summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins/hbac.py
diff options
context:
space:
mode:
authorPavel Zuna <pzuna@redhat.com>2009-09-30 16:24:25 +0200
committerRob Crittenden <rcritten@redhat.com>2009-10-05 15:55:27 -0400
commita6eb928f9871700d4c749e6fb1a8161940dda02b (patch)
treeac8022a7a8d0c815433cce91318bb74aa953e50c /ipalib/plugins/hbac.py
parentdac224c25a2ff8a1400d0a746f600f81cfad6901 (diff)
downloadfreeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.tar.gz
freeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.tar.xz
freeipa-a6eb928f9871700d4c749e6fb1a8161940dda02b.zip
Add HBAC plugin and introduce GeneralizedTime parameter type.
Diffstat (limited to 'ipalib/plugins/hbac.py')
-rw-r--r--ipalib/plugins/hbac.py260
1 files changed, 260 insertions, 0 deletions
diff --git a/ipalib/plugins/hbac.py b/ipalib/plugins/hbac.py
new file mode 100644
index 00000000..16a93d28
--- /dev/null
+++ b/ipalib/plugins/hbac.py
@@ -0,0 +1,260 @@
+# Authors:
+# Pavel Zuna <pzuna@redhat.com>
+#
+# Copyright (C) 2009 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License as
+# published by the Free Software Foundation; version 2 only
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+"""
+Host based access control
+"""
+
+from ipalib import api, errors
+from ipalib import GeneralizedTime, Password, Str, StrEnum
+from ipalib.plugins.baseldap import *
+
+class hbac(LDAPObject):
+ """
+ HBAC object.
+ """
+ container_dn = api.env.container_hbac
+ object_name = 'HBAC rule'
+ object_name_plural = 'HBAC rules'
+ object_class = ['ipaassociation', 'ipahbacrule']
+ default_attributes = [
+ 'cn', 'accessruletype', 'ipaenabledflag', 'servicename',
+ 'accesstime', 'description',
+
+ ]
+ uuid_attribute = 'ipauniqueid'
+ attribute_names = {
+ 'cn': 'name',
+ 'accessruletype': 'type',
+ 'ipaenabledflag': 'status',
+ 'servicename': 'service',
+ 'ipauniqueid': 'unique id',
+ 'memberuser user': 'affected users',
+ 'memberuser group': 'affected groups',
+ 'memberhost host': 'affected hosts',
+ 'memberhost hostgroup': 'affected hostgroups',
+ 'sourcehost host': 'affected source hosts',
+ 'sourcehost hostgroup': 'affected source hostgroups',
+ }
+ attribute_order = ['cn', 'accessruletype', 'ipaenabledflag', 'servicename']
+ attribute_members = {
+ 'memberuser': ['user', 'group'],
+ 'memberhost': ['host', 'hostgroup'],
+ 'sourcehost': ['host', 'hostgroup'],
+ }
+
+ takes_params = (
+ Str('cn',
+ cli_name='name',
+ doc='rule name',
+ primary_key=True,
+ ),
+ StrEnum('accessruletype',
+ cli_name='type',
+ doc='rule type (allow or deny)',
+ values=(u'allow', u'deny'),
+ ),
+ Str('servicename?',
+ cli_name='service',
+ doc='name of service the rule applies to (e.g. ssh)',
+ ),
+ GeneralizedTime('accesstime?',
+ cli_name='time',
+ doc='access time in generalizedTime format (RFC 4517)',
+ ),
+ Str('description?',
+ cli_name='desc',
+ doc='description',
+ ),
+ )
+
+ def get_dn(self, *keys, **kwargs):
+ try:
+ (dn, entry_attrs) = self.backend.find_entry_by_attr(
+ self.primary_key.name, keys[-1], self.object_class, [''],
+ self.container_dn
+ )
+ except errors.NotFound:
+ dn = super(hbac, self).get_dn(*keys, **kwargs)
+ return dn
+
+ def get_primary_key_from_dn(self, dn):
+ pkey = self.primary_key.name
+ (dn, entry_attrs) = self.backend.get_entry(dn, [pkey])
+ return entry_attrs.get(pkey, '')
+
+api.register(hbac)
+
+
+class hbac_add(LDAPCreate):
+ """
+ Create new HBAC rule.
+ """
+ def pre_callback(self, ldap, dn, entry_attrs, *keys, **options):
+ if not dn.startswith('cn='):
+ msg = 'HBAC rule with name "%s" already exists' % keys[-1]
+ raise errors.DuplicateEntry(message=msg)
+ # HBAC rules are enabled by default
+ entry_attrs['ipaenabledflag'] = 'enabled'
+ return ldap.make_dn(
+ entry_attrs, self.obj.uuid_attribute, self.obj.container_dn
+ )
+
+api.register(hbac_add)
+
+
+class hbac_del(LDAPDelete):
+ """
+ Delete HBAC rule.
+ """
+
+api.register(hbac_del)
+
+
+class hbac_mod(LDAPUpdate):
+ """
+ Modify HBAC rule.
+ """
+
+api.register(hbac_mod)
+
+
+class hbac_find(LDAPSearch):
+ """
+ Search for HBAC rules.
+ """
+
+api.register(hbac_find)
+
+
+class hbac_show(LDAPRetrieve):
+ """
+ Dispaly HBAC rule.
+ """
+
+api.register(hbac_show)
+
+
+class hbac_enable(LDAPQuery):
+ """
+ Enable HBAC rule.
+ """
+ def execute(self, cn):
+ ldap = self.obj.backend
+
+ dn = self.obj.get_dn(cn)
+ entry_attrs = {'ipaenabledflag': 'enabled'}
+
+ try:
+ ldap.update_entry(dn, entry_attrs)
+ except errors.EmptyModlist:
+ pass
+
+ return True
+
+ def output_for_cli(self, textui, result, cn):
+ textui.print_name(self.name)
+ textui.print_dashed('Enabled HBAC rule "%s".' % cn)
+
+api.register(hbac_enable)
+
+
+class hbac_disable(LDAPQuery):
+ """
+ Disable HBAC rule.
+ """
+ def execute(self, cn):
+ ldap = self.obj.backend
+
+ dn = self.obj.get_dn(cn)
+ entry_attrs = {'ipaenabledflag': 'disabled'}
+
+ try:
+ ldap.update_entry(dn, entry_attrs)
+ except errors.EmptyModlist:
+ pass
+
+ return True
+
+ def output_for_cli(self, textui, result, cn):
+ textui.print_name(self.name)
+ textui.print_dashed('Disabled HBAC rule "%s".' % cn)
+
+api.register(hbac_disable)
+
+
+class hbac_add_user(LDAPAddMember):
+ """
+ Add users and groups affected by HBAC rule.
+ """
+ member_attributes = ['memberuser']
+ member_count_out = ('%i object added.', '%i objects added.')
+
+api.register(hbac_add_user)
+
+
+class hbac_remove_user(LDAPRemoveMember):
+ """
+ Remove users and groups affected by HBAC rule.
+ """
+ member_attributes = ['memberuser']
+ member_count_out = ('%i object removed.', '%i objects removed.')
+
+api.register(hbac_remove_user)
+
+
+class hbac_add_host(LDAPAddMember):
+ """
+ Add hosts and hostgroups affected by HBAC rule.
+ """
+ member_attributes = ['memberhost']
+ member_count_out = ('%i object added.', '%i objects added.')
+
+api.register(hbac_add_host)
+
+
+class hbac_remove_host(LDAPRemoveMember):
+ """
+ Remove hosts and hostgroups affected by HBAC rule.
+ """
+ member_attributes = ['memberhost']
+ member_count_out = ('%i object removed.', '%i objects removed.')
+
+api.register(hbac_remove_host)
+
+
+class hbac_add_sourcehost(LDAPAddMember):
+ """
+ Add source hosts and hostgroups affected by HBAC rule.
+ """
+ member_attributes = ['sourcehost']
+ member_count_out = ('%i object added.', '%i objects added.')
+
+api.register(hbac_add_sourcehost)
+
+
+class hbac_remove_sourcehost(LDAPRemoveMember):
+ """
+ Remove source hosts and hostgroups affected by HBAC rule.
+ """
+ member_attributes = ['sourcehost']
+ member_count_out = ('%i object removed.', '%i objects removed.')
+
+api.register(hbac_remove_sourcehost)
+
+