mirror of
https://github.com/janeczku/calibre-web
synced 2024-11-01 15:46:21 +00:00
64e4a1155c
Bugfix missing bleach tags (#3080) Bugfix pdfreader
171 lines
5.9 KiB
Python
171 lines
5.9 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
# This file is part of the Calibre-Web (https://github.com/janeczku/calibre-web)
|
|
# Copyright (C) 2018-2019 OzzieIsaacs, pwr
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import base64
|
|
|
|
from flask_simpleldap import LDAP, LDAPException
|
|
from flask_simpleldap import ldap as pyLDAP
|
|
from flask import current_app
|
|
from .. import constants, logger
|
|
|
|
try:
|
|
from ldap.pkginfo import __version__ as ldapVersion
|
|
except ImportError:
|
|
pass
|
|
|
|
log = logger.create()
|
|
|
|
|
|
class LDAPLogger(object):
|
|
|
|
@staticmethod
|
|
def write(message):
|
|
try:
|
|
log.debug(message.strip("\n").replace("\n", ""))
|
|
except Exception:
|
|
log.debug("Logging Error")
|
|
|
|
|
|
class mySimpleLDap(LDAP):
|
|
|
|
@staticmethod
|
|
def init_app(app):
|
|
super(mySimpleLDap, mySimpleLDap).init_app(app)
|
|
app.config.setdefault('LDAP_LOGLEVEL', 0)
|
|
|
|
@property
|
|
def initialize(self):
|
|
"""Initialize a connection to the LDAP server.
|
|
|
|
:return: LDAP connection object.
|
|
"""
|
|
try:
|
|
log_level = 2 if current_app.config['LDAP_LOGLEVEL'] == logger.logging.DEBUG else 0
|
|
conn = pyLDAP.initialize('{0}://{1}:{2}'.format(
|
|
current_app.config['LDAP_SCHEMA'],
|
|
current_app.config['LDAP_HOST'],
|
|
current_app.config['LDAP_PORT']), trace_level=log_level, trace_file=LDAPLogger())
|
|
conn.set_option(pyLDAP.OPT_NETWORK_TIMEOUT,
|
|
current_app.config['LDAP_TIMEOUT'])
|
|
conn = self._set_custom_options(conn)
|
|
conn.protocol_version = pyLDAP.VERSION3
|
|
if current_app.config['LDAP_USE_TLS']:
|
|
conn.start_tls_s()
|
|
return conn
|
|
except pyLDAP.LDAPError as e:
|
|
raise LDAPException(self.error(e.args))
|
|
|
|
|
|
_ldap = mySimpleLDap()
|
|
|
|
|
|
def init_app(app, config):
|
|
if config.config_login_type != constants.LOGIN_LDAP:
|
|
return
|
|
|
|
app.config['LDAP_HOST'] = config.config_ldap_provider_url
|
|
app.config['LDAP_PORT'] = config.config_ldap_port
|
|
app.config['LDAP_CUSTOM_OPTIONS'] = {pyLDAP.OPT_REFERRALS: 0}
|
|
if config.config_ldap_encryption == 2:
|
|
app.config['LDAP_SCHEMA'] = 'ldaps'
|
|
else:
|
|
app.config['LDAP_SCHEMA'] = 'ldap'
|
|
if config.config_ldap_authentication > constants.LDAP_AUTH_ANONYMOUS:
|
|
if config.config_ldap_authentication > constants.LDAP_AUTH_UNAUTHENTICATE:
|
|
if config.config_ldap_serv_password_e is None:
|
|
config.config_ldap_serv_password_e = ''
|
|
app.config['LDAP_PASSWORD'] = config.config_ldap_serv_password_e
|
|
else:
|
|
app.config['LDAP_PASSWORD'] = ""
|
|
app.config['LDAP_USERNAME'] = config.config_ldap_serv_username
|
|
else:
|
|
app.config['LDAP_USERNAME'] = ""
|
|
app.config['LDAP_PASSWORD'] = ""
|
|
if bool(config.config_ldap_cert_path):
|
|
app.config['LDAP_CUSTOM_OPTIONS'].update({
|
|
pyLDAP.OPT_X_TLS_REQUIRE_CERT: pyLDAP.OPT_X_TLS_DEMAND,
|
|
pyLDAP.OPT_X_TLS_CACERTFILE: config.config_ldap_cacert_path,
|
|
pyLDAP.OPT_X_TLS_CERTFILE: config.config_ldap_cert_path,
|
|
pyLDAP.OPT_X_TLS_KEYFILE: config.config_ldap_key_path,
|
|
pyLDAP.OPT_X_TLS_NEWCTX: 0
|
|
})
|
|
|
|
app.config['LDAP_BASE_DN'] = config.config_ldap_dn
|
|
app.config['LDAP_USER_OBJECT_FILTER'] = config.config_ldap_user_object
|
|
|
|
app.config['LDAP_USE_TLS'] = bool(config.config_ldap_encryption == 1)
|
|
app.config['LDAP_USE_SSL'] = bool(config.config_ldap_encryption == 2)
|
|
app.config['LDAP_OPENLDAP'] = bool(config.config_ldap_openldap)
|
|
app.config['LDAP_GROUP_OBJECT_FILTER'] = config.config_ldap_group_object_filter
|
|
app.config['LDAP_GROUP_MEMBERS_FIELD'] = config.config_ldap_group_members_field
|
|
app.config['LDAP_LOGLEVEL'] = config.config_log_level
|
|
try:
|
|
_ldap.init_app(app)
|
|
except ValueError:
|
|
if bool(config.config_ldap_cert_path):
|
|
app.config['LDAP_CUSTOM_OPTIONS'].pop(pyLDAP.OPT_X_TLS_NEWCTX)
|
|
try:
|
|
_ldap.init_app(app)
|
|
except RuntimeError as e:
|
|
log.error(e)
|
|
except RuntimeError as e:
|
|
log.error(e)
|
|
|
|
|
|
def get_object_details(user=None, query_filter=None):
|
|
return _ldap.get_object_details(user, query_filter=query_filter)
|
|
|
|
|
|
def bind():
|
|
return _ldap.bind()
|
|
|
|
|
|
def get_group_members(group):
|
|
return _ldap.get_group_members(group)
|
|
|
|
|
|
def basic_auth_required(func):
|
|
return _ldap.basic_auth_required(func)
|
|
|
|
|
|
def bind_user(username, password):
|
|
'''Attempts a LDAP login.
|
|
|
|
:returns: True if login succeeded, False if login failed, None if server unavailable.
|
|
'''
|
|
try:
|
|
if _ldap.get_object_details(username):
|
|
result = _ldap.bind_user(username, password)
|
|
log.debug("LDAP login '%s': %r", username, result)
|
|
return result is not None, None
|
|
return None, None # User not found
|
|
except (TypeError, AttributeError, KeyError) as ex:
|
|
error = ("LDAP bind_user: %s" % ex)
|
|
return None, error
|
|
except LDAPException as ex:
|
|
if ex.message == 'Invalid credentials':
|
|
error = "LDAP admin login failed"
|
|
return None, error
|
|
if ex.message == "Can't contact LDAP server":
|
|
# log.warning('LDAP Server down: %s', ex)
|
|
error = ('LDAP Server down: %s' % ex)
|
|
return None, error
|
|
else:
|
|
error = ('LDAP Server error: %s' % ex.message)
|
|
return None, error
|