Files
cloudron-box/src/externalldap.js
T

229 lines
9.6 KiB
JavaScript
Raw Normal View History

'use strict';
exports = module.exports = {
verifyPassword: verifyPassword,
testConfig: testConfig,
2019-08-29 17:19:51 +02:00
startSyncer: startSyncer,
2019-10-25 15:58:11 -07:00
injectPrivateFields: injectPrivateFields,
removePrivateFields: removePrivateFields,
sync: sync
};
var assert = require('assert'),
async = require('async'),
2019-08-29 22:15:48 +02:00
auditsource = require('./auditsource.js'),
2019-10-24 13:41:41 -07:00
BoxError = require('./boxerror.js'),
2019-10-25 15:58:11 -07:00
constants = require('./constants.js'),
2019-08-30 19:11:27 +02:00
debug = require('debug')('box:externalldap'),
ldap = require('ldapjs'),
settings = require('./settings.js'),
2019-08-29 17:19:51 +02:00
tasks = require('./tasks.js'),
2019-10-24 15:12:58 -07:00
users = require('./users.js');
2019-10-25 15:58:11 -07:00
function injectPrivateFields(newConfig, currentConfig) {
if (newConfig.bindPassword === constants.SECRET_PLACEHOLDER) newConfig.bindPassword = currentConfig.bindPassword;
}
function removePrivateFields(ldapConfig) {
assert.strictEqual(typeof ldapConfig, 'object');
if (ldapConfig.bindPassword) ldapConfig.bindPassword = constants.SECRET_PLACEHOLDER;
return ldapConfig;
}
// performs service bind if required
2019-08-29 17:19:51 +02:00
function getClient(externalLdapConfig, callback) {
assert.strictEqual(typeof callback, 'function');
2019-08-29 22:51:27 +02:00
// basic validation to not crash
2019-10-24 13:41:41 -07:00
try { ldap.parseDN(externalLdapConfig.baseDn); } catch (e) { return callback(new BoxError(BoxError.BAD_FIELD, 'invalid baseDn')); }
try { ldap.parseFilter(externalLdapConfig.filter); } catch (e) { return callback(new BoxError(BoxError.BAD_FIELD, 'invalid filter')); }
if (externalLdapConfig.bindDn) try { ldap.parseFilter(externalLdapConfig.bindDn); } catch (e) { return callback(new BoxError(BoxError.INVALID_CREDENTIALS)); }
2019-08-29 22:51:27 +02:00
2019-08-29 17:19:51 +02:00
var client;
try {
client = ldap.createClient({ url: externalLdapConfig.url });
} catch (e) {
2019-10-24 13:41:41 -07:00
if (e instanceof ldap.ProtocolError) return callback(new BoxError(BoxError.BAD_FIELD, 'url protocol is invalid'));
return callback(new BoxError(BoxError.INTERNAL_ERROR, e));
2019-08-29 17:19:51 +02:00
}
2019-08-29 17:19:51 +02:00
if (!externalLdapConfig.bindDn) return callback(null, client);
2019-08-29 17:19:51 +02:00
client.bind(externalLdapConfig.bindDn, externalLdapConfig.bindPassword, function (error) {
2019-10-24 13:41:41 -07:00
if (error instanceof ldap.InvalidCredentialsError) return callback(new BoxError(BoxError.INVALID_CREDENTIALS));
if (error) return callback(new BoxError(BoxError.EXTERNAL_ERROR, error));
2019-08-29 17:19:51 +02:00
callback(null, client, externalLdapConfig);
});
}
function testConfig(config, callback) {
assert.strictEqual(typeof config, 'object');
assert.strictEqual(typeof callback, 'function');
2019-10-25 15:40:22 -07:00
if (config.provider === 'noop') return callback();
2019-08-29 12:28:41 +02:00
2019-10-24 13:41:41 -07:00
if (!config.url) return callback(new BoxError(BoxError.BAD_FIELD, 'url must not be empty'));
if (!config.baseDn) return callback(new BoxError(BoxError.BAD_FIELD, 'basedn must not be empty'));
if (!config.filter) return callback(new BoxError(BoxError.BAD_FIELD, 'filter must not be empty'));
2019-10-25 15:47:55 -07:00
if (!config.usernameField) config.usernameField = 'uid';
2019-08-29 17:19:51 +02:00
getClient(config, function (error, client) {
if (error) return callback(error);
var opts = {
filter: config.filter,
scope: 'sub'
};
client.search(config.baseDn, opts, function (error, result) {
2019-10-24 13:41:41 -07:00
if (error) return callback(new BoxError(BoxError.EXTERNAL_ERROR, error));
2019-10-23 15:57:01 -07:00
result.on('searchEntry', function (/* entry */) {});
2019-10-25 16:58:15 -07:00
result.on('error', function (error) { client.unbind(); callback(new BoxError(BoxError.BAD_FIELD, `Unable to search directory: ${error.message}`)); });
result.on('end', function (/* result */) { client.unbind(); callback(); });
});
});
}
function verifyPassword(user, password, callback) {
assert.strictEqual(typeof user, 'object');
assert.strictEqual(typeof password, 'string');
assert.strictEqual(typeof callback, 'function');
settings.getExternalLdapConfig(function (error, externalLdapConfig) {
2019-10-24 18:32:33 -07:00
if (error) return callback(error);
2019-10-25 15:40:22 -07:00
if (externalLdapConfig.provider === 'noop') return callback(new BoxError(BoxError.BAD_STATE, 'not enabled'));
getClient(externalLdapConfig, function (error, client) {
if (error) return callback(error);
const dn = `uid=${user.username},${externalLdapConfig.baseDn}`;
client.bind(dn, password, function (error) {
2019-10-24 13:41:41 -07:00
if (error instanceof ldap.InvalidCredentialsError) return callback(new BoxError(BoxError.INVALID_CREDENTIALS));
if (error) return callback(new BoxError(BoxError.EXTERNAL_ERROR, error));
callback();
});
});
});
}
2019-08-29 17:19:51 +02:00
function startSyncer(callback) {
assert.strictEqual(typeof callback, 'function');
2019-08-29 17:19:51 +02:00
settings.getExternalLdapConfig(function (error, externalLdapConfig) {
2019-10-24 18:32:33 -07:00
if (error) return callback(error);
2019-10-25 15:40:22 -07:00
if (externalLdapConfig.provider === 'noop') return callback(new BoxError(BoxError.BAD_STATE, 'not enabled'));
2019-08-29 17:19:51 +02:00
tasks.add(tasks.TASK_SYNC_EXTERNAL_LDAP, [], function (error, taskId) {
2019-10-24 18:32:33 -07:00
if (error) return callback(error);
2019-08-29 17:19:51 +02:00
tasks.startTask(taskId, {}, function (error, result) {
debug('sync: done', error, result);
});
2019-08-29 17:19:51 +02:00
callback(null, taskId);
});
});
}
function sync(progressCallback, callback) {
assert.strictEqual(typeof progressCallback, 'function');
assert.strictEqual(typeof callback, 'function');
2019-08-30 19:11:27 +02:00
debug('Start user syncing ...');
2019-08-29 17:19:51 +02:00
settings.getExternalLdapConfig(function (error, externalLdapConfig) {
2019-10-24 18:32:33 -07:00
if (error) return callback(error);
2019-10-25 15:40:22 -07:00
if (externalLdapConfig.provider === 'noop') return callback(new BoxError(BoxError.BAD_STATE, 'not enabled'));
2019-08-29 17:19:51 +02:00
getClient(externalLdapConfig, function (error, client) {
if (error) return callback(error);
var opts = {
2019-08-30 19:11:27 +02:00
paged: true,
2019-08-29 17:19:51 +02:00
filter: externalLdapConfig.filter,
2019-08-29 22:51:27 +02:00
scope: 'sub' // We may have to make this configurable
2019-08-29 17:19:51 +02:00
};
2019-08-30 19:11:27 +02:00
debug(`Listing users at ${externalLdapConfig.baseDn} with filter ${externalLdapConfig.filter}`);
2019-08-29 17:19:51 +02:00
client.search(externalLdapConfig.baseDn, opts, function (error, result) {
2019-10-24 13:41:41 -07:00
if (error) return callback(new BoxError(BoxError.EXTERNAL_ERROR, error));
2019-08-29 17:19:51 +02:00
var ldapUsers = [];
2019-08-29 22:15:48 +02:00
result.on('searchEntry', function (entry) {
ldapUsers.push(entry.object);
2019-08-29 17:19:51 +02:00
});
result.on('error', function (error) {
2019-10-24 13:41:41 -07:00
callback(new BoxError(BoxError.EXTERNAL_ERROR, error));
2019-08-29 17:19:51 +02:00
});
2019-08-29 22:15:48 +02:00
result.on('end', function (result) {
2019-10-24 13:41:41 -07:00
if (result.status !== 0) return callback(new BoxError(BoxError.EXTERNAL_ERROR, 'Server returned status ' + result.status));
2019-08-30 19:11:27 +02:00
debug(`Found ${ldapUsers.length} users`);
// we ignore all errors here and just log them for now
2019-10-25 15:40:22 -07:00
async.eachSeries(ldapUsers, function (user, iteratorCallback) {
// ignore the bindDn user if any
2019-10-25 15:40:22 -07:00
if (user.dn === externalLdapConfig.bindDn) return iteratorCallback();
2019-10-25 15:47:55 -07:00
const username = user[externalLdapConfig.usernameField];
2019-10-25 16:58:15 -07:00
if (!username) {
debug(`[empty username] username=${username} email=${user.mail} cn=${user.cn} usernameField=${externalLdapConfig.usernameField}`);
return iteratorCallback();
}
2019-10-25 15:47:55 -07:00
users.getByUsername(username, function (error, result) {
2019-10-24 15:12:58 -07:00
if (error && error.reason !== BoxError.NOT_FOUND) {
2019-10-25 16:13:41 -07:00
debug(`Could not find user with username ${username}: ${error.message}`);
2019-10-25 15:40:22 -07:00
return iteratorCallback();
}
if (error) {
2019-10-25 16:13:41 -07:00
debug(`[adding user] username=${username} email=${user.mail} cn=${user.cn}`);
2019-10-25 15:47:55 -07:00
users.create(username, null /* password */, user.mail, user.cn, { source: 'ldap' }, auditsource.EXTERNAL_LDAP_TASK, function (error) {
if (error) console.error('Failed to create user', user, error);
2019-10-25 15:40:22 -07:00
iteratorCallback();
});
} else if (result.source !== 'ldap') {
2019-10-25 16:13:41 -07:00
debug(`[conflicting user] username=${username} email=${user.mail} cn=${user.cn}`);
2019-08-30 19:11:27 +02:00
2019-10-25 15:40:22 -07:00
iteratorCallback();
} else if (result.email !== user.mail || result.displayName !== user.cn) {
2019-10-25 16:13:41 -07:00
debug(`[updating user] username=${username} email=${user.mail} cn=${user.cn}`);
2019-08-30 13:10:49 +02:00
users.update(result.id, { email: user.mail, fallbackEmail: user.mail, displayName: user.cn }, auditsource.EXTERNAL_LDAP_TASK, function (error) {
2019-10-25 16:13:41 -07:00
if (error) debug('Failed to update user', user, error);
2019-10-25 15:40:22 -07:00
iteratorCallback();
});
} else {
// user known and up-to-date
2019-10-25 16:13:41 -07:00
debug(`[up-to-date user] username=${username} email=${user.mail} cn=${user.cn}`);
2019-10-25 15:40:22 -07:00
iteratorCallback();
}
});
2019-08-30 19:11:27 +02:00
}, function () {
debug('User sync done.');
2019-10-25 16:58:15 -07:00
client.unbind();
2019-08-30 19:11:27 +02:00
callback();
});
2019-08-29 17:19:51 +02:00
});
});
});
});
}