mirror of https://github.com/jumpserver/jumpserver
				
				
				
			
		
			
				
	
	
		
			183 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Python
		
	
	
| # coding:utf-8
 | ||
| #
 | ||
| 
 | ||
| import ldap
 | ||
| from django.conf import settings
 | ||
| from django.core.exceptions import ImproperlyConfigured, ObjectDoesNotExist
 | ||
| from django_auth_ldap.backend import _LDAPUser, LDAPBackend
 | ||
| from django_auth_ldap.config import _LDAPConfig, LDAPSearch, LDAPSearchUnion
 | ||
| 
 | ||
| from users.utils import construct_user_email
 | ||
| from common.const import LDAP_AD_ACCOUNT_DISABLE
 | ||
| from .base import JMSBaseAuthBackend
 | ||
| 
 | ||
| logger = _LDAPConfig.get_logger()
 | ||
| 
 | ||
| 
 | ||
| class LDAPAuthorizationBackend(JMSBaseAuthBackend, LDAPBackend):
 | ||
|     """
 | ||
|     Override this class to override _LDAPUser to LDAPUser
 | ||
|     """
 | ||
|     @staticmethod
 | ||
|     def is_enabled():
 | ||
|         return settings.AUTH_LDAP
 | ||
| 
 | ||
|     def get_or_build_user(self, username, ldap_user):
 | ||
|         """
 | ||
|         This must return a (User, built) 2-tuple for the given LDAP user.
 | ||
| 
 | ||
|         username is the Django-friendly username of the user. ldap_user.dn is
 | ||
|         the user's DN and ldap_user.attrs contains all of their LDAP
 | ||
|         attributes.
 | ||
| 
 | ||
|         The returned User object may be an unsaved model instance.
 | ||
| 
 | ||
|         """
 | ||
|         model = self.get_user_model()
 | ||
| 
 | ||
|         if self.settings.USER_QUERY_FIELD:
 | ||
|             query_field = self.settings.USER_QUERY_FIELD
 | ||
|             query_value = ldap_user.attrs[self.settings.USER_ATTR_MAP[query_field]][0]
 | ||
|             query_value = query_value.strip()
 | ||
|             lookup = query_field
 | ||
|         else:
 | ||
|             query_field = model.USERNAME_FIELD
 | ||
|             query_value = username.lower()
 | ||
|             lookup = "{}__iexact".format(query_field)
 | ||
| 
 | ||
|         try:
 | ||
|             user = model.objects.get(**{lookup: query_value})
 | ||
|         except model.DoesNotExist:
 | ||
|             user = model(**{query_field: query_value})
 | ||
|             built = True
 | ||
|         else:
 | ||
|             built = False
 | ||
| 
 | ||
|         return user, built
 | ||
| 
 | ||
|     def pre_check(self, username, password):
 | ||
|         if not settings.AUTH_LDAP:
 | ||
|             error = 'Not enabled auth ldap'
 | ||
|             return False, error
 | ||
|         if not username:
 | ||
|             error = 'Username is None'
 | ||
|             return False, error
 | ||
|         if not password:
 | ||
|             error = 'Password is None'
 | ||
|             return False, error
 | ||
|         if settings.AUTH_LDAP_USER_LOGIN_ONLY_IN_USERS:
 | ||
|             user_model = self.get_user_model()
 | ||
|             exist = user_model.objects.filter(username=username).exists()
 | ||
|             if not exist:
 | ||
|                 error = 'user ({}) is not in the user list'.format(username)
 | ||
|                 return False, error
 | ||
|         return True, ''
 | ||
| 
 | ||
|     def authenticate(self, request=None, username=None, password=None, **kwargs):
 | ||
|         logger.info('Authentication LDAP backend')
 | ||
|         if username is None or password is None:
 | ||
|             logger.info('No username or password')
 | ||
|             return None
 | ||
|         match, msg = self.pre_check(username, password)
 | ||
|         if not match:
 | ||
|             logger.info('Authenticate failed: {}'.format(msg))
 | ||
|             return None
 | ||
|         ldap_user = LDAPUser(self, username=username.strip(), request=request)
 | ||
|         user = self.authenticate_ldap_user(ldap_user, password)
 | ||
|         logger.info('Authenticate user: {}'.format(user))
 | ||
|         return user if self.user_can_authenticate(user) else None
 | ||
| 
 | ||
|     def get_user(self, user_id):
 | ||
|         user = None
 | ||
|         try:
 | ||
|             user = self.get_user_model().objects.get(pk=user_id)
 | ||
|             LDAPUser(self, user=user)  # This sets user.ldap_user
 | ||
|         except ObjectDoesNotExist:
 | ||
|             pass
 | ||
|         return user
 | ||
| 
 | ||
|     def get_group_permissions(self, user, obj=None):
 | ||
|         if not hasattr(user, 'ldap_user') and self.settings.AUTHORIZE_ALL_USERS:
 | ||
|             LDAPUser(self, user=user)  # This sets user.ldap_user
 | ||
|         if hasattr(user, 'ldap_user'):
 | ||
|             permissions = user.ldap_user.get_group_permissions()
 | ||
|         else:
 | ||
|             permissions = set()
 | ||
|         return permissions
 | ||
| 
 | ||
|     def populate_user(self, username):
 | ||
|         ldap_user = LDAPUser(self, username=username)
 | ||
|         user = ldap_user.populate_user()
 | ||
|         return user
 | ||
| 
 | ||
| 
 | ||
| class LDAPUser(_LDAPUser):
 | ||
| 
 | ||
|     def _search_for_user_dn_from_ldap_util(self):
 | ||
|         from settings.utils import LDAPServerUtil
 | ||
|         util = LDAPServerUtil()
 | ||
|         user_dn = util.search_for_user_dn(self._username)
 | ||
|         return user_dn
 | ||
| 
 | ||
|     def _search_for_user_dn(self):
 | ||
|         """
 | ||
|         This method was overridden because the AUTH_LDAP_USER_SEARCH
 | ||
|         configuration in the settings.py file
 | ||
|         is configured with a `lambda` problem value
 | ||
|         """
 | ||
| 
 | ||
|         user_search_union = [
 | ||
|             LDAPSearch(
 | ||
|                 USER_SEARCH, ldap.SCOPE_SUBTREE,
 | ||
|                 settings.AUTH_LDAP_SEARCH_FILTER
 | ||
|             )
 | ||
|             for USER_SEARCH in str(settings.AUTH_LDAP_SEARCH_OU).split("|")
 | ||
|         ]
 | ||
| 
 | ||
|         search = LDAPSearchUnion(*user_search_union)
 | ||
|         if search is None:
 | ||
|             raise ImproperlyConfigured(
 | ||
|                 'AUTH_LDAP_USER_SEARCH must be an LDAPSearch instance.'
 | ||
|             )
 | ||
| 
 | ||
|         results = search.execute(self.connection, {'user': self._username})
 | ||
|         if results is not None and len(results) == 1:
 | ||
|             (user_dn, self._user_attrs) = next(iter(results))
 | ||
|         else:
 | ||
|             # 解决直接配置DC域,用户认证失败的问题(库不能从整棵树中搜索)
 | ||
|             user_dn = self._search_for_user_dn_from_ldap_util()
 | ||
|             if user_dn is None:
 | ||
|                 self._user_dn = None
 | ||
|                 self._user_attrs = None
 | ||
|             else:
 | ||
|                 self._user_dn = user_dn
 | ||
|                 self._user_attrs = self._load_user_attrs()
 | ||
| 
 | ||
|         return user_dn
 | ||
| 
 | ||
|     def _populate_user_from_attributes(self):
 | ||
|         for field, attr in self.settings.USER_ATTR_MAP.items():
 | ||
|             if field in ['groups']:
 | ||
|                 continue
 | ||
|             try:
 | ||
|                 value = self.attrs[attr][0]
 | ||
|                 value = value.strip()
 | ||
|                 if attr.lower() == 'useraccountcontrol' \
 | ||
|                         and field == 'is_active' and value:
 | ||
|                     value = int(value) & LDAP_AD_ACCOUNT_DISABLE \
 | ||
|                             != LDAP_AD_ACCOUNT_DISABLE
 | ||
|             except LookupError:
 | ||
|                 logger.warning("{} does not have a value for the attribute {}".format(self.dn, attr))
 | ||
|             else:
 | ||
|                 if not hasattr(self._user, field):
 | ||
|                     continue
 | ||
|                 if isinstance(getattr(self._user, field), bool):
 | ||
|                     if isinstance(value, str):
 | ||
|                         value = value.lower()
 | ||
|                     value = value in ['true', '1', True]
 | ||
|                 setattr(self._user, field, value)
 | ||
| 
 | ||
|         email = getattr(self._user, 'email', '')
 | ||
|         email = construct_user_email(self._user.username, email)
 | ||
|         setattr(self._user, 'email', email)
 |