Source code for mockldap.ldapobject

from __future__ import absolute_import, division, print_function, unicode_literals

import base64
from copy import deepcopy
try:
    from crypt import crypt
except ImportError:
    crypt = None
import hashlib
import re

import ldap
from ldap.cidict import cidict
import ldap.dn

from .recording import SeedRequired, RecordableMethods, recorded


[docs]class LDAPObject(RecordableMethods): """ :param directory: The initial content of this LDAP connection. :type directory: :class:`ldap.cidict.cidict`: ``{dn: {attr: [values]}}`` Our mock replacement for :class:`ldap.LDAPObject`. This exports selected LDAP operations and allows you to set return values in advance as well as discover which methods were called after the fact. All of these methods take the same arguments as their python-ldap counterparts. Some are self-explanatory; those that are only partially implemented are documented as such. Ignore the *static* annotations; that's just a Sphinx artifact. .. attribute:: options *dict*: Options that have been set by :meth:`~mockldap.LDAPObject.set_option`. .. attribute:: tls_enabled *bool*: True if :meth:`~mockldap.LDAPObject.start_tls_s` was called. .. attribute:: bound_as *string*: DN of the last successful bind. None if unbound. """ def __init__(self, directory): if not isinstance(directory, ldap.cidict.cidict): from . import map_keys directory = cidict(map_keys(lambda s: s.lower(), directory)) self.directory = deepcopy(directory) self.async_results = [] self.options = {} self.tls_enabled = False self.bound_as = None def _check_valid_dn(self, dn): try: ldap.dn.str2dn(dn) except ldap.DECODING_ERROR: raise ldap.INVALID_DN_SYNTAX # # Begin LDAP methods #
[docs] @recorded def initialize(self, *args, **kwargs): """ This only exists for recording purposes. """ pass
[docs] @recorded def get_option(self, option): """ """ return self.options[option]
[docs] @recorded def set_option(self, option, invalue): """ """ self.options[option] = invalue
[docs] @recorded def simple_bind_s(self, who='', cred=''): """ """ success = False try: if(who == '' and cred == ''): success = True elif self._compare_s(who, 'userPassword', cred): success = True except ldap.NO_SUCH_OBJECT: pass if success: self.bound_as = who return (97, []) else: raise ldap.INVALID_CREDENTIALS('%s:%s' % (who, cred))
[docs] @recorded def search(self, base, scope, filterstr='(objectClass=*)', attrlist=None, attrsonly=0): """ See :meth:`~mockldap.LDAPObject.search_s`. """ value = self._search_s(base, scope, filterstr, attrlist, attrsonly) return self._add_async_result(value)
[docs] @recorded def result(self, msgid, all=1, timeout=None): """ """ return ldap.RES_SEARCH_RESULT, self._pop_async_result(msgid)
[docs] @recorded def search_s(self, base, scope, filterstr='(objectClass=*)', attrlist=None, attrsonly=0): r""" Supports many, but not all, filter strings. Tests of the form ``'(foo=bar)'`` and ``'(foo=\*)'`` are supported, as are the &, \|, and ! operators. attrlist and attrsonly are also supported. Beyond that, this method must be seeded. """ return self._search_s(base, scope, filterstr, attrlist, attrsonly)
[docs] @recorded def start_tls_s(self): """ """ self.tls_enabled = True
[docs] @recorded def compare_s(self, dn, attr, value): """ """ return self._compare_s(dn, attr, value)
[docs] @recorded def modify_s(self, dn, mod_attrs): """ """ return self._modify_s(dn, mod_attrs)
[docs] @recorded def add_s(self, dn, record): """ """ return self._add_s(dn, record)
[docs] @recorded def rename_s(self, dn, newrdn, newsuperior=None): """ """ return self._rename_s(dn, newrdn, newsuperior)
[docs] @recorded def delete_s(self, dn): """ """ return self._delete_s(dn)
[docs] @recorded def unbind(self): """ """ self.bound_as = None
[docs] @recorded def unbind_s(self): """ """ self.bound_as = None
[docs] @recorded def whoami_s(self): """ """ return "dn:" + self.bound_as
[docs] @recorded def passwd_s(self, user, oldpw, newpw, serverctrls=None, clientctrls=None): """ """ return self._passwd_s(user, oldpw, newpw, serverctrls, clientctrls)
# # Internal implementations # def _compare_s(self, dn, attr, value): self._check_valid_dn(dn) try: values = self.directory[dn].get(attr, []) except KeyError: raise ldap.NO_SUCH_OBJECT if attr == 'userPassword': result = 1 if any(self._compare_password(value, candidate) for candidate in values) else 0 else: result = (1 if (value in values) else 0) return result PASSWORD_RE = re.compile(r'^{(.*?)}(.*)') def _compare_password(self, password, value): """ Compare a password to a (possibly hashed) attribute value. This returns True iff ``password`` matches the given attribute value. A limited set of LDAP password hashing schemes is supported; feel free to add more if you need them. """ match = self.PASSWORD_RE.match(value) if match is not None: scheme, raw = match.groups() if crypt is not None and scheme == 'CRYPT': matches = (crypt(password, raw[:4]) == raw) elif scheme == 'SSHA': decoded = base64.b64decode(raw) h = hashlib.sha1(password.encode('utf-8')) h.update(decoded[h.digest_size:]) matches = (h.digest() == decoded[:h.digest_size]) else: matches = False else: matches = (value == password) return matches def _search_s(self, base, scope, filterstr, attrlist, attrsonly): from .filter import parse, UnsupportedOp self._check_valid_dn(base) if base not in self.directory: raise ldap.NO_SUCH_OBJECT # Find directory entries within the requested scope base_parts = ldap.dn.explode_dn(base.lower()) base_len = len(base_parts) dn_parts = {dn: ldap.dn.explode_dn(dn.lower()) for dn in self.directory.keys()} if scope == ldap.SCOPE_BASE: dns = (dn for dn, parts in dn_parts.items() if parts == base_parts) elif scope == ldap.SCOPE_ONELEVEL: dns = (dn for dn, parts in dn_parts.items() if parts[1:] == base_parts) elif scope == ldap.SCOPE_SUBTREE: dns = (dn for dn, parts in dn_parts.items() if parts[-base_len:] == base_parts) else: raise ValueError(u"Unrecognized scope: {0}".format(scope)) # Apply the filter expression try: filter_expr = parse(filterstr) except UnsupportedOp as e: raise SeedRequired(e) results = ((dn, self.directory[dn]) for dn in dns if filter_expr.matches(dn, self.directory[dn])) # Apply attribute filtering, if any if attrlist is not None: results = ((dn, {attr: values for attr, values in attrs.items() if attr in attrlist}) for dn, attrs in results) if attrsonly: results = ((dn, {attr: [] for attr in attrs.keys()}) for dn, attrs in results) return list(results) def _modify_s(self, dn, mod_attrs): self._check_valid_dn(dn) for item in mod_attrs: op, key, value = item try: entry = self.directory[dn] except KeyError: raise ldap.NO_SUCH_OBJECT if value is None: value = [] elif not isinstance(value, list): value = [value] if op == ldap.MOD_ADD: if value == []: raise ldap.PROTOCOL_ERROR if key not in entry: entry[key] = value else: for subvalue in value: if subvalue not in entry[key]: entry[key].append(subvalue) elif op == ldap.MOD_DELETE: if key not in entry: pass elif value == []: del entry[key] else: entry[key] = [v for v in entry[key] if v not in value] if entry[key] == []: del entry[key] elif op == ldap.MOD_REPLACE: if value == []: if key in entry: del entry[key] else: entry[key] = value return (103, []) def _add_s(self, dn, record): self._check_valid_dn(dn) entry = {} dn = str(dn) for item in record: entry[item[0]] = list(item[1]) try: self.directory[dn] raise ldap.ALREADY_EXISTS except KeyError: self.directory[dn.lower()] = entry return (105, [], len(self.methods_called()), []) def _rename_s(self, dn, newrdn, newsuperior): self._check_valid_dn(dn) self._check_valid_dn(newrdn) if newsuperior: self._check_valid_dn(newsuperior) try: entry = self.directory[dn] except KeyError: raise ldap.NO_SUCH_OBJECT if newsuperior: superior = newsuperior else: superior = ','.join(dn.split(',')[1:]) newfulldn = '%s,%s' % (newrdn, superior) if newfulldn in self.directory: raise ldap.ALREADY_EXISTS oldattr, oldvalue = dn.split(',')[0].split('=') newattr, newvalue = newrdn.split('=') if oldattr == newattr or len(entry[oldattr]) > 1: entry[oldattr].remove(oldvalue) else: del entry[oldattr] try: if newvalue not in entry[newattr]: entry[newattr].append(newvalue) except KeyError: entry[newattr] = [newvalue] self.directory[newfulldn] = entry del self.directory[dn] return (109, []) def _delete_s(self, dn): self._check_valid_dn(dn) try: del self.directory[dn] except KeyError: raise ldap.NO_SUCH_OBJECT return (107, []) def _passwd_s(self, user, oldpw, newpw, serverctrls=None, clientctrls=None): self._check_valid_dn(user) entry = self.directory.get(user) if entry is None: raise ldap.NO_SUCH_OBJECT if oldpw is not None: if entry['userPassword'][0] == oldpw: entry['userPassword'] = [newpw] else: entry['userPassword'] = [newpw] # # Async # def _add_async_result(self, value): self.async_results.append(value) return len(self.async_results) - 1 def _pop_async_result(self, msgid): if msgid in range(len(self.async_results)): value = self.async_results[msgid] self.async_results[msgid] = None else: value = None return value