etesync-server/myauth/ldap.py

95 lines
3.2 KiB
Python
Raw Normal View History

import logging
from django.utils import timezone
from django.conf import settings
from django.core.exceptions import PermissionDenied
from rest_framework.permissions import BasePermission
import ldap
def ldap_setting(name, default):
2020-11-14 15:44:45 +00:00
"""Wrapper around django.conf.settings"""
return getattr(settings, f"LDAP_{name}", default)
class LDAPConnection:
__instance__ = None
2020-11-14 15:44:45 +00:00
__user_cache = {} # Username -> Valid until
@staticmethod
def get_instance():
2020-11-14 15:44:45 +00:00
"""To get a Singleton"""
if not LDAPConnection.__instance__:
return LDAPConnection()
else:
return LDAPConnection.__instance__
def __init__(self):
# Cache some settings
2020-11-14 15:44:45 +00:00
self.__LDAP_FILTER = ldap_setting("FILTER", "")
self.__LDAP_SEARCH_BASE = ldap_setting("SEARCH_BASE", "")
2020-11-14 15:44:45 +00:00
self.__ldap_connection = ldap.initialize(ldap_setting("SERVER", ""))
try:
2020-11-14 15:44:45 +00:00
self.__ldap_connection.simple_bind_s(ldap_setting("BIND_DN", ""), ldap_setting("BIND_PW", ""))
except ldap.LDAPError as err:
2020-11-14 15:44:45 +00:00
logging.error(f"LDAP Error occuring during bind: {err.desc}")
def __is_cache_valid(self, username):
2020-11-14 15:44:45 +00:00
"""Returns True if the cache entry is still valid. Returns False otherwise."""
if username in self.__user_cache:
if timezone.now() <= self.__user_cache[username]:
# Cache entry is still valid
return True
return False
def __remove_cache(self, username):
del self.__user_cache[username]
def has_user(self, username):
2020-11-14 15:44:45 +00:00
"""
Since we don't care about the password and so authentication
another way, all we care about is whether the user exists.
2020-11-14 15:44:45 +00:00
"""
if self.__is_cache_valid(username):
return True
if username in self.__user_cache:
self.__remove_cache(username)
2020-11-14 15:44:45 +00:00
filterstr = self.__LDAP_FILTER.replace("%s", username)
try:
2020-11-14 15:44:45 +00:00
result = self.__ldap_connection.search_s(self.__LDAP_SEARCH_BASE, ldap.SCOPE_SUBTREE, filterstr=filterstr)
except ldap.NO_RESULTS_RETURNED:
# We handle the specific error first and the the generic error, as
# we may expect ldap.NO_RESULTS_RETURNED, but not any other error
return False
except ldap.LDAPError as err:
2020-11-14 15:44:45 +00:00
logging.error(f"Error occured while performing an LDAP query: {err.desc}")
return False
if len(result) == 1:
self.__user_cache[username] = timezone.now() + timezone.timedelta(hours=1)
return True
return False
2020-11-14 15:44:45 +00:00
class LDAPUserExists(BasePermission):
2020-11-14 15:44:45 +00:00
"""
A permission check which first checks with the LDAP directory if the user
exists.
2020-11-14 15:44:45 +00:00
"""
def has_permission(self, request, view):
2020-11-10 10:28:43 +00:00
return LDAPConnection.get_instance().has_user(request.user.username)
2020-11-14 15:44:45 +00:00
def create_user(*args, **kwargs):
2020-11-14 15:44:45 +00:00
"""
A create_user function which first checks if the user already exists in the
configured LDAP directory.
2020-11-14 15:44:45 +00:00
"""
if not LDAPConnection.get_instance().has_user(kwargs["username"]):
raise PermissionDenied("User not in the LDAP directory.")
return User.objects.create_user(*args, **kwargs)