Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
J
jumpserver
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
ops
jumpserver
Commits
c7f86cdd
Commit
c7f86cdd
authored
Nov 23, 2018
by
ibuler
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'dev' of github.com:jumpserver/jumpserver into dev
parents
091cf39e
79208a95
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
101 additions
and
7 deletions
+101
-7
__init__.py
apps/authentication/ldap/__init__.py
+0
-0
backends.py
apps/authentication/ldap/backends.py
+95
-0
conf.py
apps/jumpserver/conf.py
+1
-0
settings.py
apps/jumpserver/settings.py
+3
-6
requirements.txt
requirements/requirements.txt
+2
-1
No files found.
apps/authentication/ldap/__init__.py
0 → 100644
View file @
c7f86cdd
apps/authentication/ldap/backends.py
0 → 100644
View file @
c7f86cdd
# coding:utf-8
#
import
ldap
from
django.conf
import
settings
from
django.core.exceptions
import
ImproperlyConfigured
,
ObjectDoesNotExist
from
django_auth_ldap.backend
import
_LDAPUser
,
LDAPBackend
from
django_auth_ldap.config
import
_LDAPConfig
,
LDAPSearch
,
LDAPSearchUnion
logger
=
_LDAPConfig
.
get_logger
()
class
LDAPAuthorizationBackend
(
LDAPBackend
):
"""
Override this class to override _LDAPUser to LDAPUser
"""
def
authenticate
(
self
,
request
=
None
,
username
=
None
,
password
=
None
,
**
kwargs
):
if
password
or
self
.
settings
.
PERMIT_EMPTY_PASSWORD
:
ldap_user
=
LDAPUser
(
self
,
username
=
username
.
strip
(),
request
=
request
)
user
=
self
.
authenticate_ldap_user
(
ldap_user
,
password
)
else
:
logger
.
debug
(
'Rejecting empty password for {}'
.
format
(
username
))
user
=
None
return
user
def
get_user
(
self
,
user_id
):
user
=
None
try
:
user
=
self
.
get_user_model
()
.
objects
.
get
(
pk
=
user_id
)
LDAPUser
(
self
,
user
=
user
)
# This sets user.ldap_user
except
ObjectDoesNotExist
:
pass
return
user
def
get_group_permissions
(
self
,
user
,
obj
=
None
):
if
not
hasattr
(
user
,
'ldap_user'
)
and
self
.
settings
.
AUTHORIZE_ALL_USERS
:
LDAPUser
(
self
,
user
=
user
)
# This sets user.ldap_user
if
hasattr
(
user
,
'ldap_user'
):
permissions
=
user
.
ldap_user
.
get_group_permissions
()
else
:
permissions
=
set
()
return
permissions
def
populate_user
(
self
,
username
):
ldap_user
=
LDAPUser
(
self
,
username
=
username
)
user
=
ldap_user
.
populate_user
()
return
user
class
LDAPUser
(
_LDAPUser
):
def
_search_for_user_dn
(
self
):
"""
This method was overridden because the AUTH_LDAP_USER_SEARCH
configuration in the settings.py file
is configured with a `lambda` problem value
"""
user_search_union
=
[
LDAPSearch
(
USER_SEARCH
,
ldap
.
SCOPE_SUBTREE
,
settings
.
AUTH_LDAP_SEARCH_FILTER
)
for
USER_SEARCH
in
str
(
settings
.
AUTH_LDAP_SEARCH_OU
)
.
split
(
"|"
)
]
search
=
LDAPSearchUnion
(
*
user_search_union
)
if
search
is
None
:
raise
ImproperlyConfigured
(
'AUTH_LDAP_USER_SEARCH must be an LDAPSearch instance.'
)
results
=
search
.
execute
(
self
.
connection
,
{
'user'
:
self
.
_username
})
if
results
is
not
None
and
len
(
results
)
==
1
:
(
user_dn
,
self
.
_user_attrs
)
=
next
(
iter
(
results
))
else
:
user_dn
=
None
return
user_dn
def
_populate_user_from_attributes
(
self
):
super
()
.
_populate_user_from_attributes
()
if
not
hasattr
(
self
.
_user
,
'email'
)
or
'@'
not
in
self
.
_user
.
email
:
email
=
'{}@{}'
.
format
(
self
.
_user
.
username
,
settings
.
EMAIL_SUFFIX
)
setattr
(
self
.
_user
,
'email'
,
email
)
apps/jumpserver/conf.py
View file @
c7f86cdd
...
...
@@ -311,6 +311,7 @@ defaults = {
'CSRF_COOKIE_DOMAIN'
:
None
,
'SESSION_COOKIE_AGE'
:
3600
*
24
,
'AUTH_OPENID'
:
False
,
'EMAIL_SUFFIX'
:
'jumpserver.org'
}
...
...
apps/jumpserver/settings.py
View file @
c7f86cdd
...
...
@@ -362,11 +362,6 @@ AUTH_LDAP_SEARCH_OU = 'ou=tech,dc=jumpserver,dc=org'
AUTH_LDAP_SEARCH_FILTER
=
'(cn=
%(user)
s)'
AUTH_LDAP_START_TLS
=
False
AUTH_LDAP_USER_ATTR_MAP
=
{
"username"
:
"cn"
,
"name"
:
"sn"
,
"email"
:
"mail"
}
AUTH_LDAP_USER_SEARCH_UNION
=
lambda
:
[
LDAPSearch
(
USER_SEARCH
,
ldap
.
SCOPE_SUBTREE
,
AUTH_LDAP_SEARCH_FILTER
)
for
USER_SEARCH
in
str
(
AUTH_LDAP_SEARCH_OU
)
.
split
(
"|"
)
]
AUTH_LDAP_USER_SEARCH
=
lambda
:
LDAPSearchUnion
(
*
AUTH_LDAP_USER_SEARCH_UNION
())
AUTH_LDAP_GROUP_SEARCH_OU
=
CONFIG
.
AUTH_LDAP_GROUP_SEARCH_OU
AUTH_LDAP_GROUP_SEARCH_FILTER
=
CONFIG
.
AUTH_LDAP_GROUP_SEARCH_FILTER
AUTH_LDAP_GROUP_SEARCH
=
LDAPSearch
(
...
...
@@ -377,7 +372,7 @@ AUTH_LDAP_CONNECTION_OPTIONS = {
}
AUTH_LDAP_GROUP_CACHE_TIMEOUT
=
1
AUTH_LDAP_ALWAYS_UPDATE_USER
=
True
AUTH_LDAP_BACKEND
=
'
django_auth_ldap.backend.LDAP
Backend'
AUTH_LDAP_BACKEND
=
'
authentication.ldap.backends.LDAPAuthorization
Backend'
if
AUTH_LDAP
:
AUTHENTICATION_BACKENDS
.
insert
(
0
,
AUTH_LDAP_BACKEND
)
...
...
@@ -510,3 +505,5 @@ SWAGGER_SETTINGS = {
},
}
# Default email suffix
EMAIL_SUFFIX
=
CONFIG
.
EMAIL_SUFFIX
requirements/requirements.txt
View file @
c7f86cdd
...
...
@@ -15,7 +15,7 @@ coreschema==0.0.4
cryptography==2.3.1
decorator==4.1.2
Django==2.1
django-auth-ldap==1.
3
.0
django-auth-ldap==1.
7
.0
django-bootstrap3==9.1.0
django-celery-beat==1.1.1
django-filter==2.0.0
...
...
@@ -76,4 +76,5 @@ aliyun-python-sdk-core-v3==2.9.1
aliyun-python-sdk-ecs==4.10.1
python-keycloak==0.13.3
python-keycloak-client==0.1.3
python-ldap==3.1.0
rest_condition==1.0.3
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment