summaryrefslogtreecommitdiffstats
path: root/modules/auth/ldap
Commit message (Collapse)AuthorAgeFilesLines
* LDAP Public SSH Keys synchronization (#1844)Magnus Lindvall2018-05-241-30/+33
| | | | | | | | | | | | | | | | | | | * Add LDAP Key Synchronization feature Signed-off-by: Magnus Lindvall <magnus@dnmgns.com> * Add migration: add login source id column for public_key table * Only update keys if needed * Add function to only list pubkey synchronized from ldap * Only list pub ssh keys synchronized from ldap. Do not sort strings as ExistsInSlice does it. * Only get keys belonging to current login source id * Set default login source id to 0 * Some minor cleanup. Add integration tests (updete dep testify)
* Add option to use paged LDAP search when synchronizing users (#3895)Lauris BH2018-05-051-1/+12
|
* Gogs -> Gitea (#2909)Sandro Santilli2017-11-141-1/+1
| | | rename label
* Correct ldap username validation. (#2880)Jochen Rill2017-11-131-1/+1
| | | | PR #342 was only partially applied. Spaces should not be at the start and end of a username but they can be inside.
* LDAP user synchronization (#1478)Lauris BH2017-05-101-28/+97
|
* Correction LDAP validation (#342)Denis Denisov2016-12-121-0/+5
| | | | | | | | | | | | * Correction LDAP username validation As https://msdn.microsoft.com/en-us/library/aa366101(v=vs.85).aspx describe spaces should not be in start or at the end of username but they can be inside the username. So please check my solution for it. * Check for zero length passwords in LDAP module. According to https://tools.ietf.org/search/rfc4513#section-5.1.2 LDAP client should always check before bind whether a password is an empty value. There are at least one LDAP implementation which does not return error if you try to bind with DN set and empty password - AD. * Clearing the login/email spaces at the [start/end]
* golint fixed for modules/authLunny Xiao2016-11-271-2/+3
|
* Update import paths from github.com/go-gitea to code.gitea.io (#135)Sandro Santilli2016-11-101-1/+1
| | | | | | | - Update import paths from github.com/go-gitea to code.gitea.io - Fix import path for travis See https://docs.travis-ci.com/user/languages/go#Go-Import-Path
* Fix type in unused constant name (#111)Sandro Santilli2016-11-071-4/+4
| | | | | | | | | | | | | | | | | | * Write LDAP, SMTP, PAM, DLDAP back to all uppercase * Fix type in unused constant name * Other MixCased fixes * Complete MixerCasing of template constants * Re uppercase LTS and LDAPS suffixes * Uppercase JSON suffix in constant names * Proper case LoginNoType * Prefix unexported template path constants with "tpl"
* Security protocolsSandro Santilli2016-11-071-5/+5
|
* Change import reference to match gitea instead of gogs (#37)Rémy Boulanouar2016-11-031-1/+1
|
* #2709 validate username attribute fetched from LDAPUnknwon2016-07-121-7/+7
|
* Use SecurityProtocol to replace UseSSL in LDAP configUnknwon2016-07-081-25/+48
| | | | Initially proposed by #2376 and fixes #3068 as well.
* Add ServerName to tls.Config in LDAP auth (#3104)Paul Tötterman2016-06-011-0/+1
| | | | | | | | | | From https://godoc.org/crypto/tls#Config ServerName is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address. This is needed for certificate validation without InsecureSkipVerify.
* LDAP: Make a bit more detailed log tracesAdam Strzelecki2016-02-201-1/+3
| | | | | This is useful especially to check whether we fetch right attributes, using right LDAP search base and in right order.
* LDAP: Fetch attributes in Bind DN context optionAdam Strzelecki2016-02-201-6/+26
| | | | | | | | | This is feature is workaround for #2628 (JumpCloud) and some other services that allow LDAP search only under BindDN user account, but not allow any LDAP search query in logged user DN context. Such approach is an alternative to minimal permissions security pattern for BindDN user.
* LDAP: Use single connection in BindDN mode authAdam Strzelecki2016-02-201-19/+11
| | | | | | | | | | According to RFC 4511 4.2.1. Processing of the Bind Request "Clients may send multiple Bind requests to change the authentication and/or security associations or to complete a multi-stage Bind process. Authentication from earlier binds is subsequently ignored." Therefore we should not use 2 connections, but single one just sending two bind requests.
* Fix #2221 LDAP username attribute must be fetchedAdam Strzelecki2016-02-071-1/+1
| | | | | This is fix-up for 573305f. Forgot to fetch AttributeUsername value from the LDAP server, so the setting was effectively not working as intended.
* Fix misspelled wordsAlex Myasoedov2015-12-061-1/+1
|
* LDAP: Optional user name attribute specificationAdam Strzelecki2015-12-021-24/+26
| | | | | | | | | | | | | | | Consider following LDAP search query example: (&(objectClass=Person)(|(uid=%s)(mail=%s))) Right now on first login attempt Gogs will use the text supplied on login form as the newly created user name. In example query above the text matches against both e-mail or user name. So if user puts the e-mail then the new Gogs user name will be e-mail which may be undesired. Using optional user name attribute setting we can explicitly say we want Gogs user name to be certain LDAP attribute eg. `uid`, so even user will use e-mail to login 1st time, the new account will receive correct user name.
* Use better LDAP lib and should fix #1139Unknwon2015-11-261-1/+2
|
* #1896 fatal when no needed update taskUnknwon2015-11-041-1/+1
|
* Sanitizing input to LDAP authentication module.Sergio Benitez2015-10-261-3/+39
|
* revert simple LDAP userDN and update exampleUnknwon2015-09-161-2/+2
|
* #1637 able to skip verify for LDAPUnknwon2015-09-141-6/+10
|
* fix simple LDAP userDNUnknwon2015-09-141-3/+2
|
* Minor fixes to the LDAP module readmeSergio Benitez2015-09-051-7/+8
|
* Updated the LDAP auth module README.Sergio Benitez2015-09-041-31/+67
|
* Added LDAP simple auth support.Sergio Benitez2015-09-041-5/+20
|
* #1554 check adminFilter length before LDAP searchUnknwon2015-09-011-12/+14
|
* Set IsAdmin using LDAPGirish Ramakrishnan2015-08-181-7/+24
| | | | | | | | | The IsAdmin flag is set based on whether the admin filter returned any result. The admin filter is applied with the user dn as the search root. In the future, we should update IsAdmin as well on each login. Alternately, we can have a periodic sync operation.
* work on #986 and fix a LDAP crashUnknwon2015-08-181-4/+4
|
* Small style fixes to the LDAP module READMESergio Benitez2015-08-161-3/+3
|
* Merge branch 'develop' of https://github.com/SergioBenitez/gogs into developUnknwon2015-08-163-114/+135
|\ | | | | | | | | # Conflicts: # modules/bindata/bindata.go
| * Updated the LDAP module readme.Sergio Benitez2015-08-121-29/+29
| |
| * Significantly enhanced LDAP support in Gogs.Sergio Benitez2015-08-123-101/+125
|/
* Get username, name, surname and e-mail from LDAP serverLauris BH2015-02-081-21/+27
|
* Fix spelling errors in comments.Joseph Crail2014-12-061-2/+2
|
* Remove ldap depUnknwon2014-09-071-6/+6
|
* Removed trailing white spacesTristan Storch2014-08-301-1/+1
| | | | | | | | | | Removed trailing whitespaces with ```sh for file in `grep -r " $" * | cut -d : -f 1 | sort | uniq | grep -v " "`; do sed -i 's/[ \t]*$//' $file; done ``` and some handwork.
* New UI merge in progressUnknwon2014-07-261-1/+1
|
* implicated error for ldap dialLunny Xiao2014-05-161-2/+1
|
* Add LDAP over SSL supportSebastian Jackel2014-05-151-3/+13
|
* ignore broken testsUnknown2014-05-111-27/+24
|
* merge all login methodsLunny Xiao2014-05-111-2/+2
|\
* | add login name for auth typeLunny Xiao2014-05-111-0/+32
|/
* ldap supportLunny Xiao2014-05-031-4/+5
|
* initial support for LDAP authentication/MSADjuju20132014-04-232-0/+129