|
# redMine - project management software
|
|
# Copyright (C) 2006 Jean-Philippe Lang
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
require 'net/ldap'
|
|
|
|
class AuthSourceLdap < AuthSource
|
|
SERVER_TYPES = { :free_ipa => 'FreeIPA', :active_directory => 'Active Directory',
|
|
:posix => 'POSIX'}
|
|
|
|
extend FriendlyId
|
|
friendly_id :name
|
|
include Parameterizable::ByIdName
|
|
include Encryptable
|
|
encrypts :account_password
|
|
|
|
validates :host, :presence => true, :length => {:maximum => 60}, :allow_nil => true
|
|
validates :attr_login, :attr_firstname, :attr_lastname, :attr_mail, :presence => true, :if => Proc.new { |auth| auth.onthefly_register? }
|
|
validates :attr_login, :attr_firstname, :attr_lastname, :attr_mail, :length => {:maximum => 30}, :allow_nil => true
|
|
validates :account_password, :length => {:maximum => 60}, :allow_nil => true
|
|
validates :port, :presence => true, :numericality => {:only_integer => true}
|
|
validates :server_type, :presence => true, :inclusion => { :in => SERVER_TYPES.keys.map(&:to_s) }
|
|
validate :validate_ldap_filter, :unless => Proc.new { |auth| auth.ldap_filter.blank? }
|
|
|
|
before_validation :strip_ldap_attributes
|
|
after_initialize :set_defaults
|
|
|
|
DEFAULT_PORTS = {:ldap => 389, :ldaps => 636 }
|
|
# Loads the LDAP info for a user and authenticates the user with their password
|
|
# Returns : Array of Strings.
|
|
# Either the users's DN or the user's full details OR nil
|
|
def authenticate(login, password)
|
|
return if login.blank? || password.blank?
|
|
|
|
logger.debug "LDAP auth with user #{login} against #{self}"
|
|
|
|
conn = ldap_con(login, password)
|
|
return unless conn.valid_user?(login)
|
|
entry = conn.find_user(login).last
|
|
attrs = attributes_values(entry)
|
|
|
|
unless conn.authenticate?(login, password)
|
|
auth_result = conn.ldap.ldap.get_operation_result
|
|
logger.warn "Result: #{auth_result.code}"
|
|
logger.warn "Message: #{auth_result.message}"
|
|
logger.warn "Failed to authenticate #{login}"
|
|
return
|
|
end
|
|
|
|
logger.debug "Retrieved LDAP Attributes for #{login}: #{attrs}"
|
|
|
|
attrs
|
|
rescue Net::LDAP::LdapError => error
|
|
raise "LdapError: %s" % error
|
|
end
|
|
|
|
def auth_method_name
|
|
"LDAP"
|
|
end
|
|
|
|
def to_config(login = nil, password = nil)
|
|
raise ::Foreman::Exception.new(N_('Cannot create LDAP configuration for %s without dedicated service account'), self.name) if login.nil? && use_user_login_for_service?
|
|
{ :host => host, :port => port, :encryption => encryption_config,
|
|
:base_dn => base_dn, :group_base => groups_base, :attr_login => attr_login,
|
|
:server_type => server_type.to_sym, :search_filter => ldap_filter,
|
|
:anon_queries => account.blank?, :service_user => service_user(login),
|
|
:service_pass => use_user_login_for_service? ? password : account_password,
|
|
:instrumentation_service => ActiveSupport::Notifications }
|
|
end
|
|
|
|
def encryption_config
|
|
return nil unless tls
|
|
{ :method => :simple_tls, :tls_options => { :verify_mode => OpenSSL::SSL::VERIFY_PEER } }
|
|
end
|
|
|
|
def ldap_con(login = nil, password = nil)
|
|
if login.present?
|
|
LdapFluff.new(self.to_config(login, password))
|
|
else
|
|
@ldap_con ||= LdapFluff.new(self.to_config)
|
|
end
|
|
end
|
|
|
|
def update_usergroups(login)
|
|
if use_user_login_for_service?
|
|
logger.info "Skipping user group update for user #{login} as $login is in use, group sync is unsupported"
|
|
return
|
|
end
|
|
|
|
unless usergroup_sync?
|
|
logger.info "Skipping user group update for user #{login} as usergroup_sync is disabled"
|
|
return
|
|
end
|
|
|
|
logger.debug "Updating user groups for user #{login}"
|
|
internal = User.find(login).external_usergroups.map(&:name)
|
|
external = ldap_con.group_list(login) # this list may return all groups in lowercase
|
|
(internal | external).each do |name|
|
|
begin
|
|
external_usergroup = external_usergroups.where('lower(name) = ?', name.downcase).last
|
|
if external_usergroup.present?
|
|
logger.debug "Refreshing external user group #{external_usergroup.name}"
|
|
external_usergroup.refresh
|
|
end
|
|
rescue => error
|
|
logger.warn "Could not update user group #{name}: #{error}"
|
|
end
|
|
end
|
|
end
|
|
|
|
def valid_group?(name)
|
|
return false unless name.present?
|
|
ldap_con.valid_group?(name)
|
|
end
|
|
|
|
def users_in_group(name)
|
|
ldap_con.user_list(name)
|
|
end
|
|
|
|
private
|
|
|
|
def strip_ldap_attributes
|
|
[:attr_login, :attr_firstname, :attr_lastname, :attr_mail].each do |attr|
|
|
write_attribute(attr, read_attribute(attr).strip) unless read_attribute(attr).nil?
|
|
end
|
|
end
|
|
|
|
def set_defaults
|
|
self.port ||= DEFAULT_PORTS[:ldap]
|
|
end
|
|
|
|
def required_ldap_attributes
|
|
return {:dn => :dn} unless onthefly_register?
|
|
{ :firstname => attr_firstname,
|
|
:lastname => attr_lastname,
|
|
:mail => attr_mail,
|
|
:dn => :dn,
|
|
}
|
|
end
|
|
|
|
def optional_ldap_attributes
|
|
{ :avatar => attr_photo }
|
|
end
|
|
|
|
def attributes_values(entry)
|
|
Hash[required_ldap_attributes.merge(optional_ldap_attributes).map do |name, value|
|
|
next if value.blank? || (entry[value].blank? && optional_ldap_attributes.keys.include?(name))
|
|
if name.eql? :avatar
|
|
[:avatar_hash, store_avatar(entry[value].first)]
|
|
else
|
|
value = entry[value].is_a?(Array) ? entry[value].first : entry[value]
|
|
[name, value.to_s]
|
|
end
|
|
end.compact]
|
|
end
|
|
|
|
def store_avatar(avatar)
|
|
avatar_path = "#{Rails.public_path}/assets/avatars"
|
|
avatar_hash = Digest::SHA1.hexdigest(avatar)
|
|
avatar_file = "#{avatar_path}/#{avatar_hash}.jpg"
|
|
unless FileTest.exist? avatar_file
|
|
FileUtils.mkdir_p(avatar_path)
|
|
File.open(avatar_file, 'w') { |f| f.write(avatar) }
|
|
end
|
|
avatar_hash
|
|
end
|
|
|
|
def validate_ldap_filter
|
|
Net::LDAP::Filter.construct(ldap_filter)
|
|
rescue Net::LDAP::LdapError, Net::LDAP::FilterSyntaxInvalidError => e
|
|
message = _("invalid LDAP filter syntax")
|
|
Foreman::Logging.exception(message, e)
|
|
errors.add(:ldap_filter, message)
|
|
end
|
|
|
|
def use_user_login_for_service?
|
|
# returns true if account is defined and includes "$login"
|
|
(account.present? && account.include?("$login"))
|
|
end
|
|
|
|
def service_user(login)
|
|
use_user_login_for_service? ? account.sub("$login", login) : account
|
|
end
|
|
end
|