ldap.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430
  1. package login
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "github.com/davecgh/go-spew/spew"
  10. "github.com/grafana/grafana/pkg/bus"
  11. "github.com/grafana/grafana/pkg/log"
  12. m "github.com/grafana/grafana/pkg/models"
  13. "github.com/grafana/grafana/pkg/setting"
  14. "gopkg.in/ldap.v3"
  15. )
  16. type ILdapConn interface {
  17. Bind(username, password string) error
  18. UnauthenticatedBind(username string) error
  19. Search(*ldap.SearchRequest) (*ldap.SearchResult, error)
  20. StartTLS(*tls.Config) error
  21. Close()
  22. }
  23. type ILdapAuther interface {
  24. Login(query *m.LoginUserQuery) error
  25. SyncUser(query *m.LoginUserQuery) error
  26. GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error)
  27. }
  28. type ldapAuther struct {
  29. server *LdapServerConf
  30. conn ILdapConn
  31. requireSecondBind bool
  32. log log.Logger
  33. }
  34. var NewLdapAuthenticator = func(server *LdapServerConf) ILdapAuther {
  35. return &ldapAuther{server: server, log: log.New("ldap")}
  36. }
  37. var ldapDial = func(network, addr string) (ILdapConn, error) {
  38. return ldap.Dial(network, addr)
  39. }
  40. func (a *ldapAuther) Dial() error {
  41. var err error
  42. var certPool *x509.CertPool
  43. if a.server.RootCACert != "" {
  44. certPool = x509.NewCertPool()
  45. for _, caCertFile := range strings.Split(a.server.RootCACert, " ") {
  46. pem, err := ioutil.ReadFile(caCertFile)
  47. if err != nil {
  48. return err
  49. }
  50. if !certPool.AppendCertsFromPEM(pem) {
  51. return errors.New("Failed to append CA certificate " + caCertFile)
  52. }
  53. }
  54. }
  55. var clientCert tls.Certificate
  56. if a.server.ClientCert != "" && a.server.ClientKey != "" {
  57. clientCert, err = tls.LoadX509KeyPair(a.server.ClientCert, a.server.ClientKey)
  58. if err != nil {
  59. return err
  60. }
  61. }
  62. for _, host := range strings.Split(a.server.Host, " ") {
  63. address := fmt.Sprintf("%s:%d", host, a.server.Port)
  64. if a.server.UseSSL {
  65. tlsCfg := &tls.Config{
  66. InsecureSkipVerify: a.server.SkipVerifySSL,
  67. ServerName: host,
  68. RootCAs: certPool,
  69. }
  70. if len(clientCert.Certificate) > 0 {
  71. tlsCfg.Certificates = append(tlsCfg.Certificates, clientCert)
  72. }
  73. if a.server.StartTLS {
  74. a.conn, err = ldap.Dial("tcp", address)
  75. if err == nil {
  76. if err = a.conn.StartTLS(tlsCfg); err == nil {
  77. return nil
  78. }
  79. }
  80. } else {
  81. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  82. }
  83. } else {
  84. a.conn, err = ldapDial("tcp", address)
  85. }
  86. if err == nil {
  87. return nil
  88. }
  89. }
  90. return err
  91. }
  92. func (a *ldapAuther) Login(query *m.LoginUserQuery) error {
  93. // connect to ldap server
  94. if err := a.Dial(); err != nil {
  95. return err
  96. }
  97. defer a.conn.Close()
  98. // perform initial authentication
  99. if err := a.initialBind(query.Username, query.Password); err != nil {
  100. return err
  101. }
  102. // find user entry & attributes
  103. ldapUser, err := a.searchForUser(query.Username)
  104. if err != nil {
  105. return err
  106. }
  107. a.log.Debug("Ldap User found", "info", spew.Sdump(ldapUser))
  108. // check if a second user bind is needed
  109. if a.requireSecondBind {
  110. err = a.secondBind(ldapUser, query.Password)
  111. if err != nil {
  112. return err
  113. }
  114. }
  115. grafanaUser, err := a.GetGrafanaUserFor(query.ReqContext, ldapUser)
  116. if err != nil {
  117. return err
  118. }
  119. query.User = grafanaUser
  120. return nil
  121. }
  122. func (a *ldapAuther) SyncUser(query *m.LoginUserQuery) error {
  123. // connect to ldap server
  124. err := a.Dial()
  125. if err != nil {
  126. return err
  127. }
  128. defer a.conn.Close()
  129. err = a.serverBind()
  130. if err != nil {
  131. return err
  132. }
  133. // find user entry & attributes
  134. ldapUser, err := a.searchForUser(query.Username)
  135. if err != nil {
  136. a.log.Error("Failed searching for user in ldap", "error", err)
  137. return err
  138. }
  139. a.log.Debug("Ldap User found", "info", spew.Sdump(ldapUser))
  140. grafanaUser, err := a.GetGrafanaUserFor(query.ReqContext, ldapUser)
  141. if err != nil {
  142. return err
  143. }
  144. query.User = grafanaUser
  145. return nil
  146. }
  147. func (a *ldapAuther) GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error) {
  148. extUser := &m.ExternalUserInfo{
  149. AuthModule: "ldap",
  150. AuthId: ldapUser.DN,
  151. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  152. Login: ldapUser.Username,
  153. Email: ldapUser.Email,
  154. Groups: ldapUser.MemberOf,
  155. OrgRoles: map[int64]m.RoleType{},
  156. }
  157. for _, group := range a.server.LdapGroups {
  158. // only use the first match for each org
  159. if extUser.OrgRoles[group.OrgId] != "" {
  160. continue
  161. }
  162. if ldapUser.isMemberOf(group.GroupDN) {
  163. extUser.OrgRoles[group.OrgId] = group.OrgRole
  164. if extUser.IsGrafanaAdmin == nil || !*extUser.IsGrafanaAdmin {
  165. extUser.IsGrafanaAdmin = group.IsGrafanaAdmin
  166. }
  167. }
  168. }
  169. // validate that the user has access
  170. // if there are no ldap group mappings access is true
  171. // otherwise a single group must match
  172. if len(a.server.LdapGroups) > 0 && len(extUser.OrgRoles) < 1 {
  173. a.log.Info(
  174. "Ldap Auth: user does not belong in any of the specified ldap groups",
  175. "username", ldapUser.Username,
  176. "groups", ldapUser.MemberOf)
  177. return nil, ErrInvalidCredentials
  178. }
  179. // add/update user in grafana
  180. upsertUserCmd := &m.UpsertUserCommand{
  181. ReqContext: ctx,
  182. ExternalUser: extUser,
  183. SignupAllowed: setting.LdapAllowSignup,
  184. }
  185. err := bus.Dispatch(upsertUserCmd)
  186. if err != nil {
  187. return nil, err
  188. }
  189. return upsertUserCmd.Result, nil
  190. }
  191. func (a *ldapAuther) serverBind() error {
  192. bindFn := func() error {
  193. return a.conn.Bind(a.server.BindDN, a.server.BindPassword)
  194. }
  195. if a.server.BindPassword == "" {
  196. bindFn = func() error {
  197. return a.conn.UnauthenticatedBind(a.server.BindDN)
  198. }
  199. }
  200. // bind_dn and bind_password to bind
  201. if err := bindFn(); err != nil {
  202. a.log.Info("LDAP initial bind failed, %v", err)
  203. if ldapErr, ok := err.(*ldap.Error); ok {
  204. if ldapErr.ResultCode == 49 {
  205. return ErrInvalidCredentials
  206. }
  207. }
  208. return err
  209. }
  210. return nil
  211. }
  212. func (a *ldapAuther) secondBind(ldapUser *LdapUserInfo, userPassword string) error {
  213. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  214. a.log.Info("Second bind failed", "error", err)
  215. if ldapErr, ok := err.(*ldap.Error); ok {
  216. if ldapErr.ResultCode == 49 {
  217. return ErrInvalidCredentials
  218. }
  219. }
  220. return err
  221. }
  222. return nil
  223. }
  224. func (a *ldapAuther) initialBind(username, userPassword string) error {
  225. if a.server.BindPassword != "" || a.server.BindDN == "" {
  226. userPassword = a.server.BindPassword
  227. a.requireSecondBind = true
  228. }
  229. bindPath := a.server.BindDN
  230. if strings.Contains(bindPath, "%s") {
  231. bindPath = fmt.Sprintf(a.server.BindDN, username)
  232. }
  233. bindFn := func() error {
  234. return a.conn.Bind(bindPath, userPassword)
  235. }
  236. if userPassword == "" {
  237. bindFn = func() error {
  238. return a.conn.UnauthenticatedBind(bindPath)
  239. }
  240. }
  241. if err := bindFn(); err != nil {
  242. a.log.Info("Initial bind failed", "error", err)
  243. if ldapErr, ok := err.(*ldap.Error); ok {
  244. if ldapErr.ResultCode == 49 {
  245. return ErrInvalidCredentials
  246. }
  247. }
  248. return err
  249. }
  250. return nil
  251. }
  252. func appendIfNotEmpty(slice []string, values ...string) []string {
  253. for _, v := range values {
  254. if v != "" {
  255. slice = append(slice, v)
  256. }
  257. }
  258. return slice
  259. }
  260. func (a *ldapAuther) searchForUser(username string) (*LdapUserInfo, error) {
  261. var searchResult *ldap.SearchResult
  262. var err error
  263. for _, searchBase := range a.server.SearchBaseDNs {
  264. attributes := make([]string, 0)
  265. inputs := a.server.Attr
  266. attributes = appendIfNotEmpty(attributes,
  267. inputs.Username,
  268. inputs.Surname,
  269. inputs.Email,
  270. inputs.Name,
  271. inputs.MemberOf)
  272. searchReq := ldap.SearchRequest{
  273. BaseDN: searchBase,
  274. Scope: ldap.ScopeWholeSubtree,
  275. DerefAliases: ldap.NeverDerefAliases,
  276. Attributes: attributes,
  277. Filter: strings.Replace(a.server.SearchFilter, "%s", ldap.EscapeFilter(username), -1),
  278. }
  279. a.log.Debug("Ldap Search For User Request", "info", spew.Sdump(searchReq))
  280. searchResult, err = a.conn.Search(&searchReq)
  281. if err != nil {
  282. return nil, err
  283. }
  284. if len(searchResult.Entries) > 0 {
  285. break
  286. }
  287. }
  288. if len(searchResult.Entries) == 0 {
  289. return nil, ErrInvalidCredentials
  290. }
  291. if len(searchResult.Entries) > 1 {
  292. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  293. }
  294. var memberOf []string
  295. if a.server.GroupSearchFilter == "" {
  296. memberOf = getLdapAttrArray(a.server.Attr.MemberOf, searchResult)
  297. } else {
  298. // If we are using a POSIX LDAP schema it won't support memberOf, so we manually search the groups
  299. var groupSearchResult *ldap.SearchResult
  300. for _, groupSearchBase := range a.server.GroupSearchBaseDNs {
  301. var filter_replace string
  302. if a.server.GroupSearchFilterUserAttribute == "" {
  303. filter_replace = getLdapAttr(a.server.Attr.Username, searchResult)
  304. } else {
  305. filter_replace = getLdapAttr(a.server.GroupSearchFilterUserAttribute, searchResult)
  306. }
  307. filter := strings.Replace(a.server.GroupSearchFilter, "%s", ldap.EscapeFilter(filter_replace), -1)
  308. a.log.Info("Searching for user's groups", "filter", filter)
  309. // support old way of reading settings
  310. groupIdAttribute := a.server.Attr.MemberOf
  311. // but prefer dn attribute if default settings are used
  312. if groupIdAttribute == "" || groupIdAttribute == "memberOf" {
  313. groupIdAttribute = "dn"
  314. }
  315. groupSearchReq := ldap.SearchRequest{
  316. BaseDN: groupSearchBase,
  317. Scope: ldap.ScopeWholeSubtree,
  318. DerefAliases: ldap.NeverDerefAliases,
  319. Attributes: []string{groupIdAttribute},
  320. Filter: filter,
  321. }
  322. groupSearchResult, err = a.conn.Search(&groupSearchReq)
  323. if err != nil {
  324. return nil, err
  325. }
  326. if len(groupSearchResult.Entries) > 0 {
  327. for i := range groupSearchResult.Entries {
  328. memberOf = append(memberOf, getLdapAttrN(groupIdAttribute, groupSearchResult, i))
  329. }
  330. break
  331. }
  332. }
  333. }
  334. return &LdapUserInfo{
  335. DN: searchResult.Entries[0].DN,
  336. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  337. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  338. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  339. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  340. MemberOf: memberOf,
  341. }, nil
  342. }
  343. func getLdapAttrN(name string, result *ldap.SearchResult, n int) string {
  344. if strings.ToLower(name) == "dn" {
  345. return result.Entries[n].DN
  346. }
  347. for _, attr := range result.Entries[n].Attributes {
  348. if attr.Name == name {
  349. if len(attr.Values) > 0 {
  350. return attr.Values[0]
  351. }
  352. }
  353. }
  354. return ""
  355. }
  356. func getLdapAttr(name string, result *ldap.SearchResult) string {
  357. return getLdapAttrN(name, result, 0)
  358. }
  359. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  360. for _, attr := range result.Entries[0].Attributes {
  361. if attr.Name == name {
  362. return attr.Values
  363. }
  364. }
  365. return []string{}
  366. }