123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475 |
- /* global WIKI */
- // ------------------------------------
- // LDAP Account
- // ------------------------------------
- const LdapStrategy = require('passport-ldapauth').Strategy
- const fs = require('fs')
- const _ = require('lodash')
- module.exports = {
- init (passport, conf) {
- passport.use(conf.key,
- new LdapStrategy({
- server: {
- url: conf.url,
- bindDn: conf.bindDn,
- bindCredentials: conf.bindCredentials,
- searchBase: conf.searchBase,
- searchFilter: conf.searchFilter,
- tlsOptions: getTlsOptions(conf),
- includeRaw: true
- },
- usernameField: 'email',
- passwordField: 'password',
- passReqToCallback: true
- }, async (req, profile, cb) => {
- try {
- const userId = _.get(profile, conf.mappingUID, null)
- if (!userId) {
- throw new Error('Invalid Unique ID field mapping!')
- }
- const user = await WIKI.db.users.processProfile({
- providerKey: req.params.strategy,
- profile: {
- id: userId,
- email: String(_.get(profile, conf.mappingEmail, '')).split(',')[0],
- displayName: _.get(profile, conf.mappingDisplayName, '???'),
- picture: _.get(profile, `_raw.${conf.mappingPicture}`, '')
- }
- })
- cb(null, user)
- } catch (err) {
- if (WIKI.config.flags.ldapdebug) {
- WIKI.logger.warn('LDAP LOGIN ERROR (c2): ', err)
- }
- cb(err, null)
- }
- }
- ))
- }
- }
- function getTlsOptions(conf) {
- if (!conf.tlsEnabled) {
- return {}
- }
- if (!conf.tlsCertPath) {
- return {
- rejectUnauthorized: conf.verifyTLSCertificate,
- }
- }
- const caList = []
- if (conf.verifyTLSCertificate) {
- caList.push(fs.readFileSync(conf.tlsCertPath))
- }
- return {
- rejectUnauthorized: conf.verifyTLSCertificate,
- ca: caList
- }
- }
|