7f39399c32
* Added auto-generated uidNumber and guidNumber generated attributes for use with SSSD and similar software. The starting number for uid/gid can be configured iva environtment variables and is by default 2000 which should work fine for most instances unless there are more than 999 local accounts on the server/computer. The uidNumber is just the users Pk + the starting number. The guidNumber is calculated by the last couple of bytes in the uuid of the group + the starting number, this should have a low enough chance for collisions that it's going to be fine for most use cases. I have not added any interface stuff for configuring the environment variables as I couldn't really find my way around all the places I'd have to edit to add it and the default values should in my opinion be fine for 99% use cases. * Add a 'fake' primary group for each user * First attempt att adding config to interface * Updated API to support new fields * Refactor code, update documentation and remove obsolete comment Simplify `GetRIDForGroup`, was a bit overcomplicated before. Add an additional class/struct `LDAPGroup` which is the new argument for `pi.GroupEntry` and util functions to create `LDAPGroup` from api.Group and api.User Add proper support in the interface for changing gidNumber and uidNumber starting points * make lint-fix for the migration files
143 lines
3.8 KiB
Go
143 lines
3.8 KiB
Go
package ldap
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/go-openapi/strfmt"
|
|
log "github.com/sirupsen/logrus"
|
|
"goauthentik.io/outpost/pkg/ak"
|
|
)
|
|
|
|
func (ls *LDAPServer) Refresh() error {
|
|
outposts, _, err := ls.ac.Client.OutpostsApi.OutpostsLdapList(context.Background()).Execute()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(outposts.Results) < 1 {
|
|
return errors.New("no ldap provider defined")
|
|
}
|
|
providers := make([]*ProviderInstance, len(outposts.Results))
|
|
for idx, provider := range outposts.Results {
|
|
userDN := strings.ToLower(fmt.Sprintf("ou=users,%s", *provider.BaseDn))
|
|
groupDN := strings.ToLower(fmt.Sprintf("ou=groups,%s", *provider.BaseDn))
|
|
logger := log.WithField("logger", "authentik.outpost.ldap").WithField("provider", provider.Name)
|
|
providers[idx] = &ProviderInstance{
|
|
BaseDN: *provider.BaseDn,
|
|
GroupDN: groupDN,
|
|
UserDN: userDN,
|
|
appSlug: provider.ApplicationSlug,
|
|
flowSlug: provider.BindFlowSlug,
|
|
searchAllowedGroups: []*strfmt.UUID{(*strfmt.UUID)(provider.SearchGroup.Get())},
|
|
boundUsersMutex: sync.RWMutex{},
|
|
boundUsers: make(map[string]UserFlags),
|
|
s: ls,
|
|
log: log.WithField("logger", "authentik.outpost.ldap").WithField("provider", provider.Name),
|
|
tlsServerName: provider.TlsServerName,
|
|
uidStartNumber: *provider.UidStartNumber,
|
|
gidStartNumber: *provider.GidStartNumber,
|
|
}
|
|
if provider.Certificate.Get() != nil {
|
|
logger.WithField("provider", provider.Name).Debug("Enabling TLS")
|
|
cert, err := ak.ParseCertificate(*provider.Certificate.Get(), ls.ac.Client.CryptoApi)
|
|
if err != nil {
|
|
logger.WithField("provider", provider.Name).WithError(err).Warning("Failed to fetch certificate")
|
|
} else {
|
|
providers[idx].cert = cert
|
|
logger.WithField("provider", provider.Name).Debug("Loaded certificates")
|
|
}
|
|
}
|
|
}
|
|
ls.providers = providers
|
|
ls.log.Info("Update providers")
|
|
return nil
|
|
}
|
|
|
|
func (ls *LDAPServer) StartHTTPServer() error {
|
|
listen := "0.0.0.0:4180" // same port as proxy
|
|
m := http.NewServeMux()
|
|
m.HandleFunc("/akprox/ping", func(rw http.ResponseWriter, r *http.Request) {
|
|
rw.WriteHeader(204)
|
|
})
|
|
ls.log.WithField("listen", listen).Info("Starting http server")
|
|
return http.ListenAndServe(listen, m)
|
|
}
|
|
|
|
func (ls *LDAPServer) StartLDAPServer() error {
|
|
listen := "0.0.0.0:3389"
|
|
ls.log.WithField("listen", listen).Info("Starting ldap server")
|
|
return ls.s.ListenAndServe(listen)
|
|
}
|
|
|
|
func (ls *LDAPServer) StartLDAPTLSServer() error {
|
|
listen := "0.0.0.0:6636"
|
|
tlsConfig := &tls.Config{
|
|
MinVersion: tls.VersionTLS12,
|
|
MaxVersion: tls.VersionTLS12,
|
|
GetCertificate: ls.getCertificates,
|
|
}
|
|
|
|
ln, err := tls.Listen("tcp", listen, tlsConfig)
|
|
if err != nil {
|
|
ls.log.Fatalf("FATAL: listen (%s) failed - %s", listen, err)
|
|
}
|
|
ls.log.WithField("listen", listen).Info("Starting ldap tls server")
|
|
err = ls.s.Serve(ln)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ls.log.Printf("closing %s", ln.Addr())
|
|
return ls.s.ListenAndServe(listen)
|
|
}
|
|
|
|
func (ls *LDAPServer) Start() error {
|
|
wg := sync.WaitGroup{}
|
|
wg.Add(3)
|
|
go func() {
|
|
defer wg.Done()
|
|
err := ls.StartHTTPServer()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
go func() {
|
|
defer wg.Done()
|
|
err := ls.StartLDAPServer()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
go func() {
|
|
defer wg.Done()
|
|
err := ls.StartLDAPTLSServer()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
wg.Wait()
|
|
return nil
|
|
}
|
|
|
|
type transport struct {
|
|
headers map[string]string
|
|
inner http.RoundTripper
|
|
}
|
|
|
|
func (t *transport) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
for key, value := range t.headers {
|
|
req.Header.Add(key, value)
|
|
}
|
|
return t.inner.RoundTrip(req)
|
|
}
|
|
func newTransport(inner http.RoundTripper, headers map[string]string) *transport {
|
|
return &transport{
|
|
inner: inner,
|
|
headers: headers,
|
|
}
|
|
}
|