Signed-off-by: Thomas Skinner <tho...@atskinner.net>
---
 src/PVE/API2/OpenId.pm   | 79 ++++++++++++++++++++++++++++++++++++++++
 src/PVE/AccessControl.pm |  2 +-
 src/PVE/Auth/OpenId.pm   | 33 +++++++++++++++++
 src/PVE/Auth/Plugin.pm   |  1 +
 4 files changed, 114 insertions(+), 1 deletion(-)

diff --git a/src/PVE/API2/OpenId.pm b/src/PVE/API2/OpenId.pm
index 77410e6..818175e 100644
--- a/src/PVE/API2/OpenId.pm
+++ b/src/PVE/API2/OpenId.pm
@@ -13,6 +13,7 @@ use PVE::Cluster qw(cfs_read_file cfs_write_file);
 use PVE::AccessControl;
 use PVE::JSONSchema qw(get_standard_option);
 use PVE::Auth::Plugin;
+use PVE::Auth::OpenId;
 
 use PVE::RESTHandler;
 
@@ -220,6 +221,84 @@ __PACKAGE__->register_method ({
                $rpcenv->check_user_enabled($username);
            }
 
+           if (defined(my $groups_claim = $config->{'groups-claim'})) {
+               if (defined(my $groups_list = $info->{$groups_claim})) {
+                   if (ref($groups_list) eq 'ARRAY') {
+                       PVE::AccessControl::lock_user_config(sub {
+                           my $usercfg = cfs_read_file("user.cfg");
+
+                           # replace any invalid characters with
+                           my $replace_character = 
$config->{'groups-replace-character'} // '_';
+                           my $oidc_groups = { map { 
+                               $_ =~ 
s/[^$PVE::Auth::Plugin::groupname_regex_chars]/$replace_character/gr => 1
+                           } $groups_list->@* };
+
+                           # add realm name as suffix to group
+                           my $suffixed_oidc_groups;
+                           for my $group (keys %$oidc_groups) {
+                               $suffixed_oidc_groups->{"$group-$realm"} = 1;
+                           }
+                           $oidc_groups = $suffixed_oidc_groups;
+                           
+                           # get groups that exist in OIDC and PVE
+                           my $groups_intersect;
+                           for my $group (keys %$oidc_groups) {
+                               $groups_intersect->{$group} = 1 if 
$usercfg->{groups}->{$group};
+                           }
+
+                           if ($config->{'groups-autocreate'}) {
+                                # populate all groups in claim
+                                $groups_intersect = $oidc_groups;
+                               my $groups_to_create;
+                               for my $group (keys %$oidc_groups) {
+                                    $groups_to_create->{$group} = 1 if 
!$usercfg->{groups}->{$group};
+                               }
+                               if ($groups_to_create) {
+                                   # log a messages about created groups here
+                                   my $groups_to_create_string = join(', ', 
sort keys %$groups_to_create);
+                                   syslog(
+                                       'info', 
+                                       "groups created automatically from 
openid claim: $groups_to_create_string"
+                                   );
+                               }
+                            }
+
+                           # if groups should be overwritten, delete all the 
users groups first
+                           if ( $config->{'groups-overwrite'} ) {
+                               PVE::AccessControl::delete_user_group(
+                                   $username, 
+                                   $usercfg, 
+                               );
+                               syslog(
+                                   'info', 
+                                   "openid overwrite groups enabled; user 
'$username' removed from all groups"
+                               );
+                           }
+                           
+                           # ensure user is a member of the groups
+                           for my $group (keys %$groups_intersect) {
+                               PVE::AccessControl::add_user_group(
+                                   $username,
+                                   $usercfg,
+                                   $group
+                               );
+                           }
+                           my $groups_intersect_string = join(', ', sort keys 
%$groups_intersect);
+                           syslog(
+                               'info', 
+                               "openid user '$username' added to groups: 
$groups_intersect_string"
+                           );
+
+                           cfs_write_file("user.cfg", $usercfg);
+                       }, "openid group mapping failed");
+                   } else {
+                       syslog('err', "openid groups list is not an array; 
groups will not be updated");
+                   }
+               } else {
+                   syslog('err', "openid groups claim '$groups_claim' is not 
found in claims");
+               }
+           }
+
            my $ticket = PVE::AccessControl::assemble_ticket($username);
            my $csrftoken = 
PVE::AccessControl::assemble_csrf_prevention_token($username);
            my $cap = $rpcenv->compute_api_permission($username);
diff --git a/src/PVE/AccessControl.pm b/src/PVE/AccessControl.pm
index 47f2d38..7493c57 100644
--- a/src/PVE/AccessControl.pm
+++ b/src/PVE/AccessControl.pm
@@ -1293,7 +1293,7 @@ PVE::JSONSchema::register_format('pve-groupid', 
\&verify_groupname);
 sub verify_groupname {
     my ($groupname, $noerr) = @_;
 
-    if ($groupname !~ m/^[A-Za-z0-9\.\-_]+$/) {
+    if ($groupname !~ m/^[$PVE::Auth::Plugin::groupname_regex_chars]+$/) {
 
        die "group name '$groupname' contains invalid characters\n" if !$noerr;
 
diff --git a/src/PVE/Auth/OpenId.pm b/src/PVE/Auth/OpenId.pm
index c8e4db9..fd1cd6f 100755
--- a/src/PVE/Auth/OpenId.pm
+++ b/src/PVE/Auth/OpenId.pm
@@ -9,6 +9,9 @@ use PVE::Cluster qw(cfs_register_file cfs_read_file 
cfs_write_file cfs_lock_file
 
 use base qw(PVE::Auth::Plugin);
 
+# include all printable ascii characters
+my $openid_claim_regex = qr/[ -~]+/;
+
 sub type {
     return 'openid';
 }
@@ -42,6 +45,32 @@ sub properties {
            type => 'string',
            optional => 1,
        },
+       "groups-claim" => {
+           description => "OpenID claim used to retrieve groups with.",
+           type => 'string',
+           pattern => $openid_claim_regex,
+           maxLength => 256,
+           optional => 1,
+       },
+       "groups-autocreate" => {
+           description => "Automatically create groups if they do not exist.",
+           optional => 1,
+           type => 'boolean',
+           default => 0,
+       },
+       "groups-overwrite" => {
+           description => "All groups will be overwritten for the user on 
login.",
+           type => 'boolean',
+           default => 0,
+           optional => 1,
+       },
+       "groups-replace-character" => {
+           description => "Character used to replace any invalid characters in 
groups from provider.",
+           type => 'string',
+           pattern => qr/^[$PVE::Auth::Plugin::groupname_regex_chars]$/,
+           default => '_',
+           optional => 1,
+       },
        prompt => {
            description => "Specifies whether the Authorization Server prompts 
the End-User for"
                ." reauthentication and consent.",
@@ -73,6 +102,10 @@ sub options {
        "client-key" => { optional => 1 },
        autocreate => { optional => 1 },
        "username-claim" => { optional => 1, fixed => 1 },
+       "groups-claim" => { optional => 1 },
+       "groups-autocreate" => { optional => 1 },
+       "groups-overwrite" => { optional => 1 },
+       "groups-replace-character" => { optional => 1},
        prompt => { optional => 1 },
        scopes => { optional => 1 },
        "acr-values" => { optional => 1 },
diff --git a/src/PVE/Auth/Plugin.pm b/src/PVE/Auth/Plugin.pm
index 763239f..7617044 100755
--- a/src/PVE/Auth/Plugin.pm
+++ b/src/PVE/Auth/Plugin.pm
@@ -31,6 +31,7 @@ sub lock_domain_config {
 
 our $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
 our $user_regex = qr![^\s:/]+!;
+our $groupname_regex_chars = qr/A-Za-z0-9\.\-_/;
 
 PVE::JSONSchema::register_format('pve-realm', \&pve_verify_realm);
 sub pve_verify_realm {
-- 
2.39.5


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to