debian-mirror-gitlab/lib/gitlab/ldap/config.rb

231 lines
5.4 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
# Load a specific server configuration
module Gitlab
module LDAP
class Config
2017-09-10 17:25:29 +05:30
NET_LDAP_ENCRYPTION_METHOD = {
simple_tls: :simple_tls,
start_tls: :start_tls,
plain: nil
}.freeze
2015-04-26 12:48:37 +05:30
attr_accessor :provider, :options
def self.enabled?
Gitlab.config.ldap.enabled
end
def self.servers
Gitlab.config.ldap.servers.values
end
2017-09-10 17:25:29 +05:30
def self.available_servers
return [] unless enabled?
Array.wrap(servers.first)
end
2015-04-26 12:48:37 +05:30
def self.providers
2017-08-17 22:00:37 +05:30
servers.map { |server| server['provider_name'] }
2015-04-26 12:48:37 +05:30
end
def self.valid_provider?(provider)
providers.include?(provider)
end
def self.invalid_provider(provider)
raise "Unknown provider (#{provider}). Available providers: #{providers}"
end
def initialize(provider)
if self.class.valid_provider?(provider)
@provider = provider
else
self.class.invalid_provider(provider)
end
@options = config_for(@provider) # Use @provider, not provider
end
def enabled?
base_config.enabled
end
def adapter_options
2017-08-17 22:00:37 +05:30
opts = base_options.merge(
2017-09-10 17:25:29 +05:30
encryption: encryption_options
2017-08-17 22:00:37 +05:30
)
opts.merge!(auth_options) if has_auth?
opts
end
def omniauth_options
opts = base_options.merge(
base: base,
2017-09-10 17:25:29 +05:30
encryption: options['encryption'],
2017-08-17 22:00:37 +05:30
filter: omniauth_user_filter,
2017-09-10 17:25:29 +05:30
name_proc: name_proc,
disable_verify_certificates: !options['verify_certificates']
2017-08-17 22:00:37 +05:30
)
if has_auth?
opts.merge!(
bind_dn: options['bind_dn'],
password: options['password']
)
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
opts[:ca_file] = options['ca_file'] if options['ca_file'].present?
opts[:ssl_version] = options['ssl_version'] if options['ssl_version'].present?
2017-08-17 22:00:37 +05:30
opts
2015-04-26 12:48:37 +05:30
end
def base
options['base']
end
def uid
options['uid']
end
def sync_ssh_keys?
sync_ssh_keys.present?
end
# The LDAP attribute in which the ssh keys are stored
def sync_ssh_keys
options['sync_ssh_keys']
end
def user_filter
options['user_filter']
end
2017-08-17 22:00:37 +05:30
def constructed_user_filter
@constructed_user_filter ||= Net::LDAP::Filter.construct(user_filter)
end
2015-04-26 12:48:37 +05:30
def group_base
options['group_base']
end
def admin_group
options['admin_group']
end
def active_directory
options['active_directory']
end
def block_auto_created_users
options['block_auto_created_users']
end
2015-09-25 12:07:36 +05:30
def attributes
2017-08-17 22:00:37 +05:30
default_attributes.merge(options['attributes'])
2015-09-25 12:07:36 +05:30
end
def timeout
options['timeout'].to_i
end
2017-08-17 22:00:37 +05:30
def has_auth?
options['password'] || options['bind_dn']
end
def allow_username_or_email_login
options['allow_username_or_email_login']
end
def name_proc
if allow_username_or_email_login
proc { |name| name.gsub(/@.*\z/, '') }
else
proc { |name| name }
end
end
def default_attributes
{
'username' => %w(uid userid sAMAccountName),
'email' => %w(mail email userPrincipalName),
'name' => 'cn',
'first_name' => 'givenName',
'last_name' => 'sn'
}
end
2015-04-26 12:48:37 +05:30
protected
2017-08-17 22:00:37 +05:30
def base_options
{
host: options['host'],
port: options['port']
}
end
2015-04-26 12:48:37 +05:30
def base_config
Gitlab.config.ldap
end
def config_for(provider)
base_config.servers.values.find { |server| server['provider_name'] == provider }
end
2017-09-10 17:25:29 +05:30
def encryption_options
method = translate_method(options['encryption'])
return nil unless method
{
method: method,
tls_options: tls_options(method)
}
end
def translate_method(method_from_config)
NET_LDAP_ENCRYPTION_METHOD[method_from_config.to_sym]
end
def tls_options(method)
return { verify_mode: OpenSSL::SSL::VERIFY_NONE } unless method
opts = if options['verify_certificates']
OpenSSL::SSL::SSLContext::DEFAULT_PARAMS
else
# It is important to explicitly set verify_mode for two reasons:
# 1. The behavior of OpenSSL is undefined when verify_mode is not set.
# 2. The net-ldap gem implementation verifies the certificate hostname
# unless verify_mode is set to VERIFY_NONE.
{ verify_mode: OpenSSL::SSL::VERIFY_NONE }
end
opts[:ca_file] = options['ca_file'] if options['ca_file'].present?
opts[:ssl_version] = options['ssl_version'] if options['ssl_version'].present?
opts
2015-04-26 12:48:37 +05:30
end
def auth_options
{
auth: {
method: :simple,
username: options['bind_dn'],
password: options['password']
}
}
end
2017-08-17 22:00:37 +05:30
def omniauth_user_filter
uid_filter = Net::LDAP::Filter.eq(uid, '%{username}')
if user_filter.present?
Net::LDAP::Filter.join(uid_filter, constructed_user_filter).to_s
else
uid_filter.to_s
end
2015-04-26 12:48:37 +05:30
end
end
end
end