Wallet::Schema

(Database schema and connector for the wallet system)

SYNOPSIS

    use Wallet::Schema;
    my $schema = Wallet::Schema->connect;

DESCRIPTION

This class encapsulates the database schema for the wallet system. The documentation you're reading explains and comments the schema. The class runs using the DBIx::Class module.

connect() will obtain the database connection information from the wallet configuration; see Wallet::Config for more details. It will also automatically set the RaiseError attribute to true and the PrintError and AutoCommit attributes to false, matching the assumptions made by the wallet database code.

SCHEMA

Normalization Tables

Holds the supported object types and their corresponding Perl classes:

  create table types
     (ty_name             varchar(16) primary key,
      ty_class            varchar(64));
  insert into types (ty_name, ty_class)
      values ('file', 'Wallet::Object::File');
  insert into types (ty_name, ty_class)
      values ('keytab', 'Wallet::Object::Keytab');

Holds the supported ACL schemes and their corresponding Perl classes:

  create table acl_schemes
     (as_name             varchar(32) primary key,
      as_class            varchar(64));
  insert into acl_schemes (as_name, as_class)
      values ('krb5', 'Wallet::ACL::Krb5');
  insert into acl_schemes (as_name, as_class)
      values ('krb5-regex', 'Wallet::ACL::Krb5::Regex');
  insert into acl_schemes (as_name, as_class)
      values ('ldap-attr', 'Wallet::ACL::LDAP::Attribute');
  insert into acl_schemes (as_name, as_class)
      values ('ldap-attr-root', 'Wallet::ACL::LDAP::Attribute::Root');
  insert into acl_schemes (as_name, as_class)
      values ('nested', 'Wallet::ACL::Nested');
  insert into acl_schemes (as_name, as_class)
      values ('netdb', 'Wallet::ACL::NetDB');
  insert into acl_schemes (as_name, as_class)
      values ('netdb-root', 'Wallet::ACL::NetDB::Root');

If you have extended the wallet to support additional object types or additional ACL schemes, you will want to add additional rows to these tables mapping those types or schemes to Perl classes that implement the object or ACL verifier APIs.

ACL Tables

A wallet ACL consists of zero or more ACL entries, each of which is a scheme and an identifier. The scheme identifies the check that should be performed and the identifier is additional scheme-specific information. Each ACL references entries in the following table:

  create table acls
     (ac_id               integer auto_increment primary key,
      ac_name             varchar(255) not null,
      unique (ac_name));

This just keeps track of unique ACL identifiers. The data is then stored in:

  create table acl_entries
     (ae_id               integer not null references acls(ac_id),
      ae_scheme           varchar(32)
          not null references acl_schemes(as_name),
      ae_identifier       varchar(255) not null,
      primary key (ae_id, ae_scheme, ae_identifier));
  create index ae_id on acl_entries (ae_id);

ACLs may be referred to in the API via either the numeric ID or the human-readable name, but internally ACLs are always referenced by numeric ID so that they can be renamed without requiring complex data modifications.

Currently, the ACL named ADMIN (case-sensitive) is special-cased in the Wallet::Server code and granted global access.

Every change made to any ACL in the database will be recorded in this table.

  create table acl_history
     (ah_id               integer auto_increment primary key,
      ah_acl              integer not null,
      ah_name             varchar(255) default null,
      ah_action           varchar(16) not null,
      ah_scheme           varchar(32) default null,
      ah_identifier       varchar(255) default null,
      ah_by               varchar(255) not null,
      ah_from             varchar(255) not null,
      ah_on               datetime not null);
  create index ah_acl on acl_history (ah_acl);

ah_action must be one of create, destroy, add, remove, or rename (enums aren't used for compatibility with databases other than MySQL). For a change of type create, destroy, or rename, only the action, the ACL name (in the case of rename, the old ACL name prior to the rename), and the trace records (by, from, and on) are stored. For a change to the lines of an ACL, the scheme and identifier of the line that was added or removed are included.

ah_by stores the authenticated identity that made the change, ah_from stores the host from which they made the change, and ah_on stores the time the change was made.

Object Tables

Each object stored in the wallet is represented by an entry in the objects table:

  create table objects
     (ob_type             varchar(16)
          not null references types(ty_name),
      ob_name             varchar(255) not null,
      ob_owner            integer default null references acls(ac_id),
      ob_acl_get          integer default null references acls(ac_id),
      ob_acl_store        integer default null references acls(ac_id),
      ob_acl_show         integer default null references acls(ac_id),
      ob_acl_destroy      integer default null references acls(ac_id),
      ob_acl_flags        integer default null references acls(ac_id),
      ob_expires          datetime default null,
      ob_created_by       varchar(255) not null,
      ob_created_from     varchar(255) not null,
      ob_created_on       datetime not null,
      ob_stored_by        varchar(255) default null,
      ob_stored_from      varchar(255) default null,
      ob_stored_on        datetime default null,
      ob_downloaded_by    varchar(255) default null,
      ob_downloaded_from  varchar(255) default null,
      ob_downloaded_on    datetime default null,
      ob_comment          varchar(255) default null,
      primary key (ob_name, ob_type));
  create index ob_owner on objects (ob_owner);
  create index ob_expires on objects (ob_expires);

Object names are not globally unique but only unique within their type, so the table has a joint primary key. Each object has an owner and then up to five more specific ACLs. The owner provides permission for get, store, and show operations if no more specific ACL is set. It does not provide permission for destroy or flags.

The ob_acl_flags ACL controls who can set flags on this object. Each object may have zero or more flags associated with it:

  create table flags
     (fl_type             varchar(16)
          not null references objects(ob_type),
      fl_name             varchar(255)
          not null references objects(ob_name),
      fl_flag             enum('locked', 'unchanging')
          not null,
      primary key (fl_type, fl_name, fl_flag));
  create index fl_object on flags (fl_type, fl_name);

Every change made to any object in the wallet database will be recorded in this table:

  create table object_history
     (oh_id               integer auto_increment primary key,
      oh_type             varchar(16)
          not null references objects(ob_type),
      oh_name             varchar(255)
          not null references objects(ob_name),
      oh_action           varchar(16) not null,
      oh_field            varchar(16) default null,
      oh_type_field       varchar(255) default null,
      oh_old              varchar(255) default null,
      oh_new              varchar(255) default null,
      oh_by               varchar(255) not null,
      oh_from             varchar(255) not null,
      oh_on               datetime not null);
  create index oh_object on object_history (oh_type, oh_name);

oh_action must be one of create, destroy, get, store, or set. oh_field must be one of owner, acl_get, acl_store, acl_show, acl_destroy, acl_flags, expires, flags, or type_data. Enums aren't used for compatibility with databases other than MySQL.

For a change of type create, get, store, or destroy, only the action and the trace records (by, from, and on) are stored. For changes to columns or to the flags table, oh_field takes what attribute is changed, oh_from takes the previous value converted to a string and oh_to takes the next value similarly converted to a string. The special field value "type_data" is used when type-specific data is changed, and in that case (and only that case) some type-specific name for the data being changed is stored in oh_type_field.

When clearing a flag, oh_old will have the name of the flag and oh_new will be null. When setting a flag, oh_old will be null and oh_new will have the name of the flag.

oh_by stores the authenticated identity that made the change, oh_from stores the host from which they made the change, and oh_on stores the time the change was made.

Duo Backend Data

Duo integration objects store some additional metadata about the integration to aid in synchronization with Duo.

  create table duo
     (du_name             varchar(255)
          not null references objects(ob_name),
      du_key              varchar(255) not null);
  create index du_key on duo (du_key);

du_key holds the Duo integration key, which is the unique name of the integration within Duo. Additional data may be added later to represent the other possible settings within Duo.

Keytab Backend Data

The keytab backend has stub support for synchronizing keys with an external system, although no external systems are currently supported. The permitted external systems are listed in a normalization table:

  create table sync_targets
     (st_name             varchar(255) primary key);

and then the synchronization targets for a given keytab are stored in this table:

  create table keytab_sync
     (ks_name             varchar(255)
          not null references objects(ob_name),
      ks_target           varchar(255)
          not null references sync_targets(st_name),
      primary key (ks_name, ks_target));
  create index ks_name on keytab_sync (ks_name);

The keytab backend supports restricting the allowable enctypes for a given keytab. The permitted enctypes are listed in a normalization table:

  create table enctypes
     (en_name             varchar(255) primary key);

and then the restrictions for a given keytab are stored in this table:

  create table keytab_enctypes
     (ke_name             varchar(255)
          not null references objects(ob_name),
      ke_enctype          varchar(255)
          not null references enctypes(en_name),
      primary key (ke_name, ke_enctype));
  create index ke_name on keytab_enctypes (ke_name);

To use this functionality, you will need to populate the enctypes table with the enctypes that a keytab may be restricted to. Currently, there is no automated mechanism to do this.

CLASS METHODS

connect()

Opens a new database connection and returns the database object. On any failure, throws an exception. Unlike the DBI method, connect() takes no arguments; all database connection information is derived from the wallet configuration.

SEE ALSO

wallet-backend(8), Wallet::Config(3)

This module is part of the wallet system. The current version is available from <https://www.eyrie.org/~eagle/software/wallet/>.

AUTHOR

Russ Allbery <eagle@eyrie.org>

Last spun 2022-12-12 from POD modified 2018-06-03