add authorizedprincipalscommand

This commit is contained in:
Jakobus Schürz 2019-09-03 13:23:14 +02:00
parent 9af7a5aa56
commit ab9e365d2d
2 changed files with 136 additions and 0 deletions

85
scripts/authorizedprincipals.py Executable file
View file

@ -0,0 +1,85 @@
#!/usr/bin/env python
#
# A Dovecot post-login script for IMAP. This creates environment
# ACL_GROUPS with a comma-separated list of the user's LDAP group
# memberships and then execs the Dovecot IMAP handler.
#
import ldap;
import logging
import os, sys, platform
import re
logging.basicConfig(level=logging.DEBUG,filename='/var/log/ssh-principalcommand.log')
logger = logging.getLogger(__name__)
hostname = platform.node()
dnFilter = re.compile("^ldap_default_bind_dn *=")
pwFilter = re.compile("^ldap_default_authtok *=")
with open('/etc/sssd/sssd.conf') as f:
content = f.readlines()
content = [x.strip() for x in content]
for line in content:
if dnFilter.search(line):
bindAccount = line.partition('=')[2].strip()
if pwFilter.search(line):
bindPw = line.partition('=')[2].strip()
ldapUrl = "ldap://ldap.schuerz.at"
hostDn = bindAccount.split(',')
hostDn.pop(0)
hostDn = ','.join(hostDn)
searchBase = "dc=schuerz,dc=at"
searchFilter = "(&(dcAccountStatus=active)(|(memberof=cn=perm-sys_local_admins," + hostDn + ") (memberof=cn=perm-sys_local_users," + hostDn + ") ( memberof=cn=perm-sys_admins,ou=all_hosts,ou=posix,ou=groups,dc=schuerz,dc=at) (memberof=cn=perm-sys_users,ou=all_hosts,ou=posix,ou=groups,dc=schuerz,dc=at)))"
groupBase = re.compile("ou=groups,dc=schuerz,dc=at|cn=perm-svc-mailserver_admins,ou=mailserver,ou=system,ou=services,dc=schuerz,dc=at")
logger.debug(searchFilter)
logger.debug(groupBase)
logger.debug("ENV: %s" % (os.environ))
user = {0}
groups = []
l = ldap.initialize(ldapUrl)
l.set_option(ldap.OPT_X_TLS_CACERTFILE, '/etc/ssl/certs/Xunde_Energie_Chain-CA.pem')
l.set_option(ldap.OPT_X_TLS,ldap.OPT_X_TLS_DEMAND)
l.set_option(ldap.OPT_X_TLS_DEMAND, True)
l.set_option(ldap.OPT_DEBUG_LEVEL, 255)
l.set_option(ldap.OPT_REFERRALS, 0)
l.set_option(ldap.OPT_PROTOCOL_VERSION, 3)
l.start_tls_s()
l.bind(bindAccount, bindPw, ldap.AUTH_SIMPLE)
res = l.search_s(searchBase, ldap.SCOPE_SUBTREE,
searchFilter,
['uid'])
for dn, entry in res:
try:
for g in entry['uid']:
# Returns 'cn=All UK staff,ou=Groups,dc=example,dc=com' etc.
# Fish out 'All UK staff' as group name.
#print g
groups.append(g)
except KeyError:
pass # User in no groups.
#logger.debug('USERDB_KEYS: (before) '+str(os.environ["USERDB_KEYS"]))
print ' '.join(groups)
sys.exit(0)
os.environ["ACL_GROUPS"] = ",".join(set(groups))
try:
logger.debug('try')
#os.environ["USERDB_KEYS"] += " GROUPS"
os.environ["USERDB_KEYS"] += "acl_groups"
except KeyError:
logger.debug('except')
#os.environ["USERDB_KEYS"] = "GROUPS"
os.environ["USERDB_KEYS"] = "acl_groups"
logger.debug('ACL_GROUPS: '+str(os.environ["ACL_GROUPS"]))
logger.debug('USERDB_KEYS: '+str(os.environ["USERDB_KEYS"]))
logger.debug("ENV(after): %s" % (os.environ))
logger.debug('sys.argv[1]: '+str(sys.argv[1]))
logger.debug('sys.argv[1:]: '+str(sys.argv[1:]))
logger.debug('sys.argv: '+str(sys.argv))
logger.debug('-------------------------')
os.execv(sys.argv[1], sys.argv[1:])
sys.exit(1) # In case above fails

51
scripts/authorizedprincipals.sh Executable file
View file

@ -0,0 +1,51 @@
#!/bin/bash
LDAPSEARCH=/usr/bin/ldapsearch
SSSD_CONFIG=/etc/sssd/sssd.conf
SEARCHBASE="dc=schuerz,dc=at"
BindDN=$(sed -n -e '/^ldap_default_bind_dn/s/^ldap_default_bind_dn[ ]*=[ ]*//p' $SSSD_CONFIG)
BindPW=$(sed -n -e '/^ldap_default_authtok/s/^ldap_default_authtok[ ]*=[ ]*//p' $SSSD_CONFIG)
LDAPHost="ldap://ldap.schuerz.at"
HostDN=""
function join_by { local d=$1; shift; echo -n "$1"; shift; printf "%s" "${@/#/$d}"; }
#echo BindDN: $BindDN
#echo BindPW: $BindPW
#echo HostDN: $HostDN
regex='([^,]+),([^,]+),([^,]+),([^,]+),([^,]+),([^,]+)'
#regex='(([^,]+),)+[^,]+'
if [[ $BindDN =~ $regex ]]; then
i=2
n=${#BASH_REMATCH[*]}
#echo BR ${BASH_REMATCH[*]}
# delete=( ${BASH_REMATCH[1]} )
# echo delete ${delete[*]}
# echo deleted ${BASH_REMATCH[*]/$delete}
# HostDN=("${BASH_REMATCH[@]/$delete}")
while [[ $i -lt $n ]]
do
#echo " capture[$i]: ${BASH_REMATCH[$i]}"
if [[ -z "$HostDN" ]]; then
HostDN="${BASH_REMATCH[$i]}"
#echo $HostDN
else
HostDN="${HostDN},${BASH_REMATCH[$i]}"
#echo $HostDN
fi
let i++
done
else
echo BindDN does not match regex
echo $BindDN
echo $regex
fi
#echo "HostDN: $HostDN"
SEARCHFILTER="(&(dcAccountStatus=active)(|(memberof=cn=perm-sys_local_admins,${HostDN}) (memberof=cn=perm-sys_local_users,${HostDN}) ( memberof=cn=perm-sys_admins,ou=all_hosts,ou=posix,ou=groups,dc=schuerz,dc=at) (memberof=cn=perm-sys_users,ou=all_hosts,ou=posix,ou=groups,dc=schuerz,dc=at)))"
#echo "SEARCHFILTER: $SEARCHFILTER"
ldapsearch -LLL -Z -w $BindPW -D $BindDN "${SEARCHFILTER}" uid|awk 'BEGIN{ORS=" "}$1=="uid:" {print $2}'