]>
Commit | Line | Data |
---|---|---|
591ad40c JZ |
1 | 'use strict'; |
2 | ||
34adfa85 | 3 | var path = require('path'), |
dcb20866 | 4 | safe = require('safetydance'), |
b3ff26fb | 5 | fs = require('fs'), |
dcb20866 | 6 | bcrypt = require('bcryptjs'), |
4a27fce7 | 7 | uuid = require('uuid/v4'), |
47ba3ae4 | 8 | ldapjs = require('ldapjs'), |
bcee8931 | 9 | HttpError = require('connect-lastmile').HttpError, |
7af3d855 JZ |
10 | HttpSuccess = require('connect-lastmile').HttpSuccess, |
11 | webdavErrors = require('webdav-server').v2.Errors; | |
591ad40c | 12 | |
b979e487 JZ |
13 | const LDAP_URL = process.env.CLOUDRON_LDAP_URL; |
14 | const LDAP_USERS_BASE_DN = process.env.CLOUDRON_LDAP_USERS_BASE_DN; | |
b3ff26fb JZ |
15 | const LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json'); |
16 | const TOKENSTORE_FILE = path.resolve(process.env.TOKENSTORE_FILE || './.tokens.json'); | |
47ba3ae4 JZ |
17 | const AUTH_METHOD = (LDAP_URL && LDAP_USERS_BASE_DN) ? 'ldap' : 'local'; |
18 | ||
19 | if (AUTH_METHOD === 'ldap') { | |
20 | console.log('Use ldap auth'); | |
21 | } else { | |
22 | console.log(`Use local auth file ${LOCAL_AUTH_FILE}`); | |
23 | } | |
dcb20866 | 24 | |
bcee8931 JZ |
25 | var tokenStore = { |
26 | data: {}, | |
b3ff26fb JZ |
27 | save: function () { |
28 | try { | |
29 | fs.writeFileSync(TOKENSTORE_FILE, JSON.stringify(tokenStore.data), 'utf-8'); | |
30 | } catch (e) { | |
31 | console.error(`Unable to save tokenstore file at ${TOKENSTORE_FILE}`, e); | |
32 | } | |
33 | }, | |
bcee8931 JZ |
34 | get: function (token, callback) { |
35 | callback(tokenStore.data[token] ? null : 'not found', tokenStore.data[token]); | |
36 | }, | |
37 | set: function (token, data, callback) { | |
38 | tokenStore.data[token] = data; | |
b3ff26fb | 39 | tokenStore.save(); |
bcee8931 JZ |
40 | callback(null); |
41 | }, | |
42 | del: function (token, callback) { | |
43 | delete tokenStore.data[token]; | |
b3ff26fb | 44 | tokenStore.save(); |
bcee8931 JZ |
45 | callback(null); |
46 | } | |
47 | }; | |
48 | ||
b3ff26fb JZ |
49 | // load token store data if any |
50 | try { | |
51 | console.log(`Using tokenstore file: ${TOKENSTORE_FILE}`); | |
52 | tokenStore.data = JSON.parse(fs.readFileSync(TOKENSTORE_FILE, 'utf-8')); | |
53 | } catch (e) { | |
54 | // start with empty token store | |
bcee8931 | 55 | } |
4a27fce7 | 56 | |
47ba3ae4 JZ |
57 | function verifyUser(username, password, callback) { |
58 | if (AUTH_METHOD === 'ldap') { | |
b979e487 | 59 | var ldapClient = ldapjs.createClient({ url: process.env.CLOUDRON_LDAP_URL }); |
47ba3ae4 JZ |
60 | ldapClient.on('error', function (error) { |
61 | console.error('LDAP error', error); | |
62 | }); | |
591ad40c | 63 | |
b979e487 | 64 | ldapClient.bind(process.env.CLOUDRON_LDAP_BIND_DN, process.env.CLOUDRON_LDAP_BIND_PASSWORD, function (error) { |
47ba3ae4 | 65 | if (error) return callback(error); |
591ad40c | 66 | |
47ba3ae4 | 67 | var filter = `(|(uid=${username})(mail=${username})(username=${username})(sAMAccountName=${username}))`; |
b979e487 | 68 | ldapClient.search(process.env.CLOUDRON_LDAP_USERS_BASE_DN, { filter: filter }, function (error, result) { |
47ba3ae4 | 69 | if (error) return callback(error); |
a90a633f | 70 | |
47ba3ae4 | 71 | var items = []; |
dcb20866 | 72 | |
47ba3ae4 JZ |
73 | result.on('searchEntry', function(entry) { items.push(entry.object); }); |
74 | result.on('error', callback); | |
75 | result.on('end', function (result) { | |
8dc61bb6 | 76 | if (result.status !== 0 || items.length === 0) return callback('Invalid credentials'); |
4a27fce7 | 77 | |
47ba3ae4 JZ |
78 | // pick the first found |
79 | var user = items[0]; | |
4a27fce7 | 80 | |
47ba3ae4 JZ |
81 | ldapClient.bind(user.dn, password, function (error) { |
82 | if (error) return callback('Invalid credentials'); | |
83 | ||
84 | callback(null, { username: username }); | |
85 | }); | |
86 | }); | |
4a27fce7 | 87 | }); |
47ba3ae4 JZ |
88 | }); |
89 | } else { | |
90 | var users = safe.JSON.parse(safe.fs.readFileSync(LOCAL_AUTH_FILE)); | |
91 | if (!users || !users[username]) return callback('Invalid credentials'); | |
92 | ||
93 | bcrypt.compare(password, users[username].passwordHash, function (error, valid) { | |
94 | if (error || !valid) return callback('Invalid credentials'); | |
95 | ||
96 | callback(null, { username: username }); | |
97 | }); | |
98 | } | |
591ad40c JZ |
99 | } |
100 | ||
34adfa85 JZ |
101 | exports.login = function (req, res, next) { |
102 | verifyUser(req.body.username, req.body.password, function (error, user) { | |
103 | if (error) return next(new HttpError(401, 'Invalid credentials')); | |
591ad40c | 104 | |
34adfa85 | 105 | var accessToken = uuid(); |
47ba3ae4 | 106 | |
34adfa85 JZ |
107 | tokenStore.set(accessToken, user, function (error) { |
108 | if (error) return next(new HttpError(500, error)); | |
109 | ||
110 | next(new HttpSuccess(201, { accessToken: accessToken, user: user })); | |
47ba3ae4 | 111 | }); |
34adfa85 JZ |
112 | }); |
113 | }; | |
4a27fce7 | 114 | |
34adfa85 JZ |
115 | exports.verify = function (req, res, next) { |
116 | var accessToken = req.query.access_token || req.body.accessToken; | |
4a27fce7 | 117 | |
34adfa85 JZ |
118 | tokenStore.get(accessToken, function (error, user) { |
119 | if (error) return next(new HttpError(401, 'Invalid Access Token')); | |
bcee8931 | 120 | |
34adfa85 JZ |
121 | req.user = user; |
122 | ||
123 | next(); | |
bcee8931 | 124 | }); |
34adfa85 JZ |
125 | |
126 | }; | |
4a27fce7 JZ |
127 | |
128 | exports.logout = function (req, res, next) { | |
34adfa85 JZ |
129 | var accessToken = req.query.access_token || req.body.accessToken; |
130 | ||
131 | tokenStore.del(accessToken, function (error) { | |
bcee8931 | 132 | if (error) console.error(error); |
4a27fce7 | 133 | |
bcee8931 JZ |
134 | next(new HttpSuccess(200, {})); |
135 | }); | |
4a27fce7 JZ |
136 | }; |
137 | ||
138 | exports.getProfile = function (req, res, next) { | |
139 | next(new HttpSuccess(200, { username: req.user.username })); | |
140 | }; | |
7af3d855 JZ |
141 | |
142 | // webdav usermanager | |
143 | exports.WebdavUserManager = WebdavUserManager; | |
144 | ||
145 | // This implements the required interface only for the Basic Authentication for webdav-server | |
146 | function WebdavUserManager() {}; | |
147 | ||
148 | WebdavUserManager.prototype.getDefaultUser = function (callback) { | |
149 | // this is only a dummy user, since we always require authentication | |
150 | var user = { | |
151 | username: 'DefaultUser', | |
152 | password: null, | |
153 | isAdministrator: false, | |
154 | isDefaultUser: true, | |
155 | uid: 'DefaultUser' | |
156 | }; | |
157 | ||
158 | callback(user); | |
159 | }; | |
160 | ||
161 | WebdavUserManager.prototype.getUserByNamePassword = function (username, password, callback) { | |
47ba3ae4 JZ |
162 | verifyUser(username, password, function (error, user) { |
163 | if (error) return callback(webdavErrors.UserNotFound); | |
7af3d855 JZ |
164 | |
165 | callback(null, { | |
47ba3ae4 | 166 | username: user.username, |
7af3d855 JZ |
167 | isAdministrator: true, |
168 | isDefaultUser: false, | |
47ba3ae4 | 169 | uid: user.username |
7af3d855 JZ |
170 | }); |
171 | }); | |
172 | }; |