Files @ b232a36cc51f
Branch filter:

Location: kallithea/rhodecode/lib/auth_ldap.py - annotation

Thayne Harbaugh
Improve LDAP authentication

* Adds an LDAP filter for locating the LDAP object
* Adds a search scope policy when using the Base DN
* Adds option required certificate policy when using LDAPS
* Adds attribute mapping for username, firstname, lastname, email
* Initializes rhodecode user using LDAP info (no longer uses "@ldap")
* Remembers the user object (DN) in the user table
* Updates admin interfaces
* Authenticates against actual user objects in LDAP
* Possibly other things.

Really, this should be extended to a list of LDAP configurations, but this is a good start.
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
07a6e8c65526
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
1bb0fcdec895
07fd56c36bfe
1bb0fcdec895
1bb0fcdec895
9e9f1b919c0c
1bb0fcdec895
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
b232a36cc51f
9e9f1b919c0c
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
07fd56c36bfe
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
6602bf1c5546
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
aaf2fc59a39a
9e9f1b919c0c
1bb0fcdec895
9e9f1b919c0c
554ed64953ff
b232a36cc51f
b232a36cc51f
b232a36cc51f
9e9f1b919c0c
b232a36cc51f
b232a36cc51f
b232a36cc51f
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
9e9f1b919c0c
07fd56c36bfe
9e9f1b919c0c
22eca93bea97
07fd56c36bfe
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
aaf2fc59a39a
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
b232a36cc51f
9e9f1b919c0c
9e9f1b919c0c
1bb0fcdec895
9e9f1b919c0c
1bb0fcdec895
9e9f1b919c0c
b232a36cc51f
#!/usr/bin/env python
# encoding: utf-8
# ldap authentication lib
# Copyright (C) 2009-2011 Marcin Kuzminski <marcin@python-works.com>
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; version 2
# of the License or (at your opinion) any later version of the license.
# 
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
# 
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
# MA  02110-1301, USA.
"""
Created on Nov 17, 2010

@author: marcink
"""

from rhodecode.lib.exceptions import *
import logging

log = logging.getLogger(__name__)

try:
    import ldap
except ImportError:
    pass

class AuthLdap(object):

    def __init__(self, server, base_dn, port=389, bind_dn='', bind_pass='',
                 use_ldaps=False, tls_reqcert='DEMAND', ldap_version=3,
                 ldap_filter='(&(objectClass=user)(!(objectClass=computer)))',
                 search_scope='SUBTREE',
                 attr_login='uid'):
        self.ldap_version = ldap_version
        if use_ldaps:
            port = port or 689
        self.LDAP_USE_LDAPS = use_ldaps
        self.TLS_REQCERT = ldap.__dict__['OPT_X_TLS_' + tls_reqcert]
        self.LDAP_SERVER_ADDRESS = server
        self.LDAP_SERVER_PORT = port

        #USE FOR READ ONLY BIND TO LDAP SERVER
        self.LDAP_BIND_DN = bind_dn
        self.LDAP_BIND_PASS = bind_pass

        ldap_server_type = 'ldap'
        if self.LDAP_USE_LDAPS:ldap_server_type = ldap_server_type + 's'
        self.LDAP_SERVER = "%s://%s:%s" % (ldap_server_type,
                                               self.LDAP_SERVER_ADDRESS,
                                               self.LDAP_SERVER_PORT)

        self.BASE_DN = base_dn
        self.LDAP_FILTER = ldap_filter
        self.SEARCH_SCOPE = ldap.__dict__['SCOPE_' + search_scope]
        self.attr_login = attr_login


    def authenticate_ldap(self, username, password):
        """Authenticate a user via LDAP and return his/her LDAP properties.
    
        Raises AuthenticationError if the credentials are rejected, or
        EnvironmentError if the LDAP server can't be reached.
        
        :param username: username
        :param password: password
        """

        from rhodecode.lib.helpers import chop_at

        uid = chop_at(username, "@%s" % self.LDAP_SERVER_ADDRESS)

        if "," in username:
            raise LdapUsernameError("invalid character in username: ,")
        try:
            ldap.set_option(ldap.OPT_X_TLS_CACERTDIR, '/etc/openldap/cacerts')
            ldap.set_option(ldap.OPT_REFERRALS, ldap.OPT_OFF)
            ldap.set_option(ldap.OPT_RESTART, ldap.OPT_ON)
            ldap.set_option(ldap.OPT_TIMEOUT, 20)
            ldap.set_option(ldap.OPT_NETWORK_TIMEOUT, 10)
            ldap.set_option(ldap.OPT_TIMELIMIT, 15)
            if self.LDAP_USE_LDAPS:
                ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, self.TLS_REQCERT)
            server = ldap.initialize(self.LDAP_SERVER)
            if self.ldap_version == 2:
                server.protocol = ldap.VERSION2
            else:
                server.protocol = ldap.VERSION3

            if self.LDAP_BIND_DN and self.LDAP_BIND_PASS:
                server.simple_bind_s(self.LDAP_BIND_DN, self.LDAP_BIND_PASS)

            filt = '(&%s(%s=%s))' % (self.LDAP_FILTER, self.attr_login, username)
            log.debug("Authenticating %r filt %s at %s", self.BASE_DN, filt, self.LDAP_SERVER)
            lobjects = server.search_ext_s(self.BASE_DN, self.SEARCH_SCOPE, filt)

            if not lobjects:
                raise ldap.NO_SUCH_OBJECT()

            for (dn, attrs) in lobjects:
                try:
                    server.simple_bind_s(dn, password)
                    break

                except ldap.INVALID_CREDENTIALS, e:
                    log.debug("LDAP rejected password for user '%s' (%s): %s", uid, username, dn)

                else:
                    log.debug("No matching LDAP objecs for authentication of '%s' (%s)", uid, username)
                    raise LdapPasswordError()

        except ldap.NO_SUCH_OBJECT, e:
            log.debug("LDAP says no such user '%s' (%s)", uid, username)
            raise LdapUsernameError()
        except ldap.SERVER_DOWN, e:
            raise LdapConnectionError("LDAP can't access authentication server")

        return (dn, attrs)