add ldap thing
This commit is contained in:
parent
edf013502d
commit
c432c7dbf2
12 changed files with 664 additions and 0 deletions
13
ldap-auth-server/CHANGELOG.md
Normal file
13
ldap-auth-server/CHANGELOG.md
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
<!--
|
||||||
|
https://developers.home-assistant.io/docs/add-ons/presentation#keeping-a-changelog
|
||||||
|
-->
|
||||||
|
|
||||||
|
# Changelog
|
||||||
|
|
||||||
|
## [Unreleased]
|
||||||
|
|
||||||
|
## 0.1.0
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Initial release
|
62
ldap-auth-server/DOCS.md
Normal file
62
ldap-auth-server/DOCS.md
Normal file
|
@ -0,0 +1,62 @@
|
||||||
|
# Home Assistant Add-on: LDAP Auth Server
|
||||||
|
|
||||||
|
## How to use
|
||||||
|
|
||||||
|
1. Install the add-on.
|
||||||
|
2. Configure `LDAP Server URL` and `Bind DN Template` to match your LDAP
|
||||||
|
server.
|
||||||
|
3. (Optionally) Configure `Search Base DN` and `Search Filter Template` if you
|
||||||
|
want to hide some users from Home Assistant.
|
||||||
|
4. Copy the
|
||||||
|
[ldap_auth_command.sh](https://github.com/vqvu/home-assistant-addons/ldap-auth-server/ldap_auth_command.sh)
|
||||||
|
file to your Home Assistant config directory.
|
||||||
|
5. Add a custom [Command Line authentication
|
||||||
|
provider](https://www.home-assistant.io/docs/authentication/providers/#command-line)
|
||||||
|
to your configuration to call that script.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
homeassistant:
|
||||||
|
auth_providers:
|
||||||
|
- type: command_line
|
||||||
|
command: /config/ldap_auth_command.sh
|
||||||
|
args:
|
||||||
|
# Provide the hostname of the add-on as the first argument. You can
|
||||||
|
# the hostname on the add-on's Info page.
|
||||||
|
- 7860403f-ldap-auth-server
|
||||||
|
meta: true
|
||||||
|
# Optionally add the homeassistant provider as a fallback if you're
|
||||||
|
# concerned about a failed LDAP server locking you out of Home
|
||||||
|
# Assistant.
|
||||||
|
# - type: homeassistant
|
||||||
|
```
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
|
||||||
|
These limitations are current as of Home Assistant v2023.2.
|
||||||
|
|
||||||
|
1. The users created via the `command_line` provider are different from the
|
||||||
|
ones created via the `homeassistant` provider, even if their usernames are
|
||||||
|
the same. This means you will lose all user configurations when adopting a
|
||||||
|
new auth provider.
|
||||||
|
2. Users created by `command_line` provider are all Administrators, and it is
|
||||||
|
not possible to change this in the UI. You will need to manually modify the
|
||||||
|
`group_ids` field of the user in the `/config/.storage/auth` file to be
|
||||||
|
`system-users`. Example
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"id": "5de09f4cdcdb4d4fa2a39291147803df",
|
||||||
|
"group_ids": [
|
||||||
|
"system-users"
|
||||||
|
],
|
||||||
|
...
|
||||||
|
"name": "Non-admin User",
|
||||||
|
...
|
||||||
|
},
|
||||||
|
```
|
||||||
|
|
||||||
|
Don't forget to restart your Home Assistant afterwards.
|
||||||
|
3. This add-on is only tested with an [LLDAP
|
||||||
|
server](https://github.com/nitnelave/lldap), so it is possible (though
|
||||||
|
probably unlikely) that it doesn't work with other types of LDAP servers for
|
||||||
|
one reason or another.
|
16
ldap-auth-server/Dockerfile
Normal file
16
ldap-auth-server/Dockerfile
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
# # https://developers.home-assistant.io/docs/add-ons/configuration#add-on-dockerfile
|
||||||
|
ARG BUILD_FROM
|
||||||
|
FROM $BUILD_FROM AS build
|
||||||
|
|
||||||
|
COPY . /build
|
||||||
|
|
||||||
|
WORKDIR /build
|
||||||
|
|
||||||
|
# Execute during the build of the image
|
||||||
|
RUN apk add --no-cache go && go build
|
||||||
|
|
||||||
|
FROM $BUILD_FROM
|
||||||
|
|
||||||
|
COPY --from=build /build/ldap-auth-server /usr/bin
|
||||||
|
|
||||||
|
CMD ["/usr/bin/ldap-auth-server", "/data/options.json"]
|
24
ldap-auth-server/README.md
Normal file
24
ldap-auth-server/README.md
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
# Home Assistant Add-on: LDAP Authentication Server
|
||||||
|
|
||||||
|
![Supports aarch64 Architecture][aarch64-shield] ![Supports amd64
|
||||||
|
Architecture][amd64-shield] ![Supports armhf Architecture][armhf-shield]
|
||||||
|
![Supports armv7 Architecture][armv7-shield] ![Supports i386
|
||||||
|
Architecture][i386-shield]
|
||||||
|
|
||||||
|
This add-on runs a simple HTTP server that can authenticate users against an
|
||||||
|
LDAP server. It is meant to be used in conjunction with Home Assistant's
|
||||||
|
[Command Line authentication
|
||||||
|
provider](https://www.home-assistant.io/docs/authentication/providers/#command-line),
|
||||||
|
so it only implements the bare minimum functionality to support that.
|
||||||
|
|
||||||
|
This add-on is as an alternative to the shell script at
|
||||||
|
<https://github.com/bob1de/ldap-auth-sh> for containerized Home Assistant
|
||||||
|
installs. Unlike `ldap-auth-sh`, all LDAP functionality is wrapped in the add-on
|
||||||
|
and exposed via an HTTP endpoint. That way, only `curl` is needed from within
|
||||||
|
the Home Assistant container.
|
||||||
|
|
||||||
|
[aarch64-shield]: https://img.shields.io/badge/aarch64-yes-green.svg
|
||||||
|
[amd64-shield]: https://img.shields.io/badge/amd64-yes-green.svg
|
||||||
|
[armhf-shield]: https://img.shields.io/badge/armhf-yes-green.svg
|
||||||
|
[armv7-shield]: https://img.shields.io/badge/armv7-yes-green.svg
|
||||||
|
[i386-shield]: https://img.shields.io/badge/i386-yes-green.svg
|
42
ldap-auth-server/apparmor.txt
Normal file
42
ldap-auth-server/apparmor.txt
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
#include <tunables/global>
|
||||||
|
|
||||||
|
profile ldap-auth-server flags=(attach_disconnected,mediate_deleted) {
|
||||||
|
#include <abstractions/base>
|
||||||
|
|
||||||
|
# Capabilities
|
||||||
|
file,
|
||||||
|
signal (send) set=(kill,term,int,hup,cont),
|
||||||
|
|
||||||
|
# S6-Overlay
|
||||||
|
/init ix,
|
||||||
|
/bin/** ix,
|
||||||
|
/usr/bin/** ix,
|
||||||
|
/run/{s6,s6-rc*,service}/** ix,
|
||||||
|
/package/** ix,
|
||||||
|
/command/** ix,
|
||||||
|
/etc/services.d/** rwix,
|
||||||
|
/etc/cont-init.d/** rwix,
|
||||||
|
/etc/cont-finish.d/** rwix,
|
||||||
|
/run/{,**} rwk,
|
||||||
|
/dev/tty rw,
|
||||||
|
|
||||||
|
# Access to options.json and other files within your addon
|
||||||
|
/data/** rw,
|
||||||
|
|
||||||
|
profile /usr/bin/ldap-auth-server flags=(attach_disconnected,mediate_deleted) {
|
||||||
|
#include <abstractions/base>
|
||||||
|
|
||||||
|
# Receive signals from S6-Overlay
|
||||||
|
signal (receive) peer=*_ldap-auth-server,
|
||||||
|
|
||||||
|
# Access to options.json and other files within your addon
|
||||||
|
/data/** rw,
|
||||||
|
|
||||||
|
# Access required for service functionality
|
||||||
|
# Note: List was built by doing the following:
|
||||||
|
# 1. Add what is obviously needed based on what is in the script
|
||||||
|
# 2. Add `complain` as a flag to this profile temporarily and run the addon
|
||||||
|
# 3. Review the audit log with `journalctl _TRANSPORT="audit" -g 'apparmor="ALLOWED"'` and add other access as needed
|
||||||
|
# Remember to remove the `complain` flag when you are done
|
||||||
|
}
|
||||||
|
}
|
14
ldap-auth-server/build.yaml
Normal file
14
ldap-auth-server/build.yaml
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
# https://developers.home-assistant.io/docs/add-ons/configuration#add-on-dockerfile
|
||||||
|
build_from:
|
||||||
|
aarch64: "ghcr.io/home-assistant/aarch64-base:3.15"
|
||||||
|
amd64: "ghcr.io/home-assistant/amd64-base:3.15"
|
||||||
|
armhf: "ghcr.io/home-assistant/armhf-base:3.15"
|
||||||
|
armv7: "ghcr.io/home-assistant/armv7-base:3.15"
|
||||||
|
i386: "ghcr.io/home-assistant/i386-base:3.15"
|
||||||
|
labels:
|
||||||
|
org.opencontainers.image.title: "Home Assistant Add-on: LDAP Authentication Server add-on"
|
||||||
|
org.opencontainers.image.description: "Add-on to add LDAP authentication to Home Assistant."
|
||||||
|
org.opencontainers.image.source: "https://github.com/vqvu/home-assistant-addons/ldap-auth-server"
|
||||||
|
org.opencontainers.image.licenses: "Apache License 2.0"
|
||||||
|
args:
|
||||||
|
TEMPIO_VERSION: "2021.09.0"
|
32
ldap-auth-server/config.yaml
Normal file
32
ldap-auth-server/config.yaml
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
# https://developers.home-assistant.io/docs/add-ons/configuration#add-on-config
|
||||||
|
name: LDAP Authentication Server
|
||||||
|
version: "0.1.2"
|
||||||
|
slug: ldap-auth-server
|
||||||
|
description: Add-on to add LDAP authentication to Home Assistant.
|
||||||
|
url: "https://github.com/BlackDragon-B/ldap-auth-server"
|
||||||
|
arch:
|
||||||
|
- armhf
|
||||||
|
- armv7
|
||||||
|
- aarch64
|
||||||
|
- amd64
|
||||||
|
- i386
|
||||||
|
startup: services
|
||||||
|
init: false
|
||||||
|
map:
|
||||||
|
- share:rw
|
||||||
|
ports:
|
||||||
|
80/tcp: null
|
||||||
|
options:
|
||||||
|
ldap_server_url: null
|
||||||
|
bind_dn_template: null
|
||||||
|
bind_dn_password: null
|
||||||
|
search_base_dn: ""
|
||||||
|
search_filter_template: ""
|
||||||
|
debug_mode: false
|
||||||
|
schema:
|
||||||
|
ldap_server_url: str
|
||||||
|
bind_dn_template: str
|
||||||
|
bind_dn_password: str
|
||||||
|
search_base_dn: str?
|
||||||
|
search_filter_template: str?
|
||||||
|
debug_mode: bool
|
37
ldap-auth-server/go.mod
Normal file
37
ldap-auth-server/go.mod
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
module github.com/vqvu/home-assistant-addons/ldap-auth-server
|
||||||
|
|
||||||
|
go 1.19
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/gin-gonic/gin v1.9.0
|
||||||
|
github.com/go-ldap/ldap/v3 v3.4.4
|
||||||
|
github.com/sirupsen/logrus v1.9.0
|
||||||
|
)
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 // indirect
|
||||||
|
github.com/bytedance/sonic v1.8.2 // indirect
|
||||||
|
github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311 // indirect
|
||||||
|
github.com/gin-contrib/sse v0.1.0 // indirect
|
||||||
|
github.com/go-asn1-ber/asn1-ber v1.5.4 // indirect
|
||||||
|
github.com/go-playground/locales v0.14.1 // indirect
|
||||||
|
github.com/go-playground/universal-translator v0.18.1 // indirect
|
||||||
|
github.com/go-playground/validator/v10 v10.11.2 // indirect
|
||||||
|
github.com/goccy/go-json v0.10.0 // indirect
|
||||||
|
github.com/json-iterator/go v1.1.12 // indirect
|
||||||
|
github.com/klauspost/cpuid/v2 v2.2.4 // indirect
|
||||||
|
github.com/leodido/go-urn v1.2.1 // indirect
|
||||||
|
github.com/mattn/go-isatty v0.0.17 // indirect
|
||||||
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||||
|
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||||
|
github.com/pelletier/go-toml/v2 v2.0.6 // indirect
|
||||||
|
github.com/twitchyliquid64/golang-asm v0.15.1 // indirect
|
||||||
|
github.com/ugorji/go/codec v1.2.10 // indirect
|
||||||
|
golang.org/x/arch v0.2.0 // indirect
|
||||||
|
golang.org/x/crypto v0.6.0 // indirect
|
||||||
|
golang.org/x/net v0.7.0 // indirect
|
||||||
|
golang.org/x/sys v0.5.0 // indirect
|
||||||
|
golang.org/x/text v0.7.0 // indirect
|
||||||
|
google.golang.org/protobuf v1.28.1 // indirect
|
||||||
|
gopkg.in/yaml.v3 v3.0.1 // indirect
|
||||||
|
)
|
104
ldap-auth-server/go.sum
Normal file
104
ldap-auth-server/go.sum
Normal file
|
@ -0,0 +1,104 @@
|
||||||
|
github.com/Azure/go-ntlmssp v0.0.0-20220621081337-cb9428e4ac1e/go.mod h1:chxPXzSsl7ZWRAuOIE23GDNzjWuZquvFlgA8xmpunjU=
|
||||||
|
github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 h1:mFRzDkZVAjdal+s7s0MwaRv9igoPqLRdzOLzw/8Xvq8=
|
||||||
|
github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358/go.mod h1:chxPXzSsl7ZWRAuOIE23GDNzjWuZquvFlgA8xmpunjU=
|
||||||
|
github.com/bytedance/sonic v1.5.0/go.mod h1:ED5hyg4y6t3/9Ku1R6dU/4KyJ48DZ4jPhfY1O2AihPM=
|
||||||
|
github.com/bytedance/sonic v1.8.2 h1:Eq1oE3xWIBE3tj2ZtJFK1rDAx7+uA4bRytozVhXMHKY=
|
||||||
|
github.com/bytedance/sonic v1.8.2/go.mod h1:i736AoUSYt75HyZLoJW9ERYxcy6eaN6h4BZXU064P/U=
|
||||||
|
github.com/chenzhuoyu/base64x v0.0.0-20211019084208-fb5309c8db06/go.mod h1:DH46F32mSOjUmXrMHnKwZdA8wcEefY7UVqBKYGjpdQY=
|
||||||
|
github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311 h1:qSGYFH7+jGhDF8vLC+iwCD4WpbV1EBDSzWkJODFLams=
|
||||||
|
github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311/go.mod h1:b583jCggY9gE99b6G5LEC39OIiVsWj+R97kbl5odCEk=
|
||||||
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/gin-contrib/sse v0.1.0 h1:Y/yl/+YNO8GZSjAhjMsSuLt29uWRFHdHYUb5lYOV9qE=
|
||||||
|
github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI=
|
||||||
|
github.com/gin-gonic/gin v1.9.0 h1:OjyFBKICoexlu99ctXNR2gg+c5pKrKMuyjgARg9qeY8=
|
||||||
|
github.com/gin-gonic/gin v1.9.0/go.mod h1:W1Me9+hsUSyj3CePGrd1/QrKJMSJ1Tu/0hFEH89961k=
|
||||||
|
github.com/go-asn1-ber/asn1-ber v1.5.4 h1:vXT6d/FNDiELJnLb6hGNa309LMsrCoYFvpwHDF0+Y1A=
|
||||||
|
github.com/go-asn1-ber/asn1-ber v1.5.4/go.mod h1:hEBeB/ic+5LoWskz+yKT7vGhhPYkProFKoKdwZRWMe0=
|
||||||
|
github.com/go-ldap/ldap/v3 v3.4.4 h1:qPjipEpt+qDa6SI/h1fzuGWoRUY+qqQ9sOZq67/PYUs=
|
||||||
|
github.com/go-ldap/ldap/v3 v3.4.4/go.mod h1:fe1MsuN5eJJ1FeLT/LEBVdWfNWKh459R7aXgXtJC+aI=
|
||||||
|
github.com/go-playground/assert/v2 v2.2.0 h1:JvknZsQTYeFEAhQwI4qEt9cyV5ONwRHC+lYKSsYSR8s=
|
||||||
|
github.com/go-playground/locales v0.14.1 h1:EWaQ/wswjilfKLTECiXz7Rh+3BjFhfDFKv/oXslEjJA=
|
||||||
|
github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
|
||||||
|
github.com/go-playground/universal-translator v0.18.1 h1:Bcnm0ZwsGyWbCzImXv+pAJnYK9S473LQFuzCbDbfSFY=
|
||||||
|
github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
|
||||||
|
github.com/go-playground/validator/v10 v10.11.2 h1:q3SHpufmypg+erIExEKUmsgmhDTyhcJ38oeKGACXohU=
|
||||||
|
github.com/go-playground/validator/v10 v10.11.2/go.mod h1:NieE624vt4SCTJtD87arVLvdmjPAeV8BQlHtMnw9D7s=
|
||||||
|
github.com/goccy/go-json v0.10.0 h1:mXKd9Qw4NuzShiRlOXKews24ufknHO7gx30lsDyokKA=
|
||||||
|
github.com/goccy/go-json v0.10.0/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
|
||||||
|
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
|
||||||
|
github.com/google/go-cmp v0.5.5 h1:Khx7svrCpmxxtHBq5j2mp/xVjsi8hQMfNLvJFAlrGgU=
|
||||||
|
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
|
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
|
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
||||||
|
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
|
||||||
|
github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
|
||||||
|
github.com/klauspost/cpuid/v2 v2.2.4 h1:acbojRNwl3o09bUq+yDCtZFc1aiwaAAxtcn8YkZXnvk=
|
||||||
|
github.com/klauspost/cpuid/v2 v2.2.4/go.mod h1:RVVoqg1df56z8g3pUjL/3lE5UfnlrJX8tyFgg4nqhuY=
|
||||||
|
github.com/kr/pretty v0.3.0 h1:WgNl7dwNpEZ6jJ9k1snq4pZsg7DOEN8hP9Xw0Tsjwk0=
|
||||||
|
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
||||||
|
github.com/leodido/go-urn v1.2.1 h1:BqpAaACuzVSgi/VLzGZIobT2z4v53pjosyNd9Yv6n/w=
|
||||||
|
github.com/leodido/go-urn v1.2.1/go.mod h1:zt4jvISO2HfUBqxjfIshjdMTYS56ZS/qv49ictyFfxY=
|
||||||
|
github.com/mattn/go-isatty v0.0.17 h1:BTarxUcIeDqL27Mc+vyvdWYSL28zpIhv3RoTdsLMPng=
|
||||||
|
github.com/mattn/go-isatty v0.0.17/go.mod h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM=
|
||||||
|
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
||||||
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
|
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
||||||
|
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
||||||
|
github.com/pelletier/go-toml/v2 v2.0.6 h1:nrzqCb7j9cDFj2coyLNLaZuJTLjWjlaz6nvTvIwycIU=
|
||||||
|
github.com/pelletier/go-toml/v2 v2.0.6/go.mod h1:eumQOmlWiOPt5WriQQqoM5y18pDHwha2N+QD+EUNTek=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/rogpeppe/go-internal v1.8.0 h1:FCbCCtXNOY3UtUuHUYaghJg4y7Fd14rXifAYUAtL9R8=
|
||||||
|
github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0=
|
||||||
|
github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
|
||||||
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
|
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
|
||||||
|
github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
|
||||||
|
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||||
|
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
|
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
|
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
|
github.com/stretchr/testify v1.7.2/go.mod h1:R6va5+xMeoiuVRoj+gSkQ7d3FALtqAAGI1FQKckRals=
|
||||||
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
|
github.com/stretchr/testify v1.8.1 h1:w7B6lhMri9wdJUVmEZPGGhZzrYTPvgJArz7wNPgYKsk=
|
||||||
|
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
||||||
|
github.com/twitchyliquid64/golang-asm v0.15.1 h1:SU5vSMR7hnwNxj24w34ZyCi/FmDZTkS4MhqMhdFk5YI=
|
||||||
|
github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
|
||||||
|
github.com/ugorji/go/codec v1.2.10 h1:eimT6Lsr+2lzmSZxPhLFoOWFmQqwk0fllJJ5hEbTXtQ=
|
||||||
|
github.com/ugorji/go/codec v1.2.10/go.mod h1:UNopzCgEMSXjBc6AOMqYvWC1ktqTAfzJZUZgYf6w6lg=
|
||||||
|
golang.org/x/arch v0.0.0-20210923205945-b76863e36670/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
|
||||||
|
golang.org/x/arch v0.2.0 h1:W1sUEHXiJTfjaFJ5SLo0N6lZn+0eO5gWD1MFeTGqQEY=
|
||||||
|
golang.org/x/arch v0.2.0/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
|
||||||
|
golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
|
||||||
|
golang.org/x/crypto v0.6.0 h1:qfktjS5LUO+fFKeJXZ+ikTRijMmljikvG68fpMMruSc=
|
||||||
|
golang.org/x/crypto v0.6.0/go.mod h1:OFC/31mSvZgRz0V1QTNCzfAI1aIRzbiufJtkMIlEp58=
|
||||||
|
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
|
golang.org/x/net v0.7.0 h1:rJrUqqhjsgNp7KqAIc25s9pZnjU7TUcSY7HcVZjdn1g=
|
||||||
|
golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
||||||
|
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220704084225-05e143d24a9e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.5.0 h1:MUK/U/4lj1t1oPg0HfuXDN/Z1wv31ZJ/YcPiGccS4DU=
|
||||||
|
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
|
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
|
golang.org/x/text v0.7.0 h1:4BRB4x83lYWy72KwLD/qYDuTu7q9PjSagHvijDw7cLo=
|
||||||
|
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
||||||
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
|
||||||
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
|
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
|
||||||
|
google.golang.org/protobuf v1.28.1 h1:d0NfwRgPtno5B1Wa6L2DAG+KivqkdutMf1UhdNx175w=
|
||||||
|
google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
|
||||||
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
||||||
|
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
|
rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
|
16
ldap-auth-server/ldap_auth_command.sh
Normal file
16
ldap-auth-server/ldap_auth_command.sh
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
#!/bin/bash
|
||||||
|
set -o errexit
|
||||||
|
set -o pipefail
|
||||||
|
set -o nounset
|
||||||
|
|
||||||
|
HOST="${1:-localhost:8080}"
|
||||||
|
ESCAPED_USERNAME="$(jq --raw-input <<< "${username}")"
|
||||||
|
ESCAPED_PASSWORD="$(jq --raw-input <<< "${password}")"
|
||||||
|
curl http://${HOST}/hass_authenticate \
|
||||||
|
-X POST \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
--fail-with-body \
|
||||||
|
-d "$(cat << EOF
|
||||||
|
{"username": ${ESCAPED_USERNAME},"password": ${ESCAPED_PASSWORD}}
|
||||||
|
EOF
|
||||||
|
)"
|
265
ldap-auth-server/main.go
Normal file
265
ldap-auth-server/main.go
Normal file
|
@ -0,0 +1,265 @@
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
ldap "github.com/go-ldap/ldap/v3"
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
var configFile = flag.String("config", "/data/options.json", "The path to the server's config file")
|
||||||
|
|
||||||
|
// LDAPOptions holds the opotions for an `LDAPAuthenticator`.
|
||||||
|
type LDAPOptions struct {
|
||||||
|
ServerURL string
|
||||||
|
BindDNTemplate string
|
||||||
|
BindDNPassword string
|
||||||
|
SearchBaseDN string
|
||||||
|
SearchFilterTemplate string
|
||||||
|
}
|
||||||
|
|
||||||
|
// LDAPUser holds metadata about a user from an LDAP server.
|
||||||
|
type LDAPUser struct {
|
||||||
|
DisplayName string
|
||||||
|
}
|
||||||
|
|
||||||
|
// LDAPAuthenticator is a client for authenticating users against an LDAP server.
|
||||||
|
type LDAPAuthenticator struct {
|
||||||
|
Options LDAPOptions
|
||||||
|
}
|
||||||
|
|
||||||
|
// Authenticate authenticates a user given their username and password.
|
||||||
|
//
|
||||||
|
// If authentication is successful, it also returns metadata about the
|
||||||
|
// authenticated user.
|
||||||
|
func (a *LDAPAuthenticator) Authenticate(username, password string) (bool, LDAPUser, error) {
|
||||||
|
if password == "" {
|
||||||
|
return false, LDAPUser{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
conn, err := ldap.DialURL(a.Options.ServerURL)
|
||||||
|
if err != nil {
|
||||||
|
return false, LDAPUser{}, fmt.Errorf("could not dial server at %q: %w", a.Options.ServerURL, err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
bindDN := a.Options.BindDNTemplate
|
||||||
|
log.Debugf("Binding to DN: %q", bindDN)
|
||||||
|
if err := conn.Bind(a.Options.BindDNTemplate, a.Options.BindDNPassword); err != nil {
|
||||||
|
log.Debugf("Could not bind to user %q: %q with password %q", bindDN, err, a.Options.BindDNPassword)
|
||||||
|
return false, LDAPUser{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
searchFilter := fmt.Sprintf(a.Options.SearchFilterTemplate, username)
|
||||||
|
log.Debugf("Searching with filter: %q", searchFilter)
|
||||||
|
res, err := conn.Search(ldap.NewSearchRequest(
|
||||||
|
a.Options.SearchBaseDN,
|
||||||
|
ldap.ScopeWholeSubtree,
|
||||||
|
ldap.NeverDerefAliases,
|
||||||
|
/* SizeLimit= */ 2,
|
||||||
|
/* TimeLimit= */ 1,
|
||||||
|
/* TypesOnly= */ false,
|
||||||
|
searchFilter,
|
||||||
|
/* Attribuutes= */ nil,
|
||||||
|
/* Controls= */ nil,
|
||||||
|
))
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("Search failed: %v", err)
|
||||||
|
return false, LDAPUser{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(res.Entries) == 0 {
|
||||||
|
log.Debugf("No matches found for filter: %q", searchFilter)
|
||||||
|
return false, LDAPUser{}, nil
|
||||||
|
}
|
||||||
|
if len(res.Entries) > 1 {
|
||||||
|
log.Debugf("More than one (%d) matches found for filter: %q", len(res.Entries), searchFilter)
|
||||||
|
return false, LDAPUser{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
entry := res.Entries[0]
|
||||||
|
if log.IsLevelEnabled(log.DebugLevel) {
|
||||||
|
var entryStr strings.Builder
|
||||||
|
fmt.Fprintf(&entryStr, "DN: %q\n", entry.DN)
|
||||||
|
for _, attr := range entry.Attributes {
|
||||||
|
fmt.Fprintf(&entryStr, "%s: %q\n", attr.Name, attr.Values)
|
||||||
|
}
|
||||||
|
log.Debugf("User entry:\n%v", entryStr.String())
|
||||||
|
}
|
||||||
|
return true, LDAPUser{
|
||||||
|
DisplayName: entry.GetAttributeValue("cn"),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var ErrUserAuthnFailed = errors.New("could not authenticate user")
|
||||||
|
|
||||||
|
type ServerOptions struct {
|
||||||
|
LDAPOptions LDAPOptions
|
||||||
|
}
|
||||||
|
|
||||||
|
type HASSAuthenticateRequest struct {
|
||||||
|
Username string `json:"username" binding:"required"`
|
||||||
|
Password string `json:"password" binding:"required"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ErrorResponse struct {
|
||||||
|
StatusCode int
|
||||||
|
PublicError string
|
||||||
|
Error error
|
||||||
|
}
|
||||||
|
|
||||||
|
type Server struct {
|
||||||
|
options ServerOptions
|
||||||
|
authenticator LDAPAuthenticator
|
||||||
|
router *gin.Engine
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewServer creates a new Server.
|
||||||
|
func NewServer(options ServerOptions) *Server {
|
||||||
|
server := &Server{
|
||||||
|
options: options,
|
||||||
|
authenticator: LDAPAuthenticator{
|
||||||
|
Options: options.LDAPOptions,
|
||||||
|
},
|
||||||
|
router: gin.Default(),
|
||||||
|
}
|
||||||
|
if err := server.router.SetTrustedProxies(nil); err != nil {
|
||||||
|
panic("Not possible")
|
||||||
|
}
|
||||||
|
server.router.POST("/hass_authenticate", server.hassAuthenticate)
|
||||||
|
return server
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) writeError(c *gin.Context, err ErrorResponse) {
|
||||||
|
if err.StatusCode >= 400 && err.StatusCode < 500 {
|
||||||
|
log.Infof(err.Error.Error())
|
||||||
|
} else {
|
||||||
|
log.Warnf(err.Error.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
if gin.Mode() == gin.DebugMode {
|
||||||
|
c.JSON(err.StatusCode, gin.H{"error": err.Error.Error()})
|
||||||
|
} else {
|
||||||
|
c.JSON(err.StatusCode, gin.H{"error": err.PublicError})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) hassAuthenticate(c *gin.Context) {
|
||||||
|
var req HASSAuthenticateRequest
|
||||||
|
if err := c.BindJSON(&req); err != nil {
|
||||||
|
s.writeError(c, ErrorResponse{
|
||||||
|
StatusCode: http.StatusBadRequest,
|
||||||
|
PublicError: err.Error(),
|
||||||
|
Error: err,
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
ok, user, err := s.authenticator.Authenticate(req.Username, req.Password)
|
||||||
|
if err != nil {
|
||||||
|
s.writeError(c, ErrorResponse{
|
||||||
|
StatusCode: http.StatusBadRequest,
|
||||||
|
PublicError: fmt.Sprintf("Could not authenticate user %q", req.Username),
|
||||||
|
Error: fmt.Errorf("when authenticating: %w", err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if !ok {
|
||||||
|
s.writeError(c, ErrorResponse{
|
||||||
|
StatusCode: http.StatusBadRequest,
|
||||||
|
PublicError: fmt.Sprintf("Could not authenticate user: %q", req.Username),
|
||||||
|
Error: fmt.Errorf("when authenticating %q: %w", req.Username, ErrUserAuthnFailed),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if user.DisplayName != "" {
|
||||||
|
safeDN := strings.ReplaceAll(user.DisplayName, "\n", "")
|
||||||
|
fmt.Fprintf(c.Writer, "name = %v", safeDN)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Serve starts the server listening to requests.
|
||||||
|
func (s *Server) Serve() error {
|
||||||
|
addr := ":80"
|
||||||
|
log.Infof("Starting server at: %q", addr)
|
||||||
|
return s.router.Run(addr)
|
||||||
|
}
|
||||||
|
|
||||||
|
// AddOnConfig is the struct representing the add-on's configuration.
|
||||||
|
type AddOnConfig struct {
|
||||||
|
LDAPServerURL string `json:"ldap_server_url"`
|
||||||
|
BindDNTemplate string `json:"bind_dn_template"`
|
||||||
|
BindDNPassword string `json:"bind_dn_password"`
|
||||||
|
SearchBaseDN string `json:"search_base_dn"`
|
||||||
|
SearchFilterTemplate string `json:"search_filter_template"`
|
||||||
|
DebugMode bool `json:"debug_mode"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// parseAddOnConfig parses the `AddOnConfig` from a JSON file.
|
||||||
|
func parseAddOnConfig(configFile string) (AddOnConfig, error) {
|
||||||
|
jsonBytes, err := os.ReadFile(configFile)
|
||||||
|
if err != nil {
|
||||||
|
return AddOnConfig{}, fmt.Errorf("could not read config file: %q: %w", configFile, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var config AddOnConfig
|
||||||
|
err = json.Unmarshal(jsonBytes, &config)
|
||||||
|
if err != nil {
|
||||||
|
return AddOnConfig{}, fmt.Errorf("could not parse config file: %q: %w", configFile, err)
|
||||||
|
}
|
||||||
|
return config, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var ErrInvalidServerOptions = errors.New("invalid server options")
|
||||||
|
|
||||||
|
func toServerOptions(config AddOnConfig) (ServerOptions, error) {
|
||||||
|
if (config.SearchBaseDN == "") != (config.SearchFilterTemplate == "") {
|
||||||
|
return ServerOptions{}, fmt.Errorf("search_base_dn (%q) and search_filter (%q) must both be set or both be unset: %w", config.SearchBaseDN, config.SearchFilterTemplate, ErrInvalidServerOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Loaded config: %+v", config)
|
||||||
|
return ServerOptions{
|
||||||
|
LDAPOptions: LDAPOptions{
|
||||||
|
ServerURL: config.LDAPServerURL,
|
||||||
|
BindDNTemplate: config.BindDNTemplate,
|
||||||
|
SearchBaseDN: config.SearchBaseDN,
|
||||||
|
SearchFilterTemplate: config.SearchFilterTemplate,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
log.SetReportCaller(true)
|
||||||
|
log.SetLevel(log.InfoLevel)
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
config, err := parseAddOnConfig(*configFile)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Invalid config: %v", err)
|
||||||
|
}
|
||||||
|
if config.DebugMode {
|
||||||
|
gin.SetMode(gin.DebugMode)
|
||||||
|
log.SetLevel(log.DebugLevel)
|
||||||
|
} else {
|
||||||
|
gin.SetMode(gin.ReleaseMode)
|
||||||
|
}
|
||||||
|
|
||||||
|
options, err := toServerOptions(config)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Invalid config: %v", err)
|
||||||
|
}
|
||||||
|
server := NewServer(options)
|
||||||
|
if err := server.Serve(); err != nil {
|
||||||
|
log.Fatalf("Error while serving: %v", err)
|
||||||
|
}
|
||||||
|
log.Info("Server terminated.")
|
||||||
|
}
|
39
ldap-auth-server/translations/en.yaml
Normal file
39
ldap-auth-server/translations/en.yaml
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
configuration:
|
||||||
|
ldap_server_url:
|
||||||
|
name: LDAP Server URL
|
||||||
|
description: |
|
||||||
|
The URL of the server to connect to. Prefix with ldap:// or ldaps://.
|
||||||
|
|
||||||
|
Example: ldaps://ldap.example.com:636
|
||||||
|
bind_dn_template:
|
||||||
|
name: Bind DN Template
|
||||||
|
description: |
|
||||||
|
The template for the DN of the user. The first instance of `%s` will be replaced
|
||||||
|
with the username.
|
||||||
|
|
||||||
|
Example: cn=%s,ou=people,dc=example,dc=com
|
||||||
|
bind_dn_password:
|
||||||
|
name: Bind DN Password
|
||||||
|
description: |
|
||||||
|
Password to use for Bind DN
|
||||||
|
search_base_dn:
|
||||||
|
name: Search Base DN
|
||||||
|
description: |
|
||||||
|
The base DN for user searches. Only necessary when using a search filter.
|
||||||
|
|
||||||
|
Example: ou=people,dc=example,dc=com
|
||||||
|
search_filter_template:
|
||||||
|
name: Search Filter Template
|
||||||
|
description: |
|
||||||
|
The template for the search filter to apply when searching for users. The first
|
||||||
|
`%s` will be replaced with the username. This option can be used to only allow
|
||||||
|
members of specific groups.
|
||||||
|
|
||||||
|
Example: (&(uid=%s)(memberof=cn=home_assistant,ou=groups,dc=example,dc=com))
|
||||||
|
debug_mode:
|
||||||
|
name: Debug Mode
|
||||||
|
description: |
|
||||||
|
Run the server in debug mode.
|
||||||
|
|
||||||
|
network:
|
||||||
|
80/tcp: "The server's port. Generally not necessary, but it can be mapped for debugging."
|
Loading…
Reference in a new issue