fix: service account permissions generated from LDAP user (#11637)

service accounts generated from LDAP parent user
did not inherit correct permissions, this PR fixes
this fully.
This commit is contained in:
Harshavardhana 2021-02-25 13:49:59 -08:00 committed by GitHub
parent 85620dfe93
commit f9f6fd0421
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 96 additions and 68 deletions

View File

@ -68,7 +68,7 @@ func (a adminAPIHandlers) RemoveUser(w http.ResponseWriter, r *http.Request) {
vars := mux.Vars(r) vars := mux.Vars(r)
accessKey := vars["accessKey"] accessKey := vars["accessKey"]
ok, err := globalIAMSys.IsTempUser(accessKey) ok, _, err := globalIAMSys.IsTempUser(accessKey)
if err != nil { if err != nil {
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
return return
@ -485,7 +485,7 @@ func (a adminAPIHandlers) AddServiceAccount(w http.ResponseWriter, r *http.Reque
parentUser = cred.ParentUser parentUser = cred.ParentUser
} }
newCred, err := globalIAMSys.NewServiceAccount(ctx, parentUser, createReq.Policy) newCred, err := globalIAMSys.NewServiceAccount(ctx, parentUser, cred.Groups, createReq.Policy)
if err != nil { if err != nil {
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
return return
@ -982,7 +982,7 @@ func (a adminAPIHandlers) SetPolicyForUserOrGroup(w http.ResponseWriter, r *http
isGroup := vars["isGroup"] == "true" isGroup := vars["isGroup"] == "true"
if !isGroup { if !isGroup {
ok, err := globalIAMSys.IsTempUser(entityName) ok, _, err := globalIAMSys.IsTempUser(entityName)
if err != nil && err != errNoSuchUser { if err != nil && err != errNoSuchUser {
writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
return return

View File

@ -948,9 +948,9 @@ func (sys *IAMSys) ListUsers() (map[string]madmin.UserInfo, error) {
} }
// IsTempUser - returns if given key is a temporary user. // IsTempUser - returns if given key is a temporary user.
func (sys *IAMSys) IsTempUser(name string) (bool, error) { func (sys *IAMSys) IsTempUser(name string) (bool, string, error) {
if !sys.Initialized() { if !sys.Initialized() {
return false, errServerNotInitialized return false, "", errServerNotInitialized
} }
sys.store.rlock() sys.store.rlock()
@ -958,10 +958,14 @@ func (sys *IAMSys) IsTempUser(name string) (bool, error) {
cred, found := sys.iamUsersMap[name] cred, found := sys.iamUsersMap[name]
if !found { if !found {
return false, errNoSuchUser return false, "", errNoSuchUser
} }
return cred.IsTemp(), nil if cred.IsTemp() {
return true, cred.ParentUser, nil
}
return false, "", nil
} }
// IsServiceAccount - returns if given key is a service account // IsServiceAccount - returns if given key is a service account
@ -1085,7 +1089,7 @@ func (sys *IAMSys) SetUserStatus(accessKey string, status madmin.AccountStatus)
} }
// NewServiceAccount - create a new service account // NewServiceAccount - create a new service account
func (sys *IAMSys) NewServiceAccount(ctx context.Context, parentUser string, sessionPolicy *iampolicy.Policy) (auth.Credentials, error) { func (sys *IAMSys) NewServiceAccount(ctx context.Context, parentUser string, groups []string, sessionPolicy *iampolicy.Policy) (auth.Credentials, error) {
if !sys.Initialized() { if !sys.Initialized() {
return auth.Credentials{}, errServerNotInitialized return auth.Credentials{}, errServerNotInitialized
} }
@ -1114,8 +1118,25 @@ func (sys *IAMSys) NewServiceAccount(ctx context.Context, parentUser string, ses
cr, ok := sys.iamUsersMap[parentUser] cr, ok := sys.iamUsersMap[parentUser]
if !ok { if !ok {
// For LDAP users we would need this fallback
if sys.usersSysType != MinIOUsersSysType {
_, ok = sys.iamUserPolicyMap[parentUser]
if !ok {
var found bool
for _, group := range groups {
_, ok = sys.iamGroupPolicyMap[group]
if !ok {
continue
}
found = true
break
}
if !found {
return auth.Credentials{}, errNoSuchUser return auth.Credentials{}, errNoSuchUser
} }
}
}
}
// Disallow service accounts to further create more service accounts. // Disallow service accounts to further create more service accounts.
if cr.IsServiceAccount() { if cr.IsServiceAccount() {
@ -1138,6 +1159,7 @@ func (sys *IAMSys) NewServiceAccount(ctx context.Context, parentUser string, ses
return auth.Credentials{}, err return auth.Credentials{}, err
} }
cred.ParentUser = parentUser cred.ParentUser = parentUser
cred.Groups = groups
u := newUserIdentity(cred) u := newUserIdentity(cred)
@ -1751,6 +1773,18 @@ func (sys *IAMSys) policyDBGet(name string, isGroup bool) ([]string, error) {
p := sys.iamGroupPolicyMap[group] p := sys.iamGroupPolicyMap[group]
policies = append(policies, p.toSlice()...) policies = append(policies, p.toSlice()...)
} }
for _, group := range u.Groups {
// Skip missing or disabled groups
gi, ok := sys.iamGroupsMap[group]
if !ok || gi.Status == statusDisabled {
continue
}
p := sys.iamGroupPolicyMap[group]
policies = append(policies, p.toSlice()...)
}
return policies, nil return policies, nil
} }
@ -1777,13 +1811,13 @@ func (sys *IAMSys) IsAllowedServiceAccount(args iampolicy.Args, parent string) b
return false return false
} }
// Check if the parent is allowed to perform this action, reject if not // Check policy for this service account.
parentUserPolicies, err := sys.PolicyDBGet(parent, false) svcPolicies, err := sys.PolicyDBGet(args.AccountName, false)
if err != nil { if err != nil {
return false return false
} }
if len(parentUserPolicies) == 0 { if len(svcPolicies) == 0 {
return false return false
} }
@ -1791,7 +1825,7 @@ func (sys *IAMSys) IsAllowedServiceAccount(args iampolicy.Args, parent string) b
// Policies were found, evaluate all of them. // Policies were found, evaluate all of them.
sys.store.rlock() sys.store.rlock()
for _, pname := range parentUserPolicies { for _, pname := range svcPolicies {
p, found := sys.iamPolicyDocsMap[pname] p, found := sys.iamPolicyDocsMap[pname]
if found { if found {
availablePolicies = append(availablePolicies, p) availablePolicies = append(availablePolicies, p)
@ -1858,74 +1892,68 @@ func (sys *IAMSys) IsAllowedServiceAccount(args iampolicy.Args, parent string) b
} }
// IsAllowedLDAPSTS - checks for LDAP specific claims and values // IsAllowedLDAPSTS - checks for LDAP specific claims and values
func (sys *IAMSys) IsAllowedLDAPSTS(args iampolicy.Args) bool { func (sys *IAMSys) IsAllowedLDAPSTS(args iampolicy.Args, parentUser string) bool {
userIface, ok := args.Claims[ldapUser] parentInClaimIface, ok := args.Claims[ldapUser]
if !ok { if ok {
return false parentInClaim, ok := parentInClaimIface.(string)
}
user, ok := userIface.(string)
if !ok { if !ok {
// ldap parentInClaim name is not a string reject it.
return false return false
} }
if parentInClaim != parentUser {
// ldap claim has been modified maliciously reject it.
return false
}
} else {
// no ldap parentInClaim claim present reject it.
return false
}
// Check policy for this LDAP user.
ldapPolicies, err := sys.PolicyDBGet(args.AccountName, false)
if err != nil {
return false
}
if len(ldapPolicies) == 0 {
return false
}
var availablePolicies []iampolicy.Policy
// Policies were found, evaluate all of them.
sys.store.rlock() sys.store.rlock()
defer sys.store.runlock() for _, pname := range ldapPolicies {
var groups []string
cred, ok := sys.iamUsersMap[args.AccountName]
if !ok {
return false
}
groups = cred.Groups
// We look up the policy mapping directly to bypass
// users exists, group exists validations that do not
// apply here.
var policies []iampolicy.Policy
if mp, ok := sys.iamUserPolicyMap[user]; ok {
for _, pname := range mp.toSlice() {
p, found := sys.iamPolicyDocsMap[pname] p, found := sys.iamPolicyDocsMap[pname]
if !found { if found {
logger.LogIf(GlobalContext, fmt.Errorf("expected policy (%s) missing for the LDAPUser %s, rejecting the request", pname, user)) availablePolicies = append(availablePolicies, p)
}
}
sys.store.runlock()
if len(availablePolicies) == 0 {
return false return false
} }
policies = append(policies, p)
} combinedPolicy := availablePolicies[0]
} for i := 1; i < len(availablePolicies); i++ {
for _, group := range groups {
mp, ok := sys.iamGroupPolicyMap[group]
if !ok {
continue
}
for _, pname := range mp.toSlice() {
p, found := sys.iamPolicyDocsMap[pname]
if !found {
logger.LogIf(GlobalContext, fmt.Errorf("expected policy (%s) missing for the LDAPGroup %s, rejecting the request", pname, group))
return false
}
policies = append(policies, p)
}
}
if len(policies) == 0 {
return false
}
combinedPolicy := policies[0]
for i := 1; i < len(policies); i++ {
combinedPolicy.Statements = combinedPolicy.Statements =
append(combinedPolicy.Statements, append(combinedPolicy.Statements,
policies[i].Statements...) availablePolicies[i].Statements...)
} }
return combinedPolicy.IsAllowed(args) return combinedPolicy.IsAllowed(args)
} }
// IsAllowedSTS is meant for STS based temporary credentials, // IsAllowedSTS is meant for STS based temporary credentials,
// which implements claims validation and verification other than // which implements claims validation and verification other than
// applying policies. // applying policies.
func (sys *IAMSys) IsAllowedSTS(args iampolicy.Args) bool { func (sys *IAMSys) IsAllowedSTS(args iampolicy.Args, parentUser string) bool {
// If it is an LDAP request, check that user and group // If it is an LDAP request, check that user and group
// policies allow the request. // policies allow the request.
if sys.usersSysType == LDAPUsersSysType { if sys.usersSysType == LDAPUsersSysType {
return sys.IsAllowedLDAPSTS(args) return sys.IsAllowedLDAPSTS(args, parentUser)
} }
policies, ok := args.GetPolicies(iamPolicyClaimNameOpenID()) policies, ok := args.GetPolicies(iamPolicyClaimNameOpenID())
@ -2050,16 +2078,16 @@ func (sys *IAMSys) IsAllowed(args iampolicy.Args) bool {
} }
// If the credential is temporary, perform STS related checks. // If the credential is temporary, perform STS related checks.
ok, err := sys.IsTempUser(args.AccountName) ok, parentUser, err := sys.IsTempUser(args.AccountName)
if err != nil { if err != nil {
return false return false
} }
if ok { if ok {
return sys.IsAllowedSTS(args) return sys.IsAllowedSTS(args, parentUser)
} }
// If the credential is for a service account, perform related check // If the credential is for a service account, perform related check
ok, parentUser, err := sys.IsServiceAccount(args.AccountName) ok, parentUser, err = sys.IsServiceAccount(args.AccountName)
if err != nil { if err != nil {
return false return false
} }

View File

@ -104,7 +104,7 @@ func webTokenCallback(claims *xjwt.MapClaims) ([]byte, error) {
if claims.AccessKey == globalActiveCred.AccessKey { if claims.AccessKey == globalActiveCred.AccessKey {
return []byte(globalActiveCred.SecretKey), nil return []byte(globalActiveCred.SecretKey), nil
} }
ok, err := globalIAMSys.IsTempUser(claims.AccessKey) ok, _, err := globalIAMSys.IsTempUser(claims.AccessKey)
if err != nil { if err != nil {
if err == errNoSuchUser { if err == errNoSuchUser {
return nil, errInvalidAccessKeyID return nil, errInvalidAccessKeyID