summaryrefslogtreecommitdiffstats
path: root/roles/ipsilon/files/infofas.py
blob: c1590a426ca799d17022a8c95bc042b8d3bb59d2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
# Copyright (C) 2014,2016 Ipsilon project Contributors, for license see COPYING

from ipsilon.info.common import InfoProviderBase, InfoProviderInstaller
from ipsilon.util.plugin import PluginObject
from ipsilon.util.policy import Policy
from ipsilon.util import config as pconfig

from fedora.client.fas2 import AccountSystem


try:
    import openid_cla.cla as cla

    CLA_GROUPS = {
        'cla_click': cla.CLA_URI_FEDORA_CLICK,
        'cla_dell': cla.CLA_URI_FEDORA_DELL,
        'cla_done': cla.CLA_URI_FEDORA_DONE,
        'cla_fedora': cla.CLA_URI_FEDORA_FEDORA,
        'cla_fpca': cla.CLA_URI_FEDORA_FPCA,
        'cla_ibm': cla.CLA_URI_FEDORA_IBM,
        'cla_intel': cla.CLA_URI_FEDORA_INTEL,
        'cla_redhat': cla.CLA_URI_FEDORA_REDHAT,
    }
except ImportError:
    CLA_GROUPS = dict()

fas_mapping = [
    ['username', 'nickname'],
    ['telephone', 'phone'],
    ['country_code', 'country'],
    ['human_name', 'fullname'],
    ['email', 'email'],
    ['timezone', 'timezone'],
    ['ssh_key', 'ssh_key'],
    ['gpg_keyid', 'gpg_keyid'],
]

fas_mapper = Policy(fas_mapping)

aws_idp_arn = 'arn:aws:iam::125523088429:saml-provider/id.fedoraproject.org'
aws_groups = {
    'aws-master': 'arn:aws:iam::125523088429:role/aws-master',
    'aws-iam': 'arn:aws:iam::125523088429:role/aws-iam',
    'aws-billing': 'arn:aws:iam::125523088429:role/aws-billing',
    'aws-atomic': 'arn:aws:iam::125523088429:role/aws-atomic',
    'aws-s3-readonly': 'arn:aws:iam::125523088429:role/aws-s3-readonly'
}


def fas_make_userdata(fas_data):
    userdata, fas_extra = fas_mapper.map_attributes(fas_data)

    # We need to split ssh keys by newline, since we can't send newlines
    if userdata.get('ssh_key'):
        userdata['ssh_key'] = userdata['ssh_key'].split('\n')

    # compute and store groups and cla groups
    userdata['_groups'] = []
    userdata['_extras'] = {'fas': fas_extra, 'cla': []}
    for group in fas_data.get('approved_memberships', {}):
        if 'name' not in group:
            continue
        if group.get('group_type') == 'cla':
            if group['name'] in CLA_GROUPS:
                group_name = CLA_GROUPS[group['name']]
            else:
                group_name = group['name']
            userdata['_extras']['cla'].append(group_name)
        else:
            userdata['_groups'].append(group['name'])

    userdata['_extras']['awsroles'] = []
    for group in userdata['_groups']:
        if group in aws_groups:
            userdata['_extras']['awsroles'].append(
                '%s,%s' % (aws_idp_arn, aws_groups[group]))

    return userdata


class InfoProvider(InfoProviderBase):

    def __init__(self, *args):
        super(InfoProvider, self).__init__(*args)
        self._fas_client = None
        self.name = 'fas'
        self.description = """
Info plugin that retrieves user data from FAS. """

        self.new_config(
            self.name,
            pconfig.String(
                'FAS url',
                'The FAS Url.',
                'https://admin.fedoraproject.org/accounts/'),
            pconfig.String(
                'FAS Proxy client user Agent',
                'The User Agent presented to the FAS Server.',
                'Ipsilon v1.0'),
            pconfig.Condition(
                'FAS Insecure Auth',
                'If checked skips FAS server cert verification.',
                False),
            pconfig.String(
                'Bind Username',
                'Username to be used when retrieving info.',
                'ipsilondummy'),
            pconfig.String(
                'Bind Password',
                'Username to be used when retrieving info.',
                'Password')
        )

    @property
    def fas_url(self):
        return self.get_config_value('FAS url')

    @property
    def user_agent(self):
        return self.get_config_value('FAS Proxy client user Agent')

    @property
    def insecure(self):
        return self.get_config_value('FAS Insecure Auth')

    @property
    def bind_user(self):
        return self.get_config_value('Bind Username')

    @property
    def bind_pass(self):
        return self.get_config_value('Bind Password')

    @property
    def fas_client(self):
        if not self._fas_client:
            self._fas_client = AccountSystem(base_url=self.fas_url,
                                             insecure=self.insecure,
                                             useragent=self.user_agent,
                                             username=self.bind_user,
                                             password=self.bind_pass)
        return self._fas_client

    def get_user_attrs(self, user):
        if not self.fas_client:
            return {}
        try:
            data = self.fas_client.person_by_username(user)
        except Exception as ex:  # pylint: disable=broad-except
            self.error('Unable to retrieve info for %s: %s' % (user, ex))
            self.debug('URL: %s' % self.fas_url)
            self.debug('username: %s' % self.bind_user)
            return {}
        if not data:
            return {}
        return fas_make_userdata(data)


class Installer(InfoProviderInstaller):

    def __init__(self, *pargs):
        super(Installer, self).__init__()
        self.name = 'fas'
        self.pargs = pargs

    def install_args(self, group):
        group.add_argument('--info-fas', choices=['yes', 'no'], default='no',
                           help='Configure FAS info')
        group.add_argument('--info-fas-bind-username', action='store',
                           help='Username to use to retrieve FAS info')
        group.add_argument('--info-fas-bind-password', action='store',
                           help='Password to use to retrieve FAS info')

    def configure(self, opts, changes):
        if opts['info_fas'] != 'yes':
            return

        # Add configuration data to database
        po = PluginObject(*self.pargs)
        po.name = 'fas'
        po.wipe_data()
        po.wipe_config_values()

        config = dict()
        if 'info_fas_bind_username' in opts:
            config['Bind Username'] = opts['info_fas_bind_username']
        if 'info_fas_bind_password' in opts:
            config['Bind Password'] = opts['info_fas_bind_password']
        po.save_plugin_config(config)

        # Update global config to add login plugin
        po.is_enabled = True
        po.save_enabled_state()