New project structure
Beta of extract.js for extracting english locale
This commit is contained in:
parent
e18d2b2f84
commit
2edbd67205
247 changed files with 6405 additions and 4237 deletions
229
server/lib/passport.js
Normal file
229
server/lib/passport.js
Normal file
|
@ -0,0 +1,229 @@
|
|||
'use strict';
|
||||
|
||||
const config = require('config');
|
||||
const log = require('./log');
|
||||
const _ = require('./translate')._;
|
||||
const util = require('util');
|
||||
|
||||
const passport = require('server/lib/passport');
|
||||
const LocalStrategy = require('passport-local').Strategy;
|
||||
|
||||
const csrf = require('csurf');
|
||||
const bodyParser = require('body-parser');
|
||||
|
||||
const users = require('../models/users');
|
||||
const { nodeifyFunction, nodeifyPromise } = require('./nodeify');
|
||||
const interoperableErrors = require('../../shared/interoperable-errors');
|
||||
const contextHelpers = require('./context-helpers');
|
||||
|
||||
let authMode = 'local';
|
||||
|
||||
let LdapStrategy;
|
||||
let ldapStrategyOpts;
|
||||
if (config.ldap.enabled) {
|
||||
if (!config.ldap.method || config.ldap.method == 'ldapjs') {
|
||||
try {
|
||||
LdapStrategy = require('passport-ldapjs').Strategy; // eslint-disable-line global-require
|
||||
authMode = 'ldapjs';
|
||||
log.info('LDAP', 'Found module "passport-ldapjs". It will be used for LDAP auth.');
|
||||
|
||||
ldapStrategyOpts = {
|
||||
server: {
|
||||
url: 'ldap://' + config.ldap.host + ':' + config.ldap.port
|
||||
},
|
||||
base: config.ldap.baseDN,
|
||||
search: {
|
||||
filter: config.ldap.filter,
|
||||
attributes: [config.ldap.uidTag, config.ldap.nameTag, 'mail'],
|
||||
scope: 'sub'
|
||||
},
|
||||
uidTag: config.ldap.uidTag,
|
||||
bindUser: config.ldap.bindUser,
|
||||
bindPassword: config.ldap.bindPassword
|
||||
};
|
||||
|
||||
} catch (exc) {
|
||||
log.info('LDAP', 'Module "passport-ldapjs" not installed. It will not be used for LDAP auth.');
|
||||
}
|
||||
}
|
||||
|
||||
if (!LdapStrategy && (!config.ldap.method || config.ldap.method == 'ldapauth')) {
|
||||
try {
|
||||
LdapStrategy = require('passport-ldapauth').Strategy; // eslint-disable-line global-require
|
||||
authMode = 'ldapauth';
|
||||
log.info('LDAP', 'Found module "passport-ldapauth". It will be used for LDAP auth.');
|
||||
|
||||
ldapStrategyOpts = {
|
||||
server: {
|
||||
url: 'ldap://' + config.ldap.host + ':' + config.ldap.port,
|
||||
searchBase: config.ldap.baseDN,
|
||||
searchFilter: config.ldap.filter,
|
||||
searchAttributes: [config.ldap.uidTag, config.ldap.nameTag, 'mail'],
|
||||
bindDN: config.ldap.bindUser,
|
||||
bindCredentials: config.ldap.bindPassword
|
||||
},
|
||||
};
|
||||
} catch (exc) {
|
||||
log.info('LDAP', 'Module "passport-ldapauth" not installed. It will not be used for LDAP auth.');
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
module.exports.csrfProtection = csrf({
|
||||
cookie: true
|
||||
});
|
||||
|
||||
module.exports.parseForm = bodyParser.urlencoded({
|
||||
extended: false,
|
||||
limit: config.www.postSize
|
||||
});
|
||||
|
||||
module.exports.loggedIn = (req, res, next) => {
|
||||
if (!req.user) {
|
||||
next(new interoperableErrors.NotLoggedInError());
|
||||
} else {
|
||||
next();
|
||||
}
|
||||
};
|
||||
|
||||
module.exports.authByAccessToken = (req, res, next) => {
|
||||
if (!req.query.access_token) {
|
||||
res.status(403);
|
||||
res.json({
|
||||
error: 'Missing access_token',
|
||||
data: []
|
||||
});
|
||||
}
|
||||
|
||||
users.getByAccessToken(req.query.access_token).then(user => {
|
||||
req.user = user;
|
||||
next();
|
||||
}).catch(err => {
|
||||
if (err instanceof interoperableErrors.PermissionDeniedError) {
|
||||
res.status(403);
|
||||
res.json({
|
||||
error: 'Invalid or expired access_token',
|
||||
data: []
|
||||
});
|
||||
} else {
|
||||
res.status(500);
|
||||
res.json({
|
||||
error: err.message || err,
|
||||
data: []
|
||||
});
|
||||
}
|
||||
});
|
||||
};
|
||||
|
||||
module.exports.tryAuthByRestrictedAccessToken = (req, res, next) => {
|
||||
const pathComps = req.url.split('/');
|
||||
|
||||
pathComps.shift();
|
||||
const restrictedAccessToken = pathComps.shift();
|
||||
pathComps.unshift('');
|
||||
|
||||
const url = pathComps.join('/');
|
||||
|
||||
req.url = url;
|
||||
|
||||
users.getByRestrictedAccessToken(restrictedAccessToken).then(user => {
|
||||
req.user = user;
|
||||
next();
|
||||
}).catch(err => {
|
||||
next();
|
||||
});
|
||||
};
|
||||
|
||||
|
||||
module.exports.setupRegularAuth = app => {
|
||||
app.use(passport.initialize());
|
||||
app.use(passport.session());
|
||||
};
|
||||
|
||||
module.exports.restLogout = (req, res) => {
|
||||
req.logout();
|
||||
res.json();
|
||||
};
|
||||
|
||||
module.exports.restLogin = (req, res, next) => {
|
||||
passport.authenticate(authMode, (err, user, info) => {
|
||||
if (err) {
|
||||
return next(err);
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
return next(new interoperableErrors.IncorrectPasswordError());
|
||||
}
|
||||
|
||||
req.logIn(user, err => {
|
||||
if (err) {
|
||||
return next(err);
|
||||
}
|
||||
|
||||
if (req.body.remember) {
|
||||
// Cookie expires after 30 days
|
||||
req.session.cookie.maxAge = 30 * 24 * 60 * 60 * 1000;
|
||||
} else {
|
||||
// Cookie expires at end of session
|
||||
req.session.cookie.expires = false;
|
||||
}
|
||||
|
||||
return res.json();
|
||||
});
|
||||
})(req, res, next);
|
||||
};
|
||||
|
||||
if (LdapStrategy) {
|
||||
log.info('Using LDAP auth (passport-' + authMode + ')');
|
||||
module.exports.authMethod = 'ldap';
|
||||
module.exports.isAuthMethodLocal = false;
|
||||
|
||||
passport.use(new LdapStrategy(ldapStrategyOpts, nodeifyFunction(async (profile) => {
|
||||
try {
|
||||
const user = await users.getByUsername(profile[config.ldap.uidTag]);
|
||||
|
||||
return {
|
||||
id: user.id,
|
||||
username: user.username,
|
||||
name: profile[config.ldap.nameTag],
|
||||
email: profile.mail,
|
||||
role: user.role
|
||||
};
|
||||
|
||||
} catch (err) {
|
||||
if (err instanceof interoperableErrors.NotFoundError) {
|
||||
const userId = await users.create(null, {
|
||||
username: profile[config.ldap.uidTag],
|
||||
role: config.ldap.newUserRole,
|
||||
namespace: config.ldap.newUserNamespaceId
|
||||
});
|
||||
|
||||
return {
|
||||
id: userId,
|
||||
username: profile[config.ldap.uidTag],
|
||||
name: profile[config.ldap.nameTag],
|
||||
email: profile.mail,
|
||||
role: config.ldap.newUserRole
|
||||
};
|
||||
} else {
|
||||
throw err;
|
||||
}
|
||||
}
|
||||
})));
|
||||
|
||||
passport.serializeUser((user, done) => done(null, user));
|
||||
passport.deserializeUser((user, done) => done(null, user));
|
||||
|
||||
} else {
|
||||
log.info('Using local auth');
|
||||
module.exports.authMethod = 'local';
|
||||
module.exports.isAuthMethodLocal = true;
|
||||
|
||||
passport.use(new LocalStrategy(nodeifyFunction(async (username, password) => {
|
||||
return await users.getByUsernameIfPasswordMatch(username, password);
|
||||
})));
|
||||
|
||||
passport.serializeUser((user, done) => done(null, user.id));
|
||||
passport.deserializeUser((id, done) => nodeifyPromise(users.getById(contextHelpers.getAdminContext(), id), done));
|
||||
}
|
||||
|
Loading…
Add table
Add a link
Reference in a new issue