mirror of
https://github.com/goauthentik/authentik
synced 2026-05-01 11:57:09 +02:00
* re-instate previously flaky test Signed-off-by: Jens Langhammer <jens@goauthentik.io> * break up big file Signed-off-by: Jens Langhammer <jens@goauthentik.io> * move geoip data to subdir Signed-off-by: Jens Langhammer <jens@goauthentik.io> * i am but a weak man Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix ldap disconnect in testing Signed-off-by: Jens Langhammer <jens@goauthentik.io> * account for mismatched uid due to test server process Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
158 lines
3.7 KiB
Go
158 lines
3.7 KiB
Go
package ldap
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"net"
|
|
"sync"
|
|
|
|
"github.com/pires/go-proxyproto"
|
|
log "github.com/sirupsen/logrus"
|
|
"goauthentik.io/internal/config"
|
|
"goauthentik.io/internal/crypto"
|
|
"goauthentik.io/internal/outpost/ak"
|
|
"goauthentik.io/internal/utils"
|
|
|
|
"beryju.io/ldap"
|
|
)
|
|
|
|
type LDAPServer struct {
|
|
s *ldap.Server
|
|
log *log.Entry
|
|
ac *ak.APIController
|
|
cs *ak.CryptoStore
|
|
defaultCert *tls.Certificate
|
|
providers []*ProviderInstance
|
|
connections map[string]net.Conn
|
|
connectionsSync sync.Mutex
|
|
}
|
|
|
|
func NewServer(ac *ak.APIController) ak.Outpost {
|
|
ls := &LDAPServer{
|
|
log: log.WithField("logger", "authentik.outpost.ldap"),
|
|
ac: ac,
|
|
cs: ak.NewCryptoStore(ac.Client.CryptoAPI),
|
|
providers: []*ProviderInstance{},
|
|
connections: map[string]net.Conn{},
|
|
connectionsSync: sync.Mutex{},
|
|
}
|
|
ac.AddEventHandler(ls.handleWSSessionEnd)
|
|
s := ldap.NewServer()
|
|
s.EnforceLDAP = true
|
|
|
|
tlsConfig := utils.GetTLSConfig()
|
|
tlsConfig.GetCertificate = ls.getCertificates
|
|
s.StartTLS = tlsConfig
|
|
|
|
ls.s = s
|
|
|
|
defaultCert, err := crypto.GenerateSelfSignedCert()
|
|
if err != nil {
|
|
log.Warning(err)
|
|
}
|
|
ls.defaultCert = &defaultCert
|
|
s.BindFunc("", ls)
|
|
s.UnbindFunc("", ls)
|
|
s.SearchFunc("", ls)
|
|
s.CloseFunc("", ls)
|
|
return ls
|
|
}
|
|
|
|
func (ls *LDAPServer) Type() string {
|
|
return "ldap"
|
|
}
|
|
|
|
func (ls *LDAPServer) StartLDAPServer(listen string) error {
|
|
ln, err := net.Listen("tcp", listen)
|
|
if err != nil {
|
|
ls.log.WithField("listen", listen).WithError(err).Warning("Failed to listen (SSL)")
|
|
return err
|
|
}
|
|
proxyListener := &proxyproto.Listener{Listener: ln, ConnPolicy: utils.GetProxyConnectionPolicy()}
|
|
defer func() {
|
|
err := proxyListener.Close()
|
|
if err != nil {
|
|
ls.log.WithError(err).Warning("failed to close proxy listener")
|
|
}
|
|
}()
|
|
|
|
ls.log.WithField("listen", listen).Info("Starting LDAP server")
|
|
err = ls.s.Serve(proxyListener)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ls.log.WithField("listen", listen).Info("Stopping LDAP server")
|
|
return nil
|
|
}
|
|
|
|
func (ls *LDAPServer) Start() error {
|
|
listenLdap := config.Get().Listen.LDAP
|
|
listenLdaps := config.Get().Listen.LDAPS
|
|
listenMetrics := config.Get().Listen.Metrics
|
|
metricsRouter := ak.MetricsRouter()
|
|
wg := sync.WaitGroup{}
|
|
wg.Add(len(listenLdap) + len(listenLdaps) + 1 + len(listenMetrics))
|
|
for _, listen := range listenLdap {
|
|
go func() {
|
|
defer wg.Done()
|
|
err := ls.StartLDAPServer(listen)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
}
|
|
for _, listen := range listenLdaps {
|
|
go func() {
|
|
defer wg.Done()
|
|
err := ls.StartLDAPTLSServer(listen)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
}
|
|
go func() {
|
|
defer wg.Done()
|
|
ak.RunMetricsUnix(metricsRouter)
|
|
}()
|
|
for _, listen := range listenMetrics {
|
|
go func() {
|
|
defer wg.Done()
|
|
ak.RunMetricsServer(listen, metricsRouter)
|
|
}()
|
|
}
|
|
wg.Wait()
|
|
return nil
|
|
}
|
|
|
|
func (ls *LDAPServer) Stop() error {
|
|
return nil
|
|
}
|
|
|
|
func (ls *LDAPServer) TimerFlowCacheExpiry(ctx context.Context) {
|
|
for _, p := range ls.providers {
|
|
ls.log.WithField("flow", p.authenticationFlowSlug).Debug("Pre-heating flow cache")
|
|
p.binder.TimerFlowCacheExpiry(ctx)
|
|
}
|
|
}
|
|
|
|
func (ls *LDAPServer) handleWSSessionEnd(ctx context.Context, msg ak.Event) error {
|
|
if msg.Instruction != ak.EventKindSessionEnd {
|
|
return nil
|
|
}
|
|
mmsg := ak.EventArgsSessionEnd{}
|
|
err := msg.ArgsAs(&mmsg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ls.connectionsSync.Lock()
|
|
defer ls.connectionsSync.Unlock()
|
|
ls.log.Info("Disconnecting session due to session end event")
|
|
conn, ok := ls.connections[mmsg.SessionID]
|
|
if !ok {
|
|
ls.log.Warn("Could not disconnect session, connection not found")
|
|
return nil
|
|
}
|
|
delete(ls.connections, mmsg.SessionID)
|
|
return conn.Close()
|
|
}
|