You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							121 lines
						
					
					
						
							4.3 KiB
						
					
					
				
			
		
		
	
	
							121 lines
						
					
					
						
							4.3 KiB
						
					
					
				| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // Use of this source code is governed by a MIT-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package ldap
 | |
| 
 | |
| import (
 | |
| 	"strings"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models"
 | |
| 	"code.gitea.io/gitea/models/login"
 | |
| 	"code.gitea.io/gitea/modules/json"
 | |
| 	"code.gitea.io/gitea/modules/secret"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| )
 | |
| 
 | |
| // .____     ________      _____ __________
 | |
| // |    |    \______ \    /  _  \\______   \
 | |
| // |    |     |    |  \  /  /_\  \|     ___/
 | |
| // |    |___  |    `   \/    |    \    |
 | |
| // |_______ \/_______  /\____|__  /____|
 | |
| //         \/        \/         \/
 | |
| 
 | |
| // Package ldap provide functions & structure to query a LDAP ldap directory
 | |
| // For now, it's mainly tested again an MS Active Directory service, see README.md for more information
 | |
| 
 | |
| // Source Basic LDAP authentication service
 | |
| type Source struct {
 | |
| 	Name                  string // canonical name (ie. corporate.ad)
 | |
| 	Host                  string // LDAP host
 | |
| 	Port                  int    // port number
 | |
| 	SecurityProtocol      SecurityProtocol
 | |
| 	SkipVerify            bool
 | |
| 	BindDN                string // DN to bind with
 | |
| 	BindPasswordEncrypt   string // Encrypted Bind BN password
 | |
| 	BindPassword          string // Bind DN password
 | |
| 	UserBase              string // Base search path for users
 | |
| 	UserDN                string // Template for the DN of the user for simple auth
 | |
| 	AttributeUsername     string // Username attribute
 | |
| 	AttributeName         string // First name attribute
 | |
| 	AttributeSurname      string // Surname attribute
 | |
| 	AttributeMail         string // E-mail attribute
 | |
| 	AttributesInBind      bool   // fetch attributes in bind context (not user)
 | |
| 	AttributeSSHPublicKey string // LDAP SSH Public Key attribute
 | |
| 	AttributeAvatar       string
 | |
| 	SearchPageSize        uint32 // Search with paging page size
 | |
| 	Filter                string // Query filter to validate entry
 | |
| 	AdminFilter           string // Query filter to check if user is admin
 | |
| 	RestrictedFilter      string // Query filter to check if user is restricted
 | |
| 	Enabled               bool   // if this source is disabled
 | |
| 	AllowDeactivateAll    bool   // Allow an empty search response to deactivate all users from this source
 | |
| 	GroupsEnabled         bool   // if the group checking is enabled
 | |
| 	GroupDN               string // Group Search Base
 | |
| 	GroupFilter           string // Group Name Filter
 | |
| 	GroupMemberUID        string // Group Attribute containing array of UserUID
 | |
| 	UserUID               string // User Attribute listed in Group
 | |
| 	SkipLocalTwoFA        bool   `json:",omitempty"` // Skip Local 2fa for users authenticated with this source
 | |
| 
 | |
| 	// reference to the loginSource
 | |
| 	loginSource *login.Source
 | |
| }
 | |
| 
 | |
| // FromDB fills up a LDAPConfig from serialized format.
 | |
| func (source *Source) FromDB(bs []byte) error {
 | |
| 	err := models.JSONUnmarshalHandleDoubleEncode(bs, &source)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if source.BindPasswordEncrypt != "" {
 | |
| 		source.BindPassword, err = secret.DecryptSecret(setting.SecretKey, source.BindPasswordEncrypt)
 | |
| 		source.BindPasswordEncrypt = ""
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // ToDB exports a LDAPConfig to a serialized format.
 | |
| func (source *Source) ToDB() ([]byte, error) {
 | |
| 	var err error
 | |
| 	source.BindPasswordEncrypt, err = secret.EncryptSecret(setting.SecretKey, source.BindPassword)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	source.BindPassword = ""
 | |
| 	return json.Marshal(source)
 | |
| }
 | |
| 
 | |
| // SecurityProtocolName returns the name of configured security
 | |
| // protocol.
 | |
| func (source *Source) SecurityProtocolName() string {
 | |
| 	return SecurityProtocolNames[source.SecurityProtocol]
 | |
| }
 | |
| 
 | |
| // IsSkipVerify returns if SkipVerify is set
 | |
| func (source *Source) IsSkipVerify() bool {
 | |
| 	return source.SkipVerify
 | |
| }
 | |
| 
 | |
| // HasTLS returns if HasTLS
 | |
| func (source *Source) HasTLS() bool {
 | |
| 	return source.SecurityProtocol > SecurityProtocolUnencrypted
 | |
| }
 | |
| 
 | |
| // UseTLS returns if UseTLS
 | |
| func (source *Source) UseTLS() bool {
 | |
| 	return source.SecurityProtocol != SecurityProtocolUnencrypted
 | |
| }
 | |
| 
 | |
| // ProvidesSSHKeys returns if this source provides SSH Keys
 | |
| func (source *Source) ProvidesSSHKeys() bool {
 | |
| 	return len(strings.TrimSpace(source.AttributeSSHPublicKey)) > 0
 | |
| }
 | |
| 
 | |
| // SetLoginSource sets the related LoginSource
 | |
| func (source *Source) SetLoginSource(loginSource *login.Source) {
 | |
| 	source.loginSource = loginSource
 | |
| }
 | |
| 
 | |
| func init() {
 | |
| 	login.RegisterTypeConfig(login.LDAP, &Source{})
 | |
| 	login.RegisterTypeConfig(login.DLDAP, &Source{})
 | |
| }
 | |
| 
 |