This repository has been archived on 2023-12-11. You can view files and clone it, but cannot push or open issues or pull requests.
pgls/lib/pg_ldap_sync/application.rb

260 lines
6.7 KiB
Ruby
Raw Normal View History

#!/usr/bin/env ruby
require 'rubygems'
require 'net/ldap'
require 'optparse'
require 'yaml'
require 'logger'
require 'pg'
require 'pg_ldap_sync'
module PgLdapSync
class Application
attr_accessor :config_fname
attr_accessor :log
attr_accessor :test
def string_to_symbol(hash)
if hash.kind_of?(Hash)
return hash.inject({}){|h, v|
raise "expected String instead of #{h.inspect}" unless v[0].kind_of?(String)
h[v[0].intern] = string_to_symbol(v[1])
h
}
else
return hash
end
end
LdapRole = Struct.new :name, :dn, :member_dns
def search_ldap_users
ldap_user_conf = @config[:ldap_users]
users = []
@ldap.search(:base => ldap_user_conf[:base], :filter => ldap_user_conf[:filter]) do |entry|
name = entry[ldap_user_conf[:name_attribute]].first
unless name
log.warn "user attribute #{ldap_user_conf[:name_attribute].inspect} not found for #{entry.dn}"
next
end
log.info "found user-dn: #{entry.dn}"
user = LdapRole.new name, entry.dn
users << user
entry.each do |attribute, values|
log.debug " #{attribute}:"
values.each do |value|
log.debug " --->#{value}"
end
end
end
return users
end
def search_ldap_groups
ldap_group_conf = @config[:ldap_groups]
groups = []
@ldap.search(:base => ldap_group_conf[:base], :filter => ldap_group_conf[:filter]) do |entry|
name = entry[ldap_group_conf[:name_attribute]].first
unless name
log.warn "user attribute #{ldap_group_conf[:name_attribute].inspect} not found for #{entry.dn}"
next
end
log.info "found group-dn: #{entry.dn}"
group = LdapRole.new name, entry.dn, entry[ldap_group_conf[:member_attribute]]
groups << group
entry.each do |attribute, values|
log.debug " #{attribute}:"
values.each do |value|
log.debug " --->#{value}"
end
end
end
return groups
end
PgRole = Struct.new :name, :member_names
def search_pg_users
pg_users_conf = @config[:pg_users]
users = []
res = @pgconn.exec "SELECT * FROM pg_roles WHERE #{pg_users_conf[:filter]}"
res.each do |tuple|
user = PgRole.new tuple['rolname']
log.info{ "found pg-user: #{user.name}"}
users << user
end
return users
end
def search_pg_groups
pg_groups_conf = @config[:pg_groups]
groups = []
res = @pgconn.exec "SELECT rolname, oid FROM pg_roles WHERE #{pg_groups_conf[:filter]}"
res.each do |tuple|
res2 = @pgconn.exec "SELECT pr.rolname FROM pg_auth_members pam JOIN pg_roles pr ON pr.oid=pam.member WHERE pam.roleid=$1", [{:value=>tuple['oid']}]
member_names = res2.field_values 'rolname'
group = PgRole.new tuple['rolname'], member_names
log.info{ "found pg-group: #{group.name}"}
groups << group
end
return groups
end
def uniq_names(list)
names = {}
new_list = list.select do |entry|
name = entry.name
if names[name]
log.warn{ "duplicated group/user #{name.inspect} (#{entry.inspect})" }
next false
else
names[name] = true
next true
end
end
return new_list
end
MatchedRole = Struct.new :ldap, :pg, :name, :state, :type
def match_roles(ldaps, pgs, type)
ldap_by_name = ldaps.inject({}){|h,u| h[u.name] = u; h }
pg_by_name = pgs.inject({}){|h,u| h[u.name] = u; h }
users = []
ldaps.each do |ld|
pg = pg_by_name[ld.name]
user = MatchedRole.new ld, pg, ld.name
users << user
end
pgs.each do |pg|
ld = ldap_by_name[pg.name]
next if ld
user = MatchedRole.new ld, pg, pg.name
users << user
end
users.each do |u|
u.state = case
when u.ldap && !u.pg then :create
when !u.ldap && u.pg then :drop
when u.pg && u.ldap then :keep
else raise "invalid user #{u.inspect}"
end
u.type = type
end
return users
end
def pg_exec(sql, params=nil)
log.info{ "SQL: #{sql}" + (params ? " params: #{params}" : '') }
unless self.test
@pgconn.exec sql, params
end
end
def create_pg_role(role)
pg_conf = @config[role.type==:user ? :pg_users : :pg_groups]
pg_exec "CREATE ROLE \"#{role.name}\" #{pg_conf[:create_options]}"
end
def drop_pg_role(role)
pg_exec "DROP ROLE \"#{role.name}\""
end
def sync_roles_to_pg(roles)
roles.sort{|a,b|
t = b.state.to_s<=>a.state.to_s
t = a.name<=>b.name if t==0
t
}.each do |role|
case role.state
when :create
create_pg_role(role)
when :drop
drop_pg_role(role)
end
end
end
def grant_membership(role_name, add_members)
add_members_escaped = add_members.map{|m| "\"#{m}\"" }.join(",")
pg_exec "GRANT \"#{role_name}\" TO #{add_members_escaped}"
end
def revoke_membership(role_name, rm_members)
rm_members_escaped = rm_members.map{|m| "\"#{m}\"" }.join(",")
pg_exec "REVOKE \"#{role_name}\" FROM #{rm_members_escaped}"
end
def sync_membership_to_pg(roles)
roles.each do |role|
case role.state
when :create
if role.ldap.member_dns
role.ldap.member_dns.each{|dn| }
end
grant all
when :keep
grant new
revoke old
end
end
end
def start!
raise "Config file #{@config_fname.inspect} does not exist" unless File.exist?(@config_fname)
@config = string_to_symbol(YAML.load(File.read(@config_fname)))
@ldap = Net::LDAP.new @config[:ldap_connection]
ldap_users = uniq_names search_ldap_users
ldap_groups = uniq_names search_ldap_groups
@pgconn = PGconn.connect @config[:pg_connection]
pg_users = uniq_names search_pg_users
pg_groups = uniq_names search_pg_groups
mroles = match_roles(ldap_users, pg_users, :user)
mroles += match_roles(ldap_groups, pg_groups, :group)
log.info{
mroles.each do |mrole|
log.debug{ "#{mrole.state} #{mrole.type}: #{mrole.name}" }
end
"user/group stat: create: #{mroles.count{|u| u.state==:create }} drop: #{mroles.count{|u| u.state==:drop }} keep: #{mroles.count{|u| u.state==:keep }}"
}
sync_roles_to_pg(mroles)
# sync_membership_to_pg(mroles)
end
def self.run(argv)
s = self.new
s.config_fname = '/etc/pg_ldap_sync.yaml'
s.log = Logger.new(STDOUT)
s.log.level = Logger::ERROR
OptionParser.new(argv) do |opts|
opts.banner = "Usage: #{$0} [options]"
opts.on("-v", "--[no-]verbose", "Be more verbose"){ s.log.level-=1 }
opts.on("-c", "--config FILE", "Config file [#{s.config_fname}]", &s.method(:config_fname=))
opts.on("-t", "--[no-]test", "Don't do any change in the database", &s.method(:test=))
opts.parse!
end
s.start!
end
end
end