summaryrefslogtreecommitdiff
path: root/modules/ldap_authentication.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'modules/ldap_authentication.cpp')
-rw-r--r--modules/ldap_authentication.cpp319
1 files changed, 319 insertions, 0 deletions
diff --git a/modules/ldap_authentication.cpp b/modules/ldap_authentication.cpp
new file mode 100644
index 000000000..530c9f85e
--- /dev/null
+++ b/modules/ldap_authentication.cpp
@@ -0,0 +1,319 @@
+/*
+ *
+ * (C) 2011-2024 Anope Team
+ * Contact us at team@anope.org
+ *
+ * Please read COPYING and README for further details.
+ */
+
+#include "module.h"
+#include "modules/ldap.h"
+
+static Module *me;
+
+static Anope::string basedn;
+static Anope::string search_filter;
+static Anope::string object_class;
+static Anope::string email_attribute;
+static Anope::string username_attribute;
+
+struct IdentifyInfo final
+{
+ Reference<User> user;
+ IdentifyRequest *req;
+ ServiceReference<LDAPProvider> lprov;
+ bool admin_bind = true;
+ Anope::string dn;
+
+ IdentifyInfo(User *u, IdentifyRequest *r, ServiceReference<LDAPProvider> &lp) : user(u), req(r), lprov(lp)
+ {
+ req->Hold(me);
+ }
+
+ ~IdentifyInfo()
+ {
+ req->Release(me);
+ }
+};
+
+class IdentifyInterface final
+ : public LDAPInterface
+{
+ IdentifyInfo *ii;
+
+public:
+ IdentifyInterface(Module *m, IdentifyInfo *i) : LDAPInterface(m), ii(i) { }
+
+ ~IdentifyInterface()
+ {
+ delete ii;
+ }
+
+ void OnDelete() override
+ {
+ delete this;
+ }
+
+ void OnResult(const LDAPResult &r) override
+ {
+ if (!ii->lprov)
+ return;
+
+ switch (r.type)
+ {
+ case QUERY_SEARCH:
+ {
+ if (!r.empty())
+ {
+ try
+ {
+ const LDAPAttributes &attr = r.get(0);
+ ii->dn = attr.get("dn");
+ Log(LOG_DEBUG) << "ldap_authenticationn: binding as " << ii->dn;
+
+ ii->lprov->Bind(new IdentifyInterface(this->owner, ii), ii->dn, ii->req->GetPassword());
+ ii = NULL;
+ }
+ catch (const LDAPException &ex)
+ {
+ Log(this->owner) << "Error binding after search: " << ex.GetReason();
+ }
+ }
+ break;
+ }
+ case QUERY_BIND:
+ {
+ if (ii->admin_bind)
+ {
+ Anope::string sf = search_filter.replace_all_cs("%account", ii->req->GetAccount()).replace_all_cs("%object_class", object_class);
+ try
+ {
+ Log(LOG_DEBUG) << "ldap_authentication: searching for " << sf;
+ ii->lprov->Search(new IdentifyInterface(this->owner, ii), basedn, sf);
+ ii->admin_bind = false;
+ ii = NULL;
+ }
+ catch (const LDAPException &ex)
+ {
+ Log(this->owner) << "Unable to search for " << sf << ": " << ex.GetReason();
+ }
+ }
+ else
+ {
+ NickAlias *na = NickAlias::Find(ii->req->GetAccount());
+ if (na == NULL)
+ {
+ na = new NickAlias(ii->req->GetAccount(), new NickCore(ii->req->GetAccount()));
+ na->last_realname = ii->user ? ii->user->realname : ii->req->GetAccount();
+ FOREACH_MOD(OnNickRegister, (ii->user, na, ii->req->GetPassword()));
+ BotInfo *NickServ = Config->GetClient("NickServ");
+ if (ii->user && NickServ)
+ ii->user->SendMessage(NickServ, _("Your account \002%s\002 has been successfully created."), na->nick.c_str());
+ }
+ // encrypt and store the password in the nickcore
+ Anope::Encrypt(ii->req->GetPassword(), na->nc->pass);
+
+ na->nc->Extend<Anope::string>("ldap_authentication_dn", ii->dn);
+ ii->req->Success(me);
+ }
+ break;
+ }
+ default:
+ break;
+ }
+ }
+
+ void OnError(const LDAPResult &r) override
+ {
+ }
+};
+
+class OnIdentifyInterface final
+ : public LDAPInterface
+{
+ Anope::string uid;
+
+public:
+ OnIdentifyInterface(Module *m, const Anope::string &i) : LDAPInterface(m), uid(i) { }
+
+ void OnDelete() override
+ {
+ delete this;
+ }
+
+ void OnResult(const LDAPResult &r) override
+ {
+ User *u = User::Find(uid);
+
+ if (!u || !u->Account() || r.empty())
+ return;
+
+ try
+ {
+ const LDAPAttributes &attr = r.get(0);
+ Anope::string email = attr.get(email_attribute);
+
+ if (!email.equals_ci(u->Account()->email))
+ {
+ u->Account()->email = email;
+ BotInfo *NickServ = Config->GetClient("NickServ");
+ if (NickServ)
+ u->SendMessage(NickServ, _("Your email has been updated to \002%s\002"), email.c_str());
+ Log(this->owner) << "Updated email address for " << u->nick << " (" << u->Account()->display << ") to " << email;
+ }
+ }
+ catch (const LDAPException &ex)
+ {
+ Log(this->owner) << ex.GetReason();
+ }
+ }
+
+ void OnError(const LDAPResult &r) override
+ {
+ Log(this->owner) << r.error;
+ }
+};
+
+class OnRegisterInterface final
+ : public LDAPInterface
+{
+public:
+ OnRegisterInterface(Module *m) : LDAPInterface(m) { }
+
+ void OnResult(const LDAPResult &r) override
+ {
+ Log(this->owner) << "Successfully added newly created account to LDAP";
+ }
+
+ void OnError(const LDAPResult &r) override
+ {
+ Log(this->owner) << "Error adding newly created account to LDAP: " << r.getError();
+ }
+};
+
+class ModuleLDAPAuthentication final
+ : public Module
+{
+ ServiceReference<LDAPProvider> ldap;
+ OnRegisterInterface orinterface;
+
+ PrimitiveExtensibleItem<Anope::string> dn;
+
+ Anope::string password_attribute;
+ Anope::string disable_register_reason;
+ Anope::string disable_email_reason;
+public:
+ ModuleLDAPAuthentication(const Anope::string &modname, const Anope::string &creator) :
+ Module(modname, creator, EXTRA | VENDOR), ldap("LDAPProvider", "ldap/main"), orinterface(this),
+ dn(this, "ldap_authentication_dn")
+ {
+ me = this;
+ }
+
+ void Prioritize() override
+ {
+ ModuleManager::SetPriority(this, PRIORITY_FIRST);
+ }
+
+ void OnReload(Configuration::Conf *config) override
+ {
+ Configuration::Block *conf = Config->GetModule(this);
+
+ basedn = conf->Get<const Anope::string>("basedn");
+ search_filter = conf->Get<const Anope::string>("search_filter");
+ object_class = conf->Get<const Anope::string>("object_class");
+ username_attribute = conf->Get<const Anope::string>("username_attribute");
+ this->password_attribute = conf->Get<const Anope::string>("password_attribute");
+ email_attribute = conf->Get<const Anope::string>("email_attribute");
+ this->disable_register_reason = conf->Get<const Anope::string>("disable_register_reason");
+ this->disable_email_reason = conf->Get<const Anope::string>("disable_email_reason");
+
+ if (!email_attribute.empty())
+ {
+ /* Don't complain to users about how they need to update their email, we will do it for them */
+ config->GetModule("nickserv")->Set("forceemail", "no");
+ }
+ }
+
+ EventReturn OnPreCommand(CommandSource &source, Command *command, std::vector<Anope::string> &params) override
+ {
+ if (!this->disable_register_reason.empty())
+ {
+ if (command->name == "nickserv/register" || command->name == "nickserv/group")
+ {
+ source.Reply(this->disable_register_reason);
+ return EVENT_STOP;
+ }
+ }
+
+ if (!email_attribute.empty() && !this->disable_email_reason.empty() && command->name == "nickserv/set/email")
+ {
+ source.Reply(this->disable_email_reason);
+ return EVENT_STOP;
+ }
+
+ return EVENT_CONTINUE;
+ }
+
+ void OnCheckAuthentication(User *u, IdentifyRequest *req) override
+ {
+ if (!this->ldap)
+ return;
+
+ auto *ii = new IdentifyInfo(u, req, this->ldap);
+ this->ldap->BindAsAdmin(new IdentifyInterface(this, ii));
+ }
+
+ void OnNickIdentify(User *u) override
+ {
+ if (email_attribute.empty() || !this->ldap)
+ return;
+
+ Anope::string *d = dn.Get(u->Account());
+ if (!d || d->empty())
+ return;
+
+ this->ldap->Search(new OnIdentifyInterface(this, u->GetUID()), *d, "(" + email_attribute + "=*)");
+ }
+
+ void OnNickRegister(User *, NickAlias *na, const Anope::string &pass) override
+ {
+ if (!this->disable_register_reason.empty() || !this->ldap)
+ return;
+
+ this->ldap->BindAsAdmin(NULL);
+
+ LDAPMods attributes;
+ attributes.resize(4);
+
+ attributes[0].name = "objectClass";
+ attributes[0].values.push_back("top");
+ attributes[0].values.push_back(object_class);
+
+ attributes[1].name = username_attribute;
+ attributes[1].values.push_back(na->nick);
+
+ if (!na->nc->email.empty())
+ {
+ attributes[2].name = email_attribute;
+ attributes[2].values.push_back(na->nc->email);
+ }
+
+ attributes[3].name = this->password_attribute;
+ attributes[3].values.push_back(pass);
+
+ Anope::string new_dn = username_attribute + "=" + na->nick + "," + basedn;
+ this->ldap->Add(&this->orinterface, new_dn, attributes);
+ }
+
+ void OnPreNickExpire(NickAlias *na, bool &expire) override
+ {
+ // We can't let nicks expire if they still have a group or
+ // there will be a zombie account left over that can't be
+ // authenticated to.
+ if (na->nick == na->nc->display && na->nc->aliases->size() > 1)
+ expire = false;
+ }
+};
+
+MODULE_INIT(ModuleLDAPAuthentication)