227 lines
7.4 KiB
Python
227 lines
7.4 KiB
Python
|
"""ZAP Authenticator in a Python Thread.
|
||
|
|
||
|
.. versionadded:: 14.1
|
||
|
"""
|
||
|
|
||
|
# Copyright (C) PyZMQ Developers
|
||
|
# Distributed under the terms of the Modified BSD License.
|
||
|
|
||
|
import time
|
||
|
import logging
|
||
|
from threading import Thread, Event
|
||
|
|
||
|
import zmq
|
||
|
from zmq.utils import jsonapi
|
||
|
from zmq.utils.strtypes import bytes, unicode, b, u
|
||
|
import sys
|
||
|
|
||
|
from .base import Authenticator
|
||
|
|
||
|
class AuthenticationThread(Thread):
|
||
|
"""A Thread for running a zmq Authenticator
|
||
|
|
||
|
This is run in the background by ThreadedAuthenticator
|
||
|
"""
|
||
|
|
||
|
def __init__(self, context, endpoint, encoding='utf-8', log=None, authenticator=None):
|
||
|
super(AuthenticationThread, self).__init__()
|
||
|
self.context = context or zmq.Context.instance()
|
||
|
self.encoding = encoding
|
||
|
self.log = log = log or logging.getLogger('zmq.auth')
|
||
|
self.started = Event()
|
||
|
self.authenticator = authenticator or Authenticator(context, encoding=encoding, log=log)
|
||
|
|
||
|
# create a socket to communicate back to main thread.
|
||
|
self.pipe = context.socket(zmq.PAIR)
|
||
|
self.pipe.linger = 1
|
||
|
self.pipe.connect(endpoint)
|
||
|
|
||
|
def run(self):
|
||
|
"""Start the Authentication Agent thread task"""
|
||
|
self.authenticator.start()
|
||
|
self.started.set()
|
||
|
zap = self.authenticator.zap_socket
|
||
|
poller = zmq.Poller()
|
||
|
poller.register(self.pipe, zmq.POLLIN)
|
||
|
poller.register(zap, zmq.POLLIN)
|
||
|
while True:
|
||
|
try:
|
||
|
socks = dict(poller.poll())
|
||
|
except zmq.ZMQError:
|
||
|
break # interrupted
|
||
|
|
||
|
if self.pipe in socks and socks[self.pipe] == zmq.POLLIN:
|
||
|
# Make sure all API requests are processed before
|
||
|
# looking at the ZAP socket.
|
||
|
while True:
|
||
|
try:
|
||
|
msg = self.pipe.recv_multipart(flags=zmq.NOBLOCK)
|
||
|
except zmq.Again:
|
||
|
break
|
||
|
|
||
|
terminate = self._handle_pipe(msg)
|
||
|
if terminate:
|
||
|
break
|
||
|
if terminate:
|
||
|
break
|
||
|
|
||
|
if zap in socks and socks[zap] == zmq.POLLIN:
|
||
|
self._handle_zap()
|
||
|
|
||
|
self.pipe.close()
|
||
|
self.authenticator.stop()
|
||
|
|
||
|
def _handle_zap(self):
|
||
|
"""
|
||
|
Handle a message from the ZAP socket.
|
||
|
"""
|
||
|
msg = self.authenticator.zap_socket.recv_multipart()
|
||
|
if not msg: return
|
||
|
self.authenticator.handle_zap_message(msg)
|
||
|
|
||
|
def _handle_pipe(self, msg):
|
||
|
"""
|
||
|
Handle a message from front-end API.
|
||
|
"""
|
||
|
terminate = False
|
||
|
|
||
|
if msg is None:
|
||
|
terminate = True
|
||
|
return terminate
|
||
|
|
||
|
command = msg[0]
|
||
|
self.log.debug("auth received API command %r", command)
|
||
|
|
||
|
if command == b'ALLOW':
|
||
|
addresses = [u(m, self.encoding) for m in msg[1:]]
|
||
|
try:
|
||
|
self.authenticator.allow(*addresses)
|
||
|
except Exception as e:
|
||
|
self.log.exception("Failed to allow %s", addresses)
|
||
|
|
||
|
elif command == b'DENY':
|
||
|
addresses = [u(m, self.encoding) for m in msg[1:]]
|
||
|
try:
|
||
|
self.authenticator.deny(*addresses)
|
||
|
except Exception as e:
|
||
|
self.log.exception("Failed to deny %s", addresses)
|
||
|
|
||
|
elif command == b'PLAIN':
|
||
|
domain = u(msg[1], self.encoding)
|
||
|
json_passwords = msg[2]
|
||
|
self.authenticator.configure_plain(domain, jsonapi.loads(json_passwords))
|
||
|
|
||
|
elif command == b'CURVE':
|
||
|
# For now we don't do anything with domains
|
||
|
domain = u(msg[1], self.encoding)
|
||
|
|
||
|
# If location is CURVE_ALLOW_ANY, allow all clients. Otherwise
|
||
|
# treat location as a directory that holds the certificates.
|
||
|
location = u(msg[2], self.encoding)
|
||
|
self.authenticator.configure_curve(domain, location)
|
||
|
|
||
|
elif command == b'TERMINATE':
|
||
|
terminate = True
|
||
|
|
||
|
else:
|
||
|
self.log.error("Invalid auth command from API: %r", command)
|
||
|
|
||
|
return terminate
|
||
|
|
||
|
def _inherit_docstrings(cls):
|
||
|
"""inherit docstrings from Authenticator, so we don't duplicate them"""
|
||
|
for name, method in cls.__dict__.items():
|
||
|
if name.startswith('_') or not callable(method):
|
||
|
continue
|
||
|
upstream_method = getattr(Authenticator, name, None)
|
||
|
if not method.__doc__:
|
||
|
method.__doc__ = upstream_method.__doc__
|
||
|
return cls
|
||
|
|
||
|
@_inherit_docstrings
|
||
|
class ThreadAuthenticator(object):
|
||
|
"""Run ZAP authentication in a background thread"""
|
||
|
context = None
|
||
|
log = None
|
||
|
encoding = None
|
||
|
pipe = None
|
||
|
pipe_endpoint = ''
|
||
|
thread = None
|
||
|
auth = None
|
||
|
|
||
|
def __init__(self, context=None, encoding='utf-8', log=None):
|
||
|
self.context = context or zmq.Context.instance()
|
||
|
self.log = log
|
||
|
self.encoding = encoding
|
||
|
self.pipe = None
|
||
|
self.pipe_endpoint = "inproc://{0}.inproc".format(id(self))
|
||
|
self.thread = None
|
||
|
|
||
|
# proxy base Authenticator attributes
|
||
|
|
||
|
def __setattr__(self, key, value):
|
||
|
for obj in [self] + self.__class__.mro():
|
||
|
if key in obj.__dict__:
|
||
|
object.__setattr__(self, key, value)
|
||
|
return
|
||
|
setattr(self.thread.authenticator, key, value)
|
||
|
|
||
|
def __getattr__(self, key):
|
||
|
try:
|
||
|
object.__getattr__(self, key)
|
||
|
except AttributeError:
|
||
|
return getattr(self.thread.authenticator, key)
|
||
|
|
||
|
def allow(self, *addresses):
|
||
|
self.pipe.send_multipart([b'ALLOW'] + [b(a, self.encoding) for a in addresses])
|
||
|
|
||
|
def deny(self, *addresses):
|
||
|
self.pipe.send_multipart([b'DENY'] + [b(a, self.encoding) for a in addresses])
|
||
|
|
||
|
def configure_plain(self, domain='*', passwords=None):
|
||
|
self.pipe.send_multipart([b'PLAIN', b(domain, self.encoding), jsonapi.dumps(passwords or {})])
|
||
|
|
||
|
def configure_curve(self, domain='*', location=''):
|
||
|
domain = b(domain, self.encoding)
|
||
|
location = b(location, self.encoding)
|
||
|
self.pipe.send_multipart([b'CURVE', domain, location])
|
||
|
|
||
|
def configure_curve_callback(self, domain='*', credentials_provider=None):
|
||
|
self.thread.authenticator.configure_curve_callback(domain, credentials_provider=credentials_provider)
|
||
|
|
||
|
def start(self):
|
||
|
"""Start the authentication thread"""
|
||
|
# create a socket to communicate with auth thread.
|
||
|
self.pipe = self.context.socket(zmq.PAIR)
|
||
|
self.pipe.linger = 1
|
||
|
self.pipe.bind(self.pipe_endpoint)
|
||
|
self.thread = AuthenticationThread(self.context, self.pipe_endpoint, encoding=self.encoding, log=self.log)
|
||
|
self.thread.start()
|
||
|
# Event.wait:Changed in version 2.7: Previously, the method always returned None.
|
||
|
if sys.version_info < (2,7):
|
||
|
self.thread.started.wait(timeout=10)
|
||
|
else:
|
||
|
if not self.thread.started.wait(timeout=10):
|
||
|
raise RuntimeError("Authenticator thread failed to start")
|
||
|
|
||
|
def stop(self):
|
||
|
"""Stop the authentication thread"""
|
||
|
if self.pipe:
|
||
|
self.pipe.send(b'TERMINATE')
|
||
|
if self.is_alive():
|
||
|
self.thread.join()
|
||
|
self.thread = None
|
||
|
self.pipe.close()
|
||
|
self.pipe = None
|
||
|
|
||
|
def is_alive(self):
|
||
|
"""Is the ZAP thread currently running?"""
|
||
|
if self.thread and self.thread.is_alive():
|
||
|
return True
|
||
|
return False
|
||
|
|
||
|
def __del__(self):
|
||
|
self.stop()
|
||
|
|
||
|
__all__ = ['ThreadAuthenticator']
|