PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/auth/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/auth/ldap.py |
""" Provide authentication using simple LDAP binds :depends: - ldap Python module """ import itertools import logging from jinja2 import Environment import salt.utils.data import salt.utils.stringutils from salt.exceptions import CommandExecutionError, SaltInvocationError log = logging.getLogger(__name__) try: # pylint: disable=no-name-in-module import ldap import ldap.filter import ldap.modlist HAS_LDAP = True # pylint: enable=no-name-in-module except ImportError: HAS_LDAP = False # Defaults, override in master config __defopts__ = { "auth.ldap.basedn": "", "auth.ldap.uri": "", "auth.ldap.server": "localhost", "auth.ldap.port": "389", "auth.ldap.starttls": False, "auth.ldap.tls": False, "auth.ldap.no_verify": False, "auth.ldap.anonymous": False, "auth.ldap.scope": 2, "auth.ldap.groupou": "Groups", "auth.ldap.accountattributename": "memberUid", "auth.ldap.groupattribute": "memberOf", "auth.ldap.persontype": "person", "auth.ldap.groupclass": "posixGroup", "auth.ldap.activedirectory": False, "auth.ldap.freeipa": False, "auth.ldap.minion_stripdomains": [], } def _config(key, mandatory=True, opts=None): """ Return a value for 'name' from master config file options or defaults. """ try: if opts: value = opts[f"auth.ldap.{key}"] else: value = __opts__[f"auth.ldap.{key}"] except KeyError: try: value = __defopts__[f"auth.ldap.{key}"] except KeyError: if mandatory: msg = f"missing auth.ldap.{key} in master config" raise SaltInvocationError(msg) return False return value def _render_template(param, username): """ Render config template, substituting username where found. """ env = Environment() template = env.from_string(param) variables = {"username": username} return template.render(variables) class _LDAPConnection: """ Setup an LDAP connection. """ def __init__( self, uri, server, port, starttls, tls, no_verify, binddn, bindpw, anonymous, accountattributename, activedirectory=False, ): """ Bind to an LDAP directory using passed credentials. """ self.uri = uri self.server = server self.port = port self.starttls = starttls self.tls = tls self.binddn = binddn self.bindpw = bindpw if not HAS_LDAP: raise CommandExecutionError( "LDAP connection could not be made, the python-ldap module is " "not installed. Install python-ldap to use LDAP external auth." ) if self.starttls and self.tls: raise CommandExecutionError( "Cannot bind with both starttls and tls enabled." "Please enable only one of the protocols" ) schema = "ldaps" if tls else "ldap" if self.uri == "": self.uri = f"{schema}://{self.server}:{self.port}" try: if no_verify: ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_NEVER) self.ldap = ldap.initialize(f"{self.uri}") self.ldap.protocol_version = 3 # ldap.VERSION3 self.ldap.set_option(ldap.OPT_REFERRALS, 0) # Needed for AD if not anonymous: if not self.bindpw: raise CommandExecutionError( "LDAP bind password is not set: password cannot be empty if auth.ldap.anonymous is False" ) if self.starttls: self.ldap.start_tls_s() self.ldap.simple_bind_s(self.binddn, self.bindpw) except Exception as ldap_error: # pylint: disable=broad-except raise CommandExecutionError( "Failed to bind to LDAP server {} as {}: {}".format( self.uri, self.binddn, ldap_error ) ) def _bind_for_search(anonymous=False, opts=None): """ Bind with binddn and bindpw only for searching LDAP :param anonymous: Try binding anonymously :param opts: Pass in when __opts__ is not available :return: LDAPConnection object """ # Get config params; create connection dictionary connargs = {} # config params (auth.ldap.*) params = { "mandatory": [ "uri", "server", "port", "starttls", "tls", "no_verify", "anonymous", "accountattributename", "activedirectory", ], "additional": [ "binddn", "bindpw", "filter", "groupclass", "auth_by_group_membership_only", ], } paramvalues = {} for param in params["mandatory"]: paramvalues[param] = _config(param, opts=opts) for param in params["additional"]: paramvalues[param] = _config(param, mandatory=False, opts=opts) paramvalues["anonymous"] = anonymous # Only add binddn/bindpw to the connargs when they're set, as they're not # mandatory for initializing the LDAP object, but if they're provided # initially, a bind attempt will be done during the initialization to # validate them if paramvalues["binddn"]: connargs["binddn"] = paramvalues["binddn"] if paramvalues["bindpw"]: params["mandatory"].append("bindpw") for name in params["mandatory"]: connargs[name] = paramvalues[name] if not paramvalues["anonymous"]: if paramvalues["binddn"] and paramvalues["bindpw"]: # search for the user's DN to be used for the actual authentication return _LDAPConnection(**connargs).ldap def _bind(username, password, anonymous=False, opts=None): """ Authenticate via an LDAP bind """ # Get config params; create connection dictionary basedn = _config("basedn", opts=opts) scope = _config("scope", opts=opts) connargs = {} # config params (auth.ldap.*) params = { "mandatory": [ "uri", "server", "port", "starttls", "tls", "no_verify", "anonymous", "accountattributename", "activedirectory", ], "additional": [ "binddn", "bindpw", "filter", "groupclass", "auth_by_group_membership_only", ], } paramvalues = {} for param in params["mandatory"]: paramvalues[param] = _config(param, opts=opts) for param in params["additional"]: paramvalues[param] = _config(param, mandatory=False, opts=opts) paramvalues["anonymous"] = anonymous if paramvalues["binddn"]: # the binddn can also be composited, e.g. # - {{ username }}@domain.com # - cn={{ username }},ou=users,dc=company,dc=tld # so make sure to render it first before using it paramvalues["binddn"] = _render_template(paramvalues["binddn"], username) paramvalues["binddn"] = ldap.filter.escape_filter_chars(paramvalues["binddn"]) if paramvalues["filter"]: escaped_username = ldap.filter.escape_filter_chars(username) paramvalues["filter"] = _render_template( paramvalues["filter"], escaped_username ) # Only add binddn/bindpw to the connargs when they're set, as they're not # mandatory for initializing the LDAP object, but if they're provided # initially, a bind attempt will be done during the initialization to # validate them if paramvalues["binddn"]: connargs["binddn"] = paramvalues["binddn"] if paramvalues["bindpw"]: params["mandatory"].append("bindpw") for name in params["mandatory"]: connargs[name] = paramvalues[name] if not paramvalues["anonymous"]: if paramvalues["binddn"] and paramvalues["bindpw"]: # search for the user's DN to be used for the actual authentication _ldap = _LDAPConnection(**connargs).ldap log.debug( "Running LDAP user dn search with filter:%s, dn:%s, scope:%s", paramvalues["filter"], basedn, scope, ) result = _ldap.search_s(basedn, int(scope), paramvalues["filter"]) if not result: log.warning("Unable to find user %s", username) return False elif len(result) > 1: # Active Directory returns something odd. Though we do not # chase referrals (ldap.set_option(ldap.OPT_REFERRALS, 0) above) # it still appears to return several entries for other potential # sources for a match. All these sources have None for the # CN (ldap array return items are tuples: (cn, ldap entry)) # But the actual CNs are at the front of the list. # So with some list comprehension magic, extract the first tuple # entry from all the results, create a list from those, # and count the ones that are not None. If that total is more than one # we need to error out because the ldap filter isn't narrow enough. cns = [tup[0] for tup in result] total_not_none = sum(1 for c in cns if c is not None) if total_not_none > 1: log.error( "LDAP lookup found multiple results for user %s", username ) return False elif total_not_none == 0: log.error( "LDAP lookup--unable to find CN matching user %s", username ) return False connargs["binddn"] = result[0][0] if paramvalues["binddn"] and not paramvalues["bindpw"]: connargs["binddn"] = paramvalues["binddn"] elif paramvalues["binddn"] and not paramvalues["bindpw"]: connargs["binddn"] = paramvalues["binddn"] # Update connection dictionary with the user's password connargs["bindpw"] = password # Attempt bind with user dn and password if paramvalues["anonymous"]: log.debug("Attempting anonymous LDAP bind") else: log.debug("Attempting LDAP bind with user dn: %s", connargs["binddn"]) try: ldap_conn = _LDAPConnection(**connargs).ldap except Exception: # pylint: disable=broad-except connargs.pop("bindpw", None) # Don't log the password log.error("Failed to authenticate user dn via LDAP: %s", connargs) log.debug("Error authenticating user dn via LDAP:", exc_info=True) return False log.debug("Successfully authenticated user dn via LDAP: %s", connargs["binddn"]) return ldap_conn def auth(username, password): """ Simple LDAP auth """ if not HAS_LDAP: log.error("LDAP authentication requires python-ldap module") return False bind = None # If bind credentials are configured, verify that we receive a valid bind if _config("binddn", mandatory=False) and _config("bindpw", mandatory=False): search_bind = _bind_for_search(anonymous=_config("anonymous", mandatory=False)) # If username & password are not None, attempt to verify they are valid if search_bind and username and password: bind = _bind( username, password, anonymous=_config("auth_by_group_membership_only", mandatory=False) and _config("anonymous", mandatory=False), ) else: bind = _bind( username, password, anonymous=_config("auth_by_group_membership_only", mandatory=False) and _config("anonymous", mandatory=False), ) if bind: log.debug("LDAP authentication successful") return bind log.error("LDAP _bind authentication FAILED") return False def groups(username, **kwargs): """ Authenticate against an LDAP group Behavior is highly dependent on if Active Directory is in use. AD handles group membership very differently than OpenLDAP. See the :ref:`External Authentication <acl-eauth>` documentation for a thorough discussion of available parameters for customizing the search. OpenLDAP allows you to search for all groups in the directory and returns members of those groups. Then we check against the username entered. """ group_list = [] # If bind credentials are configured, use them instead of user's if _config("binddn", mandatory=False) and _config("bindpw", mandatory=False): bind = _bind_for_search(anonymous=_config("anonymous", mandatory=False)) else: bind = _bind( username, kwargs.get("password", ""), anonymous=_config("auth_by_group_membership_only", mandatory=False) and _config("anonymous", mandatory=False), ) if bind: log.debug("ldap bind to determine group membership succeeded!") if _config("activedirectory"): try: get_user_dn_search = "(&({}={})(objectClass={}))".format( _config("accountattributename"), username, _config("persontype") ) user_dn_results = bind.search_s( _config("basedn"), ldap.SCOPE_SUBTREE, get_user_dn_search, ["distinguishedName"], ) except Exception as e: # pylint: disable=broad-except log.error("Exception thrown while looking up user DN in AD: %s", e) return group_list if not user_dn_results: log.error("Could not get distinguished name for user %s", username) return group_list # LDAP results are always tuples. First entry in the tuple is the DN dn = ldap.filter.escape_filter_chars(user_dn_results[0][0]) ldap_search_string = "(&(member={})(objectClass={}))".format( dn, _config("groupclass") ) log.debug("Running LDAP group membership search: %s", ldap_search_string) try: search_results = bind.search_s( _config("basedn"), ldap.SCOPE_SUBTREE, ldap_search_string, [ salt.utils.stringutils.to_str(_config("accountattributename")), "cn", ], ) except Exception as e: # pylint: disable=broad-except log.error( "Exception thrown while retrieving group membership in AD: %s", e ) return group_list for _, entry in search_results: if "cn" in entry: group_list.append(salt.utils.stringutils.to_unicode(entry["cn"][0])) log.debug("User %s is a member of groups: %s", username, group_list) elif _config("freeipa"): escaped_username = ldap.filter.escape_filter_chars(username) search_base = _config("group_basedn") search_string = _render_template(_config("group_filter"), escaped_username) search_results = bind.search_s( search_base, ldap.SCOPE_SUBTREE, search_string, [ salt.utils.stringutils.to_str(_config("accountattributename")), salt.utils.stringutils.to_str(_config("groupattribute")), "cn", ], ) for entry, result in search_results: for user in itertools.chain( result.get(_config("accountattributename"), []), result.get(_config("groupattribute"), []), ): if ( username == salt.utils.stringutils.to_unicode(user) .split(",")[0] .split("=")[-1] ): group_list.append(entry.split(",")[0].split("=")[-1]) log.debug("User %s is a member of groups: %s", username, group_list) if not auth(username, kwargs["password"]): log.error("LDAP username and password do not match") return [] else: if _config("groupou"): search_base = "ou={},{}".format(_config("groupou"), _config("basedn")) else: search_base = "{}".format(_config("basedn")) search_string = "(&({}={})(objectClass={}))".format( _config("accountattributename"), username, _config("groupclass") ) search_results = bind.search_s( search_base, ldap.SCOPE_SUBTREE, search_string, [ salt.utils.stringutils.to_str(_config("accountattributename")), "cn", salt.utils.stringutils.to_str(_config("groupattribute")), ], ) for _, entry in search_results: if username in salt.utils.data.decode( entry[_config("accountattributename")] ): group_list.append(salt.utils.stringutils.to_unicode(entry["cn"][0])) for user, entry in search_results: if ( username == salt.utils.stringutils.to_unicode(user) .split(",")[0] .split("=")[-1] ): for group in salt.utils.data.decode( entry[_config("groupattribute")] ): group_list.append( salt.utils.stringutils.to_unicode(group) .split(",")[0] .split("=")[-1] ) log.debug("User %s is a member of groups: %s", username, group_list) # Only test user auth on first call for job. # 'show_jid' only exists on first payload so we can use that for the conditional. if "show_jid" in kwargs and not _bind( username, kwargs.get("password"), anonymous=_config("auth_by_group_membership_only", mandatory=False) and _config("anonymous", mandatory=False), ): log.error("LDAP username and password do not match") return [] else: log.error("ldap bind to determine group membership FAILED!") return group_list def __expand_ldap_entries(entries, opts=None): """ :param entries: ldap subtree in external_auth config option :param opts: Opts to use when __opts__ not defined :return: Dictionary with all allowed operations Takes the ldap subtree in the external_auth config option and expands it with actual minion names webadmins%: <all users in the AD 'webadmins' group> - server1 - .* - ldap(OU=webservers,dc=int,dc=bigcompany,dc=com) - test.ping - service.restart - ldap(OU=Domain Controllers,dc=int,dc=bigcompany,dc=com) - allowed_fn_list_attribute^ This function only gets called if auth.ldap.activedirectory = True """ bind = _bind_for_search(opts=opts) acl_tree = [] for user_or_group_dict in entries: if not isinstance(user_or_group_dict, dict): acl_tree.append(user_or_group_dict) continue for minion_or_ou, matchers in user_or_group_dict.items(): permissions = matchers retrieved_minion_ids = [] if minion_or_ou.startswith("ldap("): search_base = minion_or_ou.lstrip("ldap(").rstrip(")") search_string = "(objectClass=computer)" try: search_results = bind.search_s( search_base, ldap.SCOPE_SUBTREE, search_string, ["cn"] ) for ldap_match in search_results: try: minion_id = ldap_match[1]["cn"][0].lower() # Some LDAP/AD trees only have the FQDN of machines # in their computer lists. auth.minion_stripdomains # lets a user strip off configured domain names # and arrive at the basic minion_id if opts.get("auth.ldap.minion_stripdomains", None): for domain in opts["auth.ldap.minion_stripdomains"]: if minion_id.endswith(domain): minion_id = minion_id[: -len(domain)] break retrieved_minion_ids.append(minion_id) except TypeError: # TypeError here just means that one of the returned # entries didn't match the format we expected # from LDAP. pass for minion_id in retrieved_minion_ids: acl_tree.append({minion_id: permissions}) log.trace("Expanded acl_tree is: %s", acl_tree) except ldap.NO_SUCH_OBJECT: pass else: acl_tree.append({minion_or_ou: matchers}) log.trace("__expand_ldap_entries: %s", acl_tree) return acl_tree def process_acl(auth_list, opts=None): """ Query LDAP, retrieve list of minion_ids from an OU or other search. For each minion_id returned from the LDAP search, copy the perms matchers into the auth dictionary :param auth_list: :param opts: __opts__ for when __opts__ is not injected :return: Modified auth list. """ ou_names = [] for item in auth_list: if isinstance(item, str): continue ou_names.extend( [ potential_ou for potential_ou in item.keys() if potential_ou.startswith("ldap(") ] ) if ou_names: auth_list = __expand_ldap_entries(auth_list, opts) return auth_list