Rename to radicale3_auth_ldap
This commit is contained in:
132
radicale3_auth_ldap/__init__.py
Normal file
132
radicale3_auth_ldap/__init__.py
Normal file
@@ -0,0 +1,132 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# This file is part of Radicale Server - Calendar Server
|
||||
# Copyright © 2011 Corentin Le Bail
|
||||
# Copyright © 2011-2013 Guillaume Ayoub
|
||||
# Copyright © 2015 Raoul Thill
|
||||
# Copyright © 2017 Marco Huenseler
|
||||
#
|
||||
# This library is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This library is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with Radicale. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
"""
|
||||
LDAP authentication.
|
||||
Authentication based on the ``ldap3`` module
|
||||
(https://github.com/cannatag/ldap3/).
|
||||
"""
|
||||
|
||||
|
||||
import ldap3
|
||||
import ldap3.core.exceptions
|
||||
|
||||
from radicale.auth import BaseAuth
|
||||
from radicale.log import logger
|
||||
|
||||
import radicale3_auth_ldap.ldap3imports
|
||||
|
||||
PLUGIN_CONFIG_SCHEMA = {"auth": {
|
||||
"ldap_url": {
|
||||
"value": "ldap://localhost:389",
|
||||
"type": str},
|
||||
"ldap_base": {
|
||||
"value": "ou=Users",
|
||||
"type": str},
|
||||
"ldap_attribute": {
|
||||
"value": "uid",
|
||||
"type": str},
|
||||
"ldap_filter": {
|
||||
"value": "(objectClass=*)",
|
||||
"type": str},
|
||||
"ldap_binddn": {
|
||||
"value": None,
|
||||
"type": str},
|
||||
"ldap_password": {
|
||||
"value": None,
|
||||
"type": str},
|
||||
"ldap_scope": {
|
||||
"value": "SUBTREE",
|
||||
"type": str},
|
||||
"ldap_support_extended": {
|
||||
"value": True,
|
||||
"type": bool}}}
|
||||
|
||||
class Auth(BaseAuth):
|
||||
def __init__(self, configuration):
|
||||
super().__init__(configuration.copy(PLUGIN_CONFIG_SCHEMA))
|
||||
|
||||
def login(self, user, password):
|
||||
"""Check if ``user``/``password`` couple is valid."""
|
||||
SERVER = ldap3.Server(self.configuration.get("auth", "ldap_url"))
|
||||
BASE = self.configuration.get("auth", "ldap_base")
|
||||
ATTRIBUTE = self.configuration.get("auth", "ldap_attribute")
|
||||
FILTER = self.configuration.get("auth", "ldap_filter")
|
||||
BINDDN = self.configuration.get("auth", "ldap_binddn")
|
||||
PASSWORD = self.configuration.get("auth", "ldap_password")
|
||||
SCOPE = self.configuration.get("auth", "ldap_scope")
|
||||
SUPPORT_EXTENDED = self.configuration.get("auth", "ldap_support_extended")
|
||||
|
||||
if BINDDN and PASSWORD:
|
||||
conn = ldap3.Connection(SERVER, BINDDN, PASSWORD)
|
||||
else:
|
||||
conn = ldap3.Connection(SERVER)
|
||||
conn.bind()
|
||||
|
||||
try:
|
||||
logger.debug("LDAP whoami: %s" % conn.extend.standard.who_am_i())
|
||||
except Exception as err:
|
||||
logger.debug("LDAP error: %s" % err)
|
||||
|
||||
distinguished_name = "%s=%s" % (ATTRIBUTE, ldap3imports.escape_attribute_value(user))
|
||||
logger.debug("LDAP bind for %s in base %s" % (distinguished_name, BASE))
|
||||
|
||||
if FILTER:
|
||||
filter_string = "(&(%s)%s)" % (distinguished_name, FILTER)
|
||||
else:
|
||||
filter_string = distinguished_name
|
||||
logger.debug("LDAP filter: %s" % filter_string)
|
||||
|
||||
conn.search(search_base=BASE,
|
||||
search_scope=SCOPE,
|
||||
search_filter=filter_string,
|
||||
attributes=[ATTRIBUTE])
|
||||
|
||||
users = conn.response
|
||||
|
||||
if users:
|
||||
user_dn = users[0]['dn']
|
||||
uid = users[0]['attributes'][ATTRIBUTE]
|
||||
logger.debug("LDAP user %s (%s) found" % (uid, user_dn))
|
||||
try:
|
||||
conn = ldap3.Connection(SERVER, user_dn, password)
|
||||
conn.bind()
|
||||
logger.debug(conn.result)
|
||||
if SUPPORT_EXTENDED:
|
||||
whoami = conn.extend.standard.who_am_i()
|
||||
logger.debug("LDAP whoami: %s" % whoami)
|
||||
else:
|
||||
logger.debug("LDAP skip extended: call whoami")
|
||||
whoami = conn.result['result'] == 0
|
||||
if whoami:
|
||||
logger.debug("LDAP bind OK")
|
||||
return uid[0]
|
||||
else:
|
||||
logger.debug("LDAP bind failed")
|
||||
return ""
|
||||
except ldap3.core.exceptions.LDAPInvalidCredentialsResult:
|
||||
logger.debug("LDAP invalid credentials")
|
||||
except Exception as err:
|
||||
logger.debug("LDAP error %s" % err)
|
||||
return ""
|
||||
else:
|
||||
logger.debug("LDAP user %s not found" % user)
|
||||
return ""
|
||||
Reference in New Issue
Block a user