2021-04-19 23:30:27 +01:00
|
|
|
package ldap
|
|
|
|
|
|
|
|
import (
|
2021-07-13 17:24:18 +01:00
|
|
|
"crypto/tls"
|
2021-05-04 20:49:15 +01:00
|
|
|
"sync"
|
|
|
|
|
2021-05-04 23:03:19 +01:00
|
|
|
"github.com/go-openapi/strfmt"
|
2021-04-19 23:30:27 +01:00
|
|
|
log "github.com/sirupsen/logrus"
|
2021-06-29 15:21:00 +01:00
|
|
|
"goauthentik.io/api"
|
2021-07-17 18:36:15 +01:00
|
|
|
"goauthentik.io/internal/crypto"
|
2021-06-16 11:02:02 +01:00
|
|
|
"goauthentik.io/internal/outpost/ak"
|
2021-04-19 23:30:27 +01:00
|
|
|
|
2021-05-04 20:49:15 +01:00
|
|
|
"github.com/nmcclain/ldap"
|
2021-04-19 23:30:27 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
const GroupObjectClass = "group"
|
|
|
|
const UserObjectClass = "user"
|
|
|
|
|
2021-04-26 10:53:06 +01:00
|
|
|
type ProviderInstance struct {
|
2021-04-19 23:30:27 +01:00
|
|
|
BaseDN string
|
|
|
|
|
2021-08-21 16:53:09 +01:00
|
|
|
UserDN string
|
|
|
|
|
|
|
|
VirtualGroupDN string
|
|
|
|
GroupDN string
|
2021-04-26 10:53:06 +01:00
|
|
|
|
2021-05-04 23:03:19 +01:00
|
|
|
appSlug string
|
|
|
|
flowSlug string
|
|
|
|
s *LDAPServer
|
|
|
|
log *log.Entry
|
2021-05-04 20:49:15 +01:00
|
|
|
|
2021-07-13 17:24:18 +01:00
|
|
|
tlsServerName *string
|
|
|
|
cert *tls.Certificate
|
|
|
|
|
2021-05-04 23:03:19 +01:00
|
|
|
searchAllowedGroups []*strfmt.UUID
|
|
|
|
boundUsersMutex sync.RWMutex
|
|
|
|
boundUsers map[string]UserFlags
|
2021-07-14 08:17:01 +01:00
|
|
|
|
|
|
|
uidStartNumber int32
|
|
|
|
gidStartNumber int32
|
2021-05-04 20:49:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
type UserFlags struct {
|
2021-08-05 17:16:06 +01:00
|
|
|
UserInfo *api.User
|
|
|
|
UserPk int32
|
2021-05-04 20:49:15 +01:00
|
|
|
CanSearch bool
|
2021-04-26 10:53:06 +01:00
|
|
|
}
|
2021-04-19 23:30:27 +01:00
|
|
|
|
2021-04-26 10:53:06 +01:00
|
|
|
type LDAPServer struct {
|
2021-07-13 17:24:18 +01:00
|
|
|
s *ldap.Server
|
|
|
|
log *log.Entry
|
|
|
|
ac *ak.APIController
|
2021-07-21 22:53:43 +01:00
|
|
|
cs *ak.CryptoStore
|
2021-07-13 17:24:18 +01:00
|
|
|
defaultCert *tls.Certificate
|
|
|
|
providers []*ProviderInstance
|
2021-04-19 23:30:27 +01:00
|
|
|
}
|
2021-04-25 21:07:12 +01:00
|
|
|
|
2021-07-14 08:17:01 +01:00
|
|
|
type LDAPGroup struct {
|
2021-07-14 19:37:27 +01:00
|
|
|
dn string
|
|
|
|
cn string
|
|
|
|
uid string
|
|
|
|
gidNumber string
|
|
|
|
member []string
|
|
|
|
isSuperuser bool
|
2021-07-14 08:17:01 +01:00
|
|
|
isVirtualGroup bool
|
2021-07-14 19:37:27 +01:00
|
|
|
akAttributes interface{}
|
2021-04-19 23:30:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewServer(ac *ak.APIController) *LDAPServer {
|
|
|
|
s := ldap.NewServer()
|
|
|
|
s.EnforceLDAP = true
|
|
|
|
ls := &LDAPServer{
|
2021-04-26 10:53:06 +01:00
|
|
|
s: s,
|
2021-04-26 14:35:56 +01:00
|
|
|
log: log.WithField("logger", "authentik.outpost.ldap"),
|
2021-04-26 10:53:06 +01:00
|
|
|
ac: ac,
|
2021-07-21 22:53:43 +01:00
|
|
|
cs: ak.NewCryptoStore(ac.Client.CryptoApi),
|
2021-04-26 10:53:06 +01:00
|
|
|
providers: []*ProviderInstance{},
|
2021-04-19 23:30:27 +01:00
|
|
|
}
|
2021-07-17 18:36:15 +01:00
|
|
|
defaultCert, err := crypto.GenerateSelfSignedCert()
|
2021-07-13 17:24:18 +01:00
|
|
|
if err != nil {
|
|
|
|
log.Warning(err)
|
|
|
|
}
|
|
|
|
ls.defaultCert = &defaultCert
|
2021-04-19 23:30:27 +01:00
|
|
|
s.BindFunc("", ls)
|
|
|
|
s.SearchFunc("", ls)
|
2021-08-29 20:13:46 +01:00
|
|
|
s.CloseFunc("", ls)
|
2021-04-19 23:30:27 +01:00
|
|
|
return ls
|
|
|
|
}
|