mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-24 17:32:48 +00:00
NFS server support added to filesystem server, includes mount and portmapper services plus an NFS v3 server.
Not enabled or wired in yet. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@4742 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -0,0 +1,380 @@
|
||||
/*
|
||||
* Copyright (C) 2005-2006 Alfresco, Inc.
|
||||
*
|
||||
* Licensed under the Mozilla Public License version 1.1
|
||||
* with a permitted attribution clause. You may obtain a
|
||||
* copy of the License at
|
||||
*
|
||||
* http://www.alfresco.org/legal/license.txt
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing,
|
||||
* software distributed under the License is distributed on an
|
||||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
|
||||
* either express or implied. See the License for the specific
|
||||
* language governing permissions and limitations under the
|
||||
* License.
|
||||
*/
|
||||
package org.alfresco.filesys.server.auth;
|
||||
|
||||
import java.util.HashMap;
|
||||
import java.util.List;
|
||||
|
||||
import org.alfresco.config.ConfigElement;
|
||||
import org.alfresco.filesys.server.SrvSession;
|
||||
import org.alfresco.filesys.server.config.InvalidConfigurationException;
|
||||
import org.alfresco.filesys.server.config.ServerConfiguration;
|
||||
import org.alfresco.filesys.server.oncrpc.AuthType;
|
||||
import org.alfresco.filesys.server.oncrpc.Rpc;
|
||||
import org.alfresco.filesys.server.oncrpc.RpcAuthenticationException;
|
||||
import org.alfresco.filesys.server.oncrpc.RpcAuthenticator;
|
||||
import org.alfresco.filesys.server.oncrpc.RpcPacket;
|
||||
import org.alfresco.repo.security.authentication.AuthenticationComponent;
|
||||
import org.alfresco.service.transaction.TransactionService;
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
|
||||
/**
|
||||
* Alfresco RPC Authenticator Class
|
||||
*
|
||||
* <p>Provides authentication support for the NFS server.
|
||||
*
|
||||
* @author gkspencer
|
||||
*/
|
||||
public class AlfrescoRpcAuthenticator implements RpcAuthenticator {
|
||||
|
||||
// Debug logging
|
||||
|
||||
private static final Log logger = LogFactory.getLog("org.alfresco.nfs.protocol.auth");
|
||||
|
||||
// Authentication types aupported by this implementation
|
||||
|
||||
private int[] _authTypes = { AuthType.Null, AuthType.Unix };
|
||||
|
||||
// UID/GID to username conversions
|
||||
|
||||
private HashMap<Integer, String> m_idMap;
|
||||
|
||||
// Authentication component and services
|
||||
|
||||
private AuthenticationComponent m_authComponent;
|
||||
private TransactionService m_transService;
|
||||
|
||||
/**
|
||||
* Authenticate an RPC client and create a unique session id key.
|
||||
*
|
||||
* @param authType int
|
||||
* @param rpc RpcPacket
|
||||
* @return Object
|
||||
* @throws RpcAuthenticationException
|
||||
*/
|
||||
public Object authenticateRpcClient(int authType, RpcPacket rpc)
|
||||
throws RpcAuthenticationException {
|
||||
|
||||
// Create a unique session key depending on the authentication type
|
||||
|
||||
Object sessKey = null;
|
||||
|
||||
if (authType == AuthType.Unix) {
|
||||
|
||||
// Get the gid and uid from the credentials data in the request
|
||||
|
||||
rpc.positionAtCredentialsData();
|
||||
rpc.skipBytes(4);
|
||||
int nameLen = rpc.unpackInt();
|
||||
rpc.skipBytes(nameLen);
|
||||
|
||||
int gid = rpc.unpackInt();
|
||||
int uid = rpc.unpackInt();
|
||||
|
||||
// DEBUG
|
||||
|
||||
if ( logger.isDebugEnabled())
|
||||
logger.debug( "RpcAuth: Type=Unix uid=" + uid + ", gid=" + gid);
|
||||
|
||||
// Check if the Unix authentication session table is valid
|
||||
|
||||
sessKey = new Long((((long) rpc.getClientAddress().hashCode()) << 32) + (gid << 16) + uid);
|
||||
}
|
||||
else if ( authType == AuthType.Null)
|
||||
{
|
||||
// Set the session key for the null authentication
|
||||
|
||||
sessKey = new Integer(rpc.getClientAddress().hashCode());
|
||||
|
||||
// DEBUG
|
||||
|
||||
if ( logger.isDebugEnabled())
|
||||
logger.debug( "RpcAuth: Type=Null client=" + rpc.getClientAddress());
|
||||
}
|
||||
|
||||
// Check if the session key is valid, if not then the authentication
|
||||
// type is unsupported
|
||||
|
||||
if (sessKey == null)
|
||||
throw new RpcAuthenticationException(Rpc.AuthBadCred, "Unsupported auth type, " + authType);
|
||||
|
||||
// DEBUG
|
||||
|
||||
if (logger.isDebugEnabled())
|
||||
logger.debug("RpcAuth: RPC from " + rpc.getClientDetails()
|
||||
+ ", authType=" + AuthType.getTypeAsString(authType)
|
||||
+ ", sessKey=" + sessKey);
|
||||
|
||||
// Return the session key
|
||||
|
||||
return sessKey;
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the authentication types that are supported by this
|
||||
* implementation.
|
||||
*
|
||||
* @return int[]
|
||||
*/
|
||||
public int[] getRpcAuthenticationTypes() {
|
||||
return _authTypes;
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the client information for the specified RPC request
|
||||
*
|
||||
* @param sessKey Object
|
||||
* @param rpc RpcPacket
|
||||
* @return ClientInfo
|
||||
*/
|
||||
public ClientInfo getRpcClientInformation(Object sessKey, RpcPacket rpc) {
|
||||
|
||||
// Create a client information object to hold the client details
|
||||
|
||||
ClientInfo cInfo = null;
|
||||
|
||||
// Get the authentication type
|
||||
|
||||
int authType = rpc.getCredentialsType();
|
||||
|
||||
// Unpack the client details from the RPC request
|
||||
|
||||
if ( authType == AuthType.Unix) {
|
||||
|
||||
// Unpack the credentials data
|
||||
|
||||
rpc.positionAtCredentialsData();
|
||||
rpc.skipBytes(4); // stamp id
|
||||
|
||||
String clientAddr = rpc.unpackString();
|
||||
int uid = rpc.unpackInt();
|
||||
int gid = rpc.unpackInt();
|
||||
|
||||
// Check for an additional groups list
|
||||
|
||||
int grpLen = rpc.unpackInt();
|
||||
int[] groups = null;
|
||||
|
||||
if (grpLen > 0) {
|
||||
groups = new int[grpLen];
|
||||
rpc.unpackIntArray(groups);
|
||||
}
|
||||
|
||||
// Get the user name mapping for the uid/gid and authenticate
|
||||
|
||||
Integer idKey = new Integer((gid << 16) + uid);
|
||||
String userName = m_idMap.get( idKey);
|
||||
|
||||
// DEBUG
|
||||
|
||||
if ( logger.isDebugEnabled())
|
||||
logger.debug( "RpcClientInfo: username=" + userName + ", uid=" + uid + ", gid=" + gid);
|
||||
|
||||
// Create the client information if there is a valid mapping
|
||||
|
||||
if ( userName != null)
|
||||
{
|
||||
// Create the client information and fill in relevant fields
|
||||
|
||||
cInfo = new ClientInfo( userName, null);
|
||||
|
||||
cInfo.setNFSAuthenticationType( authType);
|
||||
cInfo.setClientAddress( clientAddr);
|
||||
cInfo.setUid( uid);
|
||||
cInfo.setGid( gid);
|
||||
|
||||
cInfo.setGroupsList(groups);
|
||||
}
|
||||
|
||||
// DEBUG
|
||||
|
||||
if (logger.isDebugEnabled())
|
||||
logger.debug("RpcAuth: Client info, type=" + AuthType.getTypeAsString(authType) + ", name="
|
||||
+ clientAddr + ", uid=" + uid + ", gid=" + gid + ", groups=" + grpLen);
|
||||
}
|
||||
else if ( authType == AuthType.Null)
|
||||
{
|
||||
// Create the client information
|
||||
|
||||
cInfo = new ClientInfo( "", null);
|
||||
cInfo.setClientAddress(rpc.getClientAddress().getHostAddress());
|
||||
|
||||
// DEBUG
|
||||
|
||||
if (logger.isDebugEnabled())
|
||||
logger.debug("RpcAuth: Client info, type=" + AuthType.getTypeAsString(authType) + ", addr="
|
||||
+ rpc.getClientAddress().getHostAddress());
|
||||
}
|
||||
|
||||
// Return the client information
|
||||
|
||||
return cInfo;
|
||||
}
|
||||
|
||||
/**
|
||||
* Set the current authenticated user context for this thread
|
||||
*
|
||||
* @param sess SrvSession
|
||||
* @param client ClientInfo
|
||||
*/
|
||||
public void setCurrentUser( SrvSession sess, ClientInfo client)
|
||||
{
|
||||
// Start a transaction
|
||||
|
||||
sess.beginReadTransaction( m_transService);
|
||||
|
||||
// Check the account type and setup the authentication context
|
||||
|
||||
if ( client == null || client.isNullSession() || client.hasAuthenticationToken() == false)
|
||||
{
|
||||
// Clear the authentication, null user should not be allowed to do any service calls
|
||||
|
||||
m_authComponent.clearCurrentSecurityContext();
|
||||
}
|
||||
else if ( client.isGuest() == false)
|
||||
{
|
||||
// Check if the authentication token has been set for the client
|
||||
|
||||
if ( client.hasAuthenticationToken() == false)
|
||||
{
|
||||
// Set the current user and retrieve the authentication token
|
||||
|
||||
m_authComponent.setCurrentUser( client.getUserName());
|
||||
client.setAuthenticationToken( m_authComponent.getCurrentAuthentication());
|
||||
}
|
||||
else
|
||||
{
|
||||
// Set the authentication context for the request
|
||||
|
||||
m_authComponent.setCurrentAuthentication( client.getAuthenticationToken());
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
// Enable guest access for the request
|
||||
|
||||
m_authComponent.setGuestUserAsCurrentUser();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Initialize the RPC authenticator
|
||||
*
|
||||
* @param config ServerConfiguration
|
||||
* @param params NameValueList
|
||||
* @throws InvalidConfigurationException
|
||||
*/
|
||||
public void initialize(ServerConfiguration config, ConfigElement params)
|
||||
throws InvalidConfigurationException {
|
||||
|
||||
// Get the configured authentication component and transaction service
|
||||
|
||||
m_authComponent = config.getAuthenticationComponent();
|
||||
m_transService = config.getTransactionService();
|
||||
|
||||
// Check for the user mappings
|
||||
|
||||
ConfigElement userMappings = params.getChild("userMappings");
|
||||
if ( userMappings != null)
|
||||
{
|
||||
// Allocate the id mappings table
|
||||
|
||||
m_idMap = new HashMap<Integer, String>();
|
||||
|
||||
// Get the user map elements
|
||||
|
||||
List<ConfigElement> userMaps = userMappings.getChildren();
|
||||
|
||||
// Process the user list
|
||||
|
||||
for ( ConfigElement userElem : userMaps)
|
||||
{
|
||||
// Validate the element type
|
||||
|
||||
if ( userElem.getName().equalsIgnoreCase( "user"))
|
||||
{
|
||||
// Get the user name, user id and group id
|
||||
|
||||
String userName = userElem.getAttribute("name");
|
||||
String uidStr = userElem.getAttribute("uid");
|
||||
String gidStr = userElem.getAttribute("gid");
|
||||
|
||||
if ( userName == null || userName.length() == 0)
|
||||
throw new InvalidConfigurationException("Empty user name, or name not specified");
|
||||
|
||||
if ( uidStr == null || uidStr.length() == 0)
|
||||
throw new InvalidConfigurationException("Invalid uid, or uid not specified, for user " + userName);
|
||||
|
||||
if ( gidStr == null || gidStr.length() == 0)
|
||||
throw new InvalidConfigurationException("Invalid gid, or gid not specified, for user " + userName);
|
||||
|
||||
// Parse the uid/gid
|
||||
|
||||
int uid = -1;
|
||||
int gid = -1;
|
||||
|
||||
try
|
||||
{
|
||||
uid = Integer.parseInt( uidStr);
|
||||
}
|
||||
catch ( NumberFormatException ex)
|
||||
{
|
||||
throw new InvalidConfigurationException("Invalid uid value, " + uidStr + " for user " + userName);
|
||||
}
|
||||
|
||||
try
|
||||
{
|
||||
gid = Integer.parseInt( gidStr);
|
||||
}
|
||||
catch ( NumberFormatException ex)
|
||||
{
|
||||
throw new InvalidConfigurationException("Invalid gid value, " + gidStr + " for user " + userName);
|
||||
}
|
||||
|
||||
// Check if the mapping already exists
|
||||
|
||||
Integer idKey = new Integer(( gid << 16) + uid);
|
||||
if ( m_idMap.containsKey( idKey) == false)
|
||||
{
|
||||
// Add the username uid/gid mapping
|
||||
|
||||
m_idMap.put( idKey, userName);
|
||||
|
||||
// DEBUG
|
||||
|
||||
if ( logger.isDebugEnabled())
|
||||
logger.debug("Added RPC user mapping for user " + userName + " uid=" + uid + ", gid=" + gid);
|
||||
}
|
||||
else if ( logger.isDebugEnabled())
|
||||
{
|
||||
// DEBUG
|
||||
|
||||
logger.debug("Ignored duplicate mapping for uid=" + uid + ", gid=" + gid);
|
||||
}
|
||||
}
|
||||
else
|
||||
throw new InvalidConfigurationException( "Invalid user mapping, " + userElem.getName());
|
||||
}
|
||||
}
|
||||
|
||||
// Make sure there are some user mappings
|
||||
|
||||
if ( m_idMap == null || m_idMap.size() == 0)
|
||||
throw new InvalidConfigurationException("No user mappings for RPC authenticator");
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user