 ab795e6642
			
		
	
	ab795e6642
	
	
	
		
			
			* servers: ignore insecure TLS certs * slight refactor to have a single place for tls config Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			64 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package ldap
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"net"
 | |
| 
 | |
| 	"github.com/pires/go-proxyproto"
 | |
| 	"goauthentik.io/internal/config"
 | |
| 	"goauthentik.io/internal/utils"
 | |
| )
 | |
| 
 | |
| func (ls *LDAPServer) getCertificates(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
 | |
| 	if len(ls.providers) == 1 {
 | |
| 		if ls.providers[0].cert != nil {
 | |
| 			ls.log.WithField("server-name", info.ServerName).Debug("We only have a single provider, using their cert")
 | |
| 			return ls.providers[0].cert, nil
 | |
| 		}
 | |
| 	}
 | |
| 	allIdenticalCerts := true
 | |
| 	for _, provider := range ls.providers {
 | |
| 		if provider.tlsServerName == &info.ServerName {
 | |
| 			if provider.cert == nil {
 | |
| 				ls.log.WithField("server-name", info.ServerName).Debug("Handler does not have a certificate")
 | |
| 				return ls.defaultCert, nil
 | |
| 			}
 | |
| 			return provider.cert, nil
 | |
| 		}
 | |
| 		if provider.certUUID != ls.providers[0].certUUID || provider.cert == nil {
 | |
| 			allIdenticalCerts = false
 | |
| 		}
 | |
| 	}
 | |
| 	if allIdenticalCerts {
 | |
| 		ls.log.WithField("server-name", info.ServerName).Debug("all providers have the same keypair, using keypair")
 | |
| 		return ls.providers[0].cert, nil
 | |
| 	}
 | |
| 	ls.log.WithField("server-name", info.ServerName).Debug("Fallback to default cert")
 | |
| 	return ls.defaultCert, nil
 | |
| }
 | |
| 
 | |
| func (ls *LDAPServer) StartLDAPTLSServer() error {
 | |
| 	listen := config.Get().Listen.LDAPS
 | |
| 	tlsConfig := utils.GetTLSConfig()
 | |
| 	tlsConfig.GetCertificate = ls.getCertificates
 | |
| 
 | |
| 	ln, err := net.Listen("tcp", listen)
 | |
| 	if err != nil {
 | |
| 		ls.log.WithField("listen", listen).WithError(err).Warning("Failed to listen")
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	proxyListener := &proxyproto.Listener{Listener: ln}
 | |
| 	defer proxyListener.Close()
 | |
| 
 | |
| 	tln := tls.NewListener(proxyListener, tlsConfig)
 | |
| 
 | |
| 	ls.log.WithField("listen", listen).Info("Starting LDAP SSL server")
 | |
| 	err = ls.s.Serve(tln)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	ls.log.WithField("listen", listen).Info("Stopping LDAP SSL Server")
 | |
| 	return nil
 | |
| }
 |