| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697 | 
							- /* global WIKI */
 
- // ------------------------------------
 
- // LDAP Account
 
- // ------------------------------------
 
- const LdapStrategy = require('passport-ldapauth').Strategy
 
- const fs = require('fs')
 
- const _ = require('lodash')
 
- module.exports = {
 
-   init (passport, conf) {
 
-     passport.use(conf.key,
 
-       new LdapStrategy({
 
-         server: {
 
-           url: conf.url,
 
-           bindDn: conf.bindDn,
 
-           bindCredentials: conf.bindCredentials,
 
-           searchBase: conf.searchBase,
 
-           searchFilter: conf.searchFilter,
 
-           tlsOptions: getTlsOptions(conf),
 
-           ...conf.mapGroups && {
 
-             groupSearchBase: conf.groupSearchBase,
 
-             groupSearchFilter: conf.groupSearchFilter,
 
-             groupSearchScope: conf.groupSearchScope,
 
-             groupDnProperty: conf.groupDnProperty,
 
-             groupSearchAttributes: [conf.groupNameField]
 
-           },
 
-           includeRaw: true
 
-         },
 
-         usernameField: 'email',
 
-         passwordField: 'password',
 
-         passReqToCallback: true
 
-       }, async (req, profile, cb) => {
 
-         try {
 
-           const userId = _.get(profile, conf.mappingUID, null)
 
-           if (!userId) {
 
-             throw new Error('Invalid Unique ID field mapping!')
 
-           }
 
-           const user = await WIKI.models.users.processProfile({
 
-             providerKey: req.params.strategy,
 
-             profile: {
 
-               id: userId,
 
-               email: String(_.get(profile, conf.mappingEmail, '')).split(',')[0],
 
-               displayName: _.get(profile, conf.mappingDisplayName, '???'),
 
-               picture: _.get(profile, `_raw.${conf.mappingPicture}`, '')
 
-             }
 
-           })
 
-           // map users LDAP groups to wiki groups with the same name, and remove any groups that don't match LDAP
 
-           if (conf.mapGroups) {
 
-             const ldapGroups = _.get(profile, '_groups')
 
-             if (ldapGroups && _.isArray(ldapGroups)) {
 
-               const groups = ldapGroups.map(g => g[conf.groupNameField])
 
-               const currentGroups = (await user.$relatedQuery('groups').select('groups.id')).map(g => g.id)
 
-               const expectedGroups = Object.values(WIKI.auth.groups).filter(g => groups.includes(g.name)).map(g => g.id)
 
-               for (const groupId of _.difference(expectedGroups, currentGroups)) {
 
-                 await user.$relatedQuery('groups').relate(groupId)
 
-               }
 
-               for (const groupId of _.difference(currentGroups, expectedGroups)) {
 
-                 await user.$relatedQuery('groups').unrelate().where('groupId', groupId)
 
-               }
 
-             }
 
-           }
 
-           cb(null, user)
 
-         } catch (err) {
 
-           if (WIKI.config.flags.ldapdebug) {
 
-             WIKI.logger.warn('LDAP LOGIN ERROR (c2): ', err)
 
-           }
 
-           cb(err, null)
 
-         }
 
-       }
 
-       ))
 
-   }
 
- }
 
- function getTlsOptions(conf) {
 
-   if (!conf.tlsEnabled) {
 
-     return {}
 
-   }
 
-   if (!conf.tlsCertPath) {
 
-     return {
 
-       rejectUnauthorized: conf.verifyTLSCertificate
 
-     }
 
-   }
 
-   const caList = []
 
-   if (conf.verifyTLSCertificate) {
 
-     caList.push(fs.readFileSync(conf.tlsCertPath))
 
-   }
 
-   return {
 
-     rejectUnauthorized: conf.verifyTLSCertificate,
 
-     ca: caList
 
-   }
 
- }
 
 
  |