guichet/main.go

403 lines
9.5 KiB
Go
Raw Normal View History

2020-02-09 13:46:52 +00:00
package main
import (
2020-02-09 14:01:20 +00:00
"crypto/rand"
2020-02-09 14:44:18 +00:00
"crypto/tls"
2020-02-09 15:46:26 +00:00
"encoding/json"
"flag"
"fmt"
2020-02-09 14:44:18 +00:00
"html/template"
2020-02-09 15:46:26 +00:00
"io/ioutil"
"log"
"net/http"
"os"
"strings"
2020-02-09 13:46:52 +00:00
2020-02-09 14:44:18 +00:00
"github.com/go-ldap/ldap/v3"
2020-02-09 21:06:33 +00:00
"github.com/gorilla/mux"
2020-02-09 22:04:37 +00:00
"github.com/gorilla/sessions"
2020-02-09 13:46:52 +00:00
)
2020-02-09 14:01:20 +00:00
type ConfigFile struct {
HttpBindAddr string `json:"http_bind_addr"`
LdapServerAddr string `json:"ldap_server_addr"`
2020-02-09 15:46:26 +00:00
LdapTLS bool `json:"ldap_tls"`
2020-02-14 20:58:34 +00:00
BaseDN string `json:"base_dn"`
UserBaseDN string `json:"user_base_dn"`
UserNameAttr string `json:"user_name_attr"`
GroupBaseDN string `json:"group_base_dn"`
GroupNameAttr string `json:"group_name_attr"`
2020-02-14 17:57:25 +00:00
InvitationBaseDN string `json:"invitation_base_dn"`
InvitationNameAttr string `json:"invitation_name_attr"`
InvitedMailFormat string `json:"invited_mail_format"`
InvitedAutoGroups []string `json:"invited_auto_groups"`
2020-02-14 20:58:34 +00:00
WebAddress string `json:"web_address"`
MailFrom string `json:"mail_from"`
SMTPServer string `json:"smtp_server"`
SMTPUsername string `json:"smtp_username"`
SMTPPassword string `json:"smtp_password"`
2020-02-10 14:26:02 +00:00
AdminAccount string `json:"admin_account"`
GroupCanInvite string `json:"group_can_invite"`
GroupCanAdmin string `json:"group_can_admin"`
S3Endpoint string `json:"s3_endpoint"`
S3AccessKey string `json:"s3_access_key"`
S3SecretKey string `json:"s3_secret_key"`
S3Region string `json:"s3_region"`
S3Bucket string `json:"s3_bucket"`
2020-02-09 14:01:20 +00:00
}
2020-02-09 13:46:52 +00:00
2020-02-09 14:01:20 +00:00
var configFlag = flag.String("config", "./config.json", "Configuration file path")
2020-02-09 14:44:18 +00:00
var config *ConfigFile
const SESSION_NAME = "guichet_session"
2020-02-09 15:46:26 +00:00
var store sessions.Store = nil
func readConfig() ConfigFile {
// Default configuration values for certain fields
2020-02-09 14:01:20 +00:00
config_file := ConfigFile{
HttpBindAddr: ":9991",
2020-02-09 14:44:18 +00:00
LdapServerAddr: "ldap://127.0.0.1:389",
2020-02-14 20:58:34 +00:00
UserNameAttr: "uid",
GroupNameAttr: "gid",
InvitationNameAttr: "cn",
InvitedAutoGroups: []string{},
2020-02-09 14:01:20 +00:00
}
2020-02-10 14:26:02 +00:00
_, err := os.Stat(*configFlag)
2020-02-09 14:01:20 +00:00
if os.IsNotExist(err) {
log.Fatalf("Could not find Guichet configuration file at %s. Please create this file, for example starting with config.json.example and customizing it for your deployment.", *configFlag)
2020-02-09 14:01:20 +00:00
}
if err != nil {
log.Fatal(err)
}
bytes, err := ioutil.ReadFile(*configFlag)
if err != nil {
log.Fatal(err)
}
err = json.Unmarshal(bytes, &config_file)
if err != nil {
log.Fatal(err)
}
return config_file
2020-02-09 13:46:52 +00:00
}
func main() {
2020-02-09 14:01:20 +00:00
flag.Parse()
2020-02-09 13:46:52 +00:00
2020-02-09 14:44:18 +00:00
config_file := readConfig()
config = &config_file
2020-02-10 14:26:02 +00:00
session_key := make([]byte, 32)
n, err := rand.Read(session_key)
if err != nil || n != 32 {
log.Fatal(err)
}
store = sessions.NewCookieStore(session_key)
2020-02-09 14:01:20 +00:00
2020-02-09 21:06:33 +00:00
r := mux.NewRouter()
r.HandleFunc("/", handleHome)
r.HandleFunc("/logout", handleLogout)
2020-02-09 21:06:33 +00:00
r.HandleFunc("/profile", handleProfile)
r.HandleFunc("/passwd", handlePasswd)
r.HandleFunc("/picture/{name}", handleDownloadPicture)
2021-07-21 19:21:46 +00:00
r.HandleFunc("/directory", handleDirectory)
r.HandleFunc("/directory/search/{input}", handleSearch)
2021-07-21 19:21:46 +00:00
2020-02-14 17:57:25 +00:00
r.HandleFunc("/invite/new_account", handleInviteNewAccount)
r.HandleFunc("/invite/send_code", handleInviteSendCode)
2020-02-14 20:58:34 +00:00
r.HandleFunc("/invitation/{code}", handleInvitationCode)
2020-02-14 17:57:25 +00:00
2020-02-09 21:06:33 +00:00
r.HandleFunc("/admin/users", handleAdminUsers)
r.HandleFunc("/admin/groups", handleAdminGroups)
r.HandleFunc("/admin/ldap/{dn}", handleAdminLDAP)
2020-02-09 22:04:27 +00:00
r.HandleFunc("/admin/create/{template}/{super_dn}", handleAdminCreate)
2020-02-09 17:28:42 +00:00
2020-02-09 14:44:18 +00:00
staticfiles := http.FileServer(http.Dir("static"))
2020-02-09 21:06:33 +00:00
r.Handle("/static/{file:.*}", http.StripPrefix("/static/", staticfiles))
2020-02-09 14:44:18 +00:00
2020-02-10 14:26:02 +00:00
log.Printf("Starting HTTP server on %s", config.HttpBindAddr)
2020-02-10 14:26:02 +00:00
err = http.ListenAndServe(config.HttpBindAddr, logRequest(r))
2020-02-09 13:46:52 +00:00
if err != nil {
log.Fatal("Cannot start http server: ", err)
}
}
2020-02-09 14:01:20 +00:00
2020-02-09 14:44:18 +00:00
type LoginInfo struct {
Username string
2020-02-09 15:46:26 +00:00
DN string
2020-02-09 14:44:18 +00:00
Password string
2020-02-09 15:46:26 +00:00
}
2020-02-09 14:44:18 +00:00
2020-02-09 16:35:16 +00:00
type LoginStatus struct {
Info *LoginInfo
conn *ldap.Conn
2020-02-09 16:35:16 +00:00
UserEntry *ldap.Entry
2020-02-11 23:13:24 +00:00
CanAdmin bool
CanInvite bool
2020-02-09 16:35:16 +00:00
}
2020-02-14 20:58:34 +00:00
func (login *LoginStatus) WelcomeName() string {
ret := login.UserEntry.GetAttributeValue("givenname")
if ret == "" {
ret = login.UserEntry.GetAttributeValue("displayname")
}
if ret == "" {
ret = login.Info.Username
}
return ret
}
2020-02-09 14:44:18 +00:00
func logRequest(handler http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
log.Printf("%s %s %s\n", r.RemoteAddr, r.Method, r.URL)
handler.ServeHTTP(w, r)
})
}
2020-02-09 16:35:16 +00:00
func checkLogin(w http.ResponseWriter, r *http.Request) *LoginStatus {
2020-02-10 14:26:02 +00:00
var login_info *LoginInfo
2020-02-09 14:44:18 +00:00
session, err := store.Get(r, SESSION_NAME)
2020-02-10 14:26:02 +00:00
if err == nil {
username, ok := session.Values["login_username"]
password, ok2 := session.Values["login_password"]
user_dn, ok3 := session.Values["login_dn"]
if ok && ok2 && ok3 {
login_info = &LoginInfo{
DN: user_dn.(string),
Username: username.(string),
Password: password.(string),
}
}
2020-02-09 15:46:26 +00:00
}
2020-02-09 14:44:18 +00:00
2020-02-10 14:26:02 +00:00
if login_info == nil {
2020-02-09 16:35:16 +00:00
login_info = handleLogin(w, r)
if login_info == nil {
return nil
}
2020-02-09 14:44:18 +00:00
}
2020-02-09 16:35:16 +00:00
l := ldapOpen(w)
if l == nil {
return nil
}
err = l.Bind(login_info.DN, login_info.Password)
if err != nil {
delete(session.Values, "login_username")
delete(session.Values, "login_password")
delete(session.Values, "login_dn")
err = session.Save(r, w)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return nil
}
return checkLogin(w, r)
}
2020-02-10 14:26:02 +00:00
loginStatus := &LoginStatus{
2020-02-10 14:26:02 +00:00
Info: login_info,
conn: l,
2020-02-10 14:26:02 +00:00
}
requestKind := "(objectClass=organizationalPerson)"
2020-02-11 23:13:24 +00:00
if strings.EqualFold(login_info.DN, config.AdminAccount) {
2020-02-10 14:26:02 +00:00
requestKind = "(objectclass=*)"
}
2020-02-09 16:35:16 +00:00
searchRequest := ldap.NewSearchRequest(
login_info.DN,
ldap.ScopeBaseObject, ldap.NeverDerefAliases, 0, 0, false,
2020-02-10 14:26:02 +00:00
requestKind,
[]string{
"dn",
"displayname",
"givenname",
"sn",
"mail",
"memberof",
"description",
FIELD_NAME_DIRECTORY_VISIBILITY,
FIELD_NAME_PROFILE_PICTURE,
},
2020-02-09 16:35:16 +00:00
nil)
sr, err := l.Search(searchRequest)
if err != nil {
2020-02-09 16:35:16 +00:00
http.Error(w, err.Error(), http.StatusInternalServerError)
return nil
}
if len(sr.Entries) != 1 {
2020-02-10 14:26:02 +00:00
http.Error(w, fmt.Sprintf("Unable to find entry for %s", login_info.DN), http.StatusInternalServerError)
2020-02-09 16:35:16 +00:00
return nil
}
2020-02-10 14:26:02 +00:00
loginStatus.UserEntry = sr.Entries[0]
2020-02-11 23:13:24 +00:00
loginStatus.CanAdmin = strings.EqualFold(loginStatus.Info.DN, config.AdminAccount)
loginStatus.CanInvite = false
for _, attr := range loginStatus.UserEntry.Attributes {
if strings.EqualFold(attr.Name, "memberof") {
for _, group := range attr.Values {
if config.GroupCanInvite != "" && strings.EqualFold(group, config.GroupCanInvite) {
loginStatus.CanInvite = true
}
if config.GroupCanAdmin != "" && strings.EqualFold(group, config.GroupCanAdmin) {
loginStatus.CanAdmin = true
}
}
}
}
2020-02-10 14:26:02 +00:00
return loginStatus
2020-02-09 14:44:18 +00:00
}
func ldapOpen(w http.ResponseWriter) *ldap.Conn {
l, err := ldap.DialURL(config.LdapServerAddr)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return nil
}
if config.LdapTLS {
err = l.StartTLS(&tls.Config{InsecureSkipVerify: true})
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return nil
}
}
return l
}
2020-02-09 14:01:20 +00:00
// Page handlers ----
type HomePageData struct {
2020-02-14 20:58:34 +00:00
Login *LoginStatus
BaseDN string
}
2020-02-09 14:01:20 +00:00
func handleHome(w http.ResponseWriter, r *http.Request) {
2020-02-09 15:46:26 +00:00
templateHome := template.Must(template.ParseFiles("templates/layout.html", "templates/home.html"))
2020-02-09 14:44:18 +00:00
login := checkLogin(w, r)
if login == nil {
return
}
2020-02-10 14:26:02 +00:00
data := &HomePageData{
2020-02-14 20:58:34 +00:00
Login: login,
BaseDN: config.BaseDN,
2020-02-10 14:26:02 +00:00
}
templateHome.Execute(w, data)
2020-02-09 14:44:18 +00:00
}
2020-02-09 15:46:26 +00:00
func handleLogout(w http.ResponseWriter, r *http.Request) {
session, err := store.Get(r, SESSION_NAME)
if err != nil {
2020-02-14 17:57:25 +00:00
session, _ = store.New(r, SESSION_NAME)
2020-02-09 15:46:26 +00:00
}
delete(session.Values, "login_username")
delete(session.Values, "login_password")
delete(session.Values, "login_dn")
err = session.Save(r, w)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
http.Redirect(w, r, "/", http.StatusFound)
}
type LoginFormData struct {
Username string
WrongUser bool
WrongPass bool
ErrorMessage string
}
2020-02-09 14:44:18 +00:00
func handleLogin(w http.ResponseWriter, r *http.Request) *LoginInfo {
2020-02-09 15:46:26 +00:00
templateLogin := template.Must(template.ParseFiles("templates/layout.html", "templates/login.html"))
2020-02-09 14:44:18 +00:00
if r.Method == "GET" {
templateLogin.Execute(w, LoginFormData{})
return nil
} else if r.Method == "POST" {
r.ParseForm()
username := strings.Join(r.Form["username"], "")
2020-02-09 15:46:26 +00:00
password := strings.Join(r.Form["password"], "")
user_dn := fmt.Sprintf("%s=%s,%s", config.UserNameAttr, username, config.UserBaseDN)
2020-02-11 23:13:24 +00:00
if strings.EqualFold(username, config.AdminAccount) {
2020-02-10 14:26:02 +00:00
user_dn = username
}
2020-02-09 14:44:18 +00:00
l := ldapOpen(w)
if l == nil {
return nil
}
2020-02-09 15:46:26 +00:00
err := l.Bind(user_dn, password)
2020-02-09 14:44:18 +00:00
if err != nil {
data := &LoginFormData{
Username: username,
}
if ldap.IsErrorWithCode(err, ldap.LDAPResultInvalidCredentials) {
data.WrongPass = true
} else if ldap.IsErrorWithCode(err, ldap.LDAPResultNoSuchObject) {
data.WrongUser = true
} else {
data.ErrorMessage = err.Error()
}
templateLogin.Execute(w, data)
2020-02-09 14:44:18 +00:00
return nil
}
// Successfully logged in, save it to session
session, err := store.Get(r, SESSION_NAME)
if err != nil {
2020-02-10 14:26:02 +00:00
session, _ = store.New(r, SESSION_NAME)
2020-02-09 14:44:18 +00:00
}
2020-02-09 15:46:26 +00:00
session.Values["login_username"] = username
session.Values["login_password"] = password
session.Values["login_dn"] = user_dn
err = session.Save(r, w)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return nil
}
return &LoginInfo{
DN: user_dn,
Username: username,
Password: password,
}
2020-02-09 14:44:18 +00:00
} else {
http.Error(w, "Unsupported method", http.StatusBadRequest)
return nil
}
2020-02-09 14:01:20 +00:00
}