mirror of
https://github.com/mofeng-git/One-KVM.git
synced 2025-12-12 01:00:29 +08:00
pam auth module
This commit is contained in:
parent
965e6fda8d
commit
bef7be3030
1
PKGBUILD
1
PKGBUILD
@ -38,6 +38,7 @@ depends=(
|
|||||||
python-dbus
|
python-dbus
|
||||||
python-pygments
|
python-pygments
|
||||||
python-pyghmi
|
python-pyghmi
|
||||||
|
python-pam
|
||||||
v4l-utils
|
v4l-utils
|
||||||
nginx-mainline
|
nginx-mainline
|
||||||
openssl
|
openssl
|
||||||
|
|||||||
99
kvmd/plugins/auth/pam.py
Normal file
99
kvmd/plugins/auth/pam.py
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
# ========================================================================== #
|
||||||
|
# #
|
||||||
|
# KVMD - The main Pi-KVM daemon. #
|
||||||
|
# #
|
||||||
|
# Copyright (C) 2018 Maxim Devaev <mdevaev@gmail.com> #
|
||||||
|
# #
|
||||||
|
# This program is free software: you can redistribute it and/or modify #
|
||||||
|
# it under the terms of the GNU General Public License as published by #
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or #
|
||||||
|
# (at your option) any later version. #
|
||||||
|
# #
|
||||||
|
# This program is distributed in the hope that it will be useful, #
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
|
||||||
|
# GNU General Public License for more details. #
|
||||||
|
# #
|
||||||
|
# You should have received a copy of the GNU General Public License #
|
||||||
|
# along with this program. If not, see <https://www.gnu.org/licenses/>. #
|
||||||
|
# #
|
||||||
|
# ========================================================================== #
|
||||||
|
|
||||||
|
|
||||||
|
import asyncio
|
||||||
|
import pwd
|
||||||
|
|
||||||
|
from typing import List
|
||||||
|
from typing import Dict
|
||||||
|
|
||||||
|
import pam
|
||||||
|
|
||||||
|
from ...yamlconf import Option
|
||||||
|
|
||||||
|
from ...validators.basic import valid_number
|
||||||
|
from ...validators.auth import valid_users_list
|
||||||
|
|
||||||
|
from ...logging import get_logger
|
||||||
|
|
||||||
|
from ... import aiotools
|
||||||
|
|
||||||
|
from . import BaseAuthService
|
||||||
|
|
||||||
|
|
||||||
|
# =====
|
||||||
|
class Plugin(BaseAuthService):
|
||||||
|
def __init__( # pylint: disable=super-init-not-called
|
||||||
|
self,
|
||||||
|
service: str,
|
||||||
|
allow_users: List[str],
|
||||||
|
deny_users: List[str],
|
||||||
|
allow_uids_at: int,
|
||||||
|
) -> None:
|
||||||
|
|
||||||
|
self.__service = service
|
||||||
|
self.__allow_users = allow_users
|
||||||
|
self.__deny_users = deny_users
|
||||||
|
self.__allow_uids_at = allow_uids_at
|
||||||
|
|
||||||
|
self.__lock = asyncio.Lock()
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def get_plugin_options(cls) -> Dict:
|
||||||
|
return {
|
||||||
|
"service": Option("login"),
|
||||||
|
"allow_users": Option([], type=valid_users_list),
|
||||||
|
"deny_users": Option([], type=valid_users_list),
|
||||||
|
"allow_uids_at": Option(0, type=(lambda arg: valid_number(arg, min=0))),
|
||||||
|
}
|
||||||
|
|
||||||
|
async def authorize(self, user: str, passwd: str) -> bool:
|
||||||
|
async with self.__lock:
|
||||||
|
return (await aiotools.run_async(self.__inner_authorize, user, passwd))
|
||||||
|
|
||||||
|
def __inner_authorize(self, user: str, passwd: str) -> bool:
|
||||||
|
if self.__allow_users and user not in self.__allow_users:
|
||||||
|
get_logger().error("User %r not in allow-list", user)
|
||||||
|
return False
|
||||||
|
|
||||||
|
if self.__deny_users and user in self.__deny_users:
|
||||||
|
get_logger().error("User %r in deny-list", user)
|
||||||
|
return False
|
||||||
|
|
||||||
|
if self.__allow_uids_at > 0:
|
||||||
|
try:
|
||||||
|
uid = pwd.getpwnam(user).pw_uid
|
||||||
|
except Exception:
|
||||||
|
get_logger().exception("Can't find UID of user %r", user)
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
if uid < self.__allow_uids_at:
|
||||||
|
get_logger().error("Unallowed UID of user %r: uid=%d < allow_uids_at=%d",
|
||||||
|
user, uid, self.__allow_uids_at)
|
||||||
|
return False
|
||||||
|
|
||||||
|
pam_obj = pam.pam()
|
||||||
|
if not pam_obj.authenticate(user, passwd, service=self.__service):
|
||||||
|
get_logger().error("Can't authorize user %r using PAM: code=%d; reason=%s",
|
||||||
|
user, pam_obj.code, pam_obj.reason)
|
||||||
|
return False
|
||||||
|
return True
|
||||||
@ -8,3 +8,4 @@ pyserial
|
|||||||
setproctitle
|
setproctitle
|
||||||
pygments
|
pygments
|
||||||
pyghmi
|
pyghmi
|
||||||
|
python-pam
|
||||||
|
|||||||
92
testenv/tests/plugins/auth/test_pam.py
Normal file
92
testenv/tests/plugins/auth/test_pam.py
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
# ========================================================================== #
|
||||||
|
# #
|
||||||
|
# KVMD - The main Pi-KVM daemon. #
|
||||||
|
# #
|
||||||
|
# Copyright (C) 2018 Maxim Devaev <mdevaev@gmail.com> #
|
||||||
|
# #
|
||||||
|
# This program is free software: you can redistribute it and/or modify #
|
||||||
|
# it under the terms of the GNU General Public License as published by #
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or #
|
||||||
|
# (at your option) any later version. #
|
||||||
|
# #
|
||||||
|
# This program is distributed in the hope that it will be useful, #
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
|
||||||
|
# GNU General Public License for more details. #
|
||||||
|
# #
|
||||||
|
# You should have received a copy of the GNU General Public License #
|
||||||
|
# along with this program. If not, see <https://www.gnu.org/licenses/>. #
|
||||||
|
# #
|
||||||
|
# ========================================================================== #
|
||||||
|
|
||||||
|
|
||||||
|
import asyncio
|
||||||
|
import signal
|
||||||
|
import pwd
|
||||||
|
|
||||||
|
from typing import Dict
|
||||||
|
from typing import AsyncGenerator
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from . import get_configured_auth_service
|
||||||
|
|
||||||
|
|
||||||
|
# =====
|
||||||
|
_UID = 1500
|
||||||
|
_USER = "foobar"
|
||||||
|
_PASSWD = "query"
|
||||||
|
|
||||||
|
|
||||||
|
# =====
|
||||||
|
async def _run_process(cmd: str, input: Optional[str]=None) -> None: # pylint: disable=redefined-builtin
|
||||||
|
proc = await asyncio.create_subprocess_exec(
|
||||||
|
*cmd.split(" "),
|
||||||
|
stdin=(asyncio.subprocess.PIPE if input is not None else None),
|
||||||
|
preexec_fn=(lambda: signal.signal(signal.SIGINT, signal.SIG_IGN)),
|
||||||
|
)
|
||||||
|
await proc.communicate(input.encode() if input is not None else None)
|
||||||
|
assert proc.returncode == 0
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture(name="test_user")
|
||||||
|
async def _test_user() -> AsyncGenerator[None, None]:
|
||||||
|
with pytest.raises(KeyError):
|
||||||
|
pwd.getpwnam(_USER)
|
||||||
|
await _run_process(f"useradd -u {_UID} -s /bin/bash {_USER}")
|
||||||
|
await _run_process("chpasswd", input=f"{_USER}:{_PASSWD}\n")
|
||||||
|
|
||||||
|
assert pwd.getpwnam(_USER).pw_uid == _UID
|
||||||
|
|
||||||
|
try:
|
||||||
|
yield
|
||||||
|
finally:
|
||||||
|
await _run_process(f"userdel -r {_USER}")
|
||||||
|
with pytest.raises(KeyError):
|
||||||
|
pwd.getpwnam(_USER)
|
||||||
|
|
||||||
|
|
||||||
|
# =====
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
@pytest.mark.parametrize("kwargs", [
|
||||||
|
{},
|
||||||
|
{"allow_users": [_USER]},
|
||||||
|
{"allow_uids_at": _UID},
|
||||||
|
])
|
||||||
|
async def test_ok(test_user, kwargs: Dict) -> None: # type: ignore
|
||||||
|
async with get_configured_auth_service("pam", **kwargs) as service:
|
||||||
|
assert not (await service.authorize(_USER, "invalid_password"))
|
||||||
|
assert (await service.authorize(_USER, _PASSWD))
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
@pytest.mark.parametrize("kwargs", [
|
||||||
|
{"allow_users": ["root"]},
|
||||||
|
{"deny_users": [_USER]},
|
||||||
|
{"allow_uids_at": _UID + 1},
|
||||||
|
])
|
||||||
|
async def test_fail(test_user, kwargs: Dict) -> None: # type: ignore
|
||||||
|
async with get_configured_auth_service("pam", **kwargs) as service:
|
||||||
|
assert not (await service.authorize(_USER, "invalid_password"))
|
||||||
|
assert not (await service.authorize(_USER, _PASSWD))
|
||||||
Loading…
x
Reference in New Issue
Block a user