Skip to content

Commit d3ce1f9

Browse files
committed
Add an option for minimum lifetime
It's possible for gssproxy to return a cached credential with a very small remaining lifetime. This can be problematic for NFS clients since it requires a round trip to the NFS server to establish a GSS context. Add a min_lifetime option that represents the lowest value that the lifetime of the cached credential can be. Any lower than that, and gp_check_cred() returns GSS_S_CREDENTIALS_EXPIRED, so that gp_add_krb5_creds() is forced to try to obtain a new credential. Signed-off-by: Scott Mayhew <[email protected]>
1 parent defa560 commit d3ce1f9

File tree

5 files changed

+40
-2
lines changed

5 files changed

+40
-2
lines changed

examples/99-nfs-client.conf.in

+1
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,4 @@
77
allow_any_uid = yes
88
trusted = yes
99
euid = 0
10+
min_lifetime = 60

man/gssproxy.conf.5.xml

+14
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,20 @@
331331
</listitem>
332332
</varlistentry>
333333

334+
<varlistentry>
335+
<term>min_lifetime (integer)</term>
336+
<listitem>
337+
<para>If non-zero, when gssproxy is deciding whether to use
338+
a cached credential, it will compare the lifetime of the
339+
cached credential to this value. If the lifetime of the
340+
cached credential is lower, gssproxy will treat the cached
341+
credential as expired and will attempt to obtain a new
342+
credential.
343+
</para>
344+
<para>Default: min_lifetime = 0</para>
345+
</listitem>
346+
</varlistentry>
347+
334348
<varlistentry>
335349
<term>program (string)</term>
336350
<listitem>

src/gp_config.c

+11
Original file line numberDiff line numberDiff line change
@@ -538,6 +538,17 @@ static int load_services(struct gp_config *cfg, struct gp_ini_context *ctx)
538538
goto done;
539539
}
540540
}
541+
542+
cfg->svcs[n]->min_lifetime = 0;
543+
ret = gp_config_get_int(ctx, secname, "min_lifetime", &valnum);
544+
if (ret == 0) {
545+
if (valnum >= 0) {
546+
cfg->svcs[n]->min_lifetime = valnum;
547+
} else {
548+
GPDEBUG("Invalid value '%d' for min_lifetime in [%s], ignoring.\n",
549+
valnum, secname);
550+
}
551+
}
541552
}
542553
safefree(secname);
543554
}

src/gp_creds.c

+13-2
Original file line numberDiff line numberDiff line change
@@ -492,6 +492,7 @@ static int gp_get_cred_environment(struct gp_call_ctx *gpcall,
492492
}
493493

494494
static uint32_t gp_check_cred(uint32_t *min,
495+
struct gp_call_ctx *gpcall,
495496
gss_cred_id_t in_cred,
496497
gssx_name *desired_name,
497498
gss_cred_usage_t cred_usage)
@@ -506,6 +507,9 @@ static uint32_t gp_check_cred(uint32_t *min,
506507
gss_cred_usage_t usage;
507508
uint32_t lifetime;
508509
int present = 0;
510+
struct gp_service *svc;
511+
512+
svc = gpcall->service;
509513

510514
ret_maj = gss_inquire_cred(&ret_min, in_cred,
511515
desired_name?&check_name:NULL,
@@ -563,7 +567,14 @@ static uint32_t gp_check_cred(uint32_t *min,
563567
if (lifetime == 0) {
564568
ret_maj = GSS_S_CREDENTIALS_EXPIRED;
565569
} else {
566-
ret_maj = GSS_S_COMPLETE;
570+
if (svc->min_lifetime && lifetime < svc->min_lifetime) {
571+
GPDEBUG("%s: lifetime (%u) less than min_lifetime (%u) "
572+
"for service \"%s\" - returning GSS_S_CREDENTIALS_EXPIRED\n",
573+
__func__, lifetime, svc->min_lifetime, svc->name);
574+
ret_maj = GSS_S_CREDENTIALS_EXPIRED;
575+
} else {
576+
ret_maj = GSS_S_COMPLETE;
577+
}
567578
}
568579

569580
done:
@@ -622,7 +633,7 @@ uint32_t gp_add_krb5_creds(uint32_t *min,
622633
* function completely */
623634

624635
/* just check if it is a valid krb5 cred */
625-
ret_maj = gp_check_cred(&ret_min, in_cred, desired_name, cred_usage);
636+
ret_maj = gp_check_cred(&ret_min, gpcall, in_cred, desired_name, cred_usage);
626637
if (ret_maj == GSS_S_COMPLETE) {
627638
return GSS_S_COMPLETE;
628639
} else if (ret_maj == GSS_S_CREDENTIALS_EXPIRED ||

src/gp_proxy.h

+1
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ struct gp_service {
4545
gss_cred_usage_t cred_usage;
4646
uint32_t filter_flags;
4747
uint32_t enforce_flags;
48+
uint32_t min_lifetime;
4849
char *program;
4950

5051
uint32_t mechs;

0 commit comments

Comments
 (0)