summaryrefslogtreecommitdiff
path: root/lib/pleroma/web/auth/ldap_authenticator.ex
blob: 56f2f5aed5a860699f4df059d4031bb052f7e09a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
# Pleroma: A lightweight social networking server
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only

defmodule Pleroma.Web.Auth.LDAPAuthenticator do
  alias Pleroma.User

  require Logger

  @behaviour Pleroma.Web.Auth.Authenticator

  @connection_timeout 10_000
  @search_timeout 10_000

  def get_user(%Plug.Conn{} = conn) do
    if Pleroma.Config.get([:ldap, :enabled]) do
      {name, password} =
        case conn.params do
          %{"authorization" => %{"name" => name, "password" => password}} ->
            {name, password}

          %{"grant_type" => "password", "username" => name, "password" => password} ->
            {name, password}
        end

      case ldap_user(name, password) do
        %User{} = user ->
          {:ok, user}

        {:error, {:ldap_connection_error, _}} ->
          # When LDAP is unavailable, try default authenticator
          Pleroma.Web.Auth.PleromaAuthenticator.get_user(conn)

        error ->
          error
      end
    else
      # Fall back to default authenticator
      Pleroma.Web.Auth.PleromaAuthenticator.get_user(conn)
    end
  end

  def handle_error(%Plug.Conn{} = _conn, error) do
    error
  end

  def auth_template, do: nil

  defp ldap_user(name, password) do
    ldap = Pleroma.Config.get(:ldap, [])
    host = Keyword.get(ldap, :host, "localhost")
    port = Keyword.get(ldap, :port, 389)
    ssl = Keyword.get(ldap, :ssl, false)
    sslopts = Keyword.get(ldap, :sslopts, [])

    options =
      [{:port, port}, {:ssl, ssl}, {:timeout, @connection_timeout}] ++
        if sslopts != [], do: [{:sslopts, sslopts}], else: []

    case :eldap.open([to_charlist(host)], options) do
      {:ok, connection} ->
        try do
          uid = Keyword.get(ldap, :uid, "cn")
          base = Keyword.get(ldap, :base)

          case :eldap.simple_bind(connection, "#{uid}=#{name},#{base}", password) do
            :ok ->
              case User.get_by_nickname_or_email(name) do
                %User{} = user ->
                  user

                _ ->
                  register_user(connection, base, uid, name, password)
              end

            error ->
              error
          end
        after
          :eldap.close(connection)
        end

      {:error, error} ->
        Logger.error("Could not open LDAP connection: #{inspect(error)}")
        {:error, {:ldap_connection_error, error}}
    end
  end

  defp register_user(connection, base, uid, name, password) do
    case :eldap.search(connection, [
           {:base, to_charlist(base)},
           {:filter, :eldap.equalityMatch(to_charlist(uid), to_charlist(name))},
           {:scope, :eldap.wholeSubtree()},
           {:timeout, @search_timeout}
         ]) do
      {:ok, {:eldap_search_result, [{:eldap_entry, _, attributes}], _}} ->
        with {_, [mail]} <- List.keyfind(attributes, 'mail', 0) do
          params = %{
            email: :erlang.list_to_binary(mail),
            name: name,
            nickname: name,
            password: password,
            password_confirmation: password
          }

          changeset = User.register_changeset(%User{}, params)

          case User.register(changeset) do
            {:ok, user} -> user
            error -> error
          end
        else
          _ -> {:error, :ldap_registration_missing_attributes}
        end

      error ->
        error
    end
  end
end