2020-02-09 13:46:52 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2020-02-09 14:01:20 +00:00
|
|
|
"crypto/rand"
|
2020-02-09 14:44:18 +00:00
|
|
|
"crypto/tls"
|
2020-02-09 15:46:26 +00:00
|
|
|
"encoding/json"
|
|
|
|
"flag"
|
2020-02-09 16:52:48 +00:00
|
|
|
"fmt"
|
2020-02-09 14:44:18 +00:00
|
|
|
"html/template"
|
2020-02-09 15:46:26 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"strings"
|
2020-02-09 13:46:52 +00:00
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
"github.com/go-ldap/ldap/v3"
|
2020-02-09 21:06:33 +00:00
|
|
|
"github.com/gorilla/mux"
|
2020-02-09 22:04:37 +00:00
|
|
|
"github.com/gorilla/sessions"
|
2020-02-09 13:46:52 +00:00
|
|
|
)
|
|
|
|
|
2020-02-09 14:01:20 +00:00
|
|
|
type ConfigFile struct {
|
|
|
|
HttpBindAddr string `json:"http_bind_addr"`
|
|
|
|
LdapServerAddr string `json:"ldap_server_addr"`
|
2020-02-09 15:46:26 +00:00
|
|
|
LdapTLS bool `json:"ldap_tls"`
|
2020-02-09 17:03:10 +00:00
|
|
|
|
2020-02-14 20:58:34 +00:00
|
|
|
BaseDN string `json:"base_dn"`
|
|
|
|
UserBaseDN string `json:"user_base_dn"`
|
|
|
|
UserNameAttr string `json:"user_name_attr"`
|
|
|
|
GroupBaseDN string `json:"group_base_dn"`
|
|
|
|
GroupNameAttr string `json:"group_name_attr"`
|
|
|
|
|
2020-02-14 17:57:25 +00:00
|
|
|
InvitationBaseDN string `json:"invitation_base_dn"`
|
|
|
|
InvitationNameAttr string `json:"invitation_name_attr"`
|
|
|
|
InvitedMailFormat string `json:"invited_mail_format"`
|
|
|
|
InvitedAutoGroups []string `json:"invited_auto_groups"`
|
2020-02-09 17:03:10 +00:00
|
|
|
|
2020-02-14 20:58:34 +00:00
|
|
|
WebAddress string `json:"web_address"`
|
|
|
|
MailFrom string `json:"mail_from"`
|
|
|
|
SMTPServer string `json:"smtp_server"`
|
|
|
|
SMTPUsername string `json:"smtp_username"`
|
|
|
|
SMTPPassword string `json:"smtp_password"`
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
AdminAccount string `json:"admin_account"`
|
2020-02-09 16:52:48 +00:00
|
|
|
GroupCanInvite string `json:"group_can_invite"`
|
|
|
|
GroupCanAdmin string `json:"group_can_admin"`
|
2020-02-09 14:01:20 +00:00
|
|
|
}
|
2020-02-09 13:46:52 +00:00
|
|
|
|
2020-02-09 14:01:20 +00:00
|
|
|
var configFlag = flag.String("config", "./config.json", "Configuration file path")
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
var config *ConfigFile
|
|
|
|
|
|
|
|
const SESSION_NAME = "guichet_session"
|
|
|
|
|
2020-02-09 15:46:26 +00:00
|
|
|
var store sessions.Store = nil
|
|
|
|
|
|
|
|
func readConfig() ConfigFile {
|
2020-02-09 14:01:20 +00:00
|
|
|
config_file := ConfigFile{
|
|
|
|
HttpBindAddr: ":9991",
|
2020-02-09 14:44:18 +00:00
|
|
|
LdapServerAddr: "ldap://127.0.0.1:389",
|
2020-02-09 15:46:26 +00:00
|
|
|
LdapTLS: false,
|
2020-02-14 20:58:34 +00:00
|
|
|
|
|
|
|
BaseDN: "dc=example,dc=com",
|
|
|
|
UserBaseDN: "ou=users,dc=example,dc=com",
|
|
|
|
UserNameAttr: "uid",
|
|
|
|
GroupBaseDN: "ou=groups,dc=example,dc=com",
|
|
|
|
GroupNameAttr: "gid",
|
|
|
|
|
|
|
|
InvitationBaseDN: "ou=invitations,dc=example,dc=com",
|
|
|
|
InvitationNameAttr: "cn",
|
|
|
|
InvitedMailFormat: "{}@example.com",
|
|
|
|
InvitedAutoGroups: []string{},
|
|
|
|
|
|
|
|
WebAddress: "https://guichet.example.com",
|
|
|
|
MailFrom: "guichet@example.com",
|
|
|
|
SMTPServer: "smtp.example.com",
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
AdminAccount: "uid=admin,dc=example,dc=com",
|
2020-02-09 17:03:10 +00:00
|
|
|
GroupCanInvite: "",
|
|
|
|
GroupCanAdmin: "gid=admin,ou=groups,dc=example,dc=com",
|
2020-02-09 14:01:20 +00:00
|
|
|
}
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
_, err := os.Stat(*configFlag)
|
2020-02-09 14:01:20 +00:00
|
|
|
if os.IsNotExist(err) {
|
|
|
|
// Generate default config file
|
|
|
|
log.Printf("Generating default config file as %s", *configFlag)
|
|
|
|
|
|
|
|
bytes, err := json.MarshalIndent(&config_file, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(*configFlag, bytes, 0644)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return config_file
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
bytes, err := ioutil.ReadFile(*configFlag)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = json.Unmarshal(bytes, &config_file)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return config_file
|
2020-02-09 13:46:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
2020-02-09 14:01:20 +00:00
|
|
|
flag.Parse()
|
2020-02-09 13:46:52 +00:00
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
config_file := readConfig()
|
|
|
|
config = &config_file
|
2020-02-10 14:26:02 +00:00
|
|
|
|
|
|
|
session_key := make([]byte, 32)
|
|
|
|
n, err := rand.Read(session_key)
|
|
|
|
if err != nil || n != 32 {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
store = sessions.NewCookieStore(session_key)
|
2020-02-09 14:01:20 +00:00
|
|
|
|
2020-02-09 21:06:33 +00:00
|
|
|
r := mux.NewRouter()
|
|
|
|
r.HandleFunc("/", handleHome)
|
|
|
|
r.HandleFunc("/logout", handleLogout)
|
|
|
|
r.HandleFunc("/profile", handleProfile)
|
|
|
|
r.HandleFunc("/passwd", handlePasswd)
|
2020-02-09 13:46:52 +00:00
|
|
|
|
2021-07-21 19:21:46 +00:00
|
|
|
r.HandleFunc("/directory", handleDirectory)
|
|
|
|
r.HandleFunc("/search/{input}", handleSearch)
|
|
|
|
|
2020-02-14 17:57:25 +00:00
|
|
|
r.HandleFunc("/invite/new_account", handleInviteNewAccount)
|
|
|
|
r.HandleFunc("/invite/send_code", handleInviteSendCode)
|
2020-02-14 20:58:34 +00:00
|
|
|
r.HandleFunc("/invitation/{code}", handleInvitationCode)
|
2020-02-14 17:57:25 +00:00
|
|
|
|
2020-02-09 21:06:33 +00:00
|
|
|
r.HandleFunc("/admin/users", handleAdminUsers)
|
|
|
|
r.HandleFunc("/admin/groups", handleAdminGroups)
|
|
|
|
r.HandleFunc("/admin/ldap/{dn}", handleAdminLDAP)
|
2020-02-09 22:04:27 +00:00
|
|
|
r.HandleFunc("/admin/create/{template}/{super_dn}", handleAdminCreate)
|
2020-02-09 17:28:42 +00:00
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
staticfiles := http.FileServer(http.Dir("static"))
|
2020-02-09 21:06:33 +00:00
|
|
|
r.Handle("/static/{file:.*}", http.StripPrefix("/static/", staticfiles))
|
2020-02-09 14:44:18 +00:00
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
log.Printf("Starting HTTP server on %s", config.HttpBindAddr)
|
2020-02-10 14:26:02 +00:00
|
|
|
err = http.ListenAndServe(config.HttpBindAddr, logRequest(r))
|
2020-02-09 13:46:52 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal("Cannot start http server: ", err)
|
|
|
|
}
|
|
|
|
}
|
2020-02-09 14:01:20 +00:00
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
type LoginInfo struct {
|
|
|
|
Username string
|
2020-02-09 15:46:26 +00:00
|
|
|
DN string
|
2020-02-09 14:44:18 +00:00
|
|
|
Password string
|
2020-02-09 15:46:26 +00:00
|
|
|
}
|
2020-02-09 14:44:18 +00:00
|
|
|
|
2020-02-09 16:35:16 +00:00
|
|
|
type LoginStatus struct {
|
2020-02-09 16:52:48 +00:00
|
|
|
Info *LoginInfo
|
|
|
|
conn *ldap.Conn
|
2020-02-09 16:35:16 +00:00
|
|
|
UserEntry *ldap.Entry
|
2020-02-11 23:13:24 +00:00
|
|
|
CanAdmin bool
|
|
|
|
CanInvite bool
|
2020-02-09 16:35:16 +00:00
|
|
|
}
|
|
|
|
|
2020-02-14 20:58:34 +00:00
|
|
|
func (login *LoginStatus) WelcomeName() string {
|
|
|
|
ret := login.UserEntry.GetAttributeValue("givenname")
|
|
|
|
if ret == "" {
|
|
|
|
ret = login.UserEntry.GetAttributeValue("displayname")
|
|
|
|
}
|
|
|
|
if ret == "" {
|
|
|
|
ret = login.Info.Username
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
func logRequest(handler http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
log.Printf("%s %s %s\n", r.RemoteAddr, r.Method, r.URL)
|
|
|
|
handler.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-09 16:35:16 +00:00
|
|
|
func checkLogin(w http.ResponseWriter, r *http.Request) *LoginStatus {
|
2020-02-10 14:26:02 +00:00
|
|
|
var login_info *LoginInfo
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
session, err := store.Get(r, SESSION_NAME)
|
2020-02-10 14:26:02 +00:00
|
|
|
if err == nil {
|
|
|
|
username, ok := session.Values["login_username"]
|
|
|
|
password, ok2 := session.Values["login_password"]
|
|
|
|
user_dn, ok3 := session.Values["login_dn"]
|
|
|
|
|
|
|
|
if ok && ok2 && ok3 {
|
|
|
|
login_info = &LoginInfo{
|
|
|
|
DN: user_dn.(string),
|
|
|
|
Username: username.(string),
|
|
|
|
Password: password.(string),
|
|
|
|
}
|
|
|
|
}
|
2020-02-09 15:46:26 +00:00
|
|
|
}
|
2020-02-09 14:44:18 +00:00
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
if login_info == nil {
|
2020-02-09 16:35:16 +00:00
|
|
|
login_info = handleLogin(w, r)
|
|
|
|
if login_info == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2020-02-09 14:44:18 +00:00
|
|
|
}
|
|
|
|
|
2020-02-09 16:35:16 +00:00
|
|
|
l := ldapOpen(w)
|
|
|
|
if l == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
err = l.Bind(login_info.DN, login_info.Password)
|
|
|
|
if err != nil {
|
|
|
|
delete(session.Values, "login_username")
|
|
|
|
delete(session.Values, "login_password")
|
|
|
|
delete(session.Values, "login_dn")
|
|
|
|
|
|
|
|
err = session.Save(r, w)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return checkLogin(w, r)
|
|
|
|
}
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
loginStatus := &LoginStatus{
|
2020-02-10 14:26:02 +00:00
|
|
|
Info: login_info,
|
|
|
|
conn: l,
|
2020-02-10 14:26:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
requestKind := "(objectClass=organizationalPerson)"
|
2020-02-11 23:13:24 +00:00
|
|
|
if strings.EqualFold(login_info.DN, config.AdminAccount) {
|
2020-02-10 14:26:02 +00:00
|
|
|
requestKind = "(objectclass=*)"
|
|
|
|
}
|
2020-02-09 16:35:16 +00:00
|
|
|
searchRequest := ldap.NewSearchRequest(
|
|
|
|
login_info.DN,
|
|
|
|
ldap.ScopeBaseObject, ldap.NeverDerefAliases, 0, 0, false,
|
2020-02-10 14:26:02 +00:00
|
|
|
requestKind,
|
2020-02-09 16:52:48 +00:00
|
|
|
[]string{"dn", "displayname", "givenname", "sn", "mail", "memberof"},
|
2020-02-09 16:35:16 +00:00
|
|
|
nil)
|
|
|
|
|
|
|
|
sr, err := l.Search(searchRequest)
|
2020-02-09 16:52:48 +00:00
|
|
|
if err != nil {
|
2020-02-09 16:35:16 +00:00
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sr.Entries) != 1 {
|
2020-02-10 14:26:02 +00:00
|
|
|
http.Error(w, fmt.Sprintf("Unable to find entry for %s", login_info.DN), http.StatusInternalServerError)
|
2020-02-09 16:35:16 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
loginStatus.UserEntry = sr.Entries[0]
|
|
|
|
|
2020-02-11 23:13:24 +00:00
|
|
|
loginStatus.CanAdmin = strings.EqualFold(loginStatus.Info.DN, config.AdminAccount)
|
|
|
|
loginStatus.CanInvite = false
|
|
|
|
for _, attr := range loginStatus.UserEntry.Attributes {
|
|
|
|
if strings.EqualFold(attr.Name, "memberof") {
|
|
|
|
for _, group := range attr.Values {
|
|
|
|
if config.GroupCanInvite != "" && strings.EqualFold(group, config.GroupCanInvite) {
|
|
|
|
loginStatus.CanInvite = true
|
|
|
|
}
|
|
|
|
if config.GroupCanAdmin != "" && strings.EqualFold(group, config.GroupCanAdmin) {
|
|
|
|
loginStatus.CanAdmin = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
return loginStatus
|
2020-02-09 14:44:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func ldapOpen(w http.ResponseWriter) *ldap.Conn {
|
|
|
|
l, err := ldap.DialURL(config.LdapServerAddr)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LdapTLS {
|
|
|
|
err = l.StartTLS(&tls.Config{InsecureSkipVerify: true})
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return l
|
|
|
|
}
|
|
|
|
|
2020-02-09 14:01:20 +00:00
|
|
|
// Page handlers ----
|
|
|
|
|
2020-02-09 16:52:48 +00:00
|
|
|
type HomePageData struct {
|
2020-02-14 20:58:34 +00:00
|
|
|
Login *LoginStatus
|
|
|
|
BaseDN string
|
2020-02-09 16:52:48 +00:00
|
|
|
}
|
|
|
|
|
2020-02-09 14:01:20 +00:00
|
|
|
func handleHome(w http.ResponseWriter, r *http.Request) {
|
2020-02-09 15:46:26 +00:00
|
|
|
templateHome := template.Must(template.ParseFiles("templates/layout.html", "templates/home.html"))
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
login := checkLogin(w, r)
|
|
|
|
if login == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-10 14:26:02 +00:00
|
|
|
data := &HomePageData{
|
2020-02-14 20:58:34 +00:00
|
|
|
Login: login,
|
|
|
|
BaseDN: config.BaseDN,
|
2020-02-10 14:26:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
templateHome.Execute(w, data)
|
2020-02-09 14:44:18 +00:00
|
|
|
}
|
|
|
|
|
2020-02-09 15:46:26 +00:00
|
|
|
func handleLogout(w http.ResponseWriter, r *http.Request) {
|
|
|
|
session, err := store.Get(r, SESSION_NAME)
|
|
|
|
if err != nil {
|
2020-02-14 17:57:25 +00:00
|
|
|
session, _ = store.New(r, SESSION_NAME)
|
2020-02-09 15:46:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
delete(session.Values, "login_username")
|
|
|
|
delete(session.Values, "login_password")
|
|
|
|
delete(session.Values, "login_dn")
|
|
|
|
|
|
|
|
err = session.Save(r, w)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
http.Redirect(w, r, "/", http.StatusFound)
|
|
|
|
}
|
|
|
|
|
2020-02-09 17:03:10 +00:00
|
|
|
type LoginFormData struct {
|
|
|
|
Username string
|
2020-02-12 15:02:42 +00:00
|
|
|
WrongUser bool
|
|
|
|
WrongPass bool
|
2020-02-09 17:03:10 +00:00
|
|
|
ErrorMessage string
|
|
|
|
}
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
func handleLogin(w http.ResponseWriter, r *http.Request) *LoginInfo {
|
2020-02-09 15:46:26 +00:00
|
|
|
templateLogin := template.Must(template.ParseFiles("templates/layout.html", "templates/login.html"))
|
|
|
|
|
2020-02-09 14:44:18 +00:00
|
|
|
if r.Method == "GET" {
|
|
|
|
templateLogin.Execute(w, LoginFormData{})
|
|
|
|
return nil
|
|
|
|
} else if r.Method == "POST" {
|
|
|
|
r.ParseForm()
|
|
|
|
|
|
|
|
username := strings.Join(r.Form["username"], "")
|
2020-02-09 15:46:26 +00:00
|
|
|
password := strings.Join(r.Form["password"], "")
|
2020-02-09 17:03:10 +00:00
|
|
|
user_dn := fmt.Sprintf("%s=%s,%s", config.UserNameAttr, username, config.UserBaseDN)
|
2020-02-11 23:13:24 +00:00
|
|
|
if strings.EqualFold(username, config.AdminAccount) {
|
2020-02-10 14:26:02 +00:00
|
|
|
user_dn = username
|
|
|
|
}
|
2020-02-09 14:44:18 +00:00
|
|
|
|
|
|
|
l := ldapOpen(w)
|
|
|
|
if l == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-09 15:46:26 +00:00
|
|
|
err := l.Bind(user_dn, password)
|
2020-02-09 14:44:18 +00:00
|
|
|
if err != nil {
|
2020-02-12 15:02:42 +00:00
|
|
|
data := &LoginFormData{
|
|
|
|
Username: username,
|
|
|
|
}
|
|
|
|
if ldap.IsErrorWithCode(err, ldap.LDAPResultInvalidCredentials) {
|
|
|
|
data.WrongPass = true
|
|
|
|
} else if ldap.IsErrorWithCode(err, ldap.LDAPResultNoSuchObject) {
|
|
|
|
data.WrongUser = true
|
|
|
|
} else {
|
|
|
|
data.ErrorMessage = err.Error()
|
|
|
|
}
|
|
|
|
templateLogin.Execute(w, data)
|
2020-02-09 14:44:18 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Successfully logged in, save it to session
|
|
|
|
session, err := store.Get(r, SESSION_NAME)
|
|
|
|
if err != nil {
|
2020-02-10 14:26:02 +00:00
|
|
|
session, _ = store.New(r, SESSION_NAME)
|
2020-02-09 14:44:18 +00:00
|
|
|
}
|
|
|
|
|
2020-02-09 15:46:26 +00:00
|
|
|
session.Values["login_username"] = username
|
|
|
|
session.Values["login_password"] = password
|
|
|
|
session.Values["login_dn"] = user_dn
|
|
|
|
|
|
|
|
err = session.Save(r, w)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return &LoginInfo{
|
|
|
|
DN: user_dn,
|
|
|
|
Username: username,
|
|
|
|
Password: password,
|
|
|
|
}
|
2020-02-09 14:44:18 +00:00
|
|
|
} else {
|
|
|
|
http.Error(w, "Unsupported method", http.StatusBadRequest)
|
|
|
|
return nil
|
|
|
|
}
|
2020-02-09 14:01:20 +00:00
|
|
|
}
|