mirror of https://github.com/jumpserver/jumpserver
[Update] 重构 LDAP/AD 同步功能,添加缓存机制
parent
cf65e9bfe3
commit
596e5a6dd1
|
@ -47,7 +47,7 @@ def on_openid_login_success(sender, user=None, request=None, **kwargs):
|
||||||
|
|
||||||
@receiver(populate_user)
|
@receiver(populate_user)
|
||||||
def on_ldap_create_user(sender, user, ldap_user, **kwargs):
|
def on_ldap_create_user(sender, user, ldap_user, **kwargs):
|
||||||
if user and user.username != 'admin':
|
if user and user.username not in ['admin']:
|
||||||
user.source = user.SOURCE_LDAP
|
user.source = user.SOURCE_LDAP
|
||||||
user.save()
|
user.save()
|
||||||
|
|
||||||
|
|
|
@ -13,10 +13,16 @@ from django.core.mail import send_mail
|
||||||
from django.utils.translation import ugettext_lazy as _
|
from django.utils.translation import ugettext_lazy as _
|
||||||
|
|
||||||
from .models import Setting
|
from .models import Setting
|
||||||
from .utils import LDAPUtil
|
from .utils import (
|
||||||
|
LDAPServerUtil, LDAPCacheUtil, LDAPImportUtil, LDAPSyncUtil,
|
||||||
|
LDAP_USE_CACHE_FLAGS
|
||||||
|
|
||||||
|
)
|
||||||
|
from .tasks import sync_ldap_user_task
|
||||||
from common.permissions import IsOrgAdmin, IsSuperUser
|
from common.permissions import IsOrgAdmin, IsSuperUser
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
from .serializers import MailTestSerializer, LDAPTestSerializer, LDAPUserSerializer
|
from .serializers import MailTestSerializer, LDAPTestSerializer, LDAPUserSerializer
|
||||||
|
from users.models import User
|
||||||
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
|
@ -67,65 +73,107 @@ class LDAPTestingAPI(APIView):
|
||||||
success_message = _("Test ldap success")
|
success_message = _("Test ldap success")
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_ldap_util(serializer):
|
def get_ldap_config(serializer):
|
||||||
host = serializer.validated_data["AUTH_LDAP_SERVER_URI"]
|
server_uri = serializer.validated_data["AUTH_LDAP_SERVER_URI"]
|
||||||
bind_dn = serializer.validated_data["AUTH_LDAP_BIND_DN"]
|
bind_dn = serializer.validated_data["AUTH_LDAP_BIND_DN"]
|
||||||
password = serializer.validated_data["AUTH_LDAP_BIND_PASSWORD"]
|
password = serializer.validated_data["AUTH_LDAP_BIND_PASSWORD"]
|
||||||
use_ssl = serializer.validated_data.get("AUTH_LDAP_START_TLS", False)
|
use_ssl = serializer.validated_data.get("AUTH_LDAP_START_TLS", False)
|
||||||
search_ougroup = serializer.validated_data["AUTH_LDAP_SEARCH_OU"]
|
search_ougroup = serializer.validated_data["AUTH_LDAP_SEARCH_OU"]
|
||||||
search_filter = serializer.validated_data["AUTH_LDAP_SEARCH_FILTER"]
|
search_filter = serializer.validated_data["AUTH_LDAP_SEARCH_FILTER"]
|
||||||
attr_map = serializer.validated_data["AUTH_LDAP_USER_ATTR_MAP"]
|
attr_map = serializer.validated_data["AUTH_LDAP_USER_ATTR_MAP"]
|
||||||
try:
|
config = {
|
||||||
attr_map = json.loads(attr_map)
|
'server_uri': server_uri,
|
||||||
except json.JSONDecodeError:
|
'bind_dn': bind_dn,
|
||||||
return Response({"error": "AUTH_LDAP_USER_ATTR_MAP not valid"}, status=401)
|
'password': password,
|
||||||
|
'use_ssl': use_ssl,
|
||||||
util = LDAPUtil(
|
'search_ougroup': search_ougroup,
|
||||||
use_settings_config=False, server_uri=host, bind_dn=bind_dn,
|
'search_filter': search_filter,
|
||||||
password=password, use_ssl=use_ssl,
|
'attr_map': json.loads(attr_map),
|
||||||
search_ougroup=search_ougroup, search_filter=search_filter,
|
}
|
||||||
attr_map=attr_map
|
return config
|
||||||
)
|
|
||||||
return util
|
|
||||||
|
|
||||||
def post(self, request):
|
def post(self, request):
|
||||||
serializer = self.serializer_class(data=request.data)
|
serializer = self.serializer_class(data=request.data)
|
||||||
if not serializer.is_valid():
|
if not serializer.is_valid():
|
||||||
return Response({"error": str(serializer.errors)}, status=401)
|
return Response({"error": str(serializer.errors)}, status=401)
|
||||||
|
|
||||||
util = self.get_ldap_util(serializer)
|
attr_map = serializer.validated_data["AUTH_LDAP_USER_ATTR_MAP"]
|
||||||
|
|
||||||
try:
|
try:
|
||||||
users = util.search_user_items()
|
json.loads(attr_map)
|
||||||
|
except json.JSONDecodeError:
|
||||||
|
return Response({"error": "AUTH_LDAP_USER_ATTR_MAP not valid"}, status=401)
|
||||||
|
|
||||||
|
config = self.get_ldap_config(serializer)
|
||||||
|
util = LDAPServerUtil(config=config)
|
||||||
|
try:
|
||||||
|
users = util.search()
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
return Response({"error": str(e)}, status=401)
|
return Response({"error": str(e)}, status=401)
|
||||||
|
|
||||||
if len(users) > 0:
|
return Response({"msg": _("Match {} s users").format(len(users))})
|
||||||
return Response({"msg": _("Match {} s users").format(len(users))})
|
|
||||||
else:
|
|
||||||
return Response({"error": "Have user but attr mapping error"}, status=401)
|
|
||||||
|
|
||||||
|
|
||||||
class LDAPUserListApi(generics.ListAPIView):
|
class LDAPUserListApi(generics.ListAPIView):
|
||||||
permission_classes = (IsOrgAdmin,)
|
permission_classes = (IsOrgAdmin,)
|
||||||
serializer_class = LDAPUserSerializer
|
serializer_class = LDAPUserSerializer
|
||||||
|
|
||||||
|
def get_queryset_from_cache(self):
|
||||||
|
search_value = self.request.query_params.get('search')
|
||||||
|
users = LDAPCacheUtil().search(search_value=search_value)
|
||||||
|
return users
|
||||||
|
|
||||||
|
def get_queryset_from_server(self):
|
||||||
|
search_value = self.request.query_params.get('search')
|
||||||
|
users = LDAPServerUtil().search(search_value=search_value)
|
||||||
|
return users
|
||||||
|
|
||||||
def get_queryset(self):
|
def get_queryset(self):
|
||||||
if hasattr(self, 'swagger_fake_view'):
|
if hasattr(self, 'swagger_fake_view'):
|
||||||
return []
|
return []
|
||||||
q = self.request.query_params.get('search')
|
cache_police = self.request.query_params.get('cache_police', True)
|
||||||
try:
|
if cache_police in LDAP_USE_CACHE_FLAGS:
|
||||||
util = LDAPUtil()
|
users = self.get_queryset_from_cache()
|
||||||
extra_filter = util.construct_extra_filter(util.SEARCH_FIELD_ALL, q)
|
else:
|
||||||
users = util.search_user_items(extra_filter)
|
users = self.get_queryset_from_server()
|
||||||
except Exception as e:
|
|
||||||
users = []
|
|
||||||
logger.error(e)
|
|
||||||
# 前端data_table会根据row.id对table.selected值进行操作
|
|
||||||
for user in users:
|
|
||||||
user['id'] = user['username']
|
|
||||||
return users
|
return users
|
||||||
|
|
||||||
|
def list(self, request, *args, **kwargs):
|
||||||
|
cache_police = self.request.query_params.get('cache_police', True)
|
||||||
|
# 不是用缓存
|
||||||
|
if cache_police not in LDAP_USE_CACHE_FLAGS:
|
||||||
|
return super().list(request, *args, **kwargs)
|
||||||
|
|
||||||
|
queryset = self.get_queryset()
|
||||||
|
# 缓存有数据
|
||||||
|
if queryset is not None:
|
||||||
|
return super().list(request, *args, **kwargs)
|
||||||
|
|
||||||
|
sync_util = LDAPSyncUtil()
|
||||||
|
# 还没有同步任务
|
||||||
|
if sync_util.task_no_start:
|
||||||
|
task = sync_ldap_user_task.delay()
|
||||||
|
data = {'msg': 'Cache no data, sync task {} started.'.format(task.id)}
|
||||||
|
return Response(data=data, status=409)
|
||||||
|
# 同步任务正在执行
|
||||||
|
if sync_util.task_is_running:
|
||||||
|
data = {'msg': 'synchronization is running.'}
|
||||||
|
return Response(data=data, status=409)
|
||||||
|
# 同步任务执行结束
|
||||||
|
if sync_util.task_is_over:
|
||||||
|
msg = sync_util.get_task_error_msg()
|
||||||
|
data = {'msg': 'Synchronization task report error: {}'.format(msg)}
|
||||||
|
return Response(data=data, status=400)
|
||||||
|
|
||||||
|
return super().list(request, *args, **kwargs)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def processing_queryset(queryset):
|
||||||
|
db_username_list = User.objects.all().values_list('username', flat=True)
|
||||||
|
for q in queryset:
|
||||||
|
q['id'] = q['username']
|
||||||
|
q['existing'] = q['username'] in db_username_list
|
||||||
|
return queryset
|
||||||
|
|
||||||
def sort_queryset(self, queryset):
|
def sort_queryset(self, queryset):
|
||||||
order_by = self.request.query_params.get('order')
|
order_by = self.request.query_params.get('order')
|
||||||
if not order_by:
|
if not order_by:
|
||||||
|
@ -138,32 +186,41 @@ class LDAPUserListApi(generics.ListAPIView):
|
||||||
queryset = sorted(queryset, key=lambda x: x[order_by], reverse=reverse)
|
queryset = sorted(queryset, key=lambda x: x[order_by], reverse=reverse)
|
||||||
return queryset
|
return queryset
|
||||||
|
|
||||||
def list(self, request, *args, **kwargs):
|
def filter_queryset(self, queryset):
|
||||||
queryset = self.get_queryset()
|
queryset = self.processing_queryset(queryset)
|
||||||
queryset = self.sort_queryset(queryset)
|
queryset = self.sort_queryset(queryset)
|
||||||
page = self.paginate_queryset(queryset)
|
return queryset
|
||||||
if page is not None:
|
|
||||||
return self.get_paginated_response(page)
|
|
||||||
return Response(queryset)
|
|
||||||
|
|
||||||
|
|
||||||
class LDAPUserSyncAPI(APIView):
|
class LDAPUserImportAPI(APIView):
|
||||||
permission_classes = (IsOrgAdmin,)
|
permission_classes = (IsOrgAdmin,)
|
||||||
|
|
||||||
def post(self, request):
|
def get_ldap_users(self):
|
||||||
username_list = request.data.get('username_list', [])
|
username_list = self.request.data.get('username_list', [])
|
||||||
|
cache_police = self.request.query_params.get('cache_police', True)
|
||||||
util = LDAPUtil()
|
if cache_police in LDAP_USE_CACHE_FLAGS:
|
||||||
try:
|
users = LDAPCacheUtil().search(search_users=username_list)
|
||||||
result = util.sync_users(username_list)
|
|
||||||
except Exception as e:
|
|
||||||
logger.error(e, exc_info=True)
|
|
||||||
return Response({'error': str(e)}, status=401)
|
|
||||||
else:
|
else:
|
||||||
msg = _("succeed: {} failed: {} total: {}").format(
|
users = LDAPServerUtil().search(search_users=username_list)
|
||||||
result['succeed'], result['failed'], result['total']
|
return users
|
||||||
)
|
|
||||||
return Response({'msg': msg})
|
def post(self, request):
|
||||||
|
users = self.get_ldap_users()
|
||||||
|
errors = LDAPImportUtil().perform_import(users)
|
||||||
|
if errors:
|
||||||
|
return Response({'Error': errors}, status=401)
|
||||||
|
return Response({'msg': 'Imported {} users successfully'.format(len(users))})
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPCacheRefreshAPI(generics.RetrieveAPIView):
|
||||||
|
|
||||||
|
def retrieve(self, request, *args, **kwargs):
|
||||||
|
try:
|
||||||
|
LDAPSyncUtil().clear_cache()
|
||||||
|
except Exception as e:
|
||||||
|
logger.error(str(e))
|
||||||
|
return Response(data={'msg': str(e)}, status=400)
|
||||||
|
return Response(data={'msg': 'success'})
|
||||||
|
|
||||||
|
|
||||||
class ReplayStorageCreateAPI(APIView):
|
class ReplayStorageCreateAPI(APIView):
|
||||||
|
|
|
@ -25,6 +25,7 @@ class LDAPTestSerializer(serializers.Serializer):
|
||||||
class LDAPUserSerializer(serializers.Serializer):
|
class LDAPUserSerializer(serializers.Serializer):
|
||||||
id = serializers.CharField()
|
id = serializers.CharField()
|
||||||
username = serializers.CharField()
|
username = serializers.CharField()
|
||||||
|
name = serializers.CharField()
|
||||||
email = serializers.CharField()
|
email = serializers.CharField()
|
||||||
existing = serializers.BooleanField(read_only=True)
|
existing = serializers.BooleanField(read_only=True)
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
# coding: utf-8
|
||||||
|
#
|
||||||
|
|
||||||
|
from .ldap import *
|
|
@ -0,0 +1,17 @@
|
||||||
|
# coding: utf-8
|
||||||
|
#
|
||||||
|
|
||||||
|
from celery import shared_task
|
||||||
|
|
||||||
|
from common.utils import get_logger
|
||||||
|
from ..utils import LDAPSyncUtil
|
||||||
|
|
||||||
|
__all__ = ['sync_ldap_user_task']
|
||||||
|
|
||||||
|
|
||||||
|
logger = get_logger(__file__)
|
||||||
|
|
||||||
|
|
||||||
|
@shared_task
|
||||||
|
def sync_ldap_user_task():
|
||||||
|
LDAPSyncUtil().perform_sync()
|
|
@ -23,6 +23,7 @@
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-12 animated fadeInRight" id="split-right">
|
<div class="col-lg-12 animated fadeInRight" id="split-right">
|
||||||
<div class="mail-box-header">
|
<div class="mail-box-header">
|
||||||
|
<div class="uc pull-left m-r-5"><a id="id_refresh_cache" class="btn btn-sm btn-primary"> {% trans "Refresh cache" %} </a></div>
|
||||||
<table class="table table-striped table-bordered table-hover " id="ldap_list_users_table" style="width: 100%">
|
<table class="table table-striped table-bordered table-hover " id="ldap_list_users_table" style="width: 100%">
|
||||||
<thead>
|
<thead>
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -43,8 +44,11 @@
|
||||||
|
|
||||||
<script>
|
<script>
|
||||||
var ldap_users_table = 0;
|
var ldap_users_table = 0;
|
||||||
|
var interval;
|
||||||
|
|
||||||
function initLdapUsersTable() {
|
function initLdapUsersTable() {
|
||||||
if(ldap_users_table){
|
if(ldap_users_table){
|
||||||
|
ldap_users_table.ajax.reload();
|
||||||
return ldap_users_table
|
return ldap_users_table
|
||||||
}
|
}
|
||||||
var options = {
|
var options = {
|
||||||
|
@ -68,21 +72,89 @@ function initLdapUsersTable() {
|
||||||
],
|
],
|
||||||
pageLength: 15
|
pageLength: 15
|
||||||
};
|
};
|
||||||
|
|
||||||
ldap_users_table = jumpserver.initServerSideDataTable(options);
|
ldap_users_table = jumpserver.initServerSideDataTable(options);
|
||||||
return ldap_users_table
|
return ldap_users_table
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function testRequestLdapUser(){
|
||||||
|
var the_url = "{% url 'api-settings:ldap-user-list' %}";
|
||||||
|
var error = function (data, status) {
|
||||||
|
if (status === 409){
|
||||||
|
console.log(data);
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if (status === 400){
|
||||||
|
toastr.error(data);
|
||||||
|
clearInterval(interval);
|
||||||
|
interval = undefined;
|
||||||
|
return
|
||||||
|
}
|
||||||
|
console.log(data, status)
|
||||||
|
};
|
||||||
|
var success = function() {
|
||||||
|
initLdapUsersTable();
|
||||||
|
clearInterval(interval);
|
||||||
|
interval = undefined
|
||||||
|
};
|
||||||
|
requestApi({
|
||||||
|
url: the_url,
|
||||||
|
method: 'GET',
|
||||||
|
flash_message: false,
|
||||||
|
error: error,
|
||||||
|
success: success
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
function timingTestRequestLdapUser(){
|
||||||
|
if (interval !== undefined){
|
||||||
|
return
|
||||||
|
}
|
||||||
|
interval = setInterval(testRequestLdapUser, 2000);
|
||||||
|
}
|
||||||
|
|
||||||
$(document).ready(function(){
|
$(document).ready(function(){
|
||||||
|
|
||||||
}).on('show.bs.modal', function () {
|
}).on('show.bs.modal', function () {
|
||||||
initLdapUsersTable();
|
timingTestRequestLdapUser()
|
||||||
})
|
})
|
||||||
.on('click','.close_btn1',function () {
|
.on('click', '#id_refresh_cache', function () {
|
||||||
window.location.reload()
|
var the_url = "{% url "api-settings:ldap-cache-refresh" %}";
|
||||||
|
function error(data) {
|
||||||
|
toastr.error(data)
|
||||||
|
}
|
||||||
|
function success(){
|
||||||
|
timingTestRequestLdapUser();
|
||||||
|
}
|
||||||
|
requestApi({
|
||||||
|
url: the_url,
|
||||||
|
method: 'GET',
|
||||||
|
error: error,
|
||||||
|
success: success
|
||||||
|
})
|
||||||
})
|
})
|
||||||
.on('click','.close_btn2',function () {
|
.on("click","#btn_ldap_modal_confirm",function () {
|
||||||
window.location.reload()
|
var username_list = ldap_users_table.selected;
|
||||||
|
if (username_list.length === 0){
|
||||||
|
var msg = "{% trans 'User is not currently selected, please check the user you want to import'%}";
|
||||||
|
toastr.error(msg);
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var the_url = "{% url "api-settings:ldap-user-import" %}";
|
||||||
|
function error(message) {
|
||||||
|
toastr.error(message)
|
||||||
|
}
|
||||||
|
function success(message) {
|
||||||
|
toastr.success(message.msg);
|
||||||
|
timingTestRequestLdapUser();
|
||||||
|
}
|
||||||
|
requestApi({
|
||||||
|
url: the_url,
|
||||||
|
body: JSON.stringify({'username_list':username_list}),
|
||||||
|
method: "POST",
|
||||||
|
flash_message: false,
|
||||||
|
success: success,
|
||||||
|
error: error
|
||||||
|
});
|
||||||
})
|
})
|
||||||
|
|
||||||
</script>
|
</script>
|
||||||
|
|
|
@ -109,33 +109,6 @@ $(document).ready(function () {
|
||||||
error: error
|
error: error
|
||||||
});
|
});
|
||||||
})
|
})
|
||||||
.on("click","#btn_ldap_modal_confirm",function () {
|
|
||||||
var username_list = ldap_users_table.selected;
|
|
||||||
|
|
||||||
if (username_list.length === 0){
|
|
||||||
var msg = "{% trans 'User is not currently selected, please check the user you want to import'%}";
|
|
||||||
toastr.error(msg);
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
var the_url = "{% url "api-settings:ldap-user-sync" %}";
|
|
||||||
|
|
||||||
function error(message) {
|
|
||||||
toastr.error(message)
|
|
||||||
}
|
|
||||||
|
|
||||||
function success(message) {
|
|
||||||
toastr.success(message.msg)
|
|
||||||
}
|
|
||||||
requestApi({
|
|
||||||
url: the_url,
|
|
||||||
body: JSON.stringify({'username_list':username_list}),
|
|
||||||
method: "POST",
|
|
||||||
flash_message: false,
|
|
||||||
success: success,
|
|
||||||
error: error
|
|
||||||
});
|
|
||||||
})
|
|
||||||
|
|
||||||
</script>
|
</script>
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
|
@ -10,7 +10,8 @@ urlpatterns = [
|
||||||
path('mail/testing/', api.MailTestingAPI.as_view(), name='mail-testing'),
|
path('mail/testing/', api.MailTestingAPI.as_view(), name='mail-testing'),
|
||||||
path('ldap/testing/', api.LDAPTestingAPI.as_view(), name='ldap-testing'),
|
path('ldap/testing/', api.LDAPTestingAPI.as_view(), name='ldap-testing'),
|
||||||
path('ldap/users/', api.LDAPUserListApi.as_view(), name='ldap-user-list'),
|
path('ldap/users/', api.LDAPUserListApi.as_view(), name='ldap-user-list'),
|
||||||
path('ldap/users/sync/', api.LDAPUserSyncAPI.as_view(), name='ldap-user-sync'),
|
path('ldap/users/import/', api.LDAPUserImportAPI.as_view(), name='ldap-user-import'),
|
||||||
|
path('ldap/cache/refresh/', api.LDAPCacheRefreshAPI.as_view(), name='ldap-cache-refresh'),
|
||||||
path('terminal/replay-storage/create/', api.ReplayStorageCreateAPI.as_view(), name='replay-storage-create'),
|
path('terminal/replay-storage/create/', api.ReplayStorageCreateAPI.as_view(), name='replay-storage-create'),
|
||||||
path('terminal/replay-storage/delete/', api.ReplayStorageDeleteAPI.as_view(), name='replay-storage-delete'),
|
path('terminal/replay-storage/delete/', api.ReplayStorageDeleteAPI.as_view(), name='replay-storage-delete'),
|
||||||
path('terminal/command-storage/create/', api.CommandStorageCreateAPI.as_view(), name='command-storage-create'),
|
path('terminal/command-storage/create/', api.CommandStorageCreateAPI.as_view(), name='command-storage-create'),
|
||||||
|
|
|
@ -1,219 +0,0 @@
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
#
|
|
||||||
|
|
||||||
from ldap3 import Server, Connection
|
|
||||||
from django.utils.translation import ugettext_lazy as _
|
|
||||||
|
|
||||||
from users.models import User
|
|
||||||
from users.utils import construct_user_email
|
|
||||||
from common.utils import get_logger
|
|
||||||
from common.const import LDAP_AD_ACCOUNT_DISABLE
|
|
||||||
|
|
||||||
from .models import settings
|
|
||||||
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
|
||||||
|
|
||||||
|
|
||||||
class LDAPOUGroupException(Exception):
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
class LDAPUtil:
|
|
||||||
_conn = None
|
|
||||||
|
|
||||||
SEARCH_FIELD_ALL = 'all'
|
|
||||||
SEARCH_FIELD_USERNAME = 'username'
|
|
||||||
|
|
||||||
def __init__(self, use_settings_config=True, server_uri=None, bind_dn=None,
|
|
||||||
password=None, use_ssl=None, search_ougroup=None,
|
|
||||||
search_filter=None, attr_map=None, auth_ldap=None):
|
|
||||||
# config
|
|
||||||
self.paged_size = settings.AUTH_LDAP_SEARCH_PAGED_SIZE
|
|
||||||
|
|
||||||
if use_settings_config:
|
|
||||||
self._load_config_from_settings()
|
|
||||||
else:
|
|
||||||
self.server_uri = server_uri
|
|
||||||
self.bind_dn = bind_dn
|
|
||||||
self.password = password
|
|
||||||
self.use_ssl = use_ssl
|
|
||||||
self.search_ougroup = search_ougroup
|
|
||||||
self.search_filter = search_filter
|
|
||||||
self.attr_map = attr_map
|
|
||||||
self.auth_ldap = auth_ldap
|
|
||||||
|
|
||||||
def _load_config_from_settings(self):
|
|
||||||
self.server_uri = settings.AUTH_LDAP_SERVER_URI
|
|
||||||
self.bind_dn = settings.AUTH_LDAP_BIND_DN
|
|
||||||
self.password = settings.AUTH_LDAP_BIND_PASSWORD
|
|
||||||
self.use_ssl = settings.AUTH_LDAP_START_TLS
|
|
||||||
self.search_ougroup = settings.AUTH_LDAP_SEARCH_OU
|
|
||||||
self.search_filter = settings.AUTH_LDAP_SEARCH_FILTER
|
|
||||||
self.attr_map = settings.AUTH_LDAP_USER_ATTR_MAP
|
|
||||||
self.auth_ldap = settings.AUTH_LDAP
|
|
||||||
|
|
||||||
@property
|
|
||||||
def connection(self):
|
|
||||||
if self._conn is None:
|
|
||||||
server = Server(self.server_uri, use_ssl=self.use_ssl)
|
|
||||||
conn = Connection(server, self.bind_dn, self.password)
|
|
||||||
conn.bind()
|
|
||||||
self._conn = conn
|
|
||||||
return self._conn
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def get_user_by_username(username):
|
|
||||||
try:
|
|
||||||
user = User.objects.get(username=username)
|
|
||||||
except Exception as e:
|
|
||||||
return None
|
|
||||||
else:
|
|
||||||
return user
|
|
||||||
|
|
||||||
def _ldap_entry_to_user_item(self, entry):
|
|
||||||
user_item = {}
|
|
||||||
for attr, mapping in self.attr_map.items():
|
|
||||||
if not hasattr(entry, mapping):
|
|
||||||
continue
|
|
||||||
value = getattr(entry, mapping).value or ''
|
|
||||||
if mapping.lower() == 'useraccountcontrol' and attr == 'is_active'\
|
|
||||||
and value:
|
|
||||||
value = int(value) & LDAP_AD_ACCOUNT_DISABLE \
|
|
||||||
!= LDAP_AD_ACCOUNT_DISABLE
|
|
||||||
user_item[attr] = value
|
|
||||||
return user_item
|
|
||||||
|
|
||||||
def _search_user_items_ou(self, search_ou, extra_filter=None, cookie=None):
|
|
||||||
search_filter = self.search_filter % {"user": "*"}
|
|
||||||
if extra_filter:
|
|
||||||
search_filter = '(&{}{})'.format(search_filter, extra_filter)
|
|
||||||
|
|
||||||
ok = self.connection.search(
|
|
||||||
search_ou, search_filter,
|
|
||||||
attributes=list(self.attr_map.values()),
|
|
||||||
paged_size=self.paged_size, paged_cookie=cookie
|
|
||||||
)
|
|
||||||
if not ok:
|
|
||||||
error = _("Search no entry matched in ou {}".format(search_ou))
|
|
||||||
raise LDAPOUGroupException(error)
|
|
||||||
|
|
||||||
user_items = []
|
|
||||||
for entry in self.connection.entries:
|
|
||||||
user_item = self._ldap_entry_to_user_item(entry)
|
|
||||||
user = self.get_user_by_username(user_item['username'])
|
|
||||||
user_item['existing'] = bool(user)
|
|
||||||
if user_item in user_items:
|
|
||||||
continue
|
|
||||||
user_items.append(user_item)
|
|
||||||
return user_items
|
|
||||||
|
|
||||||
def _cookie(self):
|
|
||||||
if self.paged_size is None:
|
|
||||||
cookie = None
|
|
||||||
else:
|
|
||||||
cookie = self.connection.result['controls']['1.2.840.113556.1.4.319']['value']['cookie']
|
|
||||||
return cookie
|
|
||||||
|
|
||||||
def search_user_items(self, extra_filter=None):
|
|
||||||
user_items = []
|
|
||||||
logger.info("Search user items")
|
|
||||||
|
|
||||||
for search_ou in str(self.search_ougroup).split("|"):
|
|
||||||
logger.info("Search user search ou: {}".format(search_ou))
|
|
||||||
_user_items = self._search_user_items_ou(search_ou, extra_filter=extra_filter)
|
|
||||||
user_items.extend(_user_items)
|
|
||||||
while self._cookie():
|
|
||||||
logger.info("Page Search user search ou: {}".format(search_ou))
|
|
||||||
_user_items = self._search_user_items_ou(search_ou, extra_filter, self._cookie())
|
|
||||||
user_items.extend(_user_items)
|
|
||||||
logger.info("Search user items end")
|
|
||||||
return user_items
|
|
||||||
|
|
||||||
def construct_extra_filter(self, field, q):
|
|
||||||
if not q:
|
|
||||||
return None
|
|
||||||
extra_filter = ''
|
|
||||||
if field == self.SEARCH_FIELD_ALL:
|
|
||||||
for attr in self.attr_map.values():
|
|
||||||
extra_filter += '({}={})'.format(attr, q)
|
|
||||||
extra_filter = '(|{})'.format(extra_filter)
|
|
||||||
return extra_filter
|
|
||||||
|
|
||||||
if field == self.SEARCH_FIELD_USERNAME and isinstance(q, list):
|
|
||||||
attr = self.attr_map.get('username')
|
|
||||||
for username in q:
|
|
||||||
extra_filter += '({}={})'.format(attr, username)
|
|
||||||
extra_filter = '(|{})'.format(extra_filter)
|
|
||||||
return extra_filter
|
|
||||||
|
|
||||||
def search_filter_user_items(self, username_list):
|
|
||||||
extra_filter = self.construct_extra_filter(
|
|
||||||
self.SEARCH_FIELD_USERNAME, username_list
|
|
||||||
)
|
|
||||||
user_items = self.search_user_items(extra_filter)
|
|
||||||
return user_items
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def save_user(user, user_item):
|
|
||||||
for field, value in user_item.items():
|
|
||||||
if not hasattr(user, field):
|
|
||||||
continue
|
|
||||||
if isinstance(getattr(user, field), bool):
|
|
||||||
if isinstance(value, str):
|
|
||||||
value = value.lower()
|
|
||||||
value = value in ['true', 1, True]
|
|
||||||
setattr(user, field, value)
|
|
||||||
user.save()
|
|
||||||
|
|
||||||
def update_user(self, user_item):
|
|
||||||
user = self.get_user_by_username(user_item['username'])
|
|
||||||
if user.source != User.SOURCE_LDAP:
|
|
||||||
msg = _('The user source is not LDAP')
|
|
||||||
return False, msg
|
|
||||||
try:
|
|
||||||
self.save_user(user, user_item)
|
|
||||||
except Exception as e:
|
|
||||||
logger.error(e, exc_info=True)
|
|
||||||
return False, str(e)
|
|
||||||
else:
|
|
||||||
return True, None
|
|
||||||
|
|
||||||
def create_user(self, user_item):
|
|
||||||
user = User(source=User.SOURCE_LDAP)
|
|
||||||
try:
|
|
||||||
self.save_user(user, user_item)
|
|
||||||
except Exception as e:
|
|
||||||
logger.error(e, exc_info=True)
|
|
||||||
return False, str(e)
|
|
||||||
else:
|
|
||||||
return True, None
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def construct_user_email(user_item):
|
|
||||||
username = user_item['username']
|
|
||||||
email = user_item.get('email', '')
|
|
||||||
email = construct_user_email(username, email)
|
|
||||||
return email
|
|
||||||
|
|
||||||
def create_or_update_users(self, user_items):
|
|
||||||
succeed = failed = 0
|
|
||||||
for user_item in user_items:
|
|
||||||
exist = user_item.pop('existing', False)
|
|
||||||
user_item['email'] = self.construct_user_email(user_item)
|
|
||||||
if not exist:
|
|
||||||
ok, error = self.create_user(user_item)
|
|
||||||
else:
|
|
||||||
ok, error = self.update_user(user_item)
|
|
||||||
if not ok:
|
|
||||||
logger.info("Failed User: {}".format(user_item))
|
|
||||||
failed += 1
|
|
||||||
else:
|
|
||||||
succeed += 1
|
|
||||||
result = {'total': len(user_items), 'succeed': succeed, 'failed': failed}
|
|
||||||
return result
|
|
||||||
|
|
||||||
def sync_users(self, username_list=None):
|
|
||||||
user_items = self.search_filter_user_items(username_list)
|
|
||||||
result = self.create_or_update_users(user_items)
|
|
||||||
return result
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
# coding: utf-8
|
||||||
|
#
|
||||||
|
|
||||||
|
from .ldap import *
|
|
@ -0,0 +1,336 @@
|
||||||
|
# coding: utf-8
|
||||||
|
#
|
||||||
|
|
||||||
|
from ldap3 import Server, Connection
|
||||||
|
from django.conf import settings
|
||||||
|
from django.core.cache import cache
|
||||||
|
from django.utils.translation import ugettext_lazy as _
|
||||||
|
|
||||||
|
from common.const import LDAP_AD_ACCOUNT_DISABLE
|
||||||
|
from common.utils import timeit, get_logger
|
||||||
|
from users.utils import construct_user_email
|
||||||
|
from users.models import User
|
||||||
|
|
||||||
|
logger = get_logger(__file__)
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
'LDAPConfig', 'LDAPServerUtil', 'LDAPCacheUtil', 'LDAPImportUtil',
|
||||||
|
'LDAPSyncUtil', 'LDAP_USE_CACHE_FLAGS'
|
||||||
|
]
|
||||||
|
|
||||||
|
LDAP_USE_CACHE_FLAGS = [1, '1', 'true', 'True', True]
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPOUGroupException(Exception):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPConfig(object):
|
||||||
|
|
||||||
|
def __init__(self, config=None):
|
||||||
|
self.server_uri = None
|
||||||
|
self.bind_dn = None
|
||||||
|
self.password = None
|
||||||
|
self.use_ssl = None
|
||||||
|
self.search_ougroup = None
|
||||||
|
self.search_filter = None
|
||||||
|
self.attr_map = None
|
||||||
|
if isinstance(config, dict):
|
||||||
|
self.load_from_config(config)
|
||||||
|
else:
|
||||||
|
self.load_from_settings()
|
||||||
|
|
||||||
|
def load_from_config(self, config):
|
||||||
|
self.server_uri = config.get('server_uri')
|
||||||
|
self.bind_dn = config.get('bind_dn')
|
||||||
|
self.password = config.get('password')
|
||||||
|
self.use_ssl = config.get('use_ssl')
|
||||||
|
self.search_ougroup = config.get('search_ougroup')
|
||||||
|
self.search_filter = config.get('search_filter')
|
||||||
|
self.attr_map = config.get('attr_map')
|
||||||
|
|
||||||
|
def load_from_settings(self):
|
||||||
|
self.server_uri = settings.AUTH_LDAP_SERVER_URI
|
||||||
|
self.bind_dn = settings.AUTH_LDAP_BIND_DN
|
||||||
|
self.password = settings.AUTH_LDAP_BIND_PASSWORD
|
||||||
|
self.use_ssl = settings.AUTH_LDAP_START_TLS
|
||||||
|
self.search_ougroup = settings.AUTH_LDAP_SEARCH_OU
|
||||||
|
self.search_filter = settings.AUTH_LDAP_SEARCH_FILTER
|
||||||
|
self.attr_map = settings.AUTH_LDAP_USER_ATTR_MAP
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPServerUtil(object):
|
||||||
|
|
||||||
|
def __init__(self, config=None):
|
||||||
|
if isinstance(config, dict):
|
||||||
|
self.config = LDAPConfig(config=config)
|
||||||
|
elif isinstance(config, LDAPConfig):
|
||||||
|
self.config = config
|
||||||
|
else:
|
||||||
|
self.config = LDAPConfig()
|
||||||
|
self._conn = None
|
||||||
|
self._paged_size = self.get_paged_size()
|
||||||
|
self.search_users = None
|
||||||
|
self.search_value = None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def connection(self):
|
||||||
|
if self._conn:
|
||||||
|
return self._conn
|
||||||
|
server = Server(self.config.server_uri, use_ssl=self.config.use_ssl)
|
||||||
|
conn = Connection(server, self.config.bind_dn, self.config.password)
|
||||||
|
conn.bind()
|
||||||
|
self._conn = conn
|
||||||
|
return self._conn
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def get_paged_size():
|
||||||
|
paged_size = settings.AUTH_LDAP_SEARCH_PAGED_SIZE
|
||||||
|
if isinstance(paged_size, int):
|
||||||
|
return paged_size
|
||||||
|
return None
|
||||||
|
|
||||||
|
def paged_cookie(self):
|
||||||
|
if self._paged_size is None:
|
||||||
|
return None
|
||||||
|
cookie = self.connection.result['controls']['1.2.840.113556.1.4.319']['value']['cookie']
|
||||||
|
return cookie
|
||||||
|
|
||||||
|
def get_search_filter_extra(self):
|
||||||
|
extra = ''
|
||||||
|
if self.search_users:
|
||||||
|
mapping_username = self.config.attr_map.get('username')
|
||||||
|
for user in self.search_users:
|
||||||
|
extra += '({}={})'.format(mapping_username, user)
|
||||||
|
return '(|{})'.format(extra)
|
||||||
|
if self.search_value:
|
||||||
|
for attr in self.config.attr_map.values():
|
||||||
|
extra += '({}={})'.format(attr, self.search_value)
|
||||||
|
return '(|{})'.format(extra)
|
||||||
|
return extra
|
||||||
|
|
||||||
|
def get_search_filter(self):
|
||||||
|
search_filter = self.config.search_filter % {'user': '*'}
|
||||||
|
search_filter_extra = self.get_search_filter_extra()
|
||||||
|
if search_filter_extra:
|
||||||
|
search_filter = '(&{}{})'.format(search_filter, search_filter_extra)
|
||||||
|
return search_filter
|
||||||
|
|
||||||
|
def search_user_entries_ou(self, search_ou, paged_cookie=None):
|
||||||
|
logger.info("Search user entries ou: {}, paged_cookie: {}".
|
||||||
|
format(search_ou, paged_cookie))
|
||||||
|
search_filter = self.get_search_filter()
|
||||||
|
attributes = list(self.config.attr_map.values())
|
||||||
|
ok = self.connection.search(
|
||||||
|
search_base=search_ou, search_filter=search_filter,
|
||||||
|
attributes=attributes, paged_size=self._paged_size,
|
||||||
|
paged_cookie=paged_cookie
|
||||||
|
)
|
||||||
|
if not ok:
|
||||||
|
error = _("Search no entry matched in ou {}".format(search_ou))
|
||||||
|
raise LDAPOUGroupException(error)
|
||||||
|
|
||||||
|
@timeit
|
||||||
|
def search_user_entries(self):
|
||||||
|
logger.info("Search user entries")
|
||||||
|
user_entries = list()
|
||||||
|
search_ous = str(self.config.search_ougroup).split('|')
|
||||||
|
for search_ou in search_ous:
|
||||||
|
self.search_user_entries_ou(search_ou)
|
||||||
|
user_entries.extend(self.connection.entries)
|
||||||
|
while self.paged_cookie():
|
||||||
|
self.search_user_entries_ou(search_ou, self.paged_cookie())
|
||||||
|
user_entries.extend(self.connection.entries)
|
||||||
|
return user_entries
|
||||||
|
|
||||||
|
def user_entry_to_dict(self, entry):
|
||||||
|
user = {}
|
||||||
|
attr_map = self.config.attr_map.items()
|
||||||
|
for attr, mapping in attr_map:
|
||||||
|
if not hasattr(entry, mapping):
|
||||||
|
continue
|
||||||
|
value = getattr(entry, mapping).value or ''
|
||||||
|
if attr == 'is_active' and mapping.lower() == 'useraccountcontrol' \
|
||||||
|
and value:
|
||||||
|
value = int(value) & LDAP_AD_ACCOUNT_DISABLE != LDAP_AD_ACCOUNT_DISABLE
|
||||||
|
user[attr] = value
|
||||||
|
return user
|
||||||
|
|
||||||
|
@timeit
|
||||||
|
def user_entries_to_dict(self, user_entries):
|
||||||
|
users = []
|
||||||
|
for user_entry in user_entries:
|
||||||
|
user = self.user_entry_to_dict(user_entry)
|
||||||
|
users.append(user)
|
||||||
|
return users
|
||||||
|
|
||||||
|
@timeit
|
||||||
|
def search(self, search_users=None, search_value=None):
|
||||||
|
logger.info("Search ldap users")
|
||||||
|
self.search_users = search_users
|
||||||
|
self.search_value = search_value
|
||||||
|
user_entries = self.search_user_entries()
|
||||||
|
users = self.user_entries_to_dict(user_entries)
|
||||||
|
return users
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPCacheUtil(object):
|
||||||
|
CACHE_KEY_USERS = 'CACHE_KEY_LDAP_USERS'
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.search_users = None
|
||||||
|
self.search_value = None
|
||||||
|
|
||||||
|
def set_users(self, users):
|
||||||
|
logger.info('Set ldap users to cache, count: {}'.format(len(users)))
|
||||||
|
cache.set(self.CACHE_KEY_USERS, users, None)
|
||||||
|
|
||||||
|
def get_users(self):
|
||||||
|
users = cache.get(self.CACHE_KEY_USERS)
|
||||||
|
logger.info('Get ldap users from cache, count: {}'.format(len(users)))
|
||||||
|
return users
|
||||||
|
|
||||||
|
def delete_users(self):
|
||||||
|
logger.info('Delete ldap users from cache')
|
||||||
|
cache.delete(self.CACHE_KEY_USERS)
|
||||||
|
|
||||||
|
def filter_users(self, users):
|
||||||
|
if self.search_users:
|
||||||
|
filter_users = [
|
||||||
|
user for user in users
|
||||||
|
if user['username'] in self.search_users
|
||||||
|
]
|
||||||
|
elif self.search_value:
|
||||||
|
filter_users = [
|
||||||
|
user for user in users
|
||||||
|
if self.search_value in ','.join(user.values())
|
||||||
|
]
|
||||||
|
else:
|
||||||
|
filter_users = users
|
||||||
|
return filter_users
|
||||||
|
|
||||||
|
def search(self, search_users=None, search_value=None):
|
||||||
|
self.search_users = search_users
|
||||||
|
self.search_value = search_value
|
||||||
|
users = self.get_users()
|
||||||
|
users = self.filter_users(users)
|
||||||
|
return users
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPSyncUtil(object):
|
||||||
|
CACHE_KEY_LDAP_USERS_SYNC_TASK_ERROR_MSG = 'CACHE_KEY_LDAP_USERS_SYNC_TASK_ERROR_MSG'
|
||||||
|
|
||||||
|
CACHE_KEY_LDAP_USERS_SYNC_TASK_STATUS = 'CACHE_KEY_LDAP_USERS_SYNC_TASK_STATUS'
|
||||||
|
TASK_STATUS_IS_RUNNING = 'RUNNING'
|
||||||
|
TASK_STATUS_IS_OVER = 'OVER'
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.server_util = LDAPServerUtil()
|
||||||
|
self.cache_util = LDAPCacheUtil()
|
||||||
|
self.task_error_msg = None
|
||||||
|
|
||||||
|
def clear_cache(self):
|
||||||
|
logger.info('Clear ldap sync cache')
|
||||||
|
self.delete_task_status()
|
||||||
|
self.delete_task_error_msg()
|
||||||
|
self.cache_util.delete_users()
|
||||||
|
|
||||||
|
@property
|
||||||
|
def task_no_start(self):
|
||||||
|
status = self.get_task_status()
|
||||||
|
return status is None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def task_is_running(self):
|
||||||
|
status = self.get_task_status()
|
||||||
|
return status == self.TASK_STATUS_IS_RUNNING
|
||||||
|
|
||||||
|
@property
|
||||||
|
def task_is_over(self):
|
||||||
|
status = self.get_task_status()
|
||||||
|
return status == self.TASK_STATUS_IS_OVER
|
||||||
|
|
||||||
|
def set_task_status(self, status):
|
||||||
|
logger.info('Set task status: {}'.format(status))
|
||||||
|
cache.set(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_STATUS, status, None)
|
||||||
|
|
||||||
|
def get_task_status(self):
|
||||||
|
status = cache.get(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_STATUS)
|
||||||
|
logger.info('Get task status: {}'.format(status))
|
||||||
|
return status
|
||||||
|
|
||||||
|
def delete_task_status(self):
|
||||||
|
logger.info('Delete task status')
|
||||||
|
cache.delete(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_STATUS)
|
||||||
|
|
||||||
|
def set_task_error_msg(self, error_msg):
|
||||||
|
logger.info('Set task error msg')
|
||||||
|
cache.set(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_ERROR_MSG, error_msg, None)
|
||||||
|
|
||||||
|
def get_task_error_msg(self):
|
||||||
|
logger.info('Get task error msg')
|
||||||
|
error_msg = cache.get(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_ERROR_MSG)
|
||||||
|
return error_msg
|
||||||
|
|
||||||
|
def delete_task_error_msg(self):
|
||||||
|
logger.info('Delete task error msg')
|
||||||
|
cache.delete(self.CACHE_KEY_LDAP_USERS_SYNC_TASK_ERROR_MSG)
|
||||||
|
|
||||||
|
def pre_sync(self):
|
||||||
|
self.set_task_status(self.TASK_STATUS_IS_RUNNING)
|
||||||
|
|
||||||
|
def sync(self):
|
||||||
|
users = self.server_util.search()
|
||||||
|
self.cache_util.set_users(users)
|
||||||
|
|
||||||
|
def post_sync(self):
|
||||||
|
self.set_task_status(self.TASK_STATUS_IS_OVER)
|
||||||
|
|
||||||
|
def perform_sync(self):
|
||||||
|
logger.info('Start perform sync ldap users from server to cache')
|
||||||
|
self.pre_sync()
|
||||||
|
try:
|
||||||
|
self.sync()
|
||||||
|
except Exception as e:
|
||||||
|
error_msg = str(e)
|
||||||
|
logger.error(error_msg)
|
||||||
|
self.set_task_error_msg(error_msg)
|
||||||
|
self.post_sync()
|
||||||
|
logger.info('End perform sync ldap users from server to cache')
|
||||||
|
|
||||||
|
|
||||||
|
class LDAPImportUtil(object):
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
pass
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def get_user_email(user):
|
||||||
|
username = user['username']
|
||||||
|
email = user['email']
|
||||||
|
email = construct_user_email(username, email)
|
||||||
|
return email
|
||||||
|
|
||||||
|
def update_or_create(self, user):
|
||||||
|
user['email'] = self.get_user_email(user)
|
||||||
|
if user['username'] not in ['admin']:
|
||||||
|
user['source'] = User.SOURCE_LDAP
|
||||||
|
obj, created = User.objects.update_or_create(
|
||||||
|
username=user['username'], defaults=user
|
||||||
|
)
|
||||||
|
return obj, created
|
||||||
|
|
||||||
|
def perform_import(self, users):
|
||||||
|
logger.info('Start perform import ldap users, count: {}'.format(len(users)))
|
||||||
|
errors = []
|
||||||
|
for user in users:
|
||||||
|
try:
|
||||||
|
self.update_or_create(user)
|
||||||
|
except Exception as e:
|
||||||
|
errors.append({user['username']: str(e)})
|
||||||
|
logger.error(e)
|
||||||
|
logger.info('End perform import ldap users')
|
||||||
|
return errors
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -5,6 +5,7 @@ from django.utils.translation import ugettext as _
|
||||||
|
|
||||||
from common.permissions import PermissionsMixin, IsSuperUser
|
from common.permissions import PermissionsMixin, IsSuperUser
|
||||||
from common import utils
|
from common import utils
|
||||||
|
from .utils import LDAPSyncUtil
|
||||||
from .forms import EmailSettingForm, LDAPSettingForm, BasicSettingForm, \
|
from .forms import EmailSettingForm, LDAPSettingForm, BasicSettingForm, \
|
||||||
TerminalSettingForm, SecuritySettingForm, EmailContentSettingForm
|
TerminalSettingForm, SecuritySettingForm, EmailContentSettingForm
|
||||||
|
|
||||||
|
@ -83,6 +84,7 @@ class LDAPSettingView(PermissionsMixin, TemplateView):
|
||||||
form.save()
|
form.save()
|
||||||
msg = _("Update setting successfully")
|
msg = _("Update setting successfully")
|
||||||
messages.success(request, msg)
|
messages.success(request, msg)
|
||||||
|
LDAPSyncUtil().clear_cache()
|
||||||
return redirect('settings:ldap-setting')
|
return redirect('settings:ldap-setting')
|
||||||
else:
|
else:
|
||||||
context = self.get_context_data()
|
context = self.get_context_data()
|
||||||
|
|
|
@ -11,7 +11,7 @@ from .models import User
|
||||||
from .utils import (
|
from .utils import (
|
||||||
send_password_expiration_reminder_mail, send_user_expiration_reminder_mail
|
send_password_expiration_reminder_mail, send_user_expiration_reminder_mail
|
||||||
)
|
)
|
||||||
from settings.utils import LDAPUtil
|
from settings.utils import LDAPServerUtil, LDAPImportUtil
|
||||||
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
|
@ -70,16 +70,21 @@ def check_user_expired_periodic():
|
||||||
|
|
||||||
|
|
||||||
@shared_task
|
@shared_task
|
||||||
def sync_ldap_user():
|
def import_ldap_user():
|
||||||
logger.info("Start sync ldap user periodic task")
|
logger.info("Start import ldap user task")
|
||||||
util = LDAPUtil()
|
util_server = LDAPServerUtil()
|
||||||
result = util.sync_users()
|
util_import = LDAPImportUtil()
|
||||||
logger.info("Result: {}".format(result))
|
users = util_server.search()
|
||||||
|
errors = util_import.perform_import(users)
|
||||||
|
if errors:
|
||||||
|
logger.error("Imported LDAP users errors: {}".format(errors))
|
||||||
|
else:
|
||||||
|
logger.info('Imported {} users successfully'.format(len(users)))
|
||||||
|
|
||||||
|
|
||||||
@shared_task
|
@shared_task
|
||||||
@after_app_ready_start
|
@after_app_ready_start
|
||||||
def sync_ldap_user_periodic():
|
def import_ldap_user_periodic():
|
||||||
if not settings.AUTH_LDAP:
|
if not settings.AUTH_LDAP:
|
||||||
return
|
return
|
||||||
if not settings.AUTH_LDAP_SYNC_IS_PERIODIC:
|
if not settings.AUTH_LDAP_SYNC_IS_PERIODIC:
|
||||||
|
@ -91,10 +96,9 @@ def sync_ldap_user_periodic():
|
||||||
else:
|
else:
|
||||||
interval = None
|
interval = None
|
||||||
crontab = settings.AUTH_LDAP_SYNC_CRONTAB
|
crontab = settings.AUTH_LDAP_SYNC_CRONTAB
|
||||||
|
|
||||||
tasks = {
|
tasks = {
|
||||||
'sync_ldap_user_periodic': {
|
'import_ldap_user_periodic': {
|
||||||
'task': sync_ldap_user.name,
|
'task': import_ldap_user.name,
|
||||||
'interval': interval,
|
'interval': interval,
|
||||||
'crontab': crontab,
|
'crontab': crontab,
|
||||||
'enabled': True,
|
'enabled': True,
|
||||||
|
|
Loading…
Reference in New Issue