Subclass the SSSd info plugin for our use

Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
This commit is contained in:
Aurélien Bompard 2021-03-25 18:41:21 +01:00
parent 1855c1c738
commit 9350937d54
No known key found for this signature in database
GPG key ID: 31584CFEB9BF64AD
2 changed files with 36 additions and 191 deletions

View file

@ -7,5 +7,6 @@ SITE_PACKAGES=`python3 -Ic "from distutils.sysconfig import get_python_lib; prin
set -x
cp -afv ipsilon ${ROOT}${SITE_PACKAGES}/
cat openid-server.patch | patch -p0 --fuzz 0 -d ${ROOT}${SITE_PACKAGES}/
python3 -m compileall ${ROOT}${SITE_PACKAGES}/{ipsilon,openid}
python3 -m compileall ${ROOT}${SITE_PACKAGES}/ipsilon
cat openid-server.patch | patch -p0 --fuzz 0 -d ${ROOT}${SITE_PACKAGES}/ -N
python3 -m compileall ${ROOT}${SITE_PACKAGES}/openid

View file

@ -1,202 +1,46 @@
# Copyright (C) 2014,2016 Ipsilon project Contributors, for license see COPYING
from ipsilon.info.common import InfoProviderBase, InfoProviderInstaller
from ipsilon.util.plugin import PluginObject
from ipsilon.util.policy import Policy
from ipsilon.util import config as pconfig
from fedora.client.fas2 import AccountSystem
from ipsilon.info.infosssd import InfoProvider as SSSDInfoProvider
try:
import openid_cla.cla as cla
CLA_GROUPS = {
'cla_click': cla.CLA_URI_FEDORA_CLICK,
'cla_dell': cla.CLA_URI_FEDORA_DELL,
'cla_done': cla.CLA_URI_FEDORA_DONE,
'cla_fedora': cla.CLA_URI_FEDORA_FEDORA,
'cla_fpca': cla.CLA_URI_FEDORA_FPCA,
'cla_ibm': cla.CLA_URI_FEDORA_IBM,
'cla_intel': cla.CLA_URI_FEDORA_INTEL,
'cla_redhat': cla.CLA_URI_FEDORA_REDHAT,
}
except ImportError:
CLA_GROUPS = dict()
fas_mapping = [
['username', 'nickname'],
['telephone', 'phone'],
['country_code', 'country'],
['human_name', 'fullname'],
['email', 'email'],
['timezone', 'timezone'],
['ssh_key', 'ssh_key'],
['gpg_keyid', 'gpg_keyid'],
]
fas_mapper = Policy(fas_mapping)
aws_idp_arn = 'arn:aws:iam::125523088429:saml-provider/id.fedoraproject.org'
aws_groups = {
'aws-master': 'arn:aws:iam::125523088429:role/aws-master',
'aws-iam': 'arn:aws:iam::125523088429:role/aws-iam',
'aws-billing': 'arn:aws:iam::125523088429:role/aws-billing',
'aws-atomic': 'arn:aws:iam::125523088429:role/aws-atomic',
'aws-s3-readonly': 'arn:aws:iam::125523088429:role/aws-s3-readonly',
'aws-fedoramirror': 'arn:aws:iam::125523088429:role/aws-fedoramirror',
'aws-s3': 'arn:aws:iam::125523088429:role/aws-s3',
'aws-cloud-poc': 'arn:aws:iam::125523088429:role/aws-cloud-poc',
'aws-infra': 'arn:aws:iam::125523088429:role/aws-infra',
'aws-docs': 'arn:aws:iam::125523088429:role/aws-docs',
'aws-copr': 'arn:aws:iam::125523088429:role/aws-copr',
'aws-centos': 'arn:aws:iam::125523088429:role/aws-centos',
'aws-min': 'arn:aws:iam::125523088429:role/aws-min',
'aws-fedora-ci': 'arn:aws:iam::125523088429:role/aws-fedora-ci',
AWS_IDP_ARN = "arn:aws:iam::125523088429:saml-provider/id.fedoraproject.org"
AWS_GROUPS = {
"aws-master": "arn:aws:iam::125523088429:role/aws-master",
"aws-iam": "arn:aws:iam::125523088429:role/aws-iam",
"aws-billing": "arn:aws:iam::125523088429:role/aws-billing",
"aws-atomic": "arn:aws:iam::125523088429:role/aws-atomic",
"aws-s3-readonly": "arn:aws:iam::125523088429:role/aws-s3-readonly",
"aws-fedoramirror": "arn:aws:iam::125523088429:role/aws-fedoramirror",
"aws-s3": "arn:aws:iam::125523088429:role/aws-s3",
"aws-cloud-poc": "arn:aws:iam::125523088429:role/aws-cloud-poc",
"aws-infra": "arn:aws:iam::125523088429:role/aws-infra",
"aws-docs": "arn:aws:iam::125523088429:role/aws-docs",
"aws-copr": "arn:aws:iam::125523088429:role/aws-copr",
"aws-centos": "arn:aws:iam::125523088429:role/aws-centos",
"aws-min": "arn:aws:iam::125523088429:role/aws-min",
"aws-fedora-ci": "arn:aws:iam::125523088429:role/aws-fedora-ci",
}
def fas_make_userdata(fas_data):
userdata, fas_extra = fas_mapper.map_attributes(fas_data)
# We need to split ssh keys by newline, since we can't send newlines
if userdata.get('ssh_key'):
userdata['ssh_key'] = userdata['ssh_key'].split('\n')
# compute and store groups and cla groups
userdata['_groups'] = []
userdata['_extras'] = {'fas': fas_extra, 'cla': []}
for group in fas_data.get('approved_memberships', {}):
if 'name' not in group:
continue
if group.get('group_type') == 'cla':
if group['name'] in CLA_GROUPS:
group_name = CLA_GROUPS[group['name']]
else:
group_name = group['name']
userdata['_extras']['cla'].append(group_name)
else:
userdata['_groups'].append(group['name'])
userdata['_extras']['awsroles'] = []
for group in userdata['_groups']:
if group in aws_groups:
userdata['_extras']['awsroles'].append(
'%s,%s' % (aws_idp_arn, aws_groups[group]))
return userdata
class InfoProvider(InfoProviderBase):
def __init__(self, *args):
super(InfoProvider, self).__init__(*args)
self._fas_client = None
self.name = 'fas'
class InfoProvider(SSSDInfoProvider):
def __init__(self, *kwargs):
super().__init__(*kwargs)
self.name = "fas"
self.description = """
Info plugin that retrieves user data from FAS. """
A Fedora-specific version of the SSSd info plugin.
"""
self.new_config(
self.name,
pconfig.String(
'FAS url',
'The FAS Url.',
'https://admin.fedoraproject.org/accounts/'),
pconfig.String(
'FAS Proxy client user Agent',
'The User Agent presented to the FAS Server.',
'Ipsilon v1.0'),
pconfig.Condition(
'FAS Insecure Auth',
'If checked skips FAS server cert verification.',
False),
pconfig.String(
'Bind Username',
'Username to be used when retrieving info.',
'ipsilondummy'),
pconfig.String(
'Bind Password',
'Username to be used when retrieving info.',
'Password')
"preconfigured", "SSSD can only be used when pre-configured", False
),
)
@property
def fas_url(self):
return self.get_config_value('FAS url')
@property
def user_agent(self):
return self.get_config_value('FAS Proxy client user Agent')
@property
def insecure(self):
return self.get_config_value('FAS Insecure Auth')
@property
def bind_user(self):
return self.get_config_value('Bind Username')
@property
def bind_pass(self):
return self.get_config_value('Bind Password')
@property
def fas_client(self):
if not self._fas_client:
self._fas_client = AccountSystem(base_url=self.fas_url,
insecure=self.insecure,
useragent=self.user_agent,
username=self.bind_user,
password=self.bind_pass)
return self._fas_client
def get_user_attrs(self, user):
if not self.fas_client:
return {}
try:
data = self.fas_client.person_by_username(user)
except Exception as ex: # pylint: disable=broad-except
self.error('Unable to retrieve info for %s: %s' % (user, ex))
self.debug('URL: %s' % self.fas_url)
self.debug('username: %s' % self.bind_user)
return {}
if not data:
return {}
return fas_make_userdata(data)
class Installer(InfoProviderInstaller):
def __init__(self, *pargs):
super(Installer, self).__init__()
self.name = 'fas'
self.pargs = pargs
def install_args(self, group):
group.add_argument('--info-fas', choices=['yes', 'no'], default='no',
help='Configure FAS info')
group.add_argument('--info-fas-bind-username', action='store',
help='Username to use to retrieve FAS info')
group.add_argument('--info-fas-bind-password', action='store',
help='Password to use to retrieve FAS info')
def configure(self, opts, changes):
if opts['info_fas'] != 'yes':
return
# Add configuration data to database
po = PluginObject(*self.pargs)
po.name = 'fas'
po.wipe_data()
po.wipe_config_values()
config = dict()
if 'info_fas_bind_username' in opts:
config['Bind Username'] = opts['info_fas_bind_username']
if 'info_fas_bind_password' in opts:
config['Bind Password'] = opts['info_fas_bind_password']
po.save_plugin_config(config)
# Update global config to add login plugin
po.is_enabled = True
po.save_enabled_state()
reply = super().get_user_attrs(user)
reply["_extras"]["awsroles"] = []
for group in reply["_groups"]:
if group in AWS_GROUPS:
reply["_extras"]["awsroles"].append(
"%s,%s" % (AWS_IDP_ARN, AWS_GROUPS[group])
)
return reply