You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auths.go 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package admin
  4. import (
  5. "errors"
  6. "fmt"
  7. "net/http"
  8. "net/url"
  9. "regexp"
  10. "strconv"
  11. "strings"
  12. "code.gitea.io/gitea/models/auth"
  13. "code.gitea.io/gitea/models/db"
  14. "code.gitea.io/gitea/modules/auth/pam"
  15. "code.gitea.io/gitea/modules/base"
  16. "code.gitea.io/gitea/modules/context"
  17. "code.gitea.io/gitea/modules/log"
  18. "code.gitea.io/gitea/modules/setting"
  19. "code.gitea.io/gitea/modules/util"
  20. "code.gitea.io/gitea/modules/web"
  21. auth_service "code.gitea.io/gitea/services/auth"
  22. "code.gitea.io/gitea/services/auth/source/ldap"
  23. "code.gitea.io/gitea/services/auth/source/oauth2"
  24. pam_service "code.gitea.io/gitea/services/auth/source/pam"
  25. "code.gitea.io/gitea/services/auth/source/smtp"
  26. "code.gitea.io/gitea/services/auth/source/sspi"
  27. "code.gitea.io/gitea/services/forms"
  28. "xorm.io/xorm/convert"
  29. )
  30. const (
  31. tplAuths base.TplName = "admin/auth/list"
  32. tplAuthNew base.TplName = "admin/auth/new"
  33. tplAuthEdit base.TplName = "admin/auth/edit"
  34. )
  35. var (
  36. separatorAntiPattern = regexp.MustCompile(`[^\w-\.]`)
  37. langCodePattern = regexp.MustCompile(`^[a-z]{2}-[A-Z]{2}$`)
  38. )
  39. // Authentications show authentication config page
  40. func Authentications(ctx *context.Context) {
  41. ctx.Data["Title"] = ctx.Tr("admin.authentication")
  42. ctx.Data["PageIsAdminAuthentications"] = true
  43. var err error
  44. ctx.Data["Sources"], ctx.Data["Total"], err = db.FindAndCount[auth.Source](ctx, auth.FindSourcesOptions{})
  45. if err != nil {
  46. ctx.ServerError("auth.Sources", err)
  47. return
  48. }
  49. ctx.HTML(http.StatusOK, tplAuths)
  50. }
  51. type dropdownItem struct {
  52. Name string
  53. Type any
  54. }
  55. var (
  56. authSources = func() []dropdownItem {
  57. items := []dropdownItem{
  58. {auth.LDAP.String(), auth.LDAP},
  59. {auth.DLDAP.String(), auth.DLDAP},
  60. {auth.SMTP.String(), auth.SMTP},
  61. {auth.OAuth2.String(), auth.OAuth2},
  62. {auth.SSPI.String(), auth.SSPI},
  63. }
  64. if pam.Supported {
  65. items = append(items, dropdownItem{auth.Names[auth.PAM], auth.PAM})
  66. }
  67. return items
  68. }()
  69. securityProtocols = []dropdownItem{
  70. {ldap.SecurityProtocolNames[ldap.SecurityProtocolUnencrypted], ldap.SecurityProtocolUnencrypted},
  71. {ldap.SecurityProtocolNames[ldap.SecurityProtocolLDAPS], ldap.SecurityProtocolLDAPS},
  72. {ldap.SecurityProtocolNames[ldap.SecurityProtocolStartTLS], ldap.SecurityProtocolStartTLS},
  73. }
  74. )
  75. // NewAuthSource render adding a new auth source page
  76. func NewAuthSource(ctx *context.Context) {
  77. ctx.Data["Title"] = ctx.Tr("admin.auths.new")
  78. ctx.Data["PageIsAdminAuthentications"] = true
  79. ctx.Data["type"] = auth.LDAP.Int()
  80. ctx.Data["CurrentTypeName"] = auth.Names[auth.LDAP]
  81. ctx.Data["CurrentSecurityProtocol"] = ldap.SecurityProtocolNames[ldap.SecurityProtocolUnencrypted]
  82. ctx.Data["smtp_auth"] = "PLAIN"
  83. ctx.Data["is_active"] = true
  84. ctx.Data["is_sync_enabled"] = true
  85. ctx.Data["AuthSources"] = authSources
  86. ctx.Data["SecurityProtocols"] = securityProtocols
  87. ctx.Data["SMTPAuths"] = smtp.Authenticators
  88. oauth2providers := oauth2.GetSupportedOAuth2Providers()
  89. ctx.Data["OAuth2Providers"] = oauth2providers
  90. ctx.Data["SSPIAutoCreateUsers"] = true
  91. ctx.Data["SSPIAutoActivateUsers"] = true
  92. ctx.Data["SSPIStripDomainNames"] = true
  93. ctx.Data["SSPISeparatorReplacement"] = "_"
  94. ctx.Data["SSPIDefaultLanguage"] = ""
  95. // only the first as default
  96. ctx.Data["oauth2_provider"] = oauth2providers[0].Name()
  97. ctx.HTML(http.StatusOK, tplAuthNew)
  98. }
  99. func parseLDAPConfig(form forms.AuthenticationForm) *ldap.Source {
  100. var pageSize uint32
  101. if form.UsePagedSearch {
  102. pageSize = uint32(form.SearchPageSize)
  103. }
  104. return &ldap.Source{
  105. Name: form.Name,
  106. Host: form.Host,
  107. Port: form.Port,
  108. SecurityProtocol: ldap.SecurityProtocol(form.SecurityProtocol),
  109. SkipVerify: form.SkipVerify,
  110. BindDN: form.BindDN,
  111. UserDN: form.UserDN,
  112. BindPassword: form.BindPassword,
  113. UserBase: form.UserBase,
  114. AttributeUsername: form.AttributeUsername,
  115. AttributeName: form.AttributeName,
  116. AttributeSurname: form.AttributeSurname,
  117. AttributeMail: form.AttributeMail,
  118. AttributesInBind: form.AttributesInBind,
  119. AttributeSSHPublicKey: form.AttributeSSHPublicKey,
  120. AttributeAvatar: form.AttributeAvatar,
  121. SearchPageSize: pageSize,
  122. Filter: form.Filter,
  123. GroupsEnabled: form.GroupsEnabled,
  124. GroupDN: form.GroupDN,
  125. GroupFilter: form.GroupFilter,
  126. GroupMemberUID: form.GroupMemberUID,
  127. GroupTeamMap: form.GroupTeamMap,
  128. GroupTeamMapRemoval: form.GroupTeamMapRemoval,
  129. UserUID: form.UserUID,
  130. AdminFilter: form.AdminFilter,
  131. RestrictedFilter: form.RestrictedFilter,
  132. AllowDeactivateAll: form.AllowDeactivateAll,
  133. Enabled: true,
  134. SkipLocalTwoFA: form.SkipLocalTwoFA,
  135. }
  136. }
  137. func parseSMTPConfig(form forms.AuthenticationForm) *smtp.Source {
  138. return &smtp.Source{
  139. Auth: form.SMTPAuth,
  140. Host: form.SMTPHost,
  141. Port: form.SMTPPort,
  142. AllowedDomains: form.AllowedDomains,
  143. ForceSMTPS: form.ForceSMTPS,
  144. SkipVerify: form.SkipVerify,
  145. HeloHostname: form.HeloHostname,
  146. DisableHelo: form.DisableHelo,
  147. SkipLocalTwoFA: form.SkipLocalTwoFA,
  148. }
  149. }
  150. func parseOAuth2Config(form forms.AuthenticationForm) *oauth2.Source {
  151. var customURLMapping *oauth2.CustomURLMapping
  152. if form.Oauth2UseCustomURL {
  153. customURLMapping = &oauth2.CustomURLMapping{
  154. TokenURL: form.Oauth2TokenURL,
  155. AuthURL: form.Oauth2AuthURL,
  156. ProfileURL: form.Oauth2ProfileURL,
  157. EmailURL: form.Oauth2EmailURL,
  158. Tenant: form.Oauth2Tenant,
  159. }
  160. } else {
  161. customURLMapping = nil
  162. }
  163. var scopes []string
  164. for _, s := range strings.Split(form.Oauth2Scopes, ",") {
  165. s = strings.TrimSpace(s)
  166. if s != "" {
  167. scopes = append(scopes, s)
  168. }
  169. }
  170. return &oauth2.Source{
  171. Provider: form.Oauth2Provider,
  172. ClientID: form.Oauth2Key,
  173. ClientSecret: form.Oauth2Secret,
  174. OpenIDConnectAutoDiscoveryURL: form.OpenIDConnectAutoDiscoveryURL,
  175. CustomURLMapping: customURLMapping,
  176. IconURL: form.Oauth2IconURL,
  177. Scopes: scopes,
  178. RequiredClaimName: form.Oauth2RequiredClaimName,
  179. RequiredClaimValue: form.Oauth2RequiredClaimValue,
  180. SkipLocalTwoFA: form.SkipLocalTwoFA,
  181. GroupClaimName: form.Oauth2GroupClaimName,
  182. RestrictedGroup: form.Oauth2RestrictedGroup,
  183. AdminGroup: form.Oauth2AdminGroup,
  184. GroupTeamMap: form.Oauth2GroupTeamMap,
  185. GroupTeamMapRemoval: form.Oauth2GroupTeamMapRemoval,
  186. }
  187. }
  188. func parseSSPIConfig(ctx *context.Context, form forms.AuthenticationForm) (*sspi.Source, error) {
  189. if util.IsEmptyString(form.SSPISeparatorReplacement) {
  190. ctx.Data["Err_SSPISeparatorReplacement"] = true
  191. return nil, errors.New(ctx.Locale.TrString("form.SSPISeparatorReplacement") + ctx.Locale.TrString("form.require_error"))
  192. }
  193. if separatorAntiPattern.MatchString(form.SSPISeparatorReplacement) {
  194. ctx.Data["Err_SSPISeparatorReplacement"] = true
  195. return nil, errors.New(ctx.Locale.TrString("form.SSPISeparatorReplacement") + ctx.Locale.TrString("form.alpha_dash_dot_error"))
  196. }
  197. if form.SSPIDefaultLanguage != "" && !langCodePattern.MatchString(form.SSPIDefaultLanguage) {
  198. ctx.Data["Err_SSPIDefaultLanguage"] = true
  199. return nil, errors.New(ctx.Locale.TrString("form.lang_select_error"))
  200. }
  201. return &sspi.Source{
  202. AutoCreateUsers: form.SSPIAutoCreateUsers,
  203. AutoActivateUsers: form.SSPIAutoActivateUsers,
  204. StripDomainNames: form.SSPIStripDomainNames,
  205. SeparatorReplacement: form.SSPISeparatorReplacement,
  206. DefaultLanguage: form.SSPIDefaultLanguage,
  207. }, nil
  208. }
  209. // NewAuthSourcePost response for adding an auth source
  210. func NewAuthSourcePost(ctx *context.Context) {
  211. form := *web.GetForm(ctx).(*forms.AuthenticationForm)
  212. ctx.Data["Title"] = ctx.Tr("admin.auths.new")
  213. ctx.Data["PageIsAdminAuthentications"] = true
  214. ctx.Data["CurrentTypeName"] = auth.Type(form.Type).String()
  215. ctx.Data["CurrentSecurityProtocol"] = ldap.SecurityProtocolNames[ldap.SecurityProtocol(form.SecurityProtocol)]
  216. ctx.Data["AuthSources"] = authSources
  217. ctx.Data["SecurityProtocols"] = securityProtocols
  218. ctx.Data["SMTPAuths"] = smtp.Authenticators
  219. oauth2providers := oauth2.GetSupportedOAuth2Providers()
  220. ctx.Data["OAuth2Providers"] = oauth2providers
  221. ctx.Data["SSPIAutoCreateUsers"] = true
  222. ctx.Data["SSPIAutoActivateUsers"] = true
  223. ctx.Data["SSPIStripDomainNames"] = true
  224. ctx.Data["SSPISeparatorReplacement"] = "_"
  225. ctx.Data["SSPIDefaultLanguage"] = ""
  226. hasTLS := false
  227. var config convert.Conversion
  228. switch auth.Type(form.Type) {
  229. case auth.LDAP, auth.DLDAP:
  230. config = parseLDAPConfig(form)
  231. hasTLS = ldap.SecurityProtocol(form.SecurityProtocol) > ldap.SecurityProtocolUnencrypted
  232. case auth.SMTP:
  233. config = parseSMTPConfig(form)
  234. hasTLS = true
  235. case auth.PAM:
  236. config = &pam_service.Source{
  237. ServiceName: form.PAMServiceName,
  238. EmailDomain: form.PAMEmailDomain,
  239. SkipLocalTwoFA: form.SkipLocalTwoFA,
  240. }
  241. case auth.OAuth2:
  242. config = parseOAuth2Config(form)
  243. oauth2Config := config.(*oauth2.Source)
  244. if oauth2Config.Provider == "openidConnect" {
  245. discoveryURL, err := url.Parse(oauth2Config.OpenIDConnectAutoDiscoveryURL)
  246. if err != nil || (discoveryURL.Scheme != "http" && discoveryURL.Scheme != "https") {
  247. ctx.Data["Err_DiscoveryURL"] = true
  248. ctx.RenderWithErr(ctx.Tr("admin.auths.invalid_openIdConnectAutoDiscoveryURL"), tplAuthNew, form)
  249. return
  250. }
  251. }
  252. case auth.SSPI:
  253. var err error
  254. config, err = parseSSPIConfig(ctx, form)
  255. if err != nil {
  256. ctx.RenderWithErr(err.Error(), tplAuthNew, form)
  257. return
  258. }
  259. existing, err := db.Find[auth.Source](ctx, auth.FindSourcesOptions{LoginType: auth.SSPI})
  260. if err != nil || len(existing) > 0 {
  261. ctx.Data["Err_Type"] = true
  262. ctx.RenderWithErr(ctx.Tr("admin.auths.login_source_of_type_exist"), tplAuthNew, form)
  263. return
  264. }
  265. default:
  266. ctx.Error(http.StatusBadRequest)
  267. return
  268. }
  269. ctx.Data["HasTLS"] = hasTLS
  270. if ctx.HasError() {
  271. ctx.HTML(http.StatusOK, tplAuthNew)
  272. return
  273. }
  274. if err := auth.CreateSource(ctx, &auth.Source{
  275. Type: auth.Type(form.Type),
  276. Name: form.Name,
  277. IsActive: form.IsActive,
  278. IsSyncEnabled: form.IsSyncEnabled,
  279. Cfg: config,
  280. }); err != nil {
  281. if auth.IsErrSourceAlreadyExist(err) {
  282. ctx.Data["Err_Name"] = true
  283. ctx.RenderWithErr(ctx.Tr("admin.auths.login_source_exist", err.(auth.ErrSourceAlreadyExist).Name), tplAuthNew, form)
  284. } else if oauth2.IsErrOpenIDConnectInitialize(err) {
  285. ctx.Data["Err_DiscoveryURL"] = true
  286. unwrapped := err.(oauth2.ErrOpenIDConnectInitialize).Unwrap()
  287. ctx.RenderWithErr(ctx.Tr("admin.auths.unable_to_initialize_openid", unwrapped), tplAuthNew, form)
  288. } else {
  289. ctx.ServerError("auth.CreateSource", err)
  290. }
  291. return
  292. }
  293. log.Trace("Authentication created by admin(%s): %s", ctx.Doer.Name, form.Name)
  294. ctx.Flash.Success(ctx.Tr("admin.auths.new_success", form.Name))
  295. ctx.Redirect(setting.AppSubURL + "/admin/auths")
  296. }
  297. // EditAuthSource render editing auth source page
  298. func EditAuthSource(ctx *context.Context) {
  299. ctx.Data["Title"] = ctx.Tr("admin.auths.edit")
  300. ctx.Data["PageIsAdminAuthentications"] = true
  301. ctx.Data["SecurityProtocols"] = securityProtocols
  302. ctx.Data["SMTPAuths"] = smtp.Authenticators
  303. oauth2providers := oauth2.GetSupportedOAuth2Providers()
  304. ctx.Data["OAuth2Providers"] = oauth2providers
  305. source, err := auth.GetSourceByID(ctx, ctx.ParamsInt64(":authid"))
  306. if err != nil {
  307. ctx.ServerError("auth.GetSourceByID", err)
  308. return
  309. }
  310. ctx.Data["Source"] = source
  311. ctx.Data["HasTLS"] = source.HasTLS()
  312. if source.IsOAuth2() {
  313. type Named interface {
  314. Name() string
  315. }
  316. for _, provider := range oauth2providers {
  317. if provider.Name() == source.Cfg.(Named).Name() {
  318. ctx.Data["CurrentOAuth2Provider"] = provider
  319. break
  320. }
  321. }
  322. }
  323. ctx.HTML(http.StatusOK, tplAuthEdit)
  324. }
  325. // EditAuthSourcePost response for editing auth source
  326. func EditAuthSourcePost(ctx *context.Context) {
  327. form := *web.GetForm(ctx).(*forms.AuthenticationForm)
  328. ctx.Data["Title"] = ctx.Tr("admin.auths.edit")
  329. ctx.Data["PageIsAdminAuthentications"] = true
  330. ctx.Data["SMTPAuths"] = smtp.Authenticators
  331. oauth2providers := oauth2.GetSupportedOAuth2Providers()
  332. ctx.Data["OAuth2Providers"] = oauth2providers
  333. source, err := auth.GetSourceByID(ctx, ctx.ParamsInt64(":authid"))
  334. if err != nil {
  335. ctx.ServerError("auth.GetSourceByID", err)
  336. return
  337. }
  338. ctx.Data["Source"] = source
  339. ctx.Data["HasTLS"] = source.HasTLS()
  340. if ctx.HasError() {
  341. ctx.HTML(http.StatusOK, tplAuthEdit)
  342. return
  343. }
  344. var config convert.Conversion
  345. switch auth.Type(form.Type) {
  346. case auth.LDAP, auth.DLDAP:
  347. config = parseLDAPConfig(form)
  348. case auth.SMTP:
  349. config = parseSMTPConfig(form)
  350. case auth.PAM:
  351. config = &pam_service.Source{
  352. ServiceName: form.PAMServiceName,
  353. EmailDomain: form.PAMEmailDomain,
  354. }
  355. case auth.OAuth2:
  356. config = parseOAuth2Config(form)
  357. oauth2Config := config.(*oauth2.Source)
  358. if oauth2Config.Provider == "openidConnect" {
  359. discoveryURL, err := url.Parse(oauth2Config.OpenIDConnectAutoDiscoveryURL)
  360. if err != nil || (discoveryURL.Scheme != "http" && discoveryURL.Scheme != "https") {
  361. ctx.Data["Err_DiscoveryURL"] = true
  362. ctx.RenderWithErr(ctx.Tr("admin.auths.invalid_openIdConnectAutoDiscoveryURL"), tplAuthEdit, form)
  363. return
  364. }
  365. }
  366. case auth.SSPI:
  367. config, err = parseSSPIConfig(ctx, form)
  368. if err != nil {
  369. ctx.RenderWithErr(err.Error(), tplAuthEdit, form)
  370. return
  371. }
  372. default:
  373. ctx.Error(http.StatusBadRequest)
  374. return
  375. }
  376. source.Name = form.Name
  377. source.IsActive = form.IsActive
  378. source.IsSyncEnabled = form.IsSyncEnabled
  379. source.Cfg = config
  380. if err := auth.UpdateSource(ctx, source); err != nil {
  381. if auth.IsErrSourceAlreadyExist(err) {
  382. ctx.Data["Err_Name"] = true
  383. ctx.RenderWithErr(ctx.Tr("admin.auths.login_source_exist", err.(auth.ErrSourceAlreadyExist).Name), tplAuthEdit, form)
  384. } else if oauth2.IsErrOpenIDConnectInitialize(err) {
  385. ctx.Flash.Error(err.Error(), true)
  386. ctx.Data["Err_DiscoveryURL"] = true
  387. ctx.HTML(http.StatusOK, tplAuthEdit)
  388. } else {
  389. ctx.ServerError("UpdateSource", err)
  390. }
  391. return
  392. }
  393. log.Trace("Authentication changed by admin(%s): %d", ctx.Doer.Name, source.ID)
  394. ctx.Flash.Success(ctx.Tr("admin.auths.update_success"))
  395. ctx.Redirect(setting.AppSubURL + "/admin/auths/" + strconv.FormatInt(form.ID, 10))
  396. }
  397. // DeleteAuthSource response for deleting an auth source
  398. func DeleteAuthSource(ctx *context.Context) {
  399. source, err := auth.GetSourceByID(ctx, ctx.ParamsInt64(":authid"))
  400. if err != nil {
  401. ctx.ServerError("auth.GetSourceByID", err)
  402. return
  403. }
  404. if err = auth_service.DeleteSource(ctx, source); err != nil {
  405. if auth.IsErrSourceInUse(err) {
  406. ctx.Flash.Error(ctx.Tr("admin.auths.still_in_used"))
  407. } else {
  408. ctx.Flash.Error(fmt.Sprintf("auth_service.DeleteSource: %v", err))
  409. }
  410. ctx.JSONRedirect(setting.AppSubURL + "/admin/auths/" + url.PathEscape(ctx.Params(":authid")))
  411. return
  412. }
  413. log.Trace("Authentication deleted by admin(%s): %d", ctx.Doer.Name, source.ID)
  414. ctx.Flash.Success(ctx.Tr("admin.auths.deletion_success"))
  415. ctx.JSONRedirect(setting.AppSubURL + "/admin/auths")
  416. }