60 lines
1.6 KiB
Ruby
60 lines
1.6 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
# These calls help to authenticate to LDAP by providing username and password
|
|
#
|
|
# Since multiple LDAP servers are supported, it will loop through all of them
|
|
# until a valid bind is found
|
|
#
|
|
|
|
module Gitlab
|
|
module Auth
|
|
module LDAP
|
|
class Authentication < Gitlab::Auth::OAuth::Authentication
|
|
def self.login(login, password)
|
|
return unless Gitlab::Auth::LDAP::Config.enabled?
|
|
return unless login.present? && password.present?
|
|
|
|
# return found user that was authenticated by first provider for given login credentials
|
|
providers.find do |provider|
|
|
auth = new(provider)
|
|
break auth.user if auth.login(login, password) # true will exit the loop
|
|
end
|
|
end
|
|
|
|
def self.providers
|
|
Gitlab::Auth::LDAP::Config.providers
|
|
end
|
|
|
|
def login(login, password)
|
|
result = adapter.bind_as(
|
|
filter: user_filter(login),
|
|
size: 1,
|
|
password: password
|
|
)
|
|
return unless result
|
|
|
|
@user = Gitlab::Auth::LDAP::User.find_by_uid_and_provider(result.dn, provider)
|
|
end
|
|
|
|
def adapter
|
|
OmniAuth::LDAP::Adaptor.new(config.omniauth_options)
|
|
end
|
|
|
|
def config
|
|
Gitlab::Auth::LDAP::Config.new(provider)
|
|
end
|
|
|
|
def user_filter(login)
|
|
filter = Net::LDAP::Filter.equals(config.uid, login)
|
|
|
|
# Apply LDAP user filter if present
|
|
if config.user_filter.present?
|
|
filter = Net::LDAP::Filter.join(filter, config.constructed_user_filter)
|
|
end
|
|
|
|
filter
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|