passport.js 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. const debug = require('debug')('crowi:service:PassportService');
  2. const passport = require('passport');
  3. const LocalStrategy = require('passport-local').Strategy;
  4. const LdapStrategy = require('passport-ldapauth');
  5. /**
  6. * the service class of Passport
  7. */
  8. class PassportService {
  9. // see '/lib/form/login.js'
  10. static get USERNAME_FIELD() { return 'loginForm[username]' }
  11. static get PASSWORD_FIELD() { return 'loginForm[password]' }
  12. constructor(crowi) {
  13. this.crowi = crowi;
  14. /**
  15. * the flag whether LocalStrategy is set up successfully
  16. */
  17. this.isLocalStrategySetup = false;
  18. /**
  19. * the flag whether LdapStrategy is set up successfully
  20. */
  21. this.isLdapStrategySetup = false;
  22. /**
  23. * the flag whether serializer/deserializer are set up successfully
  24. */
  25. this.isSerializerSetup = false;
  26. }
  27. /**
  28. * reset LocalStrategy
  29. *
  30. * @memberof PassportService
  31. */
  32. resetLocalStrategy() {
  33. debug('LocalStrategy: reset');
  34. passport.unuse('local');
  35. this.isLocalStrategySetup = false;
  36. }
  37. /**
  38. * setup LocalStrategy
  39. *
  40. * @memberof PassportService
  41. */
  42. setupLocalStrategy() {
  43. // check whether the strategy has already been set up
  44. if (this.isLocalStrategySetup) {
  45. throw new Error('LocalStrategy has already been set up');
  46. }
  47. debug('LocalStrategy: setting up..');
  48. const User = this.crowi.model('User');
  49. passport.use(new LocalStrategy(
  50. {
  51. usernameField: PassportService.USERNAME_FIELD,
  52. passwordField: PassportService.PASSWORD_FIELD,
  53. },
  54. (username, password, done) => {
  55. // find user
  56. User.findUserByUsernameOrEmail(username, password, (err, user) => {
  57. if (err) { return done(err); }
  58. // check existence and password
  59. if (!user || !user.isPasswordValid(password)) {
  60. return done(null, false, { message: 'Incorrect credentials.' });
  61. }
  62. return done(null, user);
  63. });
  64. }
  65. ));
  66. this.isLocalStrategySetup = true;
  67. debug('LocalStrategy: setup is done');
  68. }
  69. /**
  70. * reset LdapStrategy
  71. *
  72. * @memberof PassportService
  73. */
  74. resetLdapStrategy() {
  75. debug('LdapStrategy: reset');
  76. passport.unuse('ldapauth');
  77. this.isLdapStrategySetup = false;
  78. }
  79. /**
  80. * Asynchronous configuration retrieval
  81. *
  82. * @memberof PassportService
  83. */
  84. setupLdapStrategy() {
  85. // check whether the strategy has already been set up
  86. if (this.isLdapStrategySetup) {
  87. throw new Error('LdapStrategy has already been set up');
  88. }
  89. const config = this.crowi.config;
  90. const Config = this.crowi.model('Config');
  91. const isLdapEnabled = Config.isEnabledPassportLdap(config);
  92. // when disabled
  93. if (!isLdapEnabled) {
  94. return;
  95. }
  96. debug('LdapStrategy: setting up..');
  97. passport.use(new LdapStrategy(this.getLdapConfigurationFunc(config, {passReqToCallback: true}),
  98. (req, ldapAccountInfo, done) => {
  99. debug("LDAP authentication has succeeded", ldapAccountInfo);
  100. const ExternalAccount = this.crowi.model('ExternalAccount');
  101. // it is guaranteed that username that is input from form can be acquired
  102. // because this processes after authentication
  103. const ldapAccountId = this.getLdapAccountIdFromReq(req);
  104. // TODO ensure to be able to select the way to determine username
  105. const usernameToBeRegistered = ldapAccountInfo['uid'];
  106. ExternalAccount.findOrRegister('ldap', ldapAccountId, usernameToBeRegistered)
  107. .then((externalAccount) => {
  108. return externalAccount.getPopulatedUser();
  109. })
  110. .then((user) => {
  111. done(null, user);
  112. })
  113. .catch((err) => {
  114. done(null, false, err);
  115. });
  116. }
  117. ));
  118. this.isLdapStrategySetup = true;
  119. debug('LdapStrategy: setup is done');
  120. }
  121. /**
  122. * CAUTION: this method is capable to use only when `req.body.loginForm` is not null
  123. *
  124. * @param {any} req
  125. * @returns
  126. * @memberof PassportService
  127. */
  128. getLdapAccountIdFromReq(req) {
  129. return req.body.loginForm.username;
  130. }
  131. /**
  132. * Asynchronous configuration retrieval
  133. * @see https://github.com/vesse/passport-ldapauth#asynchronous-configuration-retrieval
  134. *
  135. * @param {object} config
  136. * @param {object} opts
  137. * @returns
  138. * @memberof PassportService
  139. */
  140. getLdapConfigurationFunc(config, opts) {
  141. // get configurations
  142. const isUserBind = config.crowi['security:passport-ldap:isUserBind'];
  143. const serverUrl = config.crowi['security:passport-ldap:serverUrl'];
  144. let bindDN = config.crowi['security:passport-ldap:bindDN'];
  145. let bindCredentials = config.crowi['security:passport-ldap:bindDNPassword'];
  146. const searchFilter = config.crowi['security:passport-ldap:searchFilter'] || '(uid={{username}})';
  147. // parse serverUrl
  148. // see: https://regex101.com/r/0tuYBB/1
  149. const match = serverUrl.match(/(ldaps?:\/\/[^\/]+)\/(.*)?/);
  150. if (match == null || match.length < 1) {
  151. debug('LdapStrategy: serverUrl is invalid');
  152. return;
  153. }
  154. const url = match[1];
  155. const searchBase = match[2] || '';
  156. debug(`LdapStrategy: url=${url}`);
  157. debug(`LdapStrategy: searchBase=${searchBase}`);
  158. debug(`LdapStrategy: isUserBind=${isUserBind}`);
  159. if (!isUserBind) {
  160. debug(`LdapStrategy: bindDN=${bindDN}`);
  161. debug(`LdapStrategy: bindCredentials=${bindCredentials}`);
  162. }
  163. debug(`LdapStrategy: searchFilter=${searchFilter}`);
  164. return (req, callback) => {
  165. // get credentials from form data
  166. const loginForm = req.body.loginForm;
  167. if (!req.form.isValid) {
  168. return callback({ message: 'Incorrect credentials.' });
  169. }
  170. // user bind
  171. if (isUserBind) {
  172. bindDN = bindDN.replace(/{{username}}/, loginForm.username);
  173. bindCredentials = loginForm.password;
  174. }
  175. process.nextTick(() => {
  176. const mergedOpts = Object.assign({
  177. usernameField: PassportService.USERNAME_FIELD,
  178. passwordField: PassportService.PASSWORD_FIELD,
  179. server: { url, bindDN, bindCredentials, searchBase, searchFilter },
  180. }, opts);
  181. debug('ldap configuration: ', mergedOpts);
  182. callback(null, mergedOpts);
  183. });
  184. };
  185. }
  186. /**
  187. * setup serializer and deserializer
  188. *
  189. * @memberof PassportService
  190. */
  191. setupSerializer() {
  192. // check whether the serializer/deserializer have already been set up
  193. if (this.isSerializerSetup) {
  194. throw new Error('serializer/deserializer have already been set up');
  195. }
  196. debug('setting up serializer and deserializer');
  197. const User = this.crowi.model('User');
  198. passport.serializeUser(function(user, done) {
  199. done(null, user.id);
  200. });
  201. passport.deserializeUser(function(id, done) {
  202. User.findById(id, function(err, user) {
  203. done(err, user);
  204. });
  205. });
  206. this.isSerializerSetup = true;
  207. }
  208. }
  209. module.exports = PassportService;