ldap.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326
  1. package login
  2. import (
  3. "crypto/tls"
  4. "errors"
  5. "fmt"
  6. "strings"
  7. "github.com/davecgh/go-spew/spew"
  8. "github.com/go-ldap/ldap"
  9. "github.com/grafana/grafana/pkg/bus"
  10. "github.com/grafana/grafana/pkg/log"
  11. m "github.com/grafana/grafana/pkg/models"
  12. )
  13. type ldapAuther struct {
  14. server *LdapServerConf
  15. conn *ldap.Conn
  16. requireSecondBind bool
  17. }
  18. func NewLdapAuthenticator(server *LdapServerConf) *ldapAuther {
  19. return &ldapAuther{server: server}
  20. }
  21. func (a *ldapAuther) Dial() error {
  22. address := fmt.Sprintf("%s:%d", a.server.Host, a.server.Port)
  23. var err error
  24. if a.server.UseSSL {
  25. tlsCfg := &tls.Config{
  26. InsecureSkipVerify: a.server.SkipVerifySSL,
  27. ServerName: a.server.Host,
  28. }
  29. a.conn, err = ldap.DialTLS("tcp", address, tlsCfg)
  30. } else {
  31. a.conn, err = ldap.Dial("tcp", address)
  32. }
  33. return err
  34. }
  35. func (a *ldapAuther) login(query *LoginUserQuery) error {
  36. if err := a.Dial(); err != nil {
  37. return err
  38. }
  39. defer a.conn.Close()
  40. // perform initial authentication
  41. if err := a.initialBind(query.Username, query.Password); err != nil {
  42. return err
  43. }
  44. // find user entry & attributes
  45. if ldapUser, err := a.searchForUser(query.Username); err != nil {
  46. return err
  47. } else {
  48. if ldapCfg.VerboseLogging {
  49. log.Info("Ldap User Info: %s", spew.Sdump(ldapUser))
  50. }
  51. // check if a second user bind is needed
  52. if a.requireSecondBind {
  53. if err := a.secondBind(ldapUser, query.Password); err != nil {
  54. return err
  55. }
  56. }
  57. if grafanaUser, err := a.getGrafanaUserFor(ldapUser); err != nil {
  58. return err
  59. } else {
  60. // sync user details
  61. if err := a.syncUserInfo(grafanaUser, ldapUser); err != nil {
  62. return err
  63. }
  64. // sync org roles
  65. if err := a.syncOrgRoles(grafanaUser, ldapUser); err != nil {
  66. return err
  67. }
  68. query.User = grafanaUser
  69. return nil
  70. }
  71. }
  72. }
  73. func (a *ldapAuther) getGrafanaUserFor(ldapUser *ldapUserInfo) (*m.User, error) {
  74. // validate that the user has access
  75. // if there are no ldap group mappings access is true
  76. // otherwise a single group must match
  77. access := len(a.server.LdapGroups) == 0
  78. for _, ldapGroup := range a.server.LdapGroups {
  79. if ldapUser.isMemberOf(ldapGroup.GroupDN) {
  80. access = true
  81. break
  82. }
  83. }
  84. if !access {
  85. log.Info("Ldap Auth: user %s does not belong in any of the specified ldap groups, ldapUser groups: %v", ldapUser.Username, ldapUser.MemberOf)
  86. return nil, ErrInvalidCredentials
  87. }
  88. // get user from grafana db
  89. userQuery := m.GetUserByLoginQuery{LoginOrEmail: ldapUser.Username}
  90. if err := bus.Dispatch(&userQuery); err != nil {
  91. if err == m.ErrUserNotFound {
  92. return a.createGrafanaUser(ldapUser)
  93. } else {
  94. return nil, err
  95. }
  96. }
  97. return userQuery.Result, nil
  98. }
  99. func (a *ldapAuther) createGrafanaUser(ldapUser *ldapUserInfo) (*m.User, error) {
  100. cmd := m.CreateUserCommand{
  101. Login: ldapUser.Username,
  102. Email: ldapUser.Email,
  103. Name: fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName),
  104. }
  105. if err := bus.Dispatch(&cmd); err != nil {
  106. return nil, err
  107. }
  108. return &cmd.Result, nil
  109. }
  110. func (a *ldapAuther) syncUserInfo(user *m.User, ldapUser *ldapUserInfo) error {
  111. var name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  112. if user.Email == ldapUser.Email && user.Name == name {
  113. return nil
  114. }
  115. log.Info("Ldap: Syncing user info %s", ldapUser.Username)
  116. updateCmd := m.UpdateUserCommand{}
  117. updateCmd.UserId = user.Id
  118. updateCmd.Login = user.Login
  119. updateCmd.Email = ldapUser.Email
  120. updateCmd.Name = fmt.Sprintf("%s %s", ldapUser.FirstName, ldapUser.LastName)
  121. return bus.Dispatch(&updateCmd)
  122. }
  123. func (a *ldapAuther) syncOrgRoles(user *m.User, ldapUser *ldapUserInfo) error {
  124. if len(a.server.LdapGroups) == 0 {
  125. return nil
  126. }
  127. orgsQuery := m.GetUserOrgListQuery{UserId: user.Id}
  128. if err := bus.Dispatch(&orgsQuery); err != nil {
  129. return err
  130. }
  131. // update or remove org roles
  132. for _, org := range orgsQuery.Result {
  133. match := false
  134. for _, group := range a.server.LdapGroups {
  135. if org.OrgId != group.OrgId {
  136. continue
  137. }
  138. if ldapUser.isMemberOf(group.GroupDN) {
  139. match = true
  140. if org.Role != group.OrgRole {
  141. // update role
  142. cmd := m.UpdateOrgUserCommand{OrgId: org.OrgId, UserId: user.Id, Role: group.OrgRole}
  143. if err := bus.Dispatch(&cmd); err != nil {
  144. return err
  145. }
  146. }
  147. // ignore subsequent ldap group mapping matches
  148. break
  149. }
  150. }
  151. // remove role if no mappings match
  152. if !match {
  153. cmd := m.RemoveOrgUserCommand{OrgId: org.OrgId, UserId: user.Id}
  154. if err := bus.Dispatch(&cmd); err != nil {
  155. return err
  156. }
  157. }
  158. }
  159. // add missing org roles
  160. for _, group := range a.server.LdapGroups {
  161. if !ldapUser.isMemberOf(group.GroupDN) {
  162. continue
  163. }
  164. match := false
  165. for _, org := range orgsQuery.Result {
  166. if group.OrgId == org.OrgId {
  167. match = true
  168. break
  169. }
  170. }
  171. if !match {
  172. // add role
  173. cmd := m.AddOrgUserCommand{UserId: user.Id, Role: group.OrgRole, OrgId: group.OrgId}
  174. if err := bus.Dispatch(&cmd); err != nil {
  175. return err
  176. }
  177. break
  178. }
  179. }
  180. return nil
  181. }
  182. func (a *ldapAuther) secondBind(ldapUser *ldapUserInfo, userPassword string) error {
  183. if err := a.conn.Bind(ldapUser.DN, userPassword); err != nil {
  184. if ldapCfg.VerboseLogging {
  185. log.Info("LDAP second bind failed, %v", err)
  186. }
  187. if ldapErr, ok := err.(*ldap.Error); ok {
  188. if ldapErr.ResultCode == 49 {
  189. return ErrInvalidCredentials
  190. }
  191. }
  192. return err
  193. }
  194. return nil
  195. }
  196. func (a *ldapAuther) initialBind(username, userPassword string) error {
  197. if a.server.BindPassword != "" || a.server.BindDN == "" {
  198. userPassword = a.server.BindPassword
  199. a.requireSecondBind = true
  200. }
  201. bindPath := a.server.BindDN
  202. if strings.Contains(bindPath, "%s") {
  203. bindPath = fmt.Sprintf(a.server.BindDN, username)
  204. }
  205. if err := a.conn.Bind(bindPath, userPassword); err != nil {
  206. if ldapCfg.VerboseLogging {
  207. log.Info("LDAP initial bind failed, %v", err)
  208. }
  209. if ldapErr, ok := err.(*ldap.Error); ok {
  210. if ldapErr.ResultCode == 49 {
  211. return ErrInvalidCredentials
  212. }
  213. }
  214. return err
  215. }
  216. return nil
  217. }
  218. func (a *ldapAuther) searchForUser(username string) (*ldapUserInfo, error) {
  219. var searchResult *ldap.SearchResult
  220. var err error
  221. for _, searchBase := range a.server.SearchBaseDNs {
  222. searchReq := ldap.SearchRequest{
  223. BaseDN: searchBase,
  224. Scope: ldap.ScopeWholeSubtree,
  225. DerefAliases: ldap.NeverDerefAliases,
  226. Attributes: []string{
  227. a.server.Attr.Username,
  228. a.server.Attr.Surname,
  229. a.server.Attr.Email,
  230. a.server.Attr.Name,
  231. a.server.Attr.MemberOf,
  232. },
  233. Filter: strings.Replace(a.server.SearchFilter, "%s", username, -1),
  234. }
  235. searchResult, err = a.conn.Search(&searchReq)
  236. if err != nil {
  237. return nil, err
  238. }
  239. if len(searchResult.Entries) > 0 {
  240. break
  241. }
  242. }
  243. if len(searchResult.Entries) == 0 {
  244. return nil, ErrInvalidCredentials
  245. }
  246. if len(searchResult.Entries) > 1 {
  247. return nil, errors.New("Ldap search matched more than one entry, please review your filter setting")
  248. }
  249. return &ldapUserInfo{
  250. DN: searchResult.Entries[0].DN,
  251. LastName: getLdapAttr(a.server.Attr.Surname, searchResult),
  252. FirstName: getLdapAttr(a.server.Attr.Name, searchResult),
  253. Username: getLdapAttr(a.server.Attr.Username, searchResult),
  254. Email: getLdapAttr(a.server.Attr.Email, searchResult),
  255. MemberOf: getLdapAttrArray(a.server.Attr.MemberOf, searchResult),
  256. }, nil
  257. }
  258. func getLdapAttr(name string, result *ldap.SearchResult) string {
  259. for _, attr := range result.Entries[0].Attributes {
  260. if attr.Name == name {
  261. if len(attr.Values) > 0 {
  262. return attr.Values[0]
  263. }
  264. }
  265. }
  266. return ""
  267. }
  268. func getLdapAttrArray(name string, result *ldap.SearchResult) []string {
  269. for _, attr := range result.Entries[0].Attributes {
  270. if attr.Name == name {
  271. return attr.Values
  272. }
  273. }
  274. return []string{}
  275. }
  276. func createUserFromLdapInfo() error {
  277. return nil
  278. }