##// END OF EJS Templates
replace tabs to spaces at Redmine.pm...
Toshi MARUYAMA -
r10819:16bddb9d2496
parent child
Show More
@@ -1,544 +1,544
1 1 package Apache::Authn::Redmine;
2 2
3 3 =head1 Apache::Authn::Redmine
4 4
5 5 Redmine - a mod_perl module to authenticate webdav subversion users
6 6 against redmine database
7 7
8 8 =head1 SYNOPSIS
9 9
10 10 This module allow anonymous users to browse public project and
11 11 registred users to browse and commit their project. Authentication is
12 12 done against the redmine database or the LDAP configured in redmine.
13 13
14 14 This method is far simpler than the one with pam_* and works with all
15 15 database without an hassle but you need to have apache/mod_perl on the
16 16 svn server.
17 17
18 18 =head1 INSTALLATION
19 19
20 20 For this to automagically work, you need to have a recent reposman.rb
21 21 (after r860) and if you already use reposman, read the last section to
22 22 migrate.
23 23
24 24 Sorry ruby users but you need some perl modules, at least mod_perl2,
25 25 DBI and DBD::mysql (or the DBD driver for you database as it should
26 26 work on allmost all databases).
27 27
28 28 On debian/ubuntu you must do :
29 29
30 30 aptitude install libapache-dbi-perl libapache2-mod-perl2 libdbd-mysql-perl
31 31
32 32 If your Redmine users use LDAP authentication, you will also need
33 33 Authen::Simple::LDAP (and IO::Socket::SSL if LDAPS is used):
34 34
35 35 aptitude install libauthen-simple-ldap-perl libio-socket-ssl-perl
36 36
37 37 =head1 CONFIGURATION
38 38
39 39 ## This module has to be in your perl path
40 40 ## eg: /usr/lib/perl5/Apache/Authn/Redmine.pm
41 41 PerlLoadModule Apache::Authn::Redmine
42 42 <Location /svn>
43 43 DAV svn
44 44 SVNParentPath "/var/svn"
45 45
46 46 AuthType Basic
47 47 AuthName redmine
48 48 Require valid-user
49 49
50 50 PerlAccessHandler Apache::Authn::Redmine::access_handler
51 51 PerlAuthenHandler Apache::Authn::Redmine::authen_handler
52 52
53 53 ## for mysql
54 54 RedmineDSN "DBI:mysql:database=databasename;host=my.db.server"
55 55 ## for postgres
56 56 # RedmineDSN "DBI:Pg:dbname=databasename;host=my.db.server"
57 57
58 58 RedmineDbUser "redmine"
59 59 RedmineDbPass "password"
60 60 ## Optional where clause (fulltext search would be slow and
61 61 ## database dependant).
62 62 # RedmineDbWhereClause "and members.role_id IN (1,2)"
63 63 ## Optional credentials cache size
64 64 # RedmineCacheCredsMax 50
65 65 </Location>
66 66
67 67 To be able to browse repository inside redmine, you must add something
68 68 like that :
69 69
70 70 <Location /svn-private>
71 71 DAV svn
72 72 SVNParentPath "/var/svn"
73 73 Order deny,allow
74 74 Deny from all
75 75 # only allow reading orders
76 76 <Limit GET PROPFIND OPTIONS REPORT>
77 77 Allow from redmine.server.ip
78 78 </Limit>
79 79 </Location>
80 80
81 81 and you will have to use this reposman.rb command line to create repository :
82 82
83 83 reposman.rb --redmine my.redmine.server --svn-dir /var/svn --owner www-data -u http://svn.server/svn-private/
84 84
85 85 =head1 REPOSITORIES NAMING
86 86
87 87 A projet repository must be named with the projet identifier. In case
88 88 of multiple repositories for the same project, use the project identifier
89 89 and the repository identifier separated with a dot:
90 90
91 91 /var/svn/foo
92 92 /var/svn/foo.otherrepo
93 93
94 94 =head1 MIGRATION FROM OLDER RELEASES
95 95
96 96 If you use an older reposman.rb (r860 or before), you need to change
97 97 rights on repositories to allow the apache user to read and write
98 98 S<them :>
99 99
100 100 sudo chown -R www-data /var/svn/*
101 101 sudo chmod -R u+w /var/svn/*
102 102
103 103 And you need to upgrade at least reposman.rb (after r860).
104 104
105 105 =head1 GIT SMART HTTP SUPPORT
106 106
107 107 Git's smart HTTP protocol (available since Git 1.7.0) will not work with the
108 108 above settings. Redmine.pm normally does access control depending on the HTTP
109 109 method used: read-only methods are OK for everyone in public projects and
110 110 members with read rights in private projects. The rest require membership with
111 111 commit rights in the project.
112 112
113 113 However, this scheme doesn't work for Git's smart HTTP protocol, as it will use
114 114 POST even for a simple clone. Instead, read-only requests must be detected using
115 115 the full URL (including the query string): anything that doesn't belong to the
116 116 git-receive-pack service is read-only.
117 117
118 118 To activate this mode of operation, add this line inside your <Location /git>
119 119 block:
120 120
121 121 RedmineGitSmartHttp yes
122 122
123 123 Here's a sample Apache configuration which integrates git-http-backend with
124 124 a MySQL database and this new option:
125 125
126 126 SetEnv GIT_PROJECT_ROOT /var/www/git/
127 127 SetEnv GIT_HTTP_EXPORT_ALL
128 128 ScriptAlias /git/ /usr/libexec/git-core/git-http-backend/
129 129 <Location /git>
130 130 Order allow,deny
131 131 Allow from all
132 132
133 133 AuthType Basic
134 134 AuthName Git
135 135 Require valid-user
136 136
137 137 PerlAccessHandler Apache::Authn::Redmine::access_handler
138 138 PerlAuthenHandler Apache::Authn::Redmine::authen_handler
139 139 # for mysql
140 140 RedmineDSN "DBI:mysql:database=redmine;host=127.0.0.1"
141 141 RedmineDbUser "redmine"
142 142 RedmineDbPass "xxx"
143 143 RedmineGitSmartHttp yes
144 144 </Location>
145 145
146 146 Make sure that all the names of the repositories under /var/www/git/ have a
147 147 matching identifier for some project: /var/www/git/myproject and
148 148 /var/www/git/myproject.git will work. You can put both bare and non-bare
149 149 repositories in /var/www/git, though bare repositories are strongly
150 150 recommended. You should create them with the rights of the user running Redmine,
151 151 like this:
152 152
153 153 cd /var/www/git
154 154 sudo -u user-running-redmine mkdir myproject
155 155 cd myproject
156 156 sudo -u user-running-redmine git init --bare
157 157
158 158 Once you have activated this option, you have three options when cloning a
159 159 repository:
160 160
161 161 - Cloning using "http://user@host/git/repo(.git)" works, but will ask for the password
162 162 all the time.
163 163
164 164 - Cloning with "http://user:pass@host/git/repo(.git)" does not have this problem, but
165 165 this could reveal accidentally your password to the console in some versions
166 166 of Git, and you would have to ensure that .git/config is not readable except
167 167 by the owner for each of your projects.
168 168
169 169 - Use "http://host/git/repo(.git)", and store your credentials in the ~/.netrc
170 170 file. This is the recommended solution, as you only have one file to protect
171 171 and passwords will not be leaked accidentally to the console.
172 172
173 173 IMPORTANT NOTE: It is *very important* that the file cannot be read by other
174 174 users, as it will contain your password in cleartext. To create the file, you
175 175 can use the following commands, replacing yourhost, youruser and yourpassword
176 176 with the right values:
177 177
178 178 touch ~/.netrc
179 179 chmod 600 ~/.netrc
180 180 echo -e "machine yourhost\nlogin youruser\npassword yourpassword" > ~/.netrc
181 181
182 182 =cut
183 183
184 184 use strict;
185 185 use warnings FATAL => 'all', NONFATAL => 'redefine';
186 186
187 187 use DBI;
188 188 use Digest::SHA;
189 189 # optional module for LDAP authentication
190 190 my $CanUseLDAPAuth = eval("use Authen::Simple::LDAP; 1");
191 191
192 192 use Apache2::Module;
193 193 use Apache2::Access;
194 194 use Apache2::ServerRec qw();
195 195 use Apache2::RequestRec qw();
196 196 use Apache2::RequestUtil qw();
197 197 use Apache2::Const qw(:common :override :cmd_how);
198 198 use APR::Pool ();
199 199 use APR::Table ();
200 200
201 201 # use Apache2::Directive qw();
202 202
203 203 my @directives = (
204 204 {
205 205 name => 'RedmineDSN',
206 206 req_override => OR_AUTHCFG,
207 207 args_how => TAKE1,
208 208 errmsg => 'Dsn in format used by Perl DBI. eg: "DBI:Pg:dbname=databasename;host=my.db.server"',
209 209 },
210 210 {
211 211 name => 'RedmineDbUser',
212 212 req_override => OR_AUTHCFG,
213 213 args_how => TAKE1,
214 214 },
215 215 {
216 216 name => 'RedmineDbPass',
217 217 req_override => OR_AUTHCFG,
218 218 args_how => TAKE1,
219 219 },
220 220 {
221 221 name => 'RedmineDbWhereClause',
222 222 req_override => OR_AUTHCFG,
223 223 args_how => TAKE1,
224 224 },
225 225 {
226 226 name => 'RedmineCacheCredsMax',
227 227 req_override => OR_AUTHCFG,
228 228 args_how => TAKE1,
229 229 errmsg => 'RedmineCacheCredsMax must be decimal number',
230 230 },
231 231 {
232 232 name => 'RedmineGitSmartHttp',
233 233 req_override => OR_AUTHCFG,
234 234 args_how => TAKE1,
235 235 },
236 236 );
237 237
238 238 sub RedmineDSN {
239 239 my ($self, $parms, $arg) = @_;
240 240 $self->{RedmineDSN} = $arg;
241 241 my $query = "SELECT
242 242 users.hashed_password, users.salt, users.auth_source_id, roles.permissions, projects.status
243 243 FROM projects, users, roles
244 244 WHERE
245 245 users.login=?
246 246 AND projects.identifier=?
247 247 AND users.status=1
248 248 AND (
249 249 roles.id IN (SELECT member_roles.role_id FROM members, member_roles WHERE members.user_id = users.id AND members.project_id = projects.id AND members.id = member_roles.member_id)
250 250 OR
251 251 (roles.builtin=1 AND cast(projects.is_public as CHAR) IN ('t', '1'))
252 252 )
253 253 AND roles.permissions IS NOT NULL";
254 254 $self->{RedmineQuery} = trim($query);
255 255 }
256 256
257 257 sub RedmineDbUser { set_val('RedmineDbUser', @_); }
258 258 sub RedmineDbPass { set_val('RedmineDbPass', @_); }
259 259 sub RedmineDbWhereClause {
260 260 my ($self, $parms, $arg) = @_;
261 261 $self->{RedmineQuery} = trim($self->{RedmineQuery}.($arg ? $arg : "")." ");
262 262 }
263 263
264 264 sub RedmineCacheCredsMax {
265 265 my ($self, $parms, $arg) = @_;
266 266 if ($arg) {
267 267 $self->{RedmineCachePool} = APR::Pool->new;
268 268 $self->{RedmineCacheCreds} = APR::Table::make($self->{RedmineCachePool}, $arg);
269 269 $self->{RedmineCacheCredsCount} = 0;
270 270 $self->{RedmineCacheCredsMax} = $arg;
271 271 }
272 272 }
273 273
274 274 sub RedmineGitSmartHttp {
275 275 my ($self, $parms, $arg) = @_;
276 276 $arg = lc $arg;
277 277
278 278 if ($arg eq "yes" || $arg eq "true") {
279 279 $self->{RedmineGitSmartHttp} = 1;
280 280 } else {
281 281 $self->{RedmineGitSmartHttp} = 0;
282 282 }
283 283 }
284 284
285 285 sub trim {
286 286 my $string = shift;
287 287 $string =~ s/\s{2,}/ /g;
288 288 return $string;
289 289 }
290 290
291 291 sub set_val {
292 292 my ($key, $self, $parms, $arg) = @_;
293 293 $self->{$key} = $arg;
294 294 }
295 295
296 296 Apache2::Module::add(__PACKAGE__, \@directives);
297 297
298 298
299 299 my %read_only_methods = map { $_ => 1 } qw/GET HEAD PROPFIND REPORT OPTIONS/;
300 300
301 301 sub request_is_read_only {
302 302 my ($r) = @_;
303 303 my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config);
304 304
305 305 # Do we use Git's smart HTTP protocol, or not?
306 306 if (defined $cfg->{RedmineGitSmartHttp} and $cfg->{RedmineGitSmartHttp}) {
307 307 my $uri = $r->unparsed_uri;
308 308 my $location = $r->location;
309 309 my $is_read_only = $uri !~ m{^$location/*[^/]+/+(info/refs\?service=)?git\-receive\-pack$}o;
310 310 return $is_read_only;
311 311 } else {
312 312 # Standard behaviour: check the HTTP method
313 313 my $method = $r->method;
314 314 return defined $read_only_methods{$method};
315 315 }
316 316 }
317 317
318 318 sub access_handler {
319 319 my $r = shift;
320 320
321 321 unless ($r->some_auth_required) {
322 322 $r->log_reason("No authentication has been configured");
323 323 return FORBIDDEN;
324 324 }
325 325
326 326 return OK unless request_is_read_only($r);
327 327
328 328 my $project_id = get_project_identifier($r);
329 329
330 330 $r->set_handlers(PerlAuthenHandler => [\&OK])
331 331 if is_public_project($project_id, $r) && anonymous_role_allows_browse_repository($r);
332 332
333 333 return OK
334 334 }
335 335
336 336 sub authen_handler {
337 337 my $r = shift;
338 338
339 339 my ($res, $redmine_pass) = $r->get_basic_auth_pw();
340 340 return $res unless $res == OK;
341 341
342 342 if (is_member($r->user, $redmine_pass, $r)) {
343 343 return OK;
344 344 } else {
345 345 $r->note_auth_failure();
346 346 return DECLINED;
347 347 }
348 348 }
349 349
350 350 # check if authentication is forced
351 351 sub is_authentication_forced {
352 352 my $r = shift;
353 353
354 354 my $dbh = connect_database($r);
355 355 my $sth = $dbh->prepare(
356 356 "SELECT value FROM settings where settings.name = 'login_required';"
357 357 );
358 358
359 359 $sth->execute();
360 360 my $ret = 0;
361 361 if (my @row = $sth->fetchrow_array) {
362 362 if ($row[0] eq "1" || $row[0] eq "t") {
363 363 $ret = 1;
364 364 }
365 365 }
366 366 $sth->finish();
367 367 undef $sth;
368 368
369 369 $dbh->disconnect();
370 370 undef $dbh;
371 371
372 372 $ret;
373 373 }
374 374
375 375 sub is_public_project {
376 376 my $project_id = shift;
377 377 my $r = shift;
378 378
379 379 if (is_authentication_forced($r)) {
380 380 return 0;
381 381 }
382 382
383 383 my $dbh = connect_database($r);
384 384 my $sth = $dbh->prepare(
385 385 "SELECT is_public FROM projects WHERE projects.identifier = ? AND projects.status <> 9;"
386 386 );
387 387
388 388 $sth->execute($project_id);
389 389 my $ret = 0;
390 390 if (my @row = $sth->fetchrow_array) {
391 if ($row[0] eq "1" || $row[0] eq "t") {
392 $ret = 1;
393 }
391 if ($row[0] eq "1" || $row[0] eq "t") {
392 $ret = 1;
393 }
394 394 }
395 395 $sth->finish();
396 396 undef $sth;
397 397 $dbh->disconnect();
398 398 undef $dbh;
399 399
400 400 $ret;
401 401 }
402 402
403 403 sub anonymous_role_allows_browse_repository {
404 404 my $r = shift;
405 405
406 406 my $dbh = connect_database($r);
407 407 my $sth = $dbh->prepare(
408 408 "SELECT permissions FROM roles WHERE builtin = 2;"
409 409 );
410 410
411 411 $sth->execute();
412 412 my $ret = 0;
413 413 if (my @row = $sth->fetchrow_array) {
414 414 if ($row[0] =~ /:browse_repository/) {
415 415 $ret = 1;
416 416 }
417 417 }
418 418 $sth->finish();
419 419 undef $sth;
420 420 $dbh->disconnect();
421 421 undef $dbh;
422 422
423 423 $ret;
424 424 }
425 425
426 426 # perhaps we should use repository right (other read right) to check public access.
427 427 # it could be faster BUT it doesn't work for the moment.
428 428 # sub is_public_project_by_file {
429 429 # my $project_id = shift;
430 430 # my $r = shift;
431 431
432 432 # my $tree = Apache2::Directive::conftree();
433 433 # my $node = $tree->lookup('Location', $r->location);
434 434 # my $hash = $node->as_hash;
435 435
436 436 # my $svnparentpath = $hash->{SVNParentPath};
437 437 # my $repos_path = $svnparentpath . "/" . $project_id;
438 438 # return 1 if (stat($repos_path))[2] & 00007;
439 439 # }
440 440
441 441 sub is_member {
442 442 my $redmine_user = shift;
443 443 my $redmine_pass = shift;
444 444 my $r = shift;
445 445
446 446 my $dbh = connect_database($r);
447 447 my $project_id = get_project_identifier($r);
448 448
449 449 my $pass_digest = Digest::SHA::sha1_hex($redmine_pass);
450 450
451 451 my $access_mode = request_is_read_only($r) ? "R" : "W";
452 452
453 453 my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config);
454 454 my $usrprojpass;
455 455 if ($cfg->{RedmineCacheCredsMax}) {
456 456 $usrprojpass = $cfg->{RedmineCacheCreds}->get($redmine_user.":".$project_id.":".$access_mode);
457 457 return 1 if (defined $usrprojpass and ($usrprojpass eq $pass_digest));
458 458 }
459 459 my $query = $cfg->{RedmineQuery};
460 460 my $sth = $dbh->prepare($query);
461 461 $sth->execute($redmine_user, $project_id);
462 462
463 463 my $ret;
464 464 while (my ($hashed_password, $salt, $auth_source_id, $permissions, $project_status) = $sth->fetchrow_array) {
465 465 if ($project_status eq "9" || ($project_status ne "1" && $access_mode eq "W")) {
466 466 last;
467 467 }
468 468
469 469 unless ($auth_source_id) {
470 my $method = $r->method;
470 my $method = $r->method;
471 471 my $salted_password = Digest::SHA::sha1_hex($salt.$pass_digest);
472 if ($hashed_password eq $salted_password && (($access_mode eq "R" && $permissions =~ /:browse_repository/) || $permissions =~ /:commit_access/) ) {
472 if ($hashed_password eq $salted_password && (($access_mode eq "R" && $permissions =~ /:browse_repository/) || $permissions =~ /:commit_access/) ) {
473 473 $ret = 1;
474 474 last;
475 475 }
476 476 } elsif ($CanUseLDAPAuth) {
477 477 my $sthldap = $dbh->prepare(
478 478 "SELECT host,port,tls,account,account_password,base_dn,attr_login from auth_sources WHERE id = ?;"
479 479 );
480 480 $sthldap->execute($auth_source_id);
481 481 while (my @rowldap = $sthldap->fetchrow_array) {
482 482 my $bind_as = $rowldap[3] ? $rowldap[3] : "";
483 483 my $bind_pw = $rowldap[4] ? $rowldap[4] : "";
484 484 if ($bind_as =~ m/\$login/) {
485 485 # replace $login with $redmine_user and use $redmine_pass
486 486 $bind_as =~ s/\$login/$redmine_user/g;
487 487 $bind_pw = $redmine_pass
488 488 }
489 489 my $ldap = Authen::Simple::LDAP->new(
490 490 host => ($rowldap[2] eq "1" || $rowldap[2] eq "t") ? "ldaps://$rowldap[0]:$rowldap[1]" : $rowldap[0],
491 491 port => $rowldap[1],
492 492 basedn => $rowldap[5],
493 493 binddn => $bind_as,
494 494 bindpw => $bind_pw,
495 495 filter => "(".$rowldap[6]."=%s)"
496 496 );
497 497 my $method = $r->method;
498 498 $ret = 1 if ($ldap->authenticate($redmine_user, $redmine_pass) && (($access_mode eq "R" && $permissions =~ /:browse_repository/) || $permissions =~ /:commit_access/));
499 499
500 500 }
501 501 $sthldap->finish();
502 502 undef $sthldap;
503 503 }
504 504 }
505 505 $sth->finish();
506 506 undef $sth;
507 507 $dbh->disconnect();
508 508 undef $dbh;
509 509
510 510 if ($cfg->{RedmineCacheCredsMax} and $ret) {
511 511 if (defined $usrprojpass) {
512 512 $cfg->{RedmineCacheCreds}->set($redmine_user.":".$project_id.":".$access_mode, $pass_digest);
513 513 } else {
514 514 if ($cfg->{RedmineCacheCredsCount} < $cfg->{RedmineCacheCredsMax}) {
515 515 $cfg->{RedmineCacheCreds}->set($redmine_user.":".$project_id.":".$access_mode, $pass_digest);
516 516 $cfg->{RedmineCacheCredsCount}++;
517 517 } else {
518 518 $cfg->{RedmineCacheCreds}->clear();
519 519 $cfg->{RedmineCacheCredsCount} = 0;
520 520 }
521 521 }
522 522 }
523 523
524 524 $ret;
525 525 }
526 526
527 527 sub get_project_identifier {
528 528 my $r = shift;
529 529
530 530 my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config);
531 531 my $location = $r->location;
532 532 $location =~ s/\.git$// if (defined $cfg->{RedmineGitSmartHttp} and $cfg->{RedmineGitSmartHttp});
533 533 my ($identifier) = $r->uri =~ m{$location/*([^/.]+)};
534 534 $identifier;
535 535 }
536 536
537 537 sub connect_database {
538 538 my $r = shift;
539 539
540 540 my $cfg = Apache2::Module::get_config(__PACKAGE__, $r->server, $r->per_dir_config);
541 541 return DBI->connect($cfg->{RedmineDSN}, $cfg->{RedmineDbUser}, $cfg->{RedmineDbPass});
542 542 }
543 543
544 544 1;
General Comments 0
You need to be logged in to leave comments. Login now