]> git.proxmox.com Git - pve-access-control.git/blame - PVE/Auth/Plugin.pm
auth: pull username REs into variables
[pve-access-control.git] / PVE / Auth / Plugin.pm
CommitLineData
5bb4e06a
DM
1package PVE::Auth::Plugin;
2
3use strict;
4use warnings;
5use Encode;
6use Digest::SHA;
7use PVE::Tools;
8use PVE::SectionConfig;
9use PVE::JSONSchema qw(get_standard_option);
10use PVE::Cluster qw(cfs_register_file cfs_read_file cfs_lock_file);
11
5bb4e06a
DM
12use base qw(PVE::SectionConfig);
13
14my $domainconfigfile = "domains.cfg";
15
0a6e09fd 16cfs_register_file($domainconfigfile,
5bb4e06a
DM
17 sub { __PACKAGE__->parse_config(@_); },
18 sub { __PACKAGE__->write_config(@_); });
19
20sub lock_domain_config {
21 my ($code, $errmsg) = @_;
22
23 cfs_lock_file($domainconfigfile, undef, $code);
24 my $err = $@;
25 if ($err) {
26 $errmsg ? die "$errmsg: $err" : die $err;
27 }
28}
29
8e23f971
FG
30our $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
31our $user_regex = qr![^\s:/]+!;
5bb4e06a
DM
32
33PVE::JSONSchema::register_format('pve-realm', \&pve_verify_realm);
34sub pve_verify_realm {
35 my ($realm, $noerr) = @_;
0a6e09fd 36
5bb4e06a
DM
37 if ($realm !~ m/^${realm_regex}$/) {
38 return undef if $noerr;
0a6e09fd 39 die "value does not look like a valid realm\n";
5bb4e06a
DM
40 }
41 return $realm;
42}
43
44PVE::JSONSchema::register_standard_option('realm', {
45 description => "Authentication domain ID",
46 type => 'string', format => 'pve-realm',
47 maxLength => 32,
48});
49
50PVE::JSONSchema::register_format('pve-userid', \&verify_username);
51sub verify_username {
52 my ($username, $noerr) = @_;
53
54 $username = '' if !$username;
55 my $len = length($username);
56 if ($len < 3) {
57 die "user name '$username' is too short\n" if !$noerr;
58 return undef;
59 }
60 if ($len > 64) {
61 die "user name '$username' is too long ($len > 64)\n" if !$noerr;
62 return undef;
63 }
64
65 # we only allow a limited set of characters
0a6e09fd 66 # colon is not allowed, because we store usernames in
5bb4e06a
DM
67 # colon separated lists)!
68 # slash is not allowed because it is used as pve API delimiter
0a6e09fd 69 # also see "man useradd"
8e23f971 70 if ($username =~ m!^(${user_regex})\@(${realm_regex})$!) {
5bb4e06a
DM
71 return wantarray ? ($username, $1, $2) : $username;
72 }
73
74 die "value '$username' does not look like a valid user name\n" if !$noerr;
75
76 return undef;
77}
78
79PVE::JSONSchema::register_standard_option('userid', {
af5d7da7 80 description => "User ID",
5bb4e06a
DM
81 type => 'string', format => 'pve-userid',
82 maxLength => 64,
83});
84
9401be39
WB
85my $tfa_format = {
86 type => {
87 description => "The type of 2nd factor authentication.",
88 format_description => 'TFATYPE',
89 type => 'string',
90 enum => [qw(yubico oath)],
91 },
92 id => {
93 description => "Yubico API ID.",
94 format_description => 'ID',
95 type => 'string',
96 optional => 1,
97 },
98 key => {
99 description => "Yubico API Key.",
100 format_description => 'KEY',
101 type => 'string',
102 optional => 1,
103 },
104 url => {
105 description => "Yubico API URL.",
106 format_description => 'URL',
107 type => 'string',
108 optional => 1,
109 },
110 digits => {
111 description => "TOTP digits.",
112 format_description => 'COUNT',
113 type => 'integer',
114 minimum => 6, maximum => 8,
115 default => 6,
116 optional => 1,
117 },
118 step => {
119 description => "TOTP time period.",
120 format_description => 'SECONDS',
121 type => 'integer',
122 minimum => 10,
123 default => 30,
124 optional => 1,
125 },
126};
127
128PVE::JSONSchema::register_format('pve-tfa-config', $tfa_format);
96f8ebd6
DM
129
130PVE::JSONSchema::register_standard_option('tfa', {
131 description => "Use Two-factor authentication.",
132 type => 'string', format => 'pve-tfa-config',
133 optional => 1,
134 maxLength => 128,
135});
136
137sub parse_tfa_config {
138 my ($data) = @_;
139
9401be39 140 return PVE::JSONSchema::parse_property_string($tfa_format, $data);
96f8ebd6
DM
141}
142
5bb4e06a
DM
143my $defaultData = {
144 propertyList => {
145 type => { description => "Realm type." },
146 realm => get_standard_option('realm'),
147 },
148};
149
150sub private {
151 return $defaultData;
152}
153
154sub parse_section_header {
155 my ($class, $line) = @_;
156
157 if ($line =~ m/^(\S+):\s*(\S+)\s*$/) {
158 my ($type, $realm) = (lc($1), $2);
159 my $errmsg = undef; # set if you want to skip whole section
160 eval { pve_verify_realm($realm); };
161 $errmsg = $@ if $@;
162 my $config = {}; # to return additional attributes
163 return ($type, $realm, $errmsg, $config);
164 }
165 return undef;
166}
167
168sub parse_config {
169 my ($class, $filename, $raw) = @_;
170
171 my $cfg = $class->SUPER::parse_config($filename, $raw);
172
173 my $default;
174 foreach my $realm (keys %{$cfg->{ids}}) {
175 my $data = $cfg->{ids}->{$realm};
176 # make sure there is only one default marker
177 if ($data->{default}) {
178 if ($default) {
179 delete $data->{default};
180 } else {
181 $default = $realm;
182 }
183 }
184
185 if ($data->{comment}) {
186 $data->{comment} = PVE::Tools::decode_text($data->{comment});
187 }
188
189 }
190
191 # add default domains
192
96f8ebd6
DM
193 $cfg->{ids}->{pve}->{type} = 'pve'; # force type
194 $cfg->{ids}->{pve}->{comment} = "Proxmox VE authentication server"
195 if !$cfg->{ids}->{pve}->{comment};
5bb4e06a 196
96f8ebd6
DM
197 $cfg->{ids}->{pam}->{type} = 'pam'; # force type
198 $cfg->{ids}->{pam}->{plugin} = 'PVE::Auth::PAM';
199 $cfg->{ids}->{pam}->{comment} = "Linux PAM standard authentication"
200 if !$cfg->{ids}->{pam}->{comment};
5bb4e06a
DM
201
202 return $cfg;
203};
204
205sub write_config {
206 my ($class, $filename, $cfg) = @_;
207
5bb4e06a
DM
208 foreach my $realm (keys %{$cfg->{ids}}) {
209 my $data = $cfg->{ids}->{$realm};
210 if ($data->{comment}) {
211 $data->{comment} = PVE::Tools::encode_text($data->{comment});
212 }
213 }
0a6e09fd 214
5bb4e06a
DM
215 $class->SUPER::write_config($filename, $cfg);
216}
217
218sub authenticate_user {
219 my ($class, $config, $realm, $username, $password) = @_;
220
221 die "overwrite me";
222}
223
224sub store_password {
225 my ($class, $config, $realm, $username, $password) = @_;
226
227 my $type = $class->type();
228
229 die "can't set password on auth type '$type'\n";
230}
231
232sub delete_user {
233 my ($class, $config, $realm, $username) = @_;
234
235 # do nothing by default
236}
237
2381;