ldap.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. package login
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "github.com/davecgh/go-spew/spew"
  10. "github.com/go-ldap/ldap"
  11. "github.com/grafana/grafana/pkg/bus"
  12. "github.com/grafana/grafana/pkg/log"
  13. m "github.com/grafana/grafana/pkg/models"
  14. "github.com/grafana/grafana/pkg/setting"
  15. )
  16. type ILdapConn interface {
  17. Bind(username, password string) error
  18. Search(*ldap.SearchRequest) (*ldap.SearchResult, error)
  19. StartTLS(*tls.Config) error
  20. Close()
  21. }
  22. type ILdapAuther interface {
  23. Login(query *m.LoginUserQuery) error
  24. SyncUser(query *m.LoginUserQuery) error
  25. GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error)
  26. }
  27. type ldapAuther struct {
  28. server *LdapServerConf
  29. conn ILdapConn
  30. requireSecondBind bool
  31. log log.Logger
  32. }
  33. var NewLdapAuthenticator = func(server *LdapServerConf) ILdapAuther {
  34. return &ldapAuther{server: server, log: log.New("ldap")}
  35. }
  36. var ldapDial = func(network, addr string) (ILdapConn, error) {
  37. return ldap.Dial(network, addr)
  38. }
  39. func (a *ldapAuther) Dial() error {
  40. var err error
  41. var certPool *x509.CertPool
  42. if a.server.RootCACert != "" {
  43. certPool = x509.NewCertPool()
  44. for _, caCertFile := range strings.Split(a.server.RootCACert, " ") {
  45. pem, err := ioutil.ReadFile(caCertFile)
  46. if err != nil {
  47. return err
  48. }
  49. if !certPool.AppendCertsFromPEM(pem) {
  50. return errors.New("Failed to append CA certificate " + caCertFile)
  51. }
  52. }
  53. }
  54. var clientCert tls.Certificate
  55. if a.server.ClientCert != "" && a.server.ClientKey != "" {
  56. clientCert, err = tls.LoadX509KeyPair(a.server.ClientCert, a.server.ClientKey)
  57. if err != nil {
  58. return err
  59. }
  60. }
  61. for _, host := range strings.Split(a.server.Host, " ") {
  62. address := fmt.Sprintf("%s:%d", host, a.server.Port)
  63. if a.server.UseSSL {
  64. tlsCfg := &tls.Config{
  65. InsecureSkipVerify: a.server.SkipVerifySSL,
  66. ServerName: host,
  67. RootCAs: certPool,
  68. }
  69. if len(clientCert.Certificate) > 0 {
  70. tlsCfg.Certificates = append(tlsCfg.Certificates, clientCert)
  71. }
  72. if a.server.StartTLS {
  73. a.conn, err = ldap.Dial("tcp", address)
  74. if err == nil {
  75. if err = a.conn.StartTLS(tlsCfg); err == nil {
  76. return nil
  77. }
  78. }
  79. } else {
  80. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  81. }
  82. } else {
  83. a.conn, err = ldapDial("tcp", address)
  84. }
  85. if err == nil {
  86. return nil
  87. }
  88. }
  89. return err
  90. }
  91. func (a *ldapAuther) Login(query *m.LoginUserQuery) error {
  92. // connect to ldap server
  93. if err := a.Dial(); err != nil {
  94. return err
  95. }
  96. defer a.conn.Close()
  97. // perform initial authentication
  98. if err := a.initialBind(query.Username, query.Password); err != nil {
  99. return err
  100. }
  101. // find user entry & attributes
  102. ldapUser, err := a.searchForUser(query.Username)
  103. if err != nil {
  104. return err
  105. }
  106. a.log.Debug("Ldap User found", "info", spew.Sdump(ldapUser))
  107. // check if a second user bind is needed
  108. if a.requireSecondBind {
  109. err = a.secondBind(ldapUser, query.Password)
  110. if err != nil {
  111. return err
  112. }
  113. }
  114. grafanaUser, err := a.GetGrafanaUserFor(query.ReqContext, ldapUser)
  115. if err != nil {
  116. return err
  117. }
  118. query.User = grafanaUser
  119. return nil
  120. }
  121. func (a *ldapAuther) SyncUser(query *m.LoginUserQuery) error {
  122. // connect to ldap server
  123. err := a.Dial()
  124. if err != nil {
  125. return err
  126. }
  127. defer a.conn.Close()
  128. err = a.serverBind()
  129. if err != nil {
  130. return err
  131. }
  132. // find user entry & attributes
  133. ldapUser, err := a.searchForUser(query.Username)
  134. if err != nil {
  135. a.log.Error("Failed searching for user in ldap", "error", err)
  136. return err
  137. }
  138. a.log.Debug("Ldap User found", "info", spew.Sdump(ldapUser))
  139. grafanaUser, err := a.GetGrafanaUserFor(query.ReqContext, ldapUser)
  140. if err != nil {
  141. return err
  142. }
  143. query.User = grafanaUser
  144. return nil
  145. }
  146. func (a *ldapAuther) GetGrafanaUserFor(ctx *m.ReqContext, ldapUser *LdapUserInfo) (*m.User, error) {
  147. extUser := &m.ExternalUserInfo{
  148. AuthModule: "ldap",
  149. AuthId: ldapUser.DN,
  150. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  151. Login: ldapUser.Username,
  152. Email: ldapUser.Email,
  153. Groups: ldapUser.MemberOf,
  154. OrgRoles: map[int64]m.RoleType{},
  155. }
  156. for _, group := range a.server.LdapGroups {
  157. // only use the first match for each org
  158. if extUser.OrgRoles[group.OrgId] != "" {
  159. continue
  160. }
  161. if ldapUser.isMemberOf(group.GroupDN) {
  162. extUser.OrgRoles[group.OrgId] = group.OrgRole
  163. if extUser.IsGrafanaAdmin == nil || !*extUser.IsGrafanaAdmin {
  164. extUser.IsGrafanaAdmin = group.IsGrafanaAdmin
  165. }
  166. }
  167. }
  168. // validate that the user has access
  169. // if there are no ldap group mappings access is true
  170. // otherwise a single group must match
  171. if len(a.server.LdapGroups) > 0 && len(extUser.OrgRoles) < 1 {
  172. a.log.Info(
  173. "Ldap Auth: user does not belong in any of the specified ldap groups",
  174. "username", ldapUser.Username,
  175. "groups", ldapUser.MemberOf)
  176. return nil, ErrInvalidCredentials
  177. }
  178. // add/update user in grafana
  179. upsertUserCmd := &m.UpsertUserCommand{
  180. ReqContext: ctx,
  181. ExternalUser: extUser,
  182. SignupAllowed: setting.LdapAllowSignup,
  183. }
  184. err := bus.Dispatch(upsertUserCmd)
  185. if err != nil {
  186. return nil, err
  187. }
  188. return upsertUserCmd.Result, nil
  189. }
  190. func (a *ldapAuther) serverBind() error {
  191. // bind_dn and bind_password to bind
  192. if err := a.conn.Bind(a.server.BindDN, a.server.BindPassword); err != nil {
  193. a.log.Info("LDAP initial bind failed, %v", err)
  194. if ldapErr, ok := err.(*ldap.Error); ok {
  195. if ldapErr.ResultCode == 49 {
  196. return ErrInvalidCredentials
  197. }
  198. }
  199. return err
  200. }
  201. return nil
  202. }
  203. func (a *ldapAuther) secondBind(ldapUser *LdapUserInfo, userPassword string) error {
  204. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  205. a.log.Info("Second bind failed", "error", err)
  206. if ldapErr, ok := err.(*ldap.Error); ok {
  207. if ldapErr.ResultCode == 49 {
  208. return ErrInvalidCredentials
  209. }
  210. }
  211. return err
  212. }
  213. return nil
  214. }
  215. func (a *ldapAuther) initialBind(username, userPassword string) error {
  216. if a.server.BindPassword != "" || a.server.BindDN == "" {
  217. userPassword = a.server.BindPassword
  218. a.requireSecondBind = true
  219. }
  220. bindPath := a.server.BindDN
  221. if strings.Contains(bindPath, "%s") {
  222. bindPath = fmt.Sprintf(a.server.BindDN, username)
  223. }
  224. if err := a.conn.Bind(bindPath, userPassword); err != nil {
  225. a.log.Info("Initial bind failed", "error", err)
  226. if ldapErr, ok := err.(*ldap.Error); ok {
  227. if ldapErr.ResultCode == 49 {
  228. return ErrInvalidCredentials
  229. }
  230. }
  231. return err
  232. }
  233. return nil
  234. }
  235. func (a *ldapAuther) searchForUser(username string) (*LdapUserInfo, error) {
  236. var searchResult *ldap.SearchResult
  237. var err error
  238. for _, searchBase := range a.server.SearchBaseDNs {
  239. searchReq := ldap.SearchRequest{
  240. BaseDN: searchBase,
  241. Scope: ldap.ScopeWholeSubtree,
  242. DerefAliases: ldap.NeverDerefAliases,
  243. Attributes: []string{
  244. a.server.Attr.Username,
  245. a.server.Attr.Surname,
  246. a.server.Attr.Email,
  247. a.server.Attr.Name,
  248. a.server.Attr.MemberOf,
  249. },
  250. Filter: strings.Replace(a.server.SearchFilter, "%s", ldap.EscapeFilter(username), -1),
  251. }
  252. searchResult, err = a.conn.Search(&searchReq)
  253. if err != nil {
  254. return nil, err
  255. }
  256. if len(searchResult.Entries) > 0 {
  257. break
  258. }
  259. }
  260. if len(searchResult.Entries) == 0 {
  261. return nil, ErrInvalidCredentials
  262. }
  263. if len(searchResult.Entries) > 1 {
  264. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  265. }
  266. var memberOf []string
  267. if a.server.GroupSearchFilter == "" {
  268. memberOf = getLdapAttrArray(a.server.Attr.MemberOf, searchResult)
  269. } else {
  270. // If we are using a POSIX LDAP schema it won't support memberOf, so we manually search the groups
  271. var groupSearchResult *ldap.SearchResult
  272. for _, groupSearchBase := range a.server.GroupSearchBaseDNs {
  273. var filter_replace string
  274. if a.server.GroupSearchFilterUserAttribute == "" {
  275. filter_replace = getLdapAttr(a.server.Attr.Username, searchResult)
  276. } else {
  277. filter_replace = getLdapAttr(a.server.GroupSearchFilterUserAttribute, searchResult)
  278. }
  279. filter := strings.Replace(a.server.GroupSearchFilter, "%s", ldap.EscapeFilter(filter_replace), -1)
  280. a.log.Info("Searching for user's groups", "filter", filter)
  281. // support old way of reading settings
  282. groupIdAttribute := a.server.Attr.MemberOf
  283. // but prefer dn attribute if default settings are used
  284. if groupIdAttribute == "" || groupIdAttribute == "memberOf" {
  285. groupIdAttribute = "dn"
  286. }
  287. groupSearchReq := ldap.SearchRequest{
  288. BaseDN: groupSearchBase,
  289. Scope: ldap.ScopeWholeSubtree,
  290. DerefAliases: ldap.NeverDerefAliases,
  291. Attributes: []string{groupIdAttribute},
  292. Filter: filter,
  293. }
  294. groupSearchResult, err = a.conn.Search(&groupSearchReq)
  295. if err != nil {
  296. return nil, err
  297. }
  298. if len(groupSearchResult.Entries) > 0 {
  299. for i := range groupSearchResult.Entries {
  300. memberOf = append(memberOf, getLdapAttrN(groupIdAttribute, groupSearchResult, i))
  301. }
  302. break
  303. }
  304. }
  305. }
  306. return &LdapUserInfo{
  307. DN: searchResult.Entries[0].DN,
  308. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  309. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  310. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  311. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  312. MemberOf: memberOf,
  313. }, nil
  314. }
  315. func getLdapAttrN(name string, result *ldap.SearchResult, n int) string {
  316. if strings.ToLower(name) == "dn" {
  317. return result.Entries[n].DN
  318. }
  319. for _, attr := range result.Entries[n].Attributes {
  320. if attr.Name == name {
  321. if len(attr.Values) > 0 {
  322. return attr.Values[0]
  323. }
  324. }
  325. }
  326. return ""
  327. }
  328. func getLdapAttr(name string, result *ldap.SearchResult) string {
  329. return getLdapAttrN(name, result, 0)
  330. }
  331. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  332. for _, attr := range result.Entries[0].Attributes {
  333. if attr.Name == name {
  334. return attr.Values
  335. }
  336. }
  337. return []string{}
  338. }