2021-07-24 19:16:34 +09:00
|
|
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package ldap
|
|
|
|
|
|
|
|
import (
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/models"
|
2021-09-24 20:32:56 +09:00
|
|
|
"code.gitea.io/gitea/models/login"
|
2021-07-25 01:03:58 +09:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2021-07-24 19:16:34 +09:00
|
|
|
"code.gitea.io/gitea/modules/secret"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
|
|
|
// .____ ________ _____ __________
|
|
|
|
// | | \______ \ / _ \\______ \
|
|
|
|
// | | | | \ / /_\ \| ___/
|
|
|
|
// | |___ | ` \/ | \ |
|
|
|
|
// |_______ \/_______ /\____|__ /____|
|
|
|
|
// \/ \/ \/
|
|
|
|
|
|
|
|
// Package ldap provide functions & structure to query a LDAP ldap directory
|
|
|
|
// For now, it's mainly tested again an MS Active Directory service, see README.md for more information
|
|
|
|
|
|
|
|
// Source Basic LDAP authentication service
|
|
|
|
type Source struct {
|
|
|
|
Name string // canonical name (ie. corporate.ad)
|
|
|
|
Host string // LDAP host
|
|
|
|
Port int // port number
|
|
|
|
SecurityProtocol SecurityProtocol
|
|
|
|
SkipVerify bool
|
|
|
|
BindDN string // DN to bind with
|
|
|
|
BindPasswordEncrypt string // Encrypted Bind BN password
|
|
|
|
BindPassword string // Bind DN password
|
|
|
|
UserBase string // Base search path for users
|
|
|
|
UserDN string // Template for the DN of the user for simple auth
|
|
|
|
AttributeUsername string // Username attribute
|
|
|
|
AttributeName string // First name attribute
|
|
|
|
AttributeSurname string // Surname attribute
|
|
|
|
AttributeMail string // E-mail attribute
|
|
|
|
AttributesInBind bool // fetch attributes in bind context (not user)
|
|
|
|
AttributeSSHPublicKey string // LDAP SSH Public Key attribute
|
2021-09-27 11:39:36 +09:00
|
|
|
AttributeAvatar string
|
2021-07-24 19:16:34 +09:00
|
|
|
SearchPageSize uint32 // Search with paging page size
|
|
|
|
Filter string // Query filter to validate entry
|
|
|
|
AdminFilter string // Query filter to check if user is admin
|
|
|
|
RestrictedFilter string // Query filter to check if user is restricted
|
|
|
|
Enabled bool // if this source is disabled
|
|
|
|
AllowDeactivateAll bool // Allow an empty search response to deactivate all users from this source
|
|
|
|
GroupsEnabled bool // if the group checking is enabled
|
|
|
|
GroupDN string // Group Search Base
|
|
|
|
GroupFilter string // Group Name Filter
|
|
|
|
GroupMemberUID string // Group Attribute containing array of UserUID
|
|
|
|
UserUID string // User Attribute listed in Group
|
2021-09-27 10:02:01 +09:00
|
|
|
SkipLocalTwoFA bool `json:",omitempty"` // Skip Local 2fa for users authenticated with this source
|
2021-07-24 19:16:34 +09:00
|
|
|
|
|
|
|
// reference to the loginSource
|
2021-09-24 20:32:56 +09:00
|
|
|
loginSource *login.Source
|
2021-07-24 19:16:34 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
// FromDB fills up a LDAPConfig from serialized format.
|
|
|
|
func (source *Source) FromDB(bs []byte) error {
|
|
|
|
err := models.JSONUnmarshalHandleDoubleEncode(bs, &source)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if source.BindPasswordEncrypt != "" {
|
|
|
|
source.BindPassword, err = secret.DecryptSecret(setting.SecretKey, source.BindPasswordEncrypt)
|
|
|
|
source.BindPasswordEncrypt = ""
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// ToDB exports a LDAPConfig to a serialized format.
|
|
|
|
func (source *Source) ToDB() ([]byte, error) {
|
|
|
|
var err error
|
|
|
|
source.BindPasswordEncrypt, err = secret.EncryptSecret(setting.SecretKey, source.BindPassword)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
source.BindPassword = ""
|
|
|
|
return json.Marshal(source)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SecurityProtocolName returns the name of configured security
|
|
|
|
// protocol.
|
|
|
|
func (source *Source) SecurityProtocolName() string {
|
|
|
|
return SecurityProtocolNames[source.SecurityProtocol]
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsSkipVerify returns if SkipVerify is set
|
|
|
|
func (source *Source) IsSkipVerify() bool {
|
|
|
|
return source.SkipVerify
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasTLS returns if HasTLS
|
|
|
|
func (source *Source) HasTLS() bool {
|
|
|
|
return source.SecurityProtocol > SecurityProtocolUnencrypted
|
|
|
|
}
|
|
|
|
|
|
|
|
// UseTLS returns if UseTLS
|
|
|
|
func (source *Source) UseTLS() bool {
|
|
|
|
return source.SecurityProtocol != SecurityProtocolUnencrypted
|
|
|
|
}
|
|
|
|
|
|
|
|
// ProvidesSSHKeys returns if this source provides SSH Keys
|
|
|
|
func (source *Source) ProvidesSSHKeys() bool {
|
|
|
|
return len(strings.TrimSpace(source.AttributeSSHPublicKey)) > 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetLoginSource sets the related LoginSource
|
2021-09-24 20:32:56 +09:00
|
|
|
func (source *Source) SetLoginSource(loginSource *login.Source) {
|
2021-07-24 19:16:34 +09:00
|
|
|
source.loginSource = loginSource
|
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
2021-09-24 20:32:56 +09:00
|
|
|
login.RegisterTypeConfig(login.LDAP, &Source{})
|
|
|
|
login.RegisterTypeConfig(login.DLDAP, &Source{})
|
2021-07-24 19:16:34 +09:00
|
|
|
}
|