2018-03-27 19:54:05 +05:30
|
|
|
# LDAP authorization model
|
|
|
|
#
|
|
|
|
# * Check if we are allowed access (not blocked)
|
|
|
|
#
|
|
|
|
module Gitlab
|
|
|
|
module Auth
|
|
|
|
module LDAP
|
|
|
|
class Access
|
2018-11-08 19:23:39 +05:30
|
|
|
attr_reader :provider, :user, :ldap_identity
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
def self.open(user, &block)
|
|
|
|
Gitlab::Auth::LDAP::Adapter.open(user.ldap_identity.provider) do |adapter|
|
|
|
|
block.call(self.new(user, adapter))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
def self.allowed?(user, options = {})
|
2018-03-27 19:54:05 +05:30
|
|
|
self.open(user) do |access|
|
2018-11-08 19:23:39 +05:30
|
|
|
# Whether user is allowed, or not, we should update
|
|
|
|
# permissions to keep things clean
|
2018-03-27 19:54:05 +05:30
|
|
|
if access.allowed?
|
2018-11-20 20:47:30 +05:30
|
|
|
unless Gitlab::Database.read_only?
|
|
|
|
access.update_user
|
|
|
|
Users::UpdateService.new(user, user: user, last_credential_check_at: Time.now).execute
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def initialize(user, adapter = nil)
|
|
|
|
@adapter = adapter
|
|
|
|
@user = user
|
2018-11-08 19:23:39 +05:30
|
|
|
@ldap_identity = user.ldap_identity
|
|
|
|
@provider = adapter&.provider || ldap_identity&.provider
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def allowed?
|
|
|
|
if ldap_user
|
|
|
|
unless ldap_config.active_directory
|
|
|
|
unblock_user(user, 'is available again') if user.ldap_blocked?
|
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
|
|
|
# Block user in GitLab if he/she was blocked in AD
|
2018-11-08 19:23:39 +05:30
|
|
|
if Gitlab::Auth::LDAP::Person.disabled_via_active_directory?(ldap_identity.extern_uid, adapter)
|
2018-03-27 19:54:05 +05:30
|
|
|
block_user(user, 'is disabled in Active Directory')
|
|
|
|
false
|
|
|
|
else
|
|
|
|
unblock_user(user, 'is not disabled anymore') if user.ldap_blocked?
|
|
|
|
true
|
|
|
|
end
|
|
|
|
else
|
|
|
|
# Block the user if they no longer exist in LDAP/AD
|
|
|
|
block_user(user, 'does not exist anymore')
|
|
|
|
false
|
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
rescue LDAPConnectionError
|
|
|
|
false
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
def update_user
|
|
|
|
# no-op in CE
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
def adapter
|
|
|
|
@adapter ||= Gitlab::Auth::LDAP::Adapter.new(provider)
|
|
|
|
end
|
|
|
|
|
|
|
|
def ldap_config
|
|
|
|
Gitlab::Auth::LDAP::Config.new(provider)
|
|
|
|
end
|
|
|
|
|
|
|
|
def ldap_user
|
2018-11-08 19:23:39 +05:30
|
|
|
return unless provider
|
|
|
|
|
|
|
|
@ldap_user ||= find_ldap_user
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
def find_ldap_user
|
|
|
|
Gitlab::Auth::LDAP::Person.find_by_dn(ldap_identity.extern_uid, adapter)
|
|
|
|
end
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
def block_user(user, reason)
|
|
|
|
user.ldap_block
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
if provider
|
|
|
|
Gitlab::AppLogger.info(
|
|
|
|
"LDAP account \"#{ldap_identity.extern_uid}\" #{reason}, " \
|
|
|
|
"blocking Gitlab user \"#{user.name}\" (#{user.email})"
|
|
|
|
)
|
|
|
|
else
|
|
|
|
Gitlab::AppLogger.info(
|
|
|
|
"Account is not provided by LDAP, " \
|
|
|
|
"blocking Gitlab user \"#{user.name}\" (#{user.email})"
|
|
|
|
)
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def unblock_user(user, reason)
|
|
|
|
user.activate
|
|
|
|
|
|
|
|
Gitlab::AppLogger.info(
|
2018-11-08 19:23:39 +05:30
|
|
|
"LDAP account \"#{ldap_identity.extern_uid}\" #{reason}, " \
|
2018-03-27 19:54:05 +05:30
|
|
|
"unblocking Gitlab user \"#{user.name}\" (#{user.email})"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|