| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Apache2::AuthZLDAP; |
|
2
|
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
24694
|
use warnings; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
81
|
|
|
4
|
1
|
|
|
1
|
|
7
|
use strict; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
36
|
|
|
5
|
1
|
|
|
1
|
|
478
|
use mod_perl2; |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
BEGIN { |
|
7
|
|
|
|
|
|
|
require Apache2::Const; |
|
8
|
|
|
|
|
|
|
require Apache2::Access; |
|
9
|
|
|
|
|
|
|
require Apache2::SubRequest; |
|
10
|
|
|
|
|
|
|
require Apache2::RequestRec; |
|
11
|
|
|
|
|
|
|
require Apache2::RequestUtil; |
|
12
|
|
|
|
|
|
|
require Apache2::Response; |
|
13
|
|
|
|
|
|
|
require APR::Table; |
|
14
|
|
|
|
|
|
|
Apache2::Const->import(-compile => 'HTTP_UNAUTHORIZED','OK', 'HTTP_INTERNAL_SERVER_ERROR'); |
|
15
|
|
|
|
|
|
|
require Apache2::Log; |
|
16
|
|
|
|
|
|
|
require Apache2::Directive; |
|
17
|
|
|
|
|
|
|
require Net::LDAP; |
|
18
|
|
|
|
|
|
|
} |
|
19
|
|
|
|
|
|
|
=head1 NAME |
|
20
|
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
Apache2::AuthZLDAP - Authorization module based on LDAP filters or LDAP groups |
|
22
|
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
=head1 VERSION |
|
24
|
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
Version 0.02 |
|
26
|
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
=cut |
|
28
|
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
our $VERSION = '0.02'; |
|
30
|
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
32
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
This module is an authorization handler for Apache 2. Its authorization method relies on openLDAP filters. |
|
34
|
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
=head1 CONFIGURATION |
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
This module can work with all authentification module that provides a valid REMOTE_USER env var. For example : |
|
38
|
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
=over |
|
40
|
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
=item * |
|
42
|
|
|
|
|
|
|
Basic Apache auth |
|
43
|
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
=item * |
|
45
|
|
|
|
|
|
|
CAS authentication (mod_cas, Apache2::AuthCAS) |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
=back |
|
48
|
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
Example with CAS authentication : |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
## these vars can be initialized outside of directory |
|
53
|
|
|
|
|
|
|
PerlSetVar LDAPURI ldap://myldaphost/ |
|
54
|
|
|
|
|
|
|
PerlSetVar LDAPbaseDN ou=groups,dc=organization,dc=domain |
|
55
|
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
AuthName CAS |
|
59
|
|
|
|
|
|
|
AuthType CAS |
|
60
|
|
|
|
|
|
|
## define a filter. [uid] will be replaced by user value on runtime |
|
61
|
|
|
|
|
|
|
PerlSetVar LDAPfilter &(member=uid=[uid],ou=people,dc=organization,dc=domain)(cn=admins) |
|
62
|
|
|
|
|
|
|
## charging of the module for authZ |
|
63
|
|
|
|
|
|
|
PerlAuthzHandler Apache2::AuthZLDAP |
|
64
|
|
|
|
|
|
|
require valid-user |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
=head2 Configuration Options |
|
70
|
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
# Set to the LDAP URI |
|
72
|
|
|
|
|
|
|
# Multiple URIs can be set for failover LDAP servers |
|
73
|
|
|
|
|
|
|
# Note: ldaps Defaults to port 636 |
|
74
|
|
|
|
|
|
|
PerlSetVar LDAPURI ldap://ldaphost1 |
|
75
|
|
|
|
|
|
|
PerlSetVar LDAPURI ldaps://ldaphost2 |
|
76
|
|
|
|
|
|
|
PerlSetVar LDAPURI ldap://ldaphost3:1001 |
|
77
|
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
# How to handle the certificate verification for ldaps:// URIs |
|
79
|
|
|
|
|
|
|
# See start_tls in Net::LDAP for more information |
|
80
|
|
|
|
|
|
|
# If you set any of the LDAPSSL* variables, be sure to include only |
|
81
|
|
|
|
|
|
|
# ldaps:// URIs. Otherwise the connection will fail. |
|
82
|
|
|
|
|
|
|
# (none|optional|require) |
|
83
|
|
|
|
|
|
|
PerlSetVar LDAPSSLverify none |
|
84
|
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
# Set to a directory that contains the CA certs |
|
86
|
|
|
|
|
|
|
PerlSetVar LDAPSSLcapath /path/to/cadir |
|
87
|
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
# Set to a file that contains the CA cert |
|
89
|
|
|
|
|
|
|
PerlSetVar LDAPSSLcafile /path/to/cafile.pem |
|
90
|
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
# Turn on TLS to encrypt a connection |
|
92
|
|
|
|
|
|
|
# Note: This is different from ldaps:// connections. ldaps:// specifies |
|
93
|
|
|
|
|
|
|
# an LDAP connection totally encapsulated by SSL usually running on a |
|
94
|
|
|
|
|
|
|
# different port. TLS tells the LDAP server to encrypt a cleartext ldap:// |
|
95
|
|
|
|
|
|
|
# connection from the time the start_tls command is issued. |
|
96
|
|
|
|
|
|
|
# (yes|no) |
|
97
|
|
|
|
|
|
|
PerlSetVar LDAPTLS yes |
|
98
|
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
# How to handle the certificate verification |
|
100
|
|
|
|
|
|
|
# See start_tls in Net::LDAP for more information |
|
101
|
|
|
|
|
|
|
# (none|optional|require) |
|
102
|
|
|
|
|
|
|
PerlSetVar LDAPTLSverify none |
|
103
|
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
# Set to a directory that contains the CA certs |
|
105
|
|
|
|
|
|
|
PerlSetVar LDAPTLScapath /path/to/cadir |
|
106
|
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
# Set to a file that contains the CA cert |
|
108
|
|
|
|
|
|
|
PerlSetVar LDAPTLScafile /path/to/cafile.pem |
|
109
|
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
# Specifies a user/password to use for the bind |
|
111
|
|
|
|
|
|
|
# If LDAPuser is not specified, AuthZLDAP will attempt an anonymous bind |
|
112
|
|
|
|
|
|
|
PerlSetVar LDAPuser cn=user,o=org |
|
113
|
|
|
|
|
|
|
PerlSetVar LDAPpassword secret |
|
114
|
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
# Sets the LDAP search scope |
|
116
|
|
|
|
|
|
|
# (base|one|sub) |
|
117
|
|
|
|
|
|
|
# Defaults to sub |
|
118
|
|
|
|
|
|
|
PerlSetVar LDAPscope sub |
|
119
|
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
# Defines the search filter |
|
121
|
|
|
|
|
|
|
# [uid] will be replaced by the username passed in to AuthZLDAP |
|
122
|
|
|
|
|
|
|
PerlSetVar LDAPfilter &(member=uid=[uid],ou=people,dc=organization,dc=domain)(cn=admins) |
|
123
|
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
=cut |
|
125
|
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
sub handler{ |
|
127
|
|
|
|
|
|
|
my $r= shift; |
|
128
|
|
|
|
|
|
|
return Apache2::Const::OK unless $r->is_initial_req; |
|
129
|
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
## Location Variables to connect to the good server |
|
131
|
|
|
|
|
|
|
my @LDAPURI = $r->dir_config->get('LDAPURI'); |
|
132
|
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
my $LDAPSSLverify = lc($r->dir_config('LDAPSSLverify')); |
|
134
|
|
|
|
|
|
|
my $LDAPSSLcapath = $r->dir_config('LDAPSSLcapath'); |
|
135
|
|
|
|
|
|
|
my $LDAPSSLcafile = $r->dir_config('LDAPSSLcafile'); |
|
136
|
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
my $LDAPTLS = lc($r->dir_config('LDAPTLS')) || "no"; |
|
138
|
|
|
|
|
|
|
my $LDAPTLSverify = lc($r->dir_config('LDAPTLSverify')); |
|
139
|
|
|
|
|
|
|
my $LDAPTLScapath = $r->dir_config('LDAPTLScapath'); |
|
140
|
|
|
|
|
|
|
my $LDAPTLScafile = $r->dir_config('LDAPTLScafile'); |
|
141
|
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
if($LDAPTLS ne "yes" && $LDAPTLS ne "no"){ |
|
143
|
|
|
|
|
|
|
$LDAPTLS="no"; |
|
144
|
|
|
|
|
|
|
} |
|
145
|
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
## bind |
|
147
|
|
|
|
|
|
|
my $LDAPuser = $r->dir_config('LDAPuser'); |
|
148
|
|
|
|
|
|
|
my $LDAPpassword = $r->dir_config('LDAPpassword'); |
|
149
|
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
## baseDN and Filters |
|
151
|
|
|
|
|
|
|
my $LDAPbaseDN = $r->dir_config('LDAPbaseDN'); |
|
152
|
|
|
|
|
|
|
my $LDAPscope = lc($r->dir_config('LDAPscope')); |
|
153
|
|
|
|
|
|
|
my $LDAPfilter = $r->dir_config('LDAPfilter'); |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
if($LDAPscope ne 'base' && $LDAPscope ne 'one' && $LDAPscope ne 'sub'){ |
|
156
|
|
|
|
|
|
|
$LDAPscope = 'sub'; |
|
157
|
|
|
|
|
|
|
} |
|
158
|
|
|
|
|
|
|
|
|
159
|
|
|
|
|
|
|
my $location = $r->location; |
|
160
|
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
## Some error checking |
|
162
|
|
|
|
|
|
|
if (not @LDAPURI) { |
|
163
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, did not specify a LDAPURI"); |
|
164
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
165
|
|
|
|
|
|
|
} |
|
166
|
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
if (not defined $LDAPfilter) { |
|
168
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, did not specify a LDAPfilter"); |
|
169
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
170
|
|
|
|
|
|
|
} |
|
171
|
|
|
|
|
|
|
|
|
172
|
|
|
|
|
|
|
## did user authentified ? |
|
173
|
|
|
|
|
|
|
## retrieval of user id |
|
174
|
|
|
|
|
|
|
my $user = $r->user; |
|
175
|
|
|
|
|
|
|
if (not defined $user){ |
|
176
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, user didn't authentify uid empty"); |
|
177
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
178
|
|
|
|
|
|
|
}else{ |
|
179
|
|
|
|
|
|
|
$LDAPfilter =~ s/\[uid\]/$user/; |
|
180
|
|
|
|
|
|
|
} |
|
181
|
|
|
|
|
|
|
|
|
182
|
|
|
|
|
|
|
## port initialisation |
|
183
|
|
|
|
|
|
|
my $session; ## TODO make this come from a pool maybe? |
|
184
|
|
|
|
|
|
|
my $mesg; |
|
185
|
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
unless ($session = Net::LDAP->new(\@LDAPURI, capath=>$LDAPSSLcapath, cafile=>$LDAPSSLcafile, verify=>$LDAPSSLverify)) { |
|
187
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, LDAP error cannot create session"); |
|
188
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
189
|
|
|
|
|
|
|
} |
|
190
|
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
if ($LDAPTLS eq 'yes') { |
|
192
|
|
|
|
|
|
|
$mesg = $session->start_tls(capath=>$LDAPTLScapath, cafile=>$LDAPTLScafile, verify=>$LDAPTLSverify); |
|
193
|
|
|
|
|
|
|
if ($mesg->code) { |
|
194
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, LDAP error could not start TLS : ".$mesg->error); |
|
195
|
|
|
|
|
|
|
} |
|
196
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
197
|
|
|
|
|
|
|
} |
|
198
|
|
|
|
|
|
|
|
|
199
|
|
|
|
|
|
|
## user password bind if configured else anonymous |
|
200
|
|
|
|
|
|
|
if (defined $LDAPuser and defined $LDAPpassword){ |
|
201
|
|
|
|
|
|
|
$mesg = $session->bind($LDAPuser,password=>$LDAPpassword); |
|
202
|
|
|
|
|
|
|
}else{ |
|
203
|
|
|
|
|
|
|
$mesg = $session->bind(); |
|
204
|
|
|
|
|
|
|
} |
|
205
|
|
|
|
|
|
|
|
|
206
|
|
|
|
|
|
|
if($mesg->code){ |
|
207
|
|
|
|
|
|
|
my $err_msg = 'LDAP error cannot bind '; |
|
208
|
|
|
|
|
|
|
if (defined $LDAPuser){ |
|
209
|
|
|
|
|
|
|
$err_msg .= "as $LDAPuser"; |
|
210
|
|
|
|
|
|
|
}else{ |
|
211
|
|
|
|
|
|
|
$err_msg .= 'anonymously'; |
|
212
|
|
|
|
|
|
|
} |
|
213
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, $err_msg : ".$mesg->error); |
|
214
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
215
|
|
|
|
|
|
|
} |
|
216
|
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
## search performing, if there is a result, OK |
|
218
|
|
|
|
|
|
|
$mesg = $session->search( # perform a search |
|
219
|
|
|
|
|
|
|
base => $LDAPbaseDN, |
|
220
|
|
|
|
|
|
|
scope => $LDAPscope, |
|
221
|
|
|
|
|
|
|
filter => $LDAPfilter, |
|
222
|
|
|
|
|
|
|
); |
|
223
|
|
|
|
|
|
|
if ($mesg->code) { |
|
224
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $location, LDAP error could not search : ".$mesg->error); |
|
225
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
226
|
|
|
|
|
|
|
} |
|
227
|
|
|
|
|
|
|
if ($mesg->count != 0){ |
|
228
|
|
|
|
|
|
|
$r->log->notice("Apache2::AuthZLDAP : $user authorized to access $location"); |
|
229
|
|
|
|
|
|
|
$session->unbind; |
|
230
|
|
|
|
|
|
|
return Apache2::Const::OK; |
|
231
|
|
|
|
|
|
|
}else{ |
|
232
|
|
|
|
|
|
|
$session->unbind; |
|
233
|
|
|
|
|
|
|
$r->log_error("Apache2::AuthZLDAP : $user not allowed to access $location"); |
|
234
|
|
|
|
|
|
|
return Apache2::Const::HTTP_UNAUTHORIZED; |
|
235
|
|
|
|
|
|
|
} |
|
236
|
|
|
|
|
|
|
} |
|
237
|
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
=head1 AUTHOR |
|
239
|
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
Dominique Launay, C<< >> |
|
241
|
|
|
|
|
|
|
Thanks to David Lowry, C<< >> for making the code more readable and improving it. |
|
242
|
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
=head1 BUGS |
|
244
|
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
Please report any bugs or feature requests through the web interface at |
|
246
|
|
|
|
|
|
|
L |
|
247
|
|
|
|
|
|
|
I will be notified, and then you'll automatically be notified of progress on |
|
248
|
|
|
|
|
|
|
your bug as I make changes. |
|
249
|
|
|
|
|
|
|
|
|
250
|
|
|
|
|
|
|
=head1 SUPPORT |
|
251
|
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
You can find documentation for this module with the perldoc command. |
|
253
|
|
|
|
|
|
|
|
|
254
|
|
|
|
|
|
|
perldoc Apache2::AuthZLDAP |
|
255
|
|
|
|
|
|
|
|
|
256
|
|
|
|
|
|
|
|
|
257
|
|
|
|
|
|
|
=over 4 |
|
258
|
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
=head1 ACKNOWLEDGEMENTS |
|
261
|
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
=head1 COPYRIGHT & LICENSE |
|
263
|
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
Copyright 2007 Dominique Launay, all rights reserved. |
|
265
|
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
This program is released under the following license: GPL |
|
267
|
|
|
|
|
|
|
|
|
268
|
|
|
|
|
|
|
=cut |
|
269
|
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
1; # End of Apache2::AuthZLDAP |