551 lines
24 KiB
Go
551 lines
24 KiB
Go
package validator
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/go-crypt/crypt/algorithm/argon2"
|
|
"github.com/go-crypt/crypt/algorithm/bcrypt"
|
|
"github.com/go-crypt/crypt/algorithm/pbkdf2"
|
|
"github.com/go-crypt/crypt/algorithm/scrypt"
|
|
"github.com/go-crypt/crypt/algorithm/shacrypt"
|
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
|
)
|
|
|
|
// ValidateAuthenticationBackend validates and updates the authentication backend configuration.
|
|
func ValidateAuthenticationBackend(config *schema.AuthenticationBackend, validator *schema.StructValidator) {
|
|
if config.LDAP == nil && config.File == nil {
|
|
validator.Push(fmt.Errorf(errFmtAuthBackendNotConfigured))
|
|
}
|
|
|
|
if config.RefreshInterval == "" {
|
|
config.RefreshInterval = schema.RefreshIntervalDefault
|
|
} else {
|
|
_, err := utils.ParseDurationString(config.RefreshInterval)
|
|
if err != nil && config.RefreshInterval != schema.ProfileRefreshDisabled && config.RefreshInterval != schema.ProfileRefreshAlways {
|
|
validator.Push(fmt.Errorf(errFmtAuthBackendRefreshInterval, config.RefreshInterval, err))
|
|
}
|
|
}
|
|
|
|
if config.PasswordReset.CustomURL.String() != "" {
|
|
switch config.PasswordReset.CustomURL.Scheme {
|
|
case schemeHTTP, schemeHTTPS:
|
|
config.PasswordReset.Disable = false
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtAuthBackendPasswordResetCustomURLScheme, config.PasswordReset.CustomURL.String(), config.PasswordReset.CustomURL.Scheme))
|
|
}
|
|
}
|
|
|
|
if config.LDAP != nil && config.File != nil {
|
|
validator.Push(fmt.Errorf(errFmtAuthBackendMultipleConfigured))
|
|
}
|
|
|
|
if config.File != nil {
|
|
validateFileAuthenticationBackend(config.File, validator)
|
|
}
|
|
|
|
if config.LDAP != nil {
|
|
validateLDAPAuthenticationBackend(config, validator)
|
|
}
|
|
}
|
|
|
|
// validateFileAuthenticationBackend validates and updates the file authentication backend configuration.
|
|
func validateFileAuthenticationBackend(config *schema.FileAuthenticationBackend, validator *schema.StructValidator) {
|
|
if config.Path == "" {
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPathNotConfigured))
|
|
}
|
|
|
|
ValidatePasswordConfiguration(&config.Password, validator)
|
|
}
|
|
|
|
// ValidatePasswordConfiguration validates the file auth backend password configuration.
|
|
func ValidatePasswordConfiguration(config *schema.Password, validator *schema.StructValidator) {
|
|
validateFileAuthenticationBackendPasswordConfigLegacy(config)
|
|
|
|
switch {
|
|
case config.Algorithm == "":
|
|
config.Algorithm = schema.DefaultPasswordConfig.Algorithm
|
|
case utils.IsStringInSlice(config.Algorithm, validHashAlgorithms):
|
|
break
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordUnknownAlg, strJoinOr(validHashAlgorithms), config.Algorithm))
|
|
}
|
|
|
|
validateFileAuthenticationBackendPasswordConfigArgon2(config, validator)
|
|
validateFileAuthenticationBackendPasswordConfigSHA2Crypt(config, validator)
|
|
validateFileAuthenticationBackendPasswordConfigPBKDF2(config, validator)
|
|
validateFileAuthenticationBackendPasswordConfigBCrypt(config, validator)
|
|
validateFileAuthenticationBackendPasswordConfigSCrypt(config, validator)
|
|
}
|
|
|
|
//nolint:gocyclo // Function is well formed.
|
|
func validateFileAuthenticationBackendPasswordConfigArgon2(config *schema.Password, validator *schema.StructValidator) {
|
|
switch {
|
|
case config.Argon2.Variant == "":
|
|
config.Argon2.Variant = schema.DefaultPasswordConfig.Argon2.Variant
|
|
case utils.IsStringInSlice(config.Argon2.Variant, validArgon2Variants):
|
|
break
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordInvalidVariant, hashArgon2, strJoinOr(validArgon2Variants), config.Argon2.Variant))
|
|
}
|
|
|
|
switch {
|
|
case config.Argon2.Iterations == 0:
|
|
config.Argon2.Iterations = schema.DefaultPasswordConfig.Argon2.Iterations
|
|
case config.Argon2.Iterations < argon2.IterationsMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashArgon2, "iterations", config.Argon2.Iterations, argon2.IterationsMin))
|
|
case config.Argon2.Iterations > argon2.IterationsMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashArgon2, "iterations", config.Argon2.Iterations, argon2.IterationsMax))
|
|
}
|
|
|
|
switch {
|
|
case config.Argon2.Parallelism == 0:
|
|
config.Argon2.Parallelism = schema.DefaultPasswordConfig.Argon2.Parallelism
|
|
case config.Argon2.Parallelism < argon2.ParallelismMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashArgon2, "parallelism", config.Argon2.Parallelism, argon2.ParallelismMin))
|
|
case config.Argon2.Parallelism > argon2.ParallelismMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashArgon2, "parallelism", config.Argon2.Parallelism, argon2.ParallelismMax))
|
|
}
|
|
|
|
switch {
|
|
case config.Argon2.Memory == 0:
|
|
config.Argon2.Memory = schema.DefaultPasswordConfig.Argon2.Memory
|
|
case config.Argon2.Memory < argon2.MemoryMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashArgon2, "memory", config.Argon2.Memory, argon2.MemoryMin))
|
|
case uint64(config.Argon2.Memory) > uint64(argon2.MemoryMax):
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashArgon2, "memory", config.Argon2.Memory, argon2.MemoryMax))
|
|
case config.Argon2.Memory < (config.Argon2.Parallelism * argon2.MemoryMinParallelismMultiplier):
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordArgon2MemoryTooLow, config.Argon2.Memory, config.Argon2.Parallelism*argon2.MemoryMinParallelismMultiplier, config.Argon2.Parallelism, argon2.MemoryMinParallelismMultiplier))
|
|
}
|
|
|
|
switch {
|
|
case config.Argon2.KeyLength == 0:
|
|
config.Argon2.KeyLength = schema.DefaultPasswordConfig.Argon2.KeyLength
|
|
case config.Argon2.KeyLength < argon2.KeyLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashArgon2, "key_length", config.Argon2.KeyLength, argon2.KeyLengthMin))
|
|
case config.Argon2.KeyLength > argon2.KeyLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashArgon2, "key_length", config.Argon2.KeyLength, argon2.KeyLengthMax))
|
|
}
|
|
|
|
switch {
|
|
case config.Argon2.SaltLength == 0:
|
|
config.Argon2.SaltLength = schema.DefaultPasswordConfig.Argon2.SaltLength
|
|
case config.Argon2.SaltLength < argon2.SaltLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashArgon2, "salt_length", config.Argon2.SaltLength, argon2.SaltLengthMin))
|
|
case config.Argon2.SaltLength > argon2.SaltLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashArgon2, "salt_length", config.Argon2.SaltLength, argon2.SaltLengthMax))
|
|
}
|
|
}
|
|
|
|
func validateFileAuthenticationBackendPasswordConfigSHA2Crypt(config *schema.Password, validator *schema.StructValidator) {
|
|
switch {
|
|
case config.SHA2Crypt.Variant == "":
|
|
config.SHA2Crypt.Variant = schema.DefaultPasswordConfig.SHA2Crypt.Variant
|
|
case utils.IsStringInSlice(config.SHA2Crypt.Variant, validSHA2CryptVariants):
|
|
break
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordInvalidVariant, hashSHA2Crypt, strJoinOr(validSHA2CryptVariants), config.SHA2Crypt.Variant))
|
|
}
|
|
|
|
switch {
|
|
case config.SHA2Crypt.Iterations == 0:
|
|
config.SHA2Crypt.Iterations = schema.DefaultPasswordConfig.SHA2Crypt.Iterations
|
|
case config.SHA2Crypt.Iterations < shacrypt.IterationsMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSHA2Crypt, "iterations", config.SHA2Crypt.Iterations, shacrypt.IterationsMin))
|
|
case config.SHA2Crypt.Iterations > shacrypt.IterationsMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSHA2Crypt, "iterations", config.SHA2Crypt.Iterations, shacrypt.IterationsMax))
|
|
}
|
|
|
|
switch {
|
|
case config.SHA2Crypt.SaltLength == 0:
|
|
config.SHA2Crypt.SaltLength = schema.DefaultPasswordConfig.SHA2Crypt.SaltLength
|
|
case config.SHA2Crypt.SaltLength < shacrypt.SaltLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSHA2Crypt, "salt_length", config.SHA2Crypt.SaltLength, shacrypt.SaltLengthMin))
|
|
case config.SHA2Crypt.SaltLength > shacrypt.SaltLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSHA2Crypt, "salt_length", config.SHA2Crypt.SaltLength, shacrypt.SaltLengthMax))
|
|
}
|
|
}
|
|
|
|
func validateFileAuthenticationBackendPasswordConfigPBKDF2(config *schema.Password, validator *schema.StructValidator) {
|
|
switch {
|
|
case config.PBKDF2.Variant == "":
|
|
config.PBKDF2.Variant = schema.DefaultPasswordConfig.PBKDF2.Variant
|
|
case utils.IsStringInSlice(config.PBKDF2.Variant, validPBKDF2Variants):
|
|
break
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordInvalidVariant, hashPBKDF2, strJoinOr(validPBKDF2Variants), config.PBKDF2.Variant))
|
|
}
|
|
|
|
switch {
|
|
case config.PBKDF2.Iterations == 0:
|
|
config.PBKDF2.Iterations = schema.DefaultPasswordConfig.PBKDF2.Iterations
|
|
case config.PBKDF2.Iterations < pbkdf2.IterationsMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashPBKDF2, "iterations", config.PBKDF2.Iterations, pbkdf2.IterationsMin))
|
|
case config.PBKDF2.Iterations > pbkdf2.IterationsMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashPBKDF2, "iterations", config.PBKDF2.Iterations, pbkdf2.IterationsMax))
|
|
}
|
|
|
|
switch {
|
|
case config.PBKDF2.SaltLength == 0:
|
|
config.PBKDF2.SaltLength = schema.DefaultPasswordConfig.PBKDF2.SaltLength
|
|
case config.PBKDF2.SaltLength < pbkdf2.SaltLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashPBKDF2, "salt_length", config.PBKDF2.SaltLength, pbkdf2.SaltLengthMin))
|
|
case config.PBKDF2.SaltLength > pbkdf2.SaltLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashPBKDF2, "salt_length", config.PBKDF2.SaltLength, pbkdf2.SaltLengthMax))
|
|
}
|
|
}
|
|
|
|
func validateFileAuthenticationBackendPasswordConfigBCrypt(config *schema.Password, validator *schema.StructValidator) {
|
|
switch {
|
|
case config.BCrypt.Variant == "":
|
|
config.BCrypt.Variant = schema.DefaultPasswordConfig.BCrypt.Variant
|
|
case utils.IsStringInSlice(config.BCrypt.Variant, validBCryptVariants):
|
|
break
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordInvalidVariant, hashBCrypt, strJoinOr(validBCryptVariants), config.BCrypt.Variant))
|
|
}
|
|
|
|
switch {
|
|
case config.BCrypt.Cost == 0:
|
|
config.BCrypt.Cost = schema.DefaultPasswordConfig.BCrypt.Cost
|
|
case config.BCrypt.Cost < bcrypt.IterationsMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashBCrypt, "cost", config.BCrypt.Cost, bcrypt.IterationsMin))
|
|
case config.BCrypt.Cost > bcrypt.IterationsMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashBCrypt, "cost", config.BCrypt.Cost, bcrypt.IterationsMax))
|
|
}
|
|
}
|
|
|
|
//nolint:gocyclo
|
|
func validateFileAuthenticationBackendPasswordConfigSCrypt(config *schema.Password, validator *schema.StructValidator) {
|
|
switch {
|
|
case config.SCrypt.Iterations == 0:
|
|
config.SCrypt.Iterations = schema.DefaultPasswordConfig.SCrypt.Iterations
|
|
case config.SCrypt.Iterations < scrypt.IterationsMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSCrypt, "iterations", config.SCrypt.Iterations, scrypt.IterationsMin))
|
|
case config.SCrypt.Iterations > scrypt.IterationsMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSCrypt, "iterations", config.SCrypt.Iterations, scrypt.IterationsMax))
|
|
}
|
|
|
|
switch {
|
|
case config.SCrypt.BlockSize == 0:
|
|
config.SCrypt.BlockSize = schema.DefaultPasswordConfig.SCrypt.BlockSize
|
|
case config.SCrypt.BlockSize < scrypt.BlockSizeMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSCrypt, "block_size", config.SCrypt.BlockSize, scrypt.BlockSizeMin))
|
|
case config.SCrypt.BlockSize > scrypt.BlockSizeMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSCrypt, "block_size", config.SCrypt.BlockSize, scrypt.BlockSizeMax))
|
|
}
|
|
|
|
switch {
|
|
case config.SCrypt.Parallelism == 0:
|
|
config.SCrypt.Parallelism = schema.DefaultPasswordConfig.SCrypt.Parallelism
|
|
case config.SCrypt.Parallelism < scrypt.ParallelismMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSCrypt, "parallelism", config.SCrypt.Parallelism, scrypt.ParallelismMin))
|
|
case config.SCrypt.Parallelism > scrypt.ParallelismMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSCrypt, "parallelism", config.SCrypt.Parallelism, scrypt.ParallelismMax))
|
|
}
|
|
|
|
switch {
|
|
case config.SCrypt.KeyLength == 0:
|
|
config.SCrypt.KeyLength = schema.DefaultPasswordConfig.SCrypt.KeyLength
|
|
case config.SCrypt.KeyLength < scrypt.KeyLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSCrypt, "key_length", config.SCrypt.KeyLength, scrypt.KeyLengthMin))
|
|
case config.SCrypt.KeyLength > scrypt.KeyLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSCrypt, "key_length", config.SCrypt.KeyLength, scrypt.KeyLengthMax))
|
|
}
|
|
|
|
switch {
|
|
case config.SCrypt.SaltLength == 0:
|
|
config.SCrypt.SaltLength = schema.DefaultPasswordConfig.SCrypt.SaltLength
|
|
case config.SCrypt.SaltLength < scrypt.SaltLengthMin:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooSmall, hashSCrypt, "salt_length", config.SCrypt.SaltLength, scrypt.SaltLengthMin))
|
|
case config.SCrypt.SaltLength > scrypt.SaltLengthMax:
|
|
validator.Push(fmt.Errorf(errFmtFileAuthBackendPasswordOptionTooLarge, hashSCrypt, "salt_length", config.SCrypt.SaltLength, scrypt.SaltLengthMax))
|
|
}
|
|
}
|
|
|
|
//nolint:gocyclo // Function is clear enough.
|
|
func validateFileAuthenticationBackendPasswordConfigLegacy(config *schema.Password) {
|
|
switch config.Algorithm {
|
|
case hashLegacySHA512:
|
|
config.Algorithm = hashSHA2Crypt
|
|
|
|
if config.SHA2Crypt.Variant == "" {
|
|
config.SHA2Crypt.Variant = schema.DefaultPasswordConfig.SHA2Crypt.Variant
|
|
}
|
|
|
|
if config.Iterations > 0 && config.SHA2Crypt.Iterations == 0 {
|
|
config.SHA2Crypt.Iterations = config.Iterations
|
|
}
|
|
|
|
if config.SaltLength > 0 && config.SHA2Crypt.SaltLength == 0 {
|
|
if config.SaltLength > 16 {
|
|
config.SHA2Crypt.SaltLength = 16
|
|
} else {
|
|
config.SHA2Crypt.SaltLength = config.SaltLength
|
|
}
|
|
}
|
|
case hashLegacyArgon2id:
|
|
config.Algorithm = hashArgon2
|
|
|
|
if config.Argon2.Variant == "" {
|
|
config.Argon2.Variant = schema.DefaultPasswordConfig.Argon2.Variant
|
|
}
|
|
|
|
if config.Iterations > 0 && config.Argon2.Memory == 0 {
|
|
config.Argon2.Iterations = config.Iterations
|
|
}
|
|
|
|
if config.Memory > 0 && config.Argon2.Memory == 0 {
|
|
config.Argon2.Memory = config.Memory * 1024
|
|
}
|
|
|
|
if config.Parallelism > 0 && config.Argon2.Parallelism == 0 {
|
|
config.Argon2.Parallelism = config.Parallelism
|
|
}
|
|
|
|
if config.KeyLength > 0 && config.Argon2.KeyLength == 0 {
|
|
config.Argon2.KeyLength = config.KeyLength
|
|
}
|
|
|
|
if config.SaltLength > 0 && config.Argon2.SaltLength == 0 {
|
|
config.Argon2.SaltLength = config.SaltLength
|
|
}
|
|
}
|
|
}
|
|
|
|
func validateLDAPAuthenticationBackend(config *schema.AuthenticationBackend, validator *schema.StructValidator) {
|
|
if config.LDAP.Implementation == "" {
|
|
config.LDAP.Implementation = schema.LDAPImplementationCustom
|
|
}
|
|
|
|
defaultTLS := validateLDAPAuthenticationBackendImplementation(config, validator)
|
|
|
|
defaultTLS.ServerName = validateLDAPAuthenticationAddress(config.LDAP, validator)
|
|
|
|
if config.LDAP.TLS == nil {
|
|
config.LDAP.TLS = &schema.TLSConfig{}
|
|
}
|
|
|
|
if err := ValidateTLSConfig(config.LDAP.TLS, defaultTLS); err != nil {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendTLSConfigInvalid, err))
|
|
}
|
|
|
|
if strings.Contains(config.LDAP.UsersFilter, "{0}") {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterReplacedPlaceholders, "users_filter", "{0}", "{input}"))
|
|
}
|
|
|
|
if strings.Contains(config.LDAP.GroupsFilter, "{0}") {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterReplacedPlaceholders, "groups_filter", "{0}", "{input}"))
|
|
}
|
|
|
|
if strings.Contains(config.LDAP.GroupsFilter, "{1}") {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterReplacedPlaceholders, "groups_filter", "{1}", "{username}"))
|
|
}
|
|
|
|
validateLDAPRequiredParameters(config, validator)
|
|
}
|
|
|
|
func validateLDAPAuthenticationBackendImplementation(config *schema.AuthenticationBackend, validator *schema.StructValidator) *schema.TLSConfig {
|
|
var implementation *schema.LDAPAuthenticationBackend
|
|
|
|
switch config.LDAP.Implementation {
|
|
case schema.LDAPImplementationCustom:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationCustom
|
|
case schema.LDAPImplementationActiveDirectory:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationActiveDirectory
|
|
case schema.LDAPImplementationRFC2307bis:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationRFC2307bis
|
|
case schema.LDAPImplementationFreeIPA:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationFreeIPA
|
|
case schema.LDAPImplementationLLDAP:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationLLDAP
|
|
case schema.LDAPImplementationGLAuth:
|
|
implementation = &schema.DefaultLDAPAuthenticationBackendConfigurationImplementationGLAuth
|
|
default:
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendOptionMustBeOneOf, "implementation", strJoinOr(validLDAPImplementations), config.LDAP.Implementation))
|
|
}
|
|
|
|
tlsconfig := &schema.TLSConfig{}
|
|
|
|
if implementation != nil {
|
|
if config.LDAP.Timeout == 0 {
|
|
config.LDAP.Timeout = implementation.Timeout
|
|
}
|
|
|
|
tlsconfig = &schema.TLSConfig{
|
|
MinimumVersion: implementation.TLS.MinimumVersion,
|
|
MaximumVersion: implementation.TLS.MaximumVersion,
|
|
}
|
|
|
|
setDefaultImplementationLDAPAuthenticationBackendProfileAttributes(config.LDAP, implementation)
|
|
}
|
|
|
|
return tlsconfig
|
|
}
|
|
|
|
func ldapImplementationShouldSetStr(config, implementation string) bool {
|
|
return config == "" && implementation != ""
|
|
}
|
|
|
|
func setDefaultImplementationLDAPAuthenticationBackendProfileAttributes(config *schema.LDAPAuthenticationBackend, implementation *schema.LDAPAuthenticationBackend) {
|
|
if ldapImplementationShouldSetStr(config.AdditionalUsersDN, implementation.AdditionalUsersDN) {
|
|
config.AdditionalUsersDN = implementation.AdditionalUsersDN
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.UsersFilter, implementation.UsersFilter) {
|
|
config.UsersFilter = implementation.UsersFilter
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.AdditionalGroupsDN, implementation.AdditionalGroupsDN) {
|
|
config.AdditionalGroupsDN = implementation.AdditionalGroupsDN
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.GroupsFilter, implementation.GroupsFilter) {
|
|
config.GroupsFilter = implementation.GroupsFilter
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.GroupSearchMode, implementation.GroupSearchMode) {
|
|
config.GroupSearchMode = implementation.GroupSearchMode
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.DistinguishedName, implementation.Attributes.DistinguishedName) {
|
|
config.Attributes.DistinguishedName = implementation.Attributes.DistinguishedName
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.Username, implementation.Attributes.Username) {
|
|
config.Attributes.Username = implementation.Attributes.Username
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.DisplayName, implementation.Attributes.DisplayName) {
|
|
config.Attributes.DisplayName = implementation.Attributes.DisplayName
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.Mail, implementation.Attributes.Mail) {
|
|
config.Attributes.Mail = implementation.Attributes.Mail
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.MemberOf, implementation.Attributes.MemberOf) {
|
|
config.Attributes.MemberOf = implementation.Attributes.MemberOf
|
|
}
|
|
|
|
if ldapImplementationShouldSetStr(config.Attributes.GroupName, implementation.Attributes.GroupName) {
|
|
config.Attributes.GroupName = implementation.Attributes.GroupName
|
|
}
|
|
}
|
|
|
|
func validateLDAPAuthenticationAddress(config *schema.LDAPAuthenticationBackend, validator *schema.StructValidator) (hostname string) {
|
|
if config.Address == nil {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "address"))
|
|
|
|
return
|
|
}
|
|
|
|
var (
|
|
err error
|
|
)
|
|
|
|
if err = config.Address.ValidateLDAP(); err != nil {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendAddress, config.Address.String(), err))
|
|
}
|
|
|
|
return config.Address.Hostname()
|
|
}
|
|
|
|
func validateLDAPRequiredParameters(config *schema.AuthenticationBackend, validator *schema.StructValidator) {
|
|
if config.LDAP.PermitUnauthenticatedBind {
|
|
if config.LDAP.Password != "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendUnauthenticatedBindWithPassword))
|
|
}
|
|
|
|
if !config.PasswordReset.Disable {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendUnauthenticatedBindWithResetEnabled))
|
|
}
|
|
} else {
|
|
if config.LDAP.User == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "user"))
|
|
}
|
|
|
|
if config.LDAP.Password == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "password"))
|
|
}
|
|
}
|
|
|
|
if config.LDAP.BaseDN == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "base_dn"))
|
|
}
|
|
|
|
if config.LDAP.UsersFilter == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "users_filter"))
|
|
} else {
|
|
validateLDAPUsersFilter(config, "users_filter", config.LDAP.UsersFilter, validator)
|
|
}
|
|
|
|
if config.LDAP.UsersResetFilter != "" {
|
|
validateLDAPUsersFilter(config, "users_reset_filter", config.LDAP.UsersFilter, validator)
|
|
}
|
|
|
|
validateLDAPGroupFilter(config, validator)
|
|
}
|
|
|
|
func validateLDAPUsersFilter(config *schema.AuthenticationBackend, name, filter string, val *schema.StructValidator) {
|
|
if !strings.HasPrefix(filter, "(") || !strings.HasSuffix(filter, ")") {
|
|
val.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterEnclosingParenthesis, name, filter, filter))
|
|
}
|
|
|
|
if !strings.Contains(filter, "{username_attribute}") {
|
|
val.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingPlaceholder, name, "username_attribute"))
|
|
}
|
|
|
|
if !strings.Contains(filter, "{input}") {
|
|
val.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingPlaceholder, name, "input"))
|
|
}
|
|
|
|
if config.LDAP.Attributes.DistinguishedName == "" && strings.Contains(filter, "{distinguished_name_attribute}") {
|
|
val.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingAttribute, "distinguished_name", strJoinOr([]string{"{distinguished_name_attribute}"})))
|
|
}
|
|
|
|
if config.LDAP.Attributes.MemberOf == "" && strings.Contains(filter, "{member_of_attribute}") {
|
|
val.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingAttribute, "member_of", strJoinOr([]string{"{member_of_attribute}"})))
|
|
}
|
|
}
|
|
|
|
func validateLDAPGroupFilter(config *schema.AuthenticationBackend, validator *schema.StructValidator) {
|
|
if config.LDAP.GroupsFilter == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendMissingOption, "groups_filter"))
|
|
} else if !strings.HasPrefix(config.LDAP.GroupsFilter, "(") || !strings.HasSuffix(config.LDAP.GroupsFilter, ")") {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterEnclosingParenthesis, "groups_filter", config.LDAP.GroupsFilter, config.LDAP.GroupsFilter))
|
|
}
|
|
|
|
if config.LDAP.GroupSearchMode == "" {
|
|
config.LDAP.GroupSearchMode = schema.LDAPGroupSearchModeFilter
|
|
}
|
|
|
|
if !utils.IsStringInSlice(config.LDAP.GroupSearchMode, validLDAPGroupSearchModes) {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendOptionMustBeOneOf, "group_search_mode", strJoinOr(validLDAPGroupSearchModes), config.LDAP.GroupSearchMode))
|
|
}
|
|
|
|
pMemberOf, pMemberOfDN, pMemberOfRDN := strings.Contains(config.LDAP.GroupsFilter, "{member_of_attribute}"), strings.Contains(config.LDAP.GroupsFilter, "{memberof:dn}"), strings.Contains(config.LDAP.GroupsFilter, "{memberof:rdn}")
|
|
|
|
if config.LDAP.GroupSearchMode == schema.LDAPGroupSearchModeMemberOf {
|
|
if !pMemberOfDN && !pMemberOfRDN {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingPlaceholderGroupSearchMode, "groups_filter", strJoinOr([]string{"{memberof:rdn}", "{memberof:dn}"}), config.LDAP.GroupSearchMode))
|
|
}
|
|
}
|
|
|
|
if pMemberOfDN && config.LDAP.Attributes.DistinguishedName == "" {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingAttribute, "distinguished_name", strJoinOr([]string{"{memberof:dn}"})))
|
|
}
|
|
|
|
if config.LDAP.Attributes.MemberOf == "" {
|
|
if pMemberOfDN || pMemberOfRDN {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingAttribute, "member_of", strJoinOr([]string{"{memberof:rdn}", "{memberof:dn}"})))
|
|
}
|
|
|
|
if pMemberOf {
|
|
validator.Push(fmt.Errorf(errFmtLDAPAuthBackendFilterMissingAttribute, "member_of", strJoinOr([]string{"{member_of_attribute}"})))
|
|
}
|
|
}
|
|
}
|