Project

General

Profile

Download (6.86 KB) Statistics
| Branch: | Tag: | Revision:
# redMine - project management software
# Copyright (C) 2006 Jean-Philippe Lang
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.

require 'net/ldap'

class AuthSourceLdap < AuthSource
SERVER_TYPES = { :free_ipa => 'FreeIPA', :active_directory => 'Active Directory',
:posix => 'POSIX'}

extend FriendlyId
friendly_id :name
include Parameterizable::ByIdName
include Encryptable
encrypts :account_password

validates :host, :presence => true, :length => {:maximum => 60}, :allow_nil => true
validates :attr_login, :attr_firstname, :attr_lastname, :attr_mail, :presence => true, :if => Proc.new { |auth| auth.onthefly_register? }
validates :attr_login, :attr_firstname, :attr_lastname, :attr_mail, :length => {:maximum => 30}, :allow_nil => true
validates :account_password, :length => {:maximum => 60}, :allow_nil => true
validates :port, :presence => true, :numericality => {:only_integer => true}
validates :server_type, :presence => true, :inclusion => { :in => SERVER_TYPES.keys.map(&:to_s) }
validate :validate_ldap_filter, :unless => Proc.new { |auth| auth.ldap_filter.blank? }

before_validation :strip_ldap_attributes
after_initialize :set_defaults

DEFAULT_PORTS = {:ldap => 389, :ldaps => 636 }
# Loads the LDAP info for a user and authenticates the user with their password
# Returns : Array of Strings.
# Either the users's DN or the user's full details OR nil
def authenticate(login, password)
return if login.blank? || password.blank?

logger.debug "LDAP auth with user #{login} against #{self}"

conn = ldap_con(login, password)
return unless conn.valid_user?(login)
entry = conn.find_user(login).last
attrs = attributes_values(entry)

unless conn.authenticate?(login, password)
auth_result = conn.ldap.ldap.get_operation_result
logger.warn "Result: #{auth_result.code}"
logger.warn "Message: #{auth_result.message}"
logger.warn "Failed to authenticate #{login}"
return
end

logger.debug "Retrieved LDAP Attributes for #{login}: #{attrs}"

attrs
rescue Net::LDAP::LdapError => error
raise "LdapError: %s" % error
end

def auth_method_name
"LDAP"
end

def to_config(login = nil, password = nil)
raise ::Foreman::Exception.new(N_('Cannot create LDAP configuration for %s without dedicated service account'), self.name) if login.nil? && use_user_login_for_service?
{ :host => host, :port => port, :encryption => encryption_config,
:base_dn => base_dn, :group_base => groups_base, :attr_login => attr_login,
:server_type => server_type.to_sym, :search_filter => ldap_filter,
:anon_queries => account.blank?, :service_user => service_user(login),
:service_pass => use_user_login_for_service? ? password : account_password,
:instrumentation_service => ActiveSupport::Notifications }
end

def encryption_config
return nil unless tls
{ :method => :simple_tls, :tls_options => { :verify_mode => OpenSSL::SSL::VERIFY_PEER } }
end

def ldap_con(login = nil, password = nil)
if login.present?
LdapFluff.new(self.to_config(login, password))
else
@ldap_con ||= LdapFluff.new(self.to_config)
end
end

def update_usergroups(login)
if use_user_login_for_service?
logger.info "Skipping user group update for user #{login} as $login is in use, group sync is unsupported"
return
end

unless usergroup_sync?
logger.info "Skipping user group update for user #{login} as usergroup_sync is disabled"
return
end

logger.debug "Updating user groups for user #{login}"
internal = User.find_by_login(login).external_usergroups.map(&:name)
external = ldap_con.group_list(login) # this list may return all groups in lowercase
(internal | external).each do |name|
begin
external_usergroup = external_usergroups.where('lower(name) = ?', name.downcase).last
if external_usergroup.present?
logger.debug "Refreshing external user group #{external_usergroup.name}"
external_usergroup.refresh
end
rescue => error
logger.warn "Could not update user group #{name}: #{error}"
end
end
end

def valid_group?(name)
return false unless name.present?
ldap_con.valid_group?(name)
end

def users_in_group(name)
ldap_con.user_list(name)
end

private

def strip_ldap_attributes
[:attr_login, :attr_firstname, :attr_lastname, :attr_mail].each do |attr|
write_attribute(attr, read_attribute(attr).strip) unless read_attribute(attr).nil?
end
end

def set_defaults
self.port ||= DEFAULT_PORTS[:ldap]
end

def required_ldap_attributes
return {:dn => :dn} unless onthefly_register?
{ :firstname => attr_firstname,
:lastname => attr_lastname,
:mail => attr_mail,
:login => attr_login,
:dn => :dn,
}
end

def optional_ldap_attributes
{ :avatar => attr_photo }
end

def attributes_values(entry)
Hash[required_ldap_attributes.merge(optional_ldap_attributes).map do |name, value|
next if value.blank? || (entry[value].blank? && optional_ldap_attributes.keys.include?(name))
if name.eql? :avatar
[:avatar_hash, store_avatar(entry[value].first)]
else
value = entry[value].is_a?(Array) ? entry[value].first : entry[value]
[name, value.to_s]
end
end.compact]
end

def store_avatar(avatar)
avatar_path = "#{Rails.public_path}/assets/avatars"
avatar_hash = Digest::SHA1.hexdigest(avatar)
avatar_file = "#{avatar_path}/#{avatar_hash}.jpg"
unless FileTest.exist? avatar_file
FileUtils.mkdir_p(avatar_path)
File.open(avatar_file, 'w') { |f| f.write(avatar) }
end
avatar_hash
end

def validate_ldap_filter
Net::LDAP::Filter.construct(ldap_filter)
rescue Net::LDAP::LdapError, Net::LDAP::FilterSyntaxInvalidError => e
message = _("invalid LDAP filter syntax")
Foreman::Logging.exception(message, e)
errors.add(:ldap_filter, message)
end

def use_user_login_for_service?
# returns true if account is defined and includes "$login"
(account.present? && account.include?("$login"))
end

def service_user(login)
use_user_login_for_service? ? account.sub("$login", login) : account
end
end
(4-4/4)