ldap.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442
  1. package ldap
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "gopkg.in/ldap.v3"
  10. "github.com/davecgh/go-spew/spew"
  11. "github.com/grafana/grafana/pkg/bus"
  12. "github.com/grafana/grafana/pkg/infra/log"
  13. "github.com/grafana/grafana/pkg/models"
  14. )
  15. // IConnection is interface for LDAP connection manipulation
  16. type IConnection interface {
  17. Bind(username, password string) error
  18. UnauthenticatedBind(username string) error
  19. Add(*ldap.AddRequest) error
  20. Del(*ldap.DelRequest) error
  21. Search(*ldap.SearchRequest) (*ldap.SearchResult, error)
  22. StartTLS(*tls.Config) error
  23. Close()
  24. }
  25. // IServer is interface for LDAP authorization
  26. type IServer interface {
  27. Login(*models.LoginUserQuery) (*models.ExternalUserInfo, error)
  28. Users([]string) ([]*models.ExternalUserInfo, error)
  29. Auth(string, string) error
  30. Dial() error
  31. Close()
  32. }
  33. // Server is basic struct of LDAP authorization
  34. type Server struct {
  35. Config *ServerConfig
  36. Connection IConnection
  37. log log.Logger
  38. }
  39. var (
  40. // ErrInvalidCredentials is returned if username and password do not match
  41. ErrInvalidCredentials = errors.New("Invalid Username or Password")
  42. )
  43. // New creates the new LDAP auth
  44. func New(config *ServerConfig) IServer {
  45. return &Server{
  46. Config: config,
  47. log: log.New("ldap"),
  48. }
  49. }
  50. // Dial dials in the LDAP
  51. func (server *Server) Dial() error {
  52. var err error
  53. var certPool *x509.CertPool
  54. if server.Config.RootCACert != "" {
  55. certPool = x509.NewCertPool()
  56. for _, caCertFile := range strings.Split(server.Config.RootCACert, " ") {
  57. pem, err := ioutil.ReadFile(caCertFile)
  58. if err != nil {
  59. return err
  60. }
  61. if !certPool.AppendCertsFromPEM(pem) {
  62. return errors.New("Failed to append CA certificate " + caCertFile)
  63. }
  64. }
  65. }
  66. var clientCert tls.Certificate
  67. if server.Config.ClientCert != "" && server.Config.ClientKey != "" {
  68. clientCert, err = tls.LoadX509KeyPair(server.Config.ClientCert, server.Config.ClientKey)
  69. if err != nil {
  70. return err
  71. }
  72. }
  73. for _, host := range strings.Split(server.Config.Host, " ") {
  74. address := fmt.Sprintf("%s:%d", host, server.Config.Port)
  75. if server.Config.UseSSL {
  76. tlsCfg := &tls.Config{
  77. InsecureSkipVerify: server.Config.SkipVerifySSL,
  78. ServerName: host,
  79. RootCAs: certPool,
  80. }
  81. if len(clientCert.Certificate) > 0 {
  82. tlsCfg.Certificates = append(tlsCfg.Certificates, clientCert)
  83. }
  84. if server.Config.StartTLS {
  85. server.Connection, err = ldap.Dial("tcp", address)
  86. if err == nil {
  87. if err = server.Connection.StartTLS(tlsCfg); err == nil {
  88. return nil
  89. }
  90. }
  91. } else {
  92. server.Connection, err = ldap.DialTLS("tcp", address, tlsCfg)
  93. }
  94. } else {
  95. server.Connection, err = ldap.Dial("tcp", address)
  96. }
  97. if err == nil {
  98. return nil
  99. }
  100. }
  101. return err
  102. }
  103. // Close closes the LDAP connection
  104. func (server *Server) Close() {
  105. server.Connection.Close()
  106. }
  107. // Login user by searching and serializing it
  108. func (server *Server) Login(query *models.LoginUserQuery) (
  109. *models.ExternalUserInfo, error,
  110. ) {
  111. // Authentication
  112. err := server.Auth(query.Username, query.Password)
  113. if err != nil {
  114. return nil, err
  115. }
  116. // Find user entry & attributes
  117. users, err := server.Users([]string{query.Username})
  118. if err != nil {
  119. return nil, err
  120. }
  121. // If we couldn't find the user -
  122. // we should show incorrect credentials err
  123. if len(users) == 0 {
  124. server.disableExternalUser(query.Username)
  125. return nil, ErrInvalidCredentials
  126. }
  127. user := users[0]
  128. if err := server.validateGrafanaUser(user); err != nil {
  129. return nil, err
  130. }
  131. return user, nil
  132. }
  133. // Users gets LDAP users
  134. func (server *Server) Users(logins []string) (
  135. []*models.ExternalUserInfo,
  136. error,
  137. ) {
  138. var result *ldap.SearchResult
  139. var Config = server.Config
  140. var err error
  141. for _, base := range Config.SearchBaseDNs {
  142. result, err = server.Connection.Search(
  143. server.getSearchRequest(base, logins),
  144. )
  145. if err != nil {
  146. return nil, err
  147. }
  148. if len(result.Entries) > 0 {
  149. break
  150. }
  151. }
  152. if len(result.Entries) == 0 {
  153. return []*models.ExternalUserInfo{}, nil
  154. }
  155. serializedUsers, err := server.serializeUsers(result)
  156. if err != nil {
  157. return nil, err
  158. }
  159. server.log.Debug("LDAP users found", "users", spew.Sdump(serializedUsers))
  160. return serializedUsers, nil
  161. }
  162. // validateGrafanaUser validates user access.
  163. // If there are no ldap group mappings access is true
  164. // otherwise a single group must match
  165. func (server *Server) validateGrafanaUser(user *models.ExternalUserInfo) error {
  166. if len(server.Config.Groups) > 0 && len(user.OrgRoles) < 1 {
  167. server.log.Error(
  168. "user does not belong in any of the specified LDAP groups",
  169. "username", user.Login,
  170. "groups", user.Groups,
  171. )
  172. return ErrInvalidCredentials
  173. }
  174. return nil
  175. }
  176. // disableExternalUser marks external user as disabled in Grafana db
  177. func (server *Server) disableExternalUser(username string) error {
  178. // Check if external user exist in Grafana
  179. userQuery := &models.GetExternalUserInfoByLoginQuery{
  180. LoginOrEmail: username,
  181. }
  182. if err := bus.Dispatch(userQuery); err != nil {
  183. return err
  184. }
  185. userInfo := userQuery.Result
  186. if !userInfo.IsDisabled {
  187. server.log.Debug("Disabling external user", "user", userQuery.Result.Login)
  188. // Mark user as disabled in grafana db
  189. disableUserCmd := &models.DisableUserCommand{
  190. UserId: userQuery.Result.UserId,
  191. IsDisabled: true,
  192. }
  193. if err := bus.Dispatch(disableUserCmd); err != nil {
  194. server.log.Debug("Error disabling external user", "user", userQuery.Result.Login, "message", err.Error())
  195. return err
  196. }
  197. }
  198. return nil
  199. }
  200. // getSearchRequest returns LDAP search request for users
  201. func (server *Server) getSearchRequest(
  202. base string,
  203. logins []string,
  204. ) *ldap.SearchRequest {
  205. attributes := []string{}
  206. inputs := server.Config.Attr
  207. attributes = appendIfNotEmpty(
  208. attributes,
  209. inputs.Username,
  210. inputs.Surname,
  211. inputs.Email,
  212. inputs.Name,
  213. inputs.MemberOf,
  214. )
  215. search := ""
  216. for _, login := range logins {
  217. query := strings.Replace(
  218. server.Config.SearchFilter,
  219. "%s", ldap.EscapeFilter(login),
  220. -1,
  221. )
  222. search = search + query
  223. }
  224. filter := fmt.Sprintf("(|%s)", search)
  225. return &ldap.SearchRequest{
  226. BaseDN: base,
  227. Scope: ldap.ScopeWholeSubtree,
  228. SizeLimit: 1000,
  229. DerefAliases: ldap.NeverDerefAliases,
  230. Attributes: attributes,
  231. Filter: filter,
  232. }
  233. }
  234. // buildGrafanaUser extracts info from UserInfo model to ExternalUserInfo
  235. func (server *Server) buildGrafanaUser(user *ldap.Entry) (*models.ExternalUserInfo, error) {
  236. memberOf, err := server.getMemberOf(user)
  237. if err != nil {
  238. return nil, err
  239. }
  240. attrs := server.Config.Attr
  241. extUser := &models.ExternalUserInfo{
  242. AuthModule: models.AuthModuleLDAP,
  243. AuthId: user.DN,
  244. Name: strings.TrimSpace(
  245. fmt.Sprintf(
  246. "%s %s",
  247. getAttribute(attrs.Name, user),
  248. getAttribute(attrs.Surname, user),
  249. ),
  250. ),
  251. Login: getAttribute(attrs.Username, user),
  252. Email: getAttribute(attrs.Email, user),
  253. Groups: memberOf,
  254. OrgRoles: map[int64]models.RoleType{},
  255. }
  256. for _, group := range server.Config.Groups {
  257. // only use the first match for each org
  258. if extUser.OrgRoles[group.OrgID] != "" {
  259. continue
  260. }
  261. if isMemberOf(memberOf, group.GroupDN) {
  262. extUser.OrgRoles[group.OrgID] = group.OrgRole
  263. if extUser.IsGrafanaAdmin == nil || !*extUser.IsGrafanaAdmin {
  264. extUser.IsGrafanaAdmin = group.IsGrafanaAdmin
  265. }
  266. }
  267. }
  268. return extUser, nil
  269. }
  270. // shouldBindAdmin checks if we should use
  271. // admin username & password for LDAP bind
  272. func (server *Server) shouldBindAdmin() bool {
  273. return server.Config.BindPassword != ""
  274. }
  275. // Auth authentificates user in LDAP.
  276. // It might not use passed password and username,
  277. // since they can be overwritten with admin config values -
  278. // see "bind_dn" and "bind_password" options in LDAP config
  279. func (server *Server) Auth(username, password string) error {
  280. path := server.Config.BindDN
  281. if server.shouldBindAdmin() {
  282. password = server.Config.BindPassword
  283. } else {
  284. path = fmt.Sprintf(path, username)
  285. }
  286. bindFn := func() error {
  287. return server.Connection.Bind(path, password)
  288. }
  289. if err := bindFn(); err != nil {
  290. server.log.Error("Cannot authentificate in LDAP", "err", err)
  291. if ldapErr, ok := err.(*ldap.Error); ok {
  292. if ldapErr.ResultCode == 49 {
  293. return ErrInvalidCredentials
  294. }
  295. }
  296. return err
  297. }
  298. return nil
  299. }
  300. // requestMemberOf use this function when POSIX LDAP schema does not support memberOf, so it manually search the groups
  301. func (server *Server) requestMemberOf(entry *ldap.Entry) ([]string, error) {
  302. var memberOf []string
  303. var config = server.Config
  304. for _, groupSearchBase := range config.GroupSearchBaseDNs {
  305. var filterReplace string
  306. if config.GroupSearchFilterUserAttribute == "" {
  307. filterReplace = getAttribute(config.Attr.Username, entry)
  308. } else {
  309. filterReplace = getAttribute(
  310. config.GroupSearchFilterUserAttribute,
  311. entry,
  312. )
  313. }
  314. filter := strings.Replace(
  315. config.GroupSearchFilter, "%s",
  316. ldap.EscapeFilter(filterReplace),
  317. -1,
  318. )
  319. server.log.Info("Searching for user's groups", "filter", filter)
  320. // support old way of reading settings
  321. groupIDAttribute := config.Attr.MemberOf
  322. // but prefer dn attribute if default settings are used
  323. if groupIDAttribute == "" || groupIDAttribute == "memberOf" {
  324. groupIDAttribute = "dn"
  325. }
  326. groupSearchReq := ldap.SearchRequest{
  327. BaseDN: groupSearchBase,
  328. Scope: ldap.ScopeWholeSubtree,
  329. DerefAliases: ldap.NeverDerefAliases,
  330. Attributes: []string{groupIDAttribute},
  331. Filter: filter,
  332. }
  333. groupSearchResult, err := server.Connection.Search(&groupSearchReq)
  334. if err != nil {
  335. return nil, err
  336. }
  337. if len(groupSearchResult.Entries) > 0 {
  338. for _, group := range groupSearchResult.Entries {
  339. memberOf = append(
  340. memberOf,
  341. getAttribute(groupIDAttribute, group),
  342. )
  343. }
  344. break
  345. }
  346. }
  347. return memberOf, nil
  348. }
  349. // serializeUsers serializes the users
  350. // from LDAP result to ExternalInfo struct
  351. func (server *Server) serializeUsers(
  352. users *ldap.SearchResult,
  353. ) ([]*models.ExternalUserInfo, error) {
  354. var serialized []*models.ExternalUserInfo
  355. for _, user := range users.Entries {
  356. extUser, err := server.buildGrafanaUser(user)
  357. if err != nil {
  358. return nil, err
  359. }
  360. serialized = append(serialized, extUser)
  361. }
  362. return serialized, nil
  363. }
  364. // getMemberOf finds memberOf property or request it
  365. func (server *Server) getMemberOf(result *ldap.Entry) (
  366. []string, error,
  367. ) {
  368. if server.Config.GroupSearchFilter == "" {
  369. memberOf := getArrayAttribute(server.Config.Attr.MemberOf, result)
  370. return memberOf, nil
  371. }
  372. memberOf, err := server.requestMemberOf(result)
  373. if err != nil {
  374. return nil, err
  375. }
  376. return memberOf, nil
  377. }