2015-08-16 02:31:54 -04:00
// Copyright 2014 The Gogs Authors. All rights reserved.
2020-09-10 11:30:07 -04:00
// Copyright 2020 The Gitea Authors. All rights reserved.
2014-04-22 12:55:27 -04:00
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package ldap
import (
2015-09-14 15:48:51 -04:00
"crypto/tls"
2014-04-22 12:55:27 -04:00
"fmt"
2021-08-11 16:42:58 -04:00
"net"
"strconv"
2015-10-26 21:08:59 -04:00
"strings"
2014-05-02 22:48:14 -04:00
2016-11-10 11:24:48 -05:00
"code.gitea.io/gitea/modules/log"
2019-02-18 07:34:37 -05:00
2020-10-15 15:27:33 -04:00
"github.com/go-ldap/ldap/v3"
2014-04-22 12:55:27 -04:00
)
2017-05-10 09:10:18 -04:00
// SearchResult : user data
type SearchResult struct {
2018-05-24 00:59:02 -04:00
Username string // Username
Name string // Name
Surname string // Surname
Mail string // E-mail address
SSHPublicKey [ ] string // SSH Public Key
IsAdmin bool // if user is administrator
2020-03-05 01:30:33 -05:00
IsRestricted bool // if user is restricted
2017-05-10 09:10:18 -04:00
}
2015-10-26 21:08:59 -04:00
func ( ls * Source ) sanitizedUserQuery ( username string ) ( string , bool ) {
// See http://tools.ietf.org/search/rfc4515
badCharacters := "\x00()*\\"
if strings . ContainsAny ( username , badCharacters ) {
log . Debug ( "'%s' contains invalid query characters. Aborting." , username )
return "" , false
}
return fmt . Sprintf ( ls . Filter , username ) , true
}
func ( ls * Source ) sanitizedUserDN ( username string ) ( string , bool ) {
// See http://tools.ietf.org/search/rfc4514: "special characters"
2017-11-13 04:32:16 -05:00
badCharacters := "\x00()*\\,='\"#+;<>"
2015-10-26 21:08:59 -04:00
if strings . ContainsAny ( username , badCharacters ) {
log . Debug ( "'%s' contains invalid DN characters. Aborting." , username )
return "" , false
}
return fmt . Sprintf ( ls . UserDN , username ) , true
}
2020-09-10 11:30:07 -04:00
func ( ls * Source ) sanitizedGroupFilter ( group string ) ( string , bool ) {
// See http://tools.ietf.org/search/rfc4515
badCharacters := "\x00*\\"
if strings . ContainsAny ( group , badCharacters ) {
log . Trace ( "Group filter invalid query characters: %s" , group )
return "" , false
}
return group , true
}
func ( ls * Source ) sanitizedGroupDN ( groupDn string ) ( string , bool ) {
// See http://tools.ietf.org/search/rfc4514: "special characters"
badCharacters := "\x00()*\\'\"#+;<>"
if strings . ContainsAny ( groupDn , badCharacters ) || strings . HasPrefix ( groupDn , " " ) || strings . HasSuffix ( groupDn , " " ) {
log . Trace ( "Group DN contains invalid query characters: %s" , groupDn )
return "" , false
}
return groupDn , true
}
2016-02-16 05:58:00 -05:00
func ( ls * Source ) findUserDN ( l * ldap . Conn , name string ) ( string , bool ) {
2015-08-12 19:58:27 -04:00
log . Trace ( "Search for LDAP user: %s" , name )
// A search for the user.
2015-10-26 21:08:59 -04:00
userFilter , ok := ls . sanitizedUserQuery ( name )
if ! ok {
return "" , false
}
2016-02-16 06:36:40 -05:00
log . Trace ( "Searching for DN using filter %s and base %s" , userFilter , ls . UserBase )
2015-08-12 19:58:27 -04:00
search := ldap . NewSearchRequest (
ls . UserBase , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 ,
false , userFilter , [ ] string { } , nil )
// Ensure we found a user
sr , err := l . Search ( search )
if err != nil || len ( sr . Entries ) < 1 {
2015-08-17 16:03:11 -04:00
log . Debug ( "Failed search using filter[%s]: %v" , userFilter , err )
2015-08-16 02:31:54 -04:00
return "" , false
2015-08-12 19:58:27 -04:00
} else if len ( sr . Entries ) > 1 {
log . Debug ( "Filter '%s' returned more than one user." , userFilter )
2015-08-16 02:31:54 -04:00
return "" , false
2014-04-22 12:55:27 -04:00
}
2015-08-12 19:58:27 -04:00
2015-08-16 02:31:54 -04:00
userDN := sr . Entries [ 0 ] . DN
2015-08-12 19:58:27 -04:00
if userDN == "" {
2019-04-02 03:48:31 -04:00
log . Error ( "LDAP search was successful, but found no DN!" )
2015-08-16 02:31:54 -04:00
return "" , false
2015-08-12 19:58:27 -04:00
}
2015-08-16 02:31:54 -04:00
return userDN , true
2014-04-22 12:55:27 -04:00
}
2021-08-11 16:42:58 -04:00
func dial ( source * Source ) ( * ldap . Conn , error ) {
log . Trace ( "Dialing LDAP with security protocol (%v) without verifying: %v" , source . SecurityProtocol , source . SkipVerify )
2016-07-07 19:25:09 -04:00
2021-08-11 16:42:58 -04:00
tlsConfig := & tls . Config {
ServerName : source . Host ,
InsecureSkipVerify : source . SkipVerify ,
2016-07-07 19:25:09 -04:00
}
2021-08-11 16:42:58 -04:00
if source . SecurityProtocol == SecurityProtocolLDAPS {
return ldap . DialTLS ( "tcp" , net . JoinHostPort ( source . Host , strconv . Itoa ( source . Port ) ) , tlsConfig )
2016-07-07 19:25:09 -04:00
}
2021-08-11 16:42:58 -04:00
conn , err := ldap . Dial ( "tcp" , net . JoinHostPort ( source . Host , strconv . Itoa ( source . Port ) ) )
2016-07-07 19:25:09 -04:00
if err != nil {
2021-08-11 16:42:58 -04:00
return nil , fmt . Errorf ( "error during Dial: %v" , err )
2016-07-07 19:25:09 -04:00
}
2021-08-11 16:42:58 -04:00
if source . SecurityProtocol == SecurityProtocolStartTLS {
if err = conn . StartTLS ( tlsConfig ) ; err != nil {
2016-07-07 19:25:09 -04:00
conn . Close ( )
2021-08-11 16:42:58 -04:00
return nil , fmt . Errorf ( "error during StartTLS: %v" , err )
2016-07-07 19:25:09 -04:00
}
}
return conn , nil
}
func bindUser ( l * ldap . Conn , userDN , passwd string ) error {
log . Trace ( "Binding with userDN: %s" , userDN )
err := l . Bind ( userDN , passwd )
if err != nil {
log . Debug ( "LDAP auth. failed for %s, reason: %v" , userDN , err )
return err
}
log . Trace ( "Bound successfully with userDN: %s" , userDN )
return err
}
2017-05-10 09:10:18 -04:00
func checkAdmin ( l * ldap . Conn , ls * Source , userDN string ) bool {
2020-03-05 01:30:33 -05:00
if len ( ls . AdminFilter ) == 0 {
return false
}
log . Trace ( "Checking admin with filter %s and base %s" , ls . AdminFilter , userDN )
search := ldap . NewSearchRequest (
userDN , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , ls . AdminFilter ,
[ ] string { ls . AttributeName } ,
nil )
2017-05-10 09:10:18 -04:00
2020-03-05 01:30:33 -05:00
sr , err := l . Search ( search )
2017-05-10 09:10:18 -04:00
2020-03-05 01:30:33 -05:00
if err != nil {
2021-09-10 18:46:27 -04:00
log . Error ( "LDAP Admin Search with filter %s for %s failed unexpectedly! (%v)" , ls . AdminFilter , userDN , err )
2020-03-05 01:30:33 -05:00
} else if len ( sr . Entries ) < 1 {
log . Trace ( "LDAP Admin Search found no matching entries." )
} else {
return true
}
return false
}
func checkRestricted ( l * ldap . Conn , ls * Source , userDN string ) bool {
if len ( ls . RestrictedFilter ) == 0 {
return false
}
if ls . RestrictedFilter == "*" {
return true
}
log . Trace ( "Checking restricted with filter %s and base %s" , ls . RestrictedFilter , userDN )
search := ldap . NewSearchRequest (
userDN , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , ls . RestrictedFilter ,
[ ] string { ls . AttributeName } ,
nil )
sr , err := l . Search ( search )
if err != nil {
2021-09-10 18:46:27 -04:00
log . Error ( "LDAP Restrictred Search with filter %s for %s failed unexpectedly! (%v)" , ls . RestrictedFilter , userDN , err )
2020-03-05 01:30:33 -05:00
} else if len ( sr . Entries ) < 1 {
log . Trace ( "LDAP Restricted Search found no matching entries." )
} else {
return true
2017-05-10 09:10:18 -04:00
}
return false
}
2016-11-27 01:03:59 -05:00
// SearchEntry : search an LDAP source if an entry (name, passwd) is valid and in the specific filter
2017-05-10 09:10:18 -04:00
func ( ls * Source ) SearchEntry ( name , passwd string , directBind bool ) * SearchResult {
2016-12-11 19:46:51 -05:00
// See https://tools.ietf.org/search/rfc4513#section-5.1.2
if len ( passwd ) == 0 {
2019-04-02 03:48:31 -04:00
log . Debug ( "Auth. failed for %s, password cannot be empty" , name )
2017-05-10 09:10:18 -04:00
return nil
2016-12-11 19:46:51 -05:00
}
2016-07-07 19:25:09 -04:00
l , err := dial ( ls )
2016-02-16 05:58:00 -05:00
if err != nil {
2019-04-02 03:48:31 -04:00
log . Error ( "LDAP Connect error, %s:%v" , ls . Host , err )
2016-02-16 05:58:00 -05:00
ls . Enabled = false
2017-05-10 09:10:18 -04:00
return nil
2016-02-16 05:58:00 -05:00
}
defer l . Close ( )
2015-09-04 23:39:23 -04:00
var userDN string
if directBind {
2015-09-16 12:15:14 -04:00
log . Trace ( "LDAP will bind directly via UserDN template: %s" , ls . UserDN )
2015-10-26 21:08:59 -04:00
var ok bool
userDN , ok = ls . sanitizedUserDN ( name )
2018-12-27 11:51:19 -05:00
2015-10-26 21:08:59 -04:00
if ! ok {
2017-05-10 09:10:18 -04:00
return nil
2015-10-26 21:08:59 -04:00
}
2018-12-27 11:51:19 -05:00
err = bindUser ( l , userDN , passwd )
if err != nil {
return nil
}
if ls . UserBase != "" {
// not everyone has a CN compatible with input name so we need to find
// the real userDN in that case
userDN , ok = ls . findUserDN ( l , name )
if ! ok {
return nil
}
}
2015-09-04 23:39:23 -04:00
} else {
log . Trace ( "LDAP will use BindDN." )
var found bool
2018-12-27 11:51:19 -05:00
if ls . BindDN != "" && ls . BindPassword != "" {
err := l . Bind ( ls . BindDN , ls . BindPassword )
if err != nil {
log . Debug ( "Failed to bind as BindDN[%s]: %v" , ls . BindDN , err )
return nil
}
log . Trace ( "Bound as BindDN %s" , ls . BindDN )
} else {
log . Trace ( "Proceeding with anonymous LDAP search." )
}
2016-02-16 05:58:00 -05:00
userDN , found = ls . findUserDN ( l , name )
2015-09-04 23:39:23 -04:00
if ! found {
2017-05-10 09:10:18 -04:00
return nil
2015-09-04 23:39:23 -04:00
}
2015-08-12 19:58:27 -04:00
}
2018-12-27 11:51:19 -05:00
if ! ls . AttributesInBind {
2016-02-16 06:33:16 -05:00
// binds user (checking password) before looking-up attributes in user context
err = bindUser ( l , userDN , passwd )
if err != nil {
2017-05-10 09:10:18 -04:00
return nil
2016-02-16 06:33:16 -05:00
}
2014-04-22 12:55:27 -04:00
}
2015-10-26 21:08:59 -04:00
userFilter , ok := ls . sanitizedUserQuery ( name )
if ! ok {
2017-05-10 09:10:18 -04:00
return nil
2015-10-26 21:08:59 -04:00
}
2019-01-23 18:25:33 -05:00
var isAttributeSSHPublicKeySet = len ( strings . TrimSpace ( ls . AttributeSSHPublicKey ) ) > 0
attribs := [ ] string { ls . AttributeUsername , ls . AttributeName , ls . AttributeSurname , ls . AttributeMail }
2020-09-10 11:30:07 -04:00
if len ( strings . TrimSpace ( ls . UserUID ) ) > 0 {
attribs = append ( attribs , ls . UserUID )
}
2019-01-23 18:25:33 -05:00
if isAttributeSSHPublicKeySet {
attribs = append ( attribs , ls . AttributeSSHPublicKey )
}
2020-09-10 11:30:07 -04:00
log . Trace ( "Fetching attributes '%v', '%v', '%v', '%v', '%v', '%v' with filter '%s' and base '%s'" , ls . AttributeUsername , ls . AttributeName , ls . AttributeSurname , ls . AttributeMail , ls . AttributeSSHPublicKey , ls . UserUID , userFilter , userDN )
2014-09-07 20:04:47 -04:00
search := ldap . NewSearchRequest (
2015-08-12 19:58:27 -04:00
userDN , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , userFilter ,
2019-01-23 18:25:33 -05:00
attribs , nil )
2015-08-12 19:58:27 -04:00
2014-04-22 12:55:27 -04:00
sr , err := l . Search ( search )
if err != nil {
2019-04-02 03:48:31 -04:00
log . Error ( "LDAP Search failed unexpectedly! (%v)" , err )
2017-05-10 09:10:18 -04:00
return nil
2015-08-12 19:58:27 -04:00
} else if len ( sr . Entries ) < 1 {
2015-09-04 23:39:23 -04:00
if directBind {
2019-01-19 14:57:27 -05:00
log . Trace ( "User filter inhibited user login." )
2015-09-04 23:39:23 -04:00
} else {
2019-01-19 14:57:27 -05:00
log . Trace ( "LDAP Search found no matching entries." )
2015-09-04 23:39:23 -04:00
}
2017-05-10 09:10:18 -04:00
return nil
2014-04-22 12:55:27 -04:00
}
2015-08-12 19:58:27 -04:00
2019-01-23 18:25:33 -05:00
var sshPublicKey [ ] string
2016-07-11 19:07:57 -04:00
username := sr . Entries [ 0 ] . GetAttributeValue ( ls . AttributeUsername )
firstname := sr . Entries [ 0 ] . GetAttributeValue ( ls . AttributeName )
surname := sr . Entries [ 0 ] . GetAttributeValue ( ls . AttributeSurname )
mail := sr . Entries [ 0 ] . GetAttributeValue ( ls . AttributeMail )
2020-09-10 11:30:07 -04:00
uid := sr . Entries [ 0 ] . GetAttributeValue ( ls . UserUID )
// Check group membership
if ls . GroupsEnabled {
groupFilter , ok := ls . sanitizedGroupFilter ( ls . GroupFilter )
if ! ok {
return nil
}
groupDN , ok := ls . sanitizedGroupDN ( ls . GroupDN )
if ! ok {
return nil
}
log . Trace ( "Fetching groups '%v' with filter '%s' and base '%s'" , ls . GroupMemberUID , groupFilter , groupDN )
groupSearch := ldap . NewSearchRequest (
groupDN , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , groupFilter ,
[ ] string { ls . GroupMemberUID } ,
nil )
srg , err := l . Search ( groupSearch )
if err != nil {
log . Error ( "LDAP group search failed: %v" , err )
return nil
} else if len ( srg . Entries ) < 1 {
log . Error ( "LDAP group search failed: 0 entries" )
return nil
}
isMember := false
Entries :
for _ , group := range srg . Entries {
for _ , member := range group . GetAttributeValues ( ls . GroupMemberUID ) {
if ( ls . UserUID == "dn" && member == sr . Entries [ 0 ] . DN ) || member == uid {
isMember = true
break Entries
}
}
}
if ! isMember {
log . Error ( "LDAP group membership test failed" )
return nil
}
}
2019-01-23 18:25:33 -05:00
if isAttributeSSHPublicKeySet {
sshPublicKey = sr . Entries [ 0 ] . GetAttributeValues ( ls . AttributeSSHPublicKey )
}
2017-05-10 09:10:18 -04:00
isAdmin := checkAdmin ( l , ls , userDN )
2020-03-05 01:30:33 -05:00
var isRestricted bool
if ! isAdmin {
isRestricted = checkRestricted ( l , ls , userDN )
}
2015-08-19 00:34:03 -04:00
2017-05-10 09:10:18 -04:00
if ! directBind && ls . AttributesInBind {
// binds user (checking password) after looking-up attributes in BindDN context
err = bindUser ( l , userDN , passwd )
2015-09-01 08:40:11 -04:00
if err != nil {
2017-05-10 09:10:18 -04:00
return nil
2015-09-01 08:40:11 -04:00
}
2015-08-19 00:34:03 -04:00
}
2017-05-10 09:10:18 -04:00
return & SearchResult {
2018-12-27 12:28:48 -05:00
Username : username ,
Name : firstname ,
Surname : surname ,
Mail : mail ,
SSHPublicKey : sshPublicKey ,
IsAdmin : isAdmin ,
2020-03-05 01:30:33 -05:00
IsRestricted : isRestricted ,
2017-05-10 09:10:18 -04:00
}
}
2018-05-05 10:30:47 -04:00
// UsePagedSearch returns if need to use paged search
func ( ls * Source ) UsePagedSearch ( ) bool {
return ls . SearchPageSize > 0
}
2017-05-10 09:10:18 -04:00
// SearchEntries : search an LDAP source for all users matching userFilter
2019-08-24 14:53:37 -04:00
func ( ls * Source ) SearchEntries ( ) ( [ ] * SearchResult , error ) {
2017-05-10 09:10:18 -04:00
l , err := dial ( ls )
if err != nil {
2019-04-02 03:48:31 -04:00
log . Error ( "LDAP Connect error, %s:%v" , ls . Host , err )
2017-05-10 09:10:18 -04:00
ls . Enabled = false
2019-08-24 14:53:37 -04:00
return nil , err
2017-05-10 09:10:18 -04:00
}
defer l . Close ( )
if ls . BindDN != "" && ls . BindPassword != "" {
err := l . Bind ( ls . BindDN , ls . BindPassword )
2016-02-16 06:33:16 -05:00
if err != nil {
2017-05-10 09:10:18 -04:00
log . Debug ( "Failed to bind as BindDN[%s]: %v" , ls . BindDN , err )
2019-08-24 14:53:37 -04:00
return nil , err
2017-05-10 09:10:18 -04:00
}
log . Trace ( "Bound as BindDN %s" , ls . BindDN )
} else {
log . Trace ( "Proceeding with anonymous LDAP search." )
}
userFilter := fmt . Sprintf ( ls . Filter , "*" )
2019-01-23 18:25:33 -05:00
var isAttributeSSHPublicKeySet = len ( strings . TrimSpace ( ls . AttributeSSHPublicKey ) ) > 0
attribs := [ ] string { ls . AttributeUsername , ls . AttributeName , ls . AttributeSurname , ls . AttributeMail }
if isAttributeSSHPublicKeySet {
attribs = append ( attribs , ls . AttributeSSHPublicKey )
}
2018-05-24 00:59:02 -04:00
log . Trace ( "Fetching attributes '%v', '%v', '%v', '%v', '%v' with filter %s and base %s" , ls . AttributeUsername , ls . AttributeName , ls . AttributeSurname , ls . AttributeMail , ls . AttributeSSHPublicKey , userFilter , ls . UserBase )
2017-05-10 09:10:18 -04:00
search := ldap . NewSearchRequest (
ls . UserBase , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , userFilter ,
2019-01-23 18:25:33 -05:00
attribs , nil )
2017-05-10 09:10:18 -04:00
2018-05-05 10:30:47 -04:00
var sr * ldap . SearchResult
if ls . UsePagedSearch ( ) {
sr , err = l . SearchWithPaging ( search , ls . SearchPageSize )
} else {
sr , err = l . Search ( search )
}
2017-05-10 09:10:18 -04:00
if err != nil {
2019-04-02 03:48:31 -04:00
log . Error ( "LDAP Search failed unexpectedly! (%v)" , err )
2019-08-24 14:53:37 -04:00
return nil , err
2017-05-10 09:10:18 -04:00
}
result := make ( [ ] * SearchResult , len ( sr . Entries ) )
for i , v := range sr . Entries {
result [ i ] = & SearchResult {
2019-01-23 18:25:33 -05:00
Username : v . GetAttributeValue ( ls . AttributeUsername ) ,
Name : v . GetAttributeValue ( ls . AttributeName ) ,
Surname : v . GetAttributeValue ( ls . AttributeSurname ) ,
Mail : v . GetAttributeValue ( ls . AttributeMail ) ,
IsAdmin : checkAdmin ( l , ls , v . DN ) ,
}
2020-03-05 01:30:33 -05:00
if ! result [ i ] . IsAdmin {
result [ i ] . IsRestricted = checkRestricted ( l , ls , v . DN )
}
2019-01-23 18:25:33 -05:00
if isAttributeSSHPublicKeySet {
result [ i ] . SSHPublicKey = v . GetAttributeValues ( ls . AttributeSSHPublicKey )
2016-02-16 06:33:16 -05:00
}
}
2019-08-24 14:53:37 -04:00
return result , nil
2014-04-22 12:55:27 -04:00
}