On 2/11/25 06:40, Thomas Skinner wrote:
> Signed-off-by: Thomas Skinner <tho...@atskinner.net>
> ---
>  src/PVE/API2/OpenId.pm   | 79 ++++++++++++++++++++++++++++++++++++++++
>  src/PVE/AccessControl.pm |  2 +-
>  src/PVE/Auth/OpenId.pm   | 33 +++++++++++++++++
>  src/PVE/Auth/Plugin.pm   |  1 +
>  4 files changed, 114 insertions(+), 1 deletion(-)
> 
> diff --git a/src/PVE/API2/OpenId.pm b/src/PVE/API2/OpenId.pm
> index 77410e6..818175e 100644
> --- a/src/PVE/API2/OpenId.pm
> +++ b/src/PVE/API2/OpenId.pm
> @@ -13,6 +13,7 @@ use PVE::Cluster qw(cfs_read_file cfs_write_file);
>  use PVE::AccessControl;
>  use PVE::JSONSchema qw(get_standard_option);
>  use PVE::Auth::Plugin;
> +use PVE::Auth::OpenId;
>  
>  use PVE::RESTHandler;
>  
> @@ -220,6 +221,84 @@ __PACKAGE__->register_method ({
>               $rpcenv->check_user_enabled($username);
>           }
>  
> +         if (defined(my $groups_claim = $config->{'groups-claim'})) {
> +             if (defined(my $groups_list = $info->{$groups_claim})) {
> +                 if (ref($groups_list) eq 'ARRAY') {
> +                     PVE::AccessControl::lock_user_config(sub {
> +                         my $usercfg = cfs_read_file("user.cfg");
> +
> +                         # replace any invalid characters with
> +                         my $replace_character = 
> $config->{'groups-replace-character'} // '_';
> +                         my $oidc_groups = { map { 
> +                             $_ =~ 
> s/[^$PVE::Auth::Plugin::groupname_regex_chars]/$replace_character/gr => 1
> +                         } $groups_list->@* };
maybe we could log any of those replacements here? doing this silently
may lead to confusion when groups don't match

> +
> +                         # add realm name as suffix to group
> +                         my $suffixed_oidc_groups;
> +                         for my $group (keys %$oidc_groups) {
> +                             $suffixed_oidc_groups->{"$group-$realm"} = 1;
> +                         }
> +                         $oidc_groups = $suffixed_oidc_groups;
> +                         
> +                         # get groups that exist in OIDC and PVE
> +                         my $groups_intersect;
> +                         for my $group (keys %$oidc_groups) {
> +                             $groups_intersect->{$group} = 1 if 
> $usercfg->{groups}->{$group};
> +                         }
> +
> +                         if ($config->{'groups-autocreate'}) {
> +                                # populate all groups in claim
> +                                $groups_intersect = $oidc_groups;
> +                             my $groups_to_create;
> +                             for my $group (keys %$oidc_groups) {
> +                                    $groups_to_create->{$group} = 1 if 
> !$usercfg->{groups}->{$group};
> +                             }
> +                             if ($groups_to_create) {
> +                                 # log a messages about created groups here
> +                                 my $groups_to_create_string = join(', ', 
> sort keys %$groups_to_create);
> +                                 syslog(
> +                                     'info', 
> +                                     "groups created automatically from 
> openid claim: $groups_to_create_string"
> +                                 );
> +                             }
> +                            }
> +
> +                         # if groups should be overwritten, delete all the 
> users groups first
> +                         if ( $config->{'groups-overwrite'} ) {
> +                             PVE::AccessControl::delete_user_group(
> +                                 $username, 
> +                                 $usercfg, 
> +                             );
> +                             syslog(
> +                                 'info', 
> +                                 "openid overwrite groups enabled; user 
> '$username' removed from all groups"
> +                             );
> +                         }
> +                         
> +                         # ensure user is a member of the groups
> +                         for my $group (keys %$groups_intersect) {
> +                             PVE::AccessControl::add_user_group(
> +                                 $username,
> +                                 $usercfg,
> +                                 $group
> +                             );
> +                         }
> +                         my $groups_intersect_string = join(', ', sort keys 
> %$groups_intersect);
> +                         syslog(
> +                             'info', 
> +                             "openid user '$username' added to groups: 
> $groups_intersect_string"
> +                         );
> +
> +                         cfs_write_file("user.cfg", $usercfg);
> +                     }, "openid group mapping failed");
> +                 } else {
> +                     syslog('err', "openid groups list is not an array; 
> groups will not be updated");
> +                 }
> +             } else {
> +                 syslog('err', "openid groups claim '$groups_claim' is not 
> found in claims");
> +             }
> +         }
> +
>           my $ticket = PVE::AccessControl::assemble_ticket($username);
>           my $csrftoken = 
> PVE::AccessControl::assemble_csrf_prevention_token($username);
>           my $cap = $rpcenv->compute_api_permission($username);
> diff --git a/src/PVE/AccessControl.pm b/src/PVE/AccessControl.pm
> index 47f2d38..7493c57 100644
> --- a/src/PVE/AccessControl.pm
> +++ b/src/PVE/AccessControl.pm
> @@ -1293,7 +1293,7 @@ PVE::JSONSchema::register_format('pve-groupid', 
> \&verify_groupname);
>  sub verify_groupname {
>      my ($groupname, $noerr) = @_;
>  
> -    if ($groupname !~ m/^[A-Za-z0-9\.\-_]+$/) {
> +    if ($groupname !~ m/^[$PVE::Auth::Plugin::groupname_regex_chars]+$/) {
>  
>       die "group name '$groupname' contains invalid characters\n" if !$noerr;
>  
> diff --git a/src/PVE/Auth/OpenId.pm b/src/PVE/Auth/OpenId.pm
> index c8e4db9..fd1cd6f 100755
> --- a/src/PVE/Auth/OpenId.pm
> +++ b/src/PVE/Auth/OpenId.pm
> @@ -9,6 +9,9 @@ use PVE::Cluster qw(cfs_register_file cfs_read_file 
> cfs_write_file cfs_lock_file
>  
>  use base qw(PVE::Auth::Plugin);
>  
> +# include all printable ascii characters
> +my $openid_claim_regex = qr/[ -~]+/;
> +
>  sub type {
>      return 'openid';
>  }
> @@ -42,6 +45,32 @@ sub properties {
>           type => 'string',
>           optional => 1,
>       },
> +     "groups-claim" => {
> +         description => "OpenID claim used to retrieve groups with.",
> +         type => 'string',
> +         pattern => $openid_claim_regex,
> +         maxLength => 256,
> +         optional => 1,
> +     },
> +     "groups-autocreate" => {
> +         description => "Automatically create groups if they do not exist.",
> +         optional => 1,
> +         type => 'boolean',
> +         default => 0,
> +     },
> +     "groups-overwrite" => {
> +         description => "All groups will be overwritten for the user on 
> login.",
> +         type => 'boolean',
> +         default => 0,
> +         optional => 1,
> +     },
> +     "groups-replace-character" => {
> +         description => "Character used to replace any invalid characters in 
> groups from provider.",
> +         type => 'string',
> +         pattern => qr/^[$PVE::Auth::Plugin::groupname_regex_chars]$/,
> +         default => '_',
> +         optional => 1,
> +     },
>       prompt => {
>           description => "Specifies whether the Authorization Server prompts 
> the End-User for"
>               ." reauthentication and consent.",
> @@ -73,6 +102,10 @@ sub options {
>       "client-key" => { optional => 1 },
>       autocreate => { optional => 1 },
>       "username-claim" => { optional => 1, fixed => 1 },
> +     "groups-claim" => { optional => 1 },
> +     "groups-autocreate" => { optional => 1 },
> +     "groups-overwrite" => { optional => 1 },
> +     "groups-replace-character" => { optional => 1},
>       prompt => { optional => 1 },
>       scopes => { optional => 1 },
>       "acr-values" => { optional => 1 },
> diff --git a/src/PVE/Auth/Plugin.pm b/src/PVE/Auth/Plugin.pm
> index 763239f..7617044 100755
> --- a/src/PVE/Auth/Plugin.pm
> +++ b/src/PVE/Auth/Plugin.pm
> @@ -31,6 +31,7 @@ sub lock_domain_config {
>  
>  our $realm_regex = qr/[A-Za-z][A-Za-z0-9\.\-_]+/;
>  our $user_regex = qr![^\s:/]+!;
> +our $groupname_regex_chars = qr/A-Za-z0-9\.\-_/;
>  
>  PVE::JSONSchema::register_format('pve-realm', \&pve_verify_realm);
>  sub pve_verify_realm {



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to