fix: mostly working ldap
This commit is contained in:
@@ -20,3 +20,12 @@ LDAP_BASE_DN=
|
|||||||
LDAP_BIND_USER=
|
LDAP_BIND_USER=
|
||||||
LDAP_BIND_PASS=
|
LDAP_BIND_PASS=
|
||||||
LDAP_DN_STRING=
|
LDAP_DN_STRING=
|
||||||
|
LDAP_UID_KEY="uid"
|
||||||
|
|
||||||
|
# LDAP group that identifies an Admin
|
||||||
|
# Users with this LDAP group will automatically
|
||||||
|
# get the admin role in this system.
|
||||||
|
LDAP_ADMIN_ROLE_DN="cn=admins,cn=groups,cn=accounts,dc=caldwell,dc=local"
|
||||||
|
LDAP_EMAIL_ATTRIBUTE=mail
|
||||||
|
LDAP_USERNAME_ATTRIBUTE=uid
|
||||||
|
LDAP_NAME_ATTRIBUTE=displayname
|
||||||
|
|||||||
@@ -10,6 +10,9 @@ security:
|
|||||||
class: App\User\Framework\Entity\User
|
class: App\User\Framework\Entity\User
|
||||||
property: email
|
property: email
|
||||||
|
|
||||||
|
custom_ldap_provider:
|
||||||
|
id: App\User\Framework\Security\LdapUserProvider
|
||||||
|
|
||||||
app_ldap_provider:
|
app_ldap_provider:
|
||||||
ldap:
|
ldap:
|
||||||
service: Symfony\Component\Ldap\Ldap
|
service: Symfony\Component\Ldap\Ldap
|
||||||
@@ -27,7 +30,7 @@ security:
|
|||||||
security: false
|
security: false
|
||||||
main:
|
main:
|
||||||
lazy: true
|
lazy: true
|
||||||
provider: app_ldap_provider
|
provider: custom_ldap_provider
|
||||||
# form_login:
|
# form_login:
|
||||||
# login_path: app_login
|
# login_path: app_login
|
||||||
# check_path: app_login
|
# check_path: app_login
|
||||||
|
|||||||
@@ -34,6 +34,20 @@ services:
|
|||||||
- '%env(DATABASE_URL)%'
|
- '%env(DATABASE_URL)%'
|
||||||
|
|
||||||
# LDAP
|
# LDAP
|
||||||
|
App\User\Framework\Security\LdapUserProvider:
|
||||||
|
arguments:
|
||||||
|
$userRepository: '@App\User\Framework\Repository\UserRepository'
|
||||||
|
$ldap: '@Symfony\Component\Ldap\LdapInterface'
|
||||||
|
$baseDn: '%env(LDAP_BASE_DN)%'
|
||||||
|
$searchDn: '%env(LDAP_BIND_USER)%'
|
||||||
|
$searchPassword: '%env(LDAP_BIND_PASS)%'
|
||||||
|
$defaultRoles: ['ROLE_USER']
|
||||||
|
$uidKey: '%env(LDAP_UID_KEY)%'
|
||||||
|
# $passwordAttribute: '%env(LDAP_PASSWORD_ATTRIBUTE)%'
|
||||||
|
|
||||||
|
|
||||||
|
Symfony\Component\Ldap\LdapInterface: '@Symfony\Component\Ldap\Ldap'
|
||||||
|
|
||||||
Symfony\Component\Ldap\Ldap:
|
Symfony\Component\Ldap\Ldap:
|
||||||
arguments: [ '@Symfony\Component\Ldap\Adapter\ExtLdap\Adapter' ]
|
arguments: [ '@Symfony\Component\Ldap\Adapter\ExtLdap\Adapter' ]
|
||||||
tags:
|
tags:
|
||||||
@@ -47,3 +61,4 @@ services:
|
|||||||
options:
|
options:
|
||||||
protocol_version: 3
|
protocol_version: 3
|
||||||
referrals: false
|
referrals: false
|
||||||
|
|
||||||
|
|||||||
35
migrations/Version20250510185814.php
Normal file
35
migrations/Version20250510185814.php
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
declare(strict_types=1);
|
||||||
|
|
||||||
|
namespace DoctrineMigrations;
|
||||||
|
|
||||||
|
use Doctrine\DBAL\Schema\Schema;
|
||||||
|
use Doctrine\Migrations\AbstractMigration;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Auto-generated Migration: Please modify to your needs!
|
||||||
|
*/
|
||||||
|
final class Version20250510185814 extends AbstractMigration
|
||||||
|
{
|
||||||
|
public function getDescription(): string
|
||||||
|
{
|
||||||
|
return '';
|
||||||
|
}
|
||||||
|
|
||||||
|
public function up(Schema $schema): void
|
||||||
|
{
|
||||||
|
// this up() migration is auto-generated, please modify it to your needs
|
||||||
|
$this->addSql(<<<'SQL'
|
||||||
|
ALTER TABLE user ADD username VARCHAR(255) DEFAULT NULL
|
||||||
|
SQL);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function down(Schema $schema): void
|
||||||
|
{
|
||||||
|
// this down() migration is auto-generated, please modify it to your needs
|
||||||
|
$this->addSql(<<<'SQL'
|
||||||
|
ALTER TABLE user DROP username
|
||||||
|
SQL);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -18,7 +18,7 @@ final class IndexController extends AbstractController
|
|||||||
#[Route('/', name: 'app_index')]
|
#[Route('/', name: 'app_index')]
|
||||||
public function index(): Response
|
public function index(): Response
|
||||||
{
|
{
|
||||||
dd($this->getUser());
|
// dd($this->getUser());
|
||||||
return $this->render('index/index.html.twig', [
|
return $this->render('index/index.html.twig', [
|
||||||
'active_downloads' => $this->downloadRepository->getActivePaginated(),
|
'active_downloads' => $this->downloadRepository->getActivePaginated(),
|
||||||
'recent_downloads' => $this->downloadRepository->latest(5),
|
'recent_downloads' => $this->downloadRepository->latest(5),
|
||||||
|
|||||||
@@ -22,6 +22,9 @@ class User implements UserInterface, PasswordAuthenticatedUserInterface
|
|||||||
#[ORM\Column(type: 'integer')]
|
#[ORM\Column(type: 'integer')]
|
||||||
private int $id;
|
private int $id;
|
||||||
|
|
||||||
|
#[ORM\Column(type: 'string', length: 255, nullable: true)]
|
||||||
|
private ?string $username;
|
||||||
|
|
||||||
#[ORM\Column(type: 'string', length: 180, unique: true)]
|
#[ORM\Column(type: 'string', length: 180, unique: true)]
|
||||||
private ?string $email;
|
private ?string $email;
|
||||||
|
|
||||||
@@ -88,7 +91,7 @@ class User implements UserInterface, PasswordAuthenticatedUserInterface
|
|||||||
*/
|
*/
|
||||||
public function getUserIdentifier(): string
|
public function getUserIdentifier(): string
|
||||||
{
|
{
|
||||||
return (string) $this->email;
|
return (string) $this->username ?? $this->email;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -241,4 +244,16 @@ class User implements UserInterface, PasswordAuthenticatedUserInterface
|
|||||||
|
|
||||||
return $this;
|
return $this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public function getUsername(): ?string
|
||||||
|
{
|
||||||
|
return $this->username;
|
||||||
|
}
|
||||||
|
|
||||||
|
public function setUsername(?string $username): static
|
||||||
|
{
|
||||||
|
$this->username = $username;
|
||||||
|
|
||||||
|
return $this;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
73
src/User/Framework/Security/LdapAuthenticator.php
Normal file
73
src/User/Framework/Security/LdapAuthenticator.php
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
namespace App\User\Framework\Security;
|
||||||
|
|
||||||
|
use Symfony\Component\HttpFoundation\JsonResponse;
|
||||||
|
use Symfony\Component\HttpFoundation\Request;
|
||||||
|
use Symfony\Component\HttpFoundation\Response;
|
||||||
|
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
|
||||||
|
use Symfony\Component\Security\Core\Exception\AuthenticationException;
|
||||||
|
use Symfony\Component\Security\Http\Authenticator\AbstractAuthenticator;
|
||||||
|
use Symfony\Component\Security\Http\Authenticator\Passport\Passport;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @see https://symfony.com/doc/current/security/custom_authenticator.html
|
||||||
|
*/
|
||||||
|
class LdapAuthenticator extends AbstractAuthenticator
|
||||||
|
{
|
||||||
|
/**
|
||||||
|
* Called on every request to decide if this authenticator should be
|
||||||
|
* used for the request. Returning `false` will cause this authenticator
|
||||||
|
* to be skipped.
|
||||||
|
*/
|
||||||
|
public function supports(Request $request): ?bool
|
||||||
|
{
|
||||||
|
// return $request->headers->has('X-AUTH-TOKEN');
|
||||||
|
}
|
||||||
|
|
||||||
|
public function authenticate(Request $request): Passport
|
||||||
|
{
|
||||||
|
// $apiToken = $request->headers->get('X-AUTH-TOKEN');
|
||||||
|
// if (null === $apiToken) {
|
||||||
|
// The token header was empty, authentication fails with HTTP Status
|
||||||
|
// Code 401 "Unauthorized"
|
||||||
|
// throw new CustomUserMessageAuthenticationException('No API token provided');
|
||||||
|
// }
|
||||||
|
|
||||||
|
// implement your own logic to get the user identifier from `$apiToken`
|
||||||
|
// e.g. by looking up a user in the database using its API key
|
||||||
|
// $userIdentifier = /** ... */;
|
||||||
|
|
||||||
|
// return new SelfValidatingPassport(new UserBadge($userIdentifier));
|
||||||
|
}
|
||||||
|
|
||||||
|
public function onAuthenticationSuccess(Request $request, TokenInterface $token, string $firewallName): ?Response
|
||||||
|
{
|
||||||
|
// on success, let the request continue
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
public function onAuthenticationFailure(Request $request, AuthenticationException $exception): ?Response
|
||||||
|
{
|
||||||
|
$data = [
|
||||||
|
// you may want to customize or obfuscate the message first
|
||||||
|
'message' => strtr($exception->getMessageKey(), $exception->getMessageData()),
|
||||||
|
|
||||||
|
// or to translate this message
|
||||||
|
// $this->translator->trans($exception->getMessageKey(), $exception->getMessageData())
|
||||||
|
];
|
||||||
|
|
||||||
|
return new JsonResponse($data, Response::HTTP_UNAUTHORIZED);
|
||||||
|
}
|
||||||
|
|
||||||
|
// public function start(Request $request, ?AuthenticationException $authException = null): Response
|
||||||
|
// {
|
||||||
|
// /*
|
||||||
|
// * If you would like this class to control what happens when an anonymous user accesses a
|
||||||
|
// * protected page (e.g. redirect to /login), uncomment this method and make this class
|
||||||
|
// * implement Symfony\Component\Security\Http\EntryPoint\AuthenticationEntryPointInterface.
|
||||||
|
// *
|
||||||
|
// * For more details, see https://symfony.com/doc/current/security/experimental_authenticators.html#configuring-the-authentication-entry-point
|
||||||
|
// */
|
||||||
|
// }
|
||||||
|
}
|
||||||
227
src/User/Framework/Security/LdapUserProvider.php
Normal file
227
src/User/Framework/Security/LdapUserProvider.php
Normal file
@@ -0,0 +1,227 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This file is part of the Symfony package.
|
||||||
|
*
|
||||||
|
* (c) Fabien Potencier <fabien@symfony.com>
|
||||||
|
*
|
||||||
|
* For the full copyright and license information, please view the LICENSE
|
||||||
|
* file that was distributed with this source code.
|
||||||
|
*/
|
||||||
|
|
||||||
|
namespace App\User\Framework\Security;
|
||||||
|
|
||||||
|
use App\User\Framework\Entity\User;
|
||||||
|
use App\User\Framework\Repository\UserRepository;
|
||||||
|
use Symfony\Component\Ldap\Entry;
|
||||||
|
use Symfony\Component\Ldap\Exception\ExceptionInterface;
|
||||||
|
use Symfony\Component\Ldap\Exception\InvalidCredentialsException;
|
||||||
|
use Symfony\Component\Ldap\Exception\InvalidSearchCredentialsException;
|
||||||
|
use Symfony\Component\Ldap\LdapInterface;
|
||||||
|
use Symfony\Component\Security\Core\Exception\InvalidArgumentException;
|
||||||
|
use Symfony\Component\Security\Core\Exception\UnsupportedUserException;
|
||||||
|
use Symfony\Component\Security\Core\Exception\UserNotFoundException;
|
||||||
|
use Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface;
|
||||||
|
use Symfony\Component\Security\Core\User\PasswordUpgraderInterface;
|
||||||
|
use Symfony\Component\Security\Core\User\UserInterface;
|
||||||
|
use Symfony\Component\Security\Core\User\UserProviderInterface;
|
||||||
|
use Symfony\Component\Ldap\Security\LdapUser;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* LdapUserProvider is a simple user provider on top of LDAP.
|
||||||
|
*
|
||||||
|
* @author Grégoire Pineau <lyrixx@lyrixx.info>
|
||||||
|
* @author Charles Sarrazin <charles@sarraz.in>
|
||||||
|
* @author Robin Chalas <robin.chalas@gmail.com>
|
||||||
|
*
|
||||||
|
* @template-implements UserProviderInterface<LdapUser>
|
||||||
|
*/
|
||||||
|
class LdapUserProvider implements UserProviderInterface, PasswordUpgraderInterface
|
||||||
|
{
|
||||||
|
private string $uidKey;
|
||||||
|
private string $defaultSearch;
|
||||||
|
private string $usernameAttribute;
|
||||||
|
private string $emailAttribute;
|
||||||
|
private string $displayNameAttribute;
|
||||||
|
private RoleFetcherInterface $roleFetcher;
|
||||||
|
|
||||||
|
public function __construct(
|
||||||
|
private UserRepository $userRepository,
|
||||||
|
private LdapInterface $ldap,
|
||||||
|
private string $baseDn,
|
||||||
|
private ?string $searchDn = null,
|
||||||
|
#[\SensitiveParameter] private ?string $searchPassword = null,
|
||||||
|
private array $defaultRoles = [],
|
||||||
|
?string $uidKey = null,
|
||||||
|
?string $filter = null,
|
||||||
|
private ?string $passwordAttribute = null,
|
||||||
|
private array $extraFields = [],
|
||||||
|
string $usernameAttribute = 'uid',
|
||||||
|
string $emailAttribute = 'mail',
|
||||||
|
string $displayNameAttribute = 'displayName',
|
||||||
|
) {
|
||||||
|
$uidKey ??= 'sAMAccountName';
|
||||||
|
$filter ??= '({uid_key}={user_identifier})';
|
||||||
|
|
||||||
|
$this->uidKey = $uidKey;
|
||||||
|
$this->defaultSearch = str_replace('{uid_key}', $uidKey, $filter);
|
||||||
|
// $this->roleFetcher = $defaultRoles;
|
||||||
|
$this->usernameAttribute = $usernameAttribute;
|
||||||
|
$this->emailAttribute = $emailAttribute;
|
||||||
|
$this->displayNameAttribute = $displayNameAttribute;
|
||||||
|
}
|
||||||
|
|
||||||
|
public function loadUserByIdentifier(string $identifier): UserInterface
|
||||||
|
{
|
||||||
|
try {
|
||||||
|
$this->ldap->bind($this->searchDn, $this->searchPassword);
|
||||||
|
} catch (InvalidCredentialsException) {
|
||||||
|
throw new InvalidSearchCredentialsException();
|
||||||
|
}
|
||||||
|
|
||||||
|
$identifier = $this->ldap->escape($identifier, '', LdapInterface::ESCAPE_FILTER);
|
||||||
|
$query = str_replace('{user_identifier}', $identifier, $this->defaultSearch);
|
||||||
|
$search = $this->ldap->query($this->baseDn, $query, ['filter' => 0 == \count($this->extraFields) ? '*' : $this->extraFields]);
|
||||||
|
|
||||||
|
$entries = $search->execute();
|
||||||
|
$count = \count($entries);
|
||||||
|
|
||||||
|
if (!$count) {
|
||||||
|
$e = new UserNotFoundException(\sprintf('User "%s" not found.', $identifier));
|
||||||
|
$e->setUserIdentifier($identifier);
|
||||||
|
|
||||||
|
throw $e;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($count > 1) {
|
||||||
|
$e = new UserNotFoundException('More than one user found.');
|
||||||
|
$e->setUserIdentifier($identifier);
|
||||||
|
|
||||||
|
throw $e;
|
||||||
|
}
|
||||||
|
|
||||||
|
$entry = $entries[0];
|
||||||
|
|
||||||
|
try {
|
||||||
|
$identifier = $this->getAttributeValue($entry, $this->uidKey);
|
||||||
|
} catch (InvalidArgumentException) {
|
||||||
|
// This is empty
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->loadUser($identifier, $entry);
|
||||||
|
}
|
||||||
|
|
||||||
|
public function refreshUser(UserInterface $user): UserInterface
|
||||||
|
{
|
||||||
|
if (!$user instanceof LdapUser) {
|
||||||
|
throw new UnsupportedUserException(\sprintf('Instances of "%s" are not supported.', get_debug_type($user)));
|
||||||
|
}
|
||||||
|
|
||||||
|
return new LdapUser($user->getEntry(), $user->getUserIdentifier(), $user->getPassword(), $user->getRoles(), $user->getExtraFields());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @final
|
||||||
|
*/
|
||||||
|
public function upgradePassword(PasswordAuthenticatedUserInterface $user, string $newHashedPassword): void
|
||||||
|
{
|
||||||
|
if (!$user instanceof LdapUser) {
|
||||||
|
throw new UnsupportedUserException(\sprintf('Instances of "%s" are not supported.', get_debug_type($user)));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (null === $this->passwordAttribute) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
$user->getEntry()->setAttribute($this->passwordAttribute, [$newHashedPassword]);
|
||||||
|
$this->ldap->getEntryManager()->update($user->getEntry());
|
||||||
|
$user->setPassword($newHashedPassword);
|
||||||
|
} catch (ExceptionInterface) {
|
||||||
|
// ignore failed password upgrades
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public function supportsClass(string $class): bool
|
||||||
|
{
|
||||||
|
return User::class === $class;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Loads a user from an LDAP entry.
|
||||||
|
*/
|
||||||
|
protected function loadUser(string $identifier, Entry $entry): UserInterface
|
||||||
|
{
|
||||||
|
$extraFields = [];
|
||||||
|
|
||||||
|
foreach ($this->extraFields as $field) {
|
||||||
|
$extraFields[$field] = $this->getAttributeValue($entry, $field);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (null !== $this->passwordAttribute) {
|
||||||
|
$password = $this->getAttributeValue($entry, $this->passwordAttribute);
|
||||||
|
}
|
||||||
|
|
||||||
|
// $roles = $this->roleFetcher->fetchRoles($entry);
|
||||||
|
|
||||||
|
$dbUser = $this->getDbUser($identifier);
|
||||||
|
|
||||||
|
if (null === $dbUser) {
|
||||||
|
$dbUser = new User();
|
||||||
|
$dbUser->setPassword("test");
|
||||||
|
}
|
||||||
|
|
||||||
|
$dbUser
|
||||||
|
->setName($entry->getAttribute($this->displayNameAttribute)[0] ?? null)
|
||||||
|
->setEmail($entry->getAttribute($this->emailAttribute)[0] ?? null)
|
||||||
|
->setUsername($entry->getAttribute($this->usernameAttribute)[0] ?? null);
|
||||||
|
|
||||||
|
$this->userRepository->getEntityManager()->persist($dbUser);
|
||||||
|
$this->userRepository->getEntityManager()->flush();
|
||||||
|
|
||||||
|
return $dbUser;
|
||||||
|
}
|
||||||
|
|
||||||
|
// protected function loadUser(string $identifier, Entry $entry): UserInterface
|
||||||
|
// {
|
||||||
|
// $password = null;
|
||||||
|
// $extraFields = [];
|
||||||
|
//
|
||||||
|
// if (null !== $this->passwordAttribute) {
|
||||||
|
// $password = $this->getAttributeValue($entry, $this->passwordAttribute);
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// foreach ($this->extraFields as $field) {
|
||||||
|
// $extraFields[$field] = $this->getAttributeValue($entry, $field);
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// return new LdapUser($entry, $identifier, $password, $this->defaultRoles, $extraFields);
|
||||||
|
// }
|
||||||
|
|
||||||
|
private function getDbUser(string $identifier): ?UserInterface
|
||||||
|
{
|
||||||
|
if (in_array($this->uidKey, ['mail', 'email'])) {
|
||||||
|
return $this->userRepository->findOneBy(['email' => $identifier]);
|
||||||
|
} else {
|
||||||
|
return $this->userRepository->findOneBy(['username' => $identifier]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private function getAttributeValue(Entry $entry, string $attribute): mixed
|
||||||
|
{
|
||||||
|
if (!$entry->hasAttribute($attribute)) {
|
||||||
|
throw new InvalidArgumentException(\sprintf('Missing attribute "%s" for user "%s".', $attribute, $entry->getDn()));
|
||||||
|
}
|
||||||
|
|
||||||
|
$values = $entry->getAttribute($attribute);
|
||||||
|
if (!\in_array($attribute, [$this->uidKey, $this->passwordAttribute])) {
|
||||||
|
return $values;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (1 !== \count($values)) {
|
||||||
|
throw new InvalidArgumentException(\sprintf('Attribute "%s" has multiple values.', $attribute));
|
||||||
|
}
|
||||||
|
|
||||||
|
return $values[0];
|
||||||
|
}
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user