1
|
|
|
# coding=utf-8 |
2
|
|
|
from __future__ import absolute_import |
3
|
|
|
|
4
|
|
|
from octoprint.plugin import TemplatePlugin, RestartNeedingPlugin |
5
|
|
|
from octoprint.settings import settings |
6
|
|
|
from octoprint_auth_ldap.constants import DEFAULT_ADMIN_GROUP, DEFAULT_USER_GROUP, OU_FILTER, OU_MEMBER_FILTER, OU, \ |
7
|
|
|
REQUEST_TLS_CERT, SEARCH_BASE, URI |
8
|
|
|
from octoprint_auth_ldap.ldap import LDAPConnection |
9
|
|
|
from octoprint_auth_ldap.tweaks import SettingsPlugin |
10
|
|
|
from octoprint_auth_ldap.user_manager import LDAPUserManager |
11
|
|
|
|
12
|
|
|
|
13
|
|
|
class AuthLDAPPlugin(SettingsPlugin, TemplatePlugin, RestartNeedingPlugin): |
14
|
|
|
# noinspection PyUnusedLocal,PyShadowingNames |
15
|
|
|
def ldap_user_factory(self, components, settings): |
16
|
|
|
self._user_manager = LDAPUserManager(plugin=self, ldap=LDAPConnection(plugin=self)) |
17
|
|
|
return self._user_manager |
18
|
|
|
|
19
|
|
|
# Softwareupdate hook |
20
|
|
|
|
21
|
|
|
def check_config(self): |
22
|
|
|
return dict( |
23
|
|
|
auth_ldap=dict( |
24
|
|
|
displayName=self._plugin_name, |
25
|
|
|
displayVersion=self._plugin_version, |
26
|
|
|
|
27
|
|
|
# version check: github repository |
28
|
|
|
type="github_release", |
29
|
|
|
user="battis", |
30
|
|
|
repo="OctoPrint-LDAP", |
31
|
|
|
current=self._plugin_version, |
32
|
|
|
|
33
|
|
|
# update method: pip |
34
|
|
|
pip="https://github.com/battis/OctoPrint-LDAP/archive/{target_version}.zip" |
35
|
|
|
) |
36
|
|
|
) |
37
|
|
|
|
38
|
|
|
# SettingsPlugin |
39
|
|
|
|
40
|
|
|
def get_settings_defaults(self): |
41
|
|
|
return dict( |
42
|
|
|
auth_password=None, |
43
|
|
|
auth_user=None, |
44
|
|
|
default_admin_group=False, |
45
|
|
|
default_user_group=True, |
46
|
|
|
|
47
|
|
|
# TODO expose in settings GUi |
48
|
|
|
ldap_group_key_prefix="ldap_", |
49
|
|
|
ldap_parent_group_description="Generated by %s plugin, with membership synced automatically based on LDAP " |
50
|
|
|
"configuration" % self._plugin_name, |
51
|
|
|
ldap_parent_group_key="ldap", |
52
|
|
|
ldap_parent_group_name="LDAP-Authenticated Users", |
53
|
|
|
|
54
|
|
|
ou_filter="ou=%s", |
55
|
|
|
ou_member_filter="uniqueMember=%s", |
56
|
|
|
ou=None, |
57
|
|
|
local_cache=False, |
58
|
|
|
request_tls_cert=None, |
59
|
|
|
search_base=None, |
60
|
|
|
search_filter="uid=%s", |
61
|
|
|
search_term_transform=None, |
62
|
|
|
uri=None, |
63
|
|
|
userid_field=None, |
64
|
|
|
userid_pattern=None |
65
|
|
|
) |
66
|
|
|
|
67
|
|
|
def get_settings_restricted_paths(self): |
68
|
|
|
return dict( |
69
|
|
|
admin=self.get_settings_defaults().keys(), |
70
|
|
|
user=[], |
71
|
|
|
never=[] |
72
|
|
|
) |
73
|
|
|
|
74
|
|
|
def get_settings_version(self): |
75
|
|
|
return 3 |
76
|
|
|
|
77
|
|
|
def on_settings_migrate(self, target, current): |
78
|
|
|
if target != current: |
79
|
|
|
self._logger.info( |
80
|
|
|
"Migrating %s settings from version %s to version %s" % (self._plugin_name, current, target)) |
81
|
|
|
if current is None: |
82
|
|
|
self.migrate_settings_1_to_2() |
83
|
|
|
if current != 3: # intentional fall-through to bring None _and_ 2 to 3 (my kingdom for a switch statement!) |
84
|
|
|
self.migrate_settings_2_to_3() |
85
|
|
|
|
86
|
|
|
def migrate_settings_1_to_2(self): |
87
|
|
|
# changing settings location to plugin standard location and renaming to simplify access |
88
|
|
|
self._logger.debug("Attempting to migrate settings from version 1 to version 2") |
89
|
|
|
|
90
|
|
|
# migrate old settings to new locations and erase old settings |
91
|
|
|
prev_settings = dict( # prev_setting_name="new_setting_name" |
92
|
|
|
ldap_uri=URI, |
93
|
|
|
ldap_tls_reqcert=REQUEST_TLS_CERT, |
94
|
|
|
ldap_search_base=SEARCH_BASE, |
95
|
|
|
ldap_groups="groups" |
96
|
|
|
) |
97
|
|
|
for prev_key, key in prev_settings.items(): |
98
|
|
|
prev_value = settings().get(["accessControl", prev_key]) |
99
|
|
|
if prev_value is not None: |
100
|
|
|
cleaned_prev_value = prev_value |
101
|
|
|
if prev_key == "ldap_tls_reqcert" and prev_value == "demand": |
102
|
|
|
cleaned_prev_value = True |
103
|
|
|
self.settings.set([key], cleaned_prev_value) |
104
|
|
|
self._logger.info( |
105
|
|
|
"accessControl.%s=%s setting migrated to plugins.%s.%s=%s" |
106
|
|
|
% (prev_key, prev_value, self._identifier, key, cleaned_prev_value)) |
107
|
|
|
else: |
108
|
|
|
self._logger.debug('accessControl.%s=None, migration not necessary' % prev_key) |
109
|
|
|
settings().set(["accessControl", prev_key], None) |
110
|
|
|
|
111
|
|
|
def migrate_settings_2_to_3(self): |
112
|
|
|
# renaming to get rid of roles in favor of local groups, and clarifying LDAP group settings |
113
|
|
|
self._logger.debug("Attempting to migrate settings from version 2 to version 3") |
114
|
|
|
|
115
|
|
|
# migrate old settings to new locations and erase old settings |
116
|
|
|
prev_settings = dict( # prev_setting_name="new_setting_name" |
117
|
|
|
default_role_admin=DEFAULT_ADMIN_GROUP, |
118
|
|
|
default_role_user=DEFAULT_USER_GROUP, |
119
|
|
|
group_filter=OU_FILTER, |
120
|
|
|
group_member_filter=OU_MEMBER_FILTER, |
121
|
|
|
groups=OU |
122
|
|
|
) |
123
|
|
|
for prev_key, key in prev_settings.items(): |
124
|
|
|
prev_value = self.settings.get([prev_key]) |
125
|
|
|
if prev_value is not None: |
126
|
|
|
self.settings.set([key], prev_value) |
127
|
|
|
self._logger.info( |
128
|
|
|
"plugin.%s.%s=%s setting migrated to plugins.%s.%s=%s" |
129
|
|
|
% (self._identifier, prev_key, prev_value, self._identifier, key, prev_value)) |
130
|
|
|
else: |
131
|
|
|
self._logger.debug('plugin.%s.%s=None, migration not necessary' % (self._identifier, prev_key)) |
132
|
|
|
self.settings.set([prev_key], None) |
133
|
|
|
|
134
|
|
|
# TemplatePlugin |
135
|
|
|
|
136
|
|
|
def get_template_configs(self): |
137
|
|
|
return [ |
138
|
|
|
dict(type="settings", custom_bindings=False), # must mark custom_bindings False to load settings in GUI |
139
|
|
|
] |
140
|
|
|
|