X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=src%2Fauth.js;h=5f83cea3e9e8321027ce9d00fdd24ad53630d43d;hb=6745c64afc8531c6a6eca4e0a81b39fc2653aa24;hp=c003d2aaaf50f2b4d581a53e5b2beaf39036250e;hpb=cfe24a278b68cd859e8f98cb0d8be92d49508a32;p=perso%2FImmae%2FProjets%2FNodejs%2FSurfer.git diff --git a/src/auth.js b/src/auth.js index c003d2a..5f83cea 100644 --- a/src/auth.js +++ b/src/auth.js @@ -1,7 +1,27 @@ 'use strict'; var passport = require('passport'), - LdapStrategy = require('passport-ldapjs').Strategy; + path = require('path'), + safe = require('safetydance'), + bcrypt = require('bcryptjs'), + uuid = require('uuid/v4'), + BearerStrategy = require('passport-http-bearer').Strategy, + LdapStrategy = require('passport-ldapjs').Strategy, + HttpSuccess = require('connect-lastmile').HttpSuccess; + +var LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json'); + +var gTokenStore = {}; + +function issueAccessToken() { + return function (req, res, next) { + var accessToken = uuid(); + + gTokenStore[accessToken] = req.user; + + next(new HttpSuccess(201, { accessToken: accessToken, user: req.user })); + }; +} passport.serializeUser(function (user, done) { console.log('serializeUser', user); @@ -19,16 +39,28 @@ var LDAP_USERS_BASE_DN = process.env.LDAP_USERS_BASE_DN; if (LDAP_URL && LDAP_USERS_BASE_DN) { console.log('Enable ldap auth'); - exports.ldap = passport.authenticate('ldap'); + exports.login = [ passport.authenticate('ldap'), issueAccessToken() ]; } else { - exports.ldap = function (req, res, next) { - console.log('Disable ldap auth, use developer credentials!'); + console.log('Use local user file:', LOCAL_AUTH_FILE); - if (req.query.username !== 'username') return res.send(401); - if (req.query.password !== 'password') return res.send(401); + exports.login = [ + function (req, res, next) { + var users = safe.JSON.parse(safe.fs.readFileSync(LOCAL_AUTH_FILE)); + if (!users) return res.send(401); + if (!users[req.body.username]) return res.send(401); - next(); - }; + bcrypt.compare(req.body.password, users[req.body.username].passwordHash, function (error, valid) { + if (error || !valid) return res.send(401); + + req.user = { + username: req.body.username + }; + + next(); + }); + }, + issueAccessToken() + ]; } var opts = { @@ -37,7 +69,7 @@ var opts = { }, base: LDAP_USERS_BASE_DN, search: { - filter: '(uid={{username}})', + filter: '(|(username={{username}})(mail={{username}}))', attributes: ['displayname', 'username', 'mail', 'uid'], scope: 'sub' }, @@ -47,6 +79,23 @@ var opts = { }; passport.use(new LdapStrategy(opts, function (profile, done) { - console.log('ldap', profile); done(null, profile); })); + +exports.verify = passport.authenticate('bearer', { session: false }); + +passport.use(new BearerStrategy(function (token, done) { + if (!gTokenStore[token]) return done(null, false); + + return done(null, gTokenStore[token], { accessToken: token }); +})); + +exports.logout = function (req, res, next) { + delete gTokenStore[req.authInfo.accessToken]; + + next(new HttpSuccess(200, {})); +}; + +exports.getProfile = function (req, res, next) { + next(new HttpSuccess(200, { username: req.user.username })); +};