2016-04-04 12:36:30 +00:00
|
|
|
'use strict';
|
|
|
|
|
2016-04-13 05:36:55 +00:00
|
|
|
let config = require('config');
|
2016-08-11 11:21:48 +00:00
|
|
|
let log = require('npmlog');
|
2017-03-07 14:30:56 +00:00
|
|
|
let _ = require('./translate')._;
|
|
|
|
let util = require('util');
|
2016-08-11 11:21:48 +00:00
|
|
|
|
2016-04-04 12:36:30 +00:00
|
|
|
let passport = require('passport');
|
|
|
|
let LocalStrategy = require('passport-local').Strategy;
|
2016-08-29 10:57:27 +00:00
|
|
|
|
2016-04-04 12:36:30 +00:00
|
|
|
let csrf = require('csurf');
|
|
|
|
let bodyParser = require('body-parser');
|
|
|
|
let users = require('./models/users');
|
|
|
|
|
2016-08-29 10:57:27 +00:00
|
|
|
let LdapStrategy;
|
|
|
|
try {
|
|
|
|
LdapStrategy = require('passport-ldapjs').Strategy; // eslint-disable-line global-require
|
|
|
|
} catch (E) {
|
|
|
|
// ignore
|
2017-03-15 18:26:54 +00:00
|
|
|
console.warn('Module "passport-ldapjs" not installed. LDAP auth will fail.');
|
2016-08-29 10:57:27 +00:00
|
|
|
}
|
|
|
|
|
2016-04-04 12:36:30 +00:00
|
|
|
module.exports.csrfProtection = csrf({
|
|
|
|
cookie: true
|
|
|
|
});
|
|
|
|
|
|
|
|
module.exports.parseForm = bodyParser.urlencoded({
|
2016-04-13 05:36:55 +00:00
|
|
|
extended: false,
|
|
|
|
limit: config.www.postsize
|
2016-04-04 12:36:30 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
module.exports.setup = app => {
|
|
|
|
app.use(passport.initialize());
|
|
|
|
app.use(passport.session());
|
|
|
|
};
|
|
|
|
|
|
|
|
module.exports.logout = (req, res) => {
|
|
|
|
if (req.user) {
|
2017-03-07 14:30:56 +00:00
|
|
|
req.flash('info', util.format(_('%s logged out'), req.user.username));
|
2016-04-04 12:36:30 +00:00
|
|
|
req.logout();
|
|
|
|
}
|
|
|
|
res.redirect('/');
|
|
|
|
};
|
|
|
|
|
|
|
|
module.exports.login = (req, res, next) => {
|
2016-08-11 11:21:48 +00:00
|
|
|
passport.authenticate(config.ldap.enabled ? 'ldap' : 'local', (err, user, info) => {
|
2016-04-04 12:36:30 +00:00
|
|
|
if (err) {
|
|
|
|
req.flash('danger', err.message);
|
|
|
|
return next(err);
|
|
|
|
}
|
|
|
|
if (!user) {
|
2017-03-07 14:30:56 +00:00
|
|
|
req.flash('danger', info && info.message || _('Failed to authenticate user'));
|
2016-04-04 12:36:30 +00:00
|
|
|
return res.redirect('/users/login' + (req.body.next ? '?next=' + encodeURIComponent(req.body.next) : ''));
|
|
|
|
}
|
|
|
|
req.logIn(user, err => {
|
|
|
|
if (err) {
|
|
|
|
return next(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (req.body.remember) {
|
|
|
|
// Cookie expires after 30 days
|
|
|
|
req.session.cookie.maxAge = 30 * 24 * 60 * 60 * 1000;
|
|
|
|
} else {
|
|
|
|
// Cookie expires at end of session
|
|
|
|
req.session.cookie.expires = false;
|
|
|
|
}
|
|
|
|
|
2017-03-07 14:30:56 +00:00
|
|
|
req.flash('success', util.format(_('Logged in as %s'), user.username));
|
2016-04-04 12:36:30 +00:00
|
|
|
return res.redirect(req.body.next || '/');
|
|
|
|
});
|
|
|
|
})(req, res, next);
|
|
|
|
};
|
|
|
|
|
2016-08-29 10:57:27 +00:00
|
|
|
if (config.ldap.enabled && LdapStrategy) {
|
2016-08-11 11:21:48 +00:00
|
|
|
log.info('Using LDAP auth');
|
2016-04-04 12:36:30 +00:00
|
|
|
|
2016-08-29 10:57:27 +00:00
|
|
|
let opts = {
|
2016-08-11 11:21:48 +00:00
|
|
|
server: {
|
2016-08-29 10:57:27 +00:00
|
|
|
url: 'ldap://' + config.ldap.host + ':' + config.ldap.port
|
2016-08-11 11:21:48 +00:00
|
|
|
},
|
|
|
|
base: config.ldap.baseDN,
|
|
|
|
search: {
|
|
|
|
filter: config.ldap.filter,
|
2017-03-15 17:10:00 +00:00
|
|
|
attributes: [config.ldap.uidTag, 'mail'],
|
2016-08-11 11:21:48 +00:00
|
|
|
scope: 'sub'
|
2017-03-15 17:10:00 +00:00
|
|
|
},
|
|
|
|
uidTag: config.ldap.uidTag
|
2016-08-11 11:21:48 +00:00
|
|
|
};
|
|
|
|
|
2016-08-29 10:57:27 +00:00
|
|
|
passport.use(new LdapStrategy(opts, (profile, done) => {
|
2017-03-15 17:10:00 +00:00
|
|
|
users.findByUsername(profile[config.ldap.uidTag], (err, user) => {
|
2016-08-11 11:21:48 +00:00
|
|
|
if (err) {
|
|
|
|
return done(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!user) {
|
|
|
|
// password is empty for ldap
|
2017-03-15 17:10:00 +00:00
|
|
|
users.add(profile[config.ldap.uidTag], '', profile.mail, (err, id) => {
|
2016-08-11 11:21:48 +00:00
|
|
|
if (err) {
|
|
|
|
return done(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
return done(null, {
|
2016-08-29 10:57:27 +00:00
|
|
|
id,
|
2017-03-15 17:10:00 +00:00
|
|
|
username: profile[config.ldap.uidTag]
|
2016-08-11 11:21:48 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
return done(null, {
|
|
|
|
id: user.id,
|
|
|
|
username: user.username
|
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}));
|
|
|
|
} else {
|
|
|
|
log.info('Using local auth');
|
2016-04-04 12:36:30 +00:00
|
|
|
|
2016-08-11 11:21:48 +00:00
|
|
|
passport.use(new LocalStrategy((username, password, done) => {
|
|
|
|
users.authenticate(username, password, (err, user) => {
|
|
|
|
if (err) {
|
|
|
|
return done(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!user) {
|
|
|
|
return done(null, false, {
|
2017-03-07 14:30:56 +00:00
|
|
|
message: _('Incorrect username or password')
|
2016-08-11 11:21:48 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return done(null, user);
|
|
|
|
});
|
|
|
|
}));
|
|
|
|
}
|
2016-04-04 12:36:30 +00:00
|
|
|
|
|
|
|
passport.serializeUser((user, done) => {
|
|
|
|
done(null, user.id);
|
|
|
|
});
|
|
|
|
|
|
|
|
passport.deserializeUser((id, done) => {
|
|
|
|
users.get(id, done);
|
|
|
|
});
|