lemonldap-ng/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Plugins/Impersonation.pm

141 lines
4.3 KiB
Perl
Raw Normal View History

package Lemonldap::NG::Portal::Plugins::Impersonation;
2019-03-02 22:18:42 +01:00
use strict;
use Mouse;
2019-03-03 21:24:13 +01:00
use Lemonldap::NG::Portal::Main::Constants
2019-03-07 18:22:16 +01:00
qw( PE_OK PE_BADCREDENTIALS PE_IMPERSONATION_SERVICE_NOT_ALLOWED PE_MALFORMEDUSER );
2019-03-02 22:18:42 +01:00
our $VERSION = '2.0.3';
extends 'Lemonldap::NG::Portal::Main::Plugin';
# INITIALIZATION
use constant endAuth => 'run';
2019-03-07 18:22:16 +01:00
has rule => ( is => 'rw', default => sub { 1 } );
2019-03-03 21:24:13 +01:00
2019-03-02 23:27:56 +01:00
sub hAttr {
$_[0]->{conf}->{impersonationHiddenAttributes} . ' '
2019-03-07 18:22:16 +01:00
. $_[0]->{conf}->{hiddenAttributes};
2019-03-02 23:27:56 +01:00
}
2019-03-03 21:24:13 +01:00
sub init {
my ($self) = @_;
# Parse activation rule
my $hd = $self->p->HANDLER;
$self->logger->debug(
"impersonation rule -> " . $self->conf->{impersonationRule} );
2019-03-07 18:22:16 +01:00
my $rule =
$hd->buildSub( $hd->substitute( $self->conf->{impersonationRule} ) );
2019-03-03 21:24:13 +01:00
unless ($rule) {
2019-03-07 18:22:16 +01:00
$self->error( "Bad impersonation rule -> " . $hd->tsv->{jail}->error );
2019-03-03 21:24:13 +01:00
return 0;
}
$self->{rule} = $rule;
return 1;
}
2019-03-02 22:18:42 +01:00
# RUNNING METHOD
sub run {
my ( $self, $req ) = @_;
2019-03-06 23:08:22 +01:00
2019-03-03 20:50:21 +01:00
my $spoofId = $req->param('spoofId') || '';
2019-03-07 23:39:50 +01:00
return PE_MALFORMEDUSER
if ( $spoofId
and $req->param('spoofId') !~ /$self->{conf}->{userControl}/o );
2019-03-03 21:24:13 +01:00
# Skip if no submitted SpoofId
2019-03-03 20:50:21 +01:00
return PE_OK unless $spoofId;
2019-03-02 22:18:42 +01:00
2019-03-03 21:24:13 +01:00
# Check activation rule
unless ( $self->rule->( $req, $req->sessionInfo ) ) {
$self->userLogger->error('Impersonation service not authorized');
return PE_IMPERSONATION_SERVICE_NOT_ALLOWED;
2019-03-03 21:24:13 +01:00
}
2019-03-02 22:18:42 +01:00
# Fill spoof session
my ( $realSession, $spoofSession ) = ( {}, {} );
2019-03-03 20:56:22 +01:00
$self->logger->debug("Spoofing Id: $spoofId...");
2019-03-02 22:18:42 +01:00
my $spk = '';
foreach my $k ( keys %{ $req->{sessionInfo} } ) {
if ( $self->{conf}->{impersonationSkipEmptyValues} ) {
2019-03-02 23:27:56 +01:00
next unless defined $req->{sessionInfo}->{$k};
}
$spk = "$self->{conf}->{impersonationPrefix}$k";
2019-03-02 23:27:56 +01:00
unless ( $self->hAttr =~ /\b$k\b/ ) {
$realSession->{$spk} = $req->{sessionInfo}->{$k};
$self->logger->debug("-> Store $k in realSession key: $spk");
}
2019-03-06 21:29:03 +01:00
$self->logger->debug("Delete $k");
delete $req->{sessionInfo}->{$k};
2019-03-02 22:18:42 +01:00
}
$req->{user} = $spoofId;
$spoofSession = $self->_userDatas($req);
2019-03-06 21:29:03 +01:00
$spoofSession->{groups} ||= '';
2019-03-05 14:50:30 +01:00
# Merging SSO groups and hGroups & Dedup
if ( $self->{conf}->{impersonationMergeSSOgroups} ) {
2019-03-05 14:50:30 +01:00
$self->userLogger->warn("MERGING SSO groups and hGroups...");
my $spg = "$self->{conf}->{impersonationPrefix}groups";
my $sphg = "$self->{conf}->{impersonationPrefix}hGroups";
2019-03-05 14:50:30 +01:00
my $separator = $self->{conf}->{multiValuesSeparator};
2019-03-06 21:29:03 +01:00
$realSession->{$spg} ||= '';
2019-03-07 10:47:14 +01:00
2019-03-06 21:29:03 +01:00
$self->logger->debug("Processing groups...");
my @spoofGrps = my @realGrps = ();
@spoofGrps = split /\Q$separator/, $spoofSession->{groups};
2019-03-07 10:47:14 +01:00
@realGrps = split /\Q$separator/, $realSession->{$spg};
2019-03-06 21:29:03 +01:00
@spoofGrps = ( @spoofGrps, @realGrps );
my %hash = map { $_, 1 } @spoofGrps;
$spoofSession->{groups} = join $separator, sort keys %hash;
$self->logger->debug("Processing hGroups...");
$spoofSession->{hGroups} ||= {};
$realSession->{$sphg} ||= {};
2019-03-07 18:22:16 +01:00
$spoofSession->{hGroups} =
{ %{ $spoofSession->{hGroups} }, %{ $realSession->{$sphg} } };
2019-03-05 14:50:30 +01:00
}
# Create spoofed session
foreach (qw (_auth _userDB)) {
$self->logger->debug("Processing $_...");
$spk = "$self->{conf}->{impersonationPrefix}$_";
$spoofSession->{$_} = $realSession->{$spk};
}
2019-03-02 23:27:56 +01:00
$spoofSession = { %$spoofSession, %$realSession };
2019-03-02 22:18:42 +01:00
2019-03-02 23:27:56 +01:00
# Main session
2019-03-03 20:56:22 +01:00
$self->p->updateSession( $req, $spoofSession );
2019-03-02 23:27:56 +01:00
return PE_OK;
2019-03-02 22:18:42 +01:00
}
sub _userDatas {
my ( $self, $req ) = @_;
$req->{sessionInfo} = {};
# Search user in database
2019-03-07 18:22:16 +01:00
$req->steps( [
'getUser', 'setSessionInfo',
2019-03-02 23:27:56 +01:00
'setMacros', 'setGroups',
'setLocalGroups'
2019-03-02 22:18:42 +01:00
]
);
if ( my $error = $self->p->process($req) ) {
if ( $error == PE_BADCREDENTIALS ) {
$self->userLogger->warn(
2019-03-07 18:22:16 +01:00
'Impersonation requested for an unvalid user ('
. $req->{user}
. ")" );
2019-03-02 22:18:42 +01:00
}
$self->logger->debug("Process returned error: $error");
return $req->error($error);
}
2019-03-03 20:56:22 +01:00
$self->logger->debug("Populating spoofed session...");
2019-03-02 22:18:42 +01:00
return $req->{sessionInfo};
}
1;