You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

auths.go 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433
  1. // Copyright 2014 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package admin
  5. import (
  6. "errors"
  7. "fmt"
  8. "net/http"
  9. "net/url"
  10. "regexp"
  11. "strconv"
  12. "strings"
  13. "code.gitea.io/gitea/models/auth"
  14. "code.gitea.io/gitea/modules/auth/pam"
  15. "code.gitea.io/gitea/modules/base"
  16. "code.gitea.io/gitea/modules/context"
  17. "code.gitea.io/gitea/modules/log"
  18. "code.gitea.io/gitea/modules/setting"
  19. "code.gitea.io/gitea/modules/util"
  20. "code.gitea.io/gitea/modules/web"
  21. auth_service "code.gitea.io/gitea/services/auth"
  22. "code.gitea.io/gitea/services/auth/source/ldap"
  23. "code.gitea.io/gitea/services/auth/source/oauth2"
  24. pam_service "code.gitea.io/gitea/services/auth/source/pam"
  25. "code.gitea.io/gitea/services/auth/source/smtp"
  26. "code.gitea.io/gitea/services/auth/source/sspi"
  27. "code.gitea.io/gitea/services/forms"
  28. "xorm.io/xorm/convert"
  29. )
  30. const (
  31. tplAuths base.TplName = "admin/auth/list"
  32. tplAuthNew base.TplName = "admin/auth/new"
  33. tplAuthEdit base.TplName = "admin/auth/edit"
  34. )
  35. var (
  36. separatorAntiPattern = regexp.MustCompile(`[^\w-\.]`)
  37. langCodePattern = regexp.MustCompile(`^[a-z]{2}-[A-Z]{2}$`)
  38. )
  39. // Authentications show authentication config page
  40. func Authentications(ctx *context.Context) {
  41. ctx.Data["Title"] = ctx.Tr("admin.authentication")
  42. ctx.Data["PageIsAdmin"] = true
  43. ctx.Data["PageIsAdminAuthentications"] = true
  44. var err error
  45. ctx.Data["Sources"], err = auth.Sources()
  46. if err != nil {
  47. ctx.ServerError("auth.Sources", err)
  48. return
  49. }
  50. ctx.Data["Total"] = auth.CountSources()
  51. ctx.HTML(http.StatusOK, tplAuths)
  52. }
  53. type dropdownItem struct {
  54. Name string
  55. Type interface{}
  56. }
  57. var (
  58. authSources = func() []dropdownItem {
  59. items := []dropdownItem{
  60. {auth.LDAP.String(), auth.LDAP},
  61. {auth.DLDAP.String(), auth.DLDAP},
  62. {auth.SMTP.String(), auth.SMTP},
  63. {auth.OAuth2.String(), auth.OAuth2},
  64. {auth.SSPI.String(), auth.SSPI},
  65. }
  66. if pam.Supported {
  67. items = append(items, dropdownItem{auth.Names[auth.PAM], auth.PAM})
  68. }
  69. return items
  70. }()
  71. securityProtocols = []dropdownItem{
  72. {ldap.SecurityProtocolNames[ldap.SecurityProtocolUnencrypted], ldap.SecurityProtocolUnencrypted},
  73. {ldap.SecurityProtocolNames[ldap.SecurityProtocolLDAPS], ldap.SecurityProtocolLDAPS},
  74. {ldap.SecurityProtocolNames[ldap.SecurityProtocolStartTLS], ldap.SecurityProtocolStartTLS},
  75. }
  76. )
  77. // NewAuthSource render adding a new auth source page
  78. func NewAuthSource(ctx *context.Context) {
  79. ctx.Data["Title"] = ctx.Tr("admin.auths.new")
  80. ctx.Data["PageIsAdmin"] = true
  81. ctx.Data["PageIsAdminAuthentications"] = true
  82. ctx.Data["type"] = auth.LDAP
  83. ctx.Data["CurrentTypeName"] = auth.Names[auth.LDAP]
  84. ctx.Data["CurrentSecurityProtocol"] = ldap.SecurityProtocolNames[ldap.SecurityProtocolUnencrypted]
  85. ctx.Data["smtp_auth"] = "PLAIN"
  86. ctx.Data["is_active"] = true
  87. ctx.Data["is_sync_enabled"] = true
  88. ctx.Data["AuthSources"] = authSources
  89. ctx.Data["SecurityProtocols"] = securityProtocols
  90. ctx.Data["SMTPAuths"] = smtp.Authenticators
  91. oauth2providers := oauth2.GetOAuth2Providers()
  92. ctx.Data["OAuth2Providers"] = oauth2providers
  93. ctx.Data["SSPIAutoCreateUsers"] = true
  94. ctx.Data["SSPIAutoActivateUsers"] = true
  95. ctx.Data["SSPIStripDomainNames"] = true
  96. ctx.Data["SSPISeparatorReplacement"] = "_"
  97. ctx.Data["SSPIDefaultLanguage"] = ""
  98. // only the first as default
  99. ctx.Data["oauth2_provider"] = oauth2providers[0]
  100. ctx.HTML(http.StatusOK, tplAuthNew)
  101. }
  102. func parseLDAPConfig(form forms.AuthenticationForm) *ldap.Source {
  103. var pageSize uint32
  104. if form.UsePagedSearch {
  105. pageSize = uint32(form.SearchPageSize)
  106. }
  107. return &ldap.Source{
  108. Name: form.Name,
  109. Host: form.Host,
  110. Port: form.Port,
  111. SecurityProtocol: ldap.SecurityProtocol(form.SecurityProtocol),
  112. SkipVerify: form.SkipVerify,
  113. BindDN: form.BindDN,
  114. UserDN: form.UserDN,
  115. BindPassword: form.BindPassword,
  116. UserBase: form.UserBase,
  117. AttributeUsername: form.AttributeUsername,
  118. AttributeName: form.AttributeName,
  119. AttributeSurname: form.AttributeSurname,
  120. AttributeMail: form.AttributeMail,
  121. AttributesInBind: form.AttributesInBind,
  122. AttributeSSHPublicKey: form.AttributeSSHPublicKey,
  123. AttributeAvatar: form.AttributeAvatar,
  124. SearchPageSize: pageSize,
  125. Filter: form.Filter,
  126. GroupsEnabled: form.GroupsEnabled,
  127. GroupDN: form.GroupDN,
  128. GroupFilter: form.GroupFilter,
  129. GroupMemberUID: form.GroupMemberUID,
  130. UserUID: form.UserUID,
  131. AdminFilter: form.AdminFilter,
  132. RestrictedFilter: form.RestrictedFilter,
  133. AllowDeactivateAll: form.AllowDeactivateAll,
  134. Enabled: true,
  135. SkipLocalTwoFA: form.SkipLocalTwoFA,
  136. }
  137. }
  138. func parseSMTPConfig(form forms.AuthenticationForm) *smtp.Source {
  139. return &smtp.Source{
  140. Auth: form.SMTPAuth,
  141. Host: form.SMTPHost,
  142. Port: form.SMTPPort,
  143. AllowedDomains: form.AllowedDomains,
  144. ForceSMTPS: form.ForceSMTPS,
  145. SkipVerify: form.SkipVerify,
  146. HeloHostname: form.HeloHostname,
  147. DisableHelo: form.DisableHelo,
  148. SkipLocalTwoFA: form.SkipLocalTwoFA,
  149. }
  150. }
  151. func parseOAuth2Config(form forms.AuthenticationForm) *oauth2.Source {
  152. var customURLMapping *oauth2.CustomURLMapping
  153. if form.Oauth2UseCustomURL {
  154. customURLMapping = &oauth2.CustomURLMapping{
  155. TokenURL: form.Oauth2TokenURL,
  156. AuthURL: form.Oauth2AuthURL,
  157. ProfileURL: form.Oauth2ProfileURL,
  158. EmailURL: form.Oauth2EmailURL,
  159. Tenant: form.Oauth2Tenant,
  160. }
  161. } else {
  162. customURLMapping = nil
  163. }
  164. return &oauth2.Source{
  165. Provider: form.Oauth2Provider,
  166. ClientID: form.Oauth2Key,
  167. ClientSecret: form.Oauth2Secret,
  168. OpenIDConnectAutoDiscoveryURL: form.OpenIDConnectAutoDiscoveryURL,
  169. CustomURLMapping: customURLMapping,
  170. IconURL: form.Oauth2IconURL,
  171. Scopes: strings.Split(form.Oauth2Scopes, ","),
  172. RequiredClaimName: form.Oauth2RequiredClaimName,
  173. RequiredClaimValue: form.Oauth2RequiredClaimValue,
  174. SkipLocalTwoFA: form.SkipLocalTwoFA,
  175. }
  176. }
  177. func parseSSPIConfig(ctx *context.Context, form forms.AuthenticationForm) (*sspi.Source, error) {
  178. if util.IsEmptyString(form.SSPISeparatorReplacement) {
  179. ctx.Data["Err_SSPISeparatorReplacement"] = true
  180. return nil, errors.New(ctx.Tr("form.SSPISeparatorReplacement") + ctx.Tr("form.require_error"))
  181. }
  182. if separatorAntiPattern.MatchString(form.SSPISeparatorReplacement) {
  183. ctx.Data["Err_SSPISeparatorReplacement"] = true
  184. return nil, errors.New(ctx.Tr("form.SSPISeparatorReplacement") + ctx.Tr("form.alpha_dash_dot_error"))
  185. }
  186. if form.SSPIDefaultLanguage != "" && !langCodePattern.MatchString(form.SSPIDefaultLanguage) {
  187. ctx.Data["Err_SSPIDefaultLanguage"] = true
  188. return nil, errors.New(ctx.Tr("form.lang_select_error"))
  189. }
  190. return &sspi.Source{
  191. AutoCreateUsers: form.SSPIAutoCreateUsers,
  192. AutoActivateUsers: form.SSPIAutoActivateUsers,
  193. StripDomainNames: form.SSPIStripDomainNames,
  194. SeparatorReplacement: form.SSPISeparatorReplacement,
  195. DefaultLanguage: form.SSPIDefaultLanguage,
  196. }, nil
  197. }
  198. // NewAuthSourcePost response for adding an auth source
  199. func NewAuthSourcePost(ctx *context.Context) {
  200. form := *web.GetForm(ctx).(*forms.AuthenticationForm)
  201. ctx.Data["Title"] = ctx.Tr("admin.auths.new")
  202. ctx.Data["PageIsAdmin"] = true
  203. ctx.Data["PageIsAdminAuthentications"] = true
  204. ctx.Data["CurrentTypeName"] = auth.Type(form.Type).String()
  205. ctx.Data["CurrentSecurityProtocol"] = ldap.SecurityProtocolNames[ldap.SecurityProtocol(form.SecurityProtocol)]
  206. ctx.Data["AuthSources"] = authSources
  207. ctx.Data["SecurityProtocols"] = securityProtocols
  208. ctx.Data["SMTPAuths"] = smtp.Authenticators
  209. oauth2providers := oauth2.GetOAuth2Providers()
  210. ctx.Data["OAuth2Providers"] = oauth2providers
  211. ctx.Data["SSPIAutoCreateUsers"] = true
  212. ctx.Data["SSPIAutoActivateUsers"] = true
  213. ctx.Data["SSPIStripDomainNames"] = true
  214. ctx.Data["SSPISeparatorReplacement"] = "_"
  215. ctx.Data["SSPIDefaultLanguage"] = ""
  216. hasTLS := false
  217. var config convert.Conversion
  218. switch auth.Type(form.Type) {
  219. case auth.LDAP, auth.DLDAP:
  220. config = parseLDAPConfig(form)
  221. hasTLS = ldap.SecurityProtocol(form.SecurityProtocol) > ldap.SecurityProtocolUnencrypted
  222. case auth.SMTP:
  223. config = parseSMTPConfig(form)
  224. hasTLS = true
  225. case auth.PAM:
  226. config = &pam_service.Source{
  227. ServiceName: form.PAMServiceName,
  228. EmailDomain: form.PAMEmailDomain,
  229. SkipLocalTwoFA: form.SkipLocalTwoFA,
  230. }
  231. case auth.OAuth2:
  232. config = parseOAuth2Config(form)
  233. case auth.SSPI:
  234. var err error
  235. config, err = parseSSPIConfig(ctx, form)
  236. if err != nil {
  237. ctx.RenderWithErr(err.Error(), tplAuthNew, form)
  238. return
  239. }
  240. existing, err := auth.SourcesByType(auth.SSPI)
  241. if err != nil || len(existing) > 0 {
  242. ctx.Data["Err_Type"] = true
  243. ctx.RenderWithErr(ctx.Tr("admin.auths.login_source_of_type_exist"), tplAuthNew, form)
  244. return
  245. }
  246. default:
  247. ctx.Error(http.StatusBadRequest)
  248. return
  249. }
  250. ctx.Data["HasTLS"] = hasTLS
  251. if ctx.HasError() {
  252. ctx.HTML(http.StatusOK, tplAuthNew)
  253. return
  254. }
  255. if err := auth.CreateSource(&auth.Source{
  256. Type: auth.Type(form.Type),
  257. Name: form.Name,
  258. IsActive: form.IsActive,
  259. IsSyncEnabled: form.IsSyncEnabled,
  260. Cfg: config,
  261. }); err != nil {
  262. if auth.IsErrSourceAlreadyExist(err) {
  263. ctx.Data["Err_Name"] = true
  264. ctx.RenderWithErr(ctx.Tr("admin.auths.login_source_exist", err.(auth.ErrSourceAlreadyExist).Name), tplAuthNew, form)
  265. } else {
  266. ctx.ServerError("auth.CreateSource", err)
  267. }
  268. return
  269. }
  270. log.Trace("Authentication created by admin(%s): %s", ctx.User.Name, form.Name)
  271. ctx.Flash.Success(ctx.Tr("admin.auths.new_success", form.Name))
  272. ctx.Redirect(setting.AppSubURL + "/admin/auths")
  273. }
  274. // EditAuthSource render editing auth source page
  275. func EditAuthSource(ctx *context.Context) {
  276. ctx.Data["Title"] = ctx.Tr("admin.auths.edit")
  277. ctx.Data["PageIsAdmin"] = true
  278. ctx.Data["PageIsAdminAuthentications"] = true
  279. ctx.Data["SecurityProtocols"] = securityProtocols
  280. ctx.Data["SMTPAuths"] = smtp.Authenticators
  281. oauth2providers := oauth2.GetOAuth2Providers()
  282. ctx.Data["OAuth2Providers"] = oauth2providers
  283. source, err := auth.GetSourceByID(ctx.ParamsInt64(":authid"))
  284. if err != nil {
  285. ctx.ServerError("auth.GetSourceByID", err)
  286. return
  287. }
  288. ctx.Data["Source"] = source
  289. ctx.Data["HasTLS"] = source.HasTLS()
  290. if source.IsOAuth2() {
  291. type Named interface {
  292. Name() string
  293. }
  294. for _, provider := range oauth2providers {
  295. if provider.Name() == source.Cfg.(Named).Name() {
  296. ctx.Data["CurrentOAuth2Provider"] = provider
  297. break
  298. }
  299. }
  300. }
  301. ctx.HTML(http.StatusOK, tplAuthEdit)
  302. }
  303. // EditAuthSourcePost response for editing auth source
  304. func EditAuthSourcePost(ctx *context.Context) {
  305. form := *web.GetForm(ctx).(*forms.AuthenticationForm)
  306. ctx.Data["Title"] = ctx.Tr("admin.auths.edit")
  307. ctx.Data["PageIsAdmin"] = true
  308. ctx.Data["PageIsAdminAuthentications"] = true
  309. ctx.Data["SMTPAuths"] = smtp.Authenticators
  310. oauth2providers := oauth2.GetOAuth2Providers()
  311. ctx.Data["OAuth2Providers"] = oauth2providers
  312. source, err := auth.GetSourceByID(ctx.ParamsInt64(":authid"))
  313. if err != nil {
  314. ctx.ServerError("auth.GetSourceByID", err)
  315. return
  316. }
  317. ctx.Data["Source"] = source
  318. ctx.Data["HasTLS"] = source.HasTLS()
  319. if ctx.HasError() {
  320. ctx.HTML(http.StatusOK, tplAuthEdit)
  321. return
  322. }
  323. var config convert.Conversion
  324. switch auth.Type(form.Type) {
  325. case auth.LDAP, auth.DLDAP:
  326. config = parseLDAPConfig(form)
  327. case auth.SMTP:
  328. config = parseSMTPConfig(form)
  329. case auth.PAM:
  330. config = &pam_service.Source{
  331. ServiceName: form.PAMServiceName,
  332. EmailDomain: form.PAMEmailDomain,
  333. }
  334. case auth.OAuth2:
  335. config = parseOAuth2Config(form)
  336. case auth.SSPI:
  337. config, err = parseSSPIConfig(ctx, form)
  338. if err != nil {
  339. ctx.RenderWithErr(err.Error(), tplAuthEdit, form)
  340. return
  341. }
  342. default:
  343. ctx.Error(http.StatusBadRequest)
  344. return
  345. }
  346. source.Name = form.Name
  347. source.IsActive = form.IsActive
  348. source.IsSyncEnabled = form.IsSyncEnabled
  349. source.Cfg = config
  350. if err := auth.UpdateSource(source); err != nil {
  351. if oauth2.IsErrOpenIDConnectInitialize(err) {
  352. ctx.Flash.Error(err.Error(), true)
  353. ctx.HTML(http.StatusOK, tplAuthEdit)
  354. } else {
  355. ctx.ServerError("UpdateSource", err)
  356. }
  357. return
  358. }
  359. log.Trace("Authentication changed by admin(%s): %d", ctx.User.Name, source.ID)
  360. ctx.Flash.Success(ctx.Tr("admin.auths.update_success"))
  361. ctx.Redirect(setting.AppSubURL + "/admin/auths/" + strconv.FormatInt(form.ID, 10))
  362. }
  363. // DeleteAuthSource response for deleting an auth source
  364. func DeleteAuthSource(ctx *context.Context) {
  365. source, err := auth.GetSourceByID(ctx.ParamsInt64(":authid"))
  366. if err != nil {
  367. ctx.ServerError("auth.GetSourceByID", err)
  368. return
  369. }
  370. if err = auth_service.DeleteSource(source); err != nil {
  371. if auth.IsErrSourceInUse(err) {
  372. ctx.Flash.Error(ctx.Tr("admin.auths.still_in_used"))
  373. } else {
  374. ctx.Flash.Error(fmt.Sprintf("auth_service.DeleteSource: %v", err))
  375. }
  376. ctx.JSON(http.StatusOK, map[string]interface{}{
  377. "redirect": setting.AppSubURL + "/admin/auths/" + url.PathEscape(ctx.Params(":authid")),
  378. })
  379. return
  380. }
  381. log.Trace("Authentication deleted by admin(%s): %d", ctx.User.Name, source.ID)
  382. ctx.Flash.Success(ctx.Tr("admin.auths.deletion_success"))
  383. ctx.JSON(http.StatusOK, map[string]interface{}{
  384. "redirect": setting.AppSubURL + "/admin/auths",
  385. })
  386. }