ldap.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. package login
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "github.com/davecgh/go-spew/spew"
  10. "github.com/go-ldap/ldap"
  11. "github.com/grafana/grafana/pkg/bus"
  12. "github.com/grafana/grafana/pkg/log"
  13. m "github.com/grafana/grafana/pkg/models"
  14. )
  15. type ldapAuther struct {
  16. server *LdapServerConf
  17. conn *ldap.Conn
  18. requireSecondBind bool
  19. }
  20. func NewLdapAuthenticator(server *LdapServerConf) *ldapAuther {
  21. return &ldapAuther{server: server}
  22. }
  23. func (a *ldapAuther) Dial() error {
  24. var err error
  25. var certPool *x509.CertPool
  26. if a.server.RootCACert != "" {
  27. certPool := x509.NewCertPool()
  28. for _, caCertFile := range strings.Split(a.server.RootCACert, " ") {
  29. if pem, err := ioutil.ReadFile(caCertFile); err != nil {
  30. return err
  31. } else {
  32. if !certPool.AppendCertsFromPEM(pem) {
  33. return errors.New("Failed to append CA certificate " + caCertFile)
  34. }
  35. }
  36. }
  37. }
  38. for _, host := range strings.Split(a.server.Host, " ") {
  39. address := fmt.Sprintf("%s:%d", host, a.server.Port)
  40. if a.server.UseSSL {
  41. tlsCfg := &tls.Config{
  42. InsecureSkipVerify: a.server.SkipVerifySSL,
  43. ServerName: host,
  44. RootCAs: certPool,
  45. }
  46. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  47. } else {
  48. a.conn, err = ldap.Dial("tcp", address)
  49. }
  50. if err == nil {
  51. return nil
  52. }
  53. }
  54. return err
  55. }
  56. func (a *ldapAuther) login(query *LoginUserQuery) error {
  57. if err := a.Dial(); err != nil {
  58. return err
  59. }
  60. defer a.conn.Close()
  61. // perform initial authentication
  62. if err := a.initialBind(query.Username, query.Password); err != nil {
  63. return err
  64. }
  65. // find user entry & attributes
  66. if ldapUser, err := a.searchForUser(query.Username); err != nil {
  67. return err
  68. } else {
  69. if ldapCfg.VerboseLogging {
  70. log.Info("Ldap User Info: %s", spew.Sdump(ldapUser))
  71. }
  72. // check if a second user bind is needed
  73. if a.requireSecondBind {
  74. if err := a.secondBind(ldapUser, query.Password); err != nil {
  75. return err
  76. }
  77. }
  78. if grafanaUser, err := a.getGrafanaUserFor(ldapUser); err != nil {
  79. return err
  80. } else {
  81. // sync user details
  82. if err := a.syncUserInfo(grafanaUser, ldapUser); err != nil {
  83. return err
  84. }
  85. // sync org roles
  86. if err := a.syncOrgRoles(grafanaUser, ldapUser); err != nil {
  87. return err
  88. }
  89. query.User = grafanaUser
  90. return nil
  91. }
  92. }
  93. }
  94. func (a *ldapAuther) getGrafanaUserFor(ldapUser *ldapUserInfo) (*m.User, error) {
  95. // validate that the user has access
  96. // if there are no ldap group mappings access is true
  97. // otherwise a single group must match
  98. access := len(a.server.LdapGroups) == 0
  99. for _, ldapGroup := range a.server.LdapGroups {
  100. if ldapUser.isMemberOf(ldapGroup.GroupDN) {
  101. access = true
  102. break
  103. }
  104. }
  105. if !access {
  106. log.Info("Ldap Auth: user %s does not belong in any of the specified ldap groups, ldapUser groups: %v", ldapUser.Username, ldapUser.MemberOf)
  107. return nil, ErrInvalidCredentials
  108. }
  109. // get user from grafana db
  110. userQuery := m.GetUserByLoginQuery{LoginOrEmail: ldapUser.Username}
  111. if err := bus.Dispatch(&userQuery); err != nil {
  112. if err == m.ErrUserNotFound {
  113. return a.createGrafanaUser(ldapUser)
  114. } else {
  115. return nil, err
  116. }
  117. }
  118. return userQuery.Result, nil
  119. }
  120. func (a *ldapAuther) createGrafanaUser(ldapUser *ldapUserInfo) (*m.User, error) {
  121. cmd := m.CreateUserCommand{
  122. Login: ldapUser.Username,
  123. Email: ldapUser.Email,
  124. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  125. }
  126. if err := bus.Dispatch(&cmd); err != nil {
  127. return nil, err
  128. }
  129. return &cmd.Result, nil
  130. }
  131. func (a *ldapAuther) syncUserInfo(user *m.User, ldapUser *ldapUserInfo) error {
  132. var name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  133. if user.Email == ldapUser.Email && user.Name == name {
  134. return nil
  135. }
  136. log.Info("Ldap: Syncing user info %s", ldapUser.Username)
  137. updateCmd := m.UpdateUserCommand{}
  138. updateCmd.UserId = user.Id
  139. updateCmd.Login = user.Login
  140. updateCmd.Email = ldapUser.Email
  141. updateCmd.Name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  142. return bus.Dispatch(&updateCmd)
  143. }
  144. func (a *ldapAuther) syncOrgRoles(user *m.User, ldapUser *ldapUserInfo) error {
  145. if len(a.server.LdapGroups) == 0 {
  146. log.Warn("Ldap: no group mappings defined")
  147. return nil
  148. }
  149. orgsQuery := m.GetUserOrgListQuery{UserId: user.Id}
  150. if err := bus.Dispatch(&orgsQuery); err != nil {
  151. return err
  152. }
  153. handledOrgIds := map[int64]bool{}
  154. // update or remove org roles
  155. for _, org := range orgsQuery.Result {
  156. match := false
  157. handledOrgIds[org.OrgId] = true
  158. for _, group := range a.server.LdapGroups {
  159. if org.OrgId != group.OrgId {
  160. continue
  161. }
  162. if ldapUser.isMemberOf(group.GroupDN) {
  163. match = true
  164. if org.Role != group.OrgRole {
  165. // update role
  166. cmd := m.UpdateOrgUserCommand{OrgId: org.OrgId, UserId: user.Id, Role: group.OrgRole}
  167. if err := bus.Dispatch(&cmd); err != nil {
  168. return err
  169. }
  170. }
  171. // ignore subsequent ldap group mapping matches
  172. break
  173. }
  174. }
  175. // remove role if no mappings match
  176. if !match {
  177. cmd := m.RemoveOrgUserCommand{OrgId: org.OrgId, UserId: user.Id}
  178. if err := bus.Dispatch(&cmd); err != nil {
  179. return err
  180. }
  181. }
  182. }
  183. // add missing org roles
  184. for _, group := range a.server.LdapGroups {
  185. if !ldapUser.isMemberOf(group.GroupDN) {
  186. continue
  187. }
  188. if _, exists := handledOrgIds[group.OrgId]; exists {
  189. continue
  190. }
  191. // add role
  192. cmd := m.AddOrgUserCommand{UserId: user.Id, Role: group.OrgRole, OrgId: group.OrgId}
  193. err := bus.Dispatch(&cmd)
  194. if err != nil && err != m.ErrOrgNotFound {
  195. return err
  196. }
  197. // mark this group has handled so we do not process it again
  198. handledOrgIds[group.OrgId] = true
  199. }
  200. return nil
  201. }
  202. func (a *ldapAuther) secondBind(ldapUser *ldapUserInfo, userPassword string) error {
  203. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  204. if ldapCfg.VerboseLogging {
  205. log.Info("LDAP second bind failed, %v", err)
  206. }
  207. if ldapErr, ok := err.(*ldap.Error); ok {
  208. if ldapErr.ResultCode == 49 {
  209. return ErrInvalidCredentials
  210. }
  211. }
  212. return err
  213. }
  214. return nil
  215. }
  216. func (a *ldapAuther) initialBind(username, userPassword string) error {
  217. if a.server.BindPassword != "" || a.server.BindDN == "" {
  218. userPassword = a.server.BindPassword
  219. a.requireSecondBind = true
  220. }
  221. bindPath := a.server.BindDN
  222. if strings.Contains(bindPath, "%s") {
  223. bindPath = fmt.Sprintf(a.server.BindDN, username)
  224. }
  225. if err := a.conn.Bind(bindPath, userPassword); err != nil {
  226. if ldapCfg.VerboseLogging {
  227. log.Info("LDAP initial bind failed, %v", err)
  228. }
  229. if ldapErr, ok := err.(*ldap.Error); ok {
  230. if ldapErr.ResultCode == 49 {
  231. return ErrInvalidCredentials
  232. }
  233. }
  234. return err
  235. }
  236. return nil
  237. }
  238. func (a *ldapAuther) searchForUser(username string) (*ldapUserInfo, error) {
  239. var searchResult *ldap.SearchResult
  240. var err error
  241. for _, searchBase := range a.server.SearchBaseDNs {
  242. searchReq := ldap.SearchRequest{
  243. BaseDN: searchBase,
  244. Scope: ldap.ScopeWholeSubtree,
  245. DerefAliases: ldap.NeverDerefAliases,
  246. Attributes: []string{
  247. a.server.Attr.Username,
  248. a.server.Attr.Surname,
  249. a.server.Attr.Email,
  250. a.server.Attr.Name,
  251. a.server.Attr.MemberOf,
  252. },
  253. Filter: strings.Replace(a.server.SearchFilter, "%s", ldap.EscapeFilter(username), -1),
  254. }
  255. searchResult, err = a.conn.Search(&searchReq)
  256. if err != nil {
  257. return nil, err
  258. }
  259. if len(searchResult.Entries) > 0 {
  260. break
  261. }
  262. }
  263. if len(searchResult.Entries) == 0 {
  264. return nil, ErrInvalidCredentials
  265. }
  266. if len(searchResult.Entries) > 1 {
  267. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  268. }
  269. var memberOf []string
  270. if a.server.GroupSearchFilter == "" {
  271. memberOf = getLdapAttrArray(a.server.Attr.MemberOf, searchResult)
  272. } else {
  273. // If we are using a POSIX LDAP schema it won't support memberOf, so we manually search the groups
  274. var groupSearchResult *ldap.SearchResult
  275. for _, groupSearchBase := range a.server.GroupSearchBaseDNs {
  276. var filter_replace string
  277. filter_replace = getLdapAttr(a.server.GroupSearchFilterUserAttribute, searchResult)
  278. if a.server.GroupSearchFilterUserAttribute == "" {
  279. filter_replace = getLdapAttr(a.server.Attr.Username, searchResult)
  280. }
  281. filter := strings.Replace(a.server.GroupSearchFilter, "%s", ldap.EscapeFilter(filter_replace), -1)
  282. if ldapCfg.VerboseLogging {
  283. log.Info("LDAP: Searching for user's groups: %s", filter)
  284. }
  285. groupSearchReq := ldap.SearchRequest{
  286. BaseDN: groupSearchBase,
  287. Scope: ldap.ScopeWholeSubtree,
  288. DerefAliases: ldap.NeverDerefAliases,
  289. Attributes: []string{
  290. // Here MemberOf would be the thing that identifies the group, which is normally 'cn'
  291. a.server.Attr.MemberOf,
  292. },
  293. Filter: filter,
  294. }
  295. groupSearchResult, err = a.conn.Search(&groupSearchReq)
  296. if err != nil {
  297. return nil, err
  298. }
  299. if len(groupSearchResult.Entries) > 0 {
  300. for i := range groupSearchResult.Entries {
  301. memberOf = append(memberOf, getLdapAttrN(a.server.Attr.MemberOf, groupSearchResult, i))
  302. }
  303. break
  304. }
  305. }
  306. }
  307. return &ldapUserInfo{
  308. DN: searchResult.Entries[0].DN,
  309. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  310. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  311. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  312. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  313. MemberOf: memberOf,
  314. }, nil
  315. }
  316. func getLdapAttrN(name string, result *ldap.SearchResult, n int) string {
  317. for _, attr := range result.Entries[n].Attributes {
  318. if attr.Name == name {
  319. if len(attr.Values) > 0 {
  320. return attr.Values[0]
  321. }
  322. }
  323. }
  324. return ""
  325. }
  326. func getLdapAttr(name string, result *ldap.SearchResult) string {
  327. return getLdapAttrN(name, result, 0)
  328. }
  329. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  330. for _, attr := range result.Entries[0].Attributes {
  331. if attr.Name == name {
  332. return attr.Values
  333. }
  334. }
  335. return []string{}
  336. }
  337. func createUserFromLdapInfo() error {
  338. return nil
  339. }