Sync roles works, sync membership not yet
This commit is contained in:
commit
d54d82ae95
23
.autotest
Normal file
23
.autotest
Normal file
@ -0,0 +1,23 @@
|
||||
# -*- ruby -*-
|
||||
|
||||
require 'autotest/restart'
|
||||
|
||||
# Autotest.add_hook :initialize do |at|
|
||||
# at.extra_files << "../some/external/dependency.rb"
|
||||
#
|
||||
# at.libs << ":../some/external"
|
||||
#
|
||||
# at.add_exception 'vendor'
|
||||
#
|
||||
# at.add_mapping(/dependency.rb/) do |f, _|
|
||||
# at.files_matching(/test_.*rb$/)
|
||||
# end
|
||||
#
|
||||
# %w(TestA TestB).each do |klass|
|
||||
# at.extra_class_map[klass] = "test/test_misc.rb"
|
||||
# end
|
||||
# end
|
||||
|
||||
# Autotest.add_hook :run_command do |at|
|
||||
# system "rake build"
|
||||
# end
|
6
History.txt
Normal file
6
History.txt
Normal file
@ -0,0 +1,6 @@
|
||||
=== 1.0.0 / 2011-05-16
|
||||
|
||||
* 1 major enhancement
|
||||
|
||||
* Birthday!
|
||||
|
8
Manifest.txt
Normal file
8
Manifest.txt
Normal file
@ -0,0 +1,8 @@
|
||||
.autotest
|
||||
History.txt
|
||||
Manifest.txt
|
||||
README.txt
|
||||
Rakefile
|
||||
bin/pg_ldap_sync
|
||||
lib/pg_ldap_sync.rb
|
||||
test/test_pg_ldap_sync.rb
|
48
README.txt
Normal file
48
README.txt
Normal file
@ -0,0 +1,48 @@
|
||||
= pg_ldap_sync
|
||||
|
||||
* FIX (url)
|
||||
|
||||
== DESCRIPTION:
|
||||
|
||||
FIX (describe your package)
|
||||
|
||||
== FEATURES/PROBLEMS:
|
||||
|
||||
* FIX (list of features or problems)
|
||||
|
||||
== SYNOPSIS:
|
||||
|
||||
FIX (code sample of usage)
|
||||
|
||||
== REQUIREMENTS:
|
||||
|
||||
* FIX (list of requirements)
|
||||
|
||||
== INSTALL:
|
||||
|
||||
* FIX (sudo gem install, anything else)
|
||||
|
||||
== LICENSE:
|
||||
|
||||
(The MIT License)
|
||||
|
||||
Copyright (c) 2011 FIX
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of this software and associated documentation files (the
|
||||
'Software'), to deal in the Software without restriction, including
|
||||
without limitation the rights to use, copy, modify, merge, publish,
|
||||
distribute, sublicense, and/or sell copies of the Software, and to
|
||||
permit persons to whom the Software is furnished to do so, subject to
|
||||
the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be
|
||||
included in all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
||||
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
||||
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
||||
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
||||
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
12
Rakefile
Normal file
12
Rakefile
Normal file
@ -0,0 +1,12 @@
|
||||
# -*- ruby -*-
|
||||
|
||||
require 'rubygems'
|
||||
require 'hoe'
|
||||
|
||||
Hoe.spec 'pg_ldap_sync' do
|
||||
# developer('FIX', 'FIX@example.com')
|
||||
|
||||
# self.rubyforge_name = 'pg_ldap_syncx' # if different than 'pg_ldap_sync'
|
||||
end
|
||||
|
||||
# vim: syntax=ruby
|
6
bin/pg_ldap_sync
Executable file
6
bin/pg_ldap_sync
Executable file
@ -0,0 +1,6 @@
|
||||
#!/usr/bin/env ruby
|
||||
|
||||
require 'rubygems'
|
||||
require 'pg_ldap_sync/application'
|
||||
|
||||
PgLdapSync::Application.run(ARGV)
|
3
lib/pg_ldap_sync.rb
Normal file
3
lib/pg_ldap_sync.rb
Normal file
@ -0,0 +1,3 @@
|
||||
module PgLdapSync
|
||||
VERSION = '0.0.1'
|
||||
end
|
259
lib/pg_ldap_sync/application.rb
Normal file
259
lib/pg_ldap_sync/application.rb
Normal file
@ -0,0 +1,259 @@
|
||||
#!/usr/bin/env ruby
|
||||
|
||||
require 'rubygems'
|
||||
require 'net/ldap'
|
||||
require 'optparse'
|
||||
require 'yaml'
|
||||
require 'logger'
|
||||
require 'pg'
|
||||
|
||||
require 'pg_ldap_sync'
|
||||
|
||||
module PgLdapSync
|
||||
class Application
|
||||
attr_accessor :config_fname
|
||||
attr_accessor :log
|
||||
attr_accessor :test
|
||||
|
||||
def string_to_symbol(hash)
|
||||
if hash.kind_of?(Hash)
|
||||
return hash.inject({}){|h, v|
|
||||
raise "expected String instead of #{h.inspect}" unless v[0].kind_of?(String)
|
||||
h[v[0].intern] = string_to_symbol(v[1])
|
||||
h
|
||||
}
|
||||
else
|
||||
return hash
|
||||
end
|
||||
end
|
||||
|
||||
LdapRole = Struct.new :name, :dn, :member_dns
|
||||
|
||||
def search_ldap_users
|
||||
ldap_user_conf = @config[:ldap_users]
|
||||
|
||||
users = []
|
||||
@ldap.search(:base => ldap_user_conf[:base], :filter => ldap_user_conf[:filter]) do |entry|
|
||||
name = entry[ldap_user_conf[:name_attribute]].first
|
||||
|
||||
unless name
|
||||
log.warn "user attribute #{ldap_user_conf[:name_attribute].inspect} not found for #{entry.dn}"
|
||||
next
|
||||
end
|
||||
|
||||
log.info "found user-dn: #{entry.dn}"
|
||||
user = LdapRole.new name, entry.dn
|
||||
users << user
|
||||
entry.each do |attribute, values|
|
||||
log.debug " #{attribute}:"
|
||||
values.each do |value|
|
||||
log.debug " --->#{value}"
|
||||
end
|
||||
end
|
||||
end
|
||||
return users
|
||||
end
|
||||
|
||||
def search_ldap_groups
|
||||
ldap_group_conf = @config[:ldap_groups]
|
||||
|
||||
groups = []
|
||||
@ldap.search(:base => ldap_group_conf[:base], :filter => ldap_group_conf[:filter]) do |entry|
|
||||
name = entry[ldap_group_conf[:name_attribute]].first
|
||||
|
||||
unless name
|
||||
log.warn "user attribute #{ldap_group_conf[:name_attribute].inspect} not found for #{entry.dn}"
|
||||
next
|
||||
end
|
||||
|
||||
log.info "found group-dn: #{entry.dn}"
|
||||
group = LdapRole.new name, entry.dn, entry[ldap_group_conf[:member_attribute]]
|
||||
groups << group
|
||||
entry.each do |attribute, values|
|
||||
log.debug " #{attribute}:"
|
||||
values.each do |value|
|
||||
log.debug " --->#{value}"
|
||||
end
|
||||
end
|
||||
end
|
||||
return groups
|
||||
end
|
||||
|
||||
PgRole = Struct.new :name, :member_names
|
||||
|
||||
def search_pg_users
|
||||
pg_users_conf = @config[:pg_users]
|
||||
|
||||
users = []
|
||||
res = @pgconn.exec "SELECT * FROM pg_roles WHERE #{pg_users_conf[:filter]}"
|
||||
res.each do |tuple|
|
||||
user = PgRole.new tuple['rolname']
|
||||
log.info{ "found pg-user: #{user.name}"}
|
||||
users << user
|
||||
end
|
||||
return users
|
||||
end
|
||||
|
||||
def search_pg_groups
|
||||
pg_groups_conf = @config[:pg_groups]
|
||||
|
||||
groups = []
|
||||
res = @pgconn.exec "SELECT rolname, oid FROM pg_roles WHERE #{pg_groups_conf[:filter]}"
|
||||
res.each do |tuple|
|
||||
res2 = @pgconn.exec "SELECT pr.rolname FROM pg_auth_members pam JOIN pg_roles pr ON pr.oid=pam.member WHERE pam.roleid=$1", [{:value=>tuple['oid']}]
|
||||
member_names = res2.field_values 'rolname'
|
||||
group = PgRole.new tuple['rolname'], member_names
|
||||
log.info{ "found pg-group: #{group.name}"}
|
||||
groups << group
|
||||
end
|
||||
return groups
|
||||
end
|
||||
|
||||
def uniq_names(list)
|
||||
names = {}
|
||||
new_list = list.select do |entry|
|
||||
name = entry.name
|
||||
if names[name]
|
||||
log.warn{ "duplicated group/user #{name.inspect} (#{entry.inspect})" }
|
||||
next false
|
||||
else
|
||||
names[name] = true
|
||||
next true
|
||||
end
|
||||
end
|
||||
return new_list
|
||||
end
|
||||
|
||||
MatchedRole = Struct.new :ldap, :pg, :name, :state, :type
|
||||
|
||||
def match_roles(ldaps, pgs, type)
|
||||
ldap_by_name = ldaps.inject({}){|h,u| h[u.name] = u; h }
|
||||
pg_by_name = pgs.inject({}){|h,u| h[u.name] = u; h }
|
||||
|
||||
users = []
|
||||
ldaps.each do |ld|
|
||||
pg = pg_by_name[ld.name]
|
||||
user = MatchedRole.new ld, pg, ld.name
|
||||
users << user
|
||||
end
|
||||
pgs.each do |pg|
|
||||
ld = ldap_by_name[pg.name]
|
||||
next if ld
|
||||
user = MatchedRole.new ld, pg, pg.name
|
||||
users << user
|
||||
end
|
||||
|
||||
users.each do |u|
|
||||
u.state = case
|
||||
when u.ldap && !u.pg then :create
|
||||
when !u.ldap && u.pg then :drop
|
||||
when u.pg && u.ldap then :keep
|
||||
else raise "invalid user #{u.inspect}"
|
||||
end
|
||||
u.type = type
|
||||
end
|
||||
|
||||
return users
|
||||
end
|
||||
|
||||
def pg_exec(sql, params=nil)
|
||||
log.info{ "SQL: #{sql}" + (params ? " params: #{params}" : '') }
|
||||
unless self.test
|
||||
@pgconn.exec sql, params
|
||||
end
|
||||
end
|
||||
|
||||
def create_pg_role(role)
|
||||
pg_conf = @config[role.type==:user ? :pg_users : :pg_groups]
|
||||
pg_exec "CREATE ROLE \"#{role.name}\" #{pg_conf[:create_options]}"
|
||||
end
|
||||
|
||||
def drop_pg_role(role)
|
||||
pg_exec "DROP ROLE \"#{role.name}\""
|
||||
end
|
||||
|
||||
def sync_roles_to_pg(roles)
|
||||
roles.sort{|a,b|
|
||||
t = b.state.to_s<=>a.state.to_s
|
||||
t = a.name<=>b.name if t==0
|
||||
t
|
||||
}.each do |role|
|
||||
case role.state
|
||||
when :create
|
||||
create_pg_role(role)
|
||||
when :drop
|
||||
drop_pg_role(role)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
def grant_membership(role_name, add_members)
|
||||
add_members_escaped = add_members.map{|m| "\"#{m}\"" }.join(",")
|
||||
pg_exec "GRANT \"#{role_name}\" TO #{add_members_escaped}"
|
||||
end
|
||||
|
||||
def revoke_membership(role_name, rm_members)
|
||||
rm_members_escaped = rm_members.map{|m| "\"#{m}\"" }.join(",")
|
||||
pg_exec "REVOKE \"#{role_name}\" FROM #{rm_members_escaped}"
|
||||
end
|
||||
|
||||
def sync_membership_to_pg(roles)
|
||||
roles.each do |role|
|
||||
case role.state
|
||||
when :create
|
||||
if role.ldap.member_dns
|
||||
role.ldap.member_dns.each{|dn| }
|
||||
end
|
||||
|
||||
grant all
|
||||
when :keep
|
||||
grant new
|
||||
revoke old
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
def start!
|
||||
raise "Config file #{@config_fname.inspect} does not exist" unless File.exist?(@config_fname)
|
||||
@config = string_to_symbol(YAML.load(File.read(@config_fname)))
|
||||
|
||||
@ldap = Net::LDAP.new @config[:ldap_connection]
|
||||
ldap_users = uniq_names search_ldap_users
|
||||
ldap_groups = uniq_names search_ldap_groups
|
||||
|
||||
@pgconn = PGconn.connect @config[:pg_connection]
|
||||
pg_users = uniq_names search_pg_users
|
||||
pg_groups = uniq_names search_pg_groups
|
||||
|
||||
mroles = match_roles(ldap_users, pg_users, :user)
|
||||
mroles += match_roles(ldap_groups, pg_groups, :group)
|
||||
log.info{
|
||||
mroles.each do |mrole|
|
||||
log.debug{ "#{mrole.state} #{mrole.type}: #{mrole.name}" }
|
||||
end
|
||||
"user/group stat: create: #{mroles.count{|u| u.state==:create }} drop: #{mroles.count{|u| u.state==:drop }} keep: #{mroles.count{|u| u.state==:keep }}"
|
||||
}
|
||||
|
||||
sync_roles_to_pg(mroles)
|
||||
# sync_membership_to_pg(mroles)
|
||||
end
|
||||
|
||||
def self.run(argv)
|
||||
s = self.new
|
||||
s.config_fname = '/etc/pg_ldap_sync.yaml'
|
||||
s.log = Logger.new(STDOUT)
|
||||
s.log.level = Logger::ERROR
|
||||
|
||||
OptionParser.new(argv) do |opts|
|
||||
opts.banner = "Usage: #{$0} [options]"
|
||||
opts.on("-v", "--[no-]verbose", "Be more verbose"){ s.log.level-=1 }
|
||||
opts.on("-c", "--config FILE", "Config file [#{s.config_fname}]", &s.method(:config_fname=))
|
||||
opts.on("-t", "--[no-]test", "Don't do any change in the database", &s.method(:test=))
|
||||
|
||||
opts.parse!
|
||||
end
|
||||
|
||||
s.start!
|
||||
end
|
||||
end
|
||||
end
|
8
test/test_pg_ldap_sync.rb
Normal file
8
test/test_pg_ldap_sync.rb
Normal file
@ -0,0 +1,8 @@
|
||||
require "test/unit"
|
||||
require "pg_ldap_sync"
|
||||
|
||||
class TestPgLdapSync < Test::Unit::TestCase
|
||||
def test_sanity
|
||||
flunk "write tests or I will kneecap you"
|
||||
end
|
||||
end
|
Reference in New Issue
Block a user