1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
|
# Wallet::ACL -- Implementation of ACLs in the wallet system.
# $Id$
#
# Written by Russ Allbery <rra@stanford.edu>
# Copyright 2007 Board of Trustees, Leland Stanford Jr. University
#
# See README for licensing terms.
##############################################################################
# Modules and declarations
##############################################################################
package Wallet::ACL;
require 5.006;
use strict;
use vars qw(%MAPPING $VERSION);
use DBI;
use Wallet::ACL::Krb5;
# This version should be increased on any code change to this module. Always
# use two digits for the minor version with a leading zero if necessary so
# that it will sort properly.
$VERSION = '0.01';
# This is a mapping of schemes to class names, used to determine which ACL
# verifier should be instantiated for a given ACL scheme. Currently, there's
# no dynamic way to recognize new ACL verifiers, so if you extend the wallet
# system to add new verifiers, you need to modify this list.
%MAPPING = (krb5 => 'Wallet::ACL::Krb5');
##############################################################################
# Constructors
##############################################################################
# Initialize a new ACL from the database. Verify that the ACL already exists
# in the database and, if so, return a new blessed object. Stores the ACL ID
# and the database handle to use for future operations. If the object
# doesn't exist, throws an exception.
sub new {
my ($class, $id, $dbh) = @_;
$dbh->{AutoCommit} = 0;
$dbh->{RaiseError} = 1;
$dbh->{PrintError} = 0;
my ($sql, $data, $name);
if ($id =~ /^\d+\z/) {
$sql = 'select ac_id, ac_name from acls where ac_id = ?';
} else {
$sql = 'select ac_id, ac_name from acls where ac_name = ?';
}
($data, $name) = eval { $dbh->selectrow_array ($sql, undef, $id) };
if ($@) {
die "cannot search for ACL $id: $@\n";
} elsif (not defined $data) {
die "ACL $id not found\n";
}
my $self = {
dbh => $dbh,
id => $data,
name => $name,
};
bless ($self, $class);
return $self;
}
# Create a new ACL in the database with the given name and return a new
# blessed ACL object for it. Stores the database handle to use and the ID of
# the newly created ACL in the object. On failure, throws an exception.
sub create {
my ($class, $name, $dbh, $user, $host, $time) = @_;
if ($name =~ /^\d+\z/) {
die "ACL name may not be all numbers\n";
}
$dbh->{AutoCommit} = 0;
$dbh->{RaiseError} = 1;
$dbh->{PrintError} = 0;
$time ||= time;
my $id;
eval {
my $sql = 'insert into acls (ac_name) values (?)';
$dbh->do ($sql, undef, $name);
$id = $dbh->last_insert_id (undef, undef, 'acls', 'ac_id');
die "unable to retrieve new ACL ID" unless defined $id;
$sql = "insert into acl_history (ah_acl, ah_action, ah_by, ah_from,
ah_on) values (?, 'create', ?, ?, ?)";
$dbh->do ($sql, undef, $id, $user, $host, $time);
$dbh->commit;
};
if ($@) {
$dbh->rollback;
die "cannot create ACL $name: $@\n";
}
my $self = {
dbh => $dbh,
id => $id,
name => $name,
};
bless ($self, $class);
return $self;
}
##############################################################################
# Utility functions
##############################################################################
# Returns the current error message of the object, if any.
sub error {
my ($self) = @_;
return $self->{error};
}
# Returns the ID of an ACL.
sub id {
my ($self) = @_;
return $self->{id};
}
# Returns the name of the ACL.
sub name {
my ($self)= @_;
return $self->{name};
}
# Record a change to an ACL. Takes the type of change, the scheme and
# identifier of the entry, and the trace information (user, host, and time).
# This function does not commit and does not catch exceptions. It should
# normally be called as part of a larger transaction that implements the
# change and should be committed with that change.
sub log_acl {
my ($self, $action, $scheme, $identifier, $user, $host, $time) = @_;
unless ($action =~ /^(add|remove)\z/) {
die "invalid history action $action";
}
my $sql = 'insert into acl_history (ah_acl, ah_action, ah_scheme,
ah_identifier, ah_by, ah_from, ah_on) values (?, ?, ?, ?, ?, ?, ?)';
$self->{dbh}->do ($sql, undef, $self->{id}, $action, $scheme, $identifier,
$user, $host, $time);
}
##############################################################################
# ACL manipulation
##############################################################################
# Changes the human-readable name of the ACL. Note that this operation is not
# logged since it isn't a change to any of the data stored in the wallet.
# Returns true on success, false on failure.
sub rename {
my ($self, $name) = @_;
if ($name =~ /^\d+\z/) {
$self->{error} = "ACL name may not be all numbers";
return undef;
}
eval {
my $sql = 'update acls set ac_name = ? where ac_id = ?';
$self->{dbh}->do ($sql, undef, $name, $self->{id});
$self->{dbh}->commit;
};
if ($@) {
$self->{error} = "cannot rename ACL $self->{id} to $name: $@";
chomp $self->{error};
$self->{error} =~ / at .*$/;
$self->{dbh}->rollback;
return undef;
}
$self->{name} = $name;
return 1;
}
# Destroy the ACL, deleting it out of the database. Returns true on success,
# false on failure.
sub destroy {
my ($self, $user, $host, $time) = @_;
$time ||= time;
eval {
my $sql = 'delete from acl_entries where ae_id = ?';
$self->{dbh}->do ($sql, undef, $self->{id});
$sql = 'delete from acls where ac_id = ?';
$self->{dbh}->do ($sql, undef, $self->{id});
$sql = "insert into acl_history (ah_acl, ah_action, ah_by, ah_from,
ah_on) values (?, 'destroy', ?, ?, ?)";
$self->{dbh}->do ($sql, undef, $self->{id}, $user, $host, $time);
$self->{dbh}->commit;
};
if ($@) {
$self->{error} = "cannot destroy ACL $self->{id}: $@";
chomp $self->{error};
$self->{error} =~ / at .*$/;
$self->{dbh}->rollback;
return undef;
}
return 1;
}
##############################################################################
# ACL entry manipulation
##############################################################################
# Add an ACL entry to this ACL. Returns true on success and false on failure.
sub add {
my ($self, $scheme, $identifier, $user, $host, $time) = @_;
$time ||= time;
unless ($MAPPING{$scheme}) {
$self->{error} = "unknown ACL scheme $scheme";
return undef;
}
eval {
my $sql = 'insert into acl_entries (ae_id, ae_scheme, ae_identifier)
values (?, ?, ?)';
$self->{dbh}->do ($sql, undef, $self->{id}, $scheme, $identifier);
$self->log_acl ('add', $scheme, $identifier, $user, $host, $time);
$self->{dbh}->commit;
};
if ($@) {
$self->{error} = "cannot add $scheme:$identifier to $self->{id}: $@";
chomp $self->{error};
$self->{error} =~ / at .*$/;
$self->{dbh}->rollback;
return undef;
}
return 1;
}
# Remove an ACL entry to this ACL. Returns true on success and false on
# failure. Detect the case where no such row exists before doing the delete
# so that we can provide a good error message.
sub remove {
my ($self, $scheme, $identifier, $user, $host, $time) = @_;
$time ||= time;
eval {
my $sql = 'select * from acl_entries where ae_id = ? and ae_scheme = ?
and ae_identifier = ?';
my ($data) = $self->{dbh}->selectrow_array ($sql, undef, $self->{id},
$scheme, $identifier);
unless (defined $data) {
die "entry not found in ACL";
}
$sql = 'delete from acl_entries where ae_id = ? and ae_scheme = ?
and ae_identifier = ?';
$self->{dbh}->do ($sql, undef, $self->{id}, $scheme, $identifier);
$self->log_acl ('remove', $scheme, $identifier, $user, $host, $time);
$self->{dbh}->commit;
};
if ($@) {
my $entry = "$scheme:$identifier";
$self->{error} = "cannot remove $entry from $self->{id}: $@";
chomp $self->{error};
$self->{error} =~ / at .*$/;
$self->{dbh}->rollback;
return undef;
}
return 1;
}
##############################################################################
# ACL checking
##############################################################################
# List all of the entries in an ACL. Returns an array of tuples, each of
# which contains a scheme and identifier, or an array containing undef on
# error. Sets the internal error string on error.
sub list {
my ($self) = @_;
my @entries;
eval {
my $sql = 'select ae_scheme, ae_identifier from acl_entries where
ae_id = ?';
my $sth = $self->{dbh}->prepare ($sql);
$sth->execute ($self->{id});
my $entry;
while (defined ($entry = $sth->fetchrow_arrayref)) {
push (@entries, $entry);
}
};
if ($@) {
$self->{error} = "cannot retrieve ACL $self->{id}: $@";
chomp $self->{error};
$self->{error} =~ / at .*$/;
return (undef);
} else {
return @entries;
}
}
# Given a principal, check whether it should be granted access according to
# this ACL. Returns 1 if access was granted, 0 if access was denied, and
# undef on some error. Errors from ACL verifiers do not cause an error
# return, but are instead accumulated in the check_errors variable returned by
# the check_errors() method.
#
# This routine is currently rather inefficient when it comes to instantiating
# verifier objects. They're created anew for each check. Ideally, we should
# globally cache verifiers in some way.
sub check {
my ($self, $principal) = @_;
my @entries = $self->list;
return undef if (@entries == 1 and not defined $entries[0]);
my %verifier;
$self->{check_errors} = [];
for my $entry (@entries) {
my ($scheme, $identifier) = @$entry;
unless ($verifier{$scheme}) {
unless ($MAPPING{$scheme}) {
push (@{ $self->{check_errors} }, "unknown scheme $scheme");
next;
}
$verifier{$scheme} = ($MAPPING{$scheme})->new;
unless (defined $verifier{$scheme}) {
push (@{ $self->{check_errors} }, "cannot verify $scheme");
next;
}
}
my $result = ($verifier{$scheme})->check ($principal, $identifier);
if (not defined $result) {
push (@{ $self->{check_errors} }, ($verifier{$scheme})->error);
} elsif ($result == 1) {
return 1;
}
}
return 0;
}
# Returns the errors from the last ACL verification as an array in array
# context or as a string with newlines after each error in a scalar context.
sub check_errors {
my ($self) = @_;
my @errors;
if ($self->{check_errors}) {
@errors = @{ $self->{check_errors} };
}
return wantarray ? @errors : join ("\n", @errors, '');
}
|