initial functional version
This commit is contained in:
commit
acc262deea
202
LICENSE
Normal file
202
LICENSE
Normal file
@ -0,0 +1,202 @@
|
|||||||
|
|
||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
APPENDIX: How to apply the Apache License to your work.
|
||||||
|
|
||||||
|
To apply the Apache License to your work, attach the following
|
||||||
|
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||||
|
replaced with your own identifying information. (Don't include
|
||||||
|
the brackets!) The text should be enclosed in the appropriate
|
||||||
|
comment syntax for the file format. We also recommend that a
|
||||||
|
file or class name and description of purpose be included on the
|
||||||
|
same "printed page" as the copyright notice for easier
|
||||||
|
identification within third-party archives.
|
||||||
|
|
||||||
|
Copyright [yyyy] [name of copyright owner]
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
5
rebuild
Normal file
5
rebuild
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# This file is used to trigger rebuilds
|
||||||
|
# when dependencies of the charm change,
|
||||||
|
# but nothing in the charm needs to.
|
||||||
|
# simply change the uuid to something new
|
||||||
|
5572890c-916b-4ec7-a77b-a9e9f53471ae
|
13
requirements.txt
Normal file
13
requirements.txt
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# The order of packages is significant, because pip processes them in the order
|
||||||
|
# of appearance. Changing the order has an impact on the overall integration
|
||||||
|
# process, which may cause wedges in the gate later.
|
||||||
|
pbr>=1.8.0,<1.9.0
|
||||||
|
PyYAML>=3.1.0
|
||||||
|
simplejson>=2.2.0
|
||||||
|
netifaces>=0.10.4
|
||||||
|
netaddr>=0.7.12,!=0.7.16
|
||||||
|
Jinja2>=2.6 # BSD License (3 clause)
|
||||||
|
six>=1.9.0
|
||||||
|
dnspython>=1.12.0
|
||||||
|
psutil>=1.1.1,<2.0.0
|
||||||
|
charm-tools
|
194
src/README.md
Normal file
194
src/README.md
Normal file
@ -0,0 +1,194 @@
|
|||||||
|
# Overview
|
||||||
|
|
||||||
|
This subordinate charm provides a way to integrate a SAML-based identity
|
||||||
|
provider with Keystone using Mellon Apache web server authentication
|
||||||
|
module (mod_auth_mellon) and lasso as its dependency. Mellon acts as a
|
||||||
|
Service Provider in this case and provides SAML token attributes as WSGI
|
||||||
|
environment variables to Keystone which does not itself participate in
|
||||||
|
SAML exchanges - it merely interprets results of such exchanges
|
||||||
|
and maps assertion-derived attributes to entities (such as groups,
|
||||||
|
roles, projects and domains) in a local Keystone SQL database.
|
||||||
|
|
||||||
|
In general, any identity provider that conforms to SAML 2.0 will be
|
||||||
|
possible to integrate using this charm.
|
||||||
|
|
||||||
|
The following documentation is useful to better understand the charm
|
||||||
|
implementation:
|
||||||
|
|
||||||
|
* https://github.com/UNINETT/mod_auth_mellon/blob/master/doc/user_guide/mellon_user_guide.adoc
|
||||||
|
* https://github.com/UNINETT/mod_auth_mellon/blob/master/doc/user_guide/images/saml-web-sso.svg
|
||||||
|
* http://lasso.entrouvert.org/
|
||||||
|
* https://www.oasis-open.org/standards#samlv2.0
|
||||||
|
|
||||||
|
# Usage
|
||||||
|
|
||||||
|
Use this charm with the Keystone charm, running with preferred-api-version=3:
|
||||||
|
|
||||||
|
juju deploy keystone
|
||||||
|
juju config keystone preferred-api-version=3 # other settings
|
||||||
|
juju deploy openstack-dashboard # settings
|
||||||
|
juju deploy keystone-saml-mellon
|
||||||
|
juju add-relation keystone keystone-saml-mellon
|
||||||
|
juju add-relation keystone openstack-dashboard
|
||||||
|
|
||||||
|
|
||||||
|
In a bundle:
|
||||||
|
|
||||||
|
```
|
||||||
|
applications:
|
||||||
|
# ...
|
||||||
|
keystone-saml-mellon:
|
||||||
|
charm: cs:~dmitriis/keystone-saml-mellon
|
||||||
|
num_units: 0
|
||||||
|
options:
|
||||||
|
idp-name: 'myidp'
|
||||||
|
protocol-name: 'saml2'
|
||||||
|
user-facing-name: "myidp via saml2'
|
||||||
|
resources:
|
||||||
|
idp-metadata: "./FederationMetadata.xml"
|
||||||
|
sp-signing-keyinfo: "./sp-keyinfo.xml"
|
||||||
|
sp-private-key: "./mellon.pem"
|
||||||
|
relations:
|
||||||
|
# ...
|
||||||
|
- [ keystone, keystone-saml-mellon ]
|
||||||
|
- [ openstack-dashboard, keystone-saml-mellon ]
|
||||||
|
- [ "openstack-dashboard:websso-trusted-dashboard", "keystone:websso-trusted-dashboard" ]
|
||||||
|
```
|
||||||
|
|
||||||
|
# Prerequisites
|
||||||
|
|
||||||
|
In order to use this charm, there are several prerequisites that need to be
|
||||||
|
taken into account which require certain infrastructure to be set up out of
|
||||||
|
band, namely:
|
||||||
|
|
||||||
|
* PKI;
|
||||||
|
* DNS;
|
||||||
|
* NTP;
|
||||||
|
* idP.
|
||||||
|
|
||||||
|
On the Keystone charm side, this means that ssl_ca, ssl_cert, ssl_key,
|
||||||
|
use-https and os-public-hostname must be set.
|
||||||
|
|
||||||
|
Several key pairs can be used in a generic SAML exchange along with
|
||||||
|
certificates containing public keys. Besides the pairs used for message-level
|
||||||
|
signing and encryption there are also TLS certificates used for transport
|
||||||
|
layer encryption when a browser connects to a protected URL on the SP side or
|
||||||
|
when it gets redirected to an idP endpoint for authentication. In summary:
|
||||||
|
|
||||||
|
* Service Provider (Keystone) TLS termination certificates, keys and CA;
|
||||||
|
* Service Provider signing and encryption private keys and associated
|
||||||
|
public keys (SAML-level);
|
||||||
|
* Identity Provider TLS termination certificates, keys and CA;
|
||||||
|
* Identity Provider signing and encryption private keys and associated public
|
||||||
|
keys (SAML-level).
|
||||||
|
|
||||||
|
For a successful authentication to happen the following needs to hold:
|
||||||
|
|
||||||
|
* A user agent (browser) needs to
|
||||||
|
* trust an issuer (CA) of TLS certificates of an SP used for HTTPS;
|
||||||
|
* trust an issuer (CA) TLS certificates of an idP used for HTTPS;
|
||||||
|
* be able to resolve domain names present in subject or subjAltName fields.
|
||||||
|
* An SP needs to:
|
||||||
|
* be able to verify signed SAML messages sent by an idP via
|
||||||
|
public keys contained in certificates provided in the idP's metadata XML
|
||||||
|
and, if SAML-level encryption is enabled, decrypt those messages;
|
||||||
|
* An idP needs to:
|
||||||
|
* be able to verify signed SAML messages sent by an SP via
|
||||||
|
public keys contained in certificates provided in the SP's metadata XML
|
||||||
|
and, if SAML-level encryption is enabled, decrypt those messages.
|
||||||
|
|
||||||
|
Note that this does not mean that any actual checks are performed for
|
||||||
|
certificates related to SAML - only key material is used and there does
|
||||||
|
NOT have to be any PKI actually in-place, not even expiration times are
|
||||||
|
checked as per Mellon documentation. In that sense trust is very explicitly
|
||||||
|
defined by out of band mutual synchronization of SP and idP metadata files.
|
||||||
|
See SAML V2.0 Metadata Interoperability Profile (2.6.1) key processing
|
||||||
|
section for a normative reference.
|
||||||
|
|
||||||
|
However, this does not mean that no PKI will be in place - TLS certificates
|
||||||
|
used for HTTPS connectivity have to be verifiable by the entities that use
|
||||||
|
them. With Redirect or POST binding this is mainly about user agent being
|
||||||
|
able to validate SP or idP certificates - there is no direct communication
|
||||||
|
between the two outside the metadata synchronization step which is performed
|
||||||
|
by an operator out of band.
|
||||||
|
|
||||||
|
Additionally, for successful certificate verification clocks of all parties
|
||||||
|
need to be properly synchronized which is why it is important for NTP agents
|
||||||
|
to be able to reach proper NTP servers on SP and idP.
|
||||||
|
|
||||||
|
# Post-deployment Configuration
|
||||||
|
|
||||||
|
There are several post-deployment steps that have to be performed in order to
|
||||||
|
start using federated identity functionality in Keystone. They depend on the
|
||||||
|
chosen config values and also on an IDP configuration as it may put different
|
||||||
|
NameID values and attributes into SAML tokens. Token attributes are parsed by
|
||||||
|
mod_auth_mellon and are placed into WSGI environment which are used by
|
||||||
|
Keystone and they have the following format: "MELLON_<attribute_name>"
|
||||||
|
(one attribute can have multiple values in SAML). Both NameID and attribute
|
||||||
|
values can be used in mappings to map SAML token content to existing and, in
|
||||||
|
case of projects, potentially non-existing entities in Keystone database.
|
||||||
|
|
||||||
|
In order to take the above into account several objects need to be created:
|
||||||
|
|
||||||
|
* a domain used for federated users;
|
||||||
|
* (optional) a project to be used by federated users;
|
||||||
|
* one or more groups to place federated users into;
|
||||||
|
* role assignments for the groups above;
|
||||||
|
* an identity provider object;
|
||||||
|
* a mapping of NameID and SAML token attributes to Keystone entities;
|
||||||
|
* a federation protocol object.
|
||||||
|
|
||||||
|
```
|
||||||
|
cat > rules.json <<EOF
|
||||||
|
[{
|
||||||
|
"local": [
|
||||||
|
{
|
||||||
|
"user": {
|
||||||
|
"name": "{0}"
|
||||||
|
},
|
||||||
|
"group": {
|
||||||
|
"domain": {
|
||||||
|
"name": "federated_domain"
|
||||||
|
},
|
||||||
|
"name": "federated_users"
|
||||||
|
},
|
||||||
|
"projects": [
|
||||||
|
{
|
||||||
|
"name": "{0}",
|
||||||
|
"roles": [
|
||||||
|
{
|
||||||
|
"name": "Member"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"remote": [
|
||||||
|
{
|
||||||
|
"type": "MELLON_NAME_ID"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"type": "MELLON_groups",
|
||||||
|
"any_one_of": ["openstack-users"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}]
|
||||||
|
EOF
|
||||||
|
openstack domain create federated_domain
|
||||||
|
openstack project create federated_project --domain federated_domain
|
||||||
|
openstack group create federated_users --domain federated_domain
|
||||||
|
# created group id: 0427a780b34441488f064526a9890edd
|
||||||
|
openstack role add --group 0427a780b34441488f064526a9890edd --domain federated_domain Member
|
||||||
|
openstack identity provider create --remote-id https://adfs.intranet.test/adfs/services/trust myidp
|
||||||
|
openstack mapping create --rules rules.json myidp_mapping
|
||||||
|
openstack federation protocol create mapped --mapping myidp_mapping --identity-provider myidp
|
||||||
|
# list related projects
|
||||||
|
openstack federation project list
|
||||||
|
```
|
||||||
|
|
||||||
|
# Bugs
|
||||||
|
|
||||||
|
Please report bugs on [Launchpad](https://bugs.launchpad.net/charm-keystone-saml-mellon/+filebug).
|
||||||
|
|
||||||
|
For general questions please refer to the OpenStack [Charm Guide](http://docs.openstack.org/developer/charm-guide/).
|
52
src/config.yaml
Normal file
52
src/config.yaml
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
options:
|
||||||
|
protocol-name:
|
||||||
|
type: string
|
||||||
|
default: 'mapped'
|
||||||
|
description: |
|
||||||
|
Protocol name to use for URL and generation. Must match the one that
|
||||||
|
will be configured via OS-FEDERATION API.
|
||||||
|
idp-name:
|
||||||
|
type: string
|
||||||
|
default: 'myidp'
|
||||||
|
description: |
|
||||||
|
Identity provider name to use for URL generation. Must match the one
|
||||||
|
that will be configured via OS-FEDERATION API.
|
||||||
|
user-facing-name:
|
||||||
|
type: string
|
||||||
|
default: 'myidp via mapped'
|
||||||
|
description: |
|
||||||
|
A user-facing name to be used for the identity provider and protocol
|
||||||
|
combination. Used in the OpenStack dashboard.
|
||||||
|
saml-encryption:
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
description: |
|
||||||
|
(optional)
|
||||||
|
Specifies whether SAML assertion encryption should be used. In many
|
||||||
|
cases this option is not needed as TLS is used to encrypt data at
|
||||||
|
the transport level. This option results in Service Provider metadata
|
||||||
|
rendered with the same KeyInfo used for both singing and encryption.
|
||||||
|
In practice, this means that the private key specified in sp-private-key
|
||||||
|
will be used for both signing SAML messages to an idP and decryption of
|
||||||
|
messages sent by idP. idP has to receive the SP metadata file with a
|
||||||
|
public key (or a cert) present with use="encryption" specified.
|
||||||
|
nameid-formats:
|
||||||
|
type: string
|
||||||
|
default: "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified,urn:oasis:names:tc:SAML:2.0:nameid-format:transient,urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress,urn:oasis:names:tc:SAML:2.0:nameid-format:persistent,urn:mace:shibboleth:1.0:nameIdentifier"
|
||||||
|
description: |
|
||||||
|
NameIDFormat entries to be used in Service Provider metadata file and in
|
||||||
|
SAML requests (comma-separated). Different NameID formats could be used
|
||||||
|
like transient, persistent, X509SubjectName, emailAddress, unspecified
|
||||||
|
and so on.
|
||||||
|
subject-confirmation-data-address-check:
|
||||||
|
type: boolean
|
||||||
|
default: true
|
||||||
|
description: |
|
||||||
|
This option is used to control the checking of client IP address
|
||||||
|
against the address returned by the IdP in Address attribute of
|
||||||
|
the SubjectConfirmationData node. Can be useful if your SP is
|
||||||
|
behind a reverse proxy or any kind of strange network topology
|
||||||
|
making IP address of client different for the IdP and the SP.
|
||||||
|
Default is on.
|
||||||
|
This can be used for testing with something like testshib if
|
||||||
|
you are behind a NAT.
|
16
src/copyright
Normal file
16
src/copyright
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0
|
||||||
|
|
||||||
|
Files: *
|
||||||
|
Copyright: 2018, Canonical Ltd.
|
||||||
|
License: Apache-2.0
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
not use this file except in compliance with the License. You may obtain
|
||||||
|
a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
License for the specific language governing permissions and limitations
|
||||||
|
under the License.
|
72
src/icon.svg
Normal file
72
src/icon.svg
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||||
|
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
||||||
|
|
||||||
|
<svg
|
||||||
|
xmlns:dc="http://purl.org/dc/elements/1.1/"
|
||||||
|
xmlns:cc="http://creativecommons.org/ns#"
|
||||||
|
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
|
||||||
|
xmlns:svg="http://www.w3.org/2000/svg"
|
||||||
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
|
||||||
|
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
|
||||||
|
width="100"
|
||||||
|
height="100"
|
||||||
|
viewBox="0 0 26.458333 26.458334"
|
||||||
|
version="1.1"
|
||||||
|
id="svg8"
|
||||||
|
inkscape:version="0.92.2 (5c3e80d, 2017-08-06)"
|
||||||
|
sodipodi:docname="SAML.svg">
|
||||||
|
<defs
|
||||||
|
id="defs2" />
|
||||||
|
<sodipodi:namedview
|
||||||
|
id="base"
|
||||||
|
pagecolor="#000000"
|
||||||
|
bordercolor="#666666"
|
||||||
|
borderopacity="1.0"
|
||||||
|
inkscape:pageopacity="0"
|
||||||
|
inkscape:pageshadow="2"
|
||||||
|
inkscape:zoom="9.4171875"
|
||||||
|
inkscape:cx="47.529241"
|
||||||
|
inkscape:cy="54.618138"
|
||||||
|
inkscape:document-units="mm"
|
||||||
|
inkscape:current-layer="layer1"
|
||||||
|
showgrid="false"
|
||||||
|
units="px"
|
||||||
|
inkscape:window-width="3706"
|
||||||
|
inkscape:window-height="2050"
|
||||||
|
inkscape:window-x="134"
|
||||||
|
inkscape:window-y="68"
|
||||||
|
inkscape:window-maximized="1"
|
||||||
|
inkscape:pagecheckerboard="true" />
|
||||||
|
<metadata
|
||||||
|
id="metadata5">
|
||||||
|
<rdf:RDF>
|
||||||
|
<cc:Work
|
||||||
|
rdf:about="">
|
||||||
|
<dc:format>image/svg+xml</dc:format>
|
||||||
|
<dc:type
|
||||||
|
rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
|
||||||
|
<dc:title></dc:title>
|
||||||
|
</cc:Work>
|
||||||
|
</rdf:RDF>
|
||||||
|
</metadata>
|
||||||
|
<g
|
||||||
|
inkscape:label="Layer 1"
|
||||||
|
inkscape:groupmode="layer"
|
||||||
|
id="layer1"
|
||||||
|
transform="translate(-0.84287374,-270.48546)"
|
||||||
|
style="display:inline">
|
||||||
|
<text
|
||||||
|
xml:space="preserve"
|
||||||
|
style="font-style:normal;font-weight:normal;font-size:2.13460207px;line-height:1.25;font-family:sans-serif;letter-spacing:0px;word-spacing:0px;fill:#7b2272;fill-opacity:1;stroke:none;stroke-width:0.26682526"
|
||||||
|
x="2.8836255"
|
||||||
|
y="284.00653"
|
||||||
|
id="text1053"
|
||||||
|
transform="scale(0.9915977,1.0084735)"><tspan
|
||||||
|
sodipodi:role="line"
|
||||||
|
id="tspan1051"
|
||||||
|
x="2.8836255"
|
||||||
|
y="284.00653"
|
||||||
|
style="font-size:8.46666622px;fill:#7b2272;fill-opacity:1;stroke-width:0.26682526">SAML</tspan></text>
|
||||||
|
</g>
|
||||||
|
</svg>
|
After Width: | Height: | Size: 2.3 KiB |
7
src/layer.yaml
Normal file
7
src/layer.yaml
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
includes: ['layer:openstack', 'layer:leadership', 'interface:keystone-fid-service-provider', 'interface:websso-fid-service-provider', 'interface:juju-info']
|
||||||
|
options:
|
||||||
|
basic:
|
||||||
|
use_venv: True
|
||||||
|
include_system_packages: True
|
||||||
|
packages: ['python3-lxml', 'python3-cryptography']
|
||||||
|
repo: https://github.com/dshcherb/charm-keystone-saml-mellon
|
0
src/lib/charm/openstack/__init__.py
Normal file
0
src/lib/charm/openstack/__init__.py
Normal file
344
src/lib/charm/openstack/keystone_saml_mellon.py
Normal file
344
src/lib/charm/openstack/keystone_saml_mellon.py
Normal file
@ -0,0 +1,344 @@
|
|||||||
|
#
|
||||||
|
# Copyright 2017 Canonical Ltd
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import charmhelpers.core as core
|
||||||
|
import charmhelpers.core.host as ch_host
|
||||||
|
import charmhelpers.core.hookenv as hookenv
|
||||||
|
import charmhelpers.core.unitdata as unitdata
|
||||||
|
|
||||||
|
import charmhelpers.contrib.openstack.templating as os_templating
|
||||||
|
import charmhelpers.contrib.openstack.utils as os_utils
|
||||||
|
|
||||||
|
import charms_openstack.charm
|
||||||
|
import charms_openstack.adapters
|
||||||
|
|
||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
from lxml import etree
|
||||||
|
from cryptography.hazmat.backends import default_backend
|
||||||
|
from cryptography.hazmat.primitives import serialization
|
||||||
|
|
||||||
|
# release detection is done via keystone package given that
|
||||||
|
# openstack-origin is not present in the subordinate charm
|
||||||
|
# see https://github.com/juju/charm-helpers/issues/83
|
||||||
|
from charms_openstack.charm.core import (
|
||||||
|
register_os_release_selector
|
||||||
|
)
|
||||||
|
OPENSTACK_RELEASE_KEY = 'charmers.openstack-release-version'
|
||||||
|
|
||||||
|
CONFIGS = (IDP_METADATA, SP_METADATA, SP_PRIVATE_KEY,
|
||||||
|
SP_LOCATION_CONFIG,) = [
|
||||||
|
os.path.join('/etc/apache2/mellon',
|
||||||
|
f.format(hookenv.service_name())) for f in [
|
||||||
|
'idp-meta.{}.xml',
|
||||||
|
'sp-meta.{}.xml',
|
||||||
|
'sp-pk.{}.pem',
|
||||||
|
'sp-location.{}.conf']]
|
||||||
|
|
||||||
|
|
||||||
|
@register_os_release_selector
|
||||||
|
def select_release():
|
||||||
|
"""Determine the release based on the keystone package version.
|
||||||
|
|
||||||
|
Note that this function caches the release after the first install so
|
||||||
|
that it doesn't need to keep going and getting it from the package
|
||||||
|
information.
|
||||||
|
"""
|
||||||
|
release_version = unitdata.kv().get(OPENSTACK_RELEASE_KEY, None)
|
||||||
|
if release_version is None:
|
||||||
|
release_version = os_utils.os_release('keystone')
|
||||||
|
unitdata.kv().set(OPENSTACK_RELEASE_KEY, release_version)
|
||||||
|
return release_version
|
||||||
|
|
||||||
|
|
||||||
|
class KeystoneSAMLMellonConfigurationAdapter(
|
||||||
|
charms_openstack.adapters.ConfigurationAdapter):
|
||||||
|
|
||||||
|
def __init__(self, charm_instance=None):
|
||||||
|
super().__init__(charm_instance=charm_instance)
|
||||||
|
self._idp_metadata = None
|
||||||
|
self._sp_private_key = None
|
||||||
|
self._sp_signing_keyinfo = None
|
||||||
|
self._validation_errors = {}
|
||||||
|
|
||||||
|
@property
|
||||||
|
def validation_errors(self):
|
||||||
|
return {k: v for k, v in
|
||||||
|
self._validation_errors.items() if v}
|
||||||
|
|
||||||
|
@property
|
||||||
|
def idp_metadata_file(self):
|
||||||
|
return IDP_METADATA
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_metadata_file(self):
|
||||||
|
return SP_METADATA
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_private_key_file(self):
|
||||||
|
return SP_PRIVATE_KEY
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_location_config(self):
|
||||||
|
return SP_LOCATION_CONFIG
|
||||||
|
|
||||||
|
@property
|
||||||
|
def keystone_host(self):
|
||||||
|
return unitdata.kv().get('hostname')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def keystone_port(self):
|
||||||
|
return unitdata.kv().get('port')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def tls_enabled(self):
|
||||||
|
return unitdata.kv().get('tls-enabled')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def keystone_base_url(self):
|
||||||
|
scheme = 'https' if self.tls_enabled else 'http'
|
||||||
|
return ('{}://{}:{}'.format(scheme, self.keystone_host,
|
||||||
|
self.keystone_port))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_idp_path(self):
|
||||||
|
return ('/v3/OS-FEDERATION/identity_providers/{}'
|
||||||
|
.format(self.idp_name))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_protocol_path(self):
|
||||||
|
return ('{}/protocols/{}'
|
||||||
|
.format(self.sp_idp_path, self.protocol_name))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_auth_path(self):
|
||||||
|
return '{}/auth'.format(self.sp_protocol_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def mellon_endpoint_path(self):
|
||||||
|
return '{}/mellon'.format(self.sp_auth_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def websso_auth_protocol_path(self):
|
||||||
|
return ('/v3/auth/OS-FEDERATION/websso/{}'
|
||||||
|
.format(self.protocol_name))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def websso_auth_idp_protocol_path(self):
|
||||||
|
return ('/v3/auth/OS-FEDERATION/identity_providers'
|
||||||
|
'/{}/protocols/{}/websso'.format(
|
||||||
|
self.idp_name,
|
||||||
|
self.protocol_name
|
||||||
|
))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_post_response_path(self):
|
||||||
|
return '{}/postResponse'.format(self.mellon_endpoint_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_auth_url(self):
|
||||||
|
return '{}{}'.format(self.keystone_base_url,
|
||||||
|
self.sp_auth_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_logout_url(self):
|
||||||
|
return '{}/logout'.format(self.mellon_endpoint_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_post_response_url(self):
|
||||||
|
return '{}{}'.format(self.keystone_base_url,
|
||||||
|
self.sp_post_response_path)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def mellon_subject_confirmation_data_address_check(self):
|
||||||
|
return ('On' if self.subject_confirmation_data_address_check
|
||||||
|
else 'Off')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def supported_nameid_formats(self):
|
||||||
|
return self.nameid_formats.split(',')
|
||||||
|
|
||||||
|
IDP_METADATA_INVALID = ('idp-metadata resource is not a well-formed'
|
||||||
|
' xml file')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def idp_metadata(self):
|
||||||
|
idp_metadata_path = hookenv.resource_get('idp-metadata')
|
||||||
|
if os.path.exists(idp_metadata_path) and not self._idp_metadata:
|
||||||
|
with open(idp_metadata_path) as f:
|
||||||
|
content = f.read()
|
||||||
|
try:
|
||||||
|
etree.fromstring(content)
|
||||||
|
self._idp_metadata = content
|
||||||
|
self._validation_errors['idp-metadata'] = None
|
||||||
|
except etree.XMLSyntaxError:
|
||||||
|
self._idp_metadata = ''
|
||||||
|
self._validation_errors['idp-metadata'] = (
|
||||||
|
self.IDP_METADATA_INVALID)
|
||||||
|
return self._idp_metadata
|
||||||
|
|
||||||
|
SP_SIGNING_KEYINFO_INVALID = ('sp-signing-keyinfo resource is not a'
|
||||||
|
' well-formed xml file')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_signing_keyinfo(self):
|
||||||
|
info_path = hookenv.resource_get('sp-signing-keyinfo')
|
||||||
|
if os.path.exists(info_path) and not self._sp_signing_keyinfo:
|
||||||
|
self._sp_signing_keyinfo = None
|
||||||
|
with open(info_path) as f:
|
||||||
|
content = f.read()
|
||||||
|
try:
|
||||||
|
etree.fromstring(content)
|
||||||
|
self._sp_signing_keyinfo = content
|
||||||
|
self._validation_errors['sp-signing-keyinfo'] = None
|
||||||
|
except etree.XMLSyntaxError:
|
||||||
|
self._sp_signing_keyinfo = ''
|
||||||
|
self._validation_errors['sp-signing-keyinfo'] = (
|
||||||
|
self.SP_SIGNING_KEYINFO_INVALID)
|
||||||
|
return self._sp_signing_keyinfo
|
||||||
|
|
||||||
|
SP_PRIVATE_KEY_INVALID = ('resource is not a well-formed'
|
||||||
|
' RFC 5958 (PKCS#8) key')
|
||||||
|
|
||||||
|
@property
|
||||||
|
def sp_private_key(self):
|
||||||
|
pk_path = hookenv.resource_get('sp-private-key')
|
||||||
|
if os.path.exists(pk_path) and not self._sp_private_key:
|
||||||
|
with open(pk_path) as f:
|
||||||
|
content = f.read()
|
||||||
|
try:
|
||||||
|
serialization.load_pem_private_key(
|
||||||
|
content.encode(),
|
||||||
|
password=None,
|
||||||
|
backend=default_backend()
|
||||||
|
)
|
||||||
|
self._sp_private_key = content
|
||||||
|
self._validation_errors['sp-private-key'] = None
|
||||||
|
except ValueError:
|
||||||
|
self._sp_private_key = ''
|
||||||
|
self._validation_errors['sp-private-key'] = (
|
||||||
|
self.SP_PRIVATE_KEY_INVALID)
|
||||||
|
return self._sp_private_key
|
||||||
|
|
||||||
|
|
||||||
|
class KeystoneSAMLMellonCharm(charms_openstack.charm.OpenStackCharm):
|
||||||
|
|
||||||
|
# Internal name of charm
|
||||||
|
service_name = name = 'keystone-saml-mellon'
|
||||||
|
|
||||||
|
# Package to derive application version from
|
||||||
|
version_package = 'keystone'
|
||||||
|
|
||||||
|
# First release supported
|
||||||
|
release = 'mitaka'
|
||||||
|
|
||||||
|
# List of packages to install for this charm
|
||||||
|
packages = ['libapache2-mod-auth-mellon']
|
||||||
|
|
||||||
|
configuration_class = KeystoneSAMLMellonConfigurationAdapter
|
||||||
|
|
||||||
|
# render idP metadata provided out of band to establish
|
||||||
|
# SP -> idP trust. A domain name config parameter is evaluated at
|
||||||
|
# class definition time but this happens every event execution,
|
||||||
|
# including config-changed. Changing domain-name dynamically is not
|
||||||
|
# a real use-case anyway and it should be defined deployment time.
|
||||||
|
string_templates = {
|
||||||
|
IDP_METADATA: ('options', 'idp_metadata'),
|
||||||
|
SP_PRIVATE_KEY: ('options', 'sp_private_key'),
|
||||||
|
}
|
||||||
|
|
||||||
|
def configuration_complete(self):
|
||||||
|
"""Determine whether sufficient configuration has been provided
|
||||||
|
via charm config options and resources.
|
||||||
|
:returns: boolean indicating whether configuration is complete
|
||||||
|
"""
|
||||||
|
required_config = {
|
||||||
|
'idp-name': self.options.idp_name,
|
||||||
|
'protocol-name': self.options.protocol_name,
|
||||||
|
'user-facing-name': self.options.user_facing_name,
|
||||||
|
'idp-metadata': self.options.idp_metadata,
|
||||||
|
'sp-private-key': self.options.sp_private_key,
|
||||||
|
'sp-signing-keyinfo': self.options.sp_signing_keyinfo,
|
||||||
|
'nameid-formats': self.options.nameid_formats,
|
||||||
|
}
|
||||||
|
|
||||||
|
return all(required_config.values())
|
||||||
|
|
||||||
|
def assess_status(self):
|
||||||
|
"""Determine the current application status for the charm"""
|
||||||
|
hookenv.application_version_set(self.application_version)
|
||||||
|
if not self.configuration_complete():
|
||||||
|
errors = [
|
||||||
|
'{}: {}'.format(k, v)
|
||||||
|
for k, v in self.options.validation_errors.items() if v]
|
||||||
|
status_msg = 'Configuration is incomplete. {}'.format(
|
||||||
|
','.join(errors))
|
||||||
|
hookenv.status_set('blocked', status_msg)
|
||||||
|
else:
|
||||||
|
hookenv.status_set('active',
|
||||||
|
'Unit is ready')
|
||||||
|
|
||||||
|
def render_config(self):
|
||||||
|
"""
|
||||||
|
Render Service Provider configuration file to be used by Apache
|
||||||
|
and provided to idP out of band to establish mutual trust.
|
||||||
|
"""
|
||||||
|
owner = 'root'
|
||||||
|
group = 'www-data'
|
||||||
|
# group read and exec is needed for mellon to read the rendered
|
||||||
|
# files, otherwise it will fail in a cryptic way
|
||||||
|
dperms = 0o650
|
||||||
|
# file permissions are a bit more restrictive than defaults in
|
||||||
|
# charm-helpers but directory permissions are the main protection
|
||||||
|
# mechanism in this case
|
||||||
|
fileperms = 0o440
|
||||||
|
# ensure that a directory we need is there
|
||||||
|
ch_host.mkdir('/etc/apache2/mellon', perms=dperms, owner=owner,
|
||||||
|
group=group)
|
||||||
|
self.render_configs(self.string_templates.keys())
|
||||||
|
|
||||||
|
core.templating.render(
|
||||||
|
source='mellon-sp-metadata.xml',
|
||||||
|
template_loader=os_templating.get_loader(
|
||||||
|
'templates/', self.release),
|
||||||
|
target=self.options.sp_metadata_file,
|
||||||
|
context=self.adapters_instance,
|
||||||
|
owner=owner,
|
||||||
|
group=group,
|
||||||
|
perms=fileperms
|
||||||
|
)
|
||||||
|
|
||||||
|
core.templating.render(
|
||||||
|
source='apache-mellon-location.conf',
|
||||||
|
template_loader=os_templating.get_loader(
|
||||||
|
'templates/', self.release),
|
||||||
|
target=self.options.sp_location_config,
|
||||||
|
context=self.adapters_instance,
|
||||||
|
owner=owner,
|
||||||
|
group=group,
|
||||||
|
perms=fileperms
|
||||||
|
)
|
||||||
|
|
||||||
|
def remove_config(self):
|
||||||
|
for f in CONFIGS:
|
||||||
|
if os.path.exists(f):
|
||||||
|
os.unlink(f)
|
||||||
|
|
||||||
|
def enable_module(self):
|
||||||
|
subprocess.check_call(['a2enmod', 'auth_mellon'])
|
||||||
|
|
||||||
|
def disable_module(self):
|
||||||
|
subprocess.check_call(['a2dismod', 'auth_mellon'])
|
74
src/metadata.yaml
Normal file
74
src/metadata.yaml
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
name: keystone-saml-mellon
|
||||||
|
subordinate: true
|
||||||
|
maintainer: OpenStack Charmers <openstack-charmers@lists.ubuntu.com>
|
||||||
|
summary: Federated identity with SAML via Mellon Service Provider
|
||||||
|
description:
|
||||||
|
The main goal of this charm is to generate the necessary configuration
|
||||||
|
for use in the Keystone charm related to Service Provider config
|
||||||
|
generation, trust establishment between a remote idP and SP via
|
||||||
|
certificates and signaling Keystone service restart.
|
||||||
|
Keystone has a concept of a federated backend which serves multiple
|
||||||
|
purposes including being a backend part of a Service Provider in an
|
||||||
|
authentication scenario where SAML is used. Unless ECP is used on a
|
||||||
|
keystone client side, SAML-related exchange is performed in an Apache
|
||||||
|
authentication module (Mellon in case of this charm) and SAML
|
||||||
|
assertions are converted to WSGI environment variables passed down to
|
||||||
|
a particular mod_wsgi interpreter running Keystone code. Keystone has
|
||||||
|
an authentication plug-in called "mapped" which does the rest of the
|
||||||
|
work of resolving symbolic attributes and using them in mappings
|
||||||
|
defined by an operator or validating the existence of referenced IDs.
|
||||||
|
tags:
|
||||||
|
- openstack
|
||||||
|
- identity
|
||||||
|
- federation
|
||||||
|
- idP
|
||||||
|
series:
|
||||||
|
- xenial
|
||||||
|
- bionic
|
||||||
|
- artful
|
||||||
|
- trusty
|
||||||
|
provides:
|
||||||
|
keystone-fid-service-provider:
|
||||||
|
interface: keystone-fid-service-provider
|
||||||
|
scope: container
|
||||||
|
websso-fid-service-provider:
|
||||||
|
interface: websso-fid-service-provider
|
||||||
|
scope: global
|
||||||
|
requires:
|
||||||
|
container:
|
||||||
|
interface: juju-info
|
||||||
|
scope: container
|
||||||
|
resources:
|
||||||
|
idp-metadata:
|
||||||
|
type: file
|
||||||
|
filename: 'idp-metadata.xml'
|
||||||
|
description: |
|
||||||
|
Identity Provider metadata XML file that conforms to
|
||||||
|
saml-metadata-2.0-os specification. This file contains idP
|
||||||
|
identification information and its certificates with public keys
|
||||||
|
that can be used for signing and encryption on the idP side in
|
||||||
|
IDPSSODescriptor and other information which can be used on the
|
||||||
|
service provider side to interact with that idP.
|
||||||
|
sp-private-key:
|
||||||
|
type: file
|
||||||
|
filename: 'sp-private-key.pem'
|
||||||
|
description: |
|
||||||
|
Private key used by Service Provider (mod_auth_mellon) to sign
|
||||||
|
and/or SAML-level (not transport-level) encryption.
|
||||||
|
sp-signing-keyinfo:
|
||||||
|
type: file
|
||||||
|
filename: 'sp-signing-keyinfo.xml'
|
||||||
|
description: |
|
||||||
|
Specifies a signing KeyInfo portion of SPSSODescriptor to be used
|
||||||
|
in Service Provider metadata. This should be an XML portion
|
||||||
|
which in the simplest case is formatted as shown below:
|
||||||
|
This fragment should contain a certificate that contains a public
|
||||||
|
key of a Service Provider in case an idP requires that SAML
|
||||||
|
requests are signed.
|
||||||
|
The term “signing certificate” is a misnomer. A signing
|
||||||
|
certificate in metadata is actually used for signature
|
||||||
|
verification, not signing. The private signing key is held
|
||||||
|
securely by the signing party (SP in this case). In a SAML
|
||||||
|
exchange an SP signs SAML messages with its private key and idP
|
||||||
|
validates them via a public key embedded in a certificate present
|
||||||
|
in the SP's metadata XML and vice versa for idP.
|
137
src/reactive/keystone_saml_mellon_handlers.py
Normal file
137
src/reactive/keystone_saml_mellon_handlers.py
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
#
|
||||||
|
# Copyright 2017 Canonical Ltd
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
|
||||||
|
# import to trigger openstack charm metaclass init
|
||||||
|
import charm.openstack.keystone_saml_mellon # noqa
|
||||||
|
|
||||||
|
import charms_openstack.charm as charm
|
||||||
|
import charms.reactive as reactive
|
||||||
|
import charms.reactive.flags as flags
|
||||||
|
|
||||||
|
import charmhelpers.core.unitdata as unitdata
|
||||||
|
|
||||||
|
from charms.reactive.relations import (
|
||||||
|
endpoint_from_flag,
|
||||||
|
)
|
||||||
|
|
||||||
|
charm.use_defaults(
|
||||||
|
'charm.installed',
|
||||||
|
'update-status')
|
||||||
|
|
||||||
|
# if config has been changed we need to re-evaluate flags
|
||||||
|
# config.changed is set and cleared (atexit) in layer-basic
|
||||||
|
flags.register_trigger(when='config.changed',
|
||||||
|
clear_flag='config.rendered')
|
||||||
|
flags.register_trigger(when='upgraded', clear_flag='config.rendered')
|
||||||
|
flags.register_trigger(when='config.changed',
|
||||||
|
clear_flag='config.complete')
|
||||||
|
flags.register_trigger(
|
||||||
|
when='endpoint.keystone-fid-service-provider.changed',
|
||||||
|
clear_flag='keystone-data.complete'
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.hook('upgrade-charm')
|
||||||
|
def default_upgrade_charm():
|
||||||
|
"""Default handler for the 'upgrade-charm' hook.
|
||||||
|
This calls the charm.singleton.upgrade_charm() function as a default.
|
||||||
|
"""
|
||||||
|
reactive.set_state('upgraded')
|
||||||
|
|
||||||
|
|
||||||
|
# clear the upgraded state once config.rendered is set again
|
||||||
|
flags.register_trigger(when='config.rendered', clear_flag='upgraded')
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when_not('endpoint.keystone-fid-service-provider.joined')
|
||||||
|
def keystone_departed():
|
||||||
|
"""
|
||||||
|
Service restart should be handled on the keystone side
|
||||||
|
in this case.
|
||||||
|
"""
|
||||||
|
with charm.provide_charm_instance() as charm_instance:
|
||||||
|
charm_instance.remove_config()
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when('endpoint.keystone-fid-service-provider.joined')
|
||||||
|
@reactive.when_not('config.complete')
|
||||||
|
def config_changed():
|
||||||
|
with charm.provide_charm_instance() as charm_instance:
|
||||||
|
if charm_instance.configuration_complete():
|
||||||
|
flags.set_flag('config.complete')
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when('endpoint.keystone-fid-service-provider.joined')
|
||||||
|
@reactive.when_not('keystone-data.complete')
|
||||||
|
def keystone_data_changed(fid_sp):
|
||||||
|
primary_data = fid_sp.all_joined_units[0].received
|
||||||
|
if primary_data:
|
||||||
|
hostname = primary_data.get('hostname')
|
||||||
|
port = primary_data.get('port')
|
||||||
|
tls_enabled = primary_data.get('tls-enabled')
|
||||||
|
# a basic check on the fact that keystone provided us with
|
||||||
|
# hostname and port information
|
||||||
|
if hostname and port:
|
||||||
|
# save hostname and port data in local storage for future
|
||||||
|
# use - in case config is incomplete but a relation is
|
||||||
|
# we need to store this across charm hook invocations
|
||||||
|
unitdb = unitdata.kv()
|
||||||
|
unitdb.set('hostname', hostname)
|
||||||
|
unitdb.set('port', port)
|
||||||
|
unitdb.set('tls-enabled', tls_enabled)
|
||||||
|
flags.set_flag('keystone-data.complete')
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when('endpoint.keystone-fid-service-provider.joined')
|
||||||
|
@reactive.when('config.complete')
|
||||||
|
@reactive.when('keystone-data.complete')
|
||||||
|
@reactive.when_not('config.rendered')
|
||||||
|
def render_config():
|
||||||
|
# don't always have a relation context - obtain from the flag
|
||||||
|
fid_sp = endpoint_from_flag(
|
||||||
|
'endpoint.keystone-fid-service-provider.joined')
|
||||||
|
# get the first relation object as we only have one primary relation
|
||||||
|
rel = fid_sp.relations[0]
|
||||||
|
with charm.provide_charm_instance() as charm_instance:
|
||||||
|
charm_instance.render_config()
|
||||||
|
flags.set_flag('config.rendered')
|
||||||
|
# Trigger keystone restart. The relation is container-scoped
|
||||||
|
# so a per-unit db of a remote unit will only contain a nonce
|
||||||
|
# of a single subordinate
|
||||||
|
rel.to_publish['restart-nonce'] = str(uuid.uuid4())
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when('endpoint.websso-fid-service-provider.joined')
|
||||||
|
@reactive.when('config.complete')
|
||||||
|
@reactive.when('keystone-data.complete')
|
||||||
|
@reactive.when('config.rendered')
|
||||||
|
def configure_websso():
|
||||||
|
# don't always have a relation context - obtain from the flag
|
||||||
|
websso_fid_sp = endpoint_from_flag(
|
||||||
|
'endpoint.websso-fid-service-provider.joined')
|
||||||
|
with charm.provide_charm_instance() as charm_instance:
|
||||||
|
# publish config options for all remote units of a given rel
|
||||||
|
options = charm_instance.options
|
||||||
|
websso_fid_sp.publish(options.protocol_name,
|
||||||
|
options.idp_name,
|
||||||
|
options.user_facing_name)
|
||||||
|
|
||||||
|
|
||||||
|
@reactive.when_not('always.run')
|
||||||
|
def assess_status():
|
||||||
|
with charm.provide_charm_instance() as charm_instance:
|
||||||
|
charm_instance.assess_status()
|
47
src/templates/apache-mellon-location.conf
Normal file
47
src/templates/apache-mellon-location.conf
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
<Location {{ options.sp_auth_path }}>
|
||||||
|
MellonEnable "info"
|
||||||
|
MellonSPPrivateKeyFile {{ options.sp_private_key_file }}
|
||||||
|
MellonSPMetadataFile {{ options.sp_metadata_file }}
|
||||||
|
MellonIdPMetadataFile {{ options.idp_metadata_file }}
|
||||||
|
MellonEndpointPath {{ options.mellon_endpoint_path }}
|
||||||
|
MellonIdP "IDP"
|
||||||
|
AuthType "Mellon"
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonSubjectConfirmationDataAddressCheck {{ options.mellon_subject_confirmation_data_address_check }}
|
||||||
|
AuthType "Mellon"
|
||||||
|
Require valid-user
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonMergeEnvVars On ";"
|
||||||
|
</Location>
|
||||||
|
|
||||||
|
<Location {{ '~' }} "{{ options.websso_auth_protocol_path }}">
|
||||||
|
MellonEnable "info"
|
||||||
|
MellonSPPrivateKeyFile {{ options.sp_private_key_file }}
|
||||||
|
MellonSPMetadataFile {{ options.sp_metadata_file }}
|
||||||
|
MellonIdPMetadataFile {{ options.idp_metadata_file }}
|
||||||
|
MellonEndpointPath {{ options.mellon_endpoint_path }}
|
||||||
|
MellonIdP "IDP"
|
||||||
|
AuthType "Mellon"
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonSubjectConfirmationDataAddressCheck {{ options.mellon_subject_confirmation_data_address_check }}
|
||||||
|
AuthType "Mellon"
|
||||||
|
Require valid-user
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonMergeEnvVars On ";"
|
||||||
|
</Location>
|
||||||
|
|
||||||
|
<Location {{ '~' }} "{{ options.websso_auth_idp_protocol_path }}">
|
||||||
|
MellonEnable "info"
|
||||||
|
MellonSPPrivateKeyFile {{ options.sp_private_key_file }}
|
||||||
|
MellonSPMetadataFile {{ options.sp_metadata_file }}
|
||||||
|
MellonIdPMetadataFile {{ options.idp_metadata_file }}
|
||||||
|
MellonEndpointPath {{ options.mellon_endpoint_path }}
|
||||||
|
MellonIdP "IDP"
|
||||||
|
AuthType "Mellon"
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonSubjectConfirmationDataAddressCheck {{ options.mellon_subject_confirmation_data_address_check }}
|
||||||
|
AuthType "Mellon"
|
||||||
|
Require valid-user
|
||||||
|
MellonEnable "auth"
|
||||||
|
MellonMergeEnvVars On ";"
|
||||||
|
</Location>
|
17
src/templates/mellon-sp-metadata.xml
Normal file
17
src/templates/mellon-sp-metadata.xml
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
<EntityDescriptor entityID="{{ options.sp_auth_url }}" xmlns="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
|
||||||
|
<SPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
|
||||||
|
<KeyDescriptor use="signing">
|
||||||
|
{{ options.sp_signing_keyinfo }}
|
||||||
|
</KeyDescriptor>
|
||||||
|
{% if options.saml_encryption %}
|
||||||
|
<KeyDescriptor use="encryption">
|
||||||
|
{{ options.sp_signing_keyinfo }}
|
||||||
|
</KeyDescriptor>
|
||||||
|
{% endif %}
|
||||||
|
<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="{{ options.logout_url }}"/>
|
||||||
|
<AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="{{ options.sp_post_response_url }}" index="0"/>
|
||||||
|
{% for format in options.supported_nameid_formats -%}
|
||||||
|
<NameIDFormat>{{ format }}</NameIDFormat>
|
||||||
|
{% endfor -%}
|
||||||
|
</SPSSODescriptor>
|
||||||
|
</EntityDescriptor>
|
33
src/test-requirements.txt
Normal file
33
src/test-requirements.txt
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# The order of packages is significant, because pip processes them in the order
|
||||||
|
# of appearance. Changing the order has an impact on the overall integration
|
||||||
|
# process, which may cause wedges in the gate later.
|
||||||
|
coverage>=3.6
|
||||||
|
mock>=1.2
|
||||||
|
flake8>=2.2.4,<=2.4.1
|
||||||
|
os-testr>=0.4.1
|
||||||
|
charm-tools>=2.0.0
|
||||||
|
requests==2.6.0
|
||||||
|
# amulet deployment helpers
|
||||||
|
git+https://github.com/juju/charm-helpers#egg=charmhelpers
|
||||||
|
# BEGIN: Amulet OpenStack Charm Helper Requirements
|
||||||
|
# Liberty client lower constraints
|
||||||
|
amulet>=1.14.3,<2.0
|
||||||
|
bundletester>=0.6.1,<1.0
|
||||||
|
aodhclient>=0.1.0
|
||||||
|
python-barbicanclient>=4.0.1
|
||||||
|
python-ceilometerclient>=1.5.0
|
||||||
|
python-cinderclient>=1.4.0
|
||||||
|
python-designateclient>=1.5
|
||||||
|
python-glanceclient>=1.1.0
|
||||||
|
python-heatclient>=0.8.0
|
||||||
|
python-keystoneclient>=1.7.1
|
||||||
|
python-manilaclient>=1.8.1
|
||||||
|
python-neutronclient>=3.1.0
|
||||||
|
python-novaclient>=2.30.1
|
||||||
|
python-openstackclient>=1.7.0
|
||||||
|
python-swiftclient>=2.6.0
|
||||||
|
pika>=0.10.0,<1.0
|
||||||
|
distro-info
|
||||||
|
# END: Amulet OpenStack Charm Helper Requirements
|
||||||
|
# NOTE: workaround for 14.04 pip/tox
|
||||||
|
pytz
|
53
src/tox.ini
Normal file
53
src/tox.ini
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
# Source charm: ./src/tox.ini
|
||||||
|
# This file is managed centrally by release-tools and should not be modified
|
||||||
|
# within individual charm repos.
|
||||||
|
[tox]
|
||||||
|
envlist = pep8
|
||||||
|
skipsdist = True
|
||||||
|
|
||||||
|
[testenv]
|
||||||
|
setenv = VIRTUAL_ENV={envdir}
|
||||||
|
PYTHONHASHSEED=0
|
||||||
|
AMULET_SETUP_TIMEOUT=2700
|
||||||
|
whitelist_externals = juju
|
||||||
|
passenv = HOME TERM AMULET_* CS_API_*
|
||||||
|
deps = -r{toxinidir}/test-requirements.txt
|
||||||
|
install_command =
|
||||||
|
pip install --allow-unverified python-apt {opts} {packages}
|
||||||
|
|
||||||
|
[testenv:pep8]
|
||||||
|
basepython = python2.7
|
||||||
|
commands = charm-proof
|
||||||
|
|
||||||
|
[testenv:func27-noop]
|
||||||
|
# DRY RUN - For Debug
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
bundletester -vl DEBUG -r json -o func-results.json --test-pattern "gate-*" -n --no-destroy
|
||||||
|
|
||||||
|
[testenv:func27]
|
||||||
|
# Run all gate tests which are +x (expected to always pass)
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
bundletester -vl DEBUG -r json -o func-results.json --test-pattern "gate-*" --no-destroy
|
||||||
|
|
||||||
|
[testenv:func27-smoke]
|
||||||
|
# Run a specific test as an Amulet smoke test (expected to always pass)
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
bundletester -vl DEBUG -r json -o func-results.json gate-basic-xenial-pike --no-destroy
|
||||||
|
|
||||||
|
[testenv:func27-dfs]
|
||||||
|
# Run all deploy-from-source tests which are +x (may not always pass!)
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
bundletester -vl DEBUG -r json -o func-results.json --test-pattern "dfs-*" --no-destroy
|
||||||
|
|
||||||
|
[testenv:func27-dev]
|
||||||
|
# Run all development test targets which are +x (may not always pass!)
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
bundletester -vl DEBUG -r json -o func-results.json --test-pattern "dev-*" --no-destroy
|
||||||
|
|
||||||
|
[testenv:venv]
|
||||||
|
commands = {posargs}
|
7
test-requirements.txt
Normal file
7
test-requirements.txt
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Lint and unit test requirements
|
||||||
|
flake8
|
||||||
|
os-testr>=0.4.1
|
||||||
|
charms.reactive
|
||||||
|
mock>=1.2
|
||||||
|
coverage>=3.6
|
||||||
|
git+https://github.com/openstack/charms.openstack.git#egg=charms-openstack
|
55
tox.ini
Normal file
55
tox.ini
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
# Source charm: ./tox.ini
|
||||||
|
# This file is managed centrally by release-tools and should not be modified
|
||||||
|
# within individual charm repos.
|
||||||
|
[tox]
|
||||||
|
skipsdist = True
|
||||||
|
envlist = pep8,py34,py35
|
||||||
|
skip_missing_interpreters = True
|
||||||
|
|
||||||
|
[testenv]
|
||||||
|
setenv = VIRTUAL_ENV={envdir}
|
||||||
|
PYTHONHASHSEED=0
|
||||||
|
TERM=linux
|
||||||
|
LAYER_PATH={toxinidir}/layers
|
||||||
|
INTERFACE_PATH={toxinidir}/interfaces
|
||||||
|
JUJU_REPOSITORY={toxinidir}/build
|
||||||
|
passenv = http_proxy https_proxy
|
||||||
|
install_command =
|
||||||
|
pip install {opts} {packages}
|
||||||
|
deps =
|
||||||
|
-r{toxinidir}/requirements.txt
|
||||||
|
|
||||||
|
[testenv:build]
|
||||||
|
basepython = python2.7
|
||||||
|
commands =
|
||||||
|
charm-build --log-level DEBUG -o {toxinidir}/build src {posargs}
|
||||||
|
|
||||||
|
[testenv:py27]
|
||||||
|
basepython = python2.7
|
||||||
|
# Reactive source charms are Python3-only, but a py27 unit test target
|
||||||
|
# is required by OpenStack Governance. Remove this shim as soon as
|
||||||
|
# permitted. http://governance.openstack.org/reference/cti/python_cti.html
|
||||||
|
whitelist_externals = true
|
||||||
|
commands = true
|
||||||
|
|
||||||
|
[testenv:py34]
|
||||||
|
basepython = python3.4
|
||||||
|
deps = -r{toxinidir}/test-requirements.txt
|
||||||
|
commands = ostestr {posargs}
|
||||||
|
|
||||||
|
[testenv:py35]
|
||||||
|
basepython = python3.5
|
||||||
|
deps = -r{toxinidir}/test-requirements.txt
|
||||||
|
commands = ostestr {posargs}
|
||||||
|
|
||||||
|
[testenv:pep8]
|
||||||
|
basepython = python3.5
|
||||||
|
deps = -r{toxinidir}/test-requirements.txt
|
||||||
|
commands = flake8 {posargs} src unit_tests
|
||||||
|
|
||||||
|
[testenv:venv]
|
||||||
|
commands = {posargs}
|
||||||
|
|
||||||
|
[flake8]
|
||||||
|
# E402 ignore necessary for path append before sys module import in actions
|
||||||
|
ignore = E402
|
22
unit_tests/__init__.py
Normal file
22
unit_tests/__init__.py
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
# Copyright 2016 Canonical Ltd
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import sys
|
||||||
|
|
||||||
|
sys.path.append('src')
|
||||||
|
sys.path.append('src/lib')
|
||||||
|
|
||||||
|
# Mock out charmhelpers so that we can test without it.
|
||||||
|
import charms_openstack.test_mocks # noqa
|
||||||
|
charms_openstack.test_mocks.mock_charmhelpers()
|
Loading…
Reference in New Issue
Block a user