My fork of the DeuxFleurs.fr Guichet application for LDAP-based User Mangement. This is pretty much becoming a full rewrite. Features include self-service account management in an LDAP database. I pair it with Nix Mailserver such that each account has an attached email address. Future ambitions have to do with Group management. Used on lesgrandsvoisins.com.
Find a file
2023-08-18 11:22:07 +02:00
integration WIP templates 2023-04-18 19:37:51 +02:00
static Bug Fixing 2023-07-27 13:07:43 +02:00
templates Correction de liens mail.lesgrandsvoisins.com 2023-08-14 16:52:39 +02:00
.drone.yml Drone build with Nix 2022-12-02 12:16:27 +01:00
.envrc First iteration on mailing list administration interface 2023-02-08 13:11:43 +01:00
.gitignore bridged Guichet (built directly with Go) with the integration docker-compose 2023-03-27 11:13:09 +02:00
config.json.example Imposition of email format 2023-07-17 12:15:13 +02:00
controller.go Handle multiple mail values 2023-07-27 21:52:32 +02:00
directory.go Fixed Change Password Bug 2023-07-25 21:35:22 +02:00
Dockerfile Add SSL certs to container for SMTP STARTTLS 2020-02-14 22:38:02 +01:00
flake.lock Make repo into a Nix flake 2022-12-01 23:25:26 +01:00
flake.nix State in production 2023-07-17 11:32:41 +02:00
garage.go Refactoring 2023-07-26 08:31:25 +02:00
go.mod Adding LDAPS with newuser permissions OK 2023-07-23 08:22:09 +02:00
go.sum Adding LDAPS with newuser permissions OK 2023-07-23 08:22:09 +02:00
gomod2nix.toml Add missing nix dependency 2022-12-01 23:26:41 +01:00
guichet.hcl.example State in production 2023-07-17 11:32:41 +02:00
LICENSE Cosmetic changes 2023-07-17 11:18:21 +02:00
main.go Fixed Change Password Bug 2023-07-25 21:35:22 +02:00
Makefile Refactoring 2023-07-26 09:00:42 +02:00
model-passwd.go Delete invitation before creating a new one 2023-08-18 11:22:07 +02:00
model-user.go Working on signup workfow 2023-07-26 14:51:03 +02:00
model.go Refactoring 2023-07-25 21:37:46 +02:00
picture.go Make repo into a Nix flake 2022-12-01 23:25:26 +01:00
README.md Cosmetic changes 2023-07-17 11:18:21 +02:00
session.go Refactoring 2023-07-26 08:53:29 +02:00
utils-config.go Refactoring 2023-07-26 08:31:43 +02:00
utils-http.go Refactoring 2023-07-26 08:31:43 +02:00
utils-ldap.go Refactoring 2023-07-26 08:31:43 +02:00
utils-ssha.go Refactoring 2023-07-26 08:31:43 +02:00
utils.go Refactoring 2023-07-26 13:03:45 +02:00
view-admin.go Refactoring 2023-07-26 11:36:51 +02:00
view-home.go Refactor Site-Wide Data 2023-07-27 15:46:59 +02:00
view-invite.go Debugging 2023-08-18 11:04:02 +02:00
view-login.go Refactor Site-Wide Data 2023-07-27 15:57:17 +02:00
view-passwd.go Refactor Site-Wide Data 2023-07-27 15:57:17 +02:00
view-user.go Handle multiple mail values 2023-07-27 22:19:10 +02:00
view.go Handle multiple mail values 2023-07-27 21:34:58 +02:00

Guichet

Build Status

Guichet is a simple LDAP web interface for the following tasks:

  • self-service password change
  • administration of the LDAP directory
  • inviting new users to create accounts

Guichet works well with the Bottin LDAP server. Currently, Guichet's templates are only in French as it has been created for the Deuxfleurs collective. We would gladly merge a pull request with an English transaltion !

A Docker image is provided on the Docker hub. An exemple for running Guichet on a Nomad cluster can be found in guichet.hcl.exemple.

Guichet takes a single command line argument, -config <filename>, which is the path to its config file (defaults to ./config.json). The configuration file is a JSON file whose contents is described in the following section.

Guichet is licensed under the terms of the GPLv3.

Building Guichet

Guichet requires go 1.13 or later.

To build Guichet, clone this repository outside of your $GOPATH. Then, run make in the root of the repo.

Configuration of Guichet

Guichet is configured using a simple JSON config file which is a dictionnary whose keys are described below. An exemple is provided in a further section.

HTTP listen address

  • http_bind_addr: which IP and port to bind on for the HTTP web interface. Guichet does not support HTTPS, use a reverse proxy for that.

LDAP server configuration

  • ldap_server_addr: the address of the LDAP server to use
  • ldap_tls (boolean): whether to attempt STARTTLS on the LDAP connection
  • base_dn: the base LDAP object under which we are allowed to view and modify objects

User and group configuration

  • user_base_dn: the base LDAP object that contains user accounts
  • user_name_attr: the search attribute for user identifiers (usually uid or cn)
  • group_base_dn and group_name_attr: same for groups

Administration configuration

  • admin_account: DN of an LDAP account that has administrative privilege. If such an account is set, the admin can log in by entering the full DN in the login form.
  • group_can_admin: DN of a LDAP group whose members are given administrative privilege

Invitation configuration

Guichet supports a mechanism where users can send invitations by email to other users. The ability to send such invitations can be configured to be restricted to a certain group of users. Invitation codes are created as temporary LDAP objects in a special folder.

  • group_can_invite: the LDAP DN of a group whose members are allowed to send invitations to new users
  • invitation_base_dn: the LDAP folder in which invitation codes are stored
  • invitation_name_attr: just use cn
  • invited_mail_format: automatically set the invited user's email to this string, where {} is replaced by the created username (ex: {}@resdigita.org)
  • invited_auto_groups (list of strings): a list of DNs of LDAP groups

Email configuration

Guichet can send an invitation link by email. To do so, an SMTP server must be configured:

  • smtp_server: the host and port of the mail server
  • smtp_username and smtp_password: the username and password to log in with on the mail server
  • mail_from: the sender email address for the invitation message
  • web_address: the base web address of the Guichet service (used for building the invitation link)

exemple configuration

This is a subset of the configuration we use on Deuxfleurs:

{
  "http_bind_addr": ":9991",
  "ldap_server_addr": "ldap://bottin2.service.2.cluster.resdigita.org:389",

  "base_dn": "dc=deuxfleurs,dc=fr",
  "user_base_dn": "ou=users,dc=deuxfleurs,dc=fr",
  "user_name_attr": "cn",
  "group_base_dn": "ou=groups,dc=deuxfleurs,dc=fr",
  "group_name_attr": "cn",

  "admin_account": "cn=admin,dc=deuxfleurs,dc=fr",
  "group_can_admin": "cn=admin,ou=groups,dc=deuxfleurs,dc=fr",
  "group_can_invite": "cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr"
}

Here is an exemple of Bottin ACLs that may be used to support Guichet invitations:

  "acl": [
		"*,dc=deuxfleurs,dc=fr::read:*:* !userpassword",
		"*::read modify:SELF:*",
		"ANONYMOUS::bind:*,ou=users,dc=deuxfleurs,dc=fr:",
		"ANONYMOUS::bind:cn=admin,dc=deuxfleurs,dc=fr:",
		"*,ou=services,ou=users,dc=deuxfleurs,dc=fr::bind:*,ou=users,dc=deuxfleurs,dc=fr:*",
		"*,ou=services,ou=users,dc=deuxfleurs,dc=fr::read:*:*",

		"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:add:*,ou=invitations,dc=deuxfleurs,dc=fr:*",
		"ANONYMOUS::bind:*,ou=invitations,dc=deuxfleurs,dc=fr:",
		"*,ou=invitations,dc=deuxfleurs,dc=fr::delete:SELF:*",

		"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:add:*,ou=users,dc=deuxfleurs,dc=fr:*",
		"*,ou=invitations,dc=deuxfleurs,dc=fr::add:*,ou=users,dc=deuxfleurs,dc=fr:*",

		"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:modifyAdd:cn=email,ou=groups,dc=deuxfleurs,dc=fr:*",
		"*,ou=invitations,dc=deuxfleurs,dc=fr::modifyAdd:cn=email,ou=groups,dc=deuxfleurs,dc=fr:*",
		"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:modifyAdd:cn=seafile,ou=groups,dc=deuxfleurs,dc=fr:*",
		"*,ou=invitations,dc=deuxfleurs,dc=fr::modifyAdd:cn=seafile,ou=groups,dc=deuxfleurs,dc=fr:*",

		"cn=admin,dc=deuxfleurs,dc=fr::read add modify delete:*:*",
		"*:cn=admin,ou=groups,dc=deuxfleurs,dc=fr:read add modify delete:*:*"
  ]

Consult this directory to view the full configuration in use on Deuxfleurs.