ret != EOK) {
goto fail;
} else if (ret == EOK && state->rule_count == 0) {
DEBUG(SSSDBG_MINOR_FAILURE, "No rules apply to this host\n");
tevent_req_error(req, ENOENT);
return;
}
/* We went through all search bases and we have some results */
tevent_req_done(req);
return;
fail:
tevent_req_error(req, ret);
}
errno_t
ipa_hbac_rule_info_recv(struct tevent_req *req,
TALLOC_CTX *mem_ctx,
size_t *rule_count,
struct sysdb_attrs ***rules)
{
struct ipa_hbac_rule_state *state =
tevent_req_data(req, struct ipa_hbac_rule_state);
TEVENT_REQ_RETURN_ON_ERROR(req);
*rule_count = state->rule_count;
*rules = talloc_steal(mem_ctx, state->rules);
return EOK;
}