summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-04-11 07:45:56 +0000
committerCoprDistGit <infra@openeuler.org>2023-04-11 07:45:56 +0000
commit94a737d49662a57290ab2b2bd170331119764458 (patch)
tree4eeb4e9247edbcb03ebeb3c0df435c6b0079b221
parent7a42036434bd7526b24c424df85c7473b6c3fe97 (diff)
automatic import of python-sentry-ldap-auth
-rw-r--r--.gitignore1
-rw-r--r--python-sentry-ldap-auth.spec438
-rw-r--r--sources1
3 files changed, 440 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..217c73f 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/sentry-ldap-auth-2.9.tar.gz
diff --git a/python-sentry-ldap-auth.spec b/python-sentry-ldap-auth.spec
new file mode 100644
index 0000000..d5ca7a7
--- /dev/null
+++ b/python-sentry-ldap-auth.spec
@@ -0,0 +1,438 @@
+%global _empty_manifest_terminate_build 0
+Name: python-sentry-ldap-auth
+Version: 2.9
+Release: 1
+Summary: A Sentry extension to add an LDAP server as an authentication source.
+License: Apache-2.0
+URL: http://github.com/banno/getsentry-ldap-auth
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/fc/e9/7f586b815185a47ba3617c2add36dc190d2f85cde4f29cf6268a012c02d6/sentry-ldap-auth-2.9.tar.gz
+BuildArch: noarch
+
+
+%description
+# sentry-ldap-auth
+
+A Django custom authentication backend for [Sentry](https://github.com/getsentry/sentry). This module extends the functionality of [django-auth-ldap](https://github.com/django-auth-ldap/django-auth-ldap) with Sentry specific features.
+
+## Features
+* Users created by this backend are managed users. Managed fields are not editable through the Sentry account page.
+* Users may be auto-added to an Organization upon creation.
+
+## Prerequisites
+Versions 2.0 and newer require Sentry 8. For Sentry 7 support, use [the 1.1 release](https://github.com/Banno/getsentry-ldap-auth/releases/tag/1.1)
+
+## Installation
+To install, simply add `sentry-ldap-auth` to your *requirements.txt* for your Sentry environment (or `pip install sentry-ldap-auth`).
+
+## Configuration
+This module extends the [django-auth-ldap](https://django-auth-ldap.readthedocs.io/en/latest/) and all the options it provides are supported (up to v1.2.x, at least).
+
+To configure Sentry to use this module, add `sentry_ldap_auth.backend.SentryLdapBackend` to your `AUTHENTICATION_BACKENDS` in your *sentry.conf.py*, like this:
+
+```python
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+```
+
+Then, add any applicable configuration options. Depending on your environment, and especially if you are running Sentry in containers, you might consider using [python-decouple](https://pypi.python.org/pypi/python-decouple) so you can set these options via environment variables.
+
+### sentry-ldap-auth Specific Options
+
+```Python
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+```
+Auto adds created user to the specified organization (matched by name) if it exists.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+```
+Role type auto-added users are assigned. Valid values in a default installation of Sentry are 'member', 'admin', 'manager' & 'owner'. However, custom roles can also be added to Sentry, in which case these are also valid.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+```
+Whether auto-created users should be granted global access within the default organization.
+
+```Python
+AUTH_LDAP_SENTRY_SUBSCRIBE_BY_DEFAULT = False
+```
+Whether new users should be subscribed to any new projects by default. Disabling
+this is useful for large organizations where a subscription to each project
+might be spammy.
+
+```Python
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+```
+Specify which attribute to use as the Sentry username, if different from what the user enters on the login page. You can use this to prevent multiple accounts from being created when your `AUTH_LDAP_USER_SEARCH` allows users to log in with different usernames (e.g. `(|(uid=%(user))(mail=%(user)))`). If multiple values exist for the attribute, the first value will be used.
+
+```Python
+AUTH_LDAP_DEFAULT_EMAIL_DOMAIN = 'example.com'
+```
+Default domain to append to username as the Sentry user's e-mail address when the LDAP user has no `mail` attribute.
+
+### Sentry Options
+
+```Python
+SENTRY_MANAGED_USER_FIELDS = ('email', 'first_name', 'last_name', 'password', )
+```
+
+Fields which managed users may not modify through the Sentry accounts view. Applies to all managed accounts.
+
+### Example Configuration
+
+```Python
+import ldap
+from django_auth_ldap.config import LDAPSearch, GroupOfUniqueNamesType
+
+AUTH_LDAP_SERVER_URI = 'ldap://my.ldapserver.com'
+AUTH_LDAP_BIND_DN = ''
+AUTH_LDAP_BIND_PASSWORD = ''
+
+AUTH_LDAP_USER_SEARCH = LDAPSearch(
+ 'dc=domain,dc=com',
+ ldap.SCOPE_SUBTREE,
+ '(mail=%(user)s)',
+)
+
+AUTH_LDAP_GROUP_SEARCH = LDAPSearch(
+ '',
+ ldap.SCOPE_SUBTREE,
+ '(objectClass=groupOfUniqueNames)'
+)
+
+AUTH_LDAP_GROUP_TYPE = GroupOfUniqueNamesType()
+AUTH_LDAP_REQUIRE_GROUP = None
+AUTH_LDAP_DENY_GROUP = None
+
+AUTH_LDAP_USER_ATTR_MAP = {
+ 'name': 'cn',
+ 'email': 'mail'
+}
+
+AUTH_LDAP_FIND_GROUP_PERMS = False
+AUTH_LDAP_CACHE_GROUPS = True
+AUTH_LDAP_GROUP_CACHE_TIMEOUT = 3600
+
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+AUTH_LDAP_SENTRY_GROUP_ROLE_MAPPING = {
+ 'owner': ['sysadmins'],
+ 'admin': ['devleads'],
+ 'member': ['developers', 'seniordevelopers']
+}
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+
+import logging
+logger = logging.getLogger('django_auth_ldap')
+logger.addHandler(logging.StreamHandler())
+logger.setLevel('DEBUG')
+```
+
+%package -n python3-sentry-ldap-auth
+Summary: A Sentry extension to add an LDAP server as an authentication source.
+Provides: python-sentry-ldap-auth
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-sentry-ldap-auth
+# sentry-ldap-auth
+
+A Django custom authentication backend for [Sentry](https://github.com/getsentry/sentry). This module extends the functionality of [django-auth-ldap](https://github.com/django-auth-ldap/django-auth-ldap) with Sentry specific features.
+
+## Features
+* Users created by this backend are managed users. Managed fields are not editable through the Sentry account page.
+* Users may be auto-added to an Organization upon creation.
+
+## Prerequisites
+Versions 2.0 and newer require Sentry 8. For Sentry 7 support, use [the 1.1 release](https://github.com/Banno/getsentry-ldap-auth/releases/tag/1.1)
+
+## Installation
+To install, simply add `sentry-ldap-auth` to your *requirements.txt* for your Sentry environment (or `pip install sentry-ldap-auth`).
+
+## Configuration
+This module extends the [django-auth-ldap](https://django-auth-ldap.readthedocs.io/en/latest/) and all the options it provides are supported (up to v1.2.x, at least).
+
+To configure Sentry to use this module, add `sentry_ldap_auth.backend.SentryLdapBackend` to your `AUTHENTICATION_BACKENDS` in your *sentry.conf.py*, like this:
+
+```python
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+```
+
+Then, add any applicable configuration options. Depending on your environment, and especially if you are running Sentry in containers, you might consider using [python-decouple](https://pypi.python.org/pypi/python-decouple) so you can set these options via environment variables.
+
+### sentry-ldap-auth Specific Options
+
+```Python
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+```
+Auto adds created user to the specified organization (matched by name) if it exists.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+```
+Role type auto-added users are assigned. Valid values in a default installation of Sentry are 'member', 'admin', 'manager' & 'owner'. However, custom roles can also be added to Sentry, in which case these are also valid.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+```
+Whether auto-created users should be granted global access within the default organization.
+
+```Python
+AUTH_LDAP_SENTRY_SUBSCRIBE_BY_DEFAULT = False
+```
+Whether new users should be subscribed to any new projects by default. Disabling
+this is useful for large organizations where a subscription to each project
+might be spammy.
+
+```Python
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+```
+Specify which attribute to use as the Sentry username, if different from what the user enters on the login page. You can use this to prevent multiple accounts from being created when your `AUTH_LDAP_USER_SEARCH` allows users to log in with different usernames (e.g. `(|(uid=%(user))(mail=%(user)))`). If multiple values exist for the attribute, the first value will be used.
+
+```Python
+AUTH_LDAP_DEFAULT_EMAIL_DOMAIN = 'example.com'
+```
+Default domain to append to username as the Sentry user's e-mail address when the LDAP user has no `mail` attribute.
+
+### Sentry Options
+
+```Python
+SENTRY_MANAGED_USER_FIELDS = ('email', 'first_name', 'last_name', 'password', )
+```
+
+Fields which managed users may not modify through the Sentry accounts view. Applies to all managed accounts.
+
+### Example Configuration
+
+```Python
+import ldap
+from django_auth_ldap.config import LDAPSearch, GroupOfUniqueNamesType
+
+AUTH_LDAP_SERVER_URI = 'ldap://my.ldapserver.com'
+AUTH_LDAP_BIND_DN = ''
+AUTH_LDAP_BIND_PASSWORD = ''
+
+AUTH_LDAP_USER_SEARCH = LDAPSearch(
+ 'dc=domain,dc=com',
+ ldap.SCOPE_SUBTREE,
+ '(mail=%(user)s)',
+)
+
+AUTH_LDAP_GROUP_SEARCH = LDAPSearch(
+ '',
+ ldap.SCOPE_SUBTREE,
+ '(objectClass=groupOfUniqueNames)'
+)
+
+AUTH_LDAP_GROUP_TYPE = GroupOfUniqueNamesType()
+AUTH_LDAP_REQUIRE_GROUP = None
+AUTH_LDAP_DENY_GROUP = None
+
+AUTH_LDAP_USER_ATTR_MAP = {
+ 'name': 'cn',
+ 'email': 'mail'
+}
+
+AUTH_LDAP_FIND_GROUP_PERMS = False
+AUTH_LDAP_CACHE_GROUPS = True
+AUTH_LDAP_GROUP_CACHE_TIMEOUT = 3600
+
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+AUTH_LDAP_SENTRY_GROUP_ROLE_MAPPING = {
+ 'owner': ['sysadmins'],
+ 'admin': ['devleads'],
+ 'member': ['developers', 'seniordevelopers']
+}
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+
+import logging
+logger = logging.getLogger('django_auth_ldap')
+logger.addHandler(logging.StreamHandler())
+logger.setLevel('DEBUG')
+```
+
+%package help
+Summary: Development documents and examples for sentry-ldap-auth
+Provides: python3-sentry-ldap-auth-doc
+%description help
+# sentry-ldap-auth
+
+A Django custom authentication backend for [Sentry](https://github.com/getsentry/sentry). This module extends the functionality of [django-auth-ldap](https://github.com/django-auth-ldap/django-auth-ldap) with Sentry specific features.
+
+## Features
+* Users created by this backend are managed users. Managed fields are not editable through the Sentry account page.
+* Users may be auto-added to an Organization upon creation.
+
+## Prerequisites
+Versions 2.0 and newer require Sentry 8. For Sentry 7 support, use [the 1.1 release](https://github.com/Banno/getsentry-ldap-auth/releases/tag/1.1)
+
+## Installation
+To install, simply add `sentry-ldap-auth` to your *requirements.txt* for your Sentry environment (or `pip install sentry-ldap-auth`).
+
+## Configuration
+This module extends the [django-auth-ldap](https://django-auth-ldap.readthedocs.io/en/latest/) and all the options it provides are supported (up to v1.2.x, at least).
+
+To configure Sentry to use this module, add `sentry_ldap_auth.backend.SentryLdapBackend` to your `AUTHENTICATION_BACKENDS` in your *sentry.conf.py*, like this:
+
+```python
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+```
+
+Then, add any applicable configuration options. Depending on your environment, and especially if you are running Sentry in containers, you might consider using [python-decouple](https://pypi.python.org/pypi/python-decouple) so you can set these options via environment variables.
+
+### sentry-ldap-auth Specific Options
+
+```Python
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+```
+Auto adds created user to the specified organization (matched by name) if it exists.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+```
+Role type auto-added users are assigned. Valid values in a default installation of Sentry are 'member', 'admin', 'manager' & 'owner'. However, custom roles can also be added to Sentry, in which case these are also valid.
+
+```Python
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+```
+Whether auto-created users should be granted global access within the default organization.
+
+```Python
+AUTH_LDAP_SENTRY_SUBSCRIBE_BY_DEFAULT = False
+```
+Whether new users should be subscribed to any new projects by default. Disabling
+this is useful for large organizations where a subscription to each project
+might be spammy.
+
+```Python
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+```
+Specify which attribute to use as the Sentry username, if different from what the user enters on the login page. You can use this to prevent multiple accounts from being created when your `AUTH_LDAP_USER_SEARCH` allows users to log in with different usernames (e.g. `(|(uid=%(user))(mail=%(user)))`). If multiple values exist for the attribute, the first value will be used.
+
+```Python
+AUTH_LDAP_DEFAULT_EMAIL_DOMAIN = 'example.com'
+```
+Default domain to append to username as the Sentry user's e-mail address when the LDAP user has no `mail` attribute.
+
+### Sentry Options
+
+```Python
+SENTRY_MANAGED_USER_FIELDS = ('email', 'first_name', 'last_name', 'password', )
+```
+
+Fields which managed users may not modify through the Sentry accounts view. Applies to all managed accounts.
+
+### Example Configuration
+
+```Python
+import ldap
+from django_auth_ldap.config import LDAPSearch, GroupOfUniqueNamesType
+
+AUTH_LDAP_SERVER_URI = 'ldap://my.ldapserver.com'
+AUTH_LDAP_BIND_DN = ''
+AUTH_LDAP_BIND_PASSWORD = ''
+
+AUTH_LDAP_USER_SEARCH = LDAPSearch(
+ 'dc=domain,dc=com',
+ ldap.SCOPE_SUBTREE,
+ '(mail=%(user)s)',
+)
+
+AUTH_LDAP_GROUP_SEARCH = LDAPSearch(
+ '',
+ ldap.SCOPE_SUBTREE,
+ '(objectClass=groupOfUniqueNames)'
+)
+
+AUTH_LDAP_GROUP_TYPE = GroupOfUniqueNamesType()
+AUTH_LDAP_REQUIRE_GROUP = None
+AUTH_LDAP_DENY_GROUP = None
+
+AUTH_LDAP_USER_ATTR_MAP = {
+ 'name': 'cn',
+ 'email': 'mail'
+}
+
+AUTH_LDAP_FIND_GROUP_PERMS = False
+AUTH_LDAP_CACHE_GROUPS = True
+AUTH_LDAP_GROUP_CACHE_TIMEOUT = 3600
+
+AUTH_LDAP_DEFAULT_SENTRY_ORGANIZATION = u'My Organization Name'
+AUTH_LDAP_SENTRY_ORGANIZATION_ROLE_TYPE = 'member'
+AUTH_LDAP_SENTRY_GROUP_ROLE_MAPPING = {
+ 'owner': ['sysadmins'],
+ 'admin': ['devleads'],
+ 'member': ['developers', 'seniordevelopers']
+}
+AUTH_LDAP_SENTRY_ORGANIZATION_GLOBAL_ACCESS = True
+AUTH_LDAP_SENTRY_USERNAME_FIELD = 'uid'
+
+AUTHENTICATION_BACKENDS = AUTHENTICATION_BACKENDS + (
+ 'sentry_ldap_auth.backend.SentryLdapBackend',
+)
+
+import logging
+logger = logging.getLogger('django_auth_ldap')
+logger.addHandler(logging.StreamHandler())
+logger.setLevel('DEBUG')
+```
+
+%prep
+%autosetup -n sentry-ldap-auth-2.9
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-sentry-ldap-auth -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Tue Apr 11 2023 Python_Bot <Python_Bot@openeuler.org> - 2.9-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..7fb47fb
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+a15fca67fd02347513c70c53331d67f2 sentry-ldap-auth-2.9.tar.gz