canaille-globuzma/canaille/core/models.py

233 lines
6.5 KiB
Python
Raw Normal View History

2021-12-20 22:57:27 +00:00
import ldap.filter
from canaille.backends.ldap.ldapobject import LDAPObject
2021-12-20 22:57:27 +00:00
from flask import current_app
from flask import session
2020-08-14 11:18:08 +00:00
class User(LDAPObject):
2021-12-03 17:37:25 +00:00
DEFAULT_OBJECT_CLASS = "inetOrgPerson"
DEFAULT_FILTER = "(|(uid={login})(mail={login}))"
DEFAULT_ID_ATTRIBUTE = "cn"
2023-02-05 18:08:25 +00:00
attribute_table = {
"id": "dn",
"user_name": "uid",
"password": "userPassword",
"preferred_language": "preferredLanguage",
"family_name": "sn",
"given_name": "givenName",
"formatted_name": "cn",
"display_name": "displayName",
"email": "mail",
"phone_number": "telephoneNumber",
"formatted_address": "postalAddress",
"street": "street",
"postal_code": "postalCode",
"locality": "l",
"region": "st",
"photo": "jpegPhoto",
"profile_url": "labeledURI",
"employee_number": "employeeNumber",
"department": "departmentNumber",
"title": "title",
"organization": "o",
"last_modified": "modifyTimestamp",
"groups": "memberOf",
2023-02-05 18:08:25 +00:00
}
2021-12-02 17:23:14 +00:00
def __init__(self, *args, **kwargs):
self.read = set()
self.write = set()
self.permissions = set()
super().__init__(*args, **kwargs)
2020-08-19 14:20:57 +00:00
@classmethod
2023-04-07 19:24:09 +00:00
def get_from_login(cls, login=None, **kwargs):
filter = (
(
current_app.config["BACKENDS"]["LDAP"]
2021-12-03 17:37:25 +00:00
.get("USER_FILTER", User.DEFAULT_FILTER)
2021-12-06 14:40:30 +00:00
.format(login=ldap.filter.escape_filter_chars(login))
)
if login
else None
)
2023-04-07 19:24:09 +00:00
return cls.get(filter=filter, **kwargs)
2020-10-21 15:15:33 +00:00
2023-04-07 19:24:09 +00:00
@classmethod
def get(cls, **kwargs):
user = super().get(**kwargs)
2021-06-03 13:00:11 +00:00
if user:
user.load_permissions()
2021-06-03 13:00:11 +00:00
2020-08-19 14:20:57 +00:00
return user
@classmethod
def acl_filter_to_ldap_filter(cls, filter_):
if isinstance(filter_, dict):
base = "".join(
f"({cls.attribute_table.get(key, key)}={value})"
for key, value in filter_.items()
)
return f"(&{base})" if len(filter_) > 1 else base
if isinstance(filter_, list):
return (
"(|"
+ "".join(cls.acl_filter_to_ldap_filter(mapping) for mapping in filter_)
+ ")"
)
return filter_
2020-08-20 08:45:33 +00:00
@classmethod
2020-08-21 08:23:39 +00:00
def authenticate(cls, login, password, signin=False):
2023-04-07 19:24:09 +00:00
user = User.get_from_login(login)
2020-08-20 08:45:33 +00:00
if not user or not user.check_password(password):
return None
2020-08-19 14:20:57 +00:00
2020-08-21 08:23:39 +00:00
if signin:
user.login()
2020-08-20 08:45:33 +00:00
return user
2020-08-14 11:18:08 +00:00
2020-08-21 08:23:39 +00:00
def login(self):
try:
2020-12-29 08:31:46 +00:00
previous = (
session["user_id"]
if isinstance(session["user_id"], list)
else [session["user_id"]]
2020-12-29 08:31:46 +00:00
)
2023-02-05 18:08:25 +00:00
session["user_id"] = previous + [self.id]
except KeyError:
2023-02-05 18:08:25 +00:00
session["user_id"] = [self.id]
2020-08-21 08:23:39 +00:00
2020-12-29 08:31:46 +00:00
@classmethod
2020-08-21 08:23:39 +00:00
def logout(self):
try:
session["user_id"].pop()
if not session["user_id"]:
del session["user_id"]
except (IndexError, KeyError):
2020-08-21 08:23:39 +00:00
pass
def has_password(self):
return bool(self.password)
2020-08-14 11:18:08 +00:00
def check_password(self, password):
conn = ldap.initialize(current_app.config["BACKENDS"]["LDAP"]["URI"])
conn.set_option(
ldap.OPT_NETWORK_TIMEOUT,
current_app.config["BACKENDS"]["LDAP"].get("TIMEOUT"),
)
try:
2023-02-05 18:08:25 +00:00
conn.simple_bind_s(self.id, password)
return True
except ldap.INVALID_CREDENTIALS:
return False
finally:
conn.unbind_s()
2020-08-14 11:18:08 +00:00
def set_password(self, password):
conn = self.ldap_connection()
2022-12-13 17:48:40 +00:00
conn.passwd_s(
2023-02-05 18:08:25 +00:00
self.id,
2022-12-13 17:48:40 +00:00
None,
password.encode("utf-8"),
)
2020-10-21 08:26:31 +00:00
def reload(self):
super().reload()
self.load_permissions()
def save(self, *args, **kwargs):
group_attr = self.attribute_table.get("groups", "groups")
new_groups = self.changes.get(group_attr)
if not new_groups:
return super().save(*args, **kwargs)
old_groups = self.attrs.get(group_attr) or []
new_groups = [
v if isinstance(v, Group) else Group.get(id=v) for v in new_groups
]
to_add = set(new_groups) - set(old_groups)
to_del = set(old_groups) - set(new_groups)
del self.changes[group_attr]
super().save(*args, **kwargs)
2021-06-03 13:00:11 +00:00
for group in to_add:
2023-04-07 22:31:22 +00:00
group.members = group.members + [self]
group.save()
2021-06-03 13:00:11 +00:00
for group in to_del:
2023-04-07 22:31:22 +00:00
group.members = [member for member in group.members if member != self]
group.save()
self.attrs[group_attr] = new_groups
2021-06-03 13:00:11 +00:00
def load_permissions(self):
conn = self.ldap_connection()
2021-12-02 17:23:14 +00:00
for access_group_name, details in current_app.config["ACL"].items():
filter_ = self.acl_filter_to_ldap_filter(details.get("FILTER"))
if not filter_ or (
self.id and conn.search_s(self.id, ldap.SCOPE_SUBTREE, filter_)
2021-12-02 17:23:14 +00:00
):
self.permissions |= set(details.get("PERMISSIONS", []))
self.read |= set(details.get("READ", []))
self.write |= set(details.get("WRITE", []))
2021-12-08 17:06:50 +00:00
def can_read(self, field):
return field in self.read | self.write
@property
def can_edit_self(self):
return "edit_self" in self.permissions
2021-12-06 23:07:32 +00:00
@property
def can_use_oidc(self):
return "use_oidc" in self.permissions
2021-12-02 17:23:14 +00:00
@property
def can_manage_users(self):
return "manage_users" in self.permissions
@property
def can_manage_groups(self):
return "manage_groups" in self.permissions
@property
def can_manage_oidc(self):
return "manage_oidc" in self.permissions
@property
def can_delete_account(self):
return "delete_account" in self.permissions
@property
def can_impersonate_users(self):
return "impersonate_users" in self.permissions
2021-06-03 13:00:11 +00:00
class Group(LDAPObject):
2021-12-03 17:37:25 +00:00
DEFAULT_OBJECT_CLASS = "groupOfNames"
DEFAULT_ID_ATTRIBUTE = "cn"
DEFAULT_NAME_ATTRIBUTE = "cn"
2023-02-05 18:08:25 +00:00
attribute_table = {
"id": "dn",
"display_name": "cn",
"members": "member",
"description": "description",
2023-02-05 18:08:25 +00:00
}
2021-12-03 17:37:25 +00:00
2021-07-01 16:21:20 +00:00
@property
def display_name(self):
attribute = current_app.config["BACKENDS"]["LDAP"].get(
2021-12-03 17:37:25 +00:00
"GROUP_NAME_ATTRIBUTE", Group.DEFAULT_NAME_ATTRIBUTE
)
2021-07-01 16:21:20 +00:00
return self[attribute][0]