mirror of
https://github.com/kanidm/kanidm.git
synced 2025-04-23 10:45:39 +02:00
Compare commits
3 commits
9b7eaaa0bf
...
f1e70b2422
Author | SHA1 | Date | |
---|---|---|---|
|
f1e70b2422 | ||
|
f9ca11aca1 | ||
|
debaf002bf |
unix_integration
common
nss_kanidm/src
pam_kanidm/src
resolver
|
@ -14,6 +14,8 @@ repository = { workspace = true }
|
||||||
[features]
|
[features]
|
||||||
default = ["unix"]
|
default = ["unix"]
|
||||||
unix = []
|
unix = []
|
||||||
|
selinux = []
|
||||||
|
tpm = []
|
||||||
|
|
||||||
[lib]
|
[lib]
|
||||||
name = "kanidm_unix_common"
|
name = "kanidm_unix_common"
|
||||||
|
|
|
@ -26,3 +26,6 @@ pub mod unix_config;
|
||||||
pub mod unix_passwd;
|
pub mod unix_passwd;
|
||||||
#[cfg(target_family = "unix")]
|
#[cfg(target_family = "unix")]
|
||||||
pub mod unix_proto;
|
pub mod unix_proto;
|
||||||
|
|
||||||
|
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
||||||
|
pub mod selinux_util;
|
||||||
|
|
|
@ -1,13 +1,24 @@
|
||||||
|
//! This is configuration definitions and parser for the various unix integration
|
||||||
|
//! tools and services. This needs to support a number of use cases like pam/nss
|
||||||
|
//! modules parsing the config quickly and the unix daemon which has to connect to
|
||||||
|
//! various backend sources.
|
||||||
|
//!
|
||||||
|
//! To achieve this the configuration has two main sections - the configuration
|
||||||
|
//! specification which will be parsed by the tools, then the configuration as
|
||||||
|
//! relevant to that tool.
|
||||||
|
|
||||||
|
use std::env;
|
||||||
use std::fmt::{Display, Formatter};
|
use std::fmt::{Display, Formatter};
|
||||||
use std::fs::File;
|
use std::fs::File;
|
||||||
use std::io::{ErrorKind, Read};
|
use std::io::{ErrorKind, Read};
|
||||||
use std::path::Path;
|
use std::path::{Path, PathBuf};
|
||||||
|
|
||||||
|
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
||||||
|
use crate::selinux_util;
|
||||||
use crate::unix_passwd::UnixIntegrationError;
|
use crate::unix_passwd::UnixIntegrationError;
|
||||||
|
|
||||||
use serde::Deserialize;
|
|
||||||
|
|
||||||
use crate::constants::*;
|
use crate::constants::*;
|
||||||
|
use serde::Deserialize;
|
||||||
|
|
||||||
#[derive(Debug, Copy, Clone)]
|
#[derive(Debug, Copy, Clone)]
|
||||||
pub enum HomeAttr {
|
pub enum HomeAttr {
|
||||||
|
@ -49,35 +60,526 @@ impl Display for UidAttr {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Default)]
|
||||||
|
pub enum HsmType {
|
||||||
|
#[cfg_attr(not(feature = "tpm"), default)]
|
||||||
|
Soft,
|
||||||
|
#[cfg_attr(feature = "tpm", default)]
|
||||||
|
TpmIfPossible,
|
||||||
|
Tpm,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Display for HsmType {
|
||||||
|
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
||||||
|
match self {
|
||||||
|
HsmType::Soft => write!(f, "Soft"),
|
||||||
|
HsmType::TpmIfPossible => write!(f, "Tpm if possible"),
|
||||||
|
HsmType::Tpm => write!(f, "Tpm"),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Allowed as the large enum is only short lived at startup to the true config
|
||||||
|
#[allow(clippy::large_enum_variant)]
|
||||||
|
// This bit of magic lets us deserialise the old config and the new versions.
|
||||||
#[derive(Debug, Deserialize)]
|
#[derive(Debug, Deserialize)]
|
||||||
struct ConfigInt {
|
#[serde(untagged)]
|
||||||
|
enum ConfigUntagged {
|
||||||
|
Versioned(ConfigVersion),
|
||||||
|
Legacy(ConfigInt),
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize)]
|
||||||
|
#[serde(tag = "version")]
|
||||||
|
enum ConfigVersion {
|
||||||
|
#[serde(rename = "2")]
|
||||||
|
V2 {
|
||||||
|
#[serde(flatten)]
|
||||||
|
values: ConfigV2,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize)]
|
||||||
|
#[serde(deny_unknown_fields)]
|
||||||
|
/// This is the version 2 of the JSON configuration specification for the unixd suite.
|
||||||
|
struct ConfigV2 {
|
||||||
|
cache_db_path: Option<String>,
|
||||||
sock_path: Option<String>,
|
sock_path: Option<String>,
|
||||||
|
task_sock_path: Option<String>,
|
||||||
|
|
||||||
|
cache_timeout: Option<u64>,
|
||||||
|
|
||||||
|
default_shell: Option<String>,
|
||||||
|
home_prefix: Option<String>,
|
||||||
|
home_mount_prefix: Option<String>,
|
||||||
|
home_attr: Option<String>,
|
||||||
|
home_alias: Option<String>,
|
||||||
|
use_etc_skel: Option<bool>,
|
||||||
|
uid_attr_map: Option<String>,
|
||||||
|
gid_attr_map: Option<String>,
|
||||||
|
selinux: Option<bool>,
|
||||||
|
|
||||||
|
hsm_pin_path: Option<String>,
|
||||||
|
hsm_type: Option<String>,
|
||||||
|
tpm_tcti_name: Option<String>,
|
||||||
|
|
||||||
|
kanidm: Option<KanidmConfigV2>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Clone, Debug, Deserialize)]
|
||||||
|
pub struct GroupMap {
|
||||||
|
pub local: String,
|
||||||
|
pub with: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize)]
|
||||||
|
struct KanidmConfigV2 {
|
||||||
conn_timeout: Option<u64>,
|
conn_timeout: Option<u64>,
|
||||||
|
request_timeout: Option<u64>,
|
||||||
|
pam_allowed_login_groups: Option<Vec<String>>,
|
||||||
|
#[serde(default)]
|
||||||
|
map_group: Vec<GroupMap>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize)]
|
||||||
|
/// This is the version 1 of the JSON configuration specification for the unixd suite.
|
||||||
|
struct ConfigInt {
|
||||||
|
db_path: Option<String>,
|
||||||
|
sock_path: Option<String>,
|
||||||
|
task_sock_path: Option<String>,
|
||||||
|
conn_timeout: Option<u64>,
|
||||||
|
request_timeout: Option<u64>,
|
||||||
|
cache_timeout: Option<u64>,
|
||||||
|
pam_allowed_login_groups: Option<Vec<String>>,
|
||||||
|
default_shell: Option<String>,
|
||||||
|
home_prefix: Option<String>,
|
||||||
|
home_mount_prefix: Option<String>,
|
||||||
|
home_attr: Option<String>,
|
||||||
|
home_alias: Option<String>,
|
||||||
|
use_etc_skel: Option<bool>,
|
||||||
|
uid_attr_map: Option<String>,
|
||||||
|
gid_attr_map: Option<String>,
|
||||||
|
selinux: Option<bool>,
|
||||||
|
#[serde(default)]
|
||||||
|
allow_local_account_override: Vec<String>,
|
||||||
|
|
||||||
|
hsm_pin_path: Option<String>,
|
||||||
|
hsm_type: Option<String>,
|
||||||
|
tpm_tcti_name: Option<String>,
|
||||||
|
|
||||||
|
// Detect and warn on values in these places - this is to catch
|
||||||
|
// when someone is using a v2 value on a v1 config.
|
||||||
|
#[serde(default)]
|
||||||
|
cache_db_path: Option<toml::value::Value>,
|
||||||
|
#[serde(default)]
|
||||||
|
kanidm: Option<toml::value::Value>,
|
||||||
|
}
|
||||||
|
|
||||||
|
// ========================================================================
|
||||||
|
|
||||||
|
#[derive(Debug)]
|
||||||
|
/// This is the parsed Kanidm provider configuration that the Unixd resolver
|
||||||
|
/// will use to connect to Kanidm.
|
||||||
|
pub struct KanidmConfig {
|
||||||
|
pub conn_timeout: u64,
|
||||||
|
pub request_timeout: u64,
|
||||||
|
pub pam_allowed_login_groups: Vec<String>,
|
||||||
|
pub map_group: Vec<GroupMap>,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub struct KanidmUnixdConfig {
|
/// This is the parsed configuration for the Unixd resolver.
|
||||||
|
pub struct UnixdConfig {
|
||||||
|
pub cache_db_path: String,
|
||||||
|
pub sock_path: String,
|
||||||
|
pub task_sock_path: String,
|
||||||
|
pub cache_timeout: u64,
|
||||||
|
pub unix_sock_timeout: u64,
|
||||||
|
pub default_shell: String,
|
||||||
|
pub home_prefix: PathBuf,
|
||||||
|
pub home_mount_prefix: Option<PathBuf>,
|
||||||
|
pub home_attr: HomeAttr,
|
||||||
|
pub home_alias: Option<HomeAttr>,
|
||||||
|
pub use_etc_skel: bool,
|
||||||
|
pub uid_attr_map: UidAttr,
|
||||||
|
pub gid_attr_map: UidAttr,
|
||||||
|
pub selinux: bool,
|
||||||
|
pub hsm_type: HsmType,
|
||||||
|
pub hsm_pin_path: String,
|
||||||
|
pub tpm_tcti_name: String,
|
||||||
|
pub kanidm_config: Option<KanidmConfig>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Default for UnixdConfig {
|
||||||
|
fn default() -> Self {
|
||||||
|
UnixdConfig::new()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Display for UnixdConfig {
|
||||||
|
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
||||||
|
writeln!(f, "cache_db_path: {}", &self.cache_db_path)?;
|
||||||
|
writeln!(f, "sock_path: {}", self.sock_path)?;
|
||||||
|
writeln!(f, "task_sock_path: {}", self.task_sock_path)?;
|
||||||
|
writeln!(f, "unix_sock_timeout: {}", self.unix_sock_timeout)?;
|
||||||
|
writeln!(f, "cache_timeout: {}", self.cache_timeout)?;
|
||||||
|
writeln!(f, "default_shell: {}", self.default_shell)?;
|
||||||
|
writeln!(f, "home_prefix: {:?}", self.home_prefix)?;
|
||||||
|
match self.home_mount_prefix.as_deref() {
|
||||||
|
Some(val) => writeln!(f, "home_mount_prefix: {:?}", val)?,
|
||||||
|
None => writeln!(f, "home_mount_prefix: unset")?,
|
||||||
|
}
|
||||||
|
writeln!(f, "home_attr: {}", self.home_attr)?;
|
||||||
|
match self.home_alias {
|
||||||
|
Some(val) => writeln!(f, "home_alias: {}", val)?,
|
||||||
|
None => writeln!(f, "home_alias: unset")?,
|
||||||
|
}
|
||||||
|
|
||||||
|
writeln!(f, "uid_attr_map: {}", self.uid_attr_map)?;
|
||||||
|
writeln!(f, "gid_attr_map: {}", self.gid_attr_map)?;
|
||||||
|
|
||||||
|
writeln!(f, "hsm_type: {}", self.hsm_type)?;
|
||||||
|
writeln!(f, "tpm_tcti_name: {}", self.tpm_tcti_name)?;
|
||||||
|
|
||||||
|
writeln!(f, "selinux: {}", self.selinux)?;
|
||||||
|
|
||||||
|
if let Some(kconfig) = &self.kanidm_config {
|
||||||
|
writeln!(f, "kanidm: enabled")?;
|
||||||
|
writeln!(
|
||||||
|
f,
|
||||||
|
"kanidm pam_allowed_login_groups: {:#?}",
|
||||||
|
kconfig.pam_allowed_login_groups
|
||||||
|
)?;
|
||||||
|
writeln!(f, "kanidm conn_timeout: {}", kconfig.conn_timeout)?;
|
||||||
|
writeln!(f, "kanidm request_timeout: {}", kconfig.request_timeout)?;
|
||||||
|
} else {
|
||||||
|
writeln!(f, "kanidm: disabled")?;
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl UnixdConfig {
|
||||||
|
pub fn new() -> Self {
|
||||||
|
let cache_db_path = match env::var("KANIDM_CACHE_DB_PATH") {
|
||||||
|
Ok(val) => val,
|
||||||
|
Err(_) => DEFAULT_CACHE_DB_PATH.into(),
|
||||||
|
};
|
||||||
|
let hsm_pin_path = match env::var("KANIDM_HSM_PIN_PATH") {
|
||||||
|
Ok(val) => val,
|
||||||
|
Err(_) => DEFAULT_HSM_PIN_PATH.into(),
|
||||||
|
};
|
||||||
|
|
||||||
|
UnixdConfig {
|
||||||
|
cache_db_path,
|
||||||
|
sock_path: DEFAULT_SOCK_PATH.to_string(),
|
||||||
|
task_sock_path: DEFAULT_TASK_SOCK_PATH.to_string(),
|
||||||
|
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
||||||
|
cache_timeout: DEFAULT_CACHE_TIMEOUT,
|
||||||
|
default_shell: DEFAULT_SHELL.to_string(),
|
||||||
|
home_prefix: DEFAULT_HOME_PREFIX.into(),
|
||||||
|
home_mount_prefix: None,
|
||||||
|
home_attr: DEFAULT_HOME_ATTR,
|
||||||
|
home_alias: DEFAULT_HOME_ALIAS,
|
||||||
|
use_etc_skel: DEFAULT_USE_ETC_SKEL,
|
||||||
|
uid_attr_map: DEFAULT_UID_ATTR_MAP,
|
||||||
|
gid_attr_map: DEFAULT_GID_ATTR_MAP,
|
||||||
|
selinux: DEFAULT_SELINUX,
|
||||||
|
hsm_pin_path,
|
||||||
|
hsm_type: HsmType::default(),
|
||||||
|
tpm_tcti_name: DEFAULT_TPM_TCTI_NAME.to_string(),
|
||||||
|
|
||||||
|
kanidm_config: None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn read_options_from_optional_config<P: AsRef<Path> + std::fmt::Debug>(
|
||||||
|
self,
|
||||||
|
config_path: P,
|
||||||
|
) -> Result<Self, UnixIntegrationError> {
|
||||||
|
debug!("Attempting to load configuration from {:#?}", &config_path);
|
||||||
|
let mut f = match File::open(&config_path) {
|
||||||
|
Ok(f) => {
|
||||||
|
debug!("Successfully opened configuration file {:#?}", &config_path);
|
||||||
|
f
|
||||||
|
}
|
||||||
|
Err(e) => {
|
||||||
|
match e.kind() {
|
||||||
|
ErrorKind::NotFound => {
|
||||||
|
debug!(
|
||||||
|
"Configuration file {:#?} not found, skipping.",
|
||||||
|
&config_path
|
||||||
|
);
|
||||||
|
}
|
||||||
|
ErrorKind::PermissionDenied => {
|
||||||
|
warn!(
|
||||||
|
"Permission denied loading configuration file {:#?}, skipping.",
|
||||||
|
&config_path
|
||||||
|
);
|
||||||
|
}
|
||||||
|
_ => {
|
||||||
|
debug!(
|
||||||
|
"Unable to open config file {:#?} [{:?}], skipping ...",
|
||||||
|
&config_path, e
|
||||||
|
);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
return Ok(self);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let mut contents = String::new();
|
||||||
|
f.read_to_string(&mut contents).map_err(|e| {
|
||||||
|
error!("{:?}", e);
|
||||||
|
UnixIntegrationError
|
||||||
|
})?;
|
||||||
|
|
||||||
|
let config: ConfigUntagged = toml::from_str(contents.as_str()).map_err(|e| {
|
||||||
|
error!("{:?}", e);
|
||||||
|
UnixIntegrationError
|
||||||
|
})?;
|
||||||
|
|
||||||
|
match config {
|
||||||
|
ConfigUntagged::Legacy(config) => self.apply_from_config_legacy(config),
|
||||||
|
ConfigUntagged::Versioned(ConfigVersion::V2 { values }) => {
|
||||||
|
self.apply_from_config_v2(values)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn apply_from_config_legacy(self, config: ConfigInt) -> Result<Self, UnixIntegrationError> {
|
||||||
|
if config.kanidm.is_some() || config.cache_db_path.is_some() {
|
||||||
|
error!("You are using version=\"2\" options in a legacy config. THESE WILL NOT WORK.");
|
||||||
|
return Err(UnixIntegrationError);
|
||||||
|
}
|
||||||
|
|
||||||
|
let map_group = config
|
||||||
|
.allow_local_account_override
|
||||||
|
.iter()
|
||||||
|
.map(|name| GroupMap {
|
||||||
|
local: name.clone(),
|
||||||
|
with: name.clone(),
|
||||||
|
})
|
||||||
|
.collect();
|
||||||
|
|
||||||
|
let kanidm_config = Some(KanidmConfig {
|
||||||
|
conn_timeout: config.conn_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT),
|
||||||
|
request_timeout: config.request_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT * 2),
|
||||||
|
pam_allowed_login_groups: config.pam_allowed_login_groups.unwrap_or_default(),
|
||||||
|
map_group,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Now map the values into our config.
|
||||||
|
Ok(UnixdConfig {
|
||||||
|
cache_db_path: config.db_path.unwrap_or(self.cache_db_path),
|
||||||
|
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
||||||
|
task_sock_path: config.task_sock_path.unwrap_or(self.task_sock_path),
|
||||||
|
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
||||||
|
cache_timeout: config.cache_timeout.unwrap_or(self.cache_timeout),
|
||||||
|
default_shell: config.default_shell.unwrap_or(self.default_shell),
|
||||||
|
home_prefix: config
|
||||||
|
.home_prefix
|
||||||
|
.map(|p| p.into())
|
||||||
|
.unwrap_or(self.home_prefix.clone()),
|
||||||
|
home_mount_prefix: config.home_mount_prefix.map(|p| p.into()),
|
||||||
|
home_attr: config
|
||||||
|
.home_attr
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"uuid" => Some(HomeAttr::Uuid),
|
||||||
|
"spn" => Some(HomeAttr::Spn),
|
||||||
|
"name" => Some(HomeAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid home_attr configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.home_attr),
|
||||||
|
home_alias: config
|
||||||
|
.home_alias
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"none" => Some(None),
|
||||||
|
"uuid" => Some(Some(HomeAttr::Uuid)),
|
||||||
|
"spn" => Some(Some(HomeAttr::Spn)),
|
||||||
|
"name" => Some(Some(HomeAttr::Name)),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid home_alias configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.home_alias),
|
||||||
|
use_etc_skel: config.use_etc_skel.unwrap_or(self.use_etc_skel),
|
||||||
|
uid_attr_map: config
|
||||||
|
.uid_attr_map
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"spn" => Some(UidAttr::Spn),
|
||||||
|
"name" => Some(UidAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid uid_attr_map configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.uid_attr_map),
|
||||||
|
gid_attr_map: config
|
||||||
|
.gid_attr_map
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"spn" => Some(UidAttr::Spn),
|
||||||
|
"name" => Some(UidAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid gid_attr_map configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.gid_attr_map),
|
||||||
|
selinux: match config.selinux.unwrap_or(self.selinux) {
|
||||||
|
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
||||||
|
true => selinux_util::supported(),
|
||||||
|
_ => false,
|
||||||
|
},
|
||||||
|
hsm_pin_path: config.hsm_pin_path.unwrap_or(self.hsm_pin_path),
|
||||||
|
hsm_type: config
|
||||||
|
.hsm_type
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"soft" => Some(HsmType::Soft),
|
||||||
|
"tpm_if_possible" => Some(HsmType::TpmIfPossible),
|
||||||
|
"tpm" => Some(HsmType::Tpm),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid hsm_type configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.hsm_type),
|
||||||
|
tpm_tcti_name: config
|
||||||
|
.tpm_tcti_name
|
||||||
|
.unwrap_or(DEFAULT_TPM_TCTI_NAME.to_string()),
|
||||||
|
kanidm_config,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn apply_from_config_v2(self, config: ConfigV2) -> Result<Self, UnixIntegrationError> {
|
||||||
|
let kanidm_config = if let Some(kconfig) = config.kanidm {
|
||||||
|
Some(KanidmConfig {
|
||||||
|
conn_timeout: kconfig.conn_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT),
|
||||||
|
request_timeout: kconfig.request_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT * 2),
|
||||||
|
pam_allowed_login_groups: kconfig.pam_allowed_login_groups.unwrap_or_default(),
|
||||||
|
map_group: kconfig.map_group,
|
||||||
|
})
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
// Now map the values into our config.
|
||||||
|
Ok(UnixdConfig {
|
||||||
|
cache_db_path: config.cache_db_path.unwrap_or(self.cache_db_path),
|
||||||
|
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
||||||
|
task_sock_path: config.task_sock_path.unwrap_or(self.task_sock_path),
|
||||||
|
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
||||||
|
cache_timeout: config.cache_timeout.unwrap_or(self.cache_timeout),
|
||||||
|
default_shell: config.default_shell.unwrap_or(self.default_shell),
|
||||||
|
home_prefix: config
|
||||||
|
.home_prefix
|
||||||
|
.map(|p| p.into())
|
||||||
|
.unwrap_or(self.home_prefix.clone()),
|
||||||
|
home_mount_prefix: config.home_mount_prefix.map(|p| p.into()),
|
||||||
|
home_attr: config
|
||||||
|
.home_attr
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"uuid" => Some(HomeAttr::Uuid),
|
||||||
|
"spn" => Some(HomeAttr::Spn),
|
||||||
|
"name" => Some(HomeAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid home_attr configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.home_attr),
|
||||||
|
home_alias: config
|
||||||
|
.home_alias
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"none" => Some(None),
|
||||||
|
"uuid" => Some(Some(HomeAttr::Uuid)),
|
||||||
|
"spn" => Some(Some(HomeAttr::Spn)),
|
||||||
|
"name" => Some(Some(HomeAttr::Name)),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid home_alias configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.home_alias),
|
||||||
|
use_etc_skel: config.use_etc_skel.unwrap_or(self.use_etc_skel),
|
||||||
|
uid_attr_map: config
|
||||||
|
.uid_attr_map
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"spn" => Some(UidAttr::Spn),
|
||||||
|
"name" => Some(UidAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid uid_attr_map configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.uid_attr_map),
|
||||||
|
gid_attr_map: config
|
||||||
|
.gid_attr_map
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"spn" => Some(UidAttr::Spn),
|
||||||
|
"name" => Some(UidAttr::Name),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid gid_attr_map configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.gid_attr_map),
|
||||||
|
selinux: match config.selinux.unwrap_or(self.selinux) {
|
||||||
|
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
||||||
|
true => selinux_util::supported(),
|
||||||
|
_ => false,
|
||||||
|
},
|
||||||
|
hsm_pin_path: config.hsm_pin_path.unwrap_or(self.hsm_pin_path),
|
||||||
|
hsm_type: config
|
||||||
|
.hsm_type
|
||||||
|
.and_then(|v| match v.as_str() {
|
||||||
|
"soft" => Some(HsmType::Soft),
|
||||||
|
"tpm_if_possible" => Some(HsmType::TpmIfPossible),
|
||||||
|
"tpm" => Some(HsmType::Tpm),
|
||||||
|
_ => {
|
||||||
|
warn!("Invalid hsm_type configured, using default ...");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.unwrap_or(self.hsm_type),
|
||||||
|
tpm_tcti_name: config
|
||||||
|
.tpm_tcti_name
|
||||||
|
.unwrap_or(DEFAULT_TPM_TCTI_NAME.to_string()),
|
||||||
|
kanidm_config,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug)]
|
||||||
|
/// This is the parsed configuration that will be used by pam/nss tools that need fast access to
|
||||||
|
/// only the socket and timeout information related to the resolver.
|
||||||
|
pub struct PamNssConfig {
|
||||||
pub sock_path: String,
|
pub sock_path: String,
|
||||||
// pub conn_timeout: u64,
|
// pub conn_timeout: u64,
|
||||||
pub unix_sock_timeout: u64,
|
pub unix_sock_timeout: u64,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Default for KanidmUnixdConfig {
|
impl Default for PamNssConfig {
|
||||||
fn default() -> Self {
|
fn default() -> Self {
|
||||||
KanidmUnixdConfig::new()
|
PamNssConfig::new()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Display for KanidmUnixdConfig {
|
impl Display for PamNssConfig {
|
||||||
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
||||||
writeln!(f, "sock_path: {}", self.sock_path)?;
|
writeln!(f, "sock_path: {}", self.sock_path)?;
|
||||||
writeln!(f, "unix_sock_timeout: {}", self.unix_sock_timeout)
|
writeln!(f, "unix_sock_timeout: {}", self.unix_sock_timeout)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl KanidmUnixdConfig {
|
impl PamNssConfig {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
KanidmUnixdConfig {
|
PamNssConfig {
|
||||||
sock_path: DEFAULT_SOCK_PATH.to_string(),
|
sock_path: DEFAULT_SOCK_PATH.to_string(),
|
||||||
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
||||||
}
|
}
|
||||||
|
@ -124,22 +626,45 @@ impl KanidmUnixdConfig {
|
||||||
UnixIntegrationError
|
UnixIntegrationError
|
||||||
})?;
|
})?;
|
||||||
|
|
||||||
let config: ConfigInt = toml::from_str(contents.as_str()).map_err(|e| {
|
let config: ConfigUntagged = toml::from_str(contents.as_str()).map_err(|e| {
|
||||||
error!("{:?}", e);
|
error!("{:?}", e);
|
||||||
UnixIntegrationError
|
UnixIntegrationError
|
||||||
})?;
|
})?;
|
||||||
|
|
||||||
|
match config {
|
||||||
|
ConfigUntagged::Legacy(config) => self.apply_from_config_legacy(config),
|
||||||
|
ConfigUntagged::Versioned(ConfigVersion::V2 { values }) => {
|
||||||
|
self.apply_from_config_v2(values)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn apply_from_config_legacy(self, config: ConfigInt) -> Result<Self, UnixIntegrationError> {
|
||||||
let unix_sock_timeout = config
|
let unix_sock_timeout = config
|
||||||
.conn_timeout
|
.conn_timeout
|
||||||
.map(|v| v * 2)
|
.map(|v| v * 2)
|
||||||
.unwrap_or(self.unix_sock_timeout);
|
.unwrap_or(self.unix_sock_timeout);
|
||||||
|
|
||||||
// Now map the values into our config.
|
// Now map the values into our config.
|
||||||
Ok(KanidmUnixdConfig {
|
Ok(PamNssConfig {
|
||||||
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
||||||
unix_sock_timeout,
|
unix_sock_timeout,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn apply_from_config_v2(self, config: ConfigV2) -> Result<Self, UnixIntegrationError> {
|
||||||
|
let kanidm_conn_timeout = config
|
||||||
|
.kanidm
|
||||||
|
.as_ref()
|
||||||
|
.and_then(|k_config| k_config.conn_timeout)
|
||||||
|
.map(|timeout| timeout * 2);
|
||||||
|
|
||||||
|
// Now map the values into our config.
|
||||||
|
Ok(PamNssConfig {
|
||||||
|
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
||||||
|
unix_sock_timeout: kanidm_conn_timeout.unwrap_or(self.unix_sock_timeout),
|
||||||
|
})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
|
@ -165,9 +690,12 @@ mod tests {
|
||||||
if filename.starts_with("unixd") {
|
if filename.starts_with("unixd") {
|
||||||
print!("Checking that {} parses as a valid config...", filename);
|
print!("Checking that {} parses as a valid config...", filename);
|
||||||
|
|
||||||
KanidmUnixdConfig::new()
|
UnixdConfig::new()
|
||||||
.read_options_from_optional_config(file.path())
|
.read_options_from_optional_config(file.path())
|
||||||
.expect("Failed to parse");
|
.inspect_err(|e| {
|
||||||
|
println!("Failed to parse: {:?}", e);
|
||||||
|
})
|
||||||
|
.expect("Failed to parse!");
|
||||||
println!("OK");
|
println!("OK");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
use kanidm_unix_common::client_sync::DaemonClientBlocking;
|
use kanidm_unix_common::client_sync::DaemonClientBlocking;
|
||||||
use kanidm_unix_common::unix_config::KanidmUnixdConfig;
|
use kanidm_unix_common::unix_config::PamNssConfig;
|
||||||
use kanidm_unix_common::unix_passwd::{
|
use kanidm_unix_common::unix_passwd::{
|
||||||
read_etc_group_file, read_etc_passwd_file, EtcGroup, EtcUser,
|
read_etc_group_file, read_etc_passwd_file, EtcGroup, EtcUser,
|
||||||
};
|
};
|
||||||
|
@ -36,7 +36,7 @@ impl RequestOptions {
|
||||||
fn connect_to_daemon(self) -> Source {
|
fn connect_to_daemon(self) -> Source {
|
||||||
match self {
|
match self {
|
||||||
RequestOptions::Main { config_path } => {
|
RequestOptions::Main { config_path } => {
|
||||||
let maybe_client = KanidmUnixdConfig::new()
|
let maybe_client = PamNssConfig::new()
|
||||||
.read_options_from_optional_config(config_path)
|
.read_options_from_optional_config(config_path)
|
||||||
.ok()
|
.ok()
|
||||||
.and_then(|cfg| {
|
.and_then(|cfg| {
|
||||||
|
|
|
@ -2,7 +2,7 @@ use crate::constants::PamResultCode;
|
||||||
use crate::module::PamResult;
|
use crate::module::PamResult;
|
||||||
use crate::pam::ModuleOptions;
|
use crate::pam::ModuleOptions;
|
||||||
use kanidm_unix_common::client_sync::DaemonClientBlocking;
|
use kanidm_unix_common::client_sync::DaemonClientBlocking;
|
||||||
use kanidm_unix_common::unix_config::KanidmUnixdConfig;
|
use kanidm_unix_common::unix_config::PamNssConfig;
|
||||||
use kanidm_unix_common::unix_passwd::{
|
use kanidm_unix_common::unix_passwd::{
|
||||||
read_etc_passwd_file, read_etc_shadow_file, EtcShadow, EtcUser,
|
read_etc_passwd_file, read_etc_shadow_file, EtcShadow, EtcUser,
|
||||||
};
|
};
|
||||||
|
@ -44,7 +44,7 @@ impl RequestOptions {
|
||||||
fn connect_to_daemon(self) -> Source {
|
fn connect_to_daemon(self) -> Source {
|
||||||
match self {
|
match self {
|
||||||
RequestOptions::Main { config_path } => {
|
RequestOptions::Main { config_path } => {
|
||||||
let maybe_client = KanidmUnixdConfig::new()
|
let maybe_client = PamNssConfig::new()
|
||||||
.read_options_from_optional_config(config_path)
|
.read_options_from_optional_config(config_path)
|
||||||
.ok()
|
.ok()
|
||||||
.and_then(|cfg| {
|
.and_then(|cfg| {
|
||||||
|
|
|
@ -36,7 +36,7 @@ use std::convert::TryFrom;
|
||||||
use std::ffi::CStr;
|
use std::ffi::CStr;
|
||||||
|
|
||||||
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
||||||
use kanidm_unix_common::unix_config::KanidmUnixdConfig;
|
use kanidm_unix_common::unix_config::PamNssConfig;
|
||||||
|
|
||||||
use crate::core::{self, RequestOptions};
|
use crate::core::{self, RequestOptions};
|
||||||
use crate::pam::constants::*;
|
use crate::pam::constants::*;
|
||||||
|
@ -50,8 +50,8 @@ use tracing_subscriber::filter::LevelFilter;
|
||||||
use tracing_subscriber::fmt;
|
use tracing_subscriber::fmt;
|
||||||
use tracing_subscriber::prelude::*;
|
use tracing_subscriber::prelude::*;
|
||||||
|
|
||||||
pub fn get_cfg() -> Result<KanidmUnixdConfig, PamResultCode> {
|
pub fn get_cfg() -> Result<PamNssConfig, PamResultCode> {
|
||||||
KanidmUnixdConfig::new()
|
PamNssConfig::new()
|
||||||
.read_options_from_optional_config(DEFAULT_CONFIG_PATH)
|
.read_options_from_optional_config(DEFAULT_CONFIG_PATH)
|
||||||
.map_err(|_| PamResultCode::PAM_SERVICE_ERR)
|
.map_err(|_| PamResultCode::PAM_SERVICE_ERR)
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,8 +14,8 @@ repository = { workspace = true }
|
||||||
[features]
|
[features]
|
||||||
default = ["unix"]
|
default = ["unix"]
|
||||||
unix = []
|
unix = []
|
||||||
selinux = ["dep:selinux"]
|
selinux = ["dep:selinux", "kanidm_unix_common/selinux"]
|
||||||
tpm = ["kanidm-hsm-crypto/tpm"]
|
tpm = ["kanidm-hsm-crypto/tpm", "kanidm_unix_common/tpm"]
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "kanidm_unixd"
|
name = "kanidm_unixd"
|
||||||
|
|
|
@ -18,7 +18,7 @@ use std::process::ExitCode;
|
||||||
use clap::Parser;
|
use clap::Parser;
|
||||||
use kanidm_unix_common::client::DaemonClient;
|
use kanidm_unix_common::client::DaemonClient;
|
||||||
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
||||||
use kanidm_unix_common::unix_config::KanidmUnixdConfig;
|
use kanidm_unix_common::unix_config::PamNssConfig;
|
||||||
use kanidm_unix_common::unix_proto::{
|
use kanidm_unix_common::unix_proto::{
|
||||||
ClientRequest, ClientResponse, PamAuthRequest, PamAuthResponse, PamServiceInfo,
|
ClientRequest, ClientResponse, PamAuthRequest, PamAuthResponse, PamServiceInfo,
|
||||||
};
|
};
|
||||||
|
@ -28,8 +28,7 @@ include!("../opt/tool.rs");
|
||||||
|
|
||||||
macro_rules! setup_client {
|
macro_rules! setup_client {
|
||||||
() => {{
|
() => {{
|
||||||
let Ok(cfg) =
|
let Ok(cfg) = PamNssConfig::new().read_options_from_optional_config(DEFAULT_CONFIG_PATH)
|
||||||
KanidmUnixdConfig::new().read_options_from_optional_config(DEFAULT_CONFIG_PATH)
|
|
||||||
else {
|
else {
|
||||||
error!("Failed to parse {}", DEFAULT_CONFIG_PATH);
|
error!("Failed to parse {}", DEFAULT_CONFIG_PATH);
|
||||||
return ExitCode::FAILURE;
|
return ExitCode::FAILURE;
|
||||||
|
|
|
@ -19,7 +19,7 @@ use std::process::ExitCode;
|
||||||
use clap::Parser;
|
use clap::Parser;
|
||||||
use kanidm_unix_common::client::DaemonClient;
|
use kanidm_unix_common::client::DaemonClient;
|
||||||
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
||||||
use kanidm_unix_common::unix_config::KanidmUnixdConfig;
|
use kanidm_unix_common::unix_config::PamNssConfig;
|
||||||
use kanidm_unix_common::unix_proto::{ClientRequest, ClientResponse};
|
use kanidm_unix_common::unix_proto::{ClientRequest, ClientResponse};
|
||||||
|
|
||||||
include!("../opt/ssh_authorizedkeys.rs");
|
include!("../opt/ssh_authorizedkeys.rs");
|
||||||
|
@ -44,8 +44,7 @@ async fn main() -> ExitCode {
|
||||||
|
|
||||||
debug!("Starting authorized keys tool ...");
|
debug!("Starting authorized keys tool ...");
|
||||||
|
|
||||||
let cfg = match KanidmUnixdConfig::new().read_options_from_optional_config(DEFAULT_CONFIG_PATH)
|
let cfg = match PamNssConfig::new().read_options_from_optional_config(DEFAULT_CONFIG_PATH) {
|
||||||
{
|
|
||||||
Ok(c) => c,
|
Ok(c) => c,
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
error!("Failed to parse {}: {:?}", DEFAULT_CONFIG_PATH, e);
|
error!("Failed to parse {}: {:?}", DEFAULT_CONFIG_PATH, e);
|
||||||
|
|
|
@ -18,6 +18,7 @@ use kanidm_hsm_crypto::{soft::SoftTpm, AuthValue, BoxedDynTpm, Tpm};
|
||||||
use kanidm_proto::constants::DEFAULT_CLIENT_CONFIG_PATH;
|
use kanidm_proto::constants::DEFAULT_CLIENT_CONFIG_PATH;
|
||||||
use kanidm_proto::internal::OperationError;
|
use kanidm_proto::internal::OperationError;
|
||||||
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
||||||
|
use kanidm_unix_common::unix_config::{HsmType, UnixdConfig};
|
||||||
use kanidm_unix_common::unix_passwd::EtcDb;
|
use kanidm_unix_common::unix_passwd::EtcDb;
|
||||||
use kanidm_unix_common::unix_proto::{
|
use kanidm_unix_common::unix_proto::{
|
||||||
ClientRequest, ClientResponse, TaskRequest, TaskRequestFrame, TaskResponse,
|
ClientRequest, ClientResponse, TaskRequest, TaskRequestFrame, TaskResponse,
|
||||||
|
@ -27,7 +28,6 @@ use kanidm_unix_resolver::idprovider::interface::IdProvider;
|
||||||
use kanidm_unix_resolver::idprovider::kanidm::KanidmProvider;
|
use kanidm_unix_resolver::idprovider::kanidm::KanidmProvider;
|
||||||
use kanidm_unix_resolver::idprovider::system::SystemProvider;
|
use kanidm_unix_resolver::idprovider::system::SystemProvider;
|
||||||
use kanidm_unix_resolver::resolver::Resolver;
|
use kanidm_unix_resolver::resolver::Resolver;
|
||||||
use kanidm_unix_resolver::unix_config::{HsmType, UnixdConfig};
|
|
||||||
use kanidm_utils_users::{get_current_gid, get_current_uid, get_effective_gid, get_effective_uid};
|
use kanidm_utils_users::{get_current_gid, get_current_uid, get_effective_gid, get_effective_uid};
|
||||||
use libc::umask;
|
use libc::umask;
|
||||||
use sketching::tracing::span;
|
use sketching::tracing::span;
|
||||||
|
|
|
@ -13,11 +13,11 @@
|
||||||
use bytes::{BufMut, BytesMut};
|
use bytes::{BufMut, BytesMut};
|
||||||
use futures::{SinkExt, StreamExt};
|
use futures::{SinkExt, StreamExt};
|
||||||
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
use kanidm_unix_common::constants::DEFAULT_CONFIG_PATH;
|
||||||
|
use kanidm_unix_common::unix_config::UnixdConfig;
|
||||||
use kanidm_unix_common::unix_passwd::{parse_etc_group, parse_etc_passwd, parse_etc_shadow, EtcDb};
|
use kanidm_unix_common::unix_passwd::{parse_etc_group, parse_etc_passwd, parse_etc_shadow, EtcDb};
|
||||||
use kanidm_unix_common::unix_proto::{
|
use kanidm_unix_common::unix_proto::{
|
||||||
HomeDirectoryInfo, TaskRequest, TaskRequestFrame, TaskResponse,
|
HomeDirectoryInfo, TaskRequest, TaskRequestFrame, TaskResponse,
|
||||||
};
|
};
|
||||||
use kanidm_unix_resolver::unix_config::UnixdConfig;
|
|
||||||
use kanidm_utils_users::{get_effective_gid, get_effective_uid};
|
use kanidm_utils_users::{get_effective_gid, get_effective_uid};
|
||||||
use libc::{lchown, umask};
|
use libc::{lchown, umask};
|
||||||
use notify_debouncer_full::notify::RecommendedWatcher;
|
use notify_debouncer_full::notify::RecommendedWatcher;
|
||||||
|
|
|
@ -1,24 +1,22 @@
|
||||||
use crate::db::KeyStoreTxn;
|
|
||||||
use crate::unix_config::{GroupMap, KanidmConfig};
|
|
||||||
use async_trait::async_trait;
|
|
||||||
use hashbrown::HashMap;
|
|
||||||
use kanidm_client::{ClientError, KanidmClient, StatusCode};
|
|
||||||
use kanidm_proto::internal::OperationError;
|
|
||||||
use kanidm_proto::v1::{UnixGroupToken, UnixUserToken};
|
|
||||||
use std::collections::BTreeSet;
|
|
||||||
use std::time::{Duration, SystemTime};
|
|
||||||
use tokio::sync::{broadcast, Mutex};
|
|
||||||
|
|
||||||
use kanidm_lib_crypto::CryptoPolicy;
|
|
||||||
use kanidm_lib_crypto::DbPasswordV1;
|
|
||||||
use kanidm_lib_crypto::Password;
|
|
||||||
|
|
||||||
use super::interface::{
|
use super::interface::{
|
||||||
tpm::{self, HmacKey, Tpm},
|
tpm::{self, HmacKey, Tpm},
|
||||||
AuthCredHandler, AuthRequest, AuthResult, GroupToken, GroupTokenState, Id, IdProvider,
|
AuthCredHandler, AuthRequest, AuthResult, GroupToken, GroupTokenState, Id, IdProvider,
|
||||||
IdpError, ProviderOrigin, UserToken, UserTokenState,
|
IdpError, ProviderOrigin, UserToken, UserTokenState,
|
||||||
};
|
};
|
||||||
|
use crate::db::KeyStoreTxn;
|
||||||
|
use async_trait::async_trait;
|
||||||
|
use hashbrown::HashMap;
|
||||||
|
use kanidm_client::{ClientError, KanidmClient, StatusCode};
|
||||||
|
use kanidm_lib_crypto::CryptoPolicy;
|
||||||
|
use kanidm_lib_crypto::DbPasswordV1;
|
||||||
|
use kanidm_lib_crypto::Password;
|
||||||
|
use kanidm_proto::internal::OperationError;
|
||||||
|
use kanidm_proto::v1::{UnixGroupToken, UnixUserToken};
|
||||||
|
use kanidm_unix_common::unix_config::{GroupMap, KanidmConfig};
|
||||||
use kanidm_unix_common::unix_proto::PamAuthRequest;
|
use kanidm_unix_common::unix_proto::PamAuthRequest;
|
||||||
|
use std::collections::BTreeSet;
|
||||||
|
use std::time::{Duration, SystemTime};
|
||||||
|
use tokio::sync::{broadcast, Mutex};
|
||||||
|
|
||||||
const KANIDM_HMAC_KEY: &str = "kanidm-hmac-key";
|
const KANIDM_HMAC_KEY: &str = "kanidm-hmac-key";
|
||||||
const KANIDM_PWV1_KEY: &str = "kanidm-pw-v1";
|
const KANIDM_PWV1_KEY: &str = "kanidm-pw-v1";
|
||||||
|
|
|
@ -23,7 +23,3 @@ pub mod db;
|
||||||
pub mod idprovider;
|
pub mod idprovider;
|
||||||
#[cfg(target_family = "unix")]
|
#[cfg(target_family = "unix")]
|
||||||
pub mod resolver;
|
pub mod resolver;
|
||||||
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
|
||||||
pub mod selinux_util;
|
|
||||||
#[cfg(target_family = "unix")]
|
|
||||||
pub mod unix_config;
|
|
||||||
|
|
|
@ -1,18 +1,4 @@
|
||||||
// use async_trait::async_trait;
|
// use async_trait::async_trait;
|
||||||
use hashbrown::HashMap;
|
|
||||||
use std::fmt::Display;
|
|
||||||
use std::num::NonZeroUsize;
|
|
||||||
use std::ops::DerefMut;
|
|
||||||
use std::path::{Path, PathBuf};
|
|
||||||
use std::string::ToString;
|
|
||||||
use std::sync::Arc;
|
|
||||||
use std::time::{Duration, SystemTime};
|
|
||||||
|
|
||||||
use lru::LruCache;
|
|
||||||
use time::OffsetDateTime;
|
|
||||||
use tokio::sync::Mutex;
|
|
||||||
use uuid::Uuid;
|
|
||||||
|
|
||||||
use crate::db::{Cache, Db};
|
use crate::db::{Cache, Db};
|
||||||
use crate::idprovider::interface::{
|
use crate::idprovider::interface::{
|
||||||
AuthCredHandler,
|
AuthCredHandler,
|
||||||
|
@ -30,13 +16,25 @@ use crate::idprovider::interface::{
|
||||||
use crate::idprovider::system::{
|
use crate::idprovider::system::{
|
||||||
Shadow, SystemAuthResult, SystemProvider, SystemProviderAuthInit, SystemProviderSession,
|
Shadow, SystemAuthResult, SystemProvider, SystemProviderAuthInit, SystemProviderSession,
|
||||||
};
|
};
|
||||||
use crate::unix_config::{HomeAttr, UidAttr};
|
use hashbrown::HashMap;
|
||||||
use kanidm_unix_common::constants::DEFAULT_SHELL_SEARCH_PATHS;
|
use kanidm_unix_common::constants::DEFAULT_SHELL_SEARCH_PATHS;
|
||||||
|
use kanidm_unix_common::unix_config::{HomeAttr, UidAttr};
|
||||||
use kanidm_unix_common::unix_passwd::{EtcGroup, EtcShadow, EtcUser};
|
use kanidm_unix_common::unix_passwd::{EtcGroup, EtcShadow, EtcUser};
|
||||||
use kanidm_unix_common::unix_proto::{
|
use kanidm_unix_common::unix_proto::{
|
||||||
HomeDirectoryInfo, NssGroup, NssUser, PamAuthRequest, PamAuthResponse, PamServiceInfo,
|
HomeDirectoryInfo, NssGroup, NssUser, PamAuthRequest, PamAuthResponse, PamServiceInfo,
|
||||||
ProviderStatus,
|
ProviderStatus,
|
||||||
};
|
};
|
||||||
|
use lru::LruCache;
|
||||||
|
use std::fmt::Display;
|
||||||
|
use std::num::NonZeroUsize;
|
||||||
|
use std::ops::DerefMut;
|
||||||
|
use std::path::{Path, PathBuf};
|
||||||
|
use std::string::ToString;
|
||||||
|
use std::sync::Arc;
|
||||||
|
use std::time::{Duration, SystemTime};
|
||||||
|
use time::OffsetDateTime;
|
||||||
|
use tokio::sync::Mutex;
|
||||||
|
use uuid::Uuid;
|
||||||
|
|
||||||
use kanidm_hsm_crypto::BoxedDynTpm;
|
use kanidm_hsm_crypto::BoxedDynTpm;
|
||||||
|
|
||||||
|
|
|
@ -1,538 +0,0 @@
|
||||||
use std::env;
|
|
||||||
use std::fmt::{Display, Formatter};
|
|
||||||
use std::fs::File;
|
|
||||||
use std::io::{ErrorKind, Read};
|
|
||||||
use std::path::{Path, PathBuf};
|
|
||||||
|
|
||||||
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
|
||||||
use crate::selinux_util;
|
|
||||||
use kanidm_unix_common::unix_passwd::UnixIntegrationError;
|
|
||||||
|
|
||||||
pub(crate) use kanidm_unix_common::unix_config::{HomeAttr, UidAttr};
|
|
||||||
|
|
||||||
use serde::Deserialize;
|
|
||||||
|
|
||||||
use kanidm_unix_common::constants::*;
|
|
||||||
|
|
||||||
// Allowed as the large enum is only short lived at startup to the true config
|
|
||||||
#[allow(clippy::large_enum_variant)]
|
|
||||||
// This bit of magic lets us deserialise the old config and the new versions.
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
#[serde(untagged)]
|
|
||||||
enum ConfigUntagged {
|
|
||||||
Versioned(ConfigVersion),
|
|
||||||
Legacy(ConfigInt),
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
#[serde(tag = "version")]
|
|
||||||
enum ConfigVersion {
|
|
||||||
#[serde(rename = "2")]
|
|
||||||
V2 {
|
|
||||||
#[serde(flatten)]
|
|
||||||
values: ConfigV2,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
#[serde(deny_unknown_fields)]
|
|
||||||
struct ConfigV2 {
|
|
||||||
cache_db_path: Option<String>,
|
|
||||||
sock_path: Option<String>,
|
|
||||||
task_sock_path: Option<String>,
|
|
||||||
|
|
||||||
cache_timeout: Option<u64>,
|
|
||||||
|
|
||||||
default_shell: Option<String>,
|
|
||||||
home_prefix: Option<String>,
|
|
||||||
home_mount_prefix: Option<String>,
|
|
||||||
home_attr: Option<String>,
|
|
||||||
home_alias: Option<String>,
|
|
||||||
use_etc_skel: Option<bool>,
|
|
||||||
uid_attr_map: Option<String>,
|
|
||||||
gid_attr_map: Option<String>,
|
|
||||||
selinux: Option<bool>,
|
|
||||||
|
|
||||||
hsm_pin_path: Option<String>,
|
|
||||||
hsm_type: Option<String>,
|
|
||||||
tpm_tcti_name: Option<String>,
|
|
||||||
|
|
||||||
kanidm: Option<KanidmConfigV2>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Clone, Debug, Deserialize)]
|
|
||||||
pub struct GroupMap {
|
|
||||||
pub local: String,
|
|
||||||
pub with: String,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
struct KanidmConfigV2 {
|
|
||||||
conn_timeout: Option<u64>,
|
|
||||||
request_timeout: Option<u64>,
|
|
||||||
pam_allowed_login_groups: Option<Vec<String>>,
|
|
||||||
#[serde(default)]
|
|
||||||
map_group: Vec<GroupMap>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Deserialize)]
|
|
||||||
struct ConfigInt {
|
|
||||||
db_path: Option<String>,
|
|
||||||
sock_path: Option<String>,
|
|
||||||
task_sock_path: Option<String>,
|
|
||||||
conn_timeout: Option<u64>,
|
|
||||||
request_timeout: Option<u64>,
|
|
||||||
cache_timeout: Option<u64>,
|
|
||||||
pam_allowed_login_groups: Option<Vec<String>>,
|
|
||||||
default_shell: Option<String>,
|
|
||||||
home_prefix: Option<String>,
|
|
||||||
home_mount_prefix: Option<String>,
|
|
||||||
home_attr: Option<String>,
|
|
||||||
home_alias: Option<String>,
|
|
||||||
use_etc_skel: Option<bool>,
|
|
||||||
uid_attr_map: Option<String>,
|
|
||||||
gid_attr_map: Option<String>,
|
|
||||||
selinux: Option<bool>,
|
|
||||||
#[serde(default)]
|
|
||||||
allow_local_account_override: Vec<String>,
|
|
||||||
|
|
||||||
hsm_pin_path: Option<String>,
|
|
||||||
hsm_type: Option<String>,
|
|
||||||
tpm_tcti_name: Option<String>,
|
|
||||||
|
|
||||||
// Detect and warn on values in these places.
|
|
||||||
#[serde(default)]
|
|
||||||
cache_db_path: Option<toml::value::Value>,
|
|
||||||
#[serde(default)]
|
|
||||||
kanidm: Option<toml::value::Value>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, Default)]
|
|
||||||
pub enum HsmType {
|
|
||||||
#[cfg_attr(not(feature = "tpm"), default)]
|
|
||||||
Soft,
|
|
||||||
#[cfg_attr(feature = "tpm", default)]
|
|
||||||
TpmIfPossible,
|
|
||||||
Tpm,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Display for HsmType {
|
|
||||||
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
|
||||||
match self {
|
|
||||||
HsmType::Soft => write!(f, "Soft"),
|
|
||||||
HsmType::TpmIfPossible => write!(f, "Tpm if possible"),
|
|
||||||
HsmType::Tpm => write!(f, "Tpm"),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug)]
|
|
||||||
pub struct UnixdConfig {
|
|
||||||
pub cache_db_path: String,
|
|
||||||
pub sock_path: String,
|
|
||||||
pub task_sock_path: String,
|
|
||||||
pub cache_timeout: u64,
|
|
||||||
pub unix_sock_timeout: u64,
|
|
||||||
pub default_shell: String,
|
|
||||||
pub home_prefix: PathBuf,
|
|
||||||
pub home_mount_prefix: Option<PathBuf>,
|
|
||||||
pub home_attr: HomeAttr,
|
|
||||||
pub home_alias: Option<HomeAttr>,
|
|
||||||
pub use_etc_skel: bool,
|
|
||||||
pub uid_attr_map: UidAttr,
|
|
||||||
pub gid_attr_map: UidAttr,
|
|
||||||
pub selinux: bool,
|
|
||||||
pub hsm_type: HsmType,
|
|
||||||
pub hsm_pin_path: String,
|
|
||||||
pub tpm_tcti_name: String,
|
|
||||||
|
|
||||||
pub kanidm_config: Option<KanidmConfig>,
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug)]
|
|
||||||
pub struct KanidmConfig {
|
|
||||||
pub conn_timeout: u64,
|
|
||||||
pub request_timeout: u64,
|
|
||||||
pub pam_allowed_login_groups: Vec<String>,
|
|
||||||
pub map_group: Vec<GroupMap>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Default for UnixdConfig {
|
|
||||||
fn default() -> Self {
|
|
||||||
UnixdConfig::new()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl Display for UnixdConfig {
|
|
||||||
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
|
||||||
writeln!(f, "cache_db_path: {}", &self.cache_db_path)?;
|
|
||||||
writeln!(f, "sock_path: {}", self.sock_path)?;
|
|
||||||
writeln!(f, "task_sock_path: {}", self.task_sock_path)?;
|
|
||||||
writeln!(f, "unix_sock_timeout: {}", self.unix_sock_timeout)?;
|
|
||||||
writeln!(f, "cache_timeout: {}", self.cache_timeout)?;
|
|
||||||
writeln!(f, "default_shell: {}", self.default_shell)?;
|
|
||||||
writeln!(f, "home_prefix: {:?}", self.home_prefix)?;
|
|
||||||
match self.home_mount_prefix.as_deref() {
|
|
||||||
Some(val) => writeln!(f, "home_mount_prefix: {:?}", val)?,
|
|
||||||
None => writeln!(f, "home_mount_prefix: unset")?,
|
|
||||||
}
|
|
||||||
writeln!(f, "home_attr: {}", self.home_attr)?;
|
|
||||||
match self.home_alias {
|
|
||||||
Some(val) => writeln!(f, "home_alias: {}", val)?,
|
|
||||||
None => writeln!(f, "home_alias: unset")?,
|
|
||||||
}
|
|
||||||
|
|
||||||
writeln!(f, "uid_attr_map: {}", self.uid_attr_map)?;
|
|
||||||
writeln!(f, "gid_attr_map: {}", self.gid_attr_map)?;
|
|
||||||
|
|
||||||
writeln!(f, "hsm_type: {}", self.hsm_type)?;
|
|
||||||
writeln!(f, "tpm_tcti_name: {}", self.tpm_tcti_name)?;
|
|
||||||
|
|
||||||
writeln!(f, "selinux: {}", self.selinux)?;
|
|
||||||
|
|
||||||
if let Some(kconfig) = &self.kanidm_config {
|
|
||||||
writeln!(f, "kanidm: enabled")?;
|
|
||||||
writeln!(
|
|
||||||
f,
|
|
||||||
"kanidm pam_allowed_login_groups: {:#?}",
|
|
||||||
kconfig.pam_allowed_login_groups
|
|
||||||
)?;
|
|
||||||
writeln!(f, "kanidm conn_timeout: {}", kconfig.conn_timeout)?;
|
|
||||||
writeln!(f, "kanidm request_timeout: {}", kconfig.request_timeout)?;
|
|
||||||
} else {
|
|
||||||
writeln!(f, "kanidm: disabled")?;
|
|
||||||
};
|
|
||||||
|
|
||||||
Ok(())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl UnixdConfig {
|
|
||||||
pub fn new() -> Self {
|
|
||||||
let cache_db_path = match env::var("KANIDM_CACHE_DB_PATH") {
|
|
||||||
Ok(val) => val,
|
|
||||||
Err(_) => DEFAULT_CACHE_DB_PATH.into(),
|
|
||||||
};
|
|
||||||
let hsm_pin_path = match env::var("KANIDM_HSM_PIN_PATH") {
|
|
||||||
Ok(val) => val,
|
|
||||||
Err(_) => DEFAULT_HSM_PIN_PATH.into(),
|
|
||||||
};
|
|
||||||
|
|
||||||
UnixdConfig {
|
|
||||||
cache_db_path,
|
|
||||||
sock_path: DEFAULT_SOCK_PATH.to_string(),
|
|
||||||
task_sock_path: DEFAULT_TASK_SOCK_PATH.to_string(),
|
|
||||||
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
|
||||||
cache_timeout: DEFAULT_CACHE_TIMEOUT,
|
|
||||||
default_shell: DEFAULT_SHELL.to_string(),
|
|
||||||
home_prefix: DEFAULT_HOME_PREFIX.into(),
|
|
||||||
home_mount_prefix: None,
|
|
||||||
home_attr: DEFAULT_HOME_ATTR,
|
|
||||||
home_alias: DEFAULT_HOME_ALIAS,
|
|
||||||
use_etc_skel: DEFAULT_USE_ETC_SKEL,
|
|
||||||
uid_attr_map: DEFAULT_UID_ATTR_MAP,
|
|
||||||
gid_attr_map: DEFAULT_GID_ATTR_MAP,
|
|
||||||
selinux: DEFAULT_SELINUX,
|
|
||||||
hsm_pin_path,
|
|
||||||
hsm_type: HsmType::default(),
|
|
||||||
tpm_tcti_name: DEFAULT_TPM_TCTI_NAME.to_string(),
|
|
||||||
|
|
||||||
kanidm_config: None,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn read_options_from_optional_config<P: AsRef<Path> + std::fmt::Debug>(
|
|
||||||
self,
|
|
||||||
config_path: P,
|
|
||||||
) -> Result<Self, UnixIntegrationError> {
|
|
||||||
debug!("Attempting to load configuration from {:#?}", &config_path);
|
|
||||||
let mut f = match File::open(&config_path) {
|
|
||||||
Ok(f) => {
|
|
||||||
debug!("Successfully opened configuration file {:#?}", &config_path);
|
|
||||||
f
|
|
||||||
}
|
|
||||||
Err(e) => {
|
|
||||||
match e.kind() {
|
|
||||||
ErrorKind::NotFound => {
|
|
||||||
debug!(
|
|
||||||
"Configuration file {:#?} not found, skipping.",
|
|
||||||
&config_path
|
|
||||||
);
|
|
||||||
}
|
|
||||||
ErrorKind::PermissionDenied => {
|
|
||||||
warn!(
|
|
||||||
"Permission denied loading configuration file {:#?}, skipping.",
|
|
||||||
&config_path
|
|
||||||
);
|
|
||||||
}
|
|
||||||
_ => {
|
|
||||||
debug!(
|
|
||||||
"Unable to open config file {:#?} [{:?}], skipping ...",
|
|
||||||
&config_path, e
|
|
||||||
);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
return Ok(self);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut contents = String::new();
|
|
||||||
f.read_to_string(&mut contents).map_err(|e| {
|
|
||||||
error!("{:?}", e);
|
|
||||||
UnixIntegrationError
|
|
||||||
})?;
|
|
||||||
|
|
||||||
let config: ConfigUntagged = toml::from_str(contents.as_str()).map_err(|e| {
|
|
||||||
error!("{:?}", e);
|
|
||||||
UnixIntegrationError
|
|
||||||
})?;
|
|
||||||
|
|
||||||
match config {
|
|
||||||
ConfigUntagged::Legacy(config) => self.apply_from_config_legacy(config),
|
|
||||||
ConfigUntagged::Versioned(ConfigVersion::V2 { values }) => {
|
|
||||||
self.apply_from_config_v2(values)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn apply_from_config_legacy(self, config: ConfigInt) -> Result<Self, UnixIntegrationError> {
|
|
||||||
if config.kanidm.is_some() || config.cache_db_path.is_some() {
|
|
||||||
error!("You are using version=\"2\" options in a legacy config. THESE WILL NOT WORK.");
|
|
||||||
return Err(UnixIntegrationError);
|
|
||||||
}
|
|
||||||
|
|
||||||
let map_group = config
|
|
||||||
.allow_local_account_override
|
|
||||||
.iter()
|
|
||||||
.map(|name| GroupMap {
|
|
||||||
local: name.clone(),
|
|
||||||
with: name.clone(),
|
|
||||||
})
|
|
||||||
.collect();
|
|
||||||
|
|
||||||
let kanidm_config = Some(KanidmConfig {
|
|
||||||
conn_timeout: config.conn_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT),
|
|
||||||
request_timeout: config.request_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT * 2),
|
|
||||||
pam_allowed_login_groups: config.pam_allowed_login_groups.unwrap_or_default(),
|
|
||||||
map_group,
|
|
||||||
});
|
|
||||||
|
|
||||||
// Now map the values into our config.
|
|
||||||
Ok(UnixdConfig {
|
|
||||||
cache_db_path: config.db_path.unwrap_or(self.cache_db_path),
|
|
||||||
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
|
||||||
task_sock_path: config.task_sock_path.unwrap_or(self.task_sock_path),
|
|
||||||
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
|
||||||
cache_timeout: config.cache_timeout.unwrap_or(self.cache_timeout),
|
|
||||||
default_shell: config.default_shell.unwrap_or(self.default_shell),
|
|
||||||
home_prefix: config
|
|
||||||
.home_prefix
|
|
||||||
.map(|p| p.into())
|
|
||||||
.unwrap_or(self.home_prefix.clone()),
|
|
||||||
home_mount_prefix: config.home_mount_prefix.map(|p| p.into()),
|
|
||||||
home_attr: config
|
|
||||||
.home_attr
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"uuid" => Some(HomeAttr::Uuid),
|
|
||||||
"spn" => Some(HomeAttr::Spn),
|
|
||||||
"name" => Some(HomeAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid home_attr configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.home_attr),
|
|
||||||
home_alias: config
|
|
||||||
.home_alias
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"none" => Some(None),
|
|
||||||
"uuid" => Some(Some(HomeAttr::Uuid)),
|
|
||||||
"spn" => Some(Some(HomeAttr::Spn)),
|
|
||||||
"name" => Some(Some(HomeAttr::Name)),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid home_alias configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.home_alias),
|
|
||||||
use_etc_skel: config.use_etc_skel.unwrap_or(self.use_etc_skel),
|
|
||||||
uid_attr_map: config
|
|
||||||
.uid_attr_map
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"spn" => Some(UidAttr::Spn),
|
|
||||||
"name" => Some(UidAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid uid_attr_map configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.uid_attr_map),
|
|
||||||
gid_attr_map: config
|
|
||||||
.gid_attr_map
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"spn" => Some(UidAttr::Spn),
|
|
||||||
"name" => Some(UidAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid gid_attr_map configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.gid_attr_map),
|
|
||||||
selinux: match config.selinux.unwrap_or(self.selinux) {
|
|
||||||
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
|
||||||
true => selinux_util::supported(),
|
|
||||||
_ => false,
|
|
||||||
},
|
|
||||||
hsm_pin_path: config.hsm_pin_path.unwrap_or(self.hsm_pin_path),
|
|
||||||
hsm_type: config
|
|
||||||
.hsm_type
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"soft" => Some(HsmType::Soft),
|
|
||||||
"tpm_if_possible" => Some(HsmType::TpmIfPossible),
|
|
||||||
"tpm" => Some(HsmType::Tpm),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid hsm_type configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.hsm_type),
|
|
||||||
tpm_tcti_name: config
|
|
||||||
.tpm_tcti_name
|
|
||||||
.unwrap_or(DEFAULT_TPM_TCTI_NAME.to_string()),
|
|
||||||
kanidm_config,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
fn apply_from_config_v2(self, config: ConfigV2) -> Result<Self, UnixIntegrationError> {
|
|
||||||
let kanidm_config = if let Some(kconfig) = config.kanidm {
|
|
||||||
Some(KanidmConfig {
|
|
||||||
conn_timeout: kconfig.conn_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT),
|
|
||||||
request_timeout: kconfig.request_timeout.unwrap_or(DEFAULT_CONN_TIMEOUT * 2),
|
|
||||||
pam_allowed_login_groups: kconfig.pam_allowed_login_groups.unwrap_or_default(),
|
|
||||||
map_group: kconfig.map_group,
|
|
||||||
})
|
|
||||||
} else {
|
|
||||||
None
|
|
||||||
};
|
|
||||||
|
|
||||||
// Now map the values into our config.
|
|
||||||
Ok(UnixdConfig {
|
|
||||||
cache_db_path: config.cache_db_path.unwrap_or(self.cache_db_path),
|
|
||||||
sock_path: config.sock_path.unwrap_or(self.sock_path),
|
|
||||||
task_sock_path: config.task_sock_path.unwrap_or(self.task_sock_path),
|
|
||||||
unix_sock_timeout: DEFAULT_CONN_TIMEOUT * 2,
|
|
||||||
cache_timeout: config.cache_timeout.unwrap_or(self.cache_timeout),
|
|
||||||
default_shell: config.default_shell.unwrap_or(self.default_shell),
|
|
||||||
home_prefix: config
|
|
||||||
.home_prefix
|
|
||||||
.map(|p| p.into())
|
|
||||||
.unwrap_or(self.home_prefix.clone()),
|
|
||||||
home_mount_prefix: config.home_mount_prefix.map(|p| p.into()),
|
|
||||||
home_attr: config
|
|
||||||
.home_attr
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"uuid" => Some(HomeAttr::Uuid),
|
|
||||||
"spn" => Some(HomeAttr::Spn),
|
|
||||||
"name" => Some(HomeAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid home_attr configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.home_attr),
|
|
||||||
home_alias: config
|
|
||||||
.home_alias
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"none" => Some(None),
|
|
||||||
"uuid" => Some(Some(HomeAttr::Uuid)),
|
|
||||||
"spn" => Some(Some(HomeAttr::Spn)),
|
|
||||||
"name" => Some(Some(HomeAttr::Name)),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid home_alias configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.home_alias),
|
|
||||||
use_etc_skel: config.use_etc_skel.unwrap_or(self.use_etc_skel),
|
|
||||||
uid_attr_map: config
|
|
||||||
.uid_attr_map
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"spn" => Some(UidAttr::Spn),
|
|
||||||
"name" => Some(UidAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid uid_attr_map configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.uid_attr_map),
|
|
||||||
gid_attr_map: config
|
|
||||||
.gid_attr_map
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"spn" => Some(UidAttr::Spn),
|
|
||||||
"name" => Some(UidAttr::Name),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid gid_attr_map configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.gid_attr_map),
|
|
||||||
selinux: match config.selinux.unwrap_or(self.selinux) {
|
|
||||||
#[cfg(all(target_family = "unix", feature = "selinux"))]
|
|
||||||
true => selinux_util::supported(),
|
|
||||||
_ => false,
|
|
||||||
},
|
|
||||||
hsm_pin_path: config.hsm_pin_path.unwrap_or(self.hsm_pin_path),
|
|
||||||
hsm_type: config
|
|
||||||
.hsm_type
|
|
||||||
.and_then(|v| match v.as_str() {
|
|
||||||
"soft" => Some(HsmType::Soft),
|
|
||||||
"tpm_if_possible" => Some(HsmType::TpmIfPossible),
|
|
||||||
"tpm" => Some(HsmType::Tpm),
|
|
||||||
_ => {
|
|
||||||
warn!("Invalid hsm_type configured, using default ...");
|
|
||||||
None
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.unwrap_or(self.hsm_type),
|
|
||||||
tpm_tcti_name: config
|
|
||||||
.tpm_tcti_name
|
|
||||||
.unwrap_or(DEFAULT_TPM_TCTI_NAME.to_string()),
|
|
||||||
kanidm_config,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[cfg(test)]
|
|
||||||
mod tests {
|
|
||||||
use std::path::PathBuf;
|
|
||||||
|
|
||||||
use super::*;
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn test_load_example_configs() {
|
|
||||||
// Test the various included configs
|
|
||||||
|
|
||||||
let examples_dir = env!("CARGO_MANIFEST_DIR").to_string() + "/../../examples/";
|
|
||||||
|
|
||||||
for file in PathBuf::from(&examples_dir)
|
|
||||||
.canonicalize()
|
|
||||||
.expect(&format!("Can't find examples dir at {}", examples_dir))
|
|
||||||
.read_dir()
|
|
||||||
.expect("Can't read examples dir!")
|
|
||||||
{
|
|
||||||
let file = file.unwrap();
|
|
||||||
let filename = file.file_name().into_string().unwrap();
|
|
||||||
if filename.starts_with("unixd") {
|
|
||||||
print!("Checking that {} parses as a valid config...", filename);
|
|
||||||
|
|
||||||
UnixdConfig::new()
|
|
||||||
.read_options_from_optional_config(file.path())
|
|
||||||
.inspect_err(|e| {
|
|
||||||
println!("Failed to parse: {:?}", e);
|
|
||||||
})
|
|
||||||
.expect("Failed to parse!");
|
|
||||||
println!("OK");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -12,13 +12,13 @@ use kanidm_unix_common::constants::{
|
||||||
DEFAULT_GID_ATTR_MAP, DEFAULT_HOME_ALIAS, DEFAULT_HOME_ATTR, DEFAULT_HOME_PREFIX,
|
DEFAULT_GID_ATTR_MAP, DEFAULT_HOME_ALIAS, DEFAULT_HOME_ATTR, DEFAULT_HOME_PREFIX,
|
||||||
DEFAULT_SHELL, DEFAULT_UID_ATTR_MAP,
|
DEFAULT_SHELL, DEFAULT_UID_ATTR_MAP,
|
||||||
};
|
};
|
||||||
|
use kanidm_unix_common::unix_config::{GroupMap, KanidmConfig};
|
||||||
use kanidm_unix_common::unix_passwd::{CryptPw, EtcGroup, EtcShadow, EtcUser};
|
use kanidm_unix_common::unix_passwd::{CryptPw, EtcGroup, EtcShadow, EtcUser};
|
||||||
use kanidm_unix_resolver::db::{Cache, Db};
|
use kanidm_unix_resolver::db::{Cache, Db};
|
||||||
use kanidm_unix_resolver::idprovider::interface::Id;
|
use kanidm_unix_resolver::idprovider::interface::Id;
|
||||||
use kanidm_unix_resolver::idprovider::kanidm::KanidmProvider;
|
use kanidm_unix_resolver::idprovider::kanidm::KanidmProvider;
|
||||||
use kanidm_unix_resolver::idprovider::system::SystemProvider;
|
use kanidm_unix_resolver::idprovider::system::SystemProvider;
|
||||||
use kanidm_unix_resolver::resolver::Resolver;
|
use kanidm_unix_resolver::resolver::Resolver;
|
||||||
use kanidm_unix_resolver::unix_config::{GroupMap, KanidmConfig};
|
|
||||||
use kanidmd_core::config::{Configuration, IntegrationTestConfig, ServerRole};
|
use kanidmd_core::config::{Configuration, IntegrationTestConfig, ServerRole};
|
||||||
use kanidmd_core::create_server_core;
|
use kanidmd_core::create_server_core;
|
||||||
use kanidmd_testkit::{is_free_port, PORT_ALLOC};
|
use kanidmd_testkit::{is_free_port, PORT_ALLOC};
|
||||||
|
|
Loading…
Reference in a new issue