-
Notifications
You must be signed in to change notification settings - Fork 7
/
ctldap-site.js
177 lines (168 loc) · 7.26 KB
/
ctldap-site.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
/**
* ctldap - ChurchTools LDAP-Wrapper 3.0
* @copyright 2017-2023 Michael Lux
* @licence GNU/GPL v3.0
*/
import ldapEscape from "ldap-escape";
import got from "got";
import bcrypt from "@node-rs/bcrypt";
import argon2 from "@node-rs/argon2";
import { CtldapConfig } from "./ctldap-config.js"
import { CookieJar } from "tough-cookie";
import { logTrace, logWarn } from "./ctldap.js"
export class CtldapSite {
/**
* CtldapSite Constructor.
* @param {CtldapConfig} config The main CtldapConfig for fallback values.
* @param {string} name The name (i.e. also base DN) of the site.
* @param {object} site The site's config object.
*/
constructor(config, name, site) {
// Take ldapUser from main config if not specified for site.
this.ldapUser = site.ldapUser || config.ldapUser;
this.ldapPassword = site.ldapPassword;
this.specialGroupMappings = site.specialGroupMappings;
this.dnLowerCase = CtldapConfig.asOptionalBool(site.dnLowerCase);
this.emailLowerCase = CtldapConfig.asOptionalBool(site.emailLowerCase);
this.emailsUnique = CtldapConfig.asOptionalBool(site.emailsUnique);
this.name = name;
this.fnUserDn = (cn) => ldapEscape.dn`cn=${cn},ou=users,o=${name}`;
this.fnGroupDn = (cn) => ldapEscape.dn`cn=${cn},ou=groups,o=${name}`;
// Let us keep cookies, which may improve CT API performance.
// We have to use a pool of CookieJars in order to avoid ChurchTools HTTP 403 bugs.
const cookieJars = []
this.api = got.extend({
headers: {"Authorization": `Login ${site.apiToken}`},
prefixUrl: `${site.ctUri.replace(/\/$/g, '')}/api`,
retry: {
statusCodes: [403, 408, 413, 429, 500, 502, 503, 504, 521, 522, 524]
},
hooks: {
beforeRequest: [
options => {
let cookieJar = cookieJars.pop()
if (!cookieJar) {
// "undefined" is fine as "store" parameter here, it results in memory storage.
cookieJar = new CookieJar(undefined);
logTrace(site, "Assign new CookieJar.")
} else {
logTrace(site, () => `Reusing CookieJar: ${JSON.stringify(cookieJar)}`)
}
options.cookieJar = cookieJar
}
],
beforeRetry: [
(error, retryCount) => {
if (error.response.statusCode === 403) {
logWarn(
this,
`CT API responded with HTTP 403, clearing cookies before retry ${retryCount}...`
);
error.options.cookieJar.removeAllCookiesSync();
}
}
],
afterResponse: [
(response, _retryWithMergedOptions) => {
// Return CookieJar to pool
if (response.statusCode === 200) {
const cookieJar = response.request.options.cookieJar
logTrace(site, () => `Return CookieJar: ${JSON.stringify(cookieJar)}`)
cookieJars.push(cookieJar)
}
return response;
}
],
},
responseType: 'json',
resolveBodyOnly: true,
http2: true
});
this.adminDn = this.fnUserDn(site.ldapUser);
this.CACHE = {
pagination: {}
};
this.loginErrorCount = 0;
this.loginBlockedDate = null;
const identityFn = (p) => p;
const stringLowerFn = (s) => typeof s === "string" ? s.toLowerCase() : s;
if (this.dnLowerCase || ((this.dnLowerCase === undefined) && config.dnLowerCase)) {
this.compatTransform = stringLowerFn;
} else {
this.compatTransform = identityFn;
}
if (this.emailLowerCase || ((this.emailLowerCase === undefined) && config.emailLowerCase)) {
this.compatTransformEmail = stringLowerFn;
} else {
this.compatTransformEmail = identityFn;
}
if (this.emailsUnique || ((this.emailsUnique === undefined) && config.emailsUnique)) {
this.uniqueEmails = (users) => {
const mails = {};
return users.filter((user) => {
if (!user.attributes.email) {
return false;
}
const result = !(user.attributes.email in mails);
mails[user.attributes.email] = true;
return result;
});
};
} else {
this.uniqueEmails = identityFn;
}
// If LDAP admin password has been provided, set the right verification algorithm based on hash format.
if (this.ldapPassword) {
if (/^\$2[yab]\$/.test(this.ldapPassword)) {
// Assume bcrypt hash
this.checkPassword = async (password) => {
const hash = this.ldapPassword.replace(/^\$2y\$/, '$2a$');
if (!await bcrypt.compare(password, hash)) {
throw Error("Wrong password, bcrypt hash didn't match!");
}
};
} else if (/^\$argon2[id]{1,2}\$/.test(this.ldapPassword)) {
// Assume argon2 hash
this.checkPassword = async (password) => {
if (!await argon2.verify(this.ldapPassword, password)) {
throw Error("Wrong password, argon2 hash didn't match!");
}
}
} else {
// Assume plaintext password
this.checkPassword = async (password) => {
if (password !== this.ldapPassword) {
throw Error("Wrong password, plaintext didn't match!")
}
};
}
}
}
/**
* Tries to perform a local LDAP admin authentication, locking for one day after 5 failed login approaches.
* @param password Password to use for LDAP admin authentication.
* @returns {Promise<void>} Promise resolves upon successful authentication, rejects on error.
*/
async authenticateAdmin (password) {
if (this.loginBlockedDate) {
const now = new Date();
const checkDate = new Date(this.loginBlockedDate.getTime() + 1000 * 3600 * 24); // one day
if (now < checkDate) {
throw Error("Login blocked!");
} else {
this.loginBlockedDate = null;
this.loginErrorCount = 0;
}
}
try {
// Delegate password check to the associated algorithm based on type of password hashing, see below.
await this.checkPassword(password);
} catch (error) {
this.loginErrorCount += 1;
if (this.loginErrorCount > 5) {
this.loginBlockedDate = new Date();
}
throw error;
}
};
}