 e28babb0b8
			
		
	
	e28babb0b8
	
	
	
		
			
			* rename consent permission Signed-off-by: Jens Langhammer <jens@goauthentik.io> * the user version Signed-off-by: Jens Langhammer <jens@goauthentik.io> t Signed-off-by: Jens Langhammer <jens@goauthentik.io> * initial role Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start form Signed-off-by: Jens Langhammer <jens@goauthentik.io> * some minor table refactoring Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix user, add assign Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add roles ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix backend Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add assign API for roles Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start adding toggle buttons Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start view page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude add_ permission for per-object perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * small cleanup Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permission list for roles Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make sidebar update Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix page header not re-rendering? Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fixup Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add search Signed-off-by: Jens Langhammer <jens@goauthentik.io> * show first category in table groupBy except when its empty Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make model and object PK optional but required together Signed-off-by: Jens Langhammer <jens@goauthentik.io> * allow for setting global perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude non-authentik permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * exclude models which aren't allowed (base models etc) Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ensure all models have verbose_name set, exclude some more internal objects Signed-off-by: Jens Langhammer <jens@goauthentik.io> * lint fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role perm assign Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add unasign for global perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add meta changes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * clear modal state after submit Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add roles to our group Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix duplicate url names Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make recursive group query more usable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add name field to role itself and move group creation to signal Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start sync Signed-off-by: Jens Langhammer <jens@goauthentik.io> * move rbac stuff to separate django app Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix lint and such Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix go Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start API changes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more API tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make admin interface not require superuser for now, improve error handling Signed-off-by: Jens Langhammer <jens@goauthentik.io> * replace some IsAdminUser where applicable Signed-off-by: Jens Langhammer <jens@goauthentik.io> * migrate flow inspector perms to actual permission Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix license not being a serializermodel Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permission modal to models without view page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add additional permissions to assign/unassign permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add action to unassign user permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add permissions tab to remaining view pages Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix flow inspector permission check Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix codecov config? Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more API tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ensure viewsets have an order set Signed-off-by: Jens Langhammer <jens@goauthentik.io> * hopefully the last api name change Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make perm modal less confusing Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start user view permission page Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only make delete bulk form expandable if usedBy is set Signed-off-by: Jens Langhammer <jens@goauthentik.io> * expand permission tables Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add more things Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add user global permission table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix lint Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tests' url names Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add tests for assign perms Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add unassign tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rebuild permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * prevent assigning/unassigning permissions to internal service accounts Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only enable default api browser in debug Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role object permissions showing duplicate Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix role link on role object permissions table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix object permission modal having duplicate close buttons Signed-off-by: Jens Langhammer <jens@goauthentik.io> * return error if user has no global perm and no object perms also improve error display on table Signed-off-by: Jens Langhammer <jens@goauthentik.io> * small optimisation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * optimise even more Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update locale Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add system permission for non-object permissions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * allow access to admin interface based on perm Signed-off-by: Jens Langhammer <jens@goauthentik.io> * clean Signed-off-by: Jens Langhammer <jens@goauthentik.io> * don't exclude base models Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			243 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			243 lines
		
	
	
		
			8.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package memory
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"beryju.io/ldap"
 | |
| 	"github.com/getsentry/sentry-go"
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 	"goauthentik.io/api/v3"
 | |
| 	"goauthentik.io/internal/outpost/ldap/constants"
 | |
| 	"goauthentik.io/internal/outpost/ldap/flags"
 | |
| 	"goauthentik.io/internal/outpost/ldap/group"
 | |
| 	"goauthentik.io/internal/outpost/ldap/metrics"
 | |
| 	"goauthentik.io/internal/outpost/ldap/search"
 | |
| 	"goauthentik.io/internal/outpost/ldap/search/direct"
 | |
| 	"goauthentik.io/internal/outpost/ldap/server"
 | |
| 	"goauthentik.io/internal/outpost/ldap/utils"
 | |
| 	"goauthentik.io/internal/outpost/ldap/utils/paginator"
 | |
| )
 | |
| 
 | |
| type MemorySearcher struct {
 | |
| 	si  server.LDAPServerInstance
 | |
| 	log *log.Entry
 | |
| 	ds  *direct.DirectSearcher
 | |
| 
 | |
| 	users  []api.User
 | |
| 	groups []api.Group
 | |
| }
 | |
| 
 | |
| func NewMemorySearcher(si server.LDAPServerInstance) *MemorySearcher {
 | |
| 	ms := &MemorySearcher{
 | |
| 		si:  si,
 | |
| 		log: log.WithField("logger", "authentik.outpost.ldap.searcher.memory"),
 | |
| 		ds:  direct.NewDirectSearcher(si),
 | |
| 	}
 | |
| 	ms.log.Debug("initialised memory searcher")
 | |
| 	ms.users = paginator.FetchUsers(ms.si.GetAPIClient().CoreApi.CoreUsersList(context.TODO()))
 | |
| 	ms.groups = paginator.FetchGroups(ms.si.GetAPIClient().CoreApi.CoreGroupsList(context.TODO()))
 | |
| 	return ms
 | |
| }
 | |
| 
 | |
| func (ms *MemorySearcher) SearchBase(req *search.Request) (ldap.ServerSearchResult, error) {
 | |
| 	return ms.ds.SearchBase(req)
 | |
| }
 | |
| 
 | |
| func (ms *MemorySearcher) SearchSubschema(req *search.Request) (ldap.ServerSearchResult, error) {
 | |
| 	return ms.ds.SearchSubschema(req)
 | |
| }
 | |
| 
 | |
| func (ms *MemorySearcher) Search(req *search.Request) (ldap.ServerSearchResult, error) {
 | |
| 	accsp := sentry.StartSpan(req.Context(), "authentik.providers.ldap.search.check_access")
 | |
| 	baseDN := ms.si.GetBaseDN()
 | |
| 
 | |
| 	if len(req.BindDN) < 1 {
 | |
| 		metrics.RequestsRejected.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "empty_bind_dn",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		metrics.RequestsRejectedLegacy.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "empty_bind_dn",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		return ldap.ServerSearchResult{ResultCode: ldap.LDAPResultInsufficientAccessRights}, fmt.Errorf("Search Error: Anonymous BindDN not allowed %s", req.BindDN)
 | |
| 	}
 | |
| 	if !utils.HasSuffixNoCase(req.BindDN, ","+baseDN) {
 | |
| 		metrics.RequestsRejected.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "invalid_bind_dn",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		metrics.RequestsRejectedLegacy.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "invalid_bind_dn",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		return ldap.ServerSearchResult{ResultCode: ldap.LDAPResultInsufficientAccessRights}, fmt.Errorf("Search Error: BindDN %s not in our BaseDN %s", req.BindDN, ms.si.GetBaseDN())
 | |
| 	}
 | |
| 
 | |
| 	flag := ms.si.GetFlags(req.BindDN)
 | |
| 	if flag == nil || (flag.UserInfo == nil && flag.UserPk == flags.InvalidUserPK) {
 | |
| 		req.Log().Debug("User info not cached")
 | |
| 		metrics.RequestsRejected.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "user_info_not_cached",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		metrics.RequestsRejectedLegacy.With(prometheus.Labels{
 | |
| 			"outpost_name": ms.si.GetOutpostName(),
 | |
| 			"type":         "search",
 | |
| 			"reason":       "user_info_not_cached",
 | |
| 			"app":          ms.si.GetAppSlug(),
 | |
| 		}).Inc()
 | |
| 		return ldap.ServerSearchResult{ResultCode: ldap.LDAPResultInsufficientAccessRights}, errors.New("access denied")
 | |
| 	}
 | |
| 	accsp.Finish()
 | |
| 
 | |
| 	entries := make([]*ldap.Entry, 0)
 | |
| 
 | |
| 	scope := req.SearchRequest.Scope
 | |
| 	needUsers, needGroups := ms.si.GetNeededObjects(scope, req.BaseDN, req.FilterObjectClass)
 | |
| 
 | |
| 	if scope >= 0 && strings.EqualFold(req.BaseDN, baseDN) {
 | |
| 		if utils.IncludeObjectClass(req.FilterObjectClass, constants.GetDomainOCs()) {
 | |
| 			rootEntries, _ := ms.SearchBase(req)
 | |
| 			for _, e := range rootEntries.Entries {
 | |
| 				e.DN = ms.si.GetBaseDN()
 | |
| 				entries = append(entries, e)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		scope -= 1 // Bring it from WholeSubtree to SingleLevel and so on
 | |
| 	}
 | |
| 
 | |
| 	var users *[]api.User
 | |
| 	var groups []*group.LDAPGroup
 | |
| 	var err error
 | |
| 
 | |
| 	if needUsers {
 | |
| 		if flag.CanSearch {
 | |
| 			users = &ms.users
 | |
| 		} else {
 | |
| 			u := make([]api.User, 1)
 | |
| 			if flag.UserInfo == nil {
 | |
| 				for i, u := range ms.users {
 | |
| 					if u.Pk == flag.UserPk {
 | |
| 						flag.UserInfo = &ms.users[i]
 | |
| 					}
 | |
| 				}
 | |
| 				if flag.UserInfo == nil {
 | |
| 					req.Log().WithField("pk", flag.UserPk).Warning("User with pk is not in local cache")
 | |
| 					err = fmt.Errorf("failed to get userinfo")
 | |
| 				}
 | |
| 			}
 | |
| 			if flag.UserInfo != nil {
 | |
| 				u[0] = *flag.UserInfo
 | |
| 			}
 | |
| 			users = &u
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if needGroups {
 | |
| 		groups = make([]*group.LDAPGroup, 0)
 | |
| 
 | |
| 		for _, g := range ms.groups {
 | |
| 			if flag.CanSearch {
 | |
| 				groups = append(groups, group.FromAPIGroup(g, ms.si))
 | |
| 			} else {
 | |
| 				// If the user cannot search, we're going to only return
 | |
| 				// the groups they're in _and_ only return themselves
 | |
| 				// as a member.
 | |
| 				for _, u := range g.UsersObj {
 | |
| 					if flag.UserPk == u.Pk {
 | |
| 						//TODO: Is there a better way to clone this object?
 | |
| 						fg := api.NewGroup(g.Pk, g.NumPk, g.Name, g.ParentName, []api.GroupMember{u}, []api.Role{})
 | |
| 						fg.SetUsers([]int32{flag.UserPk})
 | |
| 						if g.Parent.IsSet() {
 | |
| 							fg.SetParent(*g.Parent.Get())
 | |
| 						}
 | |
| 						fg.SetAttributes(g.Attributes)
 | |
| 						fg.SetIsSuperuser(*g.IsSuperuser)
 | |
| 						groups = append(groups, group.FromAPIGroup(*fg, ms.si))
 | |
| 						break
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if err != nil {
 | |
| 		return ldap.ServerSearchResult{ResultCode: ldap.LDAPResultOperationsError}, err
 | |
| 	}
 | |
| 
 | |
| 	if scope >= 0 && (strings.EqualFold(req.BaseDN, ms.si.GetBaseDN()) || utils.HasSuffixNoCase(req.BaseDN, ms.si.GetBaseUserDN())) {
 | |
| 		singleu := utils.HasSuffixNoCase(req.BaseDN, ","+ms.si.GetBaseUserDN())
 | |
| 
 | |
| 		if !singleu && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetContainerOCs()) {
 | |
| 			entries = append(entries, utils.GetContainerEntry(req.FilterObjectClass, ms.si.GetBaseUserDN(), constants.OUUsers))
 | |
| 			scope -= 1
 | |
| 		}
 | |
| 
 | |
| 		if scope >= 0 && users != nil && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetUserOCs()) {
 | |
| 			for _, u := range *users {
 | |
| 				entry := ms.si.UserEntry(u)
 | |
| 				if strings.EqualFold(req.BaseDN, entry.DN) || !singleu {
 | |
| 					entries = append(entries, entry)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		scope += 1 // Return the scope to what it was before we descended
 | |
| 	}
 | |
| 
 | |
| 	if scope >= 0 && (strings.EqualFold(req.BaseDN, ms.si.GetBaseDN()) || utils.HasSuffixNoCase(req.BaseDN, ms.si.GetBaseGroupDN())) {
 | |
| 		singleg := utils.HasSuffixNoCase(req.BaseDN, ","+ms.si.GetBaseGroupDN())
 | |
| 
 | |
| 		if !singleg && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetContainerOCs()) {
 | |
| 			entries = append(entries, utils.GetContainerEntry(req.FilterObjectClass, ms.si.GetBaseGroupDN(), constants.OUGroups))
 | |
| 			scope -= 1
 | |
| 		}
 | |
| 
 | |
| 		if scope >= 0 && groups != nil && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetGroupOCs()) {
 | |
| 			for _, g := range groups {
 | |
| 				if strings.EqualFold(req.BaseDN, g.DN) || !singleg {
 | |
| 					entries = append(entries, g.Entry())
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		scope += 1 // Return the scope to what it was before we descended
 | |
| 	}
 | |
| 
 | |
| 	if scope >= 0 && (strings.EqualFold(req.BaseDN, ms.si.GetBaseDN()) || utils.HasSuffixNoCase(req.BaseDN, ms.si.GetBaseVirtualGroupDN())) {
 | |
| 		singlevg := utils.HasSuffixNoCase(req.BaseDN, ","+ms.si.GetBaseVirtualGroupDN())
 | |
| 
 | |
| 		if !singlevg && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetContainerOCs()) {
 | |
| 			entries = append(entries, utils.GetContainerEntry(req.FilterObjectClass, ms.si.GetBaseVirtualGroupDN(), constants.OUVirtualGroups))
 | |
| 			scope -= 1
 | |
| 		}
 | |
| 
 | |
| 		if scope >= 0 && users != nil && utils.IncludeObjectClass(req.FilterObjectClass, constants.GetVirtualGroupOCs()) {
 | |
| 			for _, u := range *users {
 | |
| 				entry := group.FromAPIUser(u, ms.si).Entry()
 | |
| 				if strings.EqualFold(req.BaseDN, entry.DN) || !singlevg {
 | |
| 					entries = append(entries, entry)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return ldap.ServerSearchResult{Entries: entries, Referrals: []string{}, Controls: []ldap.Control{}, ResultCode: ldap.LDAPResultSuccess}, nil
 | |
| }
 |