mirror of https://github.com/jumpserver/jumpserver
				
				
				
			
		
			
				
	
	
		
			183 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			Python
		
	
	
# coding:utf-8
 | 
						||
#
 | 
						||
 | 
						||
import warnings
 | 
						||
import ldap
 | 
						||
from django.conf import settings
 | 
						||
from django.core.exceptions import ImproperlyConfigured, ObjectDoesNotExist
 | 
						||
from django_auth_ldap.backend import _LDAPUser, LDAPBackend, LDAPSettings
 | 
						||
from django_auth_ldap.config import _LDAPConfig, LDAPSearch, LDAPSearchUnion
 | 
						||
 | 
						||
from users.utils import construct_user_email
 | 
						||
from common.const import LDAP_AD_ACCOUNT_DISABLE
 | 
						||
 | 
						||
logger = _LDAPConfig.get_logger()
 | 
						||
 | 
						||
 | 
						||
class LDAPAuthorizationBackend(LDAPBackend):
 | 
						||
    """
 | 
						||
    Override this class to override _LDAPUser to LDAPUser
 | 
						||
    """
 | 
						||
    @staticmethod
 | 
						||
    def user_can_authenticate(user):
 | 
						||
        """
 | 
						||
        Reject users with is_active=False. Custom user models that don't have
 | 
						||
        that attribute are allowed.
 | 
						||
        """
 | 
						||
        is_valid = getattr(user, 'is_valid', None)
 | 
						||
        return is_valid or is_valid is None
 | 
						||
 | 
						||
    def get_or_build_user(self, username, ldap_user):
 | 
						||
        """
 | 
						||
                This must return a (User, built) 2-tuple for the given LDAP user.
 | 
						||
 | 
						||
                username is the Django-friendly username of the user. ldap_user.dn is
 | 
						||
                the user's DN and ldap_user.attrs contains all of their LDAP
 | 
						||
                attributes.
 | 
						||
 | 
						||
                The returned User object may be an unsaved model instance.
 | 
						||
 | 
						||
                """
 | 
						||
        model = self.get_user_model()
 | 
						||
 | 
						||
        if self.settings.USER_QUERY_FIELD:
 | 
						||
            query_field = self.settings.USER_QUERY_FIELD
 | 
						||
            query_value = ldap_user.attrs[self.settings.USER_ATTR_MAP[query_field]][0]
 | 
						||
            query_value = query_value.strip()
 | 
						||
            lookup = query_field
 | 
						||
        else:
 | 
						||
            query_field = model.USERNAME_FIELD
 | 
						||
            query_value = username.lower()
 | 
						||
            lookup = "{}__iexact".format(query_field)
 | 
						||
 | 
						||
        try:
 | 
						||
            user = model.objects.get(**{lookup: query_value})
 | 
						||
        except model.DoesNotExist:
 | 
						||
            user = model(**{query_field: query_value})
 | 
						||
            built = True
 | 
						||
        else:
 | 
						||
            built = False
 | 
						||
 | 
						||
        return (user, built)
 | 
						||
 | 
						||
    def pre_check(self, username, password):
 | 
						||
        if not settings.AUTH_LDAP:
 | 
						||
            error = 'Not enabled auth ldap'
 | 
						||
            return False, error
 | 
						||
        if not username:
 | 
						||
            error = 'Username is None'
 | 
						||
            return False, error
 | 
						||
        if not password:
 | 
						||
            error = 'Password is None'
 | 
						||
            return False, error
 | 
						||
        if settings.AUTH_LDAP_USER_LOGIN_ONLY_IN_USERS:
 | 
						||
            user_model = self.get_user_model()
 | 
						||
            exist = user_model.objects.filter(username=username).exists()
 | 
						||
            if not exist:
 | 
						||
                error = 'user ({}) is not in the user list'.format(username)
 | 
						||
                return False, error
 | 
						||
        return True, ''
 | 
						||
 | 
						||
    def authenticate(self, request=None, username=None, password=None, **kwargs):
 | 
						||
        logger.info('Authentication LDAP backend')
 | 
						||
        match, msg = self.pre_check(username, password)
 | 
						||
        if not match:
 | 
						||
            logger.info('Authenticate failed: {}'.format(msg))
 | 
						||
            return None
 | 
						||
        ldap_user = LDAPUser(self, username=username.strip(), request=request)
 | 
						||
        user = self.authenticate_ldap_user(ldap_user, password)
 | 
						||
        logger.info('Authenticate user: {}'.format(user))
 | 
						||
        return user if self.user_can_authenticate(user) else None
 | 
						||
 | 
						||
    def get_user(self, user_id):
 | 
						||
        user = None
 | 
						||
        try:
 | 
						||
            user = self.get_user_model().objects.get(pk=user_id)
 | 
						||
            LDAPUser(self, user=user)  # This sets user.ldap_user
 | 
						||
        except ObjectDoesNotExist:
 | 
						||
            pass
 | 
						||
        return user
 | 
						||
 | 
						||
    def get_group_permissions(self, user, obj=None):
 | 
						||
        if not hasattr(user, 'ldap_user') and self.settings.AUTHORIZE_ALL_USERS:
 | 
						||
            LDAPUser(self, user=user)  # This sets user.ldap_user
 | 
						||
        if hasattr(user, 'ldap_user'):
 | 
						||
            permissions = user.ldap_user.get_group_permissions()
 | 
						||
        else:
 | 
						||
            permissions = set()
 | 
						||
        return permissions
 | 
						||
 | 
						||
    def populate_user(self, username):
 | 
						||
        ldap_user = LDAPUser(self, username=username)
 | 
						||
        user = ldap_user.populate_user()
 | 
						||
        return user
 | 
						||
 | 
						||
 | 
						||
class LDAPUser(_LDAPUser):
 | 
						||
 | 
						||
    def _search_for_user_dn_from_ldap_util(self):
 | 
						||
        from settings.utils import LDAPServerUtil
 | 
						||
        util = LDAPServerUtil()
 | 
						||
        user_dn = util.search_for_user_dn(self._username)
 | 
						||
        return user_dn
 | 
						||
 | 
						||
    def _search_for_user_dn(self):
 | 
						||
        """
 | 
						||
        This method was overridden because the AUTH_LDAP_USER_SEARCH
 | 
						||
        configuration in the settings.py file
 | 
						||
        is configured with a `lambda` problem value
 | 
						||
        """
 | 
						||
 | 
						||
        user_search_union = [
 | 
						||
            LDAPSearch(
 | 
						||
                USER_SEARCH, ldap.SCOPE_SUBTREE,
 | 
						||
                settings.AUTH_LDAP_SEARCH_FILTER
 | 
						||
            )
 | 
						||
            for USER_SEARCH in str(settings.AUTH_LDAP_SEARCH_OU).split("|")
 | 
						||
        ]
 | 
						||
 | 
						||
        search = LDAPSearchUnion(*user_search_union)
 | 
						||
        if search is None:
 | 
						||
            raise ImproperlyConfigured(
 | 
						||
                'AUTH_LDAP_USER_SEARCH must be an LDAPSearch instance.'
 | 
						||
            )
 | 
						||
 | 
						||
        results = search.execute(self.connection, {'user': self._username})
 | 
						||
        if results is not None and len(results) == 1:
 | 
						||
            (user_dn, self._user_attrs) = next(iter(results))
 | 
						||
        else:
 | 
						||
            # 解决直接配置DC域,用户认证失败的问题(库不能从整棵树中搜索)
 | 
						||
            user_dn = self._search_for_user_dn_from_ldap_util()
 | 
						||
            if user_dn is None:
 | 
						||
                self._user_dn = None
 | 
						||
                self._user_attrs = None
 | 
						||
            else:
 | 
						||
                self._user_dn = user_dn
 | 
						||
                self._user_attrs = self._load_user_attrs()
 | 
						||
 | 
						||
        return user_dn
 | 
						||
 | 
						||
    def _populate_user_from_attributes(self):
 | 
						||
        for field, attr in self.settings.USER_ATTR_MAP.items():
 | 
						||
            try:
 | 
						||
                value = self.attrs[attr][0]
 | 
						||
                value = value.strip()
 | 
						||
                if attr.lower() == 'useraccountcontrol' \
 | 
						||
                        and field == 'is_active' and value:
 | 
						||
                    value = int(value) & LDAP_AD_ACCOUNT_DISABLE \
 | 
						||
                            != LDAP_AD_ACCOUNT_DISABLE
 | 
						||
            except LookupError:
 | 
						||
                logger.warning("{} does not have a value for the attribute {}".format(self.dn, attr))
 | 
						||
            else:
 | 
						||
                if not hasattr(self._user, field):
 | 
						||
                    continue
 | 
						||
                if isinstance(getattr(self._user, field), bool):
 | 
						||
                    if isinstance(value, str):
 | 
						||
                        value = value.lower()
 | 
						||
                    value = value in ['true', '1', True]
 | 
						||
                setattr(self._user, field, value)
 | 
						||
 | 
						||
        email = getattr(self._user, 'email', '')
 | 
						||
        email = construct_user_email(self._user.username, email)
 | 
						||
        setattr(self._user, 'email', email)
 |