123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265 |
- // Copyright 2014 The Gogs Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
- package admin
- import (
- "fmt"
- "github.com/Unknwon/com"
- "github.com/go-xorm/core"
- log "gopkg.in/clog.v1"
- "github.com/gogits/gogs/models"
- "github.com/gogits/gogs/pkg/auth/ldap"
- "github.com/gogits/gogs/pkg/context"
- "github.com/gogits/gogs/pkg/form"
- "github.com/gogits/gogs/pkg/setting"
- )
- const (
- AUTHS = "admin/auth/list"
- AUTH_NEW = "admin/auth/new"
- AUTH_EDIT = "admin/auth/edit"
- )
- func Authentications(c *context.Context) {
- c.Data["Title"] = c.Tr("admin.authentication")
- c.Data["PageIsAdmin"] = true
- c.Data["PageIsAdminAuthentications"] = true
- var err error
- c.Data["Sources"], err = models.LoginSources()
- if err != nil {
- c.Handle(500, "LoginSources", err)
- return
- }
- c.Data["Total"] = models.CountLoginSources()
- c.HTML(200, AUTHS)
- }
- type dropdownItem struct {
- Name string
- Type interface{}
- }
- var (
- authSources = []dropdownItem{
- {models.LoginNames[models.LOGIN_LDAP], models.LOGIN_LDAP},
- {models.LoginNames[models.LOGIN_DLDAP], models.LOGIN_DLDAP},
- {models.LoginNames[models.LOGIN_SMTP], models.LOGIN_SMTP},
- {models.LoginNames[models.LOGIN_PAM], models.LOGIN_PAM},
- }
- securityProtocols = []dropdownItem{
- {models.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_UNENCRYPTED], ldap.SECURITY_PROTOCOL_UNENCRYPTED},
- {models.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_LDAPS], ldap.SECURITY_PROTOCOL_LDAPS},
- {models.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_START_TLS], ldap.SECURITY_PROTOCOL_START_TLS},
- }
- )
- func NewAuthSource(c *context.Context) {
- c.Data["Title"] = c.Tr("admin.auths.new")
- c.Data["PageIsAdmin"] = true
- c.Data["PageIsAdminAuthentications"] = true
- c.Data["type"] = models.LOGIN_LDAP
- c.Data["CurrentTypeName"] = models.LoginNames[models.LOGIN_LDAP]
- c.Data["CurrentSecurityProtocol"] = models.SecurityProtocolNames[ldap.SECURITY_PROTOCOL_UNENCRYPTED]
- c.Data["smtp_auth"] = "PLAIN"
- c.Data["is_active"] = true
- c.Data["AuthSources"] = authSources
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = models.SMTPAuths
- c.HTML(200, AUTH_NEW)
- }
- func parseLDAPConfig(f form.Authentication) *models.LDAPConfig {
- return &models.LDAPConfig{
- Source: &ldap.Source{
- Name: f.Name,
- Host: f.Host,
- Port: f.Port,
- SecurityProtocol: ldap.SecurityProtocol(f.SecurityProtocol),
- SkipVerify: f.SkipVerify,
- BindDN: f.BindDN,
- UserDN: f.UserDN,
- BindPassword: f.BindPassword,
- UserBase: f.UserBase,
- AttributeUsername: f.AttributeUsername,
- AttributeName: f.AttributeName,
- AttributeSurname: f.AttributeSurname,
- AttributeMail: f.AttributeMail,
- AttributesInBind: f.AttributesInBind,
- Filter: f.Filter,
- GroupEnabled: f.GroupEnabled,
- GroupDN: f.GroupDN,
- GroupFilter: f.GroupFilter,
- GroupMemberUID: f.GroupMemberUID,
- UserUID: f.UserUID,
- AdminFilter: f.AdminFilter,
- Enabled: true,
- },
- }
- }
- func parseSMTPConfig(f form.Authentication) *models.SMTPConfig {
- return &models.SMTPConfig{
- Auth: f.SMTPAuth,
- Host: f.SMTPHost,
- Port: f.SMTPPort,
- AllowedDomains: f.AllowedDomains,
- TLS: f.TLS,
- SkipVerify: f.SkipVerify,
- }
- }
- func NewAuthSourcePost(c *context.Context, f form.Authentication) {
- c.Data["Title"] = c.Tr("admin.auths.new")
- c.Data["PageIsAdmin"] = true
- c.Data["PageIsAdminAuthentications"] = true
- c.Data["CurrentTypeName"] = models.LoginNames[models.LoginType(f.Type)]
- c.Data["CurrentSecurityProtocol"] = models.SecurityProtocolNames[ldap.SecurityProtocol(f.SecurityProtocol)]
- c.Data["AuthSources"] = authSources
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = models.SMTPAuths
- hasTLS := false
- var config core.Conversion
- switch models.LoginType(f.Type) {
- case models.LOGIN_LDAP, models.LOGIN_DLDAP:
- config = parseLDAPConfig(f)
- hasTLS = ldap.SecurityProtocol(f.SecurityProtocol) > ldap.SECURITY_PROTOCOL_UNENCRYPTED
- case models.LOGIN_SMTP:
- config = parseSMTPConfig(f)
- hasTLS = true
- case models.LOGIN_PAM:
- config = &models.PAMConfig{
- ServiceName: f.PAMServiceName,
- }
- default:
- c.Error(400)
- return
- }
- c.Data["HasTLS"] = hasTLS
- if c.HasError() {
- c.HTML(200, AUTH_NEW)
- return
- }
- if err := models.CreateLoginSource(&models.LoginSource{
- Type: models.LoginType(f.Type),
- Name: f.Name,
- IsActived: f.IsActive,
- Cfg: config,
- }); err != nil {
- if models.IsErrLoginSourceAlreadyExist(err) {
- c.Data["Err_Name"] = true
- c.RenderWithErr(c.Tr("admin.auths.login_source_exist", err.(models.ErrLoginSourceAlreadyExist).Name), AUTH_NEW, f)
- } else {
- c.Handle(500, "CreateSource", err)
- }
- return
- }
- log.Trace("Authentication created by admin(%s): %s", c.User.Name, f.Name)
- c.Flash.Success(c.Tr("admin.auths.new_success", f.Name))
- c.Redirect(setting.AppSubURL + "/admin/auths")
- }
- func EditAuthSource(c *context.Context) {
- c.Data["Title"] = c.Tr("admin.auths.edit")
- c.Data["PageIsAdmin"] = true
- c.Data["PageIsAdminAuthentications"] = true
- c.Data["SecurityProtocols"] = securityProtocols
- c.Data["SMTPAuths"] = models.SMTPAuths
- source, err := models.GetLoginSourceByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Handle(500, "GetLoginSourceByID", err)
- return
- }
- c.Data["Source"] = source
- c.Data["HasTLS"] = source.HasTLS()
- c.HTML(200, AUTH_EDIT)
- }
- func EditAuthSourcePost(c *context.Context, f form.Authentication) {
- c.Data["Title"] = c.Tr("admin.auths.edit")
- c.Data["PageIsAdmin"] = true
- c.Data["PageIsAdminAuthentications"] = true
- c.Data["SMTPAuths"] = models.SMTPAuths
- source, err := models.GetLoginSourceByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Handle(500, "GetLoginSourceByID", err)
- return
- }
- c.Data["Source"] = source
- c.Data["HasTLS"] = source.HasTLS()
- if c.HasError() {
- c.HTML(200, AUTH_EDIT)
- return
- }
- var config core.Conversion
- switch models.LoginType(f.Type) {
- case models.LOGIN_LDAP, models.LOGIN_DLDAP:
- config = parseLDAPConfig(f)
- case models.LOGIN_SMTP:
- config = parseSMTPConfig(f)
- case models.LOGIN_PAM:
- config = &models.PAMConfig{
- ServiceName: f.PAMServiceName,
- }
- default:
- c.Error(400)
- return
- }
- source.Name = f.Name
- source.IsActived = f.IsActive
- source.Cfg = config
- if err := models.UpdateSource(source); err != nil {
- c.Handle(500, "UpdateSource", err)
- return
- }
- log.Trace("Authentication changed by admin(%s): %d", c.User.Name, source.ID)
- c.Flash.Success(c.Tr("admin.auths.update_success"))
- c.Redirect(setting.AppSubURL + "/admin/auths/" + com.ToStr(f.ID))
- }
- func DeleteAuthSource(c *context.Context) {
- source, err := models.GetLoginSourceByID(c.ParamsInt64(":authid"))
- if err != nil {
- c.Handle(500, "GetLoginSourceByID", err)
- return
- }
- if err = models.DeleteSource(source); err != nil {
- if models.IsErrLoginSourceInUse(err) {
- c.Flash.Error(c.Tr("admin.auths.still_in_used"))
- } else {
- c.Flash.Error(fmt.Sprintf("DeleteSource: %v", err))
- }
- c.JSON(200, map[string]interface{}{
- "redirect": setting.AppSubURL + "/admin/auths/" + c.Params(":authid"),
- })
- return
- }
- log.Trace("Authentication deleted by admin(%s): %d", c.User.Name, source.ID)
- c.Flash.Success(c.Tr("admin.auths.deletion_success"))
- c.JSON(200, map[string]interface{}{
- "redirect": setting.AppSubURL + "/admin/auths",
- })
- }
|