Got LDAP auth working to a functional state
This commit is contained in:
parent
14ca31768c
commit
1c8c9e65c5
10 changed files with 175 additions and 45 deletions
|
@ -2,6 +2,7 @@
|
||||||
|
|
||||||
namespace BookStack\Http\Controllers\Auth;
|
namespace BookStack\Http\Controllers\Auth;
|
||||||
|
|
||||||
|
use Illuminate\Contracts\Auth\Authenticatable;
|
||||||
use Illuminate\Http\Request;
|
use Illuminate\Http\Request;
|
||||||
use BookStack\Exceptions\SocialSignInException;
|
use BookStack\Exceptions\SocialSignInException;
|
||||||
use BookStack\Exceptions\UserRegistrationException;
|
use BookStack\Exceptions\UserRegistrationException;
|
||||||
|
@ -31,6 +32,8 @@ class AuthController extends Controller
|
||||||
|
|
||||||
protected $redirectPath = '/';
|
protected $redirectPath = '/';
|
||||||
protected $redirectAfterLogout = '/login';
|
protected $redirectAfterLogout = '/login';
|
||||||
|
protected $username = 'email';
|
||||||
|
|
||||||
|
|
||||||
protected $socialAuthService;
|
protected $socialAuthService;
|
||||||
protected $emailConfirmationService;
|
protected $emailConfirmationService;
|
||||||
|
@ -48,6 +51,7 @@ class AuthController extends Controller
|
||||||
$this->socialAuthService = $socialAuthService;
|
$this->socialAuthService = $socialAuthService;
|
||||||
$this->emailConfirmationService = $emailConfirmationService;
|
$this->emailConfirmationService = $emailConfirmationService;
|
||||||
$this->userRepo = $userRepo;
|
$this->userRepo = $userRepo;
|
||||||
|
$this->username = config('auth.method') === 'standard' ? 'email' : 'username';
|
||||||
parent::__construct();
|
parent::__construct();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -104,6 +108,24 @@ class AuthController extends Controller
|
||||||
return $this->registerUser($userData);
|
return $this->registerUser($userData);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Overrides the action when a user is authenticated.
|
||||||
|
* If the user authenticated but does not exist in the user table we create them.
|
||||||
|
* @param Request $request
|
||||||
|
* @param Authenticatable $user
|
||||||
|
* @return \Illuminate\Http\RedirectResponse
|
||||||
|
*/
|
||||||
|
protected function authenticated(Request $request, Authenticatable $user)
|
||||||
|
{
|
||||||
|
if(!$user->exists) {
|
||||||
|
$user->save();
|
||||||
|
$this->userRepo->attachDefaultRole($user);
|
||||||
|
auth()->login($user);
|
||||||
|
}
|
||||||
|
return redirect()->intended($this->redirectPath());
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Register a new user after a registration callback.
|
* Register a new user after a registration callback.
|
||||||
* @param $socialDriver
|
* @param $socialDriver
|
||||||
|
@ -232,7 +254,7 @@ class AuthController extends Controller
|
||||||
public function getLogin()
|
public function getLogin()
|
||||||
{
|
{
|
||||||
$socialDrivers = $this->socialAuthService->getActiveDrivers();
|
$socialDrivers = $this->socialAuthService->getActiveDrivers();
|
||||||
$authMethod = 'standard'; // TODO - rewrite to use config.
|
$authMethod = config('auth.method');
|
||||||
return view('auth/login', ['socialDrivers' => $socialDrivers, 'authMethod' => $authMethod]);
|
return view('auth/login', ['socialDrivers' => $socialDrivers, 'authMethod' => $authMethod]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
Route::get('/test', function() {
|
Route::get('/test', function() {
|
||||||
// TODO - remove this
|
// TODO - remove this
|
||||||
$service = new \BookStack\Services\LdapService();
|
$service = new \BookStack\Services\LdapService();
|
||||||
$service->getUserDetails('ssmith');
|
dd($service->getUserDetails('ksmith'));
|
||||||
});
|
});
|
||||||
|
|
||||||
// Authenticated routes...
|
// Authenticated routes...
|
||||||
|
|
|
@ -25,7 +25,7 @@ class AuthServiceProvider extends ServiceProvider
|
||||||
public function register()
|
public function register()
|
||||||
{
|
{
|
||||||
Auth::provider('ldap', function($app, array $config) {
|
Auth::provider('ldap', function($app, array $config) {
|
||||||
return new LdapUserProvider($config['model']);
|
return new LdapUserProvider($config['model'], $app['BookStack\Services\LdapService']);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,8 @@
|
||||||
namespace BookStack\Providers;
|
namespace BookStack\Providers;
|
||||||
|
|
||||||
|
|
||||||
|
use BookStack\Role;
|
||||||
|
use BookStack\Services\LdapService;
|
||||||
use BookStack\User;
|
use BookStack\User;
|
||||||
use Illuminate\Contracts\Auth\Authenticatable;
|
use Illuminate\Contracts\Auth\Authenticatable;
|
||||||
use Illuminate\Contracts\Auth\UserProvider;
|
use Illuminate\Contracts\Auth\UserProvider;
|
||||||
|
@ -17,14 +19,21 @@ class LdapUserProvider implements UserProvider
|
||||||
*/
|
*/
|
||||||
protected $model;
|
protected $model;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @var LdapService
|
||||||
|
*/
|
||||||
|
protected $ldapService;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* LdapUserProvider constructor.
|
* LdapUserProvider constructor.
|
||||||
* @param $model
|
* @param $model
|
||||||
|
* @param LdapService $ldapService
|
||||||
*/
|
*/
|
||||||
public function __construct($model)
|
public function __construct($model, LdapService $ldapService)
|
||||||
{
|
{
|
||||||
$this->model = $model;
|
$this->model = $model;
|
||||||
|
$this->ldapService = $ldapService;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -34,8 +43,7 @@ class LdapUserProvider implements UserProvider
|
||||||
*/
|
*/
|
||||||
public function createModel()
|
public function createModel()
|
||||||
{
|
{
|
||||||
$class = '\\'.ltrim($this->model, '\\');
|
$class = '\\' . ltrim($this->model, '\\');
|
||||||
|
|
||||||
return new $class;
|
return new $class;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -91,16 +99,21 @@ class LdapUserProvider implements UserProvider
|
||||||
*/
|
*/
|
||||||
public function retrieveByCredentials(array $credentials)
|
public function retrieveByCredentials(array $credentials)
|
||||||
{
|
{
|
||||||
// TODO: Implement retrieveByCredentials() method.
|
|
||||||
|
|
||||||
// Get user via LDAP
|
// Get user via LDAP
|
||||||
|
$userDetails = $this->ldapService->getUserDetails($credentials['username']);
|
||||||
|
if ($userDetails === null) return null;
|
||||||
|
|
||||||
// Search current user base by looking up a uid
|
// Search current user base by looking up a uid
|
||||||
|
$model = $this->createModel();
|
||||||
|
$currentUser = $model->newQuery()
|
||||||
|
->where('external_auth_id', $userDetails['uid'])
|
||||||
|
->first();
|
||||||
|
|
||||||
// If not exists create a new user instance with attached role
|
if ($currentUser !== null) return $currentUser;
|
||||||
// but do not store it in the database yet
|
|
||||||
|
|
||||||
//
|
$model->name = $userDetails['name'];
|
||||||
|
$model->external_auth_id = $userDetails['uid'];
|
||||||
|
return $model;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -112,6 +125,6 @@ class LdapUserProvider implements UserProvider
|
||||||
*/
|
*/
|
||||||
public function validateCredentials(Authenticatable $user, array $credentials)
|
public function validateCredentials(Authenticatable $user, array $credentials)
|
||||||
{
|
{
|
||||||
// TODO: Implement validateCredentials() method.
|
return $this->ldapService->validateUserCredentials($user, $credentials['username'], $credentials['password']);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
use BookStack\Role;
|
use BookStack\Role;
|
||||||
use BookStack\User;
|
use BookStack\User;
|
||||||
|
use Setting;
|
||||||
|
|
||||||
class UserRepo
|
class UserRepo
|
||||||
{
|
{
|
||||||
|
@ -56,7 +57,7 @@ class UserRepo
|
||||||
*/
|
*/
|
||||||
public function attachDefaultRole($user)
|
public function attachDefaultRole($user)
|
||||||
{
|
{
|
||||||
$roleId = \Setting::get('registration-role');
|
$roleId = Setting::get('registration-role');
|
||||||
if ($roleId === false) $roleId = $this->role->getDefault()->id;
|
if ($roleId === false) $roleId = $this->role->getDefault()->id;
|
||||||
$user->attachRoleId($roleId);
|
$user->attachRoleId($roleId);
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,7 +7,7 @@ use Illuminate\Database\Eloquent\Model;
|
||||||
class Role extends Model
|
class Role extends Model
|
||||||
{
|
{
|
||||||
/**
|
/**
|
||||||
* Sets the default role name for newly registed users.
|
* Sets the default role name for newly registered users.
|
||||||
* @var string
|
* @var string
|
||||||
*/
|
*/
|
||||||
protected static $default = 'viewer';
|
protected static $default = 'viewer';
|
||||||
|
|
|
@ -2,18 +2,94 @@
|
||||||
|
|
||||||
|
|
||||||
use BookStack\Exceptions\LdapException;
|
use BookStack\Exceptions\LdapException;
|
||||||
|
use Illuminate\Contracts\Auth\Authenticatable;
|
||||||
|
|
||||||
class LdapService
|
class LdapService
|
||||||
{
|
{
|
||||||
|
|
||||||
|
protected $ldapConnection;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the details of a user from LDAP using the given username.
|
||||||
|
* User found via configurable user filter.
|
||||||
|
* @param $userName
|
||||||
|
* @return array|null
|
||||||
|
* @throws LdapException
|
||||||
|
*/
|
||||||
public function getUserDetails($userName)
|
public function getUserDetails($userName)
|
||||||
{
|
{
|
||||||
|
$ldapConnection = $this->getConnection();
|
||||||
|
|
||||||
if(!function_exists('ldap_connect')) {
|
// Find user
|
||||||
|
$userFilter = $this->buildFilter(config('services.ldap.user_filter'), ['user' => $userName]);
|
||||||
|
$baseDn = config('services.ldap.base_dn');
|
||||||
|
$ldapSearch = ldap_search($ldapConnection, $baseDn, $userFilter, ['cn', 'uid', 'dn']);
|
||||||
|
$users = ldap_get_entries($ldapConnection, $ldapSearch);
|
||||||
|
if ($users['count'] === 0) return null;
|
||||||
|
|
||||||
|
$user = $users[0];
|
||||||
|
return [
|
||||||
|
'uid' => $user['uid'][0],
|
||||||
|
'name' => $user['cn'][0],
|
||||||
|
'dn' => $user['dn']
|
||||||
|
];
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param Authenticatable $user
|
||||||
|
* @param string $username
|
||||||
|
* @param string $password
|
||||||
|
* @return bool
|
||||||
|
* @throws LdapException
|
||||||
|
*/
|
||||||
|
public function validateUserCredentials(Authenticatable $user, $username, $password)
|
||||||
|
{
|
||||||
|
$ldapUser = $this->getUserDetails($username);
|
||||||
|
if ($ldapUser === null) return false;
|
||||||
|
if ($ldapUser['uid'] !== $user->external_auth_id) return false;
|
||||||
|
|
||||||
|
$ldapConnection = $this->getConnection();
|
||||||
|
$ldapBind = @ldap_bind($ldapConnection, $ldapUser['dn'], $password);
|
||||||
|
return $ldapBind;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Bind the system user to the LDAP connection using the given credentials
|
||||||
|
* otherwise anonymous access is attempted.
|
||||||
|
* @param $connection
|
||||||
|
* @throws LdapException
|
||||||
|
*/
|
||||||
|
protected function bindSystemUser($connection)
|
||||||
|
{
|
||||||
|
$ldapDn = config('services.ldap.dn');
|
||||||
|
$ldapPass = config('services.ldap.pass');
|
||||||
|
|
||||||
|
$isAnonymous = ($ldapDn === false || $ldapPass === false);
|
||||||
|
if ($isAnonymous) {
|
||||||
|
$ldapBind = ldap_bind($connection);
|
||||||
|
} else {
|
||||||
|
$ldapBind = ldap_bind($connection, $ldapDn, $ldapPass);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!$ldapBind) throw new LdapException('LDAP access failed using ' . $isAnonymous ? ' anonymous bind.' : ' given dn & pass details');
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the connection to the LDAP server.
|
||||||
|
* Creates a new connection if one does not exist.
|
||||||
|
* @return resource
|
||||||
|
* @throws LdapException
|
||||||
|
*/
|
||||||
|
protected function getConnection()
|
||||||
|
{
|
||||||
|
if ($this->ldapConnection !== null) return $this->ldapConnection;
|
||||||
|
|
||||||
|
// Check LDAP extension in installed
|
||||||
|
if (!function_exists('ldap_connect')) {
|
||||||
throw new LdapException('LDAP PHP extension not installed');
|
throw new LdapException('LDAP PHP extension not installed');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Get port from server string if specified.
|
||||||
$ldapServer = explode(':', config('services.ldap.server'));
|
$ldapServer = explode(':', config('services.ldap.server'));
|
||||||
$ldapConnection = ldap_connect($ldapServer[0], count($ldapServer) > 1 ? $ldapServer[1] : 389);
|
$ldapConnection = ldap_connect($ldapServer[0], count($ldapServer) > 1 ? $ldapServer[1] : 389);
|
||||||
|
|
||||||
|
@ -21,37 +97,24 @@ class LdapService
|
||||||
throw new LdapException('Cannot connect to ldap server, Initial connection failed');
|
throw new LdapException('Cannot connect to ldap server, Initial connection failed');
|
||||||
}
|
}
|
||||||
|
|
||||||
// Options
|
// Set any required options
|
||||||
|
|
||||||
ldap_set_option($ldapConnection, LDAP_OPT_PROTOCOL_VERSION, 3); // TODO - make configurable
|
ldap_set_option($ldapConnection, LDAP_OPT_PROTOCOL_VERSION, 3); // TODO - make configurable
|
||||||
|
|
||||||
$ldapDn = config('services.ldap.dn');
|
$this->ldapConnection = $ldapConnection;
|
||||||
$ldapPass = config('services.ldap.pass');
|
return $this->ldapConnection;
|
||||||
$isAnonymous = ($ldapDn === false || $ldapPass === false);
|
|
||||||
if ($isAnonymous) {
|
|
||||||
$ldapBind = ldap_bind($ldapConnection);
|
|
||||||
} else {
|
|
||||||
$ldapBind = ldap_bind($ldapConnection, $ldapDn, $ldapPass);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!$ldapBind) throw new LdapException('LDAP access failed using ' . $isAnonymous ? ' anonymous bind.' : ' given dn & pass details');
|
/**
|
||||||
|
* Build a filter string by injecting common variables.
|
||||||
// Find user
|
* @param $filterString
|
||||||
$userFilter = $this->buildFilter(config('services.ldap.user_filter'), ['user' => $userName]);
|
* @param array $attrs
|
||||||
//dd($userFilter);
|
* @return string
|
||||||
$baseDn = config('services.ldap.base_dn');
|
*/
|
||||||
$ldapSearch = ldap_search($ldapConnection, $baseDn, $userFilter);
|
protected function buildFilter($filterString, array $attrs)
|
||||||
$users = ldap_get_entries($ldapConnection, $ldapSearch);
|
|
||||||
|
|
||||||
dd($users);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
private function buildFilter($filterString, $attrs)
|
|
||||||
{
|
{
|
||||||
$newAttrs = [];
|
$newAttrs = [];
|
||||||
foreach ($attrs as $key => $attrText) {
|
foreach ($attrs as $key => $attrText) {
|
||||||
$newKey = '${'.$key.'}';
|
$newKey = '${' . $key . '}';
|
||||||
$newAttrs[$newKey] = $attrText;
|
$newAttrs[$newKey] = $attrText;
|
||||||
}
|
}
|
||||||
return strtr($filterString, $newAttrs);
|
return strtr($filterString, $newAttrs);
|
||||||
|
|
|
@ -70,7 +70,7 @@ return [
|
||||||
'providers' => [
|
'providers' => [
|
||||||
'users' => [
|
'users' => [
|
||||||
'driver' => env('AUTH_METHOD', 'eloquent'),
|
'driver' => env('AUTH_METHOD', 'eloquent'),
|
||||||
'model' => Bookstack\User::class,
|
'model' => BookStack\User::class,
|
||||||
],
|
],
|
||||||
|
|
||||||
// 'users' => [
|
// 'users' => [
|
||||||
|
|
|
@ -0,0 +1,31 @@
|
||||||
|
<?php
|
||||||
|
|
||||||
|
use Illuminate\Database\Schema\Blueprint;
|
||||||
|
use Illuminate\Database\Migrations\Migration;
|
||||||
|
|
||||||
|
class AddExternalAuthToUsers extends Migration
|
||||||
|
{
|
||||||
|
/**
|
||||||
|
* Run the migrations.
|
||||||
|
*
|
||||||
|
* @return void
|
||||||
|
*/
|
||||||
|
public function up()
|
||||||
|
{
|
||||||
|
Schema::table('users', function (Blueprint $table) {
|
||||||
|
$table->string('external_auth_id')->index();
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Reverse the migrations.
|
||||||
|
*
|
||||||
|
* @return void
|
||||||
|
*/
|
||||||
|
public function down()
|
||||||
|
{
|
||||||
|
Schema::table('users', function (Blueprint $table) {
|
||||||
|
$table->dropColumn('external_auth_id');
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,6 +1,6 @@
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
<label for="email">Username</label>
|
<label for="username">Username</label>
|
||||||
@include('form/text', ['name' => 'email', 'tabindex' => 1])
|
@include('form/text', ['name' => 'username', 'tabindex' => 1])
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
|
|
Loading…
Reference in a new issue