1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386
|
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8" />
<title>Authorization plugins — pyroute2 0.5.14 documentation</title>
<link rel="stylesheet" href="_static/classic.css" type="text/css" />
<link rel="stylesheet" href="_static/pygments.css" type="text/css" />
<link rel="stylesheet" type="text/css" href="_static/graphviz.css" />
<link rel="stylesheet" type="text/css" href="_static/custom.css" />
<script type="text/javascript" id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script>
<script type="text/javascript" src="_static/jquery.js"></script>
<script type="text/javascript" src="_static/underscore.js"></script>
<script type="text/javascript" src="_static/doctools.js"></script>
<script type="text/javascript" src="_static/language_data.js"></script>
<link rel="index" title="Index" href="genindex.html" />
<link rel="search" title="Search" href="search.html" />
<link rel="next" title="IPDB module" href="ipdb_toc.html" />
<link rel="prev" title="Debug and logging" href="ndb_debug.html" />
</head><body>
<div class="related" role="navigation" aria-label="related navigation">
<ul>
<li class="right" style="margin-right: 10px">
<a href="genindex.html" title="General Index"
accesskey="I">index</a></li>
<li class="right" >
<a href="py-modindex.html" title="Python Module Index"
>modules</a> |</li>
<li class="right" >
<a href="ipdb_toc.html" title="IPDB module"
accesskey="N">next</a> |</li>
<li class="right" >
<a href="ndb_debug.html" title="Debug and logging"
accesskey="P">previous</a> |</li>
<li class="nav-item"><a href="http://pyroute2.org">Project home</a> »</li>
<li class="nav-item nav-item-0"><a href="index.html">pyroute2 0.5.14 documentation</a> »</li>
<li class="nav-item nav-item-1"><a href="ndb.html" accesskey="U">NDB module</a> »</li>
</ul>
</div>
<div class="document">
<div class="documentwrapper">
<div class="bodywrapper">
<div class="body" role="main">
<div class="section" id="module-pyroute2.ndb.auth_manager">
<span id="authorization-plugins"></span><span id="ndbauth"></span><h1>Authorization plugins<a class="headerlink" href="#module-pyroute2.ndb.auth_manager" title="Permalink to this headline">¶</a></h1>
<div class="section" id="aaa-concept">
<h2>AAA concept<a class="headerlink" href="#aaa-concept" title="Permalink to this headline">¶</a></h2>
<p>AAA refers to Authentication, Authorization and Accounting. NDB provides
a minimalistic API to integrate Authorization routines, leaving the
rest – Authentication and Accounting – to the user.</p>
<p>Some of NDB routines and RTNL object methods are guarded with a
parametrized decorator. The decorator takes the only parameter <cite>tag</cite>:</p>
<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="nd">@check_auth</span><span class="p">(</span><span class="s1">'obj:read'</span><span class="p">)</span>
<span class="k">def</span> <span class="nf">__getitem__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">key</span><span class="p">):</span>
<span class="o">...</span>
<span class="nd">@check_auth</span><span class="p">(</span><span class="s1">'obj:modify'</span><span class="p">)</span>
<span class="k">def</span> <span class="nf">__setitem__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">key</span><span class="p">,</span> <span class="n">value</span><span class="p">):</span>
<span class="o">...</span>
</pre></div>
</div>
</div>
<div class="section" id="authmanager">
<h2>AuthManager<a class="headerlink" href="#authmanager" title="Permalink to this headline">¶</a></h2>
<p>The tag is checked by <cite>AuthManager.check(…)</cite> routine. The routine is
the only method that must be provided by AuthManager-compatible objects,
and must be defined as:</p>
<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="k">def</span> <span class="nf">check</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">obj</span><span class="p">,</span> <span class="n">tag</span><span class="p">):</span>
<span class="c1"># -> True: grant access to the tag</span>
<span class="c1"># -> False: reject access</span>
<span class="c1"># -> raise Exception(): reject access with a specific exception</span>
<span class="o">...</span>
</pre></div>
</div>
<p>NDB module provides an example AuthManager:</p>
<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="kn">from</span> <span class="nn">pyroute2</span> <span class="k">import</span> <span class="n">NDB</span>
<span class="kn">from</span> <span class="nn">pyroute2.ndb.auth_manager</span> <span class="k">import</span> <span class="n">AuthManager</span>
<span class="n">ndb</span> <span class="o">=</span> <span class="n">NDB</span><span class="p">(</span><span class="n">log</span><span class="o">=</span><span class="s1">'debug'</span><span class="p">)</span>
<span class="n">am</span> <span class="o">=</span> <span class="n">AuthManager</span><span class="p">({</span><span class="s1">'obj:list'</span><span class="p">:</span> <span class="kc">False</span><span class="p">,</span> <span class="c1"># deny dump(), summary()</span>
<span class="s1">'obj:read'</span><span class="p">:</span> <span class="kc">True</span><span class="p">,</span> <span class="c1"># permit reading RTNL attributes</span>
<span class="s1">'obj:modify'</span><span class="p">:</span> <span class="kc">True</span><span class="p">},</span> <span class="c1"># permit add_ip(), commit() etc.</span>
<span class="n">ndb</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">channel</span><span class="p">(</span><span class="s1">'auth'</span><span class="p">))</span>
<span class="n">ap</span> <span class="o">=</span> <span class="n">ndb</span><span class="o">.</span><span class="n">auth_proxy</span><span class="p">(</span><span class="n">am</span><span class="p">)</span>
<span class="n">ap</span><span class="o">.</span><span class="n">interfaces</span><span class="o">.</span><span class="n">summary</span><span class="p">()</span> <span class="c1"># <-- fails with PermissionError</span>
</pre></div>
</div>
<p>You can implement custom AuthManager classes, the only requirement – they
must provide <cite>.check(self, obj, tag)</cite> routine, which returns <cite>True</cite> or
<cite>False</cite> or raises an exception.</p>
</div>
<div class="section" id="usecase-openstack-keystone-auth">
<h2>Usecase: OpenStack Keystone auth<a class="headerlink" href="#usecase-openstack-keystone-auth" title="Permalink to this headline">¶</a></h2>
<p>Say we have a public service that provides access to NDB instance via
HTTP, and authenticates users via Keystone. Then the auth flow could be:</p>
<ol class="arabic simple">
<li><p>Accept a connection from a client</p></li>
<li><p>Create custom auth manager object A</p></li>
<li><p>A.__init__() validates X-Auth-Token against Keystone (Authentication)</p></li>
<li><p>A.check() checks that X-Auth-Token is not expired (Authorization)</p></li>
<li><p>The auth result is being logged (Accounting)</p></li>
</ol>
<p>An example AuthManager with OpenStack APIv3 support you may find in the
<cite>/examples/ndb/</cite> directory.</p>
<div class="literal-block-wrapper docutils container" id="keystone-auth">
<div class="code-block-caption"><span class="caption-text">keystone_auth.py</span><a class="headerlink" href="#keystone-auth" title="Permalink to this code">¶</a></div>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="sd">'''</span>
<span class="sd">A simplest example of a custom AuthManager and its usage</span>
<span class="sd">with `AuthProxy` objects.</span>
<span class="sd">Here we authenticate the auth token against Keystone and</span>
<span class="sd">allow any NDB operations until it is expired.</span>
<span class="sd">One can get such token with a curl request::</span>
<span class="sd"> $ cat request.json</span>
<span class="sd"> { "auth": {</span>
<span class="sd"> "identity": {</span>
<span class="sd"> "methods": ["password"],</span>
<span class="sd"> "password": {</span>
<span class="sd"> "user": {</span>
<span class="sd"> "name": "admin",</span>
<span class="sd"> "domain": { "name": "admin_domain" },</span>
<span class="sd"> "password": "secret"</span>
<span class="sd"> }</span>
<span class="sd"> }</span>
<span class="sd"> },</span>
<span class="sd"> "scope": {</span>
<span class="sd"> "project": {</span>
<span class="sd"> "id": "f0af12d451fb4bccbb38217e7f9afe9a"</span>
<span class="sd"> }</span>
<span class="sd"> }</span>
<span class="sd"> }</span>
<span class="sd"> }</span>
<span class="sd"> $ curl -i \</span>
<span class="sd"> -H "Content-Type: application/json" \</span>
<span class="sd"> -d "@request.json" \</span>
<span class="sd"> http://keystone:5000/v3/auth/tokens</span>
<span class="sd">`X-Subject-Token` header in the response will be the token we need. Say we</span>
<span class="sd">get `14080769fe05e1f8b837fb43ca0f0ba4` as `X-Subject-Token`. Then you can</span>
<span class="sd">run::</span>
<span class="sd"> $ . openstack.rc # <-- your OpenStack APIv3 RC file</span>
<span class="sd"> $ export PYTHONPATH=`pwd`</span>
<span class="sd"> $ python examples/ndb/keystone_auth.py 14080769fe05e1f8b837fb43ca0f0ba4</span>
<span class="sd">Using this example you can implement services that export NDB via any RPC,</span>
<span class="sd">e.g. HTTP, and use Keystone integration. Same scheme may be used for any</span>
<span class="sd">other Auth API, be it RADIUS or like that.</span>
<span class="sd">An example of a simple HTTP service you can find in /cli/pyroute2-cli.</span>
<span class="sd">'''</span>
<span class="kn">import</span> <span class="nn">os</span>
<span class="kn">import</span> <span class="nn">sys</span>
<span class="kn">import</span> <span class="nn">time</span>
<span class="kn">from</span> <span class="nn">dateutil.parser</span> <span class="kn">import</span> <span class="n">parse</span> <span class="k">as</span> <span class="n">isodate</span>
<span class="kn">from</span> <span class="nn">keystoneauth1.identity</span> <span class="kn">import</span> <span class="n">v3</span>
<span class="kn">from</span> <span class="nn">keystoneauth1</span> <span class="kn">import</span> <span class="n">session</span>
<span class="kn">from</span> <span class="nn">keystoneclient.v3</span> <span class="kn">import</span> <span class="n">client</span> <span class="k">as</span> <span class="n">ksclient</span>
<span class="kn">from</span> <span class="nn">keystoneclient.v3.tokens</span> <span class="kn">import</span> <span class="n">TokenManager</span>
<span class="kn">from</span> <span class="nn">pyroute2</span> <span class="kn">import</span> <span class="n">NDB</span>
<span class="k">class</span> <span class="nc">OSAuthManager</span><span class="p">(</span><span class="nb">object</span><span class="p">):</span>
<span class="k">def</span> <span class="fm">__init__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">token</span><span class="p">,</span> <span class="n">log</span><span class="p">):</span>
<span class="c1"># create a Keystone password object</span>
<span class="n">auth</span> <span class="o">=</span> <span class="n">v3</span><span class="o">.</span><span class="n">Password</span><span class="p">(</span><span class="n">auth_url</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'OS_AUTH_URL'</span><span class="p">),</span>
<span class="n">username</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'OS_USERNAME'</span><span class="p">),</span>
<span class="n">password</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'OS_PASSWORD'</span><span class="p">),</span>
<span class="n">user_domain_name</span><span class="o">=</span><span class="p">(</span><span class="n">os</span>
<span class="o">.</span><span class="n">environ</span>
<span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'OS_USER_DOMAIN_NAME'</span><span class="p">)),</span>
<span class="n">project_id</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'OS_PROJECT_ID'</span><span class="p">))</span>
<span class="c1"># create a session object</span>
<span class="n">sess</span> <span class="o">=</span> <span class="n">session</span><span class="o">.</span><span class="n">Session</span><span class="p">(</span><span class="n">auth</span><span class="o">=</span><span class="n">auth</span><span class="p">)</span>
<span class="c1"># create a token manager</span>
<span class="n">tmanager</span> <span class="o">=</span> <span class="n">TokenManager</span><span class="p">(</span><span class="n">ksclient</span><span class="o">.</span><span class="n">Client</span><span class="p">(</span><span class="n">session</span><span class="o">=</span><span class="n">sess</span><span class="p">))</span>
<span class="c1"># validate the token</span>
<span class="n">keystone_response</span> <span class="o">=</span> <span class="n">tmanager</span><span class="o">.</span><span class="n">validate</span><span class="p">(</span><span class="n">token</span><span class="p">)</span>
<span class="c1"># init attrs</span>
<span class="bp">self</span><span class="o">.</span><span class="n">log</span> <span class="o">=</span> <span class="n">log</span>
<span class="bp">self</span><span class="o">.</span><span class="n">expire</span> <span class="o">=</span> <span class="n">isodate</span><span class="p">(</span><span class="n">keystone_response</span><span class="p">[</span><span class="s1">'expires_at'</span><span class="p">])</span><span class="o">.</span><span class="n">timestamp</span><span class="p">()</span>
<span class="k">def</span> <span class="nf">check</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">obj</span><span class="p">,</span> <span class="n">tag</span><span class="p">):</span>
<span class="c1">#</span>
<span class="c1"># totally ignore obj and tag, validate only token expiration</span>
<span class="c1">#</span>
<span class="c1"># problems to be solved before you use this code in production:</span>
<span class="c1"># 1. access levels: read-only, read-write -- match tag</span>
<span class="c1"># 2. how to deal with revoked tokens</span>
<span class="c1">#</span>
<span class="k">if</span> <span class="n">time</span><span class="o">.</span><span class="n">time</span><span class="p">()</span> <span class="o">></span> <span class="bp">self</span><span class="o">.</span><span class="n">expire</span><span class="p">:</span>
<span class="bp">self</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">error</span><span class="p">(</span><span class="s1">'</span><span class="si">%s</span><span class="s1"> permission denied'</span> <span class="o">%</span> <span class="p">(</span><span class="n">tag</span><span class="p">,</span> <span class="p">))</span>
<span class="k">raise</span> <span class="n">PermissionError</span><span class="p">(</span><span class="s1">'keystone token has been expired'</span><span class="p">)</span>
<span class="bp">self</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'</span><span class="si">%s</span><span class="s1"> permission granted'</span> <span class="o">%</span> <span class="p">(</span><span class="n">tag</span><span class="p">,</span> <span class="p">))</span>
<span class="k">return</span> <span class="bp">True</span>
<span class="k">with</span> <span class="n">NDB</span><span class="p">(</span><span class="n">log</span><span class="o">=</span><span class="s1">'debug'</span><span class="p">)</span> <span class="k">as</span> <span class="n">ndb</span><span class="p">:</span>
<span class="c1"># create a utility log channel</span>
<span class="n">log</span> <span class="o">=</span> <span class="n">ndb</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">channel</span><span class="p">(</span><span class="s1">'main'</span><span class="p">)</span>
<span class="c1"># create an AuthManager-compatible object</span>
<span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'request keystone auth'</span><span class="p">)</span>
<span class="n">am</span> <span class="o">=</span> <span class="n">OSAuthManager</span><span class="p">(</span><span class="n">sys</span><span class="o">.</span><span class="n">argv</span><span class="p">[</span><span class="mi">1</span><span class="p">],</span> <span class="n">ndb</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">channel</span><span class="p">(</span><span class="s1">'keystone'</span><span class="p">))</span>
<span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'keystone auth complete, expires </span><span class="si">%s</span><span class="s1">'</span> <span class="o">%</span> <span class="n">am</span><span class="o">.</span><span class="n">expire</span><span class="p">)</span>
<span class="c1"># create an auth proxy for this particular token</span>
<span class="n">ap</span> <span class="o">=</span> <span class="n">ndb</span><span class="o">.</span><span class="n">auth_proxy</span><span class="p">(</span><span class="n">am</span><span class="p">)</span>
<span class="c1"># validate access via that proxy</span>
<span class="k">print</span><span class="p">(</span><span class="n">ap</span><span class="o">.</span><span class="n">interfaces</span><span class="p">[</span><span class="s1">'lo'</span><span class="p">])</span>
</pre></div>
</div>
</div>
</div>
<div class="section" id="usecase-radius-auth">
<h2>Usecase: RADIUS auth<a class="headerlink" href="#usecase-radius-auth" title="Permalink to this headline">¶</a></h2>
<div class="literal-block-wrapper docutils container" id="radius-auth">
<div class="code-block-caption"><span class="caption-text">radius_auth.py</span><a class="headerlink" href="#radius-auth" title="Permalink to this code">¶</a></div>
<div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="sd">'''</span>
<span class="sd">An example of using RADIUS authentication with NDB.</span>
<span class="sd">In order to run the example you can setup a FreeRADIUS server::</span>
<span class="sd"> # /etc/raddb/clients</span>
<span class="sd"> client test {</span>
<span class="sd"> ipaddr = 192.168.122.101 # IP addr of your client</span>
<span class="sd"> secret = s3cr3t</span>
<span class="sd"> }</span>
<span class="sd"> # /etc/raddb/users</span>
<span class="sd"> testing Cleartext-Password := "secret"</span>
<span class="sd">Then setup your client::</span>
<span class="sd"> # download RADIUS dictionaries</span>
<span class="sd"> $ export GITSERVER=https://raw.githubusercontent.com</span>
<span class="sd"> $ export DICTPATH=pyradius/pyrad/master/example</span>
<span class="sd"> $ wget $GITSERVER/$DICTPATH/dictionary</span>
<span class="sd"> $ wget $GITSERVER/$DICTPATH/dictionary.freeradius</span>
<span class="sd"> # setup the environment</span>
<span class="sd"> $ cat radius.rc</span>
<span class="sd"> export RADIUS_SERVER=192.168.122.1</span>
<span class="sd"> export RADIUS_SECRET=s3cr3t</span>
<span class="sd"> export PYTHONPATH=`pwd`</span>
<span class="sd"> $ . radius.rc</span>
<span class="sd"> $ python examples/ndb/radius_auth.py testing secret</span>
<span class="sd">'''</span>
<span class="kn">import</span> <span class="nn">os</span>
<span class="kn">import</span> <span class="nn">sys</span>
<span class="kn">from</span> <span class="nn">pyrad.client</span> <span class="kn">import</span> <span class="n">Client</span>
<span class="kn">from</span> <span class="nn">pyrad.dictionary</span> <span class="kn">import</span> <span class="n">Dictionary</span>
<span class="kn">import</span> <span class="nn">pyrad.packet</span>
<span class="kn">from</span> <span class="nn">pyroute2</span> <span class="kn">import</span> <span class="n">NDB</span>
<span class="k">class</span> <span class="nc">RadiusAuthManager</span><span class="p">(</span><span class="nb">object</span><span class="p">):</span>
<span class="k">def</span> <span class="fm">__init__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">user</span><span class="p">,</span> <span class="n">password</span><span class="p">,</span> <span class="n">log</span><span class="p">):</span>
<span class="n">client</span> <span class="o">=</span> <span class="n">Client</span><span class="p">(</span><span class="n">server</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'RADIUS_SERVER'</span><span class="p">),</span>
<span class="n">secret</span><span class="o">=</span><span class="n">os</span><span class="o">.</span><span class="n">environ</span><span class="o">.</span><span class="n">get</span><span class="p">(</span><span class="s1">'RADIUS_SECRET'</span><span class="p">)</span><span class="o">.</span><span class="n">encode</span><span class="p">(</span><span class="s1">'ascii'</span><span class="p">),</span>
<span class="nb">dict</span><span class="o">=</span><span class="n">Dictionary</span><span class="p">(</span><span class="s1">'dictionary'</span><span class="p">))</span>
<span class="n">req</span> <span class="o">=</span> <span class="n">client</span><span class="o">.</span><span class="n">CreateAuthPacket</span><span class="p">(</span><span class="n">code</span><span class="o">=</span><span class="n">pyrad</span><span class="o">.</span><span class="n">packet</span><span class="o">.</span><span class="n">AccessRequest</span><span class="p">,</span>
<span class="n">User_Name</span><span class="o">=</span><span class="n">user</span><span class="p">)</span>
<span class="n">req</span><span class="p">[</span><span class="s1">'User-Password'</span><span class="p">]</span> <span class="o">=</span> <span class="n">req</span><span class="o">.</span><span class="n">PwCrypt</span><span class="p">(</span><span class="n">password</span><span class="p">)</span>
<span class="n">reply</span> <span class="o">=</span> <span class="n">client</span><span class="o">.</span><span class="n">SendPacket</span><span class="p">(</span><span class="n">req</span><span class="p">)</span>
<span class="bp">self</span><span class="o">.</span><span class="n">auth</span> <span class="o">=</span> <span class="n">reply</span><span class="o">.</span><span class="n">code</span>
<span class="bp">self</span><span class="o">.</span><span class="n">log</span> <span class="o">=</span> <span class="n">log</span>
<span class="k">def</span> <span class="nf">check</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">obj</span><span class="p">,</span> <span class="n">tag</span><span class="p">):</span>
<span class="c1">#</span>
<span class="bp">self</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'</span><span class="si">%s</span><span class="s1"> access'</span> <span class="o">%</span> <span class="p">(</span><span class="n">tag</span><span class="p">,</span> <span class="p">))</span>
<span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">auth</span> <span class="o">==</span> <span class="n">pyrad</span><span class="o">.</span><span class="n">packet</span><span class="o">.</span><span class="n">AccessAccept</span>
<span class="k">with</span> <span class="n">NDB</span><span class="p">(</span><span class="n">log</span><span class="o">=</span><span class="s1">'debug'</span><span class="p">)</span> <span class="k">as</span> <span class="n">ndb</span><span class="p">:</span>
<span class="c1"># create a utility log channel</span>
<span class="n">log</span> <span class="o">=</span> <span class="n">ndb</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">channel</span><span class="p">(</span><span class="s1">'main'</span><span class="p">)</span>
<span class="c1"># create an AuthManager-compatible object</span>
<span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'request radius auth'</span><span class="p">)</span>
<span class="n">am</span> <span class="o">=</span> <span class="n">RadiusAuthManager</span><span class="p">(</span><span class="n">sys</span><span class="o">.</span><span class="n">argv</span><span class="p">[</span><span class="mi">1</span><span class="p">],</span>
<span class="n">sys</span><span class="o">.</span><span class="n">argv</span><span class="p">[</span><span class="mi">2</span><span class="p">],</span>
<span class="n">ndb</span><span class="o">.</span><span class="n">log</span><span class="o">.</span><span class="n">channel</span><span class="p">(</span><span class="s1">'radius'</span><span class="p">))</span>
<span class="n">log</span><span class="o">.</span><span class="n">info</span><span class="p">(</span><span class="s1">'radius auth complete'</span><span class="p">)</span>
<span class="c1"># create an auth proxy for these credentials</span>
<span class="n">ap</span> <span class="o">=</span> <span class="n">ndb</span><span class="o">.</span><span class="n">auth_proxy</span><span class="p">(</span><span class="n">am</span><span class="p">)</span>
<span class="c1"># validate access via that proxy</span>
<span class="k">print</span><span class="p">(</span><span class="n">ap</span><span class="o">.</span><span class="n">interfaces</span><span class="p">[</span><span class="s1">'lo'</span><span class="p">])</span>
</pre></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="sphinxsidebar" role="navigation" aria-label="main navigation">
<div class="sphinxsidebarwrapper">
<h3><a href="index.html">Table of Contents</a></h3>
<ul>
<li><a class="reference internal" href="#">Authorization plugins</a><ul>
<li><a class="reference internal" href="#aaa-concept">AAA concept</a></li>
<li><a class="reference internal" href="#authmanager">AuthManager</a></li>
<li><a class="reference internal" href="#usecase-openstack-keystone-auth">Usecase: OpenStack Keystone auth</a></li>
<li><a class="reference internal" href="#usecase-radius-auth">Usecase: RADIUS auth</a></li>
</ul>
</li>
</ul>
<h4>Previous topic</h4>
<p class="topless"><a href="ndb_debug.html"
title="previous chapter">Debug and logging</a></p>
<h4>Next topic</h4>
<p class="topless"><a href="ipdb_toc.html"
title="next chapter">IPDB module</a></p>
<div role="note" aria-label="source link">
<h3>This Page</h3>
<ul class="this-page-menu">
<li><a href="_sources/ndb_auth.rst.txt"
rel="nofollow">Show Source</a></li>
</ul>
</div>
<div id="searchbox" style="display: none" role="search">
<h3 id="searchlabel">Quick search</h3>
<div class="searchformwrapper">
<form class="search" action="search.html" method="get">
<input type="text" name="q" aria-labelledby="searchlabel" />
<input type="submit" value="Go" />
</form>
</div>
</div>
<script type="text/javascript">$('#searchbox').show(0);</script>
</div>
</div>
<div class="clearer"></div>
</div>
<div class="related" role="navigation" aria-label="related navigation">
<h3>Navigation</h3>
<ul>
<li class="right" style="margin-right: 10px">
<a href="genindex.html" title="General Index"
>index</a></li>
<li class="right" >
<a href="py-modindex.html" title="Python Module Index"
>modules</a> |</li>
<li class="right" >
<a href="ipdb_toc.html" title="IPDB module"
>next</a> |</li>
<li class="right" >
<a href="ndb_debug.html" title="Debug and logging"
>previous</a> |</li>
<li class="nav-item"><a href="http://pyroute2.org">Project home</a> »</li>
<li class="nav-item nav-item-0"><a href="index.html">pyroute2 0.5.14 documentation</a> »</li>
<li class="nav-item nav-item-1"><a href="ndb.html" >NDB module</a> »</li>
</ul>
</div>
<div class="footer" role="contentinfo">
© Copyright 2013, Peter V. Saveliev.
Created using <a href="http://sphinx-doc.org/">Sphinx</a> 2.1.2.
</div>
</body>
</html>
|