mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-25 16:31:08 -06:00
a3934a211d
Replace get_ldap_uri() + LDAPClient() with new LDAPClient constructors like LDAPClient.from_realm(). Some places now use LDAPI with external bind instead of LDAP with simple bind. Although the FQDN *should* resolve to 127.0.0.1 / [::1], there is no hard guarantee. The draft https://tools.ietf.org/html/draft-west-let-localhost-be-localhost-04#section-5.1 specifies that applications must verify that the resulting IP is a loopback API. LDAPI is always local and a bit more efficient, too. The simple_bind() method also prevents the caller from sending a password over an insecure line. Signed-off-by: Christian Heimes <cheimes@redhat.com> Reviewed-By: Rob Crittenden <rcritten@redhat.com>
108 lines
3.6 KiB
Python
108 lines
3.6 KiB
Python
# Authors:
|
|
# Pavel Zuna <pzuna@redhat.com>
|
|
#
|
|
# Copyright (C) 2009 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
"""
|
|
Password migration script
|
|
"""
|
|
from __future__ import absolute_import
|
|
|
|
import cgi
|
|
import errno
|
|
import logging
|
|
import os.path
|
|
|
|
from ipaplatform.paths import paths
|
|
from ipapython.dn import DN
|
|
from ipapython import ipaldap
|
|
from ipalib import errors, create_api
|
|
|
|
logger = logging.getLogger(os.path.basename(__file__))
|
|
|
|
|
|
def bad_request(start_response):
|
|
"""
|
|
Return a 400 Bad Request error.
|
|
"""
|
|
status = '400 Bad Request'
|
|
response_headers = []
|
|
response = b''
|
|
|
|
start_response(status, response_headers)
|
|
return [response]
|
|
|
|
def wsgi_redirect(start_response, loc):
|
|
start_response('302 Found', [('Location', loc)])
|
|
return []
|
|
|
|
def bind(ldap_uri, base_dn, username, password):
|
|
if not base_dn:
|
|
logger.error('migration unable to get base dn')
|
|
raise IOError(errno.EIO, 'Cannot get Base DN')
|
|
bind_dn = DN(('uid', username), ('cn', 'users'), ('cn', 'accounts'), base_dn)
|
|
# ldap_uri should be ldapi:// in all common cases. Enforce start_tls just
|
|
# in case it's a plain LDAP connection.
|
|
start_tls = ldap_uri.startswith('ldap://')
|
|
try:
|
|
conn = ipaldap.LDAPClient(ldap_uri, start_tls=start_tls)
|
|
conn.simple_bind(bind_dn, password)
|
|
except (errors.ACIError, errors.DatabaseError, errors.NotFound) as e:
|
|
logger.error(
|
|
'migration invalid credentials for %s: %s', bind_dn, e)
|
|
raise IOError(
|
|
errno.EPERM, 'Invalid LDAP credentials for user %s' % username)
|
|
except Exception as e:
|
|
logger.error('migration bind failed: %s', e)
|
|
raise IOError(errno.EIO, 'Bind error')
|
|
finally:
|
|
conn.unbind()
|
|
|
|
|
|
def application(environ, start_response):
|
|
if environ.get('REQUEST_METHOD', None) != 'POST':
|
|
return wsgi_redirect(start_response, 'index.html')
|
|
|
|
content_type = environ.get('CONTENT_TYPE', '').lower()
|
|
if not content_type.startswith('application/x-www-form-urlencoded'):
|
|
return bad_request(start_response)
|
|
|
|
form_data = cgi.FieldStorage(fp=environ['wsgi.input'], environ=environ)
|
|
if 'username' not in form_data or 'password' not in form_data:
|
|
return bad_request(start_response)
|
|
|
|
status = '200 Success'
|
|
response_headers = []
|
|
result = 'error'
|
|
response = b''
|
|
|
|
# API object only for configuration, finalize() not needed
|
|
api = create_api(mode=None)
|
|
api.bootstrap(context='server', confdir=paths.ETC_IPA, in_server=True)
|
|
try:
|
|
bind(api.env.ldap_uri, api.env.basedn,
|
|
form_data['username'].value, form_data['password'].value)
|
|
except IOError as err:
|
|
if err.errno == errno.EPERM:
|
|
result = 'invalid-password'
|
|
if err.errno == errno.EIO:
|
|
result = 'migration-error'
|
|
else:
|
|
result = 'ok'
|
|
response_headers.append(('X-IPA-Migrate-Result', result))
|
|
start_response(status, response_headers)
|
|
return [response]
|