diff options
author | Pavel Zuna <pzuna@redhat.com> | 2009-09-30 16:24:25 +0200 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2009-10-05 15:55:27 -0400 |
commit | a6eb928f9871700d4c749e6fb1a8161940dda02b (patch) | |
tree | ac8022a7a8d0c815433cce91318bb74aa953e50c /ipalib/plugins | |
parent | dac224c25a2ff8a1400d0a746f600f81cfad6901 (diff) | |
download | freeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.tar.gz freeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.tar.xz freeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.zip |
Add HBAC plugin and introduce GeneralizedTime parameter type.
Diffstat (limited to 'ipalib/plugins')
-rw-r--r-- | ipalib/plugins/hbac.py | 260 |
1 files changed, 260 insertions, 0 deletions
diff --git a/ipalib/plugins/hbac.py b/ipalib/plugins/hbac.py new file mode 100644 index 000000000..16a93d28c --- /dev/null +++ b/ipalib/plugins/hbac.py @@ -0,0 +1,260 @@ +# Authors: +# Pavel Zuna <pzuna@redhat.com> +# +# Copyright (C) 2009 Red Hat +# see file 'COPYING' for use and warranty information +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License as +# published by the Free Software Foundation; version 2 only +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA +""" +Host based access control +""" + +from ipalib import api, errors +from ipalib import GeneralizedTime, Password, Str, StrEnum +from ipalib.plugins.baseldap import * + +class hbac(LDAPObject): + """ + HBAC object. + """ + container_dn = api.env.container_hbac + object_name = 'HBAC rule' + object_name_plural = 'HBAC rules' + object_class = ['ipaassociation', 'ipahbacrule'] + default_attributes = [ + 'cn', 'accessruletype', 'ipaenabledflag', 'servicename', + 'accesstime', 'description', + + ] + uuid_attribute = 'ipauniqueid' + attribute_names = { + 'cn': 'name', + 'accessruletype': 'type', + 'ipaenabledflag': 'status', + 'servicename': 'service', + 'ipauniqueid': 'unique id', + 'memberuser user': 'affected users', + 'memberuser group': 'affected groups', + 'memberhost host': 'affected hosts', + 'memberhost hostgroup': 'affected hostgroups', + 'sourcehost host': 'affected source hosts', + 'sourcehost hostgroup': 'affected source hostgroups', + } + attribute_order = ['cn', 'accessruletype', 'ipaenabledflag', 'servicename'] + attribute_members = { + 'memberuser': ['user', 'group'], + 'memberhost': ['host', 'hostgroup'], + 'sourcehost': ['host', 'hostgroup'], + } + + takes_params = ( + Str('cn', + cli_name='name', + doc='rule name', + primary_key=True, + ), + StrEnum('accessruletype', + cli_name='type', + doc='rule type (allow or deny)', + values=(u'allow', u'deny'), + ), + Str('servicename?', + cli_name='service', + doc='name of service the rule applies to (e.g. ssh)', + ), + GeneralizedTime('accesstime?', + cli_name='time', + doc='access time in generalizedTime format (RFC 4517)', + ), + Str('description?', + cli_name='desc', + doc='description', + ), + ) + + def get_dn(self, *keys, **kwargs): + try: + (dn, entry_attrs) = self.backend.find_entry_by_attr( + self.primary_key.name, keys[-1], self.object_class, [''], + self.container_dn + ) + except errors.NotFound: + dn = super(hbac, self).get_dn(*keys, **kwargs) + return dn + + def get_primary_key_from_dn(self, dn): + pkey = self.primary_key.name + (dn, entry_attrs) = self.backend.get_entry(dn, [pkey]) + return entry_attrs.get(pkey, '') + +api.register(hbac) + + +class hbac_add(LDAPCreate): + """ + Create new HBAC rule. + """ + def pre_callback(self, ldap, dn, entry_attrs, *keys, **options): + if not dn.startswith('cn='): + msg = 'HBAC rule with name "%s" already exists' % keys[-1] + raise errors.DuplicateEntry(message=msg) + # HBAC rules are enabled by default + entry_attrs['ipaenabledflag'] = 'enabled' + return ldap.make_dn( + entry_attrs, self.obj.uuid_attribute, self.obj.container_dn + ) + +api.register(hbac_add) + + +class hbac_del(LDAPDelete): + """ + Delete HBAC rule. + """ + +api.register(hbac_del) + + +class hbac_mod(LDAPUpdate): + """ + Modify HBAC rule. + """ + +api.register(hbac_mod) + + +class hbac_find(LDAPSearch): + """ + Search for HBAC rules. + """ + +api.register(hbac_find) + + +class hbac_show(LDAPRetrieve): + """ + Dispaly HBAC rule. + """ + +api.register(hbac_show) + + +class hbac_enable(LDAPQuery): + """ + Enable HBAC rule. + """ + def execute(self, cn): + ldap = self.obj.backend + + dn = self.obj.get_dn(cn) + entry_attrs = {'ipaenabledflag': 'enabled'} + + try: + ldap.update_entry(dn, entry_attrs) + except errors.EmptyModlist: + pass + + return True + + def output_for_cli(self, textui, result, cn): + textui.print_name(self.name) + textui.print_dashed('Enabled HBAC rule "%s".' % cn) + +api.register(hbac_enable) + + +class hbac_disable(LDAPQuery): + """ + Disable HBAC rule. + """ + def execute(self, cn): + ldap = self.obj.backend + + dn = self.obj.get_dn(cn) + entry_attrs = {'ipaenabledflag': 'disabled'} + + try: + ldap.update_entry(dn, entry_attrs) + except errors.EmptyModlist: + pass + + return True + + def output_for_cli(self, textui, result, cn): + textui.print_name(self.name) + textui.print_dashed('Disabled HBAC rule "%s".' % cn) + +api.register(hbac_disable) + + +class hbac_add_user(LDAPAddMember): + """ + Add users and groups affected by HBAC rule. + """ + member_attributes = ['memberuser'] + member_count_out = ('%i object added.', '%i objects added.') + +api.register(hbac_add_user) + + +class hbac_remove_user(LDAPRemoveMember): + """ + Remove users and groups affected by HBAC rule. + """ + member_attributes = ['memberuser'] + member_count_out = ('%i object removed.', '%i objects removed.') + +api.register(hbac_remove_user) + + +class hbac_add_host(LDAPAddMember): + """ + Add hosts and hostgroups affected by HBAC rule. + """ + member_attributes = ['memberhost'] + member_count_out = ('%i object added.', '%i objects added.') + +api.register(hbac_add_host) + + +class hbac_remove_host(LDAPRemoveMember): + """ + Remove hosts and hostgroups affected by HBAC rule. + """ + member_attributes = ['memberhost'] + member_count_out = ('%i object removed.', '%i objects removed.') + +api.register(hbac_remove_host) + + +class hbac_add_sourcehost(LDAPAddMember): + """ + Add source hosts and hostgroups affected by HBAC rule. + """ + member_attributes = ['sourcehost'] + member_count_out = ('%i object added.', '%i objects added.') + +api.register(hbac_add_sourcehost) + + +class hbac_remove_sourcehost(LDAPRemoveMember): + """ + Remove source hosts and hostgroups affected by HBAC rule. + """ + member_attributes = ['sourcehost'] + member_count_out = ('%i object removed.', '%i objects removed.') + +api.register(hbac_remove_sourcehost) + + |