2021-12-20 22:57:27 +00:00
|
|
|
import ldap.filter
|
2023-04-09 11:34:38 +00:00
|
|
|
from canaille.ldap_backend.ldapobject import LDAPObject
|
2021-12-20 22:57:27 +00:00
|
|
|
from flask import current_app
|
|
|
|
from flask import session
|
|
|
|
|
2020-08-14 11:18:08 +00:00
|
|
|
|
2020-09-24 13:16:25 +00:00
|
|
|
class User(LDAPObject):
|
2021-12-03 17:37:25 +00:00
|
|
|
DEFAULT_OBJECT_CLASS = "inetOrgPerson"
|
|
|
|
DEFAULT_FILTER = "(|(uid={login})(mail={login}))"
|
|
|
|
DEFAULT_ID_ATTRIBUTE = "cn"
|
|
|
|
|
2023-02-05 18:08:25 +00:00
|
|
|
attribute_table = {
|
|
|
|
"id": "dn",
|
2023-02-05 17:57:18 +00:00
|
|
|
"user_name": "uid",
|
|
|
|
"password": "userPassword",
|
|
|
|
"preferred_language": "preferredLanguage",
|
|
|
|
"family_name": "sn",
|
|
|
|
"given_name": "givenName",
|
|
|
|
"formatted_name": "cn",
|
|
|
|
"display_name": "displayName",
|
|
|
|
"email": "mail",
|
|
|
|
"phone_number": "telephoneNumber",
|
|
|
|
"formatted_address": "postalAddress",
|
|
|
|
"street": "street",
|
|
|
|
"postal_code": "postalCode",
|
|
|
|
"locality": "l",
|
|
|
|
"region": "st",
|
|
|
|
"photo": "jpegPhoto",
|
|
|
|
"profile_url": "labeledURI",
|
|
|
|
"employee_number": "employeeNumber",
|
|
|
|
"department": "departmentNumber",
|
|
|
|
"title": "title",
|
|
|
|
"organization": "o",
|
|
|
|
"last_modified": "modifyTimestamp",
|
2023-04-17 16:09:52 +00:00
|
|
|
"groups": "memberOf",
|
2023-02-05 18:08:25 +00:00
|
|
|
}
|
|
|
|
|
2021-12-02 17:23:14 +00:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
self.read = set()
|
|
|
|
self.write = set()
|
|
|
|
self.permissions = set()
|
|
|
|
super().__init__(*args, **kwargs)
|
|
|
|
|
2020-08-19 14:20:57 +00:00
|
|
|
@classmethod
|
2023-04-07 19:24:09 +00:00
|
|
|
def get_from_login(cls, login=None, **kwargs):
|
2023-04-07 18:49:30 +00:00
|
|
|
filter = (
|
|
|
|
(
|
2023-04-10 18:31:54 +00:00
|
|
|
current_app.config["BACKENDS"]["LDAP"]
|
2021-12-03 17:37:25 +00:00
|
|
|
.get("USER_FILTER", User.DEFAULT_FILTER)
|
2021-12-06 14:40:30 +00:00
|
|
|
.format(login=ldap.filter.escape_filter_chars(login))
|
|
|
|
)
|
2023-04-07 18:49:30 +00:00
|
|
|
if login
|
|
|
|
else None
|
|
|
|
)
|
2023-04-07 19:24:09 +00:00
|
|
|
return cls.get(filter=filter, **kwargs)
|
2020-10-21 15:15:33 +00:00
|
|
|
|
2023-04-07 19:24:09 +00:00
|
|
|
@classmethod
|
|
|
|
def get(cls, **kwargs):
|
|
|
|
user = super().get(**kwargs)
|
2021-06-03 13:00:11 +00:00
|
|
|
if user:
|
2023-04-07 18:43:46 +00:00
|
|
|
user.load_permissions()
|
2021-06-03 13:00:11 +00:00
|
|
|
|
2020-08-19 14:20:57 +00:00
|
|
|
return user
|
|
|
|
|
2023-04-14 16:46:42 +00:00
|
|
|
@classmethod
|
|
|
|
def acl_filter_to_ldap_filter(cls, filter_):
|
|
|
|
if isinstance(filter_, dict):
|
2023-04-17 16:09:52 +00:00
|
|
|
base = "".join(
|
|
|
|
f"({cls.attribute_table.get(key, key)}={value})"
|
|
|
|
for key, value in filter_.items()
|
2023-04-14 16:46:42 +00:00
|
|
|
)
|
2023-04-17 16:09:52 +00:00
|
|
|
return f"(&{base})" if len(filter_) > 1 else base
|
2023-04-14 16:46:42 +00:00
|
|
|
|
|
|
|
if isinstance(filter_, list):
|
|
|
|
return (
|
|
|
|
"(|"
|
|
|
|
+ "".join(cls.acl_filter_to_ldap_filter(mapping) for mapping in filter_)
|
|
|
|
+ ")"
|
|
|
|
)
|
|
|
|
|
|
|
|
return filter_
|
|
|
|
|
2020-08-20 08:45:33 +00:00
|
|
|
@classmethod
|
2020-08-21 08:23:39 +00:00
|
|
|
def authenticate(cls, login, password, signin=False):
|
2023-04-07 19:24:09 +00:00
|
|
|
user = User.get_from_login(login)
|
2020-08-20 08:45:33 +00:00
|
|
|
if not user or not user.check_password(password):
|
|
|
|
return None
|
2020-08-19 14:20:57 +00:00
|
|
|
|
2020-08-21 08:23:39 +00:00
|
|
|
if signin:
|
|
|
|
user.login()
|
|
|
|
|
2020-08-20 08:45:33 +00:00
|
|
|
return user
|
2020-08-14 11:18:08 +00:00
|
|
|
|
2020-08-21 08:23:39 +00:00
|
|
|
def login(self):
|
2020-12-11 10:52:37 +00:00
|
|
|
try:
|
2020-12-29 08:31:46 +00:00
|
|
|
previous = (
|
2022-12-29 00:10:07 +00:00
|
|
|
session["user_id"]
|
|
|
|
if isinstance(session["user_id"], list)
|
|
|
|
else [session["user_id"]]
|
2020-12-29 08:31:46 +00:00
|
|
|
)
|
2023-02-05 18:08:25 +00:00
|
|
|
session["user_id"] = previous + [self.id]
|
2020-12-11 10:52:37 +00:00
|
|
|
except KeyError:
|
2023-02-05 18:08:25 +00:00
|
|
|
session["user_id"] = [self.id]
|
2020-08-21 08:23:39 +00:00
|
|
|
|
2020-12-29 08:31:46 +00:00
|
|
|
@classmethod
|
2020-08-21 08:23:39 +00:00
|
|
|
def logout(self):
|
|
|
|
try:
|
2022-12-29 00:10:07 +00:00
|
|
|
session["user_id"].pop()
|
|
|
|
if not session["user_id"]:
|
|
|
|
del session["user_id"]
|
2022-12-10 19:47:47 +00:00
|
|
|
except KeyError:
|
2020-08-21 08:23:39 +00:00
|
|
|
pass
|
|
|
|
|
2020-11-16 14:39:58 +00:00
|
|
|
def has_password(self):
|
2023-02-05 17:57:18 +00:00
|
|
|
return bool(self.password)
|
2020-11-16 14:39:58 +00:00
|
|
|
|
2020-08-14 11:18:08 +00:00
|
|
|
def check_password(self, password):
|
2023-04-10 18:31:54 +00:00
|
|
|
conn = ldap.initialize(current_app.config["BACKENDS"]["LDAP"]["URI"])
|
2021-10-13 14:04:08 +00:00
|
|
|
|
2022-12-27 19:25:59 +00:00
|
|
|
conn.set_option(
|
2023-04-10 18:31:54 +00:00
|
|
|
ldap.OPT_NETWORK_TIMEOUT,
|
|
|
|
current_app.config["BACKENDS"]["LDAP"].get("TIMEOUT"),
|
2022-12-27 19:25:59 +00:00
|
|
|
)
|
2021-10-13 14:04:08 +00:00
|
|
|
|
2020-08-19 11:49:38 +00:00
|
|
|
try:
|
2023-02-05 18:08:25 +00:00
|
|
|
conn.simple_bind_s(self.id, password)
|
2020-08-19 11:49:38 +00:00
|
|
|
return True
|
|
|
|
except ldap.INVALID_CREDENTIALS:
|
|
|
|
return False
|
|
|
|
finally:
|
|
|
|
conn.unbind_s()
|
2020-08-14 11:18:08 +00:00
|
|
|
|
2023-04-07 18:43:46 +00:00
|
|
|
def set_password(self, password):
|
|
|
|
conn = self.ldap_connection()
|
2022-12-13 17:48:40 +00:00
|
|
|
conn.passwd_s(
|
2023-02-05 18:08:25 +00:00
|
|
|
self.id,
|
2022-12-13 17:48:40 +00:00
|
|
|
None,
|
|
|
|
password.encode("utf-8"),
|
|
|
|
)
|
2020-10-21 08:26:31 +00:00
|
|
|
|
2023-04-08 19:34:09 +00:00
|
|
|
def reload(self):
|
|
|
|
super().reload()
|
2023-04-08 22:14:51 +00:00
|
|
|
self.load_permissions()
|
2023-04-08 19:34:09 +00:00
|
|
|
|
2023-04-17 16:09:52 +00:00
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
group_attr = self.attribute_table.get("groups", "groups")
|
|
|
|
new_groups = self.changes.get(group_attr)
|
|
|
|
if not new_groups:
|
|
|
|
return super().save(*args, **kwargs)
|
|
|
|
|
|
|
|
old_groups = self.attrs.get(group_attr) or []
|
|
|
|
new_groups = [
|
|
|
|
v if isinstance(v, Group) else Group.get(id=v) for v in new_groups
|
|
|
|
]
|
|
|
|
to_add = set(new_groups) - set(old_groups)
|
|
|
|
to_del = set(old_groups) - set(new_groups)
|
|
|
|
|
|
|
|
del self.changes[group_attr]
|
|
|
|
super().save(*args, **kwargs)
|
|
|
|
|
2021-06-03 13:00:11 +00:00
|
|
|
for group in to_add:
|
2023-04-07 22:31:22 +00:00
|
|
|
group.members = group.members + [self]
|
2023-03-09 09:50:05 +00:00
|
|
|
group.save()
|
2023-04-17 16:09:52 +00:00
|
|
|
|
2021-06-03 13:00:11 +00:00
|
|
|
for group in to_del:
|
2023-04-07 22:31:22 +00:00
|
|
|
group.members = [member for member in group.members if member != self]
|
2023-03-09 09:50:05 +00:00
|
|
|
group.save()
|
2023-04-17 16:09:52 +00:00
|
|
|
|
|
|
|
self.attrs[group_attr] = new_groups
|
2021-06-03 13:00:11 +00:00
|
|
|
|
2023-04-07 18:43:46 +00:00
|
|
|
def load_permissions(self):
|
|
|
|
conn = self.ldap_connection()
|
2021-12-02 17:23:14 +00:00
|
|
|
|
|
|
|
for access_group_name, details in current_app.config["ACL"].items():
|
2023-04-14 16:46:42 +00:00
|
|
|
filter_ = self.acl_filter_to_ldap_filter(details.get("FILTER"))
|
|
|
|
if not filter_ or (
|
|
|
|
self.id and conn.search_s(self.id, ldap.SCOPE_SUBTREE, filter_)
|
2021-12-02 17:23:14 +00:00
|
|
|
):
|
|
|
|
self.permissions |= set(details.get("PERMISSIONS", []))
|
|
|
|
self.read |= set(details.get("READ", []))
|
|
|
|
self.write |= set(details.get("WRITE", []))
|
|
|
|
|
2021-12-08 17:06:50 +00:00
|
|
|
def can_read(self, field):
|
|
|
|
return field in self.read | self.write
|
|
|
|
|
2022-04-05 15:16:09 +00:00
|
|
|
@property
|
|
|
|
def can_edit_self(self):
|
|
|
|
return "edit_self" in self.permissions
|
|
|
|
|
2021-12-06 23:07:32 +00:00
|
|
|
@property
|
|
|
|
def can_use_oidc(self):
|
|
|
|
return "use_oidc" in self.permissions
|
|
|
|
|
2021-12-02 17:23:14 +00:00
|
|
|
@property
|
|
|
|
def can_manage_users(self):
|
|
|
|
return "manage_users" in self.permissions
|
|
|
|
|
|
|
|
@property
|
|
|
|
def can_manage_groups(self):
|
|
|
|
return "manage_groups" in self.permissions
|
|
|
|
|
|
|
|
@property
|
|
|
|
def can_manage_oidc(self):
|
|
|
|
return "manage_oidc" in self.permissions
|
|
|
|
|
|
|
|
@property
|
|
|
|
def can_delete_account(self):
|
|
|
|
return "delete_account" in self.permissions
|
|
|
|
|
|
|
|
@property
|
|
|
|
def can_impersonate_users(self):
|
|
|
|
return "impersonate_users" in self.permissions
|
|
|
|
|
2021-06-03 13:00:11 +00:00
|
|
|
|
|
|
|
class Group(LDAPObject):
|
2021-12-03 17:37:25 +00:00
|
|
|
DEFAULT_OBJECT_CLASS = "groupOfNames"
|
|
|
|
DEFAULT_ID_ATTRIBUTE = "cn"
|
|
|
|
DEFAULT_NAME_ATTRIBUTE = "cn"
|
2023-02-05 18:08:25 +00:00
|
|
|
|
|
|
|
attribute_table = {
|
|
|
|
"id": "dn",
|
2023-02-05 18:39:52 +00:00
|
|
|
"display_name": "cn",
|
|
|
|
"members": "member",
|
|
|
|
"description": "description",
|
2023-02-05 18:08:25 +00:00
|
|
|
}
|
2021-12-03 17:37:25 +00:00
|
|
|
|
2021-07-01 16:21:20 +00:00
|
|
|
@property
|
2023-02-05 18:39:52 +00:00
|
|
|
def display_name(self):
|
2023-04-10 18:31:54 +00:00
|
|
|
attribute = current_app.config["BACKENDS"]["LDAP"].get(
|
2021-12-03 17:37:25 +00:00
|
|
|
"GROUP_NAME_ATTRIBUTE", Group.DEFAULT_NAME_ATTRIBUTE
|
|
|
|
)
|
2021-07-01 16:21:20 +00:00
|
|
|
return self[attribute][0]
|