|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
import "gopkg.in/ldap.v3"
|
|
|
|
import "gopkg.in/robfig/cron.v3"
|
|
|
|
|
|
|
|
func AddUsersToTeam(apiKeys GiteaKeys, users []Account, team int) bool {
|
|
|
|
|
|
|
|
for i := 0; i < len(users); i++ {
|
|
|
|
|
|
|
|
userlogin := url.PathEscape(fmt.Sprintf("%s", users[i].Login))
|
|
|
|
apiKeys.Command = "/api/v1/users/search?q=" + userlogin + "&access_token="
|
|
|
|
foundUsers := RequestSearchResults(apiKeys)
|
|
|
|
|
|
|
|
for j := 0; j < len(foundUsers.Data); j++ {
|
|
|
|
|
|
|
|
if strings.EqualFold(users[i].Login, foundUsers.Data[j].Login) {
|
|
|
|
apiKeys.Command = "/api/v1/teams/" + fmt.Sprintf("%d", team) + "/members/" + foundUsers.Data[j].Login + "?access_token="
|
|
|
|
error := RequestPut(apiKeys)
|
|
|
|
if len(error) > 0 {
|
|
|
|
log.Println("Error (Team does not exist or Not Found User) :", parseJson(error).(map[string]interface{})["message"])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func DelUsersFromTeam(apiKeys GiteaKeys, Users []Account, team int) bool {
|
|
|
|
|
|
|
|
for i := 0; i < len(Users); i++ {
|
|
|
|
|
|
|
|
apiKeys.Command = "/api/v1/users/search?uid=" + fmt.Sprintf("%d", Users[i].Id) + "&access_token="
|
|
|
|
|
|
|
|
foundUser := RequestSearchResults(apiKeys)
|
|
|
|
|
|
|
|
apiKeys.Command = "/api/v1/teams/" + fmt.Sprintf("%d", team) + "/members/" + foundUser.Data[0].Login + "?access_token="
|
|
|
|
RequestDel(apiKeys)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
|
|
|
|
mainJob() // First run for check settings
|
|
|
|
|
|
|
|
var repTime string
|
|
|
|
if len(os.Getenv("REP_TIME")) == 0 {
|
|
|
|
|
|
|
|
} else {
|
|
|
|
repTime = os.Getenv("REP_TIME")
|
|
|
|
}
|
|
|
|
|
|
|
|
c := cron.New()
|
|
|
|
c.AddFunc(repTime, mainJob)
|
|
|
|
c.Start()
|
|
|
|
fmt.Println(c.Entries())
|
|
|
|
for true {
|
|
|
|
time.Sleep(100*time.Second)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func mainJob() {
|
|
|
|
|
|
|
|
//------------------------------
|
|
|
|
// Check and Set input settings
|
|
|
|
//------------------------------
|
|
|
|
|
|
|
|
var apiKeys GiteaKeys
|
|
|
|
|
|
|
|
if len(os.Getenv("GITEA_TOKEN")) < 40 { // get on https://[web_site_url]/user/settings/applications
|
|
|
|
log.Println("GITEA_TOKEN is empty or invalid.")
|
|
|
|
} else {
|
|
|
|
apiKeys.TokenKey = strings.Split(os.Getenv("GITEA_TOKEN"), ",")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(os.Getenv("GITEA_URL")) == 0 {
|
|
|
|
log.Println("GITEA_URL is empty")
|
|
|
|
} else {
|
|
|
|
apiKeys.BaseUrl = os.Getenv("GITEA_URL")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapUrl string = "ucs.totalwebservices.net"
|
|
|
|
if len(os.Getenv("LDAP_URL")) == 0 {
|
|
|
|
log.Println("LDAP_URL is empty")
|
|
|
|
} else {
|
|
|
|
ldapUrl = os.Getenv("LDAP_URL")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapPort int
|
|
|
|
if len(os.Getenv("LDAP_TLS_PORT")) > 0 {
|
|
|
|
port, err := strconv.Atoi(os.Getenv("LDAP_TLS_PORT"))
|
|
|
|
ldapPort = port
|
|
|
|
log.Printf("DialTLS:=%v:%d", ldapUrl, ldapPort)
|
|
|
|
if err != nil {
|
|
|
|
log.Println("LDAP_TLS_PORT is invalid.")
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
log.Println("LDAP_TLS_PORT is empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapbindDN string
|
|
|
|
if len(os.Getenv("BIND_DN")) == 0 {
|
|
|
|
log.Println("BIND_DN is empty")
|
|
|
|
} else {
|
|
|
|
ldapbindDN = os.Getenv("BIND_DN")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapbindPassword string
|
|
|
|
if len(os.Getenv("BIND_PASSWORD")) == 0 {
|
|
|
|
log.Println("BIND_PASSWORD is empty")
|
|
|
|
} else {
|
|
|
|
ldapbindPassword = os.Getenv("BIND_PASSWORD")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapUserFilter string
|
|
|
|
if len(os.Getenv("LDAP_FILTER")) == 0 {
|
|
|
|
log.Println("LDAP_FILTER is empty")
|
|
|
|
} else {
|
|
|
|
ldapUserFilter = os.Getenv("LDAP_FILTER")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapUserSearchBase string
|
|
|
|
if len(os.Getenv("LDAP_USER_SEARCH_BASE")) == 0 {
|
|
|
|
log.Println("LDAP_USER_SEARCH_BASE is empty")
|
|
|
|
} else {
|
|
|
|
ldapUserSearchBase = os.Getenv("LDAP_USER_SEARCH_BASE")
|
|
|
|
}
|
|
|
|
|
|
|
|
var ldapUserLoginAttribute string
|
|
|
|
if len(os.Getenv("LDAP_USER_LOGIN_ATTRIBUTE")) == 0 {
|
|
|
|
log.Println("LDAP_USER_LOGIN_ATTRIBUTE is empty")
|
|
|
|
} else {
|
|
|
|
ldapUserLoginAttribute = os.Getenv("LDAP_USER_LOGIN_ATTRIBUTE")
|
|
|
|
}
|
|
|
|
|
|
|
|
l, err := ldap.DialTLS("tcp", fmt.Sprintf("%s:%d", ldapUrl, ldapPort), &tls.Config{InsecureSkipVerify: true})
|
|
|
|
if err != nil {
|
|
|
|
fmt.Println(err)
|
|
|
|
fmt.Println("Please set the correct values for all specifics.")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
defer l.Close()
|
|
|
|
|
|
|
|
err = l.Bind(ldapbindDN, ldapbindPassword)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
page := 1
|
|
|
|
apiKeys.BruteforceTokenKey = 0
|
|
|
|
apiKeys.Command = "/api/v1/admin/orgs?page=" + fmt.Sprintf("%d", page) + "&limit=20&access_token=" // List all organizations
|
|
|
|
organizationList := RequestOrganizationList(apiKeys)
|
|
|
|
|
|
|
|
log.Printf("%d organizations were found on the server: %s", len(organizationList), apiKeys.BaseUrl)
|
|
|
|
|
|
|
|
for 1 < len(organizationList) {
|
|
|
|
|
|
|
|
for i := 0; i < len(organizationList); i++ {
|
|
|
|
|
|
|
|
log.Println(organizationList)
|
|
|
|
|
|
|
|
log.Printf("Begin an organization review: OrganizationName= %v, OrganizationId= %d \n", organizationList[i].Name, organizationList[i].Id)
|
|
|
|
|
|
|
|
apiKeys.Command = "/api/v1/orgs/" + organizationList[i].Name + "/teams?access_token="
|
|
|
|
teamList := RequestTeamList(apiKeys)
|
|
|
|
log.Printf("%d teams were found in %s organization", len(teamList), organizationList[i].Name)
|
|
|
|
log.Printf("Skip synchronization in the Owners team")
|
|
|
|
apiKeys.BruteforceTokenKey = 0
|
|
|
|
|
|
|
|
for j := 1; j < len(teamList); j++ {
|
|
|
|
|
|
|
|
// preparing request to ldap server
|
|
|
|
filter := fmt.Sprintf(ldapUserFilter, teamList[j].Name)
|
|
|
|
searchRequest := ldap.NewSearchRequest(
|
|
|
|
ldapUserSearchBase, // The base dn to search
|
|
|
|
ldap.ScopeWholeSubtree, ldap.NeverDerefAliases, 0, 0, false,
|
|
|
|
filter, // The filter to apply
|
|
|
|
[]string{"cn", "uid", "mailPrimaryAddress, sn", ldapUserLoginAttribute}, // A list attributes to retrieve
|
|
|
|
nil,
|
|
|
|
)
|
|
|
|
// make request to ldap server
|
|
|
|
sr, err := l.Search(searchRequest)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
AccountsLdap := make(map[string]Account)
|
|
|
|
AccountsGitea := make(map[string]Account)
|
|
|
|
var addUserToTeamList, delUserToTeamlist []Account
|
|
|
|
if len(sr.Entries) > 0 {
|
|
|
|
log.Printf("The LDAP %s has %d users corresponding to team %s", ldapUrl, len(sr.Entries), teamList[j].Name)
|
|
|
|
for _, entry := range sr.Entries {
|
|
|
|
|
|
|
|
AccountsLdap[entry.GetAttributeValue(ldapUserLoginAttribute)] = Account{
|
|
|
|
Full_name: entry.GetAttributeValue("sn"), //change to cn if you need it
|
|
|
|
Login: entry.GetAttributeValue(ldapUserLoginAttribute),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
apiKeys.Command = "/api/v1/teams/" + fmt.Sprintf("%d", teamList[j].Id) + "/members?access_token="
|
|
|
|
AccountsGitea, apiKeys.BruteforceTokenKey = RequestUsersList(apiKeys)
|
|
|
|
log.Printf("The gitea %s has %d users corresponding to team %s Teamid=%d", apiKeys.BaseUrl, len(AccountsGitea), teamList[j].Name, teamList[j].Id)
|
|
|
|
|
|
|
|
for k, v := range AccountsLdap {
|
|
|
|
if AccountsGitea[k].Login != v.Login {
|
|
|
|
addUserToTeamList = append(addUserToTeamList, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.Printf("can be added users list %v", addUserToTeamList)
|
|
|
|
AddUsersToTeam(apiKeys, addUserToTeamList, teamList[j].Id)
|
|
|
|
|
|
|
|
for k, v := range AccountsGitea {
|
|
|
|
if AccountsLdap[k].Login != v.Login {
|
|
|
|
delUserToTeamlist = append(delUserToTeamlist, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.Printf("must be del users list %v", delUserToTeamlist)
|
|
|
|
DelUsersFromTeam(apiKeys, delUserToTeamlist, teamList[j].Id)
|
|
|
|
|
|
|
|
} else {
|
|
|
|
log.Printf("The LDAP %s not found users corresponding to team %s", ldapUrl, teamList[j].Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
page++
|
|
|
|
apiKeys.BruteforceTokenKey = 0
|
|
|
|
apiKeys.Command = "/api/v1/admin/orgs?page=" + fmt.Sprintf("%d", page) + "&limit=20&access_token=" // List all organizations
|
|
|
|
organizationList = RequestOrganizationList(apiKeys)
|
|
|
|
log.Printf("%d organizations were found on the server: %s", len(organizationList), apiKeys.BaseUrl)
|
|
|
|
}
|
|
|
|
}
|