2019-03-02 22:18:42 +01:00
|
|
|
package Lemonldap::NG::Portal::Plugins::IdSpoofing;
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
use Mouse;
|
2019-03-03 21:24:13 +01:00
|
|
|
use Lemonldap::NG::Portal::Main::Constants
|
|
|
|
qw( PE_OK PE_BADCREDENTIALS PE_IDSPOOFING_SERVICE_NOT_ALLOWED );
|
2019-03-02 22:18:42 +01:00
|
|
|
|
|
|
|
our $VERSION = '2.0.3';
|
|
|
|
|
|
|
|
extends 'Lemonldap::NG::Portal::Main::Plugin';
|
|
|
|
|
|
|
|
# INITIALIZATION
|
|
|
|
|
|
|
|
use constant endAuth => 'run';
|
|
|
|
|
2019-03-03 21:24:13 +01:00
|
|
|
has rule => ( is => 'rw', default => sub {1} );
|
|
|
|
|
2019-03-02 23:27:56 +01:00
|
|
|
sub hAttr {
|
|
|
|
$_[0]->{conf}->{idSpoofingHiddenAttributes} . ' '
|
|
|
|
. $_[0]->{conf}->{hiddenAttributes};
|
|
|
|
}
|
|
|
|
|
2019-03-03 21:24:13 +01:00
|
|
|
sub init {
|
|
|
|
my ($self) = @_;
|
|
|
|
|
|
|
|
# Parse activation rule
|
|
|
|
my $hd = $self->p->HANDLER;
|
|
|
|
$self->logger->debug(
|
|
|
|
"IdSpoofing rule -> " . $self->conf->{idSpoofingRule} );
|
|
|
|
my $rule
|
|
|
|
= $hd->buildSub( $hd->substitute( $self->conf->{idSpoofingRule} ) );
|
|
|
|
unless ($rule) {
|
|
|
|
$self->error( "Bad IdSpoofing rule -> " . $hd->tsv->{jail}->error );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
$self->{rule} = $rule;
|
|
|
|
return 1;
|
|
|
|
}
|
2019-03-02 22:18:42 +01:00
|
|
|
|
|
|
|
# RUNNING METHOD
|
|
|
|
|
|
|
|
sub run {
|
|
|
|
my ( $self, $req ) = @_;
|
2019-03-03 20:50:21 +01:00
|
|
|
my $spoofId = $req->param('spoofId') || '';
|
2019-03-03 21:24:13 +01:00
|
|
|
|
|
|
|
# Skip if no submitted SpoofId
|
2019-03-03 20:50:21 +01:00
|
|
|
return PE_OK unless $spoofId;
|
2019-03-02 22:18:42 +01:00
|
|
|
|
2019-03-03 21:24:13 +01:00
|
|
|
# Check activation rule
|
|
|
|
unless ( $self->rule->( $req, $req->sessionInfo ) ) {
|
|
|
|
$self->userLogger->error('IdSpoofing service not authorized');
|
|
|
|
return PE_IDSPOOFING_SERVICE_NOT_ALLOWED;
|
|
|
|
}
|
|
|
|
|
2019-03-02 22:18:42 +01:00
|
|
|
# Fill spoof session
|
|
|
|
my ( $realSession, $spoofSession ) = ( {}, {} );
|
2019-03-03 20:56:22 +01:00
|
|
|
$self->logger->debug("Spoofing Id: $spoofId...");
|
2019-03-02 22:18:42 +01:00
|
|
|
my $spk = '';
|
|
|
|
foreach my $k ( keys %{ $req->{sessionInfo} } ) {
|
2019-03-02 23:27:56 +01:00
|
|
|
if ( $self->{conf}->{idSpoofingSkipEmptyValues} ) {
|
|
|
|
next unless defined $req->{sessionInfo}->{$k};
|
|
|
|
}
|
|
|
|
$spk = "$self->{conf}->{idSpoofingPrefix}$k";
|
|
|
|
unless ( $self->hAttr =~ /\b$k\b/ ) {
|
|
|
|
$realSession->{$spk} = $req->{sessionInfo}->{$k};
|
|
|
|
$self->logger->debug("-> Store $k in realSession key: $spk");
|
|
|
|
}
|
2019-03-02 22:18:42 +01:00
|
|
|
}
|
|
|
|
$req->{user} = $spoofId;
|
|
|
|
$spoofSession = $self->_userDatas($req);
|
2019-03-05 14:50:30 +01:00
|
|
|
|
|
|
|
# Merging SSO groups and hGroups & Dedup
|
|
|
|
if ( $self->{conf}->{idSpoofingMergeSSOgroups} ) {
|
|
|
|
$self->userLogger->warn("MERGING SSO groups and hGroups...");
|
|
|
|
my $spg = "$self->{conf}->{idSpoofingPrefix}groups";
|
|
|
|
my $sphg = "$self->{conf}->{idSpoofingPrefix}hGroups";
|
|
|
|
my $separator = $self->{conf}->{multiValuesSeparator};
|
|
|
|
if ( $spoofSession->{groups}
|
|
|
|
and $realSession->{$spg} )
|
|
|
|
{
|
|
|
|
$self->logger->debug("Processing groups...");
|
|
|
|
my @spoofGrps = split /\Q$separator/, $spoofSession->{groups};
|
|
|
|
my @realGrps = split /\Q$separator/, $realSession->{$spg};
|
|
|
|
@spoofGrps = ( @spoofGrps, @realGrps );
|
|
|
|
my %hash = map { $_, 1 } @spoofGrps;
|
|
|
|
$spoofSession->{groups} = join $separator, sort keys %hash;
|
|
|
|
|
|
|
|
$self->logger->debug("Processing hGroups...");
|
|
|
|
$spoofSession->{hGroups} = { %{ $spoofSession->{hGroups} },
|
|
|
|
%{ $realSession->{$sphg} } };
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
# Create spoofed session
|
2019-03-02 23:27:56 +01:00
|
|
|
$spoofSession = { %$spoofSession, %$realSession };
|
2019-03-02 22:18:42 +01:00
|
|
|
|
2019-03-02 23:27:56 +01:00
|
|
|
# Main session
|
2019-03-03 20:56:22 +01:00
|
|
|
$self->p->updateSession( $req, $spoofSession );
|
2019-03-02 23:27:56 +01:00
|
|
|
return PE_OK;
|
2019-03-02 22:18:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
sub _userDatas {
|
|
|
|
my ( $self, $req ) = @_;
|
|
|
|
$req->{sessionInfo} = {};
|
|
|
|
|
|
|
|
# Search user in database
|
|
|
|
$req->steps(
|
2019-03-02 23:27:56 +01:00
|
|
|
[ 'getUser', 'setSessionInfo',
|
|
|
|
'setMacros', 'setGroups',
|
|
|
|
'setLocalGroups'
|
2019-03-02 22:18:42 +01:00
|
|
|
]
|
|
|
|
);
|
|
|
|
if ( my $error = $self->p->process($req) ) {
|
|
|
|
if ( $error == PE_BADCREDENTIALS ) {
|
|
|
|
$self->userLogger->warn(
|
|
|
|
'IdSpoofing requested for an unvalid user ('
|
|
|
|
. $req->{user}
|
|
|
|
. ")" );
|
|
|
|
}
|
|
|
|
$self->logger->debug("Process returned error: $error");
|
|
|
|
return $req->error($error);
|
|
|
|
}
|
2019-03-03 20:56:22 +01:00
|
|
|
$self->logger->debug("Populating spoofed session...");
|
2019-03-02 22:18:42 +01:00
|
|
|
return $req->{sessionInfo};
|
|
|
|
}
|
|
|
|
|
|
|
|
1;
|