X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=src%2Fauth.js;h=d575d601d1c91c0a84ed3202e37cb30b87c6c66c;hb=476177380452c9c7c5b1624805feedc824c5995e;hp=e148fb75043529c3049b98d6dd4595d8929ca801;hpb=47ba3ae4ff8e5a49b06de5bfea908bf6a0c599d6;p=perso%2FImmae%2FProjets%2FNodejs%2FSurfer.git diff --git a/src/auth.js b/src/auth.js index e148fb7..d575d60 100644 --- a/src/auth.js +++ b/src/auth.js @@ -1,29 +1,31 @@ 'use strict'; -var passport = require('passport'), - path = require('path'), +var path = require('path'), safe = require('safetydance'), fs = require('fs'), bcrypt = require('bcryptjs'), uuid = require('uuid/v4'), - BearerStrategy = require('passport-http-bearer').Strategy, ldapjs = require('ldapjs'), HttpError = require('connect-lastmile').HttpError, HttpSuccess = require('connect-lastmile').HttpSuccess, webdavErrors = require('webdav-server').v2.Errors; -const LDAP_URL = process.env.LDAP_URL; -const LDAP_USERS_BASE_DN = process.env.LDAP_USERS_BASE_DN; +const LDAP_URL = process.env.CLOUDRON_LDAP_URL; +const LDAP_USERS_BASE_DN = process.env.CLOUDRON_LDAP_USERS_BASE_DN; const LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json'); const TOKENSTORE_FILE = path.resolve(process.env.TOKENSTORE_FILE || './.tokens.json'); const AUTH_METHOD = (LDAP_URL && LDAP_USERS_BASE_DN) ? 'ldap' : 'local'; +const LOGIN_TOKEN_PREFIX = 'login-'; +const API_TOKEN_PREFIX = 'api-'; if (AUTH_METHOD === 'ldap') { - console.log('Use ldap auth'); + console.log('Using ldap auth'); } else { - console.log(`Use local auth file ${LOCAL_AUTH_FILE}`); + console.log(`Using local auth file at: ${LOCAL_AUTH_FILE}`); } +var gConfig = {}; + var tokenStore = { data: {}, save: function () { @@ -36,8 +38,11 @@ var tokenStore = { get: function (token, callback) { callback(tokenStore.data[token] ? null : 'not found', tokenStore.data[token]); }, - set: function (token, data, callback) { - tokenStore.data[token] = data; + getApiTokens: function (callback) { + callback(null, Object.keys(tokenStore.data).filter(function (t) { return t.indexOf(API_TOKEN_PREFIX) === 0; })) + }, + set: function (token, user, callback) { + tokenStore.data[token] = user; tokenStore.save(); callback(null); }, @@ -50,45 +55,24 @@ var tokenStore = { // load token store data if any try { - console.log(`Using tokenstore file: ${TOKENSTORE_FILE}`); + console.log(`Using tokenstore file at: ${TOKENSTORE_FILE}`); tokenStore.data = JSON.parse(fs.readFileSync(TOKENSTORE_FILE, 'utf-8')); } catch (e) { // start with empty token store } -function issueAccessToken() { - return function (req, res, next) { - var accessToken = uuid(); - - tokenStore.set(accessToken, req.user, function (error) { - if (error) return next(new HttpError(500, error)); - next(new HttpSuccess(201, { accessToken: accessToken, user: req.user })); - }); - }; -} - -passport.serializeUser(function (user, done) { - console.log('serializeUser', user); - done(null, user.uid); -}); - -passport.deserializeUser(function (id, done) { - console.log('deserializeUser', id); - done(null, { uid: id }); -}); - function verifyUser(username, password, callback) { if (AUTH_METHOD === 'ldap') { - var ldapClient = ldapjs.createClient({ url: process.env.LDAP_URL }); + var ldapClient = ldapjs.createClient({ url: process.env.CLOUDRON_LDAP_URL }); ldapClient.on('error', function (error) { console.error('LDAP error', error); }); - ldapClient.bind(process.env.LDAP_BIND_DN, process.env.LDAP_BIND_PASSWORD, function (error) { + ldapClient.bind(process.env.CLOUDRON_LDAP_BIND_DN, process.env.CLOUDRON_LDAP_BIND_PASSWORD, function (error) { if (error) return callback(error); - var filter = `(|(uid=${username})(mail=${username})(username=${username})(sAMAccountName=${username}))`; - ldapClient.search(process.env.LDAP_USERS_BASE_DN, { filter: filter }, function (error, result) { + var filter = process.env.CLOUDRON_LDAP_FILTER.replace(/\{username\}/g, username); + ldapClient.search(process.env.CLOUDRON_LDAP_USERS_BASE_DN, { filter: filter, scope: "sub" }, function (error, result) { if (error) return callback(error); var items = []; @@ -96,7 +80,7 @@ function verifyUser(username, password, callback) { result.on('searchEntry', function(entry) { items.push(entry.object); }); result.on('error', callback); result.on('end', function (result) { - if (result.status !== 0 || items.length === 0) return callback(error); + if (result.status !== 0 || items.length === 0) return callback('Invalid credentials'); // pick the first found var user = items[0]; @@ -121,34 +105,46 @@ function verifyUser(username, password, callback) { } } -exports.login = [ - function (req, res, next) { - verifyUser(req.body.username, req.body.password, function (error, user) { - if (error) return next(new HttpError(401, 'Invalid credentials')); +exports.init = function (config) { + gConfig = config; +}; + +exports.login = function (req, res, next) { + verifyUser(req.body.username, req.body.password, function (error, user) { + if (error) return next(new HttpError(401, 'Invalid credentials')); - req.user = user; + var accessToken = LOGIN_TOKEN_PREFIX + uuid(); - next(); + tokenStore.set(accessToken, user, function (error) { + if (error) return next(new HttpError(500, error)); + + next(new HttpSuccess(201, { accessToken: accessToken, user: user })); }); - }, - issueAccessToken() -]; + }); +}; -exports.verify = passport.authenticate('bearer', { session: false }); +exports.verify = function (req, res, next) { + var accessToken = req.query.access_token || req.body.accessToken; -passport.use(new BearerStrategy(function (token, done) { - tokenStore.get(token, function (error, result) { - if (error) { - console.error(error); - return done(null, false); - } + tokenStore.get(accessToken, function (error, user) { + if (error) return next(new HttpError(401, 'Invalid Access Token')); - done(null, result, { accessToken: token }); + req.user = user; + + next(); }); -})); + +}; + +exports.verifyIfNeeded = function (req, res, next) { + if (!gConfig.folderListingEnabled) return exports.verify(req, res, next); + next(); +}; exports.logout = function (req, res, next) { - tokenStore.del(req.authInfo.accessToken, function (error) { + var accessToken = req.query.access_token || req.body.accessToken; + + tokenStore.del(accessToken, function (error) { if (error) console.error(error); next(new HttpSuccess(200, {})); @@ -159,6 +155,32 @@ exports.getProfile = function (req, res, next) { next(new HttpSuccess(200, { username: req.user.username })); }; +exports.getTokens = function (req, res, next) { + tokenStore.getApiTokens(function (error, result) { + if (error) return next(new HttpError(500, error)); + + next(new HttpSuccess(200, { accessTokens: result })); + }); +}; + +exports.createToken = function (req, res, next) { + var accessToken = API_TOKEN_PREFIX + uuid(); + + tokenStore.set(accessToken, req.user, function (error) { + if (error) return next(new HttpError(500, error)); + + next(new HttpSuccess(201, { accessToken: accessToken })); + }); +}; + +exports.delToken = function (req, res, next) { + tokenStore.del(req.params.token, function (error) { + if (error) console.error(error); + + next(new HttpSuccess(200, {})); + }); +}; + // webdav usermanager exports.WebdavUserManager = WebdavUserManager;