parent
3a0f4bd959
commit
17a4bf2cc0
@ -0,0 +1,11 @@ |
|||||||
|
FROM httpd:alpine |
||||||
|
#ADD ./httpd.conf /usr/local/apache2/conf/httpd.conf |
||||||
|
RUN apk update \ |
||||||
|
apk add apache2-mod-perl \ |
||||||
|
apache2-proxy \ |
||||||
|
mod_dav_svn \ |
||||||
|
perl-dbd-mysql \ |
||||||
|
perl-ldap \ |
||||||
|
subversion \ |
||||||
|
; |
||||||
|
ADD ./Redmine.pm /usr/lib/perl5/Apache/Authn/Redmine.pm |
@ -0,0 +1,560 @@ |
|||||||
|
package Apache::Authn::Redmine; |
||||||
|
|
||||||
|
=head1 Apache::Authn::Redmine |
||||||
|
|
||||||
|
Redmine - a mod_perl module to authenticate webdav subversion users |
||||||
|
against redmine database |
||||||
|
|
||||||
|
=head1 SYNOPSIS |
||||||
|
|
||||||
|
This module allow anonymous users to browse public project and |
||||||
|
registred users to browse and commit their project. Authentication is |
||||||
|
done against the redmine database or the LDAP configured in redmine. |
||||||
|
|
||||||
|
This method is far simpler than the one with pam_* and works with all |
||||||
|
database without an hassle but you need to have apache/mod_perl on the |
||||||
|
svn server. |
||||||
|
|
||||||
|
=head1 INSTALLATION |
||||||
|
|
||||||
|
For this to automagically work, you need to have a recent reposman.rb |
||||||
|
(after r860) and if you already use reposman, read the last section to |
||||||
|
migrate. |
||||||
|
|
||||||
|
Sorry ruby users but you need some perl modules, at least mod_perl2, |
||||||
|
DBI and DBD::mysql (or the DBD driver for you database as it should |
||||||
|
work on allmost all databases). |
||||||
|
|
||||||
|
On debian/ubuntu you must do : |
||||||
|
|
||||||
|
aptitude install libapache-dbi-perl libapache2-mod-perl2 libdbd-mysql-perl |
||||||
|
|
||||||
|
If your Redmine users use LDAP authentication, you will also need |
||||||
|
Authen::Simple::LDAP (and IO::Socket::SSL if LDAPS is used): |
||||||
|
|
||||||
|
aptitude install libauthen-simple-ldap-perl libio-socket-ssl-perl |
||||||
|
|
||||||
|
=head1 CONFIGURATION |
||||||
|
|
||||||
|
## This module has to be in your perl path |
||||||
|
## eg: /usr/lib/perl5/Apache/Authn/Redmine.pm |
||||||
|
PerlLoadModule Apache::Authn::Redmine |
||||||
|
<Location /svn> |
||||||
|
DAV svn |
||||||
|
SVNParentPath "/var/svn" |
||||||
|
|
||||||
|
AuthType Basic |
||||||
|
AuthName redmine |
||||||
|
Require valid-user |
||||||
|
|
||||||
|
PerlAccessHandler Apache::Authn::Redmine::access_handler |
||||||
|
PerlAuthenHandler Apache::Authn::Redmine::authen_handler |
||||||
|
|
||||||
|
## for mysql |
||||||
|
RedmineDSN "DBI:mysql:database=databasename;host=my.db.server" |
||||||
|
## for postgres |
||||||
|
# RedmineDSN "DBI:Pg:dbname=databasename;host=my.db.server" |
||||||
|
|
||||||
|
RedmineDbUser "redmine" |
||||||
|
RedmineDbPass "password" |
||||||
|
## Optional where clause (fulltext search would be slow and |
||||||
|
## database dependent). |
||||||
|
# RedmineDbWhereClause "and members.role_id IN (1,2)" |
||||||
|
## Optional credentials cache size |
||||||
|
# RedmineCacheCredsMax 50 |
||||||
|
</Location> |
||||||
|
|
||||||
|
To be able to browse repository inside redmine, you must add something |
||||||
|
like that : |
||||||
|
|
||||||
|
<Location /svn-private> |
||||||
|
DAV svn |
||||||
|
SVNParentPath "/var/svn" |
||||||
|
Order deny,allow |
||||||
|
Deny from all |
||||||
|
# only allow reading orders |
||||||
|
<Limit GET PROPFIND OPTIONS REPORT> |
||||||
|
Allow from redmine.server.ip |
||||||
|
</Limit> |
||||||
|
</Location> |
||||||
|
|
||||||
|
and you will have to use this reposman.rb command line to create repository : |
||||||
|
|
||||||
|
reposman.rb --redmine my.redmine.server --svn-dir /var/svn --owner www-data -u http://svn.server/svn-private/ |
||||||
|
|
||||||
|
=head1 REPOSITORIES NAMING |
||||||
|
|
||||||
|
A project repository must be named with the project identifier. In case |
||||||
|
of multiple repositories for the same project, use the project identifier |
||||||
|
and the repository identifier separated with a dot: |
||||||
|
|
||||||
|
/var/svn/foo |
||||||
|
/var/svn/foo.otherrepo |
||||||
|
|
||||||
|
=head1 MIGRATION FROM OLDER RELEASES |
||||||
|
|
||||||
|
If you use an older reposman.rb (r860 or before), you need to change |
||||||
|
rights on repositories to allow the apache user to read and write |
||||||
|
S<them :> |
||||||
|
|
||||||
|
sudo chown -R www-data /var/svn/* |
||||||
|
sudo chmod -R u+w /var/svn/* |
||||||
|
|
||||||
|
And you need to upgrade at least reposman.rb (after r860). |
||||||
|
|
||||||
|
=head1 GIT SMART HTTP SUPPORT |
||||||
|
|
||||||
|
Git's smart HTTP protocol (available since Git 1.7.0) will not work with the |
||||||
|
above settings. Redmine.pm normally does access control depending on the HTTP |
||||||
|
method used: read-only methods are OK for everyone in public projects and |
||||||
|
members with read rights in private projects. The rest require membership with |
||||||
|
commit rights in the project. |
||||||
|
|
||||||
|
However, this scheme doesn't work for Git's smart HTTP protocol, as it will use |
||||||
|
POST even for a simple clone. Instead, read-only requests must be detected using |
||||||
|
the full URL (including the query string): anything that doesn't belong to the |
||||||
|
git-receive-pack service is read-only. |
||||||
|
|
||||||
|
To activate this mode of operation, add this line inside your <Location /git> |
||||||
|
block: |
||||||
|
|
||||||
|
RedmineGitSmartHttp yes |
||||||
|
|
||||||
|
Here's a sample Apache configuration which integrates git-http-backend with |
||||||
|
a MySQL database and this new option: |
||||||
|
|
||||||
|
SetEnv GIT_PROJECT_ROOT /var/www/git/ |
||||||
|
SetEnv GIT_HTTP_EXPORT_ALL |
||||||
|
ScriptAlias /git/ /usr/libexec/git-core/git-http-backend/ |
||||||
|
<Location /git> |
||||||
|
Order allow,deny |
||||||
|
Allow from all |
||||||
|
|
||||||
|
AuthType Basic |
||||||
|
AuthName Git |
||||||
|
Require valid-user |
||||||
|
|
||||||
|
PerlAccessHandler Apache::Authn::Redmine::access_handler |
||||||
|
PerlAuthenHandler Apache::Authn::Redmine::authen_handler |
||||||
|
# for mysql |
||||||
|
RedmineDSN "DBI:mysql:database=redmine;host=127.0.0.1" |
||||||
|
RedmineDbUser "redmine" |
||||||
|
RedmineDbPass "xxx" |
||||||
|
RedmineGitSmartHttp yes |
||||||
|
</Location> |
||||||
|
|
||||||
|
Make sure that all the names of the repositories under /var/www/git/ have a |
||||||
|
matching identifier for some project: /var/www/git/myproject and |
||||||
|
/var/www/git/myproject.git will work. You can put both bare and non-bare |
||||||
|
repositories in /var/www/git, though bare repositories are strongly |
||||||
|
recommended. You should create them with the rights of the user running Redmine, |
||||||
|
like this: |
||||||
|
|
||||||
|
cd /var/www/git |
||||||
|
sudo -u user-running-redmine mkdir myproject |
||||||
|
cd myproject |
||||||
|
sudo -u user-running-redmine git init --bare |
||||||
|
|
||||||
|
Once you have activated this option, you have three options when cloning a |
||||||
|
repository: |
||||||
|
|
||||||
|
- Cloning using "http://user@host/git/repo(.git)" works, but will ask for the password |
||||||
|
all the time. |
||||||
|
|
||||||
|
- Cloning with "http://user:pass@host/git/repo(.git)" does not have this problem, but |
||||||
|
this could reveal accidentally your password to the console in some versions |
||||||
|
of Git, and you would have to ensure that .git/config is not readable except |
||||||
|
by the owner for each of your projects. |
||||||
|
|
||||||
|
- Use "http://host/git/repo(.git)", and store your credentials in the ~/.netrc |
||||||
|
file. This is the recommended solution, as you only have one file to protect |
||||||
|
and passwords will not be leaked accidentally to the console. |
||||||
|
|
||||||
|
IMPORTANT NOTE: It is *very important* that the file cannot be read by other |
||||||
|
users, as it will contain your password in cleartext. To create the file, you |
||||||
|
can use the following commands, replacing yourhost, youruser and yourpassword |
||||||
|
with the right values: |
||||||
|
|
||||||
|
touch ~/.netrc |
||||||
|
chmod 600 ~/.netrc |
||||||
|
echo -e "machine yourhost\nlogin youruser\npassword yourpassword" > ~/.netrc |
||||||
|
|
||||||
|
=cut |
||||||
|
|
||||||
|
use strict; |
||||||
|
use warnings FATAL => 'all', NONFATAL => 'redefine'; |
||||||
|
|
||||||
|
use DBI; |
||||||
|
use Digest::SHA; |
||||||
|
# optional module for LDAP authentication |
||||||
|
my $CanUseLDAPAuth = eval("use Authen::Simple::LDAP; 1"); |
||||||
|
|
||||||
|
use Apache2::Module; |
||||||
|
use Apache2::Access; |
||||||
|
use Apache2::ServerRec qw(); |
||||||
|
use Apache2::RequestRec qw(); |
||||||
|
use Apache2::RequestUtil qw(); |
||||||
|
use Apache2::Const qw(:common :override :cmd_how); |
||||||
|
use APR::Pool (); |
||||||
|
use APR::Table (); |
||||||
|
|
||||||
|
# use Apache2::Directive qw(); |
||||||
|
|
||||||
|
my @directives = ( |
||||||
|
{ |
||||||
|
name => 'RedmineDSN', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
errmsg => 'Dsn in format used by Perl DBI. eg: "DBI:Pg:dbname=databasename;host=my.db.server"', |
||||||
|
}, |
||||||
|
{ |
||||||
|
name => 'RedmineDbUser', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
}, |
||||||
|
{ |
||||||
|
name => 'RedmineDbPass', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
}, |
||||||
|
{ |
||||||
|
name => 'RedmineDbWhereClause', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
}, |
||||||
|
{ |
||||||
|
name => 'RedmineCacheCredsMax', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
errmsg => 'RedmineCacheCredsMax must be decimal number', |
||||||
|
}, |
||||||
|
{ |
||||||
|
name => 'RedmineGitSmartHttp', |
||||||
|
req_override => OR_AUTHCFG, |
||||||
|
args_how => TAKE1, |
||||||
|
}, |
||||||
|
); |
||||||
|
|
||||||
|
sub RedmineDSN { |
||||||
|
my ($self, $parms, $arg) = @_; |
||||||
|
$self->{RedmineDSN} = $arg; |
||||||
|
my $query = "SELECT |
||||||
|
users.hashed_password, users.salt, users.auth_source_id, roles.permissions, projects.status |
||||||
|
FROM projects, users, roles |
||||||
|
WHERE |
||||||
|
users.login=? |
||||||
|
AND projects.identifier=? |
||||||
|
AND EXISTS (SELECT 1 FROM enabled_modules em WHERE em.project_id = projects.id AND em.name = 'repository') |
||||||
|
AND users.type='User' |
||||||
|
AND users.status=1 |
||||||
|
AND ( |
||||||
|
roles.id IN (SELECT member_roles.role_id FROM members, member_roles WHERE members.user_id = users.id AND members.project_id = projects.id AND members.id = member_roles.member_id) |
||||||
|
OR |
||||||
|
(cast(projects.is_public as CHAR) IN ('t', '1') |
||||||
|
AND (roles.builtin=1 |
||||||
|
OR roles.id IN (SELECT member_roles.role_id FROM members, member_roles, users g |
||||||
|
WHERE members.user_id = g.id AND members.project_id = projects.id AND members.id = member_roles.member_id |
||||||
|
AND g.type = 'GroupNonMember')) |
||||||
|
) |
||||||
|
) |
||||||
|
AND roles.permissions IS NOT NULL"; |
||||||
|
$self->{RedmineQuery} = trim($query); |
||||||
|
} |
||||||
|
|
||||||
|
sub RedmineDbUser { set_val('RedmineDbUser', @_); } |
||||||
|
sub RedmineDbPass { set_val('RedmineDbPass', @_); } |
||||||
|
sub RedmineDbWhereClause { |
||||||
|
my ($self, $parms, $arg) = @_; |
||||||
|
$self->{RedmineQuery} = trim($self->{RedmineQuery}.($arg ? $arg : "")." "); |
||||||
|
} |
||||||
|
|
||||||
|
sub RedmineCacheCredsMax { |
||||||
|
my ($self, $parms, $arg) = @_; |
||||||
|
if ($arg) { |
||||||
|
$self->{RedmineCachePool} = APR::Pool->new; |
||||||
|
$self->{RedmineCacheCreds} = APR::Table::make($self->{RedmineCachePool}, $arg); |
||||||
|
$self->{RedmineCacheCredsCount} = 0; |
||||||
|
$self->{RedmineCacheCredsMax} = $arg; |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
sub RedmineGitSmartHttp { |
||||||
|
my ($self, $parms, $arg) = @_; |
||||||
|
$arg = lc $arg; |
||||||
|
|
||||||
|
if ($arg eq "yes" || $arg eq "true") { |
||||||
|
$self->{RedmineGitSmartHttp} = 1; |
||||||
|
} else { |
||||||
|
$self->{RedmineGitSmartHttp} = 0; |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
sub trim { |
||||||
|
my $string = shift; |
||||||
|
$string =~ s/\s{2,}/ /g; |
||||||
|
return $string; |
||||||
|
} |
||||||
|
|
||||||
|
sub set_val { |
||||||
|
my ($key, $self, $parms, $arg) = @_; |
||||||
|
$self->{$key} = $arg; |
||||||
|
} |
||||||
|
|
||||||
|
Apache2::Module::add(__PACKAGE__, \@directives); |
||||||
|
|
||||||
|
|
||||||
|
my %read_only_methods = map { $_ => 1 } qw/GET HEAD PROPFIND REPORT OPTIONS/; |
||||||
|
|
||||||
|
sub request_is_read_only { |
||||||
|
my ($r) = @_; |
||||||
|
my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config); |
||||||
|
|
||||||
|
# Do we use Git's smart HTTP protocol, or not? |
||||||
|
if (defined $cfg->{RedmineGitSmartHttp} and $cfg->{RedmineGitSmartHttp}) { |
||||||
|
my $uri = $r->unparsed_uri; |
||||||
|
my $location = $r->location; |
||||||
|
my $is_read_only = $uri !~ m{^$location/*[^/]+/+(info/refs\?service=)?git\-receive\-pack$}o; |
||||||
|
return $is_read_only; |
||||||
|
} else { |
||||||
|
# Standard behaviour: check the HTTP method |
||||||
|
my $method = $r->method; |
||||||
|
return defined $read_only_methods{$method}; |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
sub access_handler { |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
unless ($r->some_auth_required) { |
||||||
|
$r->log_reason("No authentication has been configured"); |
||||||
|
return FORBIDDEN; |
||||||
|
} |
||||||
|
|
||||||
|
return OK unless request_is_read_only($r); |
||||||
|
|
||||||
|
my $project_id = get_project_identifier($r); |
||||||
|
|
||||||
|
if (is_public_project($project_id, $r) && anonymous_allowed_to_browse_repository($project_id, $r)) { |
||||||
|
$r->user(""); |
||||||
|
$r->set_handlers(PerlAuthenHandler => [\&OK]); |
||||||
|
} |
||||||
|
|
||||||
|
return OK |
||||||
|
} |
||||||
|
|
||||||
|
sub authen_handler { |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my ($res, $redmine_pass) = $r->get_basic_auth_pw(); |
||||||
|
return $res unless $res == OK; |
||||||
|
|
||||||
|
if (is_member($r->user, $redmine_pass, $r)) { |
||||||
|
return OK; |
||||||
|
} else { |
||||||
|
$r->note_auth_failure(); |
||||||
|
return DECLINED; |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
# check if authentication is forced |
||||||
|
sub is_authentication_forced { |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my $dbh = connect_database($r); |
||||||
|
my $sth = $dbh->prepare( |
||||||
|
"SELECT value FROM settings where settings.name = 'login_required';" |
||||||
|
); |
||||||
|
|
||||||
|
$sth->execute(); |
||||||
|
my $ret = 0; |
||||||
|
if (my @row = $sth->fetchrow_array) { |
||||||
|
if ($row[0] eq "1" || $row[0] eq "t") { |
||||||
|
$ret = 1; |
||||||
|
} |
||||||
|
} |
||||||
|
$sth->finish(); |
||||||
|
undef $sth; |
||||||
|
|
||||||
|
$dbh->disconnect(); |
||||||
|
undef $dbh; |
||||||
|
|
||||||
|
$ret; |
||||||
|
} |
||||||
|
|
||||||
|
sub is_public_project { |
||||||
|
my $project_id = shift; |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
if (is_authentication_forced($r)) { |
||||||
|
return 0; |
||||||
|
} |
||||||
|
|
||||||
|
my $dbh = connect_database($r); |
||||||
|
my $sth = $dbh->prepare( |
||||||
|
"SELECT is_public FROM projects |
||||||
|
WHERE projects.identifier = ? AND projects.status <> 9 |
||||||
|
AND EXISTS (SELECT 1 FROM enabled_modules em WHERE em.project_id = projects.id AND em.name = 'repository');" |
||||||
|
); |
||||||
|
|
||||||
|
$sth->execute($project_id); |
||||||
|
my $ret = 0; |
||||||
|
if (my @row = $sth->fetchrow_array) { |
||||||
|
if ($row[0] eq "1" || $row[0] eq "t") { |
||||||
|
$ret = 1; |
||||||
|
} |
||||||
|
} |
||||||
|
$sth->finish(); |
||||||
|
undef $sth; |
||||||
|
$dbh->disconnect(); |
||||||
|
undef $dbh; |
||||||
|
|
||||||
|
$ret; |
||||||
|
} |
||||||
|
|
||||||
|
sub anonymous_allowed_to_browse_repository { |
||||||
|
my $project_id = shift; |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my $dbh = connect_database($r); |
||||||
|
my $sth = $dbh->prepare( |
||||||
|
"SELECT permissions FROM roles WHERE permissions like '%browse_repository%' |
||||||
|
AND (roles.builtin = 2 |
||||||
|
OR roles.id IN (SELECT member_roles.role_id FROM projects, members, member_roles, users |
||||||
|
WHERE members.user_id = users.id AND members.project_id = projects.id AND members.id = member_roles.member_id |
||||||
|
AND projects.identifier = ? AND users.type = 'GroupAnonymous'));" |
||||||
|
); |
||||||
|
|
||||||
|
$sth->execute($project_id); |
||||||
|
my $ret = 0; |
||||||
|
if (my @row = $sth->fetchrow_array) { |
||||||
|
if ($row[0] =~ /:browse_repository/) { |
||||||
|
$ret = 1; |
||||||
|
} |
||||||
|
} |
||||||
|
$sth->finish(); |
||||||
|
undef $sth; |
||||||
|
$dbh->disconnect(); |
||||||
|
undef $dbh; |
||||||
|
|
||||||
|
$ret; |
||||||
|
} |
||||||
|
|
||||||
|
# perhaps we should use repository right (other read right) to check public access. |
||||||
|
# it could be faster BUT it doesn't work for the moment. |
||||||
|
# sub is_public_project_by_file { |
||||||
|
# my $project_id = shift; |
||||||
|
# my $r = shift; |
||||||
|
|
||||||
|
# my $tree = Apache2::Directive::conftree(); |
||||||
|
# my $node = $tree->lookup('Location', $r->location); |
||||||
|
# my $hash = $node->as_hash; |
||||||
|
|
||||||
|
# my $svnparentpath = $hash->{SVNParentPath}; |
||||||
|
# my $repos_path = $svnparentpath . "/" . $project_id; |
||||||
|
# return 1 if (stat($repos_path))[2] & 00007; |
||||||
|
# } |
||||||
|
|
||||||
|
sub is_member { |
||||||
|
my $redmine_user = shift; |
||||||
|
my $redmine_pass = shift; |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my $project_id = get_project_identifier($r); |
||||||
|
|
||||||
|
my $pass_digest = Digest::SHA::sha1_hex($redmine_pass); |
||||||
|
|
||||||
|
my $access_mode = request_is_read_only($r) ? "R" : "W"; |
||||||
|
|
||||||
|
my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config); |
||||||
|
my $usrprojpass; |
||||||
|
if ($cfg->{RedmineCacheCredsMax}) { |
||||||
|
$usrprojpass = $cfg->{RedmineCacheCreds}->get($redmine_user.":".$project_id.":".$access_mode); |
||||||
|
return 1 if (defined $usrprojpass and ($usrprojpass eq $pass_digest)); |
||||||
|
} |
||||||
|
my $dbh = connect_database($r); |
||||||
|
my $query = $cfg->{RedmineQuery}; |
||||||
|
my $sth = $dbh->prepare($query); |
||||||
|
$sth->execute($redmine_user, $project_id); |
||||||
|
|
||||||
|
my $ret; |
||||||
|
while (my ($hashed_password, $salt, $auth_source_id, $permissions, $project_status) = $sth->fetchrow_array) { |
||||||
|
if ($project_status eq "9" || ($project_status ne "1" && $access_mode eq "W")) { |
||||||
|
last; |
||||||
|
} |
||||||
|
|
||||||
|
unless ($auth_source_id) { |
||||||
|
my $method = $r->method; |
||||||
|
my $salted_password = Digest::SHA::sha1_hex($salt.$pass_digest); |
||||||
|
if ($hashed_password eq $salted_password && (($access_mode eq "R" && $permissions =~ /:browse_repository/) || $permissions =~ /:commit_access/) ) { |
||||||
|
$ret = 1; |
||||||
|
last; |
||||||
|
} |
||||||
|
} elsif ($CanUseLDAPAuth) { |
||||||
|
my $sthldap = $dbh->prepare( |
||||||
|
"SELECT host,port,tls,account,account_password,base_dn,attr_login from auth_sources WHERE id = ?;" |
||||||
|
); |
||||||
|
$sthldap->execute($auth_source_id); |
||||||
|
while (my @rowldap = $sthldap->fetchrow_array) { |
||||||
|
my $bind_as = $rowldap[3] ? $rowldap[3] : ""; |
||||||
|
my $bind_pw = $rowldap[4] ? $rowldap[4] : ""; |
||||||
|
if ($bind_as =~ m/\$login/) { |
||||||
|
# replace $login with $redmine_user and use $redmine_pass |
||||||
|
$bind_as =~ s/\$login/$redmine_user/g; |
||||||
|
$bind_pw = $redmine_pass |
||||||
|
} |
||||||
|
my $ldap = Authen::Simple::LDAP->new( |
||||||
|
host => ($rowldap[2] eq "1" || $rowldap[2] eq "t") ? "ldaps://$rowldap[0]:$rowldap[1]" : $rowldap[0], |
||||||
|
port => $rowldap[1], |
||||||
|
basedn => $rowldap[5], |
||||||
|
binddn => $bind_as, |
||||||
|
bindpw => $bind_pw, |
||||||
|
filter => "(".$rowldap[6]."=%s)" |
||||||
|
); |
||||||
|
my $method = $r->method; |
||||||
|
$ret = 1 if ($ldap->authenticate($redmine_user, $redmine_pass) && (($access_mode eq "R" && $permissions =~ /:browse_repository/) || $permissions =~ /:commit_access/)); |
||||||
|
|
||||||
|
} |
||||||
|
$sthldap->finish(); |
||||||
|
undef $sthldap; |
||||||
|
} |
||||||
|
} |
||||||
|
$sth->finish(); |
||||||
|
undef $sth; |
||||||
|
$dbh->disconnect(); |
||||||
|
undef $dbh; |
||||||
|
|
||||||
|
if ($cfg->{RedmineCacheCredsMax} and $ret) { |
||||||
|
if (defined $usrprojpass) { |
||||||
|
$cfg->{RedmineCacheCreds}->set($redmine_user.":".$project_id.":".$access_mode, $pass_digest); |
||||||
|
} else { |
||||||
|
if ($cfg->{RedmineCacheCredsCount} < $cfg->{RedmineCacheCredsMax}) { |
||||||
|
$cfg->{RedmineCacheCreds}->set($redmine_user.":".$project_id.":".$access_mode, $pass_digest); |
||||||
|
$cfg->{RedmineCacheCredsCount}++; |
||||||
|
} else { |
||||||
|
$cfg->{RedmineCacheCreds}->clear(); |
||||||
|
$cfg->{RedmineCacheCredsCount} = 0; |
||||||
|
} |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
$ret; |
||||||
|
} |
||||||
|
|
||||||
|
sub get_project_identifier { |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config); |
||||||
|
my $location = $r->location; |
||||||
|
$location =~ s/\.git$// if (defined $cfg->{RedmineGitSmartHttp} and $cfg->{RedmineGitSmartHttp}); |
||||||
|
my ($identifier) = $r->uri =~ m{$location/*([^/.]+)}; |
||||||
|
$identifier; |
||||||
|
} |
||||||
|
|
||||||
|
sub connect_database { |
||||||
|
my $r = shift; |
||||||
|
|
||||||
|
my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config); |
||||||
|
return DBI->connect($cfg->{RedmineDSN}, $cfg->{RedmineDbUser}, $cfg->{RedmineDbPass}); |
||||||
|
} |
||||||
|
|
||||||
|
1; |
Loading…
Reference in new issue