2009-12-17 20:20:17 +01:00
|
|
|
## @file
|
|
|
|
# Manager tree structure and tests
|
|
|
|
|
|
|
|
## @class
|
|
|
|
# Manager tree structure and tests
|
2009-12-11 19:17:00 +01:00
|
|
|
package Lemonldap::NG::Manager::_Struct;
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
our $VERSION = '0.1';
|
|
|
|
|
2009-12-17 20:20:17 +01:00
|
|
|
## @method protected hashref cstruct(hashref h,string k)
|
|
|
|
# Merge $h with the structure produced with $k and return it.
|
|
|
|
# Used to manage virtual hosts.
|
|
|
|
#@param $h Result of struct()
|
|
|
|
#@param $k Name of the virtual host
|
|
|
|
#@return Tree structure
|
2009-12-11 19:17:00 +01:00
|
|
|
sub cstruct {
|
|
|
|
shift;
|
|
|
|
my ( $h, $k ) = @_;
|
|
|
|
%$h = (
|
|
|
|
%$h,
|
|
|
|
virtualHosts => {
|
|
|
|
$k => {
|
|
|
|
_nodes => [qw(rules:rules:rules headers)],
|
|
|
|
rules => {
|
|
|
|
_nodes => ["hash:/locationRules/$k:rules:rules"],
|
|
|
|
_js => 'rulesRoot'
|
|
|
|
},
|
|
|
|
headers =>
|
|
|
|
{ _nodes => ["hash:/exportedHeaders/$k"], _js => 'hashRoot' },
|
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
|
|
|
return $h;
|
|
|
|
}
|
|
|
|
|
2009-12-17 20:20:17 +01:00
|
|
|
## @method protected hashref struct(hashref h,string k)
|
|
|
|
# Returns the tree structure
|
|
|
|
#@param $h Result of struct()
|
|
|
|
#@param $k Name of the virtual host
|
|
|
|
#@return Tree structure
|
2009-12-11 19:17:00 +01:00
|
|
|
sub struct {
|
|
|
|
return {
|
|
|
|
_nodes => [qw(n:generalParameters n:groups n:virtualHosts)],
|
|
|
|
_help => 'default',
|
|
|
|
generalParameters => {
|
|
|
|
_nodes => [
|
2009-12-14 15:01:46 +01:00
|
|
|
qw(n:authParams cookieParams cn:exportedVars cn:macros sessionParams ldapParams n:advancedParams)
|
2009-12-11 19:17:00 +01:00
|
|
|
],
|
|
|
|
_help => 'default',
|
|
|
|
authParams => {
|
2009-12-14 15:01:46 +01:00
|
|
|
_nodes => [
|
|
|
|
qw(portal authentication userDB syslog whatToTrace singleSession singleIP singleUserByIP)
|
|
|
|
],
|
2009-12-11 19:17:00 +01:00
|
|
|
_help => 'authParams',
|
|
|
|
authentication => 'text:/authentication',
|
|
|
|
portal => 'text:/portal',
|
|
|
|
userDB => 'text:/userDB',
|
2009-12-14 15:01:46 +01:00
|
|
|
syslog => 'int:/syslog',
|
|
|
|
useXForwardedForIP => 'int:/useXForwardedForIP',
|
2009-12-11 19:17:00 +01:00
|
|
|
whatToTrace => 'text:/whatToTrace:whatToTrace:text',
|
2009-12-14 15:01:46 +01:00
|
|
|
singleSession => 'int:/singleSession',
|
|
|
|
singleIP => 'int:/singleIP',
|
|
|
|
singleUserByIP => 'int:/singleUserByIP',
|
2009-12-11 19:17:00 +01:00
|
|
|
},
|
|
|
|
cookieParams => {
|
2009-12-14 15:01:46 +01:00
|
|
|
_nodes =>
|
|
|
|
[qw(cookieName domain securedCookie cookieExpiration)],
|
|
|
|
_help => 'cookies',
|
2009-12-11 19:17:00 +01:00
|
|
|
cookieName => 'text:/cookieName:cookieName:text',
|
|
|
|
domain => 'text:/domain:domain:text',
|
|
|
|
securedCookie =>
|
|
|
|
'int:/securedCookie:securedCookie:securedCookieValues',
|
2009-12-14 15:01:46 +01:00
|
|
|
cookieExpiration => 'text:/cookieExpiration',
|
2009-12-11 19:17:00 +01:00
|
|
|
},
|
|
|
|
exportedVars => {
|
|
|
|
_nodes => ['hash:/exportedVars:vars:btext'],
|
|
|
|
_js => 'hashRoot'
|
|
|
|
},
|
|
|
|
macros =>
|
|
|
|
{ _nodes => ['hash:/macros:macros:btext'], _js => 'hashRoot' },
|
|
|
|
sessionParams => {
|
|
|
|
_nodes => [qw(sessionStorage timeout)],
|
|
|
|
_help => 'storage',
|
|
|
|
sessionStorage => {
|
|
|
|
_nodes => [qw(globalStorage globalStorageOptions)],
|
|
|
|
globalStorage => 'text:/globalStorage',
|
|
|
|
globalStorageOptions => {
|
|
|
|
_nodes => ['hash:/globalStorageOptions'],
|
|
|
|
_js => 'hashRoot'
|
|
|
|
},
|
|
|
|
},
|
|
|
|
timeout => 'text:/timeout:timeout:text',
|
|
|
|
},
|
|
|
|
ldapParams => {
|
|
|
|
_nodes =>
|
|
|
|
[qw(ldapServer ldapPort ldapBase managerDn managerPassword)],
|
|
|
|
_help => 'ldap',
|
|
|
|
ldapServer => 'text:/ldapServer',
|
|
|
|
ldapPort => 'int:/ldapPort',
|
|
|
|
ldapBase => 'text:/ldapBase',
|
|
|
|
managerDn => 'text:/managerDn',
|
|
|
|
managerPassword => 'text:/managerPassword',
|
|
|
|
},
|
2009-12-14 15:01:46 +01:00
|
|
|
advancedParams => {
|
|
|
|
_nodes => [
|
|
|
|
qw(Soap exportedAttr storePassword trustedDomains status https protection notifications passwordManagement)
|
|
|
|
],
|
|
|
|
Soap => 'int:/Soap',
|
|
|
|
https => 'int:/https',
|
|
|
|
exportedAttr => 'text:/exportedAttr',
|
|
|
|
storePassword => 'int:/storePassword',
|
|
|
|
notifications => {
|
|
|
|
_nodes => [
|
|
|
|
qw(notification notificationStorage notificationStorageOptions)
|
|
|
|
],
|
|
|
|
_help => 'notifications',
|
|
|
|
notification => 'int:/notification',
|
|
|
|
notificationStorage => 'text:/notificationStorage',
|
|
|
|
notificationStorageOptions => {
|
|
|
|
_nodes => ['hash:/notificationStorageOptions'],
|
|
|
|
_js => 'hashRoot'
|
|
|
|
},
|
|
|
|
},
|
|
|
|
passwordManagement => {
|
|
|
|
_nodes => [
|
|
|
|
qw(passwordDB SMTPServer mailFrom mailSubject randomPasswordRegexp mailBody)
|
|
|
|
],
|
|
|
|
passwordDB => 'text:/passwordDB',
|
|
|
|
SMTPServer => 'text:/SMTPServer',
|
|
|
|
mailFrom => 'text:/mailFrom',
|
|
|
|
mailSubject => 'text:/mailSubject',
|
|
|
|
randomPasswordRegexp => 'text:/randomPasswordRegexp',
|
|
|
|
mailBody => 'text:/mailBody',
|
|
|
|
},
|
|
|
|
trustedDomains => 'text:/trustedDomains',
|
|
|
|
status => 'int:/status',
|
|
|
|
protection => 'int:/protection',
|
|
|
|
}
|
2009-12-11 19:17:00 +01:00
|
|
|
},
|
2009-12-14 15:01:46 +01:00
|
|
|
groups =>
|
2009-12-17 12:24:25 +01:00
|
|
|
{ _nodes => ['hash:/groups:groups:btext'], _js => 'hashRoot', _help => 'default', },
|
2009-12-11 19:17:00 +01:00
|
|
|
virtualHosts =>
|
2009-12-17 12:24:25 +01:00
|
|
|
{ _nodes => ['nhash:/locationRules:virtualHosts:none'], _upload => ['/exportedHeaders'], _help => 'default', },
|
2009-12-11 19:17:00 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2009-12-17 20:20:17 +01:00
|
|
|
## @method protected hashref testStruct()
|
|
|
|
# Returns the tests to do with the datas uploaded.
|
|
|
|
# @return hashref
|
2009-12-11 19:17:00 +01:00
|
|
|
sub testStruct {
|
|
|
|
my $assignTest = qr/(?<=[^=<!>\?])=(?![=~])/;
|
|
|
|
my $assignMsg = 'containsAnAssignment';
|
|
|
|
my $perlExpr = sub {
|
|
|
|
my $e = shift;
|
|
|
|
eval "use strict;$e";
|
|
|
|
return 1 if ( $@ =~ /Global symbol "\$.*requires explicit package/ );
|
|
|
|
return ( $@ ? ( 0, $@ ) : 1 );
|
|
|
|
};
|
2009-12-14 15:01:46 +01:00
|
|
|
my $boolean = { test => qr/^(?:0|1)?$/, msgFail => 'Value must be 0 or 1' };
|
2009-12-11 19:17:00 +01:00
|
|
|
return {
|
|
|
|
authentication => {
|
|
|
|
test => qr/^[a-zA-Z][\w\:]*$/,
|
|
|
|
msgFail => 'Bad module name',
|
|
|
|
},
|
|
|
|
userDB => {
|
|
|
|
test => qr/^[a-zA-Z][\w\:]*$/,
|
|
|
|
msgFail => 'Bad module name',
|
|
|
|
},
|
|
|
|
whatToTrace => {
|
|
|
|
test => qr/^\$?[a-zA-Z]\w*$/,
|
|
|
|
msgFail => 'Bad value',
|
|
|
|
},
|
|
|
|
portal => {
|
|
|
|
test => qr/^https?:\/\/\S+$/,
|
|
|
|
msgFail => 'Bad portal value',
|
|
|
|
},
|
2009-12-14 15:01:46 +01:00
|
|
|
cda => $boolean,
|
2009-12-11 19:17:00 +01:00
|
|
|
cookieName => {
|
|
|
|
test => qr/^[a-zA-Z]\w*$/,
|
|
|
|
msgFail => 'Bad cookie name',
|
|
|
|
},
|
|
|
|
securedCookie => {
|
|
|
|
test => qr/^(?:0|1|2)$/,
|
|
|
|
msgFail => 'securedCookie must be 0, 1 or 2',
|
|
|
|
},
|
|
|
|
domain => {
|
|
|
|
test => qr/^\.?\w+(?:\.[a-zA-Z]\w*)*(?:\.[a-zA-Z]+)$/,
|
|
|
|
msgFail => 'Bad domain',
|
|
|
|
},
|
|
|
|
timeout => {
|
|
|
|
test => qr/^\d*$/,
|
|
|
|
msgFail => 'Bad number'
|
|
|
|
},
|
|
|
|
globalStorage => {
|
|
|
|
test => qr/^[\w:]+$/,
|
|
|
|
msgFail => 'Bad module name',
|
|
|
|
},
|
|
|
|
globalStorageOptions => {
|
|
|
|
keyTest => qr/^\w+$/,
|
|
|
|
keyMsgFail => 'Bad parameter',
|
|
|
|
},
|
|
|
|
ldapBase => {
|
|
|
|
test => qr/^(?:\w+=.*|)$/,
|
|
|
|
msgFail => 'Bad LDAP base',
|
|
|
|
},
|
|
|
|
ldapPort => {
|
|
|
|
test => qr/^\d*$/,
|
|
|
|
msgFail => 'Bad port number'
|
|
|
|
},
|
|
|
|
ldapServer => {
|
|
|
|
test => sub {
|
|
|
|
my $l = shift;
|
|
|
|
my @s = split( /[\s,]+/, $l );
|
|
|
|
foreach my $s (@s) {
|
|
|
|
$s =~
|
|
|
|
/^(?:ldap(?:s|\+tls|i):\/\/)?\w[\w\-\.]+\w(?::\d{0,5})?\/?$/
|
|
|
|
or return ( 0, "Bad ldap uri \"$s\"" );
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
managerDn => {
|
|
|
|
test => qr/^(?:\w+=.*,\w+=.*)?$/,
|
|
|
|
msgFail => 'Bad LDAP dn',
|
|
|
|
},
|
|
|
|
managerPassword => {},
|
2009-12-14 15:01:46 +01:00
|
|
|
notificationStorage => {
|
|
|
|
test => qr/^[\w:]+$/,
|
|
|
|
msgFail => 'Bad module name',
|
|
|
|
},
|
|
|
|
notificationStorageOptions => {
|
|
|
|
keyTest => qr/^\w+$/,
|
|
|
|
keyMsgFail => 'Bad parameter',
|
|
|
|
},
|
2009-12-11 19:17:00 +01:00
|
|
|
groups => {
|
|
|
|
keyTest => qr/^\w[\w-]*$/,
|
|
|
|
keyMsgFail => 'Bad group name',
|
|
|
|
test => $perlExpr,
|
|
|
|
warnTest => sub {
|
|
|
|
my $e = shift;
|
|
|
|
return ( 0, $assignMsg ) if ( $e =~ $assignTest );
|
|
|
|
1;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
exportedVars => {
|
|
|
|
keyTest => qr/^[a-zA-Z]\w*$/,
|
|
|
|
keyMsgFail => 'Bad variable name',
|
|
|
|
test => qr/^[a-zA-Z]\w*$/,
|
|
|
|
msgFail => 'Bad attribute name',
|
|
|
|
},
|
|
|
|
macros => {
|
|
|
|
keyTest => qr/^[a-zA-Z]\w*$/,
|
|
|
|
keyMsgFail => 'Bad macro name',
|
|
|
|
test => $perlExpr,
|
|
|
|
warnTest => sub {
|
|
|
|
my $e = shift;
|
|
|
|
return ( 0, $assignMsg ) if ( $e =~ $assignTest );
|
|
|
|
1;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
locationRules => {
|
|
|
|
keyTest => qr/^[a-zA-Z](?:[\w\-\.]*\w)?$/,
|
|
|
|
msgFail => 'Bad virtual host name',
|
|
|
|
'*' => {
|
|
|
|
keyTest => sub {
|
|
|
|
my $r = shift;
|
|
|
|
my $q;
|
|
|
|
eval { $q = qr/$r/ };
|
|
|
|
return ( $@ ? ( 0, $@ ) : 1 );
|
|
|
|
},
|
|
|
|
test => sub {
|
|
|
|
my $e = shift;
|
|
|
|
return 1 if ( $e eq 'accept' or $e eq 'deny' );
|
|
|
|
if ( $e =~ s/^logout(?:_(?:app|sso|app_sso))?\s*// ) {
|
|
|
|
return (
|
|
|
|
$e =~ /^(?:https?:\/\/\S+)?$/
|
|
|
|
? 1
|
|
|
|
: ( 0, "bad url \"$e\"" )
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return &$perlExpr($e);
|
|
|
|
},
|
|
|
|
warnTest => sub {
|
|
|
|
my $e = shift;
|
|
|
|
return ( 0, $assignMsg )
|
|
|
|
if ( $e =~ $assignTest
|
|
|
|
and $e !~ /^(?:accept|deny|logout)/ );
|
|
|
|
1;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
exportedHeaders => {
|
|
|
|
keyTest => qr/^[a-zA-Z](?:[\w\-\.]*\w)?$/,
|
|
|
|
msgFail => 'Bad virtual host name',
|
|
|
|
'*' => {
|
|
|
|
keyTest => qr/^\w([\w\-]*\w)?$/,
|
|
|
|
keyMsgFail => 'Bad header name',
|
|
|
|
test => $perlExpr,
|
|
|
|
warnTest => sub {
|
|
|
|
my $e = shift;
|
|
|
|
return ( 0, $assignMsg ) if ( $e =~ $assignTest );
|
|
|
|
1;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2009-12-14 15:01:46 +01:00
|
|
|
syslog => $boolean,
|
|
|
|
Soap => $boolean,
|
|
|
|
storePassword => $boolean,
|
|
|
|
notification => $boolean,
|
|
|
|
status => $boolean,
|
|
|
|
https => $boolean,
|
|
|
|
protection => {
|
|
|
|
keyTest => qr/^(?:none|authentificate|manager|)$/,
|
|
|
|
msgFail => 'must be one of none authentificate manager',
|
|
|
|
},
|
|
|
|
useXForwardedForIP => $boolean,
|
|
|
|
singleSession => $boolean,
|
|
|
|
singleIP => $boolean,
|
|
|
|
singleUserByIP => $boolean,
|
2009-12-11 19:17:00 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2009-12-17 20:20:17 +01:00
|
|
|
## @method protected hashref defaultConf()
|
|
|
|
#@return Hashref of default values
|
2009-12-11 19:17:00 +01:00
|
|
|
sub defaultConf {
|
|
|
|
return {
|
2009-12-14 15:01:46 +01:00
|
|
|
authentication => 'LDAP',
|
2009-12-11 19:17:00 +01:00
|
|
|
userDB => 'LDAP',
|
|
|
|
ldapServer => 'localhost',
|
2009-12-14 15:01:46 +01:00
|
|
|
globalStorage => 'Apache::Session::File',
|
|
|
|
globalStorageOptions => {
|
|
|
|
'Directory' => '/var/lib/lemonldap-ng/sessions/',
|
|
|
|
'LockDirectory' => '/var/lib/lemonldap-ng/sessions/lock/'
|
|
|
|
},
|
|
|
|
timeout => 7200,
|
2009-12-11 19:17:00 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
1;
|