var passport = require('passport'),
path = require('path'),
safe = require('safetydance'),
+ fs = require('fs'),
bcrypt = require('bcryptjs'),
uuid = require('uuid/v4'),
- redis = require('redis'),
BearerStrategy = require('passport-http-bearer').Strategy,
LdapStrategy = require('passport-ldapjs').Strategy,
HttpError = require('connect-lastmile').HttpError,
- HttpSuccess = require('connect-lastmile').HttpSuccess;
+ HttpSuccess = require('connect-lastmile').HttpSuccess,
+ webdavErrors = require('webdav-server').v2.Errors;
-var LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json');
+const LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json');
+const TOKENSTORE_FILE = path.resolve(process.env.TOKENSTORE_FILE || './.tokens.json');
var tokenStore = {
data: {},
+ save: function () {
+ try {
+ fs.writeFileSync(TOKENSTORE_FILE, JSON.stringify(tokenStore.data), 'utf-8');
+ } catch (e) {
+ console.error(`Unable to save tokenstore file at ${TOKENSTORE_FILE}`, e);
+ }
+ },
get: function (token, callback) {
callback(tokenStore.data[token] ? null : 'not found', tokenStore.data[token]);
},
set: function (token, data, callback) {
tokenStore.data[token] = data;
+ tokenStore.save();
callback(null);
},
del: function (token, callback) {
delete tokenStore.data[token];
+ tokenStore.save();
callback(null);
}
};
-if (process.env.REDIS_URL) {
- console.log('Enable redis token store');
-
- var redisClient = redis.createClient(process.env.REDIS_URL);
-
- if (process.env.REDIS_PASSWORD) {
- console.log('Using redis auth');
- redisClient.auth(process.env.REDIS_PASSWORD);
- }
-
- // overwrite the tokenStore api
- tokenStore.get = function (token, callback) {
- redisClient.get(token, function (error, result) {
- callback(error || null, safe.JSON.parse(result));
- });
- };
- tokenStore.set = function (token, data, callback) {
- redisClient.set(token, JSON.stringify(data), callback);
- };
- tokenStore.del = redisClient.del.bind(redisClient);
-} else {
- console.log('Use in-memory token store');
+// load token store data if any
+try {
+ console.log(`Using tokenstore file: ${TOKENSTORE_FILE}`);
+ tokenStore.data = JSON.parse(fs.readFileSync(TOKENSTORE_FILE, 'utf-8'));
+} catch (e) {
+ // start with empty token store
}
function issueAccessToken() {
var LDAP_USERS_BASE_DN = process.env.LDAP_USERS_BASE_DN;
if (LDAP_URL && LDAP_USERS_BASE_DN) {
- console.log('Enable ldap auth');
+ console.log('Using ldap auth');
exports.login = [ passport.authenticate('ldap'), issueAccessToken() ];
} else {
- console.log('Use local user file:', LOCAL_AUTH_FILE);
+ console.log(`Using local user file: ${LOCAL_AUTH_FILE}`);
exports.login = [
function (req, res, next) {
exports.getProfile = function (req, res, next) {
next(new HttpSuccess(200, { username: req.user.username }));
};
+
+// webdav usermanager
+exports.WebdavUserManager = WebdavUserManager;
+
+// This implements the required interface only for the Basic Authentication for webdav-server
+function WebdavUserManager() {};
+
+WebdavUserManager.prototype.getDefaultUser = function (callback) {
+ // this is only a dummy user, since we always require authentication
+ var user = {
+ username: 'DefaultUser',
+ password: null,
+ isAdministrator: false,
+ isDefaultUser: true,
+ uid: 'DefaultUser'
+ };
+
+ callback(user);
+};
+
+WebdavUserManager.prototype.getUserByNamePassword = function (username, password, callback) {
+ var users = safe.JSON.parse(safe.fs.readFileSync(LOCAL_AUTH_FILE));
+ if (!users) return callback(webdavErrors.UserNotFound);
+ if (!users[username]) return callback(webdavErrors.UserNotFound);
+
+ bcrypt.compare(password, users[username].passwordHash, function (error, valid) {
+ if (error || !valid) return callback(webdavErrors.UserNotFound);
+
+ callback(null, {
+ username: username,
+ isAdministrator: true,
+ isDefaultUser: false,
+ uid: username
+ });
+ });
+};