lemonldap-ng/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/GrantSession.pm

109 lines
3.5 KiB
Perl
Raw Normal View History

2017-02-16 19:14:42 +01:00
package Lemonldap::NG::Portal::Plugins::GrantSession;
use strict;
use Mouse;
use Lemonldap::NG::Portal::Main::Constants qw(
2019-02-05 23:12:17 +01:00
PE_OK
PE_SESSIONNOTGRANTED
PE_BADCREDENTIALS
2017-02-16 19:14:42 +01:00
);
2019-02-12 18:21:38 +01:00
our $VERSION = '2.1.0';
2017-02-28 21:53:19 +01:00
2017-02-16 19:14:42 +01:00
extends 'Lemonldap::NG::Portal::Main::Plugin';
2018-10-01 15:20:41 +02:00
use constant afterData => 'run';
2017-02-16 19:14:42 +01:00
has rules => ( is => 'rw', default => sub { {} } );
sub init {
my ($self) = @_;
my $hd = $self->p->HANDLER;
2019-08-27 10:32:26 +02:00
foreach ( keys %{ $self->conf->{grantSessionRules} // {} } ) {
$self->logger->debug("GrantRule key -> $_");
$self->logger->debug(
"GrantRule value -> " . $self->conf->{grantSessionRules}->{$_} );
2019-02-05 23:12:17 +01:00
my $rule =
$hd->buildSub(
2018-10-01 15:20:41 +02:00
$hd->substitute( $self->conf->{grantSessionRules}->{$_} ) );
2017-02-16 19:14:42 +01:00
unless ($rule) {
my $error = $hd->tsv->{jail}->error || '???';
$self->error("Bad grantSession rule -> $error");
2017-02-16 19:14:42 +01:00
return 0;
}
$self->rules->{$_} = $rule;
}
return 1;
}
2018-10-01 15:20:41 +02:00
sub run {
2017-02-16 19:14:42 +01:00
my ( $self, $req ) = @_;
sub sortByComment {
my $A = ( $a =~ /^.*?##(.*)$/ )[0];
my $B = ( $b =~ /^.*?##(.*)$/ )[0];
return !$A ? 1 : !$B ? -1 : $A cmp $B;
}
2019-02-04 18:59:37 +01:00
# Avoid display notification if AuthResult is not null
if ( $req->authResult > PE_OK ) {
$self->logger->debug(
"Bad authentication, do not check grant session rules");
return PE_BADCREDENTIALS;
}
2017-02-16 19:14:42 +01:00
foreach ( sort sortByComment keys %{ $self->rules } ) {
my $rule = $self->conf->{grantSessionRules}->{$_};
$self->logger->debug("Grant session condition -> $rule");
unless ( $self->rules->{$_}->( $req, $req->sessionInfo ) ) {
2017-02-19 08:17:48 +01:00
$req->userData( {} );
# Catch rule message
$_ =~ /^(.*?)##.*$/;
2018-10-07 11:40:26 +02:00
if ($1) {
2018-10-01 22:46:28 +02:00
$self->logger->debug("Message -> $1");
2018-10-07 15:19:00 +02:00
2019-02-05 23:12:17 +01:00
# Message can contain session data as user attributes or macros
my $hd = $self->p->HANDLER;
my $msg = $hd->substitute($1);
2018-10-07 21:32:26 +02:00
unless ( $msg = $hd->buildSub($msg) ) {
my $error = $hd->tsv->{jail}->error || '???';
$self->error("Bad message -> $error");
2018-10-07 21:32:26 +02:00
return PE_OK;
}
$msg = $msg->( $req, $req->sessionInfo );
$self->logger->debug("Transformed message -> $msg");
$req->info(
$self->loadTemplate(
$req, 'simpleInfo', params => { trspan => $msg }
)
);
$self->userLogger->error( 'User '
2019-02-05 23:12:17 +01:00
. $req->sessionInfo->{uid}
. " was not granted to open session (rule -> $rule)" );
$req->urldc( $self->conf->{portal} );
return $req->authResult(PE_SESSIONNOTGRANTED);
}
else {
$self->userLogger->error( 'User '
2019-02-05 23:12:17 +01:00
. $req->sessionInfo->{uid}
. " was not granted to open session (rule -> "
. $self->conf->{grantSessionRules}->{$_}
. ")" );
$req->urldc( $self->conf->{portal} );
return $req->authResult(PE_SESSIONNOTGRANTED);
}
2017-02-16 19:14:42 +01:00
}
}
2019-03-27 16:00:39 +01:00
# Log
my $user = $req->{sessionInfo}->{ $self->conf->{whatToTrace} };
my $mod = $req->{sessionInfo}->{_auth};
$self->userLogger->notice(
"Session granted for $user by $mod ($req->{sessionInfo}->{ipAddr})")
if $user;
2018-10-01 19:53:21 +02:00
return PE_OK;
2017-02-16 19:14:42 +01:00
}
1;