canaille-globuzma/canaille/models.py
2023-03-10 18:14:15 +01:00

209 lines
5.7 KiB
Python

import ldap.filter
from flask import current_app
from flask import session
from .ldap_backend.ldapobject import LDAPObject
class User(LDAPObject):
DEFAULT_OBJECT_CLASS = "inetOrgPerson"
DEFAULT_FILTER = "(|(uid={login})(mail={login}))"
DEFAULT_ID_ATTRIBUTE = "cn"
attribute_table = {
"id": "dn",
}
def __init__(self, *args, **kwargs):
self.read = set()
self.write = set()
self.permissions = set()
self._groups = None
kwargs.setdefault(
"objectClass",
current_app.config["LDAP"].get("USER_CLASS", User.DEFAULT_OBJECT_CLASS),
)
super().__init__(*args, **kwargs)
@classmethod
def get(cls, login=None, id=None, filter=None, conn=None):
conn = conn or cls.ldap_connection()
if login:
filter = (
current_app.config["LDAP"]
.get("USER_FILTER", User.DEFAULT_FILTER)
.format(login=ldap.filter.escape_filter_chars(login))
)
user = super().get(id, filter, conn)
if user:
user.load_permissions(conn)
return user
def load_groups(self, conn=None):
group_filter = (
current_app.config["LDAP"]
.get("GROUP_USER_FILTER", Group.DEFAULT_USER_FILTER)
.format(user=self)
)
escaped_group_filter = ldap.filter.escape_filter_chars(group_filter)
self._groups = Group.query(filter=escaped_group_filter, conn=conn)
@classmethod
def authenticate(cls, login, password, signin=False):
user = User.get(login)
if not user or not user.check_password(password):
return None
if signin:
user.login()
return user
def login(self):
try:
previous = (
session["user_id"]
if isinstance(session["user_id"], list)
else [session["user_id"]]
)
session["user_id"] = previous + [self.id]
except KeyError:
session["user_id"] = [self.id]
@classmethod
def logout(self):
try:
session["user_id"].pop()
if not session["user_id"]:
del session["user_id"]
except KeyError:
pass
def has_password(self):
return bool(self.userPassword)
def check_password(self, password):
conn = ldap.initialize(current_app.config["LDAP"]["URI"])
conn.set_option(
ldap.OPT_NETWORK_TIMEOUT, current_app.config["LDAP"].get("TIMEOUT")
)
try:
conn.simple_bind_s(self.id, password)
return True
except ldap.INVALID_CREDENTIALS:
return False
finally:
conn.unbind_s()
def set_password(self, password, conn=None):
conn = conn or self.ldap_connection()
conn.passwd_s(
self.id,
None,
password.encode("utf-8"),
)
@property
def name(self):
return self.cn[0]
@property
def groups(self):
if self._groups is None:
self.load_groups()
return self._groups
def set_groups(self, values):
before = self._groups
after = [v if isinstance(v, Group) else Group.get(id=v) for v in values]
to_add = set(after) - set(before)
to_del = set(before) - set(after)
for group in to_add:
group.add_member(self)
group.save()
for group in to_del:
group.remove_member(self)
group.save()
self._groups = after
def load_permissions(self, conn=None):
conn = conn or self.ldap_connection()
for access_group_name, details in current_app.config["ACL"].items():
if not details.get("FILTER") or (
self.id
and conn.search_s(self.id, ldap.SCOPE_SUBTREE, details["FILTER"])
):
self.permissions |= set(details.get("PERMISSIONS", []))
self.read |= set(details.get("READ", []))
self.write |= set(details.get("WRITE", []))
def can_read(self, field):
return field in self.read | self.write
@property
def can_edit_self(self):
return "edit_self" in self.permissions
@property
def can_use_oidc(self):
return "use_oidc" in self.permissions
@property
def can_manage_users(self):
return "manage_users" in self.permissions
@property
def can_manage_groups(self):
return "manage_groups" in self.permissions
@property
def can_manage_oidc(self):
return "manage_oidc" in self.permissions
@property
def can_delete_account(self):
return "delete_account" in self.permissions
@property
def can_impersonate_users(self):
return "impersonate_users" in self.permissions
class Group(LDAPObject):
DEFAULT_OBJECT_CLASS = "groupOfNames"
DEFAULT_ID_ATTRIBUTE = "cn"
DEFAULT_NAME_ATTRIBUTE = "cn"
DEFAULT_USER_FILTER = "member={user.id}"
attribute_table = {
"id": "dn",
}
def __init__(self, *args, **kwargs):
kwargs.setdefault(
"objectClass",
current_app.config["LDAP"].get("GROUP_CLASS", Group.DEFAULT_OBJECT_CLASS),
)
super().__init__(*args, **kwargs)
@property
def name(self):
attribute = current_app.config["LDAP"].get(
"GROUP_NAME_ATTRIBUTE", Group.DEFAULT_NAME_ATTRIBUTE
)
return self[attribute][0]
def get_members(self, conn=None):
return [member for member in self.member if member]
def add_member(self, user):
self.member = self.member + [user]
def remove_member(self, user):
self.member = [m for m in self.member if m != user]