123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package admin
- import (
- "fmt"
- "net/http"
- "strings"
- "github.com/unknwon/com"
- log "unknwon.dev/clog/v2"
- "xorm.io/core"
- "gogs.io/gogs/internal/auth/ldap"
- "gogs.io/gogs/internal/conf"
- "gogs.io/gogs/internal/context"
- "gogs.io/gogs/internal/db"
- "gogs.io/gogs/internal/form"
- )
- const (
- AUTHS = "admin/auth/list"
- AUTH_NEW = "admin/auth/new"
- AUTH_EDIT = "admin/auth/edit"
- )
- func Authentications(c *context.Context) {
- c.Title("admin.authentication")
- c.PageIs("Admin")
- c.PageIs("AdminAuthentications")
- var err error
- c.Data["Sources"], err = db.ListLoginSources()
- if err != nil {
- c.Error(err, "list login sources")
- return
- }
- c.Data["Total"] = db.CountLoginSources()
- c.Success(AUTHS)
- }
- type dropdownItem struct {
- Name string
- Type interface{}
- }
- var (
- authSources = []dropdownItem{
- {db.LoginNames[db.LoginLDAP], db.LoginLDAP},
- {db.LoginNames[db.LoginDLDAP], db.LoginDLDAP},
- {db.LoginNames[db.LoginSMTP], db.LoginSMTP},
- {db.LoginNames[db.LoginPAM], db.LoginPAM},
- {db.LoginNames[db.LoginGitHub], db.LoginGitHub},
- }
- securityProtocols = []dropdownItem{
- {db.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_UNENCRYPTED], ldap.SECURITY_PROTOCOL_UNENCRYPTED},
- {db.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_LDAPS], ldap.SECURITY_PROTOCOL_LDAPS},
- {db.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_START_TLS], ldap.SECURITY_PROTOCOL_START_TLS},
- }
- )
- func NewAuthSource(c *context.Context) {
- c.Title("admin.auths.new")
- c.PageIs("Admin")
- c.PageIs("AdminAuthentications")
- c.Data["type"] = db.LoginLDAP
- c.Data["CurrentTypeName"] = db.LoginNames[db.LoginLDAP]
- c.Data["CurrentSecurityProtocol"] = db.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_UNENCRYPTED]
- c.Data["smtp_auth"] = "PLAIN"
- c.Data["is_active"] = true
- c.Data["is_default"] = true
- c.Data["AuthSources"] = authSources
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = db.SMTPAuths
- c.Success(AUTH_NEW)
- }
- func parseLDAPConfig(f form.Authentication) *db.LDAPConfig {
- return &db.LDAPConfig{
- Source: &ldap.Source{
- Host: f.Host,
- Port: f.Port,
- SecurityProtocol: ldap.SecurityProtocol(f.SecurityProtocol),
- SkipVerify: f.SkipVerify,
- BindDN: f.BindDN,
- UserDN: f.UserDN,
- BindPassword: f.BindPassword,
- UserBase: f.UserBase,
- AttributeUsername: f.AttributeUsername,
- AttributeName: f.AttributeName,
- AttributeSurname: f.AttributeSurname,
- AttributeMail: f.AttributeMail,
- AttributesInBind: f.AttributesInBind,
- Filter: f.Filter,
- GroupEnabled: f.GroupEnabled,
- GroupDN: f.GroupDN,
- GroupFilter: f.GroupFilter,
- GroupMemberUID: f.GroupMemberUID,
- UserUID: f.UserUID,
- AdminFilter: f.AdminFilter,
- },
- }
- }
- func parseSMTPConfig(f form.Authentication) *db.SMTPConfig {
- return &db.SMTPConfig{
- Auth: f.SMTPAuth,
- Host: f.SMTPHost,
- Port: f.SMTPPort,
- AllowedDomains: f.AllowedDomains,
- TLS: f.TLS,
- SkipVerify: f.SkipVerify,
- }
- }
- func NewAuthSourcePost(c *context.Context, f form.Authentication) {
- c.Title("admin.auths.new")
- c.PageIs("Admin")
- c.PageIs("AdminAuthentications")
- c.Data["CurrentTypeName"] = db.LoginNames[db.LoginType(f.Type)]
- c.Data["CurrentSecurityProtocol"] = db.SecurityProtocolNames[ldap.SecurityProtocol(f.SecurityProtocol)]
- c.Data["AuthSources"] = authSources
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = db.SMTPAuths
- hasTLS := false
- var config core.Conversion
- switch db.LoginType(f.Type) {
- case db.LoginLDAP, db.LoginDLDAP:
- config = parseLDAPConfig(f)
- hasTLS = ldap.SecurityProtocol(f.SecurityProtocol) > ldap.SECURITY_PROTOCOL_UNENCRYPTED
- case db.LoginSMTP:
- config = parseSMTPConfig(f)
- hasTLS = true
- case db.LoginPAM:
- config = &db.PAMConfig{
- ServiceName: f.PAMServiceName,
- }
- case db.LoginGitHub:
- config = &db.GitHubConfig{
- APIEndpoint: strings.TrimSuffix(f.GitHubAPIEndpoint, "/") + "/",
- }
- default:
- c.Status(http.StatusBadRequest)
- return
- }
- c.Data["HasTLS"] = hasTLS
- if c.HasError() {
- c.Success(AUTH_NEW)
- return
- }
- if err := db.CreateLoginSource(&db.LoginSource{
- Type: db.LoginType(f.Type),
- Name: f.Name,
- IsActived: f.IsActive,
- IsDefault: f.IsDefault,
- Cfg: config,
- }); err != nil {
- if db.IsErrLoginSourceAlreadyExist(err) {
- c.FormErr("Name")
- c.RenderWithErr(c.Tr("admin.auths.login_source_exist", err.(db.ErrLoginSourceAlreadyExist).Name), AUTH_NEW, f)
- } else {
- c.Error(err, "create login source")
- }
- return
- }
- log.Trace("Authentication created by admin(%s): %s", c.User.Name, f.Name)
- c.Flash.Success(c.Tr("admin.auths.new_success", f.Name))
- c.Redirect(conf.Server.Subpath + "/admin/auths")
- }
- func EditAuthSource(c *context.Context) {
- c.Title("admin.auths.edit")
- c.PageIs("Admin")
- c.PageIs("AdminAuthentications")
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = db.SMTPAuths
- source, err := db.LoginSources.GetByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Error(err, "get login source by ID")
- return
- }
- c.Data["Source"] = source
- c.Data["HasTLS"] = source.HasTLS()
- c.Success(AUTH_EDIT)
- }
- func EditAuthSourcePost(c *context.Context, f form.Authentication) {
- c.Title("admin.auths.edit")
- c.PageIs("Admin")
- c.PageIs("AdminAuthentications")
- c.Data["SMTPAuths"] = db.SMTPAuths
- source, err := db.LoginSources.GetByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Error(err, "get login source by ID")
- return
- }
- c.Data["Source"] = source
- c.Data["HasTLS"] = source.HasTLS()
- if c.HasError() {
- c.Success(AUTH_EDIT)
- return
- }
- var config core.Conversion
- switch db.LoginType(f.Type) {
- case db.LoginLDAP, db.LoginDLDAP:
- config = parseLDAPConfig(f)
- case db.LoginSMTP:
- config = parseSMTPConfig(f)
- case db.LoginPAM:
- config = &db.PAMConfig{
- ServiceName: f.PAMServiceName,
- }
- case db.LoginGitHub:
- config = &db.GitHubConfig{
- APIEndpoint: strings.TrimSuffix(f.GitHubAPIEndpoint, "/") + "/",
- }
- default:
- c.Status(http.StatusBadRequest)
- return
- }
- source.Name = f.Name
- source.IsActived = f.IsActive
- source.IsDefault = f.IsDefault
- source.Cfg = config
- if err := db.UpdateLoginSource(source); err != nil {
- c.Error(err, "update login source")
- return
- }
- log.Trace("Authentication changed by admin '%s': %d", c.User.Name, source.ID)
- c.Flash.Success(c.Tr("admin.auths.update_success"))
- c.Redirect(conf.Server.Subpath + "/admin/auths/" + com.ToStr(f.ID))
- }
- func DeleteAuthSource(c *context.Context) {
- source, err := db.LoginSources.GetByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Error(err, "get login source by ID")
- return
- }
- if err = db.DeleteSource(source); err != nil {
- if db.IsErrLoginSourceInUse(err) {
- c.Flash.Error(c.Tr("admin.auths.still_in_used"))
- } else {
- c.Flash.Error(fmt.Sprintf("DeleteSource: %v", err))
- }
- c.JSONSuccess(map[string]interface{}{
- "redirect": conf.Server.Subpath + "/admin/auths/" + c.Params(":authid"),
- })
- return
- }
- log.Trace("Authentication deleted by admin(%s): %d", c.User.Name, source.ID)
- c.Flash.Success(c.Tr("admin.auths.deletion_success"))
- c.JSONSuccess(map[string]interface{}{
- "redirect": conf.Server.Subpath + "/admin/auths",
- })
- }
|