Files
grafana/pkg/login/ldap.go

290 lines
6.7 KiB
Go
Raw Normal View History

package login
2015-07-10 11:10:48 +02:00
import (
"crypto/tls"
"errors"
2015-07-10 11:10:48 +02:00
"fmt"
"strings"
2015-07-10 11:10:48 +02:00
"github.com/davecgh/go-spew/spew"
2015-07-10 11:10:48 +02:00
"github.com/go-ldap/ldap"
2015-07-13 16:45:47 +02:00
"github.com/grafana/grafana/pkg/bus"
2015-07-10 11:10:48 +02:00
"github.com/grafana/grafana/pkg/log"
2015-07-13 16:45:47 +02:00
m "github.com/grafana/grafana/pkg/models"
2015-07-10 11:10:48 +02:00
)
type ldapAuther struct {
server *LdapServerConf
conn *ldap.Conn
}
func NewLdapAuthenticator(server *LdapServerConf) *ldapAuther {
return &ldapAuther{server: server}
}
2015-07-10 11:10:48 +02:00
func (a *ldapAuther) Dial() error {
address := fmt.Sprintf("%s:%d", a.server.Host, a.server.Port)
var err error
if a.server.UseSSL {
tlsCfg := &tls.Config{
InsecureSkipVerify: a.server.SkipVerifySSL,
ServerName: a.server.CertServerName,
}
a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
} else {
a.conn, err = ldap.Dial("tcp", address)
}
2015-07-10 11:10:48 +02:00
return err
}
2015-07-10 11:10:48 +02:00
func (a *ldapAuther) login(query *LoginUserQuery) error {
if err := a.Dial(); err != nil {
return err
}
defer a.conn.Close()
// perform initial authentication
if err := a.initialBind(query.Username, query.Password); err != nil {
2015-07-10 11:10:48 +02:00
return err
}
// find user entry & attributes
2015-07-13 16:45:47 +02:00
if ldapUser, err := a.searchForUser(query.Username); err != nil {
return err
} else {
if ldapCfg.VerboseLogging {
log.Info("Ldap User Info: %s", spew.Sdump(ldapUser))
}
2015-07-13 16:45:47 +02:00
// check if a second user bind is needed
if a.server.BindPassword != "" {
if err := a.secondBind(ldapUser, query.Password); err != nil {
return err
}
}
2015-07-13 16:45:47 +02:00
if grafanaUser, err := a.getGrafanaUserFor(ldapUser); err != nil {
return err
} else {
// sync org roles
if err := a.syncOrgRoles(grafanaUser, ldapUser); err != nil {
return err
}
2015-07-13 16:45:47 +02:00
query.User = grafanaUser
return nil
}
}
}
func (a *ldapAuther) getGrafanaUserFor(ldapUser *ldapUserInfo) (*m.User, error) {
// validate that the user has access
2015-07-14 15:46:11 +02:00
// if there are no ldap group mappings access is true
// otherwise a single group must match
access := len(a.server.LdapGroups) == 0
for _, ldapGroup := range a.server.LdapGroups {
if ldapUser.isMemberOf(ldapGroup.GroupDN) {
access = true
}
}
if !access {
log.Info("Ldap Auth: user %s does not belong in any of the specified ldap groups", ldapUser.Username)
return nil, ErrInvalidCredentials
}
2015-07-13 16:45:47 +02:00
// get user from grafana db
userQuery := m.GetUserByLoginQuery{LoginOrEmail: ldapUser.Username}
if err := bus.Dispatch(&userQuery); err != nil {
if err == m.ErrUserNotFound {
return a.createGrafanaUser(ldapUser)
} else {
return nil, err
2015-07-13 16:45:47 +02:00
}
}
return userQuery.Result, nil
}
func (a *ldapAuther) createGrafanaUser(ldapUser *ldapUserInfo) (*m.User, error) {
cmd := m.CreateUserCommand{
Login: ldapUser.Username,
Email: ldapUser.Email,
Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
}
if err := bus.Dispatch(&cmd); err != nil {
return nil, err
}
2015-07-13 16:45:47 +02:00
return &cmd.Result, nil
}
func (a *ldapAuther) syncOrgRoles(user *m.User, ldapUser *ldapUserInfo) error {
2015-07-14 15:46:11 +02:00
if len(a.server.LdapGroups) == 0 {
return nil
}
orgsQuery := m.GetUserOrgListQuery{UserId: user.Id}
if err := bus.Dispatch(&orgsQuery); err != nil {
return err
}
// remove or update org roles
for _, org := range orgsQuery.Result {
for _, group := range a.server.LdapGroups {
2015-07-14 16:42:55 +02:00
if org.OrgId != group.OrgId {
continue
}
if ldapUser.isMemberOf(group.GroupDN) {
2015-07-14 15:46:11 +02:00
if org.Role != group.OrgRole {
// update role
2015-07-14 16:42:55 +02:00
cmd := m.UpdateOrgUserCommand{OrgId: org.OrgId, UserId: user.Id, Role: group.OrgRole}
if err := bus.Dispatch(&cmd); err != nil {
return err
}
2015-07-14 15:46:11 +02:00
}
// ignore subsequent ldap group mapping matches
break
2015-07-14 15:46:11 +02:00
} else {
// remove role
2015-07-14 16:42:55 +02:00
cmd := m.RemoveOrgUserCommand{OrgId: org.OrgId, UserId: user.Id}
if err := bus.Dispatch(&cmd); err != nil {
return err
}
2015-07-14 15:46:11 +02:00
}
}
}
2015-07-14 16:42:55 +02:00
// add missing org roles
2015-07-14 15:46:11 +02:00
for _, group := range a.server.LdapGroups {
if !ldapUser.isMemberOf(group.GroupDN) {
continue
}
match := false
for _, org := range orgsQuery.Result {
if group.OrgId == org.OrgId {
match = true
}
}
if !match {
// add role
cmd := m.AddOrgUserCommand{UserId: user.Id, Role: group.OrgRole, OrgId: group.OrgId}
if err := bus.Dispatch(&cmd); err != nil {
return err
}
}
}
return nil
}
func (a *ldapAuther) secondBind(ldapUser *ldapUserInfo, userPassword string) error {
if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
if ldapErr, ok := err.(*ldap.Error); ok {
if ldapErr.ResultCode == 49 {
return ErrInvalidCredentials
}
}
return err
}
return nil
}
func (a *ldapAuther) initialBind(username, userPassword string) error {
if a.server.BindPassword != "" {
userPassword = a.server.BindPassword
}
bindPath := a.server.BindDN
if strings.Contains(bindPath, "%s") {
bindPath = fmt.Sprintf(a.server.BindDN, username)
}
if err := a.conn.Bind(bindPath, userPassword); err != nil {
if ldapErr, ok := err.(*ldap.Error); ok {
if ldapErr.ResultCode == 49 {
return ErrInvalidCredentials
}
}
return err
}
return nil
}
func (a *ldapAuther) searchForUser(username string) (*ldapUserInfo, error) {
var searchResult *ldap.SearchResult
var err error
for _, searchBase := range a.server.SearchBaseDNs {
searchReq := ldap.SearchRequest{
BaseDN: searchBase,
Scope: ldap.ScopeWholeSubtree,
DerefAliases: ldap.NeverDerefAliases,
Attributes: []string{
a.server.Attr.Username,
a.server.Attr.Surname,
a.server.Attr.Email,
a.server.Attr.Name,
a.server.Attr.MemberOf,
},
Filter: fmt.Sprintf(a.server.SearchFilter, username),
}
2015-07-10 11:10:48 +02:00
searchResult, err = a.conn.Search(&searchReq)
if err != nil {
return nil, err
}
if len(searchResult.Entries) > 0 {
break
2015-07-10 11:10:48 +02:00
}
}
if len(searchResult.Entries) == 0 {
return nil, ErrInvalidCredentials
}
2015-07-10 11:10:48 +02:00
if len(searchResult.Entries) > 1 {
return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
}
return &ldapUserInfo{
DN: searchResult.Entries[0].DN,
LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
Username: getLdapAttr(a.server.Attr.Username, searchResult),
Email: getLdapAttr(a.server.Attr.Email, searchResult),
MemberOf: getLdapAttrArray(a.server.Attr.MemberOf, searchResult),
}, nil
2015-07-10 11:10:48 +02:00
}
func getLdapAttr(name string, result *ldap.SearchResult) string {
for _, attr := range result.Entries[0].Attributes {
if attr.Name == name {
if len(attr.Values) > 0 {
return attr.Values[0]
}
}
}
return ""
}
func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
for _, attr := range result.Entries[0].Attributes {
if attr.Name == name {
return attr.Values
}
}
return []string{}
}
func createUserFromLdapInfo() error {
return nil
}