mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-04 21:47:40 +03:00
Improve auth. provider interface
The authentication provider can now provide multiple authorization identities associated with credentials. Protocols that support that (e.g. JMAP, SASL) can let the client select the wanted identity.
This commit is contained in:
parent
8f1d57293c
commit
a45c7090c4
11 changed files with 72 additions and 65 deletions
7
internal/auth/external/externalauth.go
vendored
7
internal/auth/external/externalauth.go
vendored
|
@ -71,13 +71,14 @@ func (ea *ExternalAuth) Init(cfg *config.Map) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ea *ExternalAuth) CheckPlain(username, password string) bool {
|
func (ea *ExternalAuth) AuthPlain(username, password string) ([]string, error) {
|
||||||
accountName, ok := auth.CheckDomainAuth(username, ea.perDomain, ea.domains)
|
accountName, ok := auth.CheckDomainAuth(username, ea.perDomain, ea.domains)
|
||||||
if !ok {
|
if !ok {
|
||||||
return false
|
return nil, module.ErrUnknownCredentials
|
||||||
}
|
}
|
||||||
|
|
||||||
return AuthUsingHelper(ea.Log, ea.helperPath, accountName, password)
|
// TODO: Extend process protocol to support multiple authorization identities.
|
||||||
|
return []string{username}, AuthUsingHelper(ea.helperPath, accountName, password)
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
30
internal/auth/external/helperauth.go
vendored
30
internal/auth/external/helperauth.go
vendored
|
@ -1,44 +1,38 @@
|
||||||
package external
|
package external
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/foxcpp/maddy/internal/log"
|
"github.com/foxcpp/maddy/internal/module"
|
||||||
)
|
)
|
||||||
|
|
||||||
func AuthUsingHelper(l log.Logger, binaryPath, accountName, password string) bool {
|
func AuthUsingHelper(binaryPath, accountName, password string) error {
|
||||||
cmd := exec.Command(binaryPath)
|
cmd := exec.Command(binaryPath)
|
||||||
stdin, err := cmd.StdinPipe()
|
stdin, err := cmd.StdinPipe()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
l.Println("failed to obtain stdin pipe for helper process:", err)
|
return fmt.Errorf("helperauth: stdin init: %w", err)
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
if err := cmd.Start(); err != nil {
|
if err := cmd.Start(); err != nil {
|
||||||
l.Println("failed to start helper process:", err)
|
return fmt.Errorf("helperauth: process start: %w", err)
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
if _, err := io.WriteString(stdin, accountName+"\n"); err != nil {
|
if _, err := io.WriteString(stdin, accountName+"\n"); err != nil {
|
||||||
l.Println("failed to write stdin of helper process:", err)
|
return fmt.Errorf("helperauth: stdin write: %w", err)
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
if _, err := io.WriteString(stdin, password+"\n"); err != nil {
|
if _, err := io.WriteString(stdin, password+"\n"); err != nil {
|
||||||
l.Println("failed to write stdin of helper process:", err)
|
return fmt.Errorf("helperauth: stdin write: %w", err)
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
if err := cmd.Wait(); err != nil {
|
if err := cmd.Wait(); err != nil {
|
||||||
l.Debugln(err)
|
|
||||||
if exitErr, ok := err.(*exec.ExitError); ok {
|
if exitErr, ok := err.(*exec.ExitError); ok {
|
||||||
// Exit code 1 is for authentication failure.
|
// Exit code 1 is for authentication failure.
|
||||||
// Exit code 2 is for other errors.
|
if exitErr.ExitCode() != 1 {
|
||||||
if exitErr.ExitCode() == 2 {
|
return fmt.Errorf("helperauth: %w: %v", err, string(exitErr.Stderr))
|
||||||
l.Println(strings.TrimSpace(string(exitErr.Stderr)))
|
|
||||||
}
|
}
|
||||||
|
return module.ErrUnknownCredentials
|
||||||
} else {
|
} else {
|
||||||
l.Println("failed to wait for helper process:", err)
|
return fmt.Errorf("helperauth: process wait: %w", err)
|
||||||
}
|
}
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
return true
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,29 +61,28 @@ func (a *Auth) Init(cfg *config.Map) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *Auth) CheckPlain(username, password string) bool {
|
func (a *Auth) AuthPlain(username, password string) ([]string, error) {
|
||||||
var accountName string
|
var accountName string
|
||||||
if a.expectAddress {
|
if a.expectAddress {
|
||||||
var err error
|
var err error
|
||||||
accountName, _, err = address.Split(username)
|
accountName, _, err = address.Split(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return nil, err
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
accountName = username
|
accountName = username
|
||||||
}
|
}
|
||||||
|
|
||||||
if a.useHelper {
|
if a.useHelper {
|
||||||
return external.AuthUsingHelper(a.Log, a.helperPath, accountName, password)
|
if err := external.AuthUsingHelper(a.helperPath, accountName, password); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
err := runPAMAuth(accountName, password)
|
err := runPAMAuth(accountName, password)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if err == ErrInvalidCredentials {
|
return nil, err
|
||||||
a.Log.Println(err)
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
return true
|
return []string{username}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
|
@ -67,43 +67,37 @@ func (a *Auth) Init(cfg *config.Map) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *Auth) CheckPlain(username, password string) bool {
|
func (a *Auth) AuthPlain(username, password string) ([]string, error) {
|
||||||
accountName, _, err := address.Split(username)
|
accountName, _, err := address.Split(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if a.useHelper {
|
if a.useHelper {
|
||||||
return external.AuthUsingHelper(a.Log, a.helperPath, accountName, password)
|
return []string{username}, external.AuthUsingHelper(a.helperPath, accountName, password)
|
||||||
}
|
}
|
||||||
|
|
||||||
ent, err := Lookup(accountName)
|
ent, err := Lookup(accountName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if err != ErrNoSuchUser {
|
return nil, err
|
||||||
a.Log.Error("lookup error", err, "username", username)
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if !ent.IsAccountValid() {
|
if !ent.IsAccountValid() {
|
||||||
a.Log.Msg("account is expired", "username", username)
|
return nil, fmt.Errorf("shadow: account is expired")
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if !ent.IsPasswordValid() {
|
if !ent.IsPasswordValid() {
|
||||||
a.Log.Msg("password is expired", "username", username)
|
return nil, fmt.Errorf("shadow: password is expired")
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := ent.VerifyPassword(password); err != nil {
|
if err := ent.VerifyPassword(password); err != nil {
|
||||||
if err != ErrWrongPassword {
|
if err == ErrWrongPassword {
|
||||||
a.Log.Printf("%v", err)
|
return nil, module.ErrUnknownCredentials
|
||||||
}
|
}
|
||||||
a.Log.Msg("password verification failed", "username", username)
|
return nil, err
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return true
|
return []string{username}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
|
@ -6,7 +6,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func AuthDirective(m *config.Map, node *config.Node) (interface{}, error) {
|
func AuthDirective(m *config.Map, node *config.Node) (interface{}, error) {
|
||||||
var provider module.AuthProvider
|
var provider module.PlainAuth
|
||||||
if err := ModuleFromNode(node.Args, node, m.Globals, &provider); err != nil {
|
if err := ModuleFromNode(node.Args, node, m.Globals, &provider); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
@ -32,7 +32,7 @@ type Endpoint struct {
|
||||||
addrs []string
|
addrs []string
|
||||||
serv *imapserver.Server
|
serv *imapserver.Server
|
||||||
listeners []net.Listener
|
listeners []net.Listener
|
||||||
Auth module.AuthProvider
|
Auth module.PlainAuth
|
||||||
Store module.Storage
|
Store module.Storage
|
||||||
|
|
||||||
updater imapbackend.BackendUpdater
|
updater imapbackend.BackendUpdater
|
||||||
|
@ -184,11 +184,14 @@ func (endp *Endpoint) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (endp *Endpoint) Login(connInfo *imap.ConnInfo, username, password string) (imapbackend.User, error) {
|
func (endp *Endpoint) Login(connInfo *imap.ConnInfo, username, password string) (imapbackend.User, error) {
|
||||||
if !endp.Auth.CheckPlain(username, password) {
|
_, err := endp.Auth.AuthPlain(username, password)
|
||||||
endp.Log.Msg("authentication failed", "username", username, "src_ip", connInfo.RemoteAddr)
|
if err != nil {
|
||||||
|
endp.Log.Error("authentication failed", err, "username", username, "src_ip", connInfo.RemoteAddr)
|
||||||
return nil, imapbackend.ErrInvalidCredentials
|
return nil, imapbackend.ErrInvalidCredentials
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: Wrap GetOrCreateUser and possibly implement INBOXES extension
|
||||||
|
// (though it is draft 00 for quite some time so it likely has no future).
|
||||||
return endp.Store.GetOrCreateUser(username)
|
return endp.Store.GetOrCreateUser(username)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -519,7 +519,7 @@ func (endp *Endpoint) wrapErr(msgId string, mangleUTF8 bool, err error) error {
|
||||||
|
|
||||||
type Endpoint struct {
|
type Endpoint struct {
|
||||||
hostname string
|
hostname string
|
||||||
Auth module.AuthProvider
|
Auth module.PlainAuth
|
||||||
serv *smtp.Server
|
serv *smtp.Server
|
||||||
name string
|
name string
|
||||||
addrs []string
|
addrs []string
|
||||||
|
@ -803,11 +803,14 @@ func (endp *Endpoint) Login(state *smtp.ConnectionState, username, password stri
|
||||||
return nil, endp.wrapErr("", true, err)
|
return nil, endp.wrapErr("", true, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if !endp.Auth.CheckPlain(username, password) {
|
_, err := endp.Auth.AuthPlain(username, password)
|
||||||
endp.Log.Msg("authentication failed", "username", username, "src_ip", state.RemoteAddr)
|
if err != nil {
|
||||||
|
// TODO: Update fail2ban filters.
|
||||||
|
endp.Log.Error("authentication failed", err, "username", username, "src_ip", state.RemoteAddr)
|
||||||
return nil, errors.New("Invalid credentials")
|
return nil, errors.New("Invalid credentials")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: Pass valid identifies to SMTP pipeline.
|
||||||
return endp.newSession(false, username, password, state), nil
|
return endp.newSession(false, username, password, state), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -27,7 +27,7 @@ const testMsg = "From: <sender@example.org>\r\n" +
|
||||||
"\r\n" +
|
"\r\n" +
|
||||||
"foobar\r\n"
|
"foobar\r\n"
|
||||||
|
|
||||||
func testEndpoint(t *testing.T, modName string, auth module.AuthProvider, tgt module.DeliveryTarget, checks []module.Check, cfg []config.Node) *Endpoint {
|
func testEndpoint(t *testing.T, modName string, auth module.PlainAuth, tgt module.DeliveryTarget, checks []module.Check, cfg []config.Node) *Endpoint {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
|
|
||||||
mod, err := New(modName, []string{"tcp://127.0.0.1:" + testPort})
|
mod, err := New(modName, []string{"tcp://127.0.0.1:" + testPort})
|
||||||
|
|
|
@ -1,7 +1,16 @@
|
||||||
package module
|
package module
|
||||||
|
|
||||||
// AuthProvider is the interface implemented by modules providing authentication using
|
import "errors"
|
||||||
|
|
||||||
|
var (
|
||||||
|
// ErrUnknownCredentials should be returned by auth. provider if supplied
|
||||||
|
// credentials are valid for it but are not recognized (e.g. not found in
|
||||||
|
// used DB).
|
||||||
|
ErrUnknownCredentials = errors.New("unknown credentials")
|
||||||
|
)
|
||||||
|
|
||||||
|
// PlainAuth is the interface implemented by modules providing authentication using
|
||||||
// username:password pairs.
|
// username:password pairs.
|
||||||
type AuthProvider interface {
|
type PlainAuth interface {
|
||||||
CheckPlain(username, password string) bool
|
AuthPlain(username, password string) ([]string, error)
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,15 +8,15 @@ import (
|
||||||
"github.com/foxcpp/maddy/internal/config"
|
"github.com/foxcpp/maddy/internal/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Dummy is a struct that implements AuthProvider and DeliveryTarget
|
// Dummy is a struct that implements PlainAuth and DeliveryTarget
|
||||||
// interfaces but does nothing. Useful for testing.
|
// interfaces but does nothing. Useful for testing.
|
||||||
//
|
//
|
||||||
// It is always registered under the 'dummy' name and can be used in both tests
|
// It is always registered under the 'dummy' name and can be used in both tests
|
||||||
// and the actual server code (but the latter is kinda pointless).
|
// and the actual server code (but the latter is kinda pointless).
|
||||||
type Dummy struct{ instName string }
|
type Dummy struct{ instName string }
|
||||||
|
|
||||||
func (d *Dummy) CheckPlain(_, _ string) bool {
|
func (d *Dummy) AuthPlain(username, _ string) ([]string, error) {
|
||||||
return true
|
return []string{username}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Dummy) Name() string {
|
func (d *Dummy) Name() string {
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
//
|
//
|
||||||
// Interfaces implemented:
|
// Interfaces implemented:
|
||||||
// - module.StorageBackend
|
// - module.StorageBackend
|
||||||
// - module.AuthProvider
|
// - module.PlainAuth
|
||||||
// - module.DeliveryTarget
|
// - module.DeliveryTarget
|
||||||
package sql
|
package sql
|
||||||
|
|
||||||
|
@ -420,21 +420,25 @@ func prepareUsername(username string) (string, error) {
|
||||||
return mbox + "@" + domain, nil
|
return mbox + "@" + domain, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (store *Storage) CheckPlain(username, password string) bool {
|
func (store *Storage) AuthPlain(username, password string) ([]string, error) {
|
||||||
// TODO: Pass session context there.
|
// TODO: Pass session context there.
|
||||||
defer trace.StartRegion(context.Background(), "sql/CheckPlain").End()
|
defer trace.StartRegion(context.Background(), "sql/AuthPlain").End()
|
||||||
|
|
||||||
accountName, err := prepareUsername(username)
|
accountName, err := prepareUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
password, err = precis.OpaqueString.CompareKey(password)
|
password, err = precis.OpaqueString.CompareKey(password)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return store.Back.CheckPlain(accountName, password)
|
// TODO: Make go-imap-sql CheckPlain return an actual error.
|
||||||
|
if !store.Back.CheckPlain(accountName, password) {
|
||||||
|
return nil, module.ErrUnknownCredentials
|
||||||
|
}
|
||||||
|
return []string{username}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (store *Storage) GetOrCreateUser(username string) (backend.User, error) {
|
func (store *Storage) GetOrCreateUser(username string) (backend.User, error) {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue