summaryrefslogtreecommitdiffstats
path: root/apps/user_ldap/lib
diff options
context:
space:
mode:
authorSimon L <szaimen@e.mail.de>2022-10-21 18:53:16 +0200
committerGitHub <noreply@github.com>2022-10-21 18:53:16 +0200
commit47da08fe850b374d30ef68c55775600747bbd35c (patch)
tree688cb70faf6517083bb4297a5ff59bb5bdf4b213 /apps/user_ldap/lib
parent294a00d8e0b87a29c9f9de5de56e84a76c95182b (diff)
parentbff23762d14600efcdc9bec27169d531ec60f16c (diff)
downloadnextcloud-server-47da08fe850b374d30ef68c55775600747bbd35c.tar.gz
nextcloud-server-47da08fe850b374d30ef68c55775600747bbd35c.zip
Merge pull request #33945 from nextcloud/fix/noid/fair-use-ldap
LDAP to not register new users when outside of fair use or over limits
Diffstat (limited to 'apps/user_ldap/lib')
-rw-r--r--apps/user_ldap/lib/Group_Proxy.php35
-rw-r--r--apps/user_ldap/lib/Jobs/CleanUp.php2
-rw-r--r--apps/user_ldap/lib/Jobs/Sync.php2
-rw-r--r--apps/user_ldap/lib/Mapping/UserMapping.php39
-rw-r--r--apps/user_ldap/lib/Proxy.php42
-rw-r--r--apps/user_ldap/lib/User_Proxy.php39
6 files changed, 121 insertions, 38 deletions
diff --git a/apps/user_ldap/lib/Group_Proxy.php b/apps/user_ldap/lib/Group_Proxy.php
index ea2fcce679c..f8bdae67b72 100644
--- a/apps/user_ldap/lib/Group_Proxy.php
+++ b/apps/user_ldap/lib/Group_Proxy.php
@@ -34,18 +34,32 @@ use OCP\Group\Backend\INamedBackend;
class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGetDisplayNameBackend, INamedBackend, IDeleteGroupBackend {
private $backends = [];
- private $refBackend = null;
+ private ?Group_LDAP $refBackend = null;
+ private Helper $helper;
+ private GroupPluginManager $groupPluginManager;
+ private bool $isSetUp = false;
public function __construct(Helper $helper, ILDAPWrapper $ldap, GroupPluginManager $groupPluginManager) {
parent::__construct($ldap);
- $serverConfigPrefixes = $helper->getServerConfigurationPrefixes(true);
+ $this->helper = $helper;
+ $this->groupPluginManager = $groupPluginManager;
+ }
+
+ protected function setup(): void {
+ if ($this->isSetUp) {
+ return;
+ }
+
+ $serverConfigPrefixes = $this->helper->getServerConfigurationPrefixes(true);
foreach ($serverConfigPrefixes as $configPrefix) {
$this->backends[$configPrefix] =
- new \OCA\User_LDAP\Group_LDAP($this->getAccess($configPrefix), $groupPluginManager);
+ new Group_LDAP($this->getAccess($configPrefix), $this->groupPluginManager);
if (is_null($this->refBackend)) {
$this->refBackend = &$this->backends[$configPrefix];
}
}
+
+ $this->isSetUp = true;
}
/**
@@ -57,6 +71,8 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* @return mixed the result of the method or false
*/
protected function walkBackends($id, $method, $parameters) {
+ $this->setup();
+
$gid = $id;
$cacheKey = $this->getGroupCacheKey($gid);
foreach ($this->backends as $configPrefix => $backend) {
@@ -80,6 +96,8 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* @return mixed the result of the method or false
*/
protected function callOnLastSeenOn($id, $method, $parameters, $passOnWhen) {
+ $this->setup();
+
$gid = $id;
$cacheKey = $this->getGroupCacheKey($gid);
$prefix = $this->getFromCache($cacheKey);
@@ -105,6 +123,7 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
}
protected function activeBackends(): int {
+ $this->setup();
return count($this->backends);
}
@@ -131,8 +150,9 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* if the user exists at all.
*/
public function getUserGroups($uid) {
- $groups = [];
+ $this->setup();
+ $groups = [];
foreach ($this->backends as $backend) {
$backendGroups = $backend->getUserGroups($uid);
if (is_array($backendGroups)) {
@@ -149,8 +169,9 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* @return string[] with user ids
*/
public function usersInGroup($gid, $search = '', $limit = -1, $offset = 0) {
- $users = [];
+ $this->setup();
+ $users = [];
foreach ($this->backends as $backend) {
$backendUsers = $backend->usersInGroup($gid, $search, $limit, $offset);
if (is_array($backendUsers)) {
@@ -237,8 +258,9 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* Returns a list with all groups
*/
public function getGroups($search = '', $limit = -1, $offset = 0) {
- $groups = [];
+ $this->setup();
+ $groups = [];
foreach ($this->backends as $backend) {
$backendGroups = $backend->getGroups($search, $limit, $offset);
if (is_array($backendGroups)) {
@@ -269,6 +291,7 @@ class Group_Proxy extends Proxy implements \OCP\GroupInterface, IGroupLDAP, IGet
* compared with \OCP\GroupInterface::CREATE_GROUP etc.
*/
public function implementsActions($actions) {
+ $this->setup();
//it's the same across all our user backends obviously
return $this->refBackend->implementsActions($actions);
}
diff --git a/apps/user_ldap/lib/Jobs/CleanUp.php b/apps/user_ldap/lib/Jobs/CleanUp.php
index 1fb423b5faf..22067d81a9d 100644
--- a/apps/user_ldap/lib/Jobs/CleanUp.php
+++ b/apps/user_ldap/lib/Jobs/CleanUp.php
@@ -107,7 +107,7 @@ class CleanUp extends TimedJob {
if (isset($arguments['mapping'])) {
$this->mapping = $arguments['mapping'];
} else {
- $this->mapping = new UserMapping($this->db);
+ $this->mapping = \OCP\Server::get(UserMapping::class);
}
if (isset($arguments['deletedUsersIndex'])) {
diff --git a/apps/user_ldap/lib/Jobs/Sync.php b/apps/user_ldap/lib/Jobs/Sync.php
index d9171f4aab7..b231089b79b 100644
--- a/apps/user_ldap/lib/Jobs/Sync.php
+++ b/apps/user_ldap/lib/Jobs/Sync.php
@@ -357,7 +357,7 @@ class Sync extends TimedJob {
if (isset($argument['mapper'])) {
$this->mapper = $argument['mapper'];
} else {
- $this->mapper = new UserMapping($this->dbc);
+ $this->mapper = \OCP\Server::get(UserMapping::class);
}
if (isset($argument['connectionFactory'])) {
diff --git a/apps/user_ldap/lib/Mapping/UserMapping.php b/apps/user_ldap/lib/Mapping/UserMapping.php
index 899cc015c9f..ade9c67213a 100644
--- a/apps/user_ldap/lib/Mapping/UserMapping.php
+++ b/apps/user_ldap/lib/Mapping/UserMapping.php
@@ -22,12 +22,51 @@
*/
namespace OCA\User_LDAP\Mapping;
+use OCP\HintException;
+use OCP\IDBConnection;
+use OCP\IRequest;
+use OCP\Server;
+use OCP\Support\Subscription\IAssertion;
+
/**
* Class UserMapping
+ *
* @package OCA\User_LDAP\Mapping
*/
class UserMapping extends AbstractMapping {
+ private IAssertion $assertion;
+ protected const PROV_API_REGEX = '/\/ocs\/v[1-9].php\/cloud\/(groups|users)/';
+
+ public function __construct(IDBConnection $dbc, IAssertion $assertion) {
+ $this->assertion = $assertion;
+ parent::__construct($dbc);
+ }
+
+ /**
+ * @throws HintException
+ */
+ public function map($fdn, $name, $uuid): bool {
+ try {
+ $this->assertion->createUserIsLegit();
+ } catch (HintException $e) {
+ static $isProvisioningApi = null;
+
+ if ($isProvisioningApi === null) {
+ $request = Server::get(IRequest::class);
+ $isProvisioningApi = \preg_match(self::PROV_API_REGEX, $request->getRequestUri()) === 1;
+ }
+ if ($isProvisioningApi) {
+ // only throw when prov API is being used, since functionality
+ // should not break for end users (e.g. when sharing).
+ // On direct API usage, e.g. on users page, this is desired.
+ throw $e;
+ }
+ return false;
+ }
+ return parent::map($fdn, $name, $uuid);
+ }
+
/**
* returns the DB table name which holds the mappings
* @return string
diff --git a/apps/user_ldap/lib/Proxy.php b/apps/user_ldap/lib/Proxy.php
index d9546a163ab..4df6c2683a6 100644
--- a/apps/user_ldap/lib/Proxy.php
+++ b/apps/user_ldap/lib/Proxy.php
@@ -35,7 +35,9 @@ namespace OCA\User_LDAP;
use OCA\User_LDAP\Mapping\GroupMapping;
use OCA\User_LDAP\Mapping\UserMapping;
use OCA\User_LDAP\User\Manager;
-use OCP\Share\IManager;
+use OCP\IConfig;
+use OCP\IUserManager;
+use OCP\Server;
use Psr\Log\LoggerInterface;
abstract class Proxy {
@@ -61,34 +63,18 @@ abstract class Proxy {
/**
* @param string $configPrefix
*/
- private function addAccess($configPrefix) {
- static $ocConfig;
- static $fs;
- static $log;
- static $avatarM;
- static $userMap;
- static $groupMap;
- static $shareManager;
- static $coreUserManager;
- static $coreNotificationManager;
- static $logger;
- if ($fs === null) {
- $ocConfig = \OC::$server->getConfig();
- $fs = new FilesystemHelper();
- $avatarM = \OC::$server->getAvatarManager();
- $db = \OC::$server->getDatabaseConnection();
- $userMap = new UserMapping($db);
- $groupMap = new GroupMapping($db);
- $coreUserManager = \OC::$server->getUserManager();
- $coreNotificationManager = \OC::$server->getNotificationManager();
- $shareManager = \OC::$server->get(IManager::class);
- $logger = \OC::$server->get(LoggerInterface::class);
- }
- $userManager =
- new Manager($ocConfig, $fs, $logger, $avatarM, new \OCP\Image(),
- $coreUserManager, $coreNotificationManager, $shareManager);
+ private function addAccess(string $configPrefix): void {
+ $ocConfig = Server::get(IConfig::class);
+ $userMap = Server::get(UserMapping::class);
+ $groupMap = Server::get(GroupMapping::class);
+ $coreUserManager = Server::get(IUserManager::class);
+ $logger = Server::get(LoggerInterface::class);
+ $helper = Server::get(Helper::class);
+
+ $userManager = Server::get(Manager::class);
+
$connector = new Connection($this->ldap, $configPrefix);
- $access = new Access($connector, $this->ldap, $userManager, new Helper($ocConfig, \OC::$server->getDatabaseConnection()), $ocConfig, $coreUserManager, $logger);
+ $access = new Access($connector, $this->ldap, $userManager, $helper, $ocConfig, $coreUserManager, $logger);
$access->setUserMapper($userMap);
$access->setGroupMapper($groupMap);
self::$accesses[$configPrefix] = $access;
diff --git a/apps/user_ldap/lib/User_Proxy.php b/apps/user_ldap/lib/User_Proxy.php
index 040d4f5aa69..93420bbb470 100644
--- a/apps/user_ldap/lib/User_Proxy.php
+++ b/apps/user_ldap/lib/User_Proxy.php
@@ -42,6 +42,13 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
/** @var User_LDAP */
private $refBackend = null;
+ private bool $isSetUp = false;
+ private Helper $helper;
+ private IConfig $ocConfig;
+ private INotificationManager $notificationManager;
+ private IUserSession $userSession;
+ private UserPluginManager $userPluginManager;
+
public function __construct(
Helper $helper,
ILDAPWrapper $ldap,
@@ -51,15 +58,29 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
UserPluginManager $userPluginManager
) {
parent::__construct($ldap);
- $serverConfigPrefixes = $helper->getServerConfigurationPrefixes(true);
+ $this->helper = $helper;
+ $this->ocConfig = $ocConfig;
+ $this->notificationManager = $notificationManager;
+ $this->userSession = $userSession;
+ $this->userPluginManager = $userPluginManager;
+ }
+
+ protected function setup(): void {
+ if ($this->isSetUp) {
+ return;
+ }
+
+ $serverConfigPrefixes = $this->helper->getServerConfigurationPrefixes(true);
foreach ($serverConfigPrefixes as $configPrefix) {
$this->backends[$configPrefix] =
- new User_LDAP($this->getAccess($configPrefix), $ocConfig, $notificationManager, $userSession, $userPluginManager);
+ new User_LDAP($this->getAccess($configPrefix), $this->ocConfig, $this->notificationManager, $this->userSession, $this->userPluginManager);
if (is_null($this->refBackend)) {
$this->refBackend = &$this->backends[$configPrefix];
}
}
+
+ $this->isSetUp = true;
}
/**
@@ -71,6 +92,8 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return mixed the result of the method or false
*/
protected function walkBackends($id, $method, $parameters) {
+ $this->setup();
+
$uid = $id;
$cacheKey = $this->getUserCacheKey($uid);
foreach ($this->backends as $configPrefix => $backend) {
@@ -99,6 +122,8 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return mixed the result of the method or false
*/
protected function callOnLastSeenOn($id, $method, $parameters, $passOnWhen) {
+ $this->setup();
+
$uid = $id;
$cacheKey = $this->getUserCacheKey($uid);
$prefix = $this->getFromCache($cacheKey);
@@ -129,6 +154,7 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
}
protected function activeBackends(): int {
+ $this->setup();
return count($this->backends);
}
@@ -142,6 +168,7 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* compared with \OC\User\Backend::CREATE_USER etc.
*/
public function implementsActions($actions) {
+ $this->setup();
//it's the same across all our user backends obviously
return $this->refBackend->implementsActions($actions);
}
@@ -152,6 +179,7 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return string the name of the backend to be shown
*/
public function getBackendName() {
+ $this->setup();
return $this->refBackend->getBackendName();
}
@@ -164,6 +192,8 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return string[] an array of all uids
*/
public function getUsers($search = '', $limit = 10, $offset = 0) {
+ $this->setup();
+
//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
$users = [];
foreach ($this->backends as $backend) {
@@ -296,6 +326,8 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return array an array of all displayNames (value) and the corresponding uids (key)
*/
public function getDisplayNames($search = '', $limit = null, $offset = null) {
+ $this->setup();
+
//we do it just as the /OC_User implementation: do not play around with limit and offset but ask all backends
$users = [];
foreach ($this->backends as $backend) {
@@ -335,6 +367,7 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return bool
*/
public function hasUserListings() {
+ $this->setup();
return $this->refBackend->hasUserListings();
}
@@ -344,6 +377,8 @@ class User_Proxy extends Proxy implements \OCP\IUserBackend, \OCP\UserInterface,
* @return int|bool
*/
public function countUsers() {
+ $this->setup();
+
$users = false;
foreach ($this->backends as $backend) {
$backendUsers = $backend->countUsers();