ldap.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371
  1. package login
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "github.com/davecgh/go-spew/spew"
  10. "github.com/go-ldap/ldap"
  11. "github.com/grafana/grafana/pkg/log"
  12. m "github.com/grafana/grafana/pkg/models"
  13. "github.com/grafana/grafana/pkg/setting"
  14. )
  15. type ILdapConn interface {
  16. Bind(username, password string) error
  17. Search(*ldap.SearchRequest) (*ldap.SearchResult, error)
  18. StartTLS(*tls.Config) error
  19. Close()
  20. }
  21. type ILdapAuther interface {
  22. Login(ctx *m.ReqContext, query *m.LoginUserQuery) error
  23. SyncSignedInUser(ctx *m.ReqContext, signedInUser *m.SignedInUser) error
  24. GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error)
  25. }
  26. type ldapAuther struct {
  27. server *LdapServerConf
  28. conn ILdapConn
  29. requireSecondBind bool
  30. log log.Logger
  31. }
  32. var NewLdapAuthenticator = func(server *LdapServerConf) ILdapAuther {
  33. return &ldapAuther{server: server, log: log.New("ldap")}
  34. }
  35. var ldapDial = func(network, addr string) (ILdapConn, error) {
  36. return ldap.Dial(network, addr)
  37. }
  38. func (a *ldapAuther) Dial() error {
  39. var err error
  40. var certPool *x509.CertPool
  41. if a.server.RootCACert != "" {
  42. certPool = x509.NewCertPool()
  43. for _, caCertFile := range strings.Split(a.server.RootCACert, " ") {
  44. if pem, err := ioutil.ReadFile(caCertFile); err != nil {
  45. return err
  46. } else {
  47. if !certPool.AppendCertsFromPEM(pem) {
  48. return errors.New("Failed to append CA certificate " + caCertFile)
  49. }
  50. }
  51. }
  52. }
  53. for _, host := range strings.Split(a.server.Host, " ") {
  54. address := fmt.Sprintf("%s:%d", host, a.server.Port)
  55. if a.server.UseSSL {
  56. tlsCfg := &tls.Config{
  57. InsecureSkipVerify: a.server.SkipVerifySSL,
  58. ServerName: host,
  59. RootCAs: certPool,
  60. }
  61. if a.server.StartTLS {
  62. a.conn, err = ldap.Dial("tcp", address)
  63. if err == nil {
  64. if err = a.conn.StartTLS(tlsCfg); err == nil {
  65. return nil
  66. }
  67. }
  68. } else {
  69. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  70. }
  71. } else {
  72. a.conn, err = ldapDial("tcp", address)
  73. }
  74. if err == nil {
  75. return nil
  76. }
  77. }
  78. return err
  79. }
  80. func (a *ldapAuther) Login(ctx *m.ReqContext, query *m.LoginUserQuery) error {
  81. // connect to ldap server
  82. err := a.Dial()
  83. if err != nil {
  84. return err
  85. }
  86. defer a.conn.Close()
  87. // perform initial authentication
  88. err = a.initialBind(query.Username, query.Password)
  89. if err != nil {
  90. return err
  91. }
  92. // find user entry & attributes
  93. ldapUser, err := a.searchForUser(query.Username)
  94. if err != nil {
  95. return err
  96. }
  97. a.log.Debug("Ldap User found", "info", spew.Sdump(ldapUser))
  98. // check if a second user bind is needed
  99. if a.requireSecondBind {
  100. err = a.secondBind(ldapUser, query.Password)
  101. if err != nil {
  102. return err
  103. }
  104. }
  105. grafanaUser, err := a.GetGrafanaUserFor(ctx, ldapUser)
  106. if err != nil {
  107. return err
  108. }
  109. query.User = grafanaUser
  110. return nil
  111. }
  112. func (a *ldapAuther) SyncSignedInUser(ctx *m.ReqContext, signedInUser *m.SignedInUser) error {
  113. err := a.Dial()
  114. if err != nil {
  115. return err
  116. }
  117. defer a.conn.Close()
  118. err = a.serverBind()
  119. if err != nil {
  120. return err
  121. }
  122. ldapUser, err := a.searchForUser(signedInUser.Login)
  123. if err != nil {
  124. a.log.Error("Failed searching for user in ldap", "error", err)
  125. return err
  126. }
  127. grafanaUser, err := a.GetGrafanaUserFor(ctx, ldapUser)
  128. if err != nil {
  129. return err
  130. }
  131. signedInUser.Login = grafanaUser.Login
  132. signedInUser.Email = grafanaUser.Email
  133. signedInUser.Name = grafanaUser.Name
  134. return nil
  135. }
  136. func (a *ldapAuther) GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error) {
  137. extUser := m.ExternalUserInfo{
  138. AuthModule: "ldap",
  139. AuthId: ldapUser.DN,
  140. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  141. Login: ldapUser.Username,
  142. Email: ldapUser.Email,
  143. OrgRoles: map[int64]m.RoleType{},
  144. }
  145. for _, group := range a.server.LdapGroups {
  146. // only use the first match for each org
  147. if extUser.OrgRoles[group.OrgId] != "" {
  148. continue
  149. }
  150. if ldapUser.isMemberOf(group.GroupDN) {
  151. extUser.OrgRoles[group.OrgId] = group.OrgRole
  152. }
  153. }
  154. // validate that the user has access
  155. // if there are no ldap group mappings access is true
  156. // otherwise a single group must match
  157. if len(a.server.LdapGroups) > 0 && len(extUser.OrgRoles) < 1 {
  158. a.log.Info(
  159. "Ldap Auth: user does not belong in any of the specified ldap groups",
  160. "username", ldapUser.Username,
  161. "groups", ldapUser.MemberOf)
  162. return nil, ErrInvalidCredentials
  163. }
  164. // add/update user in grafana
  165. userQuery := m.UpsertUserCommand{
  166. ExternalUser: &extUser,
  167. SignupAllowed: setting.LdapAllowSignup,
  168. }
  169. err := UpsertUser(ctx, &userQuery)
  170. if err != nil {
  171. return nil, err
  172. }
  173. return userQuery.User, nil
  174. }
  175. func (a *ldapAuther) serverBind() error {
  176. // bind_dn and bind_password to bind
  177. if err := a.conn.Bind(a.server.BindDN, a.server.BindPassword); err != nil {
  178. a.log.Info("LDAP initial bind failed, %v", err)
  179. if ldapErr, ok := err.(*ldap.Error); ok {
  180. if ldapErr.ResultCode == 49 {
  181. return ErrInvalidCredentials
  182. }
  183. }
  184. return err
  185. }
  186. return nil
  187. }
  188. func (a *ldapAuther) secondBind(ldapUser *LdapUserInfo, userPassword string) error {
  189. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  190. a.log.Info("Second bind failed", "error", err)
  191. if ldapErr, ok := err.(*ldap.Error); ok {
  192. if ldapErr.ResultCode == 49 {
  193. return ErrInvalidCredentials
  194. }
  195. }
  196. return err
  197. }
  198. return nil
  199. }
  200. func (a *ldapAuther) initialBind(username, userPassword string) error {
  201. if a.server.BindPassword != "" || a.server.BindDN == "" {
  202. userPassword = a.server.BindPassword
  203. a.requireSecondBind = true
  204. }
  205. bindPath := a.server.BindDN
  206. if strings.Contains(bindPath, "%s") {
  207. bindPath = fmt.Sprintf(a.server.BindDN, username)
  208. }
  209. if err := a.conn.Bind(bindPath, userPassword); err != nil {
  210. a.log.Info("Initial bind failed", "error", err)
  211. if ldapErr, ok := err.(*ldap.Error); ok {
  212. if ldapErr.ResultCode == 49 {
  213. return ErrInvalidCredentials
  214. }
  215. }
  216. return err
  217. }
  218. return nil
  219. }
  220. func (a *ldapAuther) searchForUser(username string) (*LdapUserInfo, error) {
  221. var searchResult *ldap.SearchResult
  222. var err error
  223. for _, searchBase := range a.server.SearchBaseDNs {
  224. searchReq := ldap.SearchRequest{
  225. BaseDN: searchBase,
  226. Scope: ldap.ScopeWholeSubtree,
  227. DerefAliases: ldap.NeverDerefAliases,
  228. Attributes: []string{
  229. a.server.Attr.Username,
  230. a.server.Attr.Surname,
  231. a.server.Attr.Email,
  232. a.server.Attr.Name,
  233. a.server.Attr.MemberOf,
  234. },
  235. Filter: strings.Replace(a.server.SearchFilter, "%s", ldap.EscapeFilter(username), -1),
  236. }
  237. searchResult, err = a.conn.Search(&searchReq)
  238. if err != nil {
  239. return nil, err
  240. }
  241. if len(searchResult.Entries) > 0 {
  242. break
  243. }
  244. }
  245. if len(searchResult.Entries) == 0 {
  246. return nil, ErrInvalidCredentials
  247. }
  248. if len(searchResult.Entries) > 1 {
  249. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  250. }
  251. var memberOf []string
  252. if a.server.GroupSearchFilter == "" {
  253. memberOf = getLdapAttrArray(a.server.Attr.MemberOf, searchResult)
  254. } else {
  255. // If we are using a POSIX LDAP schema it won't support memberOf, so we manually search the groups
  256. var groupSearchResult *ldap.SearchResult
  257. for _, groupSearchBase := range a.server.GroupSearchBaseDNs {
  258. var filter_replace string
  259. filter_replace = getLdapAttr(a.server.GroupSearchFilterUserAttribute, searchResult)
  260. if a.server.GroupSearchFilterUserAttribute == "" {
  261. filter_replace = getLdapAttr(a.server.Attr.Username, searchResult)
  262. }
  263. filter := strings.Replace(a.server.GroupSearchFilter, "%s", ldap.EscapeFilter(filter_replace), -1)
  264. a.log.Info("Searching for user's groups", "filter", filter)
  265. groupSearchReq := ldap.SearchRequest{
  266. BaseDN: groupSearchBase,
  267. Scope: ldap.ScopeWholeSubtree,
  268. DerefAliases: ldap.NeverDerefAliases,
  269. Attributes: []string{
  270. // Here MemberOf would be the thing that identifies the group, which is normally 'cn'
  271. a.server.Attr.MemberOf,
  272. },
  273. Filter: filter,
  274. }
  275. groupSearchResult, err = a.conn.Search(&groupSearchReq)
  276. if err != nil {
  277. return nil, err
  278. }
  279. if len(groupSearchResult.Entries) > 0 {
  280. for i := range groupSearchResult.Entries {
  281. memberOf = append(memberOf, getLdapAttrN(a.server.Attr.MemberOf, groupSearchResult, i))
  282. }
  283. break
  284. }
  285. }
  286. }
  287. return &LdapUserInfo{
  288. DN: searchResult.Entries[0].DN,
  289. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  290. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  291. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  292. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  293. MemberOf: memberOf,
  294. }, nil
  295. }
  296. func getLdapAttrN(name string, result *ldap.SearchResult, n int) string {
  297. for _, attr := range result.Entries[n].Attributes {
  298. if attr.Name == name {
  299. if len(attr.Values) > 0 {
  300. return attr.Values[0]
  301. }
  302. }
  303. }
  304. return ""
  305. }
  306. func getLdapAttr(name string, result *ldap.SearchResult) string {
  307. return getLdapAttrN(name, result, 0)
  308. }
  309. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  310. for _, attr := range result.Entries[0].Attributes {
  311. if attr.Name == name {
  312. return attr.Values
  313. }
  314. }
  315. return []string{}
  316. }