Платформа ЦРНП "Мирокод" для разработки проектов
https://git.mirocod.ru
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
119 lines
3.4 KiB
119 lines
3.4 KiB
// Copyright 2021 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package ldap |
|
|
|
import ( |
|
"fmt" |
|
"strings" |
|
|
|
asymkey_model "code.gitea.io/gitea/models/asymkey" |
|
"code.gitea.io/gitea/models/auth" |
|
"code.gitea.io/gitea/models/db" |
|
user_model "code.gitea.io/gitea/models/user" |
|
"code.gitea.io/gitea/modules/util" |
|
"code.gitea.io/gitea/services/mailer" |
|
user_service "code.gitea.io/gitea/services/user" |
|
) |
|
|
|
// Authenticate queries if login/password is valid against the LDAP directory pool, |
|
// and create a local user if success when enabled. |
|
func (source *Source) Authenticate(user *user_model.User, userName, password string) (*user_model.User, error) { |
|
loginName := userName |
|
if user != nil { |
|
loginName = user.LoginName |
|
} |
|
sr := source.SearchEntry(loginName, password, source.authSource.Type == auth.DLDAP) |
|
if sr == nil { |
|
// User not in LDAP, do nothing |
|
return nil, user_model.ErrUserNotExist{Name: loginName} |
|
} |
|
|
|
isAttributeSSHPublicKeySet := len(strings.TrimSpace(source.AttributeSSHPublicKey)) > 0 |
|
|
|
// Update User admin flag if exist |
|
if isExist, err := user_model.IsUserExist(0, sr.Username); err != nil { |
|
return nil, err |
|
} else if isExist { |
|
if user == nil { |
|
user, err = user_model.GetUserByName(sr.Username) |
|
if err != nil { |
|
return nil, err |
|
} |
|
} |
|
if user != nil && !user.ProhibitLogin { |
|
cols := make([]string, 0) |
|
if len(source.AdminFilter) > 0 && user.IsAdmin != sr.IsAdmin { |
|
// Change existing admin flag only if AdminFilter option is set |
|
user.IsAdmin = sr.IsAdmin |
|
cols = append(cols, "is_admin") |
|
} |
|
if !user.IsAdmin && len(source.RestrictedFilter) > 0 && user.IsRestricted != sr.IsRestricted { |
|
// Change existing restricted flag only if RestrictedFilter option is set |
|
user.IsRestricted = sr.IsRestricted |
|
cols = append(cols, "is_restricted") |
|
} |
|
if len(cols) > 0 { |
|
err = user_model.UpdateUserCols(db.DefaultContext, user, cols...) |
|
if err != nil { |
|
return nil, err |
|
} |
|
} |
|
} |
|
} |
|
|
|
if user != nil { |
|
if isAttributeSSHPublicKeySet && asymkey_model.SynchronizePublicKeys(user, source.authSource, sr.SSHPublicKey) { |
|
return user, asymkey_model.RewriteAllPublicKeys() |
|
} |
|
|
|
return user, nil |
|
} |
|
|
|
// Fallback. |
|
if len(sr.Username) == 0 { |
|
sr.Username = userName |
|
} |
|
|
|
if len(sr.Mail) == 0 { |
|
sr.Mail = fmt.Sprintf("%s@localhost", sr.Username) |
|
} |
|
|
|
user = &user_model.User{ |
|
LowerName: strings.ToLower(sr.Username), |
|
Name: sr.Username, |
|
FullName: composeFullName(sr.Name, sr.Surname, sr.Username), |
|
Email: sr.Mail, |
|
LoginType: source.authSource.Type, |
|
LoginSource: source.authSource.ID, |
|
LoginName: userName, |
|
IsAdmin: sr.IsAdmin, |
|
} |
|
overwriteDefault := &user_model.CreateUserOverwriteOptions{ |
|
IsRestricted: util.OptionalBoolOf(sr.IsRestricted), |
|
IsActive: util.OptionalBoolTrue, |
|
} |
|
|
|
err := user_model.CreateUser(user, overwriteDefault) |
|
if err != nil { |
|
return user, err |
|
} |
|
|
|
mailer.SendRegisterNotifyMail(user) |
|
|
|
if isAttributeSSHPublicKeySet && asymkey_model.AddPublicKeysBySource(user, source.authSource, sr.SSHPublicKey) { |
|
err = asymkey_model.RewriteAllPublicKeys() |
|
} |
|
|
|
if err == nil && len(source.AttributeAvatar) > 0 { |
|
_ = user_service.UploadAvatar(user, sr.Avatar) |
|
} |
|
|
|
return user, err |
|
} |
|
|
|
// IsSkipLocalTwoFA returns if this source should skip local 2fa for password authentication |
|
func (source *Source) IsSkipLocalTwoFA() bool { |
|
return source.SkipLocalTwoFA |
|
}
|
|
|