auth_pam.py
170 lines
| 6.0 KiB
| text/x-python
|
PythonLexer
r5088 | # Copyright (C) 2012-2023 RhodeCode GmbH | |||
r1 | # | |||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
r1454 | ||||
r1 | """ | |||
RhodeCode authentication library for PAM | ||||
""" | ||||
import colander | ||||
import grp | ||||
import logging | ||||
import pam | ||||
import pwd | ||||
import re | ||||
import socket | ||||
r1454 | from rhodecode.translation import _ | |||
from rhodecode.authentication.base import ( | ||||
RhodeCodeExternalAuthPlugin, hybrid_property) | ||||
r5397 | from rhodecode.authentication.schema import AuthnPluginSettingsSchemaBase, TwoFactorAuthnPluginSettingsSchemaMixin | |||
r1 | from rhodecode.authentication.routes import AuthnPluginResourceBase | |||
r55 | from rhodecode.lib.colander_utils import strip_whitespace | |||
r1 | ||||
log = logging.getLogger(__name__) | ||||
r3253 | def plugin_factory(plugin_id, *args, **kwargs): | |||
r1 | """ | |||
Factory function that is called during plugin discovery. | ||||
It returns the plugin instance. | ||||
""" | ||||
plugin = RhodeCodeAuthPlugin(plugin_id) | ||||
return plugin | ||||
class PamAuthnResource(AuthnPluginResourceBase): | ||||
pass | ||||
r5397 | class PamSettingsSchema(TwoFactorAuthnPluginSettingsSchemaMixin, AuthnPluginSettingsSchemaBase): | |||
r1 | service = colander.SchemaNode( | |||
colander.String(), | ||||
default='login', | ||||
description=_('PAM service name to use for authentication.'), | ||||
r55 | preparer=strip_whitespace, | |||
r1 | title=_('PAM service name'), | |||
widget='string') | ||||
gecos = colander.SchemaNode( | ||||
colander.String(), | ||||
r4973 | default=r'(?P<last_name>.+),\s*(?P<first_name>\w+)', | |||
r1 | description=_('Regular expression for extracting user name/email etc. ' | |||
'from Unix userinfo.'), | ||||
r55 | preparer=strip_whitespace, | |||
r1 | title=_('Gecos Regex'), | |||
widget='string') | ||||
class RhodeCodeAuthPlugin(RhodeCodeExternalAuthPlugin): | ||||
r3246 | uid = 'pam' | |||
r1 | # PAM authentication can be slow. Repository operations involve a lot of | |||
# auth calls. Little caching helps speedup push/pull operations significantly | ||||
AUTH_CACHE_TTL = 4 | ||||
def includeme(self, config): | ||||
config.add_authn_plugin(self) | ||||
config.add_authn_resource(self.get_id(), PamAuthnResource(self)) | ||||
config.add_view( | ||||
'rhodecode.authentication.views.AuthnPluginViewBase', | ||||
attr='settings_get', | ||||
r1282 | renderer='rhodecode:templates/admin/auth/plugin_settings.mako', | |||
r1 | request_method='GET', | |||
route_name='auth_home', | ||||
context=PamAuthnResource) | ||||
config.add_view( | ||||
'rhodecode.authentication.views.AuthnPluginViewBase', | ||||
attr='settings_post', | ||||
r1282 | renderer='rhodecode:templates/admin/auth/plugin_settings.mako', | |||
r1 | request_method='POST', | |||
route_name='auth_home', | ||||
context=PamAuthnResource) | ||||
r4545 | def get_display_name(self, load_from_settings=False): | |||
r1 | return _('PAM') | |||
r3232 | @classmethod | |||
def docs(cls): | ||||
return "https://docs.rhodecode.com/RhodeCode-Enterprise/auth/auth-pam.html" | ||||
r1 | @hybrid_property | |||
def name(self): | ||||
r5094 | return "pam" | |||
r1 | ||||
def get_settings_schema(self): | ||||
return PamSettingsSchema() | ||||
def use_fake_password(self): | ||||
return True | ||||
def auth(self, userobj, username, password, settings, **kwargs): | ||||
if not username or not password: | ||||
log.debug('Empty username or password skipping...') | ||||
return None | ||||
r2918 | _pam = pam.pam() | |||
auth_result = _pam.authenticate(username, password, settings["service"]) | ||||
r1 | ||||
if not auth_result: | ||||
r3061 | log.error("PAM was unable to authenticate user: %s", username) | |||
r1 | return None | |||
r3061 | log.debug('Got PAM response %s', auth_result) | |||
r1 | ||||
# old attrs fetched from RhodeCode database | ||||
r5094 | default_email = "{}@{}".format(username, socket.gethostname()) | |||
r1 | admin = getattr(userobj, 'admin', False) | |||
active = getattr(userobj, 'active', True) | ||||
email = getattr(userobj, 'email', '') or default_email | ||||
username = getattr(userobj, 'username', username) | ||||
firstname = getattr(userobj, 'firstname', '') | ||||
lastname = getattr(userobj, 'lastname', '') | ||||
extern_type = getattr(userobj, 'extern_type', '') | ||||
user_attrs = { | ||||
'username': username, | ||||
'firstname': firstname, | ||||
'lastname': lastname, | ||||
'groups': [g.gr_name for g in grp.getgrall() | ||||
if username in g.gr_mem], | ||||
r2495 | 'user_group_sync': True, | |||
r1 | 'email': email, | |||
'admin': admin, | ||||
'active': active, | ||||
'active_from_extern': None, | ||||
'extern_name': username, | ||||
'extern_type': extern_type, | ||||
} | ||||
try: | ||||
user_data = pwd.getpwnam(username) | ||||
regex = settings["gecos"] | ||||
match = re.search(regex, user_data.pw_gecos) | ||||
if match: | ||||
user_attrs["firstname"] = match.group('first_name') | ||||
user_attrs["lastname"] = match.group('last_name') | ||||
except Exception: | ||||
log.warning("Cannot extract additional info for PAM user") | ||||
pass | ||||
r12 | log.debug("pamuser: %s", user_attrs) | |||
r4816 | log.info('user `%s` authenticated correctly', user_attrs['username'], | |||
r4818 | extra={"action": "user_auth_ok", "auth_module": "auth_pam", "username": user_attrs["username"]}) | |||
r1 | return user_attrs | |||
r3240 | ||||
def includeme(config): | ||||
r5094 | plugin_id = f'egg:rhodecode-enterprise-ce#{RhodeCodeAuthPlugin.uid}' | |||
r3240 | plugin_factory(plugin_id).includeme(config) | |||