wikijs-fork/server/modules/authentication/ldap/authentication.js

58 lines
1.6 KiB
JavaScript
Raw Normal View History

/* global WIKI */
2017-07-29 21:33:08 +00:00
// ------------------------------------
// LDAP Account
// ------------------------------------
const LdapStrategy = require('passport-ldapauth').Strategy
2017-07-30 04:04:57 +00:00
const fs = require('fs')
2019-04-27 03:59:35 +00:00
const _ = require('lodash')
2017-07-29 21:33:08 +00:00
module.exports = {
init (passport, conf) {
2019-04-27 03:59:35 +00:00
passport.use('ldap',
new LdapStrategy({
server: {
url: conf.url,
bindDn: conf.bindDn,
bindCredentials: conf.bindCredentials,
searchBase: conf.searchBase,
searchFilter: conf.searchFilter,
tlsOptions: (conf.tlsEnabled) ? {
rejectUnauthorized: conf.verifyTLSCertificate,
ca: [
fs.readFileSync(conf.tlsCertPath)
]
} : {}
},
usernameField: 'email',
2019-04-27 03:59:35 +00:00
passwordField: 'password',
2020-09-05 19:19:18 +00:00
passReqToCallback: true
}, async (req, profile, cb) => {
2019-04-27 03:59:35 +00:00
try {
const userId = _.get(profile, conf.mappingUID, null)
if (!userId) {
throw new Error('Invalid Unique ID field mapping!')
}
const user = await WIKI.models.users.processProfile({
providerKey: req.params.strategy,
2019-04-27 03:59:35 +00:00
profile: {
id: userId,
email: String(_.get(profile, conf.mappingEmail, '')).split(',')[0],
2019-04-27 03:59:35 +00:00
displayName: _.get(profile, conf.mappingDisplayName, '???'),
picture: _.get(profile, conf.mappingPicture, '')
}
2019-04-27 03:59:35 +00:00
})
cb(null, user)
} catch (err) {
2019-06-05 02:23:32 +00:00
if (WIKI.config.flags.ldapdebug) {
WIKI.logger.warn('LDAP LOGIN ERROR (c2): ', err)
}
2019-04-27 03:59:35 +00:00
cb(err, null)
}
}
))
}
2017-07-29 21:33:08 +00:00
}