Browse Source
Merge pull request #207 from abstract-open-solutions/8.0
Merge pull request #207 from abstract-open-solutions/8.0
[8.0] port users_ldap_groups to 8.0pull/222/head
Holger Brunn
9 years ago
9 changed files with 194 additions and 179 deletions
-
108__unported__/users_ldap_groups/users_ldap_groups.py
-
47__unported__/users_ldap_groups/users_ldap_groups_operators.py
-
64users_ldap_groups/README.rst
-
2users_ldap_groups/__init__.py
-
24users_ldap_groups/__openerp__.py
-
0users_ldap_groups/i18n/users_ldap_groups.pot
-
0users_ldap_groups/security/ir.model.access.csv
-
128users_ldap_groups/users_ldap_groups.py
-
0users_ldap_groups/users_ldap_groups.xml
@ -1,108 +0,0 @@ |
|||||
# -*- coding: utf-8 -*- |
|
||||
############################################################################## |
|
||||
# |
|
||||
# OpenERP, Open Source Management Solution |
|
||||
# This module copyright (C) 2012 Therp BV (<http://therp.nl>). |
|
||||
# |
|
||||
# This program is free software: you can redistribute it and/or modify |
|
||||
# it under the terms of the GNU Affero General Public License as |
|
||||
# published by the Free Software Foundation, either version 3 of the |
|
||||
# License, or (at your option) any later version. |
|
||||
# |
|
||||
# This program is distributed in the hope that it will be useful, |
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
||||
# GNU Affero General Public License for more details. |
|
||||
# |
|
||||
# You should have received a copy of the GNU Affero General Public License |
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
||||
# |
|
||||
############################################################################## |
|
||||
|
|
||||
from openerp.osv import fields, orm |
|
||||
import logging |
|
||||
import users_ldap_groups_operators |
|
||||
import inspect |
|
||||
|
|
||||
|
|
||||
class CompanyLDAPGroupMapping(orm.Model): |
|
||||
_name = 'res.company.ldap.group_mapping' |
|
||||
_rec_name = 'ldap_attribute' |
|
||||
_order = 'ldap_attribute' |
|
||||
|
|
||||
def _get_operators(self, cr, uid, context=None): |
|
||||
operators = [] |
|
||||
members = inspect.getmembers( |
|
||||
users_ldap_groups_operators, |
|
||||
lambda cls: |
|
||||
inspect.isclass(cls) and |
|
||||
cls != users_ldap_groups_operators.LDAPOperator) |
|
||||
for name, operator in members: |
|
||||
operators.append((name, name)) |
|
||||
return tuple(operators) |
|
||||
|
|
||||
_columns = { |
|
||||
'ldap_id': fields.many2one('res.company.ldap', 'LDAP server', required=True), |
|
||||
'ldap_attribute': fields.char( |
|
||||
'LDAP attribute', size=64, |
|
||||
help='The LDAP attribute to check.\n' |
|
||||
'For active directory, use memberOf.'), |
|
||||
'operator': fields.selection( |
|
||||
_get_operators, 'Operator', |
|
||||
help='The operator to check the attribute against the value\n' |
|
||||
'For active directory, use \'contains\'', required=True), |
|
||||
'value': fields.char( |
|
||||
'Value', size=1024, |
|
||||
help='The value to check the attribute against.\n' |
|
||||
'For active directory, use the dn of the desired group', |
|
||||
required=True), |
|
||||
'group': fields.many2one( |
|
||||
'res.groups', 'OpenERP group', |
|
||||
help='The OpenERP group to assign', required=True), |
|
||||
} |
|
||||
|
|
||||
|
|
||||
class CompanyLDAP(orm.Model): |
|
||||
_inherit = 'res.company.ldap' |
|
||||
|
|
||||
_columns = { |
|
||||
'group_mappings': fields.one2many( |
|
||||
'res.company.ldap.group_mapping', |
|
||||
'ldap_id', 'Group mappings', |
|
||||
help='Define how OpenERP groups are assigned to ldap users'), |
|
||||
'only_ldap_groups': fields.boolean( |
|
||||
'Only ldap groups', |
|
||||
help='If this is checked, manual changes to group membership are ' |
|
||||
'undone on every login (so OpenERP groups are always synchronous ' |
|
||||
'with LDAP groups). If not, manually added groups are preserved.') |
|
||||
} |
|
||||
|
|
||||
_default = { |
|
||||
'only_ldap_groups': False, |
|
||||
} |
|
||||
|
|
||||
def get_or_create_user(self, cr, uid, conf, login, ldap_entry, context=None): |
|
||||
user_id = super(CompanyLDAP, self).get_or_create_user(cr, uid, conf, login, |
|
||||
ldap_entry, context) |
|
||||
if not user_id: |
|
||||
return user_id |
|
||||
logger = logging.getLogger('users_ldap_groups') |
|
||||
mappingobj = self.pool.get('res.company.ldap.group_mapping') |
|
||||
userobj = self.pool.get('res.users') |
|
||||
conf_all = self.read(cr, uid, conf['id'], ['only_ldap_groups']) |
|
||||
if(conf_all['only_ldap_groups']): |
|
||||
logger.debug('deleting all groups from user %d' % user_id) |
|
||||
userobj.write(cr, uid, [user_id], {'groups_id': [(5, )]}, context=context) |
|
||||
|
|
||||
for mapping in mappingobj.read(cr, uid, mappingobj.search( |
|
||||
cr, uid, [('ldap_id', '=', conf['id'])]), []): |
|
||||
operator = getattr(users_ldap_groups_operators, mapping['operator'])() |
|
||||
logger.debug('checking mapping %s' % mapping) |
|
||||
if operator.check_value(ldap_entry, mapping['ldap_attribute'], |
|
||||
mapping['value'], conf, self, logger): |
|
||||
logger.debug('adding user %d to group %s' % |
|
||||
(user_id, mapping['group'][1])) |
|
||||
userobj.write(cr, uid, [user_id], |
|
||||
{'groups_id': [(4, mapping['group'][0])]}, |
|
||||
context=context) |
|
||||
return user_id |
|
@ -1,47 +0,0 @@ |
|||||
# -*- coding: utf-8 -*- |
|
||||
############################################################################## |
|
||||
# |
|
||||
# OpenERP, Open Source Management Solution |
|
||||
# This module copyright (C) 2012 Therp BV (<http://therp.nl>). |
|
||||
# |
|
||||
# This program is free software: you can redistribute it and/or modify |
|
||||
# it under the terms of the GNU Affero General Public License as |
|
||||
# published by the Free Software Foundation, either version 3 of the |
|
||||
# License, or (at your option) any later version. |
|
||||
# |
|
||||
# This program is distributed in the hope that it will be useful, |
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
||||
# GNU Affero General Public License for more details. |
|
||||
# |
|
||||
# You should have received a copy of the GNU Affero General Public License |
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
||||
# |
|
||||
############################################################################## |
|
||||
from string import Template |
|
||||
|
|
||||
|
|
||||
class LDAPOperator: |
|
||||
pass |
|
||||
|
|
||||
|
|
||||
class contains(LDAPOperator): |
|
||||
def check_value(self, ldap_entry, attribute, value, ldap_config, company, logger): |
|
||||
return (attribute in ldap_entry[1]) and (value in ldap_entry[1][attribute]) |
|
||||
|
|
||||
|
|
||||
class equals(LDAPOperator): |
|
||||
def check_value(self, ldap_entry, attribute, value, ldap_config, company, logger): |
|
||||
return attribute in ldap_entry[1] and unicode(value) == unicode(ldap_entry[1][attribute]) |
|
||||
|
|
||||
|
|
||||
class query(LDAPOperator): |
|
||||
def check_value(self, ldap_entry, attribute, value, ldap_config, company, logger): |
|
||||
query_string = Template(value).safe_substitute(dict( |
|
||||
[(attr, ldap_entry[1][attribute][0]) for attr in ldap_entry[1]] |
|
||||
) |
|
||||
) |
|
||||
logger.debug('evaluating query group mapping, filter: %s' % query_string) |
|
||||
results = company.query(ldap_config, query_string) |
|
||||
logger.debug(results) |
|
||||
return bool(results) |
|
@ -0,0 +1,64 @@ |
|||||
|
.. image:: https://img.shields.io/badge/licence-AGPL--3-blue.svg |
||||
|
:alt: License: AGPL-3 |
||||
|
|
||||
|
users_ldap_groups |
||||
|
================= |
||||
|
|
||||
|
Adds user accounts to groups based on rules defined by the administrator. |
||||
|
|
||||
|
|
||||
|
Usage |
||||
|
===== |
||||
|
|
||||
|
Define mappings in Settings->Companies->[your company]->tab configuration->[ |
||||
|
your ldap server]. |
||||
|
|
||||
|
Decide whether you want only groups mapped from ldap (Only ldap groups=y) or a |
||||
|
mix of manually set groups and ldap groups (Only ldap groups=n). Setting this |
||||
|
to 'no' will result in users never losing privileges when you remove them from |
||||
|
a ldap group, so that's a potential security issue. It is still the default to |
||||
|
prevent losing group information by accident. |
||||
|
|
||||
|
For active directory, use LDAP attribute 'memberOf' and operator 'contains'. |
||||
|
Fill in the DN of the windows group as value and choose an OpenERP group users |
||||
|
with this windows group are to be assigned to. |
||||
|
|
||||
|
For posix accounts, use operator 'query' and a value like |
||||
|
(&(cn=bzr)(objectClass=posixGroup)(memberUid=$uid)) |
||||
|
|
||||
|
The operator query matches if the filter in value returns something, and value |
||||
|
can contain $[attribute] which will be replaced by the first value of the |
||||
|
user's ldap record's attribute named [attribute]. |
||||
|
|
||||
|
Bug Tracker |
||||
|
=========== |
||||
|
|
||||
|
Bugs are tracked on `GitHub Issues <https://github.com/OCA/server-tools/issues>`_. |
||||
|
In case of trouble, please check there if your issue has already been reported. |
||||
|
If you spotted it first, help us smashing it by providing a detailed and welcomed feedback |
||||
|
`here <https://github.com/OCA/server-tools/issues/new?body=module:%20{module_name}%0Aversion:%20{version}%0A%0A**Steps%20to%20reproduce**%0A-%20...%0A%0A**Current%20behavior**%0A%0A**Expected%20behavior**>`_. |
||||
|
|
||||
|
|
||||
|
Credits |
||||
|
======= |
||||
|
|
||||
|
Contributors |
||||
|
------------ |
||||
|
|
||||
|
* Therp BV <info@therp.nl> |
||||
|
* Giacomo Spettoli <giacomo.spettoli@gmail.com> |
||||
|
|
||||
|
Maintainer |
||||
|
---------- |
||||
|
|
||||
|
.. image:: https://odoo-community.org/logo.png |
||||
|
:alt: Odoo Community Association |
||||
|
:target: https://odoo-community.org |
||||
|
|
||||
|
This module is maintained by the OCA. |
||||
|
|
||||
|
OCA, or the Odoo Community Association, is a nonprofit organization whose |
||||
|
mission is to support the collaborative development of Odoo features and |
||||
|
promote its widespread use. |
||||
|
|
||||
|
To contribute to this module, please visit http://odoo-community.org. |
@ -0,0 +1,128 @@ |
|||||
|
# -*- coding: utf-8 -*- |
||||
|
############################################################################## |
||||
|
# |
||||
|
# OpenERP, Open Source Management Solution |
||||
|
# This module copyright (C) 2012 Therp BV (<http://therp.nl>). |
||||
|
# |
||||
|
# This program is free software: you can redistribute it and/or modify |
||||
|
# it under the terms of the GNU Affero General Public License as |
||||
|
# published by the Free Software Foundation, either version 3 of the |
||||
|
# License, or (at your option) any later version. |
||||
|
# |
||||
|
# This program is distributed in the hope that it will be useful, |
||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||||
|
# GNU Affero General Public License for more details. |
||||
|
# |
||||
|
# You should have received a copy of the GNU Affero General Public License |
||||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>. |
||||
|
# |
||||
|
############################################################################## |
||||
|
|
||||
|
from openerp import models |
||||
|
from openerp import fields |
||||
|
from openerp import api |
||||
|
import logging |
||||
|
from string import Template |
||||
|
|
||||
|
|
||||
|
class LDAPOperator(models.AbstractModel): |
||||
|
_name = "res.company.ldap.operator" |
||||
|
|
||||
|
def operators(self): |
||||
|
return ('contains', 'equals', 'query') |
||||
|
|
||||
|
def contains(self, ldap_entry, attribute, value, ldap_config, company, |
||||
|
logger): |
||||
|
return (attribute in ldap_entry[1]) and \ |
||||
|
(value in ldap_entry[1][attribute]) |
||||
|
|
||||
|
def equals(self, ldap_entry, attribute, value, ldap_config, company, |
||||
|
logger): |
||||
|
return attribute in ldap_entry[1] and \ |
||||
|
unicode(value) == unicode(ldap_entry[1][attribute]) |
||||
|
|
||||
|
def query(self, ldap_entry, attribute, value, ldap_config, company, |
||||
|
logger): |
||||
|
query_string = Template(value).safe_substitute(dict( |
||||
|
[(attr, ldap_entry[1][attribute][0]) for attr in ldap_entry[1]] |
||||
|
) |
||||
|
) |
||||
|
logger.debug('evaluating query group mapping, filter: %s' % |
||||
|
query_string) |
||||
|
results = company.query(ldap_config, query_string) |
||||
|
logger.debug(results) |
||||
|
return bool(results) |
||||
|
|
||||
|
|
||||
|
class CompanyLDAPGroupMapping(models.Model): |
||||
|
_name = 'res.company.ldap.group_mapping' |
||||
|
_rec_name = 'ldap_attribute' |
||||
|
_order = 'ldap_attribute' |
||||
|
|
||||
|
def _get_operators(self): |
||||
|
op_obj = self.env['res.company.ldap.operator'] |
||||
|
operators = [(op, op) for op in op_obj.operators()] |
||||
|
return tuple(operators) |
||||
|
|
||||
|
ldap_id = fields.Many2one('res.company.ldap', 'LDAP server', required=True) |
||||
|
ldap_attribute = fields.Char( |
||||
|
'LDAP attribute', |
||||
|
help='The LDAP attribute to check.\n' |
||||
|
'For active directory, use memberOf.') |
||||
|
operator = fields.Selection( |
||||
|
_get_operators, 'Operator', |
||||
|
help='The operator to check the attribute against the value\n' |
||||
|
'For active directory, use \'contains\'', required=True) |
||||
|
value = fields.Char( |
||||
|
'Value', |
||||
|
help='The value to check the attribute against.\n' |
||||
|
'For active directory, use the dn of the desired group', |
||||
|
required=True) |
||||
|
group = fields.Many2one( |
||||
|
'res.groups', 'OpenERP group', |
||||
|
help='The OpenERP group to assign', required=True) |
||||
|
|
||||
|
|
||||
|
class CompanyLDAP(models.Model): |
||||
|
_inherit = 'res.company.ldap' |
||||
|
|
||||
|
group_mappings = fields.One2many( |
||||
|
'res.company.ldap.group_mapping', |
||||
|
'ldap_id', 'Group mappings', |
||||
|
help='Define how OpenERP groups are assigned to ldap users') |
||||
|
only_ldap_groups = fields.Boolean( |
||||
|
'Only ldap groups', |
||||
|
help='If this is checked, manual changes to group membership are ' |
||||
|
'undone on every login (so OpenERP groups are always synchronous ' |
||||
|
'with LDAP groups). If not, manually added groups are preserved.') |
||||
|
|
||||
|
_default = { |
||||
|
'only_ldap_groups': False, |
||||
|
} |
||||
|
|
||||
|
@api.model |
||||
|
def get_or_create_user(self, conf, login, ldap_entry): |
||||
|
op_obj = self.env['res.company.ldap.operator'] |
||||
|
id_ = conf['id'] |
||||
|
this = self.browse(id_) |
||||
|
user_id = super(CompanyLDAP, self).get_or_create_user( |
||||
|
conf, login, ldap_entry) |
||||
|
if not user_id: |
||||
|
return user_id |
||||
|
userobj = self.env['res.users'] |
||||
|
user = userobj.browse(user_id) |
||||
|
logger = logging.getLogger('users_ldap_groups') |
||||
|
if self.only_ldap_groups: |
||||
|
logger.debug('deleting all groups from user %d' % user_id) |
||||
|
user.write({'groups_id': [(5, )]}) |
||||
|
|
||||
|
for mapping in this.group_mappings: |
||||
|
operator = getattr(op_obj, mapping.operator) |
||||
|
logger.debug('checking mapping %s' % mapping) |
||||
|
if operator(ldap_entry, mapping['ldap_attribute'], |
||||
|
mapping['value'], conf, self, logger): |
||||
|
logger.debug('adding user %d to group %s' % |
||||
|
(user_id, mapping.group.name)) |
||||
|
user.write({'groups_id': [(4, mapping.group.id)]}) |
||||
|
return user_id |
Write
Preview
Loading…
Cancel
Save
Reference in new issue