'use strict';
var passport = require('passport'),
path = require('path'),
safe = require('safetydance'),
bcrypt = require('bcryptjs'),
uuid = require('uuid/v4'),
redis = require('redis'),
BearerStrategy = require('passport-http-bearer').Strategy,
LdapStrategy = require('passport-ldapjs').Strategy,
HttpError = require('connect-lastmile').HttpError,
HttpSuccess = require('connect-lastmile').HttpSuccess;
var LOCAL_AUTH_FILE = path.resolve(process.env.LOCAL_AUTH_FILE || './.users.json');
var tokenStore = {
data: {},
get: function (token, callback) {
callback(tokenStore.data[token] ? null : 'not found', tokenStore.data[token]);
},
set: function (token, data, callback) {
tokenStore.data[token] = data;
callback(null);
},
del: function (token, callback) {
delete tokenStore.data[token];
callback(null);
}
};
if (process.env.REDIS_URL) {
console.log('Enable redis token store');
var redisClient = redis.createClient(process.env.REDIS_URL);
if (process.env.REDIS_PASSWORD) {
console.log('Using redis auth');
redisClient.auth(process.env.REDIS_PASSWORD);
}
// overwrite the tokenStore api
tokenStore.get = function (token, callback) {
redisClient.get(token, function (error, result) {
callback(error || null, safe.JSON.parse(result));
});
};
tokenStore.set = function (token, data, callback) {
redisClient.set(token, JSON.stringify(data), callback);
};
tokenStore.del = redisClient.del.bind(redisClient);
} else {
console.log('Use in-memory token store');
}
function issueAccessToken() {
return function (req, res, next) {
var accessToken = uuid();
tokenStore.set(accessToken, req.user, function (error) {
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(201, { accessToken: accessToken, user: req.user }));
});
};
}
passport.serializeUser(function (user, done) {
console.log('serializeUser', user);
done(null, user.uid);
});
passport.deserializeUser(function (id, done) {
console.log('deserializeUser', id);
done(null, { uid: id });
});
var LDAP_URL = process.env.LDAP_URL;
var LDAP_USERS_BASE_DN = process.env.LDAP_USERS_BASE_DN;
if (LDAP_URL && LDAP_USERS_BASE_DN) {
console.log('Enable ldap auth');
exports.login = [ passport.authenticate('ldap'), issueAccessToken() ];
} else {
console.log('Use local user file:', LOCAL_AUTH_FILE);
exports.login = [
function (req, res, next) {
var users = safe.JSON.parse(safe.fs.readFileSync(LOCAL_AUTH_FILE));
if (!users) return res.send(401);
if (!users[req.body.username]) return res.send(401);
bcrypt.compare(req.body.password, users[req.body.username].passwordHash, function (error, valid) {
if (error || !valid) return res.send(401);
req.user = {
username: req.body.username
};
next();
});
},
issueAccessToken()
];
}
var opts = {
server: {
url: LDAP_URL,
},
base: LDAP_USERS_BASE_DN,
search: {
filter: '(|(username={{username}})(mail={{username}}))',
attributes: ['displayname', 'username', 'mail', 'uid'],
scope: 'sub'
},
uidTag: 'cn',
usernameField: 'username',
passwordField: 'password',
};
passport.use(new LdapStrategy(opts, function (profile, done) {
done(null, profile);
}));
exports.verify = passport.authenticate('bearer', { session: false });
passport.use(new BearerStrategy(function (token, done) {
tokenStore.get(token, function (error, result) {
if (error) {
console.error(error);
return done(null, false);
}
done(null, result, { accessToken: token });
});
}));
exports.logout = function (req, res, next) {
tokenStore.del(req.authInfo.accessToken, function (error) {
if (error) console.error(error);
next(new HttpSuccess(200, {}));
});
};
exports.getProfile = function (req, res, next) {
next(new HttpSuccess(200, { username: req.user.username }));
};