809
|
1 -- vim:sts=4 sw=4 |
|
2 |
|
3 -- Prosody IM |
|
4 -- Copyright (C) 2008-2010 Matthew Wild |
|
5 -- Copyright (C) 2008-2010 Waqas Hussain |
|
6 -- Copyright (C) 2012 Rob Hoelz |
|
7 -- |
|
8 -- This project is MIT/X11 licensed. Please see the |
|
9 -- COPYING file in the source package for more information. |
|
10 -- |
|
11 |
|
12 local ldap; |
|
13 local connection; |
|
14 local params = module:get_option("ldap"); |
|
15 local format = string.format; |
|
16 local tconcat = table.concat; |
|
17 |
|
18 local _M = {}; |
|
19 |
|
20 local config_params = { |
|
21 hostname = 'string', |
|
22 user = { |
|
23 basedn = 'string', |
|
24 namefield = 'string', |
|
25 filter = 'string', |
|
26 usernamefield = 'string', |
|
27 }, |
|
28 groups = { |
|
29 basedn = 'string', |
|
30 namefield = 'string', |
|
31 memberfield = 'string', |
|
32 |
|
33 _member = { |
|
34 name = 'string', |
|
35 admin = 'boolean?', |
|
36 }, |
|
37 }, |
|
38 admin = { |
|
39 _optional = true, |
|
40 basedn = 'string', |
|
41 namefield = 'string', |
|
42 filter = 'string', |
|
43 } |
|
44 } |
|
45 |
|
46 local function run_validation(params, config, prefix) |
|
47 prefix = prefix or ''; |
|
48 |
|
49 -- verify that every required member of config is present in params |
|
50 for k, v in pairs(config) do |
|
51 if type(k) == 'string' and k:sub(1, 1) ~= '_' then |
|
52 local is_optional; |
|
53 if type(v) == 'table' then |
|
54 is_optional = v._optional; |
|
55 else |
|
56 is_optional = v:sub(-1) == '?'; |
|
57 end |
|
58 |
|
59 if not is_optional and params[k] == nil then |
|
60 return nil, prefix .. k .. ' is required'; |
|
61 end |
|
62 end |
|
63 end |
|
64 |
|
65 for k, v in pairs(params) do |
|
66 local expected_type = config[k]; |
|
67 |
|
68 local ok, err = true; |
|
69 |
|
70 if type(k) == 'string' then |
|
71 -- verify that this key is present in config |
|
72 if k:sub(1, 1) == '_' or expected_type == nil then |
|
73 return nil, 'invalid parameter ' .. prefix .. k; |
|
74 end |
|
75 |
|
76 -- type validation |
|
77 if type(expected_type) == 'string' then |
|
78 if expected_type:sub(-1) == '?' then |
|
79 expected_type = expected_type:sub(1, -2); |
|
80 end |
|
81 |
|
82 if type(v) ~= expected_type then |
|
83 return nil, 'invalid type for parameter ' .. prefix .. k; |
|
84 end |
|
85 else -- it's a table (or had better be) |
|
86 if type(v) ~= 'table' then |
|
87 return nil, 'invalid type for parameter ' .. prefix .. k; |
|
88 end |
|
89 |
|
90 -- recurse into child |
|
91 ok, err = run_validation(v, expected_type, prefix .. k .. '.'); |
|
92 end |
|
93 else -- it's an integer (or had better be) |
|
94 if not config._member then |
|
95 return nil, 'invalid parameter ' .. prefix .. tostring(k); |
|
96 end |
|
97 ok, err = run_validation(v, config._member, prefix .. tostring(k) .. '.'); |
|
98 end |
|
99 |
|
100 if not ok then |
|
101 return ok, err; |
|
102 end |
|
103 end |
|
104 |
|
105 return true; |
|
106 end |
|
107 |
|
108 local function validate_config() |
|
109 if true then |
|
110 return true; -- XXX for now |
|
111 end |
|
112 |
|
113 -- this is almost too clever (I mean that in a bad |
|
114 -- maintainability sort of way) |
|
115 -- |
|
116 -- basically this allows a free pass for a key in group members |
|
117 -- equal to params.groups.namefield |
|
118 setmetatable(config_params.groups._member, { |
|
119 __index = function(_, k) |
|
120 if k == params.groups.namefield then |
|
121 return 'string'; |
|
122 end |
|
123 end |
|
124 }); |
|
125 |
|
126 local ok, err = run_validation(params, config_params); |
|
127 |
|
128 setmetatable(config_params.groups._member, nil); |
|
129 |
|
130 if ok then |
|
131 -- a little extra validation that doesn't fit into |
|
132 -- my recursive checker |
|
133 local group_namefield = params.groups.namefield; |
|
134 for i, group in ipairs(params.groups) do |
|
135 if not group[group_namefield] then |
|
136 return nil, format('groups.%d.%s is required', i, group_namefield); |
|
137 end |
|
138 end |
|
139 |
|
140 -- fill in params.admin if you can |
|
141 if not params.admin and params.groups then |
|
142 local admingroup; |
|
143 |
|
144 for _, groupconfig in ipairs(params.groups) do |
|
145 if groupconfig.admin then |
|
146 admingroup = groupconfig; |
|
147 break; |
|
148 end |
|
149 end |
|
150 |
|
151 if admingroup then |
|
152 params.admin = { |
|
153 basedn = params.groups.basedn, |
|
154 namefield = params.groups.memberfield, |
|
155 filter = group_namefield .. '=' .. admingroup[group_namefield], |
|
156 }; |
|
157 end |
|
158 end |
|
159 end |
|
160 |
|
161 return ok, err; |
|
162 end |
|
163 |
|
164 -- what to do if connection isn't available? |
|
165 local function connect() |
|
166 return ldap.open_simple(params.hostname, params.bind_dn, params.bind_password, params.use_tls); |
|
167 end |
|
168 |
|
169 -- this is abstracted so we can maintain persistent connections at a later time |
|
170 function _M.getconnection() |
|
171 return connect(); |
|
172 end |
|
173 |
|
174 function _M.getparams() |
|
175 return params; |
|
176 end |
|
177 |
|
178 -- XXX consider renaming this...it doesn't bind the current connection |
|
179 function _M.bind(username, password) |
|
180 local who = format('%s=%s,%s', params.user.usernamefield, username, params.user.basedn); |
|
181 local conn, err = ldap.open_simple(params.hostname, who, password, params.use_tls); |
|
182 |
|
183 if conn then |
|
184 conn:close(); |
|
185 return true; |
|
186 end |
|
187 |
|
188 return conn, err; |
|
189 end |
|
190 |
|
191 function _M.singlematch(query) |
|
192 local ld = _M.getconnection(); |
|
193 |
|
194 query.sizelimit = 1; |
|
195 query.scope = 'onelevel'; |
|
196 |
|
197 for dn, attribs in ld:search(query) do |
|
198 return attribs; |
|
199 end |
|
200 end |
|
201 |
|
202 _M.filter = {}; |
|
203 |
|
204 function _M.filter.combine_and(...) |
|
205 local parts = { '(&' }; |
|
206 |
|
207 local arg = { ... }; |
|
208 |
|
209 for _, filter in ipairs(arg) do |
|
210 if filter:sub(1, 1) ~= '(' and filter:sub(-1) ~= ')' then |
|
211 filter = '(' .. filter .. ')' |
|
212 end |
|
213 parts[#parts + 1] = filter; |
|
214 end |
|
215 |
|
216 parts[#parts + 1] = ')'; |
|
217 |
|
218 return tconcat(parts, ''); |
|
219 end |
|
220 |
|
221 do |
|
222 local ok, err; |
|
223 |
|
224 prosody.unlock_globals(); |
|
225 ok, ldap = pcall(require, 'lualdap'); |
|
226 prosody.lock_globals(); |
|
227 if not ok then |
|
228 module:log("error", "Failed to load the LuaLDAP library for accessing LDAP: %s", ldap); |
|
229 module:log("error", "More information on install LuaLDAP can be found at http://www.keplerproject.org/lualdap"); |
|
230 return; |
|
231 end |
|
232 |
|
233 if not params then |
|
234 module:log("error", "LDAP configuration required to use the LDAP storage module"); |
|
235 return; |
|
236 end |
|
237 |
|
238 ok, err = validate_config(); |
|
239 |
|
240 if not ok then |
|
241 module:log("error", "LDAP configuration is invalid: %s", tostring(err)); |
|
242 return; |
|
243 end |
|
244 end |
|
245 |
|
246 return _M; |