This repository has been archived on 2024-03-03. You can view files and clone it, but cannot push or open issues or pull requests.
adlin/pkg/login-validator/cmd/main.go

131 lines
3.6 KiB
Go
Raw Normal View History

2018-02-08 21:27:30 +00:00
package main
import (
2019-02-24 02:27:38 +00:00
"context"
2018-02-08 21:27:30 +00:00
"flag"
2019-02-24 02:27:38 +00:00
"fmt"
2018-02-08 21:27:30 +00:00
"log"
"net/http"
"net/url"
2019-02-24 02:27:38 +00:00
"os"
"os/signal"
2018-02-08 21:27:30 +00:00
"path/filepath"
2019-02-24 02:27:38 +00:00
"syscall"
2018-02-08 21:27:30 +00:00
)
2018-02-12 10:39:44 +00:00
var tftpDir string
2018-02-08 21:27:30 +00:00
func main() {
2018-02-09 15:26:15 +00:00
var studentsFile string
2022-02-19 10:52:09 +00:00
if v, exists := os.LookupEnv("ADLIN_SHARED_SECRET"); exists {
loginSalt = v
}
flag.BoolVar(&justLogin, "just-login", justLogin, "Don't perform MAC assignation and remote registration")
2018-02-08 21:27:30 +00:00
var bind = flag.String("bind", ":8081", "Bind port/socket")
2018-02-09 15:26:15 +00:00
flag.StringVar(&studentsFile, "students", "./students.csv", "Path to a CSV file containing students list")
2018-02-08 21:27:30 +00:00
flag.StringVar(&ARPTable, "arp", ARPTable, "Path to ARP table")
2018-02-12 10:39:44 +00:00
flag.StringVar(&tftpDir, "tftpdir", "/var/tftp/", "Path to TFTPd directory")
2022-02-19 10:52:09 +00:00
flag.StringVar(&loginSalt, "loginsalt", loginSalt, "secret used in login HMAC")
2018-02-18 13:41:06 +00:00
2021-02-04 17:37:22 +00:00
var auth = flag.String("auth", "none", "Auth method: none, fwd, ldap, krb5")
var fwdURI = flag.String("fwduri", "https://srs.epita.fr:443/", "URI to forward auth requests")
2020-02-20 23:18:56 +00:00
2021-02-04 17:37:22 +00:00
var krb5Realm = flag.String("krb5realm", "CRI.EPITA.FR", "Kerberos Realm")
2020-02-20 23:18:56 +00:00
var ldapAddr = flag.String("ldaphost", "auth.cri.epita.fr", "LDAP host")
var ldapPort = flag.Int("ldapport", 636, "LDAP port")
var ldaptls = flag.Bool("ldaptls", false, "Is LDAP connection LDAPS?")
var ldapbase = flag.String("ldapbase", "dc=epita,dc=net", "LDAP base")
var ldapbindusername = flag.String("ldapbindusername", "", "LDAP user to use in order to perform bind (optional if search can be made anonymously)")
var ldapbindpassword = flag.String("ldapbindpassword", "", "Password for the bind user")
2018-02-08 21:27:30 +00:00
flag.Parse()
var err error
// Sanitize options
log.Println("Checking paths...")
2018-02-12 10:39:44 +00:00
if tftpDir, err = filepath.Abs(tftpDir); err != nil {
2018-02-08 21:27:30 +00:00
log.Fatal(err)
}
2020-02-20 23:18:56 +00:00
var lc loginChecker
if auth != nil && *auth == "ldap" {
log.Printf("Auth method: LDAP(%s@%s:%d?%s)", *ldapbindusername, *ldapAddr, *ldapPort, *ldapbase)
lc.authMethod = LDAPAuth{
2021-02-13 17:34:44 +00:00
Addr: *ldapAddr,
Port: *ldapPort,
IsTLS: *ldaptls,
Base: *ldapbase,
2020-02-20 23:18:56 +00:00
BindUsername: *ldapbindusername,
BindPassword: *ldapbindpassword,
}
2021-02-04 17:37:22 +00:00
} else if auth != nil && *auth == "krb5" && krb5Realm != nil {
log.Printf("Auth method: KRB5(%s)", *krb5Realm)
lc.authMethod = &Krb5Auth{
Realm: *krb5Realm,
}
} else if auth != nil && *auth == "fwd" && fwdURI != nil {
if uri, err := url.Parse(*fwdURI); err != nil {
log.Fatal("Unable to parse FWD URL:", err)
} else {
log.Printf("Auth method: HTTP_FWD(%s)", uri)
lc.authMethod = FWDAuth{
URI: uri,
}
}
2020-02-20 23:18:56 +00:00
} else {
log.Println("No auth method selected: all access will be granted")
lc.authMethod = NoAuth{}
}
2018-02-18 13:41:06 +00:00
lc.students, err = readStudentsList(studentsFile)
2018-02-09 15:26:15 +00:00
if err != nil {
log.Fatal(err)
}
2019-02-24 02:27:38 +00:00
// Prepare graceful shutdown
interrupt := make(chan os.Signal, 1)
signal.Notify(interrupt, os.Interrupt, syscall.SIGHUP)
signal.Notify(interrupt, os.Interrupt, syscall.SIGTERM)
signal.Notify(interrupt, os.Interrupt, syscall.SIGINT)
srv := &http.Server{
Addr: *bind,
}
2018-02-08 21:27:30 +00:00
log.Println("Registering handlers...")
mux := http.NewServeMux()
2018-02-18 13:41:06 +00:00
mux.Handle("/login", lc)
2018-02-18 13:42:35 +00:00
mux.HandleFunc("/logout", logout)
2018-02-08 21:27:30 +00:00
http.HandleFunc("/", mux.ServeHTTP)
2019-02-24 02:27:38 +00:00
// Serve content
go func() {
log.Fatal(srv.ListenAndServe())
}()
log.Println(fmt.Sprintf("Ready, listening on %s", *bind))
// Wait shutdown signal
2021-02-13 17:34:44 +00:00
mloop:
for {
2019-02-24 02:27:38 +00:00
switch <-interrupt {
case syscall.SIGHUP:
log.Println("Reloading students files...")
if lc.students, err = readStudentsList(studentsFile); err != nil {
log.Println("Error during students.csv reload:", err)
}
case syscall.SIGTERM, syscall.SIGINT:
2021-02-13 17:34:44 +00:00
break mloop
2019-02-24 02:27:38 +00:00
}
}
log.Print("The service is shutting down...")
srv.Shutdown(context.Background())
log.Println("done")
2018-02-08 21:27:30 +00:00
}