2019-08-28 18:22:07 +02:00
'use strict' ;
exports = module . exports = {
2021-05-01 11:21:09 -07:00
verifyPassword ,
2022-08-02 14:02:35 +02:00
verifyPasswordAndTotpToken ,
2021-07-15 09:50:11 -07:00
maybeCreateUser ,
2019-08-29 22:43:06 +02:00
2021-05-01 11:21:09 -07:00
testConfig ,
startSyncer ,
2019-08-28 18:22:07 +02:00
2021-05-01 11:21:09 -07:00
injectPrivateFields ,
removePrivateFields ,
2019-10-25 15:58:11 -07:00
2021-05-01 11:21:09 -07:00
sync
2019-08-28 18:22:07 +02:00
} ;
2021-06-28 15:15:28 -07:00
const assert = require ( 'assert' ) ,
2021-09-30 09:50:30 -07:00
AuditSource = require ( './auditsource.js' ) ,
2019-10-24 13:41:41 -07:00
BoxError = require ( './boxerror.js' ) ,
2019-10-25 15:58:11 -07:00
constants = require ( './constants.js' ) ,
2019-08-30 19:11:27 +02:00
debug = require ( 'debug' ) ( 'box:externalldap' ) ,
2020-06-04 13:26:13 +02:00
groups = require ( './groups.js' ) ,
2019-08-28 18:22:07 +02:00
ldap = require ( 'ldapjs' ) ,
2022-04-15 19:01:35 -05:00
once = require ( './once.js' ) ,
2021-06-28 15:15:28 -07:00
safe = require ( 'safetydance' ) ,
2019-08-28 18:22:07 +02:00
settings = require ( './settings.js' ) ,
2019-08-29 17:19:51 +02:00
tasks = require ( './tasks.js' ) ,
2021-06-28 15:15:28 -07:00
users = require ( './users.js' ) ,
util = require ( 'util' ) ;
2019-08-28 18:22:07 +02:00
2019-10-25 15:58:11 -07:00
function injectPrivateFields ( newConfig , currentConfig ) {
if ( newConfig . bindPassword === constants . SECRET _PLACEHOLDER ) newConfig . bindPassword = currentConfig . bindPassword ;
}
function removePrivateFields ( ldapConfig ) {
assert . strictEqual ( typeof ldapConfig , 'object' ) ;
if ( ldapConfig . bindPassword ) ldapConfig . bindPassword = constants . SECRET _PLACEHOLDER ;
return ldapConfig ;
}
2019-11-19 09:53:00 +01:00
function translateUser ( ldapConfig , ldapUser ) {
assert . strictEqual ( typeof ldapConfig , 'object' ) ;
2022-02-18 17:31:02 +01:00
// RFC: https://datatracker.ietf.org/doc/html/rfc2798
2019-11-19 09:53:00 +01:00
return {
2022-04-23 11:11:46 +02:00
username : ldapUser [ ldapConfig . usernameField ] . toLowerCase ( ) ,
2020-07-01 14:34:28 +02:00
email : ldapUser . mail || ldapUser . mailPrimaryAddress ,
2022-08-02 14:02:35 +02:00
twoFactorAuthenticationEnabled : ! ! ldapUser . twoFactorAuthenticationEnabled ,
2022-02-18 17:31:02 +01:00
displayName : ldapUser . displayName || ldapUser . cn // user.giveName + ' ' + user.sn
2019-11-19 09:53:00 +01:00
} ;
}
function validUserRequirements ( user ) {
if ( ! user . username || ! user . email || ! user . displayName ) {
2020-07-01 14:34:28 +02:00
debug ( ` [Invalid LDAP user] username= ${ user . username } email= ${ user . email } displayName= ${ user . displayName } ` ) ;
2019-11-19 09:53:00 +01:00
return false ;
} else {
return true ;
}
}
2019-08-28 18:22:07 +02:00
// performs service bind if required
2021-09-01 13:09:49 -07:00
async function getClient ( externalLdapConfig , options ) {
2019-10-30 14:37:48 -07:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
2021-09-01 13:09:49 -07:00
assert . strictEqual ( typeof options , 'object' ) ;
2020-06-26 14:08:16 +02:00
2019-08-29 22:51:27 +02:00
// basic validation to not crash
2021-09-01 13:09:49 -07:00
try { ldap . parseDN ( externalLdapConfig . baseDn ) ; } catch ( e ) { throw new BoxError ( BoxError . BAD _FIELD , 'invalid baseDn' ) ; }
try { ldap . parseFilter ( externalLdapConfig . filter ) ; } catch ( e ) { throw new BoxError ( BoxError . BAD _FIELD , 'invalid filter' ) ; }
2019-08-29 22:51:27 +02:00
2021-09-01 13:09:49 -07:00
const config = {
2020-06-25 17:36:23 +02:00
url : externalLdapConfig . url ,
tlsOptions : {
rejectUnauthorized : externalLdapConfig . acceptSelfSignedCerts ? false : true
}
} ;
2021-09-01 13:09:49 -07:00
let client ;
2019-08-29 17:19:51 +02:00
try {
2020-06-25 17:36:23 +02:00
client = ldap . createClient ( config ) ;
2019-08-29 17:19:51 +02:00
} catch ( e ) {
2021-09-01 13:09:49 -07:00
if ( e instanceof ldap . ProtocolError ) throw new BoxError ( BoxError . BAD _FIELD , 'url protocol is invalid' ) ;
throw new BoxError ( BoxError . INTERNAL _ERROR , e ) ;
2019-08-29 17:19:51 +02:00
}
2019-08-28 18:22:07 +02:00
2020-07-01 14:59:26 +02:00
// skip bind auth if none exist or if not wanted
2021-09-01 13:09:49 -07:00
if ( ! externalLdapConfig . bindDn || ! options . bind ) return client ;
return await new Promise ( ( resolve , reject ) => {
reject = once ( reject ) ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
// ensure we don't just crash
client . on ( 'error' , function ( error ) {
reject ( new BoxError ( BoxError . EXTERNAL _ERROR , error ) ) ;
} ) ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
client . bind ( externalLdapConfig . bindDn , externalLdapConfig . bindPassword , function ( error ) {
if ( error instanceof ldap . InvalidCredentialsError ) return reject ( new BoxError ( BoxError . INVALID _CREDENTIALS ) ) ;
if ( error ) return reject ( new BoxError ( BoxError . EXTERNAL _ERROR , error ) ) ;
resolve ( client ) ;
} ) ;
2019-08-28 18:22:07 +02:00
} ) ;
}
2021-09-01 13:09:49 -07:00
async function clientSearch ( client , dn , searchOptions ) {
assert . strictEqual ( typeof client , 'object' ) ;
2020-06-05 10:29:36 +02:00
assert . strictEqual ( typeof dn , 'string' ) ;
2021-09-01 13:09:49 -07:00
assert . strictEqual ( typeof searchOptions , 'object' ) ;
2020-06-05 10:29:36 +02:00
2021-09-01 13:09:49 -07:00
// basic validation to not crash
try { ldap . parseDN ( dn ) ; } catch ( e ) { throw new BoxError ( BoxError . BAD _FIELD , 'invalid DN' ) ; }
2020-07-30 15:08:01 +02:00
2021-09-01 13:09:49 -07:00
return await new Promise ( ( resolve , reject ) => {
2020-06-05 10:29:36 +02:00
client . search ( dn , searchOptions , function ( error , result ) {
2021-09-01 13:09:49 -07:00
if ( error instanceof ldap . NoSuchObjectError ) return reject ( new BoxError ( BoxError . NOT _FOUND ) ) ;
if ( error ) return reject ( new BoxError ( BoxError . EXTERNAL _ERROR , error ) ) ;
2020-06-05 10:29:36 +02:00
let ldapObjects = [ ] ;
result . on ( 'searchEntry' , entry => ldapObjects . push ( entry . object ) ) ;
2021-09-01 13:09:49 -07:00
result . on ( 'error' , error => reject ( new BoxError ( BoxError . EXTERNAL _ERROR , error ) ) ) ;
2020-06-05 10:29:36 +02:00
result . on ( 'end' , function ( result ) {
2021-09-01 13:09:49 -07:00
if ( result . status !== 0 ) return reject ( new BoxError ( BoxError . EXTERNAL _ERROR , 'Server returned status ' + result . status ) ) ;
2020-06-05 10:29:36 +02:00
2021-09-01 13:09:49 -07:00
resolve ( ldapObjects ) ;
2020-06-05 10:29:36 +02:00
} ) ;
} ) ;
} ) ;
}
2019-11-19 09:53:00 +01:00
2021-09-01 13:09:49 -07:00
async function ldapGetByDN ( externalLdapConfig , dn ) {
2019-10-30 14:37:48 -07:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
2021-09-01 13:09:49 -07:00
assert . strictEqual ( typeof dn , 'string' ) ;
2019-10-30 14:37:48 -07:00
2021-09-01 13:09:49 -07:00
const searchOptions = {
paged : true ,
scope : 'sub' // We may have to make this configurable
} ;
2019-10-30 14:37:48 -07:00
2021-09-01 13:09:49 -07:00
debug ( ` ldapGetByDN: Get object at ${ dn } ` ) ;
2019-10-30 14:37:48 -07:00
2021-09-01 13:09:49 -07:00
const client = await getClient ( externalLdapConfig , { bind : true } ) ;
const result = await clientSearch ( client , dn , searchOptions ) ;
client . unbind ( ) ;
if ( result . length === 0 ) throw new BoxError ( BoxError . NOT _FOUND ) ;
return result [ 0 ] ;
2019-10-30 14:37:48 -07:00
}
2021-09-01 13:09:49 -07:00
// TODO support search by email
async function ldapUserSearch ( externalLdapConfig , options ) {
2020-06-03 21:23:53 +02:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
assert . strictEqual ( typeof options , 'object' ) ;
2021-09-01 13:09:49 -07:00
const searchOptions = {
paged : true ,
filter : ldap . parseFilter ( externalLdapConfig . filter ) ,
scope : 'sub' // We may have to make this configurable
} ;
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
if ( options . filter ) { // https://github.com/ldapjs/node-ldapjs/blob/master/docs/filters.md
const extraFilter = ldap . parseFilter ( options . filter ) ;
searchOptions . filter = new ldap . AndFilter ( { filters : [ extraFilter , searchOptions . filter ] } ) ;
}
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
const client = await getClient ( externalLdapConfig , { bind : true } ) ;
const result = await clientSearch ( client , externalLdapConfig . baseDn , searchOptions ) ;
client . unbind ( ) ;
return result ;
}
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
async function ldapGroupSearch ( externalLdapConfig , options ) {
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
assert . strictEqual ( typeof options , 'object' ) ;
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
const searchOptions = {
paged : true ,
scope : 'sub' // We may have to make this configurable
} ;
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
if ( externalLdapConfig . groupFilter ) searchOptions . filter = ldap . parseFilter ( externalLdapConfig . groupFilter ) ;
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
if ( options . filter ) { // https://github.com/ldapjs/node-ldapjs/blob/master/docs/filters.md
const extraFilter = ldap . parseFilter ( options . filter ) ;
searchOptions . filter = new ldap . AndFilter ( { filters : [ extraFilter , searchOptions . filter ] } ) ;
}
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
const client = await getClient ( externalLdapConfig , { bind : true } ) ;
const result = await clientSearch ( client , externalLdapConfig . groupBaseDn , searchOptions ) ;
client . unbind ( ) ;
return result ;
2020-06-03 21:23:53 +02:00
}
2021-09-01 13:09:49 -07:00
async function testConfig ( config ) {
2019-08-28 18:22:07 +02:00
assert . strictEqual ( typeof config , 'object' ) ;
2021-09-01 13:09:49 -07:00
if ( config . provider === 'noop' ) return null ;
2019-08-29 12:28:41 +02:00
2021-09-01 13:09:49 -07:00
if ( ! config . url ) return new BoxError ( BoxError . BAD _FIELD , 'url must not be empty' ) ;
if ( ! config . url . startsWith ( 'ldap://' ) && ! config . url . startsWith ( 'ldaps://' ) ) return new BoxError ( BoxError . BAD _FIELD , 'url is missing ldap:// or ldaps:// prefix' ) ;
2019-10-25 15:47:55 -07:00
if ( ! config . usernameField ) config . usernameField = 'uid' ;
2019-10-31 11:46:00 -07:00
2019-10-30 09:35:30 -07:00
// bindDn may not be a dn!
2021-09-01 13:09:49 -07:00
if ( ! config . baseDn ) return new BoxError ( BoxError . BAD _FIELD , 'basedn must not be empty' ) ;
try { ldap . parseDN ( config . baseDn ) ; } catch ( e ) { return new BoxError ( BoxError . BAD _FIELD , 'invalid baseDn' ) ; }
2019-10-31 11:46:00 -07:00
2021-09-01 13:09:49 -07:00
if ( ! config . filter ) return new BoxError ( BoxError . BAD _FIELD , 'filter must not be empty' ) ;
try { ldap . parseFilter ( config . filter ) ; } catch ( e ) { return new BoxError ( BoxError . BAD _FIELD , 'invalid filter' ) ; }
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
if ( 'syncGroups' in config && typeof config . syncGroups !== 'boolean' ) return new BoxError ( BoxError . BAD _FIELD , 'syncGroups must be a boolean' ) ;
if ( 'acceptSelfSignedCerts' in config && typeof config . acceptSelfSignedCerts !== 'boolean' ) return new BoxError ( BoxError . BAD _FIELD , 'acceptSelfSignedCerts must be a boolean' ) ;
2020-06-07 13:49:01 +02:00
if ( config . syncGroups ) {
2021-09-01 13:09:49 -07:00
if ( ! config . groupBaseDn ) return new BoxError ( BoxError . BAD _FIELD , 'groupBaseDn must not be empty' ) ;
try { ldap . parseDN ( config . groupBaseDn ) ; } catch ( e ) { return new BoxError ( BoxError . BAD _FIELD , 'invalid groupBaseDn' ) ; }
2020-06-07 13:49:01 +02:00
2021-09-01 13:09:49 -07:00
if ( ! config . groupFilter ) return new BoxError ( BoxError . BAD _FIELD , 'groupFilter must not be empty' ) ;
try { ldap . parseFilter ( config . groupFilter ) ; } catch ( e ) { return new BoxError ( BoxError . BAD _FIELD , 'invalid groupFilter' ) ; }
2020-06-07 13:49:01 +02:00
2021-09-01 13:09:49 -07:00
if ( ! config . groupnameField || typeof config . groupnameField !== 'string' ) return new BoxError ( BoxError . BAD _FIELD , 'groupFilter must not be empty' ) ;
2020-06-07 13:49:01 +02:00
}
2021-09-01 13:09:49 -07:00
const [ error , client ] = await safe ( getClient ( config , { bind : true } ) ) ;
if ( error ) return error ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
const opts = {
filter : config . filter ,
scope : 'sub'
} ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
const [ searchError , ] = await safe ( clientSearch ( client , config . baseDn , opts ) ) ;
client . unbind ( ) ;
if ( searchError ) return searchError ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
return null ;
2019-08-28 18:22:07 +02:00
}
2021-10-26 18:04:25 +02:00
async function maybeCreateUser ( identifier ) {
2019-11-19 09:53:00 +01:00
assert . strictEqual ( typeof identifier , 'string' ) ;
2021-09-01 13:09:49 -07:00
const externalLdapConfig = await settings . getExternalLdapConfig ( ) ;
if ( externalLdapConfig . provider === 'noop' ) throw new BoxError ( BoxError . BAD _STATE , 'not enabled' ) ;
if ( ! externalLdapConfig . autoCreate ) throw new BoxError ( BoxError . BAD _STATE , 'auto create not enabled' ) ;
2019-11-19 09:53:00 +01:00
2021-09-01 13:09:49 -07:00
const ldapUsers = await ldapUserSearch ( externalLdapConfig , { filter : ` ${ externalLdapConfig . usernameField } = ${ identifier } ` } ) ;
if ( ldapUsers . length === 0 ) throw new BoxError ( BoxError . NOT _FOUND ) ;
if ( ldapUsers . length > 1 ) throw new BoxError ( BoxError . CONFLICT ) ;
2019-11-19 09:53:00 +01:00
2021-09-01 13:09:49 -07:00
const user = translateUser ( externalLdapConfig , ldapUsers [ 0 ] ) ;
if ( ! validUserRequirements ( user ) ) throw new BoxError ( BoxError . BAD _FIELD ) ;
2019-11-19 09:53:00 +01:00
2021-10-26 18:04:25 +02:00
const [ error , userId ] = await safe ( users . add ( user . email , { username : user . username , password : null , displayName : user . displayName , source : 'ldap' } , AuditSource . EXTERNAL _LDAP _AUTO _CREATE ) ) ;
2021-09-01 13:09:49 -07:00
if ( error ) {
debug ( ` maybeCreateUser: failed to auto create user ${ user . username } ` , error ) ;
throw error ;
}
2019-11-19 09:53:00 +01:00
2021-10-26 18:04:25 +02:00
// fetch the full record
return await users . get ( userId ) ;
2019-11-19 09:53:00 +01:00
}
2021-07-15 09:50:11 -07:00
async function verifyPassword ( user , password ) {
2019-08-29 22:43:06 +02:00
assert . strictEqual ( typeof user , 'object' ) ;
assert . strictEqual ( typeof password , 'string' ) ;
2021-09-01 13:09:49 -07:00
const externalLdapConfig = await settings . getExternalLdapConfig ( ) ;
if ( externalLdapConfig . provider === 'noop' ) throw new BoxError ( BoxError . BAD _STATE , 'not enabled' ) ;
2019-08-29 22:43:06 +02:00
2021-09-01 13:09:49 -07:00
const ldapUsers = await ldapUserSearch ( externalLdapConfig , { filter : ` ${ externalLdapConfig . usernameField } = ${ user . username } ` } ) ;
if ( ldapUsers . length === 0 ) throw new BoxError ( BoxError . NOT _FOUND ) ;
if ( ldapUsers . length > 1 ) throw new BoxError ( BoxError . CONFLICT ) ;
2019-08-29 22:43:06 +02:00
2021-09-01 13:09:49 -07:00
const client = await getClient ( externalLdapConfig , { bind : false } ) ;
2019-08-29 22:43:06 +02:00
2021-10-26 18:47:51 +02:00
const [ error ] = await safe ( util . promisify ( client . bind . bind ( client ) ) ( ldapUsers [ 0 ] . dn , password ) ) ;
2021-09-01 13:09:49 -07:00
client . unbind ( ) ;
if ( error instanceof ldap . InvalidCredentialsError ) throw new BoxError ( BoxError . INVALID _CREDENTIALS ) ;
2022-08-02 14:02:35 +02:00
if ( error ) throw new BoxError ( BoxError . EXTERNAL _ERROR , error ) ;
return translateUser ( externalLdapConfig , ldapUsers [ 0 ] ) ;
}
async function verifyPasswordAndTotpToken ( user , password , totpToken ) {
assert . strictEqual ( typeof user , 'object' ) ;
assert . strictEqual ( typeof password , 'string' ) ;
assert . strictEqual ( typeof totpToken , 'string' ) ;
const externalLdapConfig = await settings . getExternalLdapConfig ( ) ;
if ( externalLdapConfig . provider === 'noop' ) throw new BoxError ( BoxError . BAD _STATE , 'not enabled' ) ;
const ldapUsers = await ldapUserSearch ( externalLdapConfig , { filter : ` ${ externalLdapConfig . usernameField } = ${ user . username } ` } ) ;
if ( ldapUsers . length === 0 ) throw new BoxError ( BoxError . NOT _FOUND ) ;
if ( ldapUsers . length > 1 ) throw new BoxError ( BoxError . CONFLICT ) ;
const client = await getClient ( externalLdapConfig , { bind : false } ) ;
// inject totptoken into first attribute
const rdns = ldapUsers [ 0 ] . dn . split ( ',' ) ;
const totpTokenDn = ` ${ rdns [ 0 ] } +totptoken= ${ totpToken } , ` + rdns . slice ( 1 ) . join ( ',' ) ;
const [ error ] = await safe ( util . promisify ( client . bind . bind ( client ) ) ( totpTokenDn , password ) ) ;
client . unbind ( ) ;
if ( error instanceof ldap . InvalidCredentialsError ) throw new BoxError ( BoxError . INVALID _CREDENTIALS ) ;
2021-09-01 13:09:49 -07:00
if ( error ) throw new BoxError ( BoxError . EXTERNAL _ERROR , error ) ;
2020-07-01 14:59:26 +02:00
2021-09-01 13:09:49 -07:00
return translateUser ( externalLdapConfig , ldapUsers [ 0 ] ) ;
2019-08-29 22:43:06 +02:00
}
2021-09-01 13:09:49 -07:00
async function startSyncer ( ) {
const externalLdapConfig = await settings . getExternalLdapConfig ( ) ;
if ( externalLdapConfig . provider === 'noop' ) throw new BoxError ( BoxError . BAD _STATE , 'not enabled' ) ;
2019-08-28 18:22:07 +02:00
2021-09-01 13:09:49 -07:00
const taskId = await tasks . add ( tasks . TASK _SYNC _EXTERNAL _LDAP , [ ] ) ;
2021-07-12 23:35:30 -07:00
2021-09-01 13:09:49 -07:00
tasks . startTask ( taskId , { } , function ( error , result ) {
debug ( 'sync: done' , error , result ) ;
2019-08-29 17:19:51 +02:00
} ) ;
2021-09-01 13:09:49 -07:00
return taskId ;
2019-08-29 17:19:51 +02:00
}
2021-09-01 13:09:49 -07:00
async function syncUsers ( externalLdapConfig , progressCallback ) {
2020-06-05 09:26:52 +02:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
2019-08-29 17:19:51 +02:00
assert . strictEqual ( typeof progressCallback , 'function' ) ;
2021-09-01 13:09:49 -07:00
const ldapUsers = await ldapUserSearch ( externalLdapConfig , { } ) ;
2019-08-29 17:19:51 +02:00
2021-09-01 13:09:49 -07:00
debug ( ` syncUsers: Found ${ ldapUsers . length } users ` ) ;
2019-08-29 17:19:51 +02:00
2021-09-01 13:09:49 -07:00
let percent = 10 ;
let step = 30 / ( ldapUsers . length + 1 ) ; // ensure no divide by 0
2019-08-29 22:56:48 +02:00
2021-09-01 13:09:49 -07:00
// we ignore all errors here and just log them for now
for ( let i = 0 ; i < ldapUsers . length ; i ++ ) {
let ldapUser = translateUser ( externalLdapConfig , ldapUsers [ i ] ) ;
if ( ! validUserRequirements ( ldapUser ) ) continue ;
2019-10-25 16:58:15 -07:00
2021-09-01 13:09:49 -07:00
percent += step ;
progressCallback ( { percent , message : ` Syncing... ${ ldapUser . username } ` } ) ;
2021-09-01 14:37:09 +02:00
2021-09-01 13:09:49 -07:00
const user = await users . getByUsername ( ldapUser . username ) ;
2021-09-01 14:37:09 +02:00
2021-09-01 13:09:49 -07:00
if ( ! user ) {
debug ( ` syncUsers: [adding user] username= ${ ldapUser . username } email= ${ ldapUser . email } displayName= ${ ldapUser . displayName } ` ) ;
2021-09-30 09:50:30 -07:00
const [ userAddError ] = await safe ( users . add ( ldapUser . email , { username : ldapUser . username , password : null , displayName : ldapUser . displayName , source : 'ldap' } , AuditSource . EXTERNAL _LDAP _TASK ) ) ;
2021-10-28 10:29:02 +02:00
if ( userAddError ) debug ( 'syncUsers: Failed to create user' , ldapUser , userAddError ) ;
2021-09-01 13:09:49 -07:00
} else if ( user . source !== 'ldap' ) {
2021-09-13 21:17:27 +02:00
debug ( ` syncUsers: [mapping user] username= ${ ldapUser . username } email= ${ ldapUser . email } displayName= ${ ldapUser . displayName } ` ) ;
2021-09-30 09:50:30 -07:00
const [ userMappingError ] = await safe ( users . update ( user , { email : ldapUser . email , fallbackEmail : ldapUser . email , displayName : ldapUser . displayName , source : 'ldap' } , AuditSource . EXTERNAL _LDAP _TASK ) ) ;
2021-09-13 21:17:27 +02:00
if ( userMappingError ) debug ( 'Failed to map user' , ldapUser , userMappingError ) ;
2021-09-01 13:09:49 -07:00
} else if ( user . email !== ldapUser . email || user . displayName !== ldapUser . displayName ) {
debug ( ` syncUsers: [updating user] username= ${ ldapUser . username } email= ${ ldapUser . email } displayName= ${ ldapUser . displayName } ` ) ;
2021-09-30 09:50:30 -07:00
const [ userUpdateError ] = await safe ( users . update ( user , { email : ldapUser . email , fallbackEmail : ldapUser . email , displayName : ldapUser . displayName } , AuditSource . EXTERNAL _LDAP _TASK ) ) ;
2021-09-01 13:09:49 -07:00
if ( userUpdateError ) debug ( 'Failed to update user' , ldapUser , userUpdateError ) ;
} else {
// user known and up-to-date
debug ( ` syncUsers: [up-to-date user] username= ${ ldapUser . username } email= ${ ldapUser . email } displayName= ${ ldapUser . displayName } ` ) ;
2021-09-01 14:37:09 +02:00
}
2021-09-01 13:09:49 -07:00
}
2019-10-30 14:37:48 -07:00
2021-09-01 13:09:49 -07:00
debug ( 'syncUsers: done' ) ;
2020-06-05 09:26:52 +02:00
}
2020-06-03 21:23:53 +02:00
2021-09-01 13:09:49 -07:00
async function syncGroups ( externalLdapConfig , progressCallback ) {
2020-06-05 09:26:52 +02:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
assert . strictEqual ( typeof progressCallback , 'function' ) ;
2020-06-03 21:23:53 +02:00
2020-06-05 09:26:52 +02:00
if ( ! externalLdapConfig . syncGroups ) {
2021-09-01 13:09:49 -07:00
debug ( 'syncGroups: Group sync is disabled' ) ;
2020-06-07 13:49:01 +02:00
progressCallback ( { percent : 70 , message : 'Skipping group sync...' } ) ;
2021-09-01 13:09:49 -07:00
return [ ] ;
2020-06-05 09:26:52 +02:00
}
2021-09-01 13:09:49 -07:00
const ldapGroups = await ldapGroupSearch ( externalLdapConfig , { } ) ;
2020-06-04 13:26:13 +02:00
2021-09-01 13:09:49 -07:00
debug ( ` syncGroups: Found ${ ldapGroups . length } groups ` ) ;
2020-06-04 13:26:13 +02:00
2021-09-01 13:09:49 -07:00
let percent = 40 ;
let step = 30 / ( ldapGroups . length + 1 ) ; // ensure no divide by 0
2020-06-04 13:26:13 +02:00
2021-09-01 13:09:49 -07:00
// we ignore all non internal errors here and just log them for now
for ( const ldapGroup of ldapGroups ) {
let groupName = ldapGroup [ externalLdapConfig . groupnameField ] ;
if ( ! groupName ) return ;
// some servers return empty array for unknown properties :-/
if ( typeof groupName !== 'string' ) return ;
2020-06-05 10:13:19 +02:00
2021-09-01 13:09:49 -07:00
// groups are lowercase
groupName = groupName . toLowerCase ( ) ;
2020-06-05 09:03:26 +02:00
2021-09-01 13:09:49 -07:00
percent += step ;
progressCallback ( { percent , message : ` Syncing... ${ groupName } ` } ) ;
2020-06-04 12:28:31 +02:00
2021-09-01 13:09:49 -07:00
const result = await groups . getByName ( groupName ) ;
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
if ( ! result ) {
debug ( ` syncGroups: [adding group] groupname= ${ groupName } ` ) ;
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
const [ error ] = await safe ( groups . add ( { name : groupName , source : 'ldap' } ) ) ;
if ( error ) debug ( 'syncGroups: Failed to create group' , groupName , error ) ;
} else {
debug ( ` syncGroups: [up-to-date group] groupname= ${ groupName } ` ) ;
}
}
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
debug ( 'syncGroups: sync done' ) ;
2020-06-05 09:26:52 +02:00
}
2021-09-01 13:09:49 -07:00
async function syncGroupUsers ( externalLdapConfig , progressCallback ) {
2020-06-05 09:26:52 +02:00
assert . strictEqual ( typeof externalLdapConfig , 'object' ) ;
assert . strictEqual ( typeof progressCallback , 'function' ) ;
if ( ! externalLdapConfig . syncGroups ) {
2021-09-01 13:09:49 -07:00
debug ( 'syncGroupUsers: Group users sync is disabled' ) ;
2020-06-05 09:26:52 +02:00
progressCallback ( { percent : 99 , message : 'Skipping group users sync...' } ) ;
2021-09-01 13:09:49 -07:00
return [ ] ;
2020-06-05 09:26:52 +02:00
}
2021-09-01 13:09:49 -07:00
const allGroups = await groups . list ( ) ;
const ldapGroups = allGroups . filter ( function ( g ) { return g . source === 'ldap' ; } ) ;
debug ( ` syncGroupUsers: Found ${ ldapGroups . length } groups to sync users ` ) ;
for ( const group of ldapGroups ) {
debug ( ` syncGroupUsers: Sync users for group ${ group . name } ` ) ;
const result = await ldapGroupSearch ( externalLdapConfig , { } ) ;
if ( ! result || result . length === 0 ) {
debug ( ` syncGroupUsers: Unable to find group ${ group . name } ignoring for now. ` ) ;
continue ;
}
// since our group names are lowercase we cannot use potentially case matching ldap filters
let found = result . find ( function ( r ) {
if ( ! r [ externalLdapConfig . groupnameField ] ) return false ;
return r [ externalLdapConfig . groupnameField ] . toLowerCase ( ) === group . name ;
} ) ;
if ( ! found ) {
debug ( ` syncGroupUsers: Unable to find group ${ group . name } ignoring for now. ` ) ;
continue ;
}
let ldapGroupMembers = found . member || found . uniqueMember || [ ] ;
// if only one entry is in the group ldap returns a string, not an array!
if ( typeof ldapGroupMembers === 'string' ) ldapGroupMembers = [ ldapGroupMembers ] ;
debug ( ` syncGroupUsers: Group ${ group . name } has ${ ldapGroupMembers . length } members. ` ) ;
for ( const memberDn of ldapGroupMembers ) {
const [ ldapError , result ] = await safe ( ldapGetByDN ( externalLdapConfig , memberDn ) ) ;
if ( ldapError ) {
debug ( ` syncGroupUsers: Failed to get ${ memberDn } : ` , ldapError ) ;
continue ;
}
debug ( ` syncGroupUsers: Found member object at ${ memberDn } adding to group ${ group . name } ` ) ;
2022-04-23 11:11:46 +02:00
const username = result [ externalLdapConfig . usernameField ] . toLowerCase ( ) ;
2021-09-01 13:09:49 -07:00
if ( ! username ) continue ;
const [ getError , userObject ] = await safe ( users . getByUsername ( username ) ) ;
if ( getError || ! userObject ) {
debug ( ` syncGroupUsers: Failed to get user by username ${ username } ` , getError ? getError : 'User not found' ) ;
continue ;
}
const [ addError ] = await safe ( groups . addMember ( group . id , userObject . id ) ) ;
if ( addError && addError . reason !== BoxError . ALREADY _EXISTS ) debug ( 'syncGroupUsers: Failed to add member' , addError ) ;
}
}
debug ( 'syncGroupUsers: done' ) ;
2020-06-05 09:26:52 +02:00
}
2021-09-01 13:09:49 -07:00
async function sync ( progressCallback ) {
2020-06-05 09:26:52 +02:00
assert . strictEqual ( typeof progressCallback , 'function' ) ;
progressCallback ( { percent : 10 , message : 'Starting ldap user sync' } ) ;
2021-09-01 13:09:49 -07:00
const externalLdapConfig = await settings . getExternalLdapConfig ( ) ;
if ( externalLdapConfig . provider === 'noop' ) throw new BoxError ( BoxError . BAD _STATE , 'not enabled' ) ;
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
await syncUsers ( externalLdapConfig , progressCallback ) ;
await syncGroups ( externalLdapConfig , progressCallback ) ;
await syncGroupUsers ( externalLdapConfig , progressCallback ) ;
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
progressCallback ( { percent : 100 , message : 'Done' } ) ;
2020-06-05 09:26:52 +02:00
2021-09-01 13:09:49 -07:00
debug ( 'sync: done' ) ;
2019-08-28 18:22:07 +02:00
}