2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
module Gitlab
|
|
|
|
module Auth
|
2020-04-08 14:13:33 +05:30
|
|
|
module Ldap
|
2018-03-27 19:54:05 +05:30
|
|
|
class Adapter
|
2018-05-09 12:01:36 +05:30
|
|
|
SEARCH_RETRY_FACTOR = [1, 1, 2, 3].freeze
|
2021-04-29 21:17:54 +05:30
|
|
|
MAX_SEARCH_RETRIES = Rails.env.test? ? 1 : SEARCH_RETRY_FACTOR.size
|
2018-05-09 12:01:36 +05:30
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
attr_reader :provider, :ldap
|
|
|
|
|
|
|
|
def self.open(provider, &block)
|
|
|
|
Net::LDAP.open(config(provider).adapter_options) do |ldap|
|
|
|
|
block.call(self.new(provider, ldap))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.config(provider)
|
2020-04-08 14:13:33 +05:30
|
|
|
Gitlab::Auth::Ldap::Config.new(provider)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def initialize(provider, ldap = nil)
|
|
|
|
@provider = provider
|
2018-05-09 12:01:36 +05:30
|
|
|
@ldap = ldap || renew_connection_adapter
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def config
|
2020-04-08 14:13:33 +05:30
|
|
|
Gitlab::Auth::Ldap::Config.new(provider)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def users(fields, value, limit = nil)
|
|
|
|
options = user_options(Array(fields), value, limit)
|
2019-03-02 22:35:43 +05:30
|
|
|
users_search(options)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def user(*args)
|
|
|
|
users(*args).first
|
|
|
|
end
|
|
|
|
|
|
|
|
def dn_matches_filter?(dn, filter)
|
|
|
|
ldap_search(base: dn,
|
|
|
|
filter: filter,
|
|
|
|
scope: Net::LDAP::SearchScope_BaseObject,
|
|
|
|
attributes: %w{dn}).any?
|
|
|
|
end
|
|
|
|
|
|
|
|
def ldap_search(*args)
|
2018-05-09 12:01:36 +05:30
|
|
|
retries ||= 0
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
# Net::LDAP's `time` argument doesn't work. Use Ruby `Timeout` instead.
|
2018-05-09 12:01:36 +05:30
|
|
|
Timeout.timeout(timeout_time(retries)) do
|
2018-03-27 19:54:05 +05:30
|
|
|
results = ldap.search(*args)
|
|
|
|
|
|
|
|
if results.nil?
|
|
|
|
response = ldap.get_operation_result
|
2021-09-30 23:02:18 +05:30
|
|
|
check_empty_response_code(response)
|
2018-03-27 19:54:05 +05:30
|
|
|
[]
|
|
|
|
else
|
|
|
|
results
|
|
|
|
end
|
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
rescue Net::LDAP::Error, Timeout::Error => error
|
|
|
|
retries += 1
|
|
|
|
error_message = connection_error_message(error)
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
Gitlab::AppLogger.warn(error_message)
|
2018-05-09 12:01:36 +05:30
|
|
|
|
|
|
|
if retries < MAX_SEARCH_RETRIES
|
|
|
|
renew_connection_adapter
|
|
|
|
retry
|
|
|
|
else
|
2020-04-08 14:13:33 +05:30
|
|
|
raise LdapConnectionError, error_message
|
2018-05-09 12:01:36 +05:30
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2018-05-09 12:01:36 +05:30
|
|
|
def timeout_time(retry_number)
|
|
|
|
SEARCH_RETRY_FACTOR[retry_number] * config.timeout
|
|
|
|
end
|
|
|
|
|
2019-03-02 22:35:43 +05:30
|
|
|
def users_search(options)
|
|
|
|
entries = ldap_search(options).select do |entry|
|
|
|
|
entry.respond_to? config.uid
|
|
|
|
end
|
|
|
|
|
|
|
|
entries.map do |entry|
|
2020-04-08 14:13:33 +05:30
|
|
|
Gitlab::Auth::Ldap::Person.new(entry, provider)
|
2019-03-02 22:35:43 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
def user_options(fields, value, limit)
|
|
|
|
options = {
|
2020-04-08 14:13:33 +05:30
|
|
|
attributes: Gitlab::Auth::Ldap::Person.ldap_attributes(config),
|
2018-03-27 19:54:05 +05:30
|
|
|
base: config.base
|
|
|
|
}
|
|
|
|
|
|
|
|
options[:size] = limit if limit
|
|
|
|
|
|
|
|
if fields.include?('dn')
|
|
|
|
raise ArgumentError, 'It is not currently possible to search the DN and other fields at the same time.' if fields.size > 1
|
|
|
|
|
|
|
|
options[:base] = value
|
|
|
|
options[:scope] = Net::LDAP::SearchScope_BaseObject
|
|
|
|
else
|
|
|
|
filter = fields.map { |field| Net::LDAP::Filter.eq(field, value) }.inject(:|)
|
|
|
|
end
|
|
|
|
|
|
|
|
options.merge(filter: user_filter(filter))
|
|
|
|
end
|
|
|
|
|
|
|
|
def user_filter(filter = nil)
|
|
|
|
user_filter = config.constructed_user_filter if config.user_filter.present?
|
|
|
|
|
|
|
|
if user_filter && filter
|
|
|
|
Net::LDAP::Filter.join(filter, user_filter)
|
|
|
|
elsif user_filter
|
|
|
|
user_filter
|
|
|
|
else
|
|
|
|
filter
|
|
|
|
end
|
|
|
|
end
|
2018-05-09 12:01:36 +05:30
|
|
|
|
|
|
|
def connection_error_message(exception)
|
|
|
|
if exception.is_a?(Timeout::Error)
|
|
|
|
"LDAP search timed out after #{config.timeout} seconds"
|
|
|
|
else
|
|
|
|
"LDAP search raised exception #{exception.class}: #{exception.message}"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def renew_connection_adapter
|
|
|
|
@ldap = Net::LDAP.new(config.adapter_options)
|
|
|
|
end
|
2021-09-30 23:02:18 +05:30
|
|
|
|
|
|
|
def check_empty_response_code(response)
|
|
|
|
if config.retry_empty_result_with_codes.include?(response.code)
|
|
|
|
raise Net::LDAP::Error, "Got empty results with response code: #{response.code}, message: #{response.message}"
|
|
|
|
end
|
|
|
|
|
|
|
|
unless response.code == 0
|
|
|
|
Gitlab::AppLogger.warn("LDAP search error: #{response.message}")
|
|
|
|
end
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
|
2021-06-08 01:23:25 +05:30
|
|
|
Gitlab::Auth::Ldap::Adapter.prepend_mod_with('Gitlab::Auth::Ldap::Adapter')
|