mirror of
https://github.com/nabbar/golib.git
synced 2025-10-14 03:53:48 +08:00
Fix issue #53
This commit is contained in:
@@ -29,16 +29,22 @@ package ldap
|
|||||||
import "github.com/nabbar/golib/errors"
|
import "github.com/nabbar/golib/errors"
|
||||||
|
|
||||||
const (
|
const (
|
||||||
EMPTY_PARAMS errors.CodeError = iota + errors.MIN_PKG_LDAP
|
ErrorEmptyParams errors.CodeError = iota + errors.MIN_PKG_LDAP
|
||||||
LDAP_CONTEXT_ERROR
|
ErrorLDAPContext
|
||||||
LDAP_SERVER_CONFIG
|
ErrorLDAPServerConfig
|
||||||
LDAP_SERVER_DIAL
|
ErrorLDAPServerConnection
|
||||||
LDAP_SERVER_TLS
|
ErrorLDAPServerDial
|
||||||
LDAP_SERVER_STARTTLS
|
ErrorLDAPServerDialClosing
|
||||||
LDAP_BIND
|
ErrorLDAPServerTLS
|
||||||
LDAP_SEARCH
|
ErrorLDAPServerStartTLS
|
||||||
LDAP_USER_NOT_UNIQ
|
ErrorLDAPBind
|
||||||
LDAP_USER_NOT_FOUND
|
ErrorLDAPSearch
|
||||||
|
ErrorLDAPUserNotUniq
|
||||||
|
ErrorLDAPUserNotFound
|
||||||
|
ErrorLDAPInvalidDN
|
||||||
|
ErrorLDAPInvalidUID
|
||||||
|
ErrorLDAPAttributeNotFound
|
||||||
|
ErrorLDAPAttributeEmpty
|
||||||
)
|
)
|
||||||
|
|
||||||
var isCodeError = false
|
var isCodeError = false
|
||||||
@@ -48,32 +54,44 @@ func IsCodeError() bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
isCodeError = errors.ExistInMapMessage(EMPTY_PARAMS)
|
isCodeError = errors.ExistInMapMessage(ErrorEmptyParams)
|
||||||
errors.RegisterIdFctMessage(EMPTY_PARAMS, getMessage)
|
errors.RegisterIdFctMessage(ErrorEmptyParams, getMessage)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getMessage(code errors.CodeError) (message string) {
|
func getMessage(code errors.CodeError) (message string) {
|
||||||
switch code {
|
switch code {
|
||||||
case EMPTY_PARAMS:
|
case ErrorEmptyParams:
|
||||||
return "given parameters is empty"
|
return "given parameters is empty"
|
||||||
case LDAP_CONTEXT_ERROR:
|
case ErrorLDAPContext:
|
||||||
return "LDAP server connection context occurs an error"
|
return "LDAP server connection context occurs an error"
|
||||||
case LDAP_SERVER_CONFIG:
|
case ErrorLDAPServerConfig:
|
||||||
return "LDAP server config is not well defined"
|
return "LDAP server config is not well defined"
|
||||||
case LDAP_SERVER_DIAL:
|
case ErrorLDAPServerConnection:
|
||||||
|
return "connection server occurs error "
|
||||||
|
case ErrorLDAPServerDial:
|
||||||
return "dialing server occurs error "
|
return "dialing server occurs error "
|
||||||
case LDAP_SERVER_TLS:
|
case ErrorLDAPServerDialClosing:
|
||||||
|
return "dialing server is going to be closed"
|
||||||
|
case ErrorLDAPServerTLS:
|
||||||
return "cannot start dial to server with TLS Mode"
|
return "cannot start dial to server with TLS Mode"
|
||||||
case LDAP_SERVER_STARTTLS:
|
case ErrorLDAPServerStartTLS:
|
||||||
return "cannot init starttls mode on opening server connection"
|
return "cannot init starttls mode on opening server connection"
|
||||||
case LDAP_BIND:
|
case ErrorLDAPBind:
|
||||||
return "error on binding user/pass"
|
return "error on binding user/pass"
|
||||||
case LDAP_SEARCH:
|
case ErrorLDAPSearch:
|
||||||
return "error on calling search on connected server"
|
return "error on calling search on connected server"
|
||||||
case LDAP_USER_NOT_UNIQ:
|
case ErrorLDAPUserNotUniq:
|
||||||
return "user uid is not uniq"
|
return "user uid is not uniq"
|
||||||
case LDAP_USER_NOT_FOUND:
|
case ErrorLDAPUserNotFound:
|
||||||
return "user uid is not found"
|
return "user uid is not found"
|
||||||
|
case ErrorLDAPInvalidDN:
|
||||||
|
return "dn given is not valid"
|
||||||
|
case ErrorLDAPInvalidUID:
|
||||||
|
return "uid is not found or empty"
|
||||||
|
case ErrorLDAPAttributeNotFound:
|
||||||
|
return "requested attribute is not found"
|
||||||
|
case ErrorLDAPAttributeEmpty:
|
||||||
|
return "requested attribute is empty"
|
||||||
}
|
}
|
||||||
|
|
||||||
return ""
|
return ""
|
||||||
|
131
ldap/ldap.go
131
ldap/ldap.go
@@ -55,11 +55,11 @@ type HelperLDAP struct {
|
|||||||
//NewLDAP build a new LDAP helper based on config struct given
|
//NewLDAP build a new LDAP helper based on config struct given
|
||||||
func NewLDAP(ctx context.Context, cnf *Config, attributes []string) (*HelperLDAP, errors.Error) {
|
func NewLDAP(ctx context.Context, cnf *Config, attributes []string) (*HelperLDAP, errors.Error) {
|
||||||
if cnf == nil {
|
if cnf == nil {
|
||||||
return nil, EMPTY_PARAMS.Error(nil)
|
return nil, ErrorEmptyParams.Error(nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
if ctx == nil {
|
if ctx == nil {
|
||||||
return nil, EMPTY_PARAMS.Error(nil)
|
return nil, ErrorEmptyParams.Error(nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
return &HelperLDAP{
|
return &HelperLDAP{
|
||||||
@@ -99,14 +99,33 @@ func (lc *HelperLDAP) dialTLS() (*ldap.Conn, errors.Error) {
|
|||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if c != nil {
|
if c != nil {
|
||||||
c.Close()
|
_ = c.Close()
|
||||||
}
|
}
|
||||||
return nil, LDAP_SERVER_TLS.ErrorParent(err)
|
return nil, ErrorLDAPServerTLS.ErrorParent(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
c = tls.Client(c, lc.tlsConfig)
|
c = tls.Client(c, lc.tlsConfig)
|
||||||
|
|
||||||
return ldap.NewConn(c, true), nil
|
if c == nil {
|
||||||
|
return nil, ErrorLDAPServerTLS.ErrorParent(ErrorLDAPServerConnection.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
l := ldap.NewConn(c, true)
|
||||||
|
if l == nil {
|
||||||
|
return nil, ErrorLDAPServerTLS.ErrorParent(ErrorLDAPServerConnection.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Start()
|
||||||
|
|
||||||
|
if l.IsClosing() {
|
||||||
|
return nil, ErrorLDAPServerTLS.ErrorParent(ErrorLDAPServerDialClosing.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, tlsOk := l.TLSConnectionState(); !tlsOk {
|
||||||
|
return nil, ErrorLDAPServerTLS.ErrorParent(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
return l, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (lc *HelperLDAP) dial() (*ldap.Conn, errors.Error) {
|
func (lc *HelperLDAP) dial() (*ldap.Conn, errors.Error) {
|
||||||
@@ -119,19 +138,34 @@ func (lc *HelperLDAP) dial() (*ldap.Conn, errors.Error) {
|
|||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if c != nil {
|
if c != nil {
|
||||||
c.Close()
|
_ = c.Close()
|
||||||
}
|
}
|
||||||
return nil, LDAP_SERVER_DIAL.ErrorParent(err)
|
return nil, ErrorLDAPServerDial.ErrorParent(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return ldap.NewConn(c, false), nil
|
l := ldap.NewConn(c, false)
|
||||||
|
if l == nil {
|
||||||
|
return nil, ErrorLDAPServerDial.ErrorParent(ErrorLDAPServerConnection.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Start()
|
||||||
|
|
||||||
|
if l.IsClosing() {
|
||||||
|
return nil, ErrorLDAPServerDial.ErrorParent(ErrorLDAPServerDialClosing.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
return l, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (lc *HelperLDAP) starttls(l *ldap.Conn) errors.Error {
|
func (lc *HelperLDAP) starttls(l *ldap.Conn) errors.Error {
|
||||||
err := l.StartTLS(lc.tlsConfig)
|
err := l.StartTLS(lc.tlsConfig)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return LDAP_SERVER_STARTTLS.ErrorParent(err)
|
return ErrorLDAPServerStartTLS.ErrorParent(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, tlsOk := l.TLSConnectionState(); !tlsOk {
|
||||||
|
return ErrorLDAPServerStartTLS.ErrorParent(nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@@ -152,37 +186,41 @@ func (lc *HelperLDAP) tryConnect() (TLSMode, errors.Error) {
|
|||||||
if lc.config.Portldaps != 0 {
|
if lc.config.Portldaps != 0 {
|
||||||
l, err = lc.dialTLS()
|
l, err = lc.dialTLS()
|
||||||
|
|
||||||
|
logger.DebugLevel.LogErrorCtxf(logger.DebugLevel, "connecting ldap with tls mode '%s'", err, TLSMODE_TLS.String())
|
||||||
|
|
||||||
if err == nil {
|
if err == nil {
|
||||||
logger.DebugLevel.Logf("ldap connected with tls mode '%s'", lc.tlsMode.String())
|
|
||||||
return TLSMODE_TLS, nil
|
return TLSMODE_TLS, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if lc.config.PortLdap == 0 {
|
if lc.config.PortLdap == 0 {
|
||||||
return tlsmode_init, LDAP_SERVER_CONFIG.Error(nil)
|
return tlsmode_init, ErrorLDAPServerConfig.Error(nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
l, err = lc.dial()
|
l, err = lc.dial()
|
||||||
|
logger.DebugLevel.LogErrorCtxf(logger.DebugLevel, "connecting ldap with tls mode '%s'", err, TLSMODE_NONE.String())
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return tlsmode_init, err
|
return tlsmode_init, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = lc.starttls(l); err == nil {
|
err = lc.starttls(l)
|
||||||
logger.DebugLevel.Logf("ldap connected with tls mode '%s'", lc.tlsMode.String())
|
logger.DebugLevel.LogErrorCtxf(logger.DebugLevel, "connecting ldap with tls mode '%s'", err, TLSMODE_STARTTLS.String())
|
||||||
|
|
||||||
|
if err == nil {
|
||||||
return TLSMODE_STARTTLS, nil
|
return TLSMODE_STARTTLS, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.DebugLevel.Logf("ldap connected with tls mode '%s'", lc.tlsMode.String())
|
|
||||||
return TLSMODE_NONE, nil
|
return TLSMODE_NONE, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (lc *HelperLDAP) connect() errors.Error {
|
func (lc *HelperLDAP) connect() errors.Error {
|
||||||
if lc.ctx == nil {
|
if lc.ctx == nil {
|
||||||
return LDAP_CONTEXT_ERROR.Error(EMPTY_PARAMS.Error(nil))
|
return ErrorLDAPContext.Error(ErrorEmptyParams.Error(nil))
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := lc.ctx.Err(); err != nil {
|
if err := lc.ctx.Err(); err != nil {
|
||||||
return LDAP_CONTEXT_ERROR.ErrorParent(err)
|
return ErrorLDAPContext.ErrorParent(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if lc.conn == nil {
|
if lc.conn == nil {
|
||||||
@@ -264,12 +302,12 @@ func (lc *HelperLDAP) AuthUser(username, password string) errors.Error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if username == "" || password == "" {
|
if username == "" || password == "" {
|
||||||
return EMPTY_PARAMS.Error(nil)
|
return ErrorEmptyParams.Error(nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
err := lc.conn.Bind(username, password)
|
err := lc.conn.Bind(username, password)
|
||||||
|
|
||||||
return LDAP_BIND.Iferror(err)
|
return ErrorLDAPBind.Iferror(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
//Connect used to connect and bind to server
|
//Connect used to connect and bind to server
|
||||||
@@ -305,40 +343,62 @@ func (lc *HelperLDAP) runSearch(filter string, attributes []string) (*ldap.Searc
|
|||||||
)
|
)
|
||||||
|
|
||||||
if src, err = lc.conn.Search(searchRequest); err != nil {
|
if src, err = lc.conn.Search(searchRequest); err != nil {
|
||||||
return nil, LDAP_SEARCH.ErrorParent(err)
|
return nil, ErrorLDAPSearch.ErrorParent(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.DebugLevel.Logf("Search success on server '%s' with tls mode '%s', with filter [%s] and attribute %v", lc.config.ServerAddr(lc.tlsMode == TLSMODE_TLS), lc.tlsMode.String(), filter, attributes)
|
logger.DebugLevel.Logf("Search success on server '%s' with tls mode '%s', with filter [%s] and attribute %v", lc.config.ServerAddr(lc.tlsMode == TLSMODE_TLS), lc.tlsMode.String(), filter, attributes)
|
||||||
return src, nil
|
return src, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (lc *HelperLDAP) getUserName(username string) (string, errors.Error) {
|
||||||
|
username = strings.TrimSpace(username)
|
||||||
|
if username == "" {
|
||||||
|
if usr := lc.ParseEntries(lc.bindDN); usr == nil || len(usr) == 0 {
|
||||||
|
return "", ErrorLDAPInvalidUID.Error(ErrorLDAPInvalidDN.Error(nil))
|
||||||
|
} else if _, ok := usr["uid"]; !ok {
|
||||||
|
return "", ErrorLDAPInvalidUID.Error(ErrorLDAPAttributeNotFound.Error(nil))
|
||||||
|
} else if len(usr["uid"]) < 1 {
|
||||||
|
return "", ErrorLDAPInvalidUID.Error(ErrorLDAPAttributeEmpty.Error(nil))
|
||||||
|
} else {
|
||||||
|
username = usr["uid"][0]
|
||||||
|
}
|
||||||
|
|
||||||
|
username = strings.TrimSpace(username)
|
||||||
|
}
|
||||||
|
|
||||||
|
if username == "" {
|
||||||
|
return "", ErrorLDAPInvalidUID.Error(ErrorLDAPAttributeEmpty.Error(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
return username, nil
|
||||||
|
}
|
||||||
|
|
||||||
//UserInfo used to retrieve the information of a given username
|
//UserInfo used to retrieve the information of a given username
|
||||||
func (lc *HelperLDAP) UserInfo(username string) (map[string]string, errors.Error) {
|
func (lc *HelperLDAP) UserInfo(username string) (map[string]string, errors.Error) {
|
||||||
var (
|
var (
|
||||||
e errors.Error
|
err errors.Error
|
||||||
src *ldap.SearchResult
|
src *ldap.SearchResult
|
||||||
userRes map[string]string
|
userRes map[string]string
|
||||||
)
|
)
|
||||||
|
|
||||||
if username == "" {
|
if username, err = lc.getUserName(username); err != nil {
|
||||||
usr := lc.ParseEntries(lc.bindDN)
|
return nil, err
|
||||||
username = usr["uid"][0]
|
|
||||||
}
|
}
|
||||||
|
|
||||||
userRes = make(map[string]string)
|
userRes = make(map[string]string)
|
||||||
attributes := append(lc.Attributes, "cn")
|
attributes := append(lc.Attributes, "cn")
|
||||||
|
|
||||||
src, e = lc.runSearch(fmt.Sprintf(lc.config.FilterUser, username), attributes)
|
src, err = lc.runSearch(fmt.Sprintf(lc.config.FilterUser, username), attributes)
|
||||||
|
|
||||||
if e != nil {
|
if err != nil {
|
||||||
return userRes, e
|
return userRes, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(src.Entries) != 1 {
|
if len(src.Entries) != 1 {
|
||||||
if len(src.Entries) > 1 {
|
if len(src.Entries) > 1 {
|
||||||
return userRes, LDAP_USER_NOT_UNIQ.Error(nil)
|
return userRes, ErrorLDAPUserNotUniq.Error(nil)
|
||||||
} else {
|
} else {
|
||||||
return userRes, LDAP_USER_NOT_FOUND.Error(nil)
|
return userRes, ErrorLDAPUserNotFound.Error(nil)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -362,9 +422,8 @@ func (lc *HelperLDAP) UserMemberOf(username string) ([]string, errors.Error) {
|
|||||||
grp []string
|
grp []string
|
||||||
)
|
)
|
||||||
|
|
||||||
if username == "" {
|
if username, err = lc.getUserName(username); err != nil {
|
||||||
usr := lc.ParseEntries(lc.bindDN)
|
return nil, err
|
||||||
username = usr["uid"][0]
|
|
||||||
}
|
}
|
||||||
|
|
||||||
grp = make([]string, 0)
|
grp = make([]string, 0)
|
||||||
@@ -393,13 +452,9 @@ func (lc *HelperLDAP) UserIsInGroup(username string, groupname []string) (bool,
|
|||||||
grpMmbr []string
|
grpMmbr []string
|
||||||
)
|
)
|
||||||
|
|
||||||
if username == "" {
|
if username, err = lc.getUserName(username); err != nil {
|
||||||
usr := lc.ParseEntries(lc.bindDN)
|
return false, err
|
||||||
username = usr["uid"][0]
|
} else if grpMmbr, err = lc.UserMemberOf(username); err != nil {
|
||||||
}
|
|
||||||
|
|
||||||
grpMmbr, err = lc.UserMemberOf(username)
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
return false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user