bitwarden_rs_ldap/src/main.rs

172 lines
5.1 KiB
Rust
Raw Normal View History

2019-03-29 18:18:56 +00:00
extern crate ldap3;
2019-04-11 19:01:06 +00:00
use std::collections::HashSet;
2019-03-29 18:18:56 +00:00
use std::error::Error;
use std::thread::sleep;
use std::time::Duration;
use ldap3::{DerefAliases, LdapConn, LdapConnSettings, Scope, SearchEntry, SearchOptions};
2019-03-29 18:18:56 +00:00
mod config;
2021-05-07 19:55:29 +00:00
mod vw_admin;
2019-03-29 18:18:56 +00:00
fn main() {
let config = config::Config::from_file();
2021-05-07 19:55:29 +00:00
let mut client = vw_admin::Client::new(
config.get_vaultwarden_url().clone(),
config.get_vaultwarden_admin_token().clone(),
config.get_vaultwarden_root_cert_file().clone(),
);
if let Err(e) = invite_users(&config, &mut client, config.get_ldap_sync_loop()) {
2019-04-11 19:01:06 +00:00
panic!("{}", e);
2019-04-05 18:49:32 +00:00
}
2019-04-11 19:01:06 +00:00
}
2019-04-05 18:49:32 +00:00
2019-04-11 19:01:06 +00:00
/// Invites new users to Bitwarden from LDAP
fn invite_users(
config: &config::Config,
2021-05-07 19:55:29 +00:00
client: &mut vw_admin::Client,
2019-04-11 19:01:06 +00:00
start_loop: bool,
2020-03-05 21:07:14 +00:00
) -> Result<(), Box<dyn Error>> {
2019-04-11 19:01:06 +00:00
if start_loop {
start_sync_loop(config, client)?;
2019-04-11 19:01:06 +00:00
} else {
invite_from_ldap(config, client)?;
2019-03-29 18:18:56 +00:00
}
2019-04-11 19:01:06 +00:00
Ok(())
}
/// Creates set of email addresses for users that already exist in Bitwarden
2021-05-07 19:55:29 +00:00
fn get_existing_users(client: &mut vw_admin::Client) -> Result<HashSet<String>, Box<dyn Error>> {
let all_users = client.users()?;
2019-04-11 19:01:06 +00:00
let mut user_emails = HashSet::with_capacity(all_users.len());
for user in all_users {
user_emails.insert(user.get_email().to_lowercase());
if user.is_disabled() {
2019-04-12 23:45:23 +00:00
println!(
"Existing disabled user found with email: {}",
user.get_email()
);
} else {
2019-04-12 23:45:23 +00:00
println!(
"Existing user or invite found with email: {}",
user.get_email()
);
}
2019-03-29 22:40:26 +00:00
}
2019-04-11 19:01:06 +00:00
Ok(user_emails)
2019-03-29 18:18:56 +00:00
}
/// Creates an LDAP connection, authenticating if necessary
2020-03-05 21:07:14 +00:00
fn ldap_client(
ldap_url: String,
bind_dn: String,
bind_pw: String,
no_tls_verify: bool,
2020-12-27 15:50:10 +00:00
starttls: bool,
2020-03-05 21:07:14 +00:00
) -> Result<LdapConn, Box<dyn Error>> {
2020-12-27 15:50:10 +00:00
let settings = LdapConnSettings::new()
.set_starttls(starttls)
.set_no_tls_verify(no_tls_verify);
let ldap = LdapConn::with_settings(settings, ldap_url.as_str())?;
2019-03-29 18:18:56 +00:00
match ldap.simple_bind(bind_dn.as_str(), bind_pw.as_str()) {
_ => {}
};
Ok(ldap)
}
/// Retrieves search results from ldap
2020-03-05 21:07:14 +00:00
fn search_entries(config: &config::Config) -> Result<Vec<SearchEntry>, Box<dyn Error>> {
2019-03-29 18:18:56 +00:00
let ldap = ldap_client(
config.get_ldap_url(),
config.get_ldap_bind_dn(),
config.get_ldap_bind_password(),
config.get_ldap_no_tls_verify(),
2020-12-27 15:50:10 +00:00
config.get_ldap_starttls(),
2019-03-29 18:18:56 +00:00
);
if ldap.is_err() {
println!("Error: Could not bind to ldap server");
}
2019-03-29 18:18:56 +00:00
let mail_field = config.get_ldap_mail_field();
let fields = vec!["uid", "givenname", "sn", "cn", mail_field.as_str()];
// TODO: Something something error handling
let (results, _res) = ldap?
.with_search_options(SearchOptions::new().deref(DerefAliases::Always))
.search(
&config.get_ldap_search_base_dn().as_str(),
Scope::Subtree,
&config.get_ldap_search_filter().as_str(),
fields,
)?
.success()?;
// Build list of entries
let mut entries = Vec::new();
for result in results {
entries.push(SearchEntry::construct(result));
}
Ok(entries)
}
2019-03-29 22:40:26 +00:00
/// Invite all LDAP users to Bitwarden
fn invite_from_ldap(
config: &config::Config,
2021-05-07 19:55:29 +00:00
client: &mut vw_admin::Client,
2020-03-05 21:07:14 +00:00
) -> Result<(), Box<dyn Error>> {
match get_existing_users(client) {
Ok(existing_users) => {
let mail_field = config.get_ldap_mail_field();
let mut num_users = 0;
for ldap_user in search_entries(config)? {
// Safely get first email from list of emails in field
if let Some(user_email) = ldap_user
.attrs
.get(mail_field.as_str())
.and_then(|l| (l.first()))
{
if existing_users.contains(&user_email.to_lowercase()) {
println!("User with email already exists: {}", user_email);
} else {
println!("Try to invite user: {}", user_email);
2019-04-12 23:45:23 +00:00
// TODO: Validate response
let _response = client.invite(user_email);
num_users = num_users + 1;
2019-04-12 23:42:31 +00:00
// println!("Invite response: {:?}", response);
}
} else {
println!("Warning: Email field, {:?}, not found on user", mail_field);
}
}
// Maybe think about returning this value for some other use
println!("Sent invites to {} user(s).", num_users);
2019-04-12 23:45:23 +00:00
}
Err(e) => {
println!("Error: Failed to get existing users from Bitwarden");
return Err(e);
2019-03-29 18:18:56 +00:00
}
}
Ok(())
}
2019-03-29 22:40:26 +00:00
/// Begin sync loop to invite LDAP users to Bitwarden
fn start_sync_loop(
config: &config::Config,
2021-05-07 19:55:29 +00:00
client: &mut vw_admin::Client,
2020-03-05 21:07:14 +00:00
) -> Result<(), Box<dyn Error>> {
2019-03-29 22:40:26 +00:00
let interval = Duration::from_secs(config.get_ldap_sync_interval_seconds());
loop {
invite_from_ldap(config, client)?;
sleep(interval);
}
}