Merge pull request #178 from larrabee/master

[bugfix] Fix LDAP issue with OpenLDAP/MS AD
This commit is contained in:
Andris Reinman 2017-03-15 20:59:19 +02:00 committed by GitHub
commit d2b0a611d7
2 changed files with 11 additions and 6 deletions

View file

@ -112,6 +112,8 @@ host="localhost"
port=3002 port=3002
baseDN="ou=users,dc=company" baseDN="ou=users,dc=company"
filter="(|(username={{username}})(mail={{username}}))" filter="(|(username={{username}})(mail={{username}}))"
#Username field in LDAP (uid/cn/username)
uidTag="username"
passwordresetlink="" passwordresetlink=""
[postfixbounce] [postfixbounce]

View file

@ -16,7 +16,9 @@ let LdapStrategy;
try { try {
LdapStrategy = require('passport-ldapjs').Strategy; // eslint-disable-line global-require LdapStrategy = require('passport-ldapjs').Strategy; // eslint-disable-line global-require
} catch (E) { } catch (E) {
// ignore if (config.ldap.enabled) {
log.info('LDAP', 'Module "passport-ldapjs" not installed. LDAP auth will fail.');
}
} }
module.exports.csrfProtection = csrf({ module.exports.csrfProtection = csrf({
@ -80,27 +82,28 @@ if (config.ldap.enabled && LdapStrategy) {
base: config.ldap.baseDN, base: config.ldap.baseDN,
search: { search: {
filter: config.ldap.filter, filter: config.ldap.filter,
attributes: ['username', 'mail'], attributes: [config.ldap.uidTag, 'mail'],
scope: 'sub' scope: 'sub'
} },
uidTag: config.ldap.uidTag
}; };
passport.use(new LdapStrategy(opts, (profile, done) => { passport.use(new LdapStrategy(opts, (profile, done) => {
users.findByUsername(profile.username, (err, user) => { users.findByUsername(profile[config.ldap.uidTag], (err, user) => {
if (err) { if (err) {
return done(err); return done(err);
} }
if (!user) { if (!user) {
// password is empty for ldap // password is empty for ldap
users.add(profile.username, '', profile.mail, (err, id) => { users.add(profile[config.ldap.uidTag], '', profile.mail, (err, id) => {
if (err) { if (err) {
return done(err); return done(err);
} }
return done(null, { return done(null, {
id, id,
username: profile.username username: profile[config.ldap.uidTag]
}); });
}); });
} else { } else {