mirror of
https://github.com/nitnelave/lldap.git
synced 2023-04-12 14:25:13 +00:00

Now the columns are checked and mapped to user columns, to avoid any ambiguity. Fixes #341.
222 lines
7.6 KiB
Rust
222 lines
7.6 KiB
Rust
use ldap3_proto::{
|
|
proto::LdapOp, LdapFilter, LdapPartialAttribute, LdapResultCode, LdapSearchResultEntry,
|
|
};
|
|
use tracing::{debug, info, instrument, warn};
|
|
|
|
use crate::domain::{
|
|
handler::{BackendHandler, Group, GroupRequestFilter, UserId, Uuid},
|
|
ldap::error::LdapError,
|
|
sql_tables::GroupColumn,
|
|
};
|
|
|
|
use super::{
|
|
error::LdapResult,
|
|
utils::{
|
|
expand_attribute_wildcards, get_user_id_from_distinguished_name, map_group_field, LdapInfo,
|
|
},
|
|
};
|
|
|
|
fn get_group_attribute(
|
|
group: &Group,
|
|
base_dn_str: &str,
|
|
attribute: &str,
|
|
user_filter: &Option<&UserId>,
|
|
ignored_group_attributes: &[String],
|
|
) -> Option<Vec<Vec<u8>>> {
|
|
let attribute = attribute.to_ascii_lowercase();
|
|
let attribute_values = match attribute.as_str() {
|
|
"objectclass" => vec![b"groupOfUniqueNames".to_vec()],
|
|
// Always returned as part of the base response.
|
|
"dn" | "distinguishedname" => return None,
|
|
"cn" | "uid" => vec![group.display_name.clone().into_bytes()],
|
|
"entryuuid" => vec![group.uuid.to_string().into_bytes()],
|
|
"member" | "uniquemember" => group
|
|
.users
|
|
.iter()
|
|
.filter(|u| user_filter.map(|f| *u == f).unwrap_or(true))
|
|
.map(|u| format!("uid={},ou=people,{}", u, base_dn_str).into_bytes())
|
|
.collect(),
|
|
"1.1" => return None,
|
|
// We ignore the operational attribute wildcard
|
|
"+" => return None,
|
|
"*" => {
|
|
panic!(
|
|
"Matched {}, * should have been expanded into attribute list and * removed",
|
|
attribute
|
|
)
|
|
}
|
|
_ => {
|
|
if !ignored_group_attributes.contains(&attribute) {
|
|
warn!(
|
|
r#"Ignoring unrecognized group attribute: {}\n\
|
|
To disable this warning, add it to "ignored_group_attributes" in the config."#,
|
|
attribute
|
|
);
|
|
}
|
|
return None;
|
|
}
|
|
};
|
|
if attribute_values.len() == 1 && attribute_values[0].is_empty() {
|
|
None
|
|
} else {
|
|
Some(attribute_values)
|
|
}
|
|
}
|
|
|
|
const ALL_GROUP_ATTRIBUTE_KEYS: &[&str] = &[
|
|
"objectclass",
|
|
"uid",
|
|
"cn",
|
|
"member",
|
|
"uniquemember",
|
|
"entryuuid",
|
|
];
|
|
|
|
fn make_ldap_search_group_result_entry(
|
|
group: Group,
|
|
base_dn_str: &str,
|
|
attributes: &[String],
|
|
user_filter: &Option<&UserId>,
|
|
ignored_group_attributes: &[String],
|
|
) -> LdapSearchResultEntry {
|
|
let expanded_attributes = expand_attribute_wildcards(attributes, ALL_GROUP_ATTRIBUTE_KEYS);
|
|
|
|
LdapSearchResultEntry {
|
|
dn: format!("cn={},ou=groups,{}", group.display_name, base_dn_str),
|
|
attributes: expanded_attributes
|
|
.iter()
|
|
.filter_map(|a| {
|
|
let values = get_group_attribute(
|
|
&group,
|
|
base_dn_str,
|
|
a,
|
|
user_filter,
|
|
ignored_group_attributes,
|
|
)?;
|
|
Some(LdapPartialAttribute {
|
|
atype: a.to_string(),
|
|
vals: values,
|
|
})
|
|
})
|
|
.collect::<Vec<LdapPartialAttribute>>(),
|
|
}
|
|
}
|
|
|
|
fn convert_group_filter(
|
|
ldap_info: &LdapInfo,
|
|
filter: &LdapFilter,
|
|
) -> LdapResult<GroupRequestFilter> {
|
|
let rec = |f| convert_group_filter(ldap_info, f);
|
|
match filter {
|
|
LdapFilter::Equality(field, value) => {
|
|
let field = &field.to_ascii_lowercase();
|
|
let value = &value.to_ascii_lowercase();
|
|
match field.as_str() {
|
|
"member" | "uniquemember" => {
|
|
let user_name = get_user_id_from_distinguished_name(
|
|
value,
|
|
&ldap_info.base_dn,
|
|
&ldap_info.base_dn_str,
|
|
)?;
|
|
Ok(GroupRequestFilter::Member(user_name))
|
|
}
|
|
"objectclass" => match value.as_str() {
|
|
"groupofuniquenames" | "groupofnames" => Ok(GroupRequestFilter::And(vec![])),
|
|
_ => Ok(GroupRequestFilter::Not(Box::new(GroupRequestFilter::And(
|
|
vec![],
|
|
)))),
|
|
},
|
|
_ => match map_group_field(field) {
|
|
Some(GroupColumn::DisplayName) => {
|
|
Ok(GroupRequestFilter::DisplayName(value.to_string()))
|
|
}
|
|
Some(GroupColumn::Uuid) => Ok(GroupRequestFilter::Uuid(
|
|
Uuid::try_from(value.as_str()).map_err(|e| LdapError {
|
|
code: LdapResultCode::InappropriateMatching,
|
|
message: format!("Invalid UUID: {:#}", e),
|
|
})?,
|
|
)),
|
|
_ => {
|
|
if !ldap_info.ignored_group_attributes.contains(field) {
|
|
warn!(
|
|
r#"Ignoring unknown group attribute "{:?}" in filter.\n\
|
|
To disable this warning, add it to "ignored_group_attributes" in the config."#,
|
|
field
|
|
);
|
|
}
|
|
Ok(GroupRequestFilter::Not(Box::new(GroupRequestFilter::And(
|
|
vec![],
|
|
))))
|
|
}
|
|
},
|
|
}
|
|
}
|
|
LdapFilter::And(filters) => Ok(GroupRequestFilter::And(
|
|
filters.iter().map(rec).collect::<LdapResult<_>>()?,
|
|
)),
|
|
LdapFilter::Or(filters) => Ok(GroupRequestFilter::Or(
|
|
filters.iter().map(rec).collect::<LdapResult<_>>()?,
|
|
)),
|
|
LdapFilter::Not(filter) => Ok(GroupRequestFilter::Not(Box::new(rec(filter)?))),
|
|
LdapFilter::Present(field) => {
|
|
let field = &field.to_ascii_lowercase();
|
|
if field == "objectclass"
|
|
|| field == "dn"
|
|
|| field == "distinguishedname"
|
|
|| ALL_GROUP_ATTRIBUTE_KEYS.contains(&field.as_str())
|
|
{
|
|
Ok(GroupRequestFilter::And(vec![]))
|
|
} else {
|
|
Ok(GroupRequestFilter::Not(Box::new(GroupRequestFilter::And(
|
|
vec![],
|
|
))))
|
|
}
|
|
}
|
|
_ => Err(LdapError {
|
|
code: LdapResultCode::UnwillingToPerform,
|
|
message: format!("Unsupported group filter: {:?}", filter),
|
|
}),
|
|
}
|
|
}
|
|
|
|
#[instrument(skip_all, level = "debug")]
|
|
pub async fn get_groups_list<Backend: BackendHandler>(
|
|
ldap_info: &LdapInfo,
|
|
ldap_filter: &LdapFilter,
|
|
attributes: &[String],
|
|
base: &str,
|
|
user_filter: &Option<&UserId>,
|
|
backend: &mut Backend,
|
|
) -> LdapResult<Vec<LdapOp>> {
|
|
debug!(?ldap_filter);
|
|
let filter = convert_group_filter(ldap_info, ldap_filter)?;
|
|
let parsed_filters = match user_filter {
|
|
None => filter,
|
|
Some(u) => {
|
|
info!("Unprivileged search, limiting results");
|
|
GroupRequestFilter::And(vec![filter, GroupRequestFilter::Member((*u).clone())])
|
|
}
|
|
};
|
|
debug!(?parsed_filters);
|
|
let groups = backend
|
|
.list_groups(Some(parsed_filters))
|
|
.await
|
|
.map_err(|e| LdapError {
|
|
code: LdapResultCode::Other,
|
|
message: format!(r#"Error while listing groups "{}": {:#}"#, base, e),
|
|
})?;
|
|
|
|
Ok(groups
|
|
.into_iter()
|
|
.map(|u| {
|
|
LdapOp::SearchResultEntry(make_ldap_search_group_result_entry(
|
|
u,
|
|
&ldap_info.base_dn_str,
|
|
attributes,
|
|
user_filter,
|
|
&ldap_info.ignored_group_attributes,
|
|
))
|
|
})
|
|
.collect::<Vec<_>>())
|
|
}
|