ldap.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407
  1. package login
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "strings"
  9. "github.com/davecgh/go-spew/spew"
  10. "github.com/go-ldap/ldap"
  11. "github.com/grafana/grafana/pkg/bus"
  12. "github.com/grafana/grafana/pkg/log"
  13. m "github.com/grafana/grafana/pkg/models"
  14. "github.com/grafana/grafana/pkg/setting"
  15. )
  16. type ldapAuther struct {
  17. server *LdapServerConf
  18. conn *ldap.Conn
  19. requireSecondBind bool
  20. }
  21. func NewLdapAuthenticator(server *LdapServerConf) *ldapAuther {
  22. return &ldapAuther{server: server}
  23. }
  24. func (a *ldapAuther) Dial() error {
  25. var err error
  26. var certPool *x509.CertPool
  27. if a.server.RootCACert != "" {
  28. certPool = x509.NewCertPool()
  29. for _, caCertFile := range strings.Split(a.server.RootCACert, " ") {
  30. if pem, err := ioutil.ReadFile(caCertFile); err != nil {
  31. return err
  32. } else {
  33. if !certPool.AppendCertsFromPEM(pem) {
  34. return errors.New("Failed to append CA certificate " + caCertFile)
  35. }
  36. }
  37. }
  38. }
  39. for _, host := range strings.Split(a.server.Host, " ") {
  40. address := fmt.Sprintf("%s:%d", host, a.server.Port)
  41. if a.server.UseSSL {
  42. tlsCfg := &tls.Config{
  43. InsecureSkipVerify: a.server.SkipVerifySSL,
  44. ServerName: host,
  45. RootCAs: certPool,
  46. }
  47. if a.server.StartTLS {
  48. a.conn, err = ldap.Dial("tcp", address)
  49. if err == nil {
  50. if err = a.conn.StartTLS(tlsCfg); err == nil {
  51. return nil
  52. }
  53. }
  54. } else {
  55. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  56. }
  57. } else {
  58. a.conn, err = ldap.Dial("tcp", address)
  59. }
  60. if err == nil {
  61. return nil
  62. }
  63. }
  64. return err
  65. }
  66. func (a *ldapAuther) login(query *LoginUserQuery) error {
  67. if err := a.Dial(); err != nil {
  68. return err
  69. }
  70. defer a.conn.Close()
  71. // perform initial authentication
  72. if err := a.initialBind(query.Username, query.Password); err != nil {
  73. return err
  74. }
  75. // find user entry & attributes
  76. if ldapUser, err := a.searchForUser(query.Username); err != nil {
  77. return err
  78. } else {
  79. if ldapCfg.VerboseLogging {
  80. log.Info("Ldap User Info: %s", spew.Sdump(ldapUser))
  81. }
  82. // check if a second user bind is needed
  83. if a.requireSecondBind {
  84. if err := a.secondBind(ldapUser, query.Password); err != nil {
  85. return err
  86. }
  87. }
  88. if grafanaUser, err := a.getGrafanaUserFor(ldapUser); err != nil {
  89. return err
  90. } else {
  91. // sync user details
  92. if err := a.syncUserInfo(grafanaUser, ldapUser); err != nil {
  93. return err
  94. }
  95. // sync org roles
  96. if err := a.syncOrgRoles(grafanaUser, ldapUser); err != nil {
  97. return err
  98. }
  99. query.User = grafanaUser
  100. return nil
  101. }
  102. }
  103. }
  104. func (a *ldapAuther) getGrafanaUserFor(ldapUser *ldapUserInfo) (*m.User, error) {
  105. // validate that the user has access
  106. // if there are no ldap group mappings access is true
  107. // otherwise a single group must match
  108. access := len(a.server.LdapGroups) == 0
  109. for _, ldapGroup := range a.server.LdapGroups {
  110. if ldapUser.isMemberOf(ldapGroup.GroupDN) {
  111. access = true
  112. break
  113. }
  114. }
  115. if !access {
  116. log.Info("Ldap Auth: user %s does not belong in any of the specified ldap groups, ldapUser groups: %v", ldapUser.Username, ldapUser.MemberOf)
  117. return nil, ErrInvalidCredentials
  118. }
  119. // get user from grafana db
  120. userQuery := m.GetUserByLoginQuery{LoginOrEmail: ldapUser.Username}
  121. if err := bus.Dispatch(&userQuery); err != nil {
  122. if err == m.ErrUserNotFound && setting.LdapAllowSignup {
  123. return a.createGrafanaUser(ldapUser)
  124. } else if err == m.ErrUserNotFound {
  125. return nil, ErrInvalidCredentials
  126. } else {
  127. return nil, err
  128. }
  129. }
  130. return userQuery.Result, nil
  131. }
  132. func (a *ldapAuther) createGrafanaUser(ldapUser *ldapUserInfo) (*m.User, error) {
  133. cmd := m.CreateUserCommand{
  134. Login: ldapUser.Username,
  135. Email: ldapUser.Email,
  136. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  137. }
  138. if err := bus.Dispatch(&cmd); err != nil {
  139. return nil, err
  140. }
  141. return &cmd.Result, nil
  142. }
  143. func (a *ldapAuther) syncUserInfo(user *m.User, ldapUser *ldapUserInfo) error {
  144. var name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  145. if user.Email == ldapUser.Email && user.Name == name {
  146. return nil
  147. }
  148. log.Info("Ldap: Syncing user info %s", ldapUser.Username)
  149. updateCmd := m.UpdateUserCommand{}
  150. updateCmd.UserId = user.Id
  151. updateCmd.Login = user.Login
  152. updateCmd.Email = ldapUser.Email
  153. updateCmd.Name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  154. return bus.Dispatch(&updateCmd)
  155. }
  156. func (a *ldapAuther) syncOrgRoles(user *m.User, ldapUser *ldapUserInfo) error {
  157. if len(a.server.LdapGroups) == 0 {
  158. log.Warn("Ldap: no group mappings defined")
  159. return nil
  160. }
  161. orgsQuery := m.GetUserOrgListQuery{UserId: user.Id}
  162. if err := bus.Dispatch(&orgsQuery); err != nil {
  163. return err
  164. }
  165. handledOrgIds := map[int64]bool{}
  166. // update or remove org roles
  167. for _, org := range orgsQuery.Result {
  168. match := false
  169. handledOrgIds[org.OrgId] = true
  170. for _, group := range a.server.LdapGroups {
  171. if org.OrgId != group.OrgId {
  172. continue
  173. }
  174. if ldapUser.isMemberOf(group.GroupDN) {
  175. match = true
  176. if org.Role != group.OrgRole {
  177. // update role
  178. cmd := m.UpdateOrgUserCommand{OrgId: org.OrgId, UserId: user.Id, Role: group.OrgRole}
  179. if err := bus.Dispatch(&cmd); err != nil {
  180. return err
  181. }
  182. }
  183. // ignore subsequent ldap group mapping matches
  184. break
  185. }
  186. }
  187. // remove role if no mappings match
  188. if !match {
  189. cmd := m.RemoveOrgUserCommand{OrgId: org.OrgId, UserId: user.Id}
  190. if err := bus.Dispatch(&cmd); err != nil {
  191. return err
  192. }
  193. }
  194. }
  195. // add missing org roles
  196. for _, group := range a.server.LdapGroups {
  197. if !ldapUser.isMemberOf(group.GroupDN) {
  198. continue
  199. }
  200. if _, exists := handledOrgIds[group.OrgId]; exists {
  201. continue
  202. }
  203. // add role
  204. cmd := m.AddOrgUserCommand{UserId: user.Id, Role: group.OrgRole, OrgId: group.OrgId}
  205. err := bus.Dispatch(&cmd)
  206. if err != nil && err != m.ErrOrgNotFound {
  207. return err
  208. }
  209. // mark this group has handled so we do not process it again
  210. handledOrgIds[group.OrgId] = true
  211. }
  212. return nil
  213. }
  214. func (a *ldapAuther) secondBind(ldapUser *ldapUserInfo, userPassword string) error {
  215. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  216. if ldapCfg.VerboseLogging {
  217. log.Info("LDAP second bind failed, %v", err)
  218. }
  219. if ldapErr, ok := err.(*ldap.Error); ok {
  220. if ldapErr.ResultCode == 49 {
  221. return ErrInvalidCredentials
  222. }
  223. }
  224. return err
  225. }
  226. return nil
  227. }
  228. func (a *ldapAuther) initialBind(username, userPassword string) error {
  229. if a.server.BindPassword != "" || a.server.BindDN == "" {
  230. userPassword = a.server.BindPassword
  231. a.requireSecondBind = true
  232. }
  233. bindPath := a.server.BindDN
  234. if strings.Contains(bindPath, "%s") {
  235. bindPath = fmt.Sprintf(a.server.BindDN, username)
  236. }
  237. if err := a.conn.Bind(bindPath, userPassword); err != nil {
  238. if ldapCfg.VerboseLogging {
  239. log.Info("LDAP initial bind failed, %v", err)
  240. }
  241. if ldapErr, ok := err.(*ldap.Error); ok {
  242. if ldapErr.ResultCode == 49 {
  243. return ErrInvalidCredentials
  244. }
  245. }
  246. return err
  247. }
  248. return nil
  249. }
  250. func (a *ldapAuther) searchForUser(username string) (*ldapUserInfo, error) {
  251. var searchResult *ldap.SearchResult
  252. var err error
  253. for _, searchBase := range a.server.SearchBaseDNs {
  254. searchReq := ldap.SearchRequest{
  255. BaseDN: searchBase,
  256. Scope: ldap.ScopeWholeSubtree,
  257. DerefAliases: ldap.NeverDerefAliases,
  258. Attributes: []string{
  259. a.server.Attr.Username,
  260. a.server.Attr.Surname,
  261. a.server.Attr.Email,
  262. a.server.Attr.Name,
  263. a.server.Attr.MemberOf,
  264. },
  265. Filter: strings.Replace(a.server.SearchFilter, "%s", ldap.EscapeFilter(username), -1),
  266. }
  267. searchResult, err = a.conn.Search(&searchReq)
  268. if err != nil {
  269. return nil, err
  270. }
  271. if len(searchResult.Entries) > 0 {
  272. break
  273. }
  274. }
  275. if len(searchResult.Entries) == 0 {
  276. return nil, ErrInvalidCredentials
  277. }
  278. if len(searchResult.Entries) > 1 {
  279. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  280. }
  281. var memberOf []string
  282. if a.server.GroupSearchFilter == "" {
  283. memberOf = getLdapAttrArray(a.server.Attr.MemberOf, searchResult)
  284. } else {
  285. // If we are using a POSIX LDAP schema it won't support memberOf, so we manually search the groups
  286. var groupSearchResult *ldap.SearchResult
  287. for _, groupSearchBase := range a.server.GroupSearchBaseDNs {
  288. var filter_replace string
  289. filter_replace = getLdapAttr(a.server.GroupSearchFilterUserAttribute, searchResult)
  290. if a.server.GroupSearchFilterUserAttribute == "" {
  291. filter_replace = getLdapAttr(a.server.Attr.Username, searchResult)
  292. }
  293. filter := strings.Replace(a.server.GroupSearchFilter, "%s", ldap.EscapeFilter(filter_replace), -1)
  294. if ldapCfg.VerboseLogging {
  295. log.Info("LDAP: Searching for user's groups: %s", filter)
  296. }
  297. groupSearchReq := ldap.SearchRequest{
  298. BaseDN: groupSearchBase,
  299. Scope: ldap.ScopeWholeSubtree,
  300. DerefAliases: ldap.NeverDerefAliases,
  301. Attributes: []string{
  302. // Here MemberOf would be the thing that identifies the group, which is normally 'cn'
  303. a.server.Attr.MemberOf,
  304. },
  305. Filter: filter,
  306. }
  307. groupSearchResult, err = a.conn.Search(&groupSearchReq)
  308. if err != nil {
  309. return nil, err
  310. }
  311. if len(groupSearchResult.Entries) > 0 {
  312. for i := range groupSearchResult.Entries {
  313. memberOf = append(memberOf, getLdapAttrN(a.server.Attr.MemberOf, groupSearchResult, i))
  314. }
  315. break
  316. }
  317. }
  318. }
  319. return &ldapUserInfo{
  320. DN: searchResult.Entries[0].DN,
  321. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  322. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  323. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  324. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  325. MemberOf: memberOf,
  326. }, nil
  327. }
  328. func getLdapAttrN(name string, result *ldap.SearchResult, n int) string {
  329. for _, attr := range result.Entries[n].Attributes {
  330. if attr.Name == name {
  331. if len(attr.Values) > 0 {
  332. return attr.Values[0]
  333. }
  334. }
  335. }
  336. return ""
  337. }
  338. func getLdapAttr(name string, result *ldap.SearchResult) string {
  339. return getLdapAttrN(name, result, 0)
  340. }
  341. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  342. for _, attr := range result.Entries[0].Attributes {
  343. if attr.Name == name {
  344. return attr.Values
  345. }
  346. }
  347. return []string{}
  348. }
  349. func createUserFromLdapInfo() error {
  350. return nil
  351. }