2019-02-18 14:57:54 +01:00
/ *
2019-05-24 15:13:15 +02:00
Copyright ( c ) JSC iCore .
2019-02-18 14:57:54 +01:00
2019-05-24 15:13:15 +02:00
This source code is licensed under the MIT license found in the
LICENSE file in the root directory of this source tree .
2019-02-18 14:57:54 +01:00
* /
package ldapclient
import (
"context"
2019-11-01 13:47:58 +01:00
"crypto/tls"
2019-02-18 14:57:54 +01:00
"encoding/json"
"fmt"
"net"
"strings"
"sync"
"time"
"github.com/coocood/freecache"
2020-07-21 15:13:21 +02:00
"github.com/go-ldap/ldap/v3"
2019-05-24 15:13:15 +02:00
"github.com/i-core/rlog"
2019-02-18 14:57:54 +01:00
"github.com/pkg/errors"
2019-05-15 14:03:05 +02:00
"go.uber.org/zap"
2019-02-18 14:57:54 +01:00
)
2019-05-24 15:13:15 +02:00
var (
// errInvalidCredentials is an error that happens when a user's password is invalid.
errInvalidCredentials = fmt . Errorf ( "invalid credentials" )
// errConnectionTimeout is an error that happens when no one LDAP endpoint responds.
errConnectionTimeout = fmt . Errorf ( "connection timeout" )
// errMissedUsername is an error that happens
errMissedUsername = errors . New ( "username is missed" )
// errUnknownUsername is an error that happens
errUnknownUsername = errors . New ( "unknown username" )
)
type conn interface {
Bind ( bindDN , password string ) error
SearchUser ( user string , attrs ... string ) ( [ ] map [ string ] interface { } , error )
SearchUserRoles ( user string , attrs ... string ) ( [ ] map [ string ] interface { } , error )
Close ( )
}
type connector interface {
Connect ( ctx context . Context , addr string ) ( conn , error )
}
2019-02-18 14:57:54 +01:00
// Config is a LDAP configuration.
type Config struct {
2023-12-06 11:41:44 +01:00
Endpoints [ ] string ` envconfig:"endpoints" required:"true" desc:"a LDAP's server URLs as \"<address>:<port>\"" `
BindDN string ` envconfig:"binddn" desc:"a LDAP bind DN" `
BindPass string ` envconfig:"bindpw" json:"-" desc:"a LDAP bind password" `
BaseDN string ` envconfig:"basedn" required:"true" desc:"a LDAP base DN for searching users" `
UserSearchQuery string ` envconfig:"user_search_query" desc:"the user search query" default:"(&(|(objectClass=organizationalPerson)(objectClass=inetOrgPerson))(|(uid=%[1]s)(mail=%[1]s)(userPrincipalName=%[1]s)(sAMAccountName=%[1]s)))" `
AttrClaims map [ string ] string ` envconfig:"attr_claims" default:"name:name,sn:family_name,givenName:given_name,mail:email" desc:"a mapping of LDAP attributes to OpenID connect claims" `
RoleBaseDN string ` envconfig:"role_basedn" required:"true" desc:"a LDAP base DN for searching roles" `
RoleSearchQuery string ` envconfig:"role_search_query" desc:"the role search query" default:"(|(&(|(objectClass=group)(objectClass=groupOfNames))(member=%[1]s))(&(objectClass=groupOfUniqueNames)(uniqueMember=%[1]s)))" `
RoleAttr string ` envconfig:"role_attr" default:"description" desc:"a LDAP group's attribute that contains a role's name" `
RoleClaim string ` envconfig:"role_claim" default:"https://github.com/i-core/werther/claims/roles" desc:"a name of an OpenID Connect claim that contains user roles" `
CacheSize int ` envconfig:"cache_size" default:"512" desc:"a user info cache's size in KiB" `
CacheTTL time . Duration ` envconfig:"cache_ttl" default:"30m" desc:"a user info cache TTL" `
IsTLS bool ` envconfig:"is_tls" default:"false" desc:"should LDAP connection be established via TLS" `
ConnectionTimeout time . Duration ` envconfig:"connection_timeout" default:"60s" desc:"LDAP server connection timeout" `
2019-02-18 14:57:54 +01:00
}
// Client is a LDAP client (compatible with Active Directory).
type Client struct {
Config
2019-05-24 15:13:15 +02:00
connector connector
cache * freecache . Cache
2019-02-18 14:57:54 +01:00
}
// New creates a new LDAP client.
func New ( cnf Config ) * Client {
return & Client {
2021-09-17 11:08:16 +02:00
Config : cnf ,
connector : & ldapConnector {
2023-12-06 11:41:44 +01:00
BaseDN : cnf . BaseDN ,
UserSearchQuery : cnf . UserSearchQuery ,
RoleBaseDN : cnf . RoleBaseDN ,
IsTLS : cnf . IsTLS ,
RoleSearchQuery : cnf . RoleSearchQuery ,
ConnectionTimeout : cnf . ConnectionTimeout ,
2021-09-17 11:08:16 +02:00
} ,
cache : freecache . NewCache ( cnf . CacheSize * 1024 ) ,
2019-02-18 14:57:54 +01:00
}
}
// Authenticate authenticates a user with a username and password.
// If no username or password in LDAP it returns false and no error.
func ( cli * Client ) Authenticate ( ctx context . Context , username , password string ) ( bool , error ) {
if username == "" || password == "" {
return false , nil
}
var cancel context . CancelFunc
ctx , cancel = context . WithCancel ( ctx )
2019-05-24 15:13:15 +02:00
cn , ok := <- cli . connect ( ctx )
2019-02-18 14:57:54 +01:00
cancel ( )
if ! ok {
2019-05-24 15:13:15 +02:00
return false , errConnectionTimeout
2019-02-18 14:57:54 +01:00
}
defer cn . Close ( )
// Find a user DN by his or her username.
details , err := cli . findBasicUserDetails ( cn , username , [ ] string { "dn" } )
if err != nil {
return false , err
}
if details == nil {
return false , nil
}
if err := cn . Bind ( details [ "dn" ] . ( string ) , password ) ; err != nil {
2019-05-24 15:13:15 +02:00
if err == errInvalidCredentials {
2019-02-18 14:57:54 +01:00
return false , nil
}
return false , err
}
// Clear the claims' cache because of possible re-authentication. We don't want stale claims after re-login.
if ok := cli . cache . Del ( [ ] byte ( username ) ) ; ok {
2019-05-24 15:13:15 +02:00
log := rlog . FromContext ( ctx )
2019-02-18 14:57:54 +01:00
log . Debug ( "Cleared user's OIDC claims in the cache" )
}
return true , nil
}
// FindOIDCClaims finds all OIDC claims for a user.
func ( cli * Client ) FindOIDCClaims ( ctx context . Context , username string ) ( map [ string ] interface { } , error ) {
2019-05-24 15:13:15 +02:00
if username == "" {
return nil , errMissedUsername
}
log := rlog . FromContext ( ctx ) . Sugar ( )
2019-02-18 14:57:54 +01:00
// Retrieving from LDAP is slow. So, we try to get claims for the given username from the cache.
switch cdata , err := cli . cache . Get ( [ ] byte ( username ) ) ; err {
case nil :
var claims map [ string ] interface { }
if err = json . Unmarshal ( cdata , & claims ) ; err != nil {
2019-05-15 14:03:05 +02:00
log . Info ( "Failed to unmarshal user's OIDC claims" , zap . Error ( err ) , "data" , cdata )
2019-02-18 14:57:54 +01:00
return nil , err
}
log . Debug ( "Retrieved user's OIDC claims from the cache" , "claims" , claims )
return claims , nil
case freecache . ErrNotFound :
log . Debug ( "User's OIDC claims is not found in the cache" )
default :
2019-05-15 14:03:05 +02:00
log . Infow ( "Failed to retrieve user's OIDC claims from the cache" , zap . Error ( err ) )
2019-02-18 14:57:54 +01:00
}
// Try to make multiple TCP connections to the LDAP server for getting claims.
// Accept the first one, and cancel others.
var cancel context . CancelFunc
ctx , cancel = context . WithCancel ( ctx )
2019-05-24 15:13:15 +02:00
cn , ok := <- cli . connect ( ctx )
2019-02-18 14:57:54 +01:00
cancel ( )
if ! ok {
2019-05-24 15:13:15 +02:00
return nil , errConnectionTimeout
2019-02-18 14:57:54 +01:00
}
defer cn . Close ( )
// We need to find LDAP attribute's names for all required claims.
attrs := [ ] string { "dn" }
for k := range cli . AttrClaims {
attrs = append ( attrs , k )
}
// Find the attributes in the LDAP server.
details , err := cli . findBasicUserDetails ( cn , username , attrs )
if err != nil {
return nil , err
}
if details == nil {
2019-05-24 15:13:15 +02:00
return nil , errUnknownUsername
2019-02-18 14:57:54 +01:00
}
log . Infow ( "Retrieved user's info from LDAP" , "details" , details )
2019-05-24 15:13:15 +02:00
// Transform the retrieved attributes to corresponding claims.
2019-02-18 14:57:54 +01:00
claims := make ( map [ string ] interface { } )
for attr , v := range details {
if claim , ok := cli . AttrClaims [ attr ] ; ok {
claims [ claim ] = v
}
}
// User's roles is stored in LDAP as groups. We find all groups in a role's DN
// that include the user as a member.
2019-05-24 15:13:15 +02:00
entries , err := cn . SearchUserRoles ( fmt . Sprintf ( "%s" , details [ "dn" ] ) , "dn" , cli . RoleAttr )
2019-02-18 14:57:54 +01:00
if err != nil {
return nil , err
}
2021-09-24 15:54:10 +02:00
roles := make ( [ ] map [ string ] interface { } , 0 )
2019-02-18 14:57:54 +01:00
for _ , entry := range entries {
2019-05-24 15:13:15 +02:00
roleDN , ok := entry [ "dn" ] . ( string )
if ! ok || roleDN == "" {
2019-02-18 14:57:54 +01:00
log . Infow ( "No required LDAP attribute for a role" , "ldapAttribute" , "dn" , "entry" , entry )
continue
}
if entry [ cli . RoleAttr ] == nil {
log . Infow ( "No required LDAP attribute for a role" , "ldapAttribute" , cli . RoleAttr , "roleDN" , roleDN )
continue
}
// Ensure that a role's DN is inside of the role's base DN.
// It's sufficient to compare the DN's suffix with the base DN.
n , k := len ( roleDN ) , len ( cli . RoleBaseDN )
if n < k || ! strings . EqualFold ( roleDN [ n - k : ] , cli . RoleBaseDN ) {
panic ( "You should never see that" )
}
2019-05-24 15:13:15 +02:00
2021-09-24 15:54:10 +02:00
roles = append ( roles , entry )
2019-02-18 14:57:54 +01:00
}
claims [ cli . RoleClaim ] = roles
// Save the claims in the cache for future queries.
cdata , err := json . Marshal ( claims )
if err != nil {
2019-05-15 14:03:05 +02:00
log . Infow ( "Failed to marshal user's OIDC claims for caching" , zap . Error ( err ) , "claims" , claims )
2019-02-18 14:57:54 +01:00
}
if err = cli . cache . Set ( [ ] byte ( username ) , cdata , int ( cli . CacheTTL . Seconds ( ) ) ) ; err != nil {
2019-05-15 14:03:05 +02:00
log . Infow ( "Failed to store user's OIDC claims into the cache" , zap . Error ( err ) , "claims" , claims )
2019-02-18 14:57:54 +01:00
}
return claims , nil
}
2019-05-24 15:13:15 +02:00
func ( cli * Client ) connect ( ctx context . Context ) <- chan conn {
var (
wg sync . WaitGroup
ch = make ( chan conn )
)
wg . Add ( len ( cli . Endpoints ) )
for _ , addr := range cli . Endpoints {
go func ( addr string ) {
defer wg . Done ( )
log := rlog . FromContext ( ctx ) . Sugar ( )
cn , err := cli . connector . Connect ( ctx , addr )
if err != nil {
log . Debug ( "Failed to create a LDAP connection" , "address" , addr )
return
}
select {
case <- ctx . Done ( ) :
cn . Close ( )
log . Debug ( "a LDAP connection is cancelled" , "address" , addr )
return
case ch <- cn :
}
} ( addr )
}
go func ( ) {
wg . Wait ( )
close ( ch )
} ( )
return ch
}
// findBasicUserDetails finds user's LDAP attributes that were specified. It returns nil if no such user.
func ( cli * Client ) findBasicUserDetails ( cn conn , username string , attrs [ ] string ) ( map [ string ] interface { } , error ) {
if cli . BindDN != "" {
// We need to login to a LDAP server with a service account for retrieving user data.
if err := cn . Bind ( cli . BindDN , cli . BindPass ) ; err != nil {
return nil , errors . Wrap ( err , "failed to login to a LDAP woth a service account" )
}
}
entries , err := cn . SearchUser ( username , attrs ... )
if err != nil {
return nil , err
}
if len ( entries ) != 1 {
// We didn't find the user.
return nil , nil
}
var (
entry = entries [ 0 ]
details = make ( map [ string ] interface { } )
)
for _ , attr := range attrs {
if v , ok := entry [ attr ] ; ok {
details [ attr ] = v
}
}
return details , nil
}
type ldapConnector struct {
2023-12-06 11:41:44 +01:00
BaseDN string
RoleBaseDN string
IsTLS bool
UserSearchQuery string
RoleSearchQuery string
ConnectionTimeout time . Duration
2019-05-24 15:13:15 +02:00
}
func ( c * ldapConnector ) Connect ( ctx context . Context , addr string ) ( conn , error ) {
2023-12-06 11:41:44 +01:00
d := net . Dialer { Timeout : c . ConnectionTimeout }
2019-05-24 15:13:15 +02:00
tcpcn , err := d . DialContext ( ctx , "tcp" , addr )
if err != nil {
return nil , err
}
2019-11-01 13:47:58 +01:00
if c . IsTLS {
tlscn , err := tls . DialWithDialer ( & d , "tcp" , addr , nil )
if err != nil {
return nil , err
}
tcpcn = tlscn
}
ldapcn := ldap . NewConn ( tcpcn , c . IsTLS )
2019-05-24 15:13:15 +02:00
ldapcn . Start ( )
2021-09-17 11:08:16 +02:00
return & ldapConn {
Conn : ldapcn ,
BaseDN : c . BaseDN ,
UserSearchQuery : c . UserSearchQuery ,
RoleBaseDN : c . RoleBaseDN ,
RoleSearchQuery : c . RoleSearchQuery ,
} , nil
2019-05-24 15:13:15 +02:00
}
type ldapConn struct {
* ldap . Conn
2021-09-17 11:08:16 +02:00
BaseDN string
RoleBaseDN string
UserSearchQuery string
RoleSearchQuery string
2019-05-24 15:13:15 +02:00
}
func ( c * ldapConn ) Bind ( bindDN , password string ) error {
err := c . Conn . Bind ( bindDN , password )
if ldapErr , ok := err . ( * ldap . Error ) ; ok && ldapErr . ResultCode == ldap . LDAPResultInvalidCredentials {
return errInvalidCredentials
}
return err
}
func ( c * ldapConn ) SearchUser ( user string , attrs ... string ) ( [ ] map [ string ] interface { } , error ) {
2021-09-17 11:08:16 +02:00
query := fmt . Sprintf ( c . UserSearchQuery , user )
2019-05-24 15:13:15 +02:00
return c . searchEntries ( c . BaseDN , query , attrs )
}
func ( c * ldapConn ) SearchUserRoles ( user string , attrs ... string ) ( [ ] map [ string ] interface { } , error ) {
2021-09-17 11:08:16 +02:00
query := fmt . Sprintf ( c . RoleSearchQuery , user )
2019-05-24 15:13:15 +02:00
return c . searchEntries ( c . RoleBaseDN , query , attrs )
}
2019-02-18 14:57:54 +01:00
// searchEntries executes a LDAP query, and returns a result as entries where each entry is mapping of LDAP attributes.
2019-05-24 15:13:15 +02:00
func ( c * ldapConn ) searchEntries ( baseDN , query string , attrs [ ] string ) ( [ ] map [ string ] interface { } , error ) {
req := ldap . NewSearchRequest ( baseDN , ldap . ScopeWholeSubtree , ldap . NeverDerefAliases , 0 , 0 , false , query , attrs , nil )
res , err := c . Search ( req )
2019-02-18 14:57:54 +01:00
if err != nil {
return nil , err
}
var entries [ ] map [ string ] interface { }
for _ , v := range res . Entries {
entry := map [ string ] interface { } { "dn" : v . DN }
for _ , attr := range v . Attributes {
// We need the first value only for the named attribute.
entry [ attr . Name ] = attr . Values [ 0 ]
}
entries = append ( entries , entry )
}
return entries , nil
}