sources/ldap: manual import (#4456)

* events: fix task UID

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* add ldap sync command

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* add docs

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
Jens L 2023-01-17 12:21:33 +01:00 committed by GitHub
parent bd0ef69ece
commit c73fce4f58
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
9 changed files with 57 additions and 15 deletions

View file

@ -102,7 +102,7 @@ class TaskInfo:
key = CACHE_KEY_PREFIX + self.task_name key = CACHE_KEY_PREFIX + self.task_name
if self.result.uid: if self.result.uid:
key += f"/{self.result.uid}" key += f"/{self.result.uid}"
self.task_name += f"_{self.result.uid}" self.task_name += f"/{self.result.uid}"
self.set_prom_metrics() self.set_prom_metrics()
cache.set(key, self, timeout=timeout_hours * 60 * 60) cache.set(key, self, timeout=timeout_hours * 60 * 60)

View file

@ -17,9 +17,7 @@ from authentik.core.api.sources import SourceSerializer
from authentik.core.api.used_by import UsedByMixin from authentik.core.api.used_by import UsedByMixin
from authentik.events.monitored_tasks import TaskInfo from authentik.events.monitored_tasks import TaskInfo
from authentik.sources.ldap.models import LDAPPropertyMapping, LDAPSource from authentik.sources.ldap.models import LDAPPropertyMapping, LDAPSource
from authentik.sources.ldap.sync.groups import GroupLDAPSynchronizer from authentik.sources.ldap.tasks import SYNC_CLASSES
from authentik.sources.ldap.sync.membership import MembershipLDAPSynchronizer
from authentik.sources.ldap.sync.users import UserLDAPSynchronizer
class LDAPSourceSerializer(SourceSerializer): class LDAPSourceSerializer(SourceSerializer):
@ -104,13 +102,9 @@ class LDAPSourceViewSet(UsedByMixin, ModelViewSet):
"""Get source's sync status""" """Get source's sync status"""
source = self.get_object() source = self.get_object()
results = [] results = []
for sync_class in [ for sync_class in SYNC_CLASSES:
UserLDAPSynchronizer,
GroupLDAPSynchronizer,
MembershipLDAPSynchronizer,
]:
sync_name = sync_class.__name__.replace("LDAPSynchronizer", "").lower() sync_name = sync_class.__name__.replace("LDAPSynchronizer", "").lower()
task = TaskInfo.by_name(f"ldap_sync_{source.slug}_{sync_name}") task = TaskInfo.by_name(f"ldap_sync/{source.slug}_{sync_name}")
if task: if task:
results.append(task) results.append(task)
return Response(TaskSerializer(results, many=True).data) return Response(TaskSerializer(results, many=True).data)

View file

@ -0,0 +1,27 @@
"""LDAP Sync"""
from django.core.management.base import BaseCommand
from structlog.stdlib import get_logger
from authentik.lib.utils.reflection import class_to_path
from authentik.sources.ldap.models import LDAPSource
from authentik.sources.ldap.tasks import SYNC_CLASSES, ldap_sync
LOGGER = get_logger()
class Command(BaseCommand):
"""Run sync for an LDAP Source"""
def add_arguments(self, parser):
parser.add_argument("source_slugs", nargs="+", type=str)
def handle(self, **options):
for source_slug in options["source_slugs"]:
source = LDAPSource.objects.filter(slug=source_slug).first()
if not source:
LOGGER.warning("Source does not exist", slug=source_slug)
continue
for sync_class in SYNC_CLASSES:
LOGGER.info("Starting sync", cls=sync_class)
# pylint: disable=no-value-for-parameter
ldap_sync(source.pk, class_to_path(sync_class))

View file

@ -13,17 +13,18 @@ from authentik.sources.ldap.sync.membership import MembershipLDAPSynchronizer
from authentik.sources.ldap.sync.users import UserLDAPSynchronizer from authentik.sources.ldap.sync.users import UserLDAPSynchronizer
LOGGER = get_logger() LOGGER = get_logger()
SYNC_CLASSES = [
UserLDAPSynchronizer,
GroupLDAPSynchronizer,
MembershipLDAPSynchronizer,
]
@CELERY_APP.task() @CELERY_APP.task()
def ldap_sync_all(): def ldap_sync_all():
"""Sync all sources""" """Sync all sources"""
for source in LDAPSource.objects.filter(enabled=True): for source in LDAPSource.objects.filter(enabled=True):
for sync_class in [ for sync_class in SYNC_CLASSES:
UserLDAPSynchronizer,
GroupLDAPSynchronizer,
MembershipLDAPSynchronizer,
]:
ldap_sync.delay(source.pk, class_to_path(sync_class)) ldap_sync.delay(source.pk, class_to_path(sync_class))

View file

@ -0,0 +1,15 @@
---
title: Troubleshooting LDAP Synchronization
---
To troubleshoot LDAP sources, you can run the command below to run a synchronization in the foreground and see any errors or warnings that might happen directly
```
docker-compose run --rm server ldap_sync *slug of the source*
```
or, for Kubernetes, run
```
kubectl exec -it deployment/authentik-worker -c authentik -- ak ldap_sync *slug of the source*
```

View file

@ -41,3 +41,7 @@ LDAP property mappings can be used to convert the raw LDAP response into an auth
By default, authentik ships with some pre-configured mappings for the most common LDAP setups. By default, authentik ships with some pre-configured mappings for the most common LDAP setups.
You can assign the value of a mapping to any user attribute, or save it as a custom attribute by prefixing the object field with `attribute.` Keep in mind though, data types from the LDAP server will be carried over. This means that with some implementations, where fields are stored as array in LDAP, they will be saved as array in authentik. To prevent this, use the built-in `list_flatten` function. You can assign the value of a mapping to any user attribute, or save it as a custom attribute by prefixing the object field with `attribute.` Keep in mind though, data types from the LDAP server will be carried over. This means that with some implementations, where fields are stored as array in LDAP, they will be saved as array in authentik. To prevent this, use the built-in `list_flatten` function.
## Troubleshooting
To troubleshoot LDAP sources and their synchronization, see [LDAP Troubleshooting](../../../docs/troubleshooting/ldap_source)

View file

@ -284,6 +284,7 @@ module.exports = {
"troubleshooting/image_upload", "troubleshooting/image_upload",
"troubleshooting/missing_permission", "troubleshooting/missing_permission",
"troubleshooting/missing_admin_group", "troubleshooting/missing_admin_group",
"troubleshooting/ldap_source",
], ],
}, },
{ {