This repository has been archived by the owner on Jul 18, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 2
/
client.go
120 lines (101 loc) · 3.32 KB
/
client.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
package ldaputil
import (
"crypto/tls"
"fmt"
"net"
utilnet "k8s.io/apimachinery/pkg/util/net"
"k8s.io/client-go/util/cert"
"github.com/openshift/origin/pkg/auth/ldaputil/ldapclient"
"gopkg.in/ldap.v2"
)
// NewLDAPClientConfig returns a new LDAP client config
func NewLDAPClientConfig(URL, bindDN, bindPassword, CA string, insecure bool) (ldapclient.Config, error) {
url, err := ParseURL(URL)
if err != nil {
return nil, fmt.Errorf("Error parsing URL: %v", err)
}
tlsConfig := &tls.Config{}
if len(CA) > 0 {
roots, err := cert.NewPool(CA)
if err != nil {
return nil, fmt.Errorf("error loading cert pool from ca file %s: %v", CA, err)
}
tlsConfig.RootCAs = roots
}
return &ldapClientConfig{
scheme: url.Scheme,
host: url.Host,
bindDN: bindDN,
bindPassword: bindPassword,
insecure: insecure,
tlsConfig: tlsConfig,
}, nil
}
// ldapClientConfig holds information for connecting to an LDAP server
type ldapClientConfig struct {
// scheme is the LDAP connection scheme, either ldap or ldaps
scheme Scheme
// host is the host:port of the LDAP server
host string
// bindDN is an optional DN to bind with during the search phase.
bindDN string
// bindPassword is an optional password to bind with during the search phase.
bindPassword string
// insecure specifies if TLS is required for the connection. If true, either an ldap://... URL or
// StartTLS must be supported by the server
insecure bool
// tlsConfig holds the TLS options. Only used when insecure=false
tlsConfig *tls.Config
}
// ldapClientConfig is an ldapclient.Config
var _ ldapclient.Config = &ldapClientConfig{}
// Connect returns an established LDAP connection, or an error if the connection could not
// be made (or successfully upgraded to TLS). If no error is returned, the caller is responsible for
// closing the connection
func (l *ldapClientConfig) Connect() (ldap.Client, error) {
tlsConfig := l.tlsConfig
// Ensure tlsConfig specifies the server we're connecting to
if tlsConfig != nil && !tlsConfig.InsecureSkipVerify && len(tlsConfig.ServerName) == 0 {
// Add to a copy of the tlsConfig to avoid mutating the original
c := utilnet.CloneTLSConfig(tlsConfig)
if host, _, err := net.SplitHostPort(l.host); err == nil {
c.ServerName = host
} else {
c.ServerName = l.host
}
tlsConfig = c
}
switch l.scheme {
case SchemeLDAP:
con, err := ldap.Dial("tcp", l.host)
if err != nil {
return nil, err
}
// If an insecure connection is desired, we're done
if l.insecure {
return con, nil
}
// Attempt to upgrade to TLS
if err := con.StartTLS(tlsConfig); err != nil {
// We're returning an error on a successfully opened connection
// We are responsible for closing the open connection
con.Close()
return nil, err
}
return con, nil
case SchemeLDAPS:
return ldap.DialTLS("tcp", l.host, tlsConfig)
default:
return nil, fmt.Errorf("unsupported scheme %q", l.scheme)
}
}
func (l *ldapClientConfig) GetBindCredentials() (string, string) {
return l.bindDN, l.bindPassword
}
func (l *ldapClientConfig) Host() string {
return l.host
}
// String implements Stringer for debugging purposes
func (l *ldapClientConfig) String() string {
return fmt.Sprintf("{Scheme: %v Host: %v BindDN: %v len(BbindPassword): %v Insecure: %v}", l.scheme, l.host, l.bindDN, len(l.bindPassword), l.insecure)
}