Sync roles works, sync membership not yet

This commit is contained in:
Lars Kanis 2011-05-18 15:45:08 +02:00
commit d54d82ae95
9 changed files with 373 additions and 0 deletions

23
.autotest Normal file
View File

@ -0,0 +1,23 @@
# -*- ruby -*-
require 'autotest/restart'
# Autotest.add_hook :initialize do |at|
# at.extra_files << "../some/external/dependency.rb"
#
# at.libs << ":../some/external"
#
# at.add_exception 'vendor'
#
# at.add_mapping(/dependency.rb/) do |f, _|
# at.files_matching(/test_.*rb$/)
# end
#
# %w(TestA TestB).each do |klass|
# at.extra_class_map[klass] = "test/test_misc.rb"
# end
# end
# Autotest.add_hook :run_command do |at|
# system "rake build"
# end

6
History.txt Normal file
View File

@ -0,0 +1,6 @@
=== 1.0.0 / 2011-05-16
* 1 major enhancement
* Birthday!

8
Manifest.txt Normal file
View File

@ -0,0 +1,8 @@
.autotest
History.txt
Manifest.txt
README.txt
Rakefile
bin/pg_ldap_sync
lib/pg_ldap_sync.rb
test/test_pg_ldap_sync.rb

48
README.txt Normal file
View File

@ -0,0 +1,48 @@
= pg_ldap_sync
* FIX (url)
== DESCRIPTION:
FIX (describe your package)
== FEATURES/PROBLEMS:
* FIX (list of features or problems)
== SYNOPSIS:
FIX (code sample of usage)
== REQUIREMENTS:
* FIX (list of requirements)
== INSTALL:
* FIX (sudo gem install, anything else)
== LICENSE:
(The MIT License)
Copyright (c) 2011 FIX
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
'Software'), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

12
Rakefile Normal file
View File

@ -0,0 +1,12 @@
# -*- ruby -*-
require 'rubygems'
require 'hoe'
Hoe.spec 'pg_ldap_sync' do
# developer('FIX', 'FIX@example.com')
# self.rubyforge_name = 'pg_ldap_syncx' # if different than 'pg_ldap_sync'
end
# vim: syntax=ruby

6
bin/pg_ldap_sync Executable file
View File

@ -0,0 +1,6 @@
#!/usr/bin/env ruby
require 'rubygems'
require 'pg_ldap_sync/application'
PgLdapSync::Application.run(ARGV)

3
lib/pg_ldap_sync.rb Normal file
View File

@ -0,0 +1,3 @@
module PgLdapSync
VERSION = '0.0.1'
end

View File

@ -0,0 +1,259 @@
#!/usr/bin/env ruby
require 'rubygems'
require 'net/ldap'
require 'optparse'
require 'yaml'
require 'logger'
require 'pg'
require 'pg_ldap_sync'
module PgLdapSync
class Application
attr_accessor :config_fname
attr_accessor :log
attr_accessor :test
def string_to_symbol(hash)
if hash.kind_of?(Hash)
return hash.inject({}){|h, v|
raise "expected String instead of #{h.inspect}" unless v[0].kind_of?(String)
h[v[0].intern] = string_to_symbol(v[1])
h
}
else
return hash
end
end
LdapRole = Struct.new :name, :dn, :member_dns
def search_ldap_users
ldap_user_conf = @config[:ldap_users]
users = []
@ldap.search(:base => ldap_user_conf[:base], :filter => ldap_user_conf[:filter]) do |entry|
name = entry[ldap_user_conf[:name_attribute]].first
unless name
log.warn "user attribute #{ldap_user_conf[:name_attribute].inspect} not found for #{entry.dn}"
next
end
log.info "found user-dn: #{entry.dn}"
user = LdapRole.new name, entry.dn
users << user
entry.each do |attribute, values|
log.debug " #{attribute}:"
values.each do |value|
log.debug " --->#{value}"
end
end
end
return users
end
def search_ldap_groups
ldap_group_conf = @config[:ldap_groups]
groups = []
@ldap.search(:base => ldap_group_conf[:base], :filter => ldap_group_conf[:filter]) do |entry|
name = entry[ldap_group_conf[:name_attribute]].first
unless name
log.warn "user attribute #{ldap_group_conf[:name_attribute].inspect} not found for #{entry.dn}"
next
end
log.info "found group-dn: #{entry.dn}"
group = LdapRole.new name, entry.dn, entry[ldap_group_conf[:member_attribute]]
groups << group
entry.each do |attribute, values|
log.debug " #{attribute}:"
values.each do |value|
log.debug " --->#{value}"
end
end
end
return groups
end
PgRole = Struct.new :name, :member_names
def search_pg_users
pg_users_conf = @config[:pg_users]
users = []
res = @pgconn.exec "SELECT * FROM pg_roles WHERE #{pg_users_conf[:filter]}"
res.each do |tuple|
user = PgRole.new tuple['rolname']
log.info{ "found pg-user: #{user.name}"}
users << user
end
return users
end
def search_pg_groups
pg_groups_conf = @config[:pg_groups]
groups = []
res = @pgconn.exec "SELECT rolname, oid FROM pg_roles WHERE #{pg_groups_conf[:filter]}"
res.each do |tuple|
res2 = @pgconn.exec "SELECT pr.rolname FROM pg_auth_members pam JOIN pg_roles pr ON pr.oid=pam.member WHERE pam.roleid=$1", [{:value=>tuple['oid']}]
member_names = res2.field_values 'rolname'
group = PgRole.new tuple['rolname'], member_names
log.info{ "found pg-group: #{group.name}"}
groups << group
end
return groups
end
def uniq_names(list)
names = {}
new_list = list.select do |entry|
name = entry.name
if names[name]
log.warn{ "duplicated group/user #{name.inspect} (#{entry.inspect})" }
next false
else
names[name] = true
next true
end
end
return new_list
end
MatchedRole = Struct.new :ldap, :pg, :name, :state, :type
def match_roles(ldaps, pgs, type)
ldap_by_name = ldaps.inject({}){|h,u| h[u.name] = u; h }
pg_by_name = pgs.inject({}){|h,u| h[u.name] = u; h }
users = []
ldaps.each do |ld|
pg = pg_by_name[ld.name]
user = MatchedRole.new ld, pg, ld.name
users << user
end
pgs.each do |pg|
ld = ldap_by_name[pg.name]
next if ld
user = MatchedRole.new ld, pg, pg.name
users << user
end
users.each do |u|
u.state = case
when u.ldap && !u.pg then :create
when !u.ldap && u.pg then :drop
when u.pg && u.ldap then :keep
else raise "invalid user #{u.inspect}"
end
u.type = type
end
return users
end
def pg_exec(sql, params=nil)
log.info{ "SQL: #{sql}" + (params ? " params: #{params}" : '') }
unless self.test
@pgconn.exec sql, params
end
end
def create_pg_role(role)
pg_conf = @config[role.type==:user ? :pg_users : :pg_groups]
pg_exec "CREATE ROLE \"#{role.name}\" #{pg_conf[:create_options]}"
end
def drop_pg_role(role)
pg_exec "DROP ROLE \"#{role.name}\""
end
def sync_roles_to_pg(roles)
roles.sort{|a,b|
t = b.state.to_s<=>a.state.to_s
t = a.name<=>b.name if t==0
t
}.each do |role|
case role.state
when :create
create_pg_role(role)
when :drop
drop_pg_role(role)
end
end
end
def grant_membership(role_name, add_members)
add_members_escaped = add_members.map{|m| "\"#{m}\"" }.join(",")
pg_exec "GRANT \"#{role_name}\" TO #{add_members_escaped}"
end
def revoke_membership(role_name, rm_members)
rm_members_escaped = rm_members.map{|m| "\"#{m}\"" }.join(",")
pg_exec "REVOKE \"#{role_name}\" FROM #{rm_members_escaped}"
end
def sync_membership_to_pg(roles)
roles.each do |role|
case role.state
when :create
if role.ldap.member_dns
role.ldap.member_dns.each{|dn| }
end
grant all
when :keep
grant new
revoke old
end
end
end
def start!
raise "Config file #{@config_fname.inspect} does not exist" unless File.exist?(@config_fname)
@config = string_to_symbol(YAML.load(File.read(@config_fname)))
@ldap = Net::LDAP.new @config[:ldap_connection]
ldap_users = uniq_names search_ldap_users
ldap_groups = uniq_names search_ldap_groups
@pgconn = PGconn.connect @config[:pg_connection]
pg_users = uniq_names search_pg_users
pg_groups = uniq_names search_pg_groups
mroles = match_roles(ldap_users, pg_users, :user)
mroles += match_roles(ldap_groups, pg_groups, :group)
log.info{
mroles.each do |mrole|
log.debug{ "#{mrole.state} #{mrole.type}: #{mrole.name}" }
end
"user/group stat: create: #{mroles.count{|u| u.state==:create }} drop: #{mroles.count{|u| u.state==:drop }} keep: #{mroles.count{|u| u.state==:keep }}"
}
sync_roles_to_pg(mroles)
# sync_membership_to_pg(mroles)
end
def self.run(argv)
s = self.new
s.config_fname = '/etc/pg_ldap_sync.yaml'
s.log = Logger.new(STDOUT)
s.log.level = Logger::ERROR
OptionParser.new(argv) do |opts|
opts.banner = "Usage: #{$0} [options]"
opts.on("-v", "--[no-]verbose", "Be more verbose"){ s.log.level-=1 }
opts.on("-c", "--config FILE", "Config file [#{s.config_fname}]", &s.method(:config_fname=))
opts.on("-t", "--[no-]test", "Don't do any change in the database", &s.method(:test=))
opts.parse!
end
s.start!
end
end
end

View File

@ -0,0 +1,8 @@
require "test/unit"
require "pg_ldap_sync"
class TestPgLdapSync < Test::Unit::TestCase
def test_sanity
flunk "write tests or I will kneecap you"
end
end