0.1.1 • Published 5 years ago

verdaccio-ldap-extended v0.1.1

Weekly downloads
3
License
MIT
Repository
github
Last release
5 years ago

verdaccio-ldap

verdaccio-ldap-extended is a fork of verdaccio-ldap which is a fork of sinopia-ldap that aims to keep backwards compatibility with sinopia, while keeping up with npm changes.

Differences with parent

Differs with verdaccio-ldap in accounting ALL of user's groups instead of only root ones: ldapauth#a3b6310a

Installation

$ npm install verdaccio
$ npm install verdaccio-ldap

A detailed example of the verdaccio-ldap plugin + OpenLDAP server packed in Docker is available here.

Config

Add to your config.yaml:

auth:
  'ldap-extended':
    type: ldap
    # Optional
    # If set, the outcome of plugin would consider these groups only (cut off unimportant LDAP groups)
    considerableGroups: ['groupA', 'groupB']
    client_options:
      url: "ldaps://ldap.example.com"
      # Only required if you need auth to bind
      adminDn: "cn=admin,dc=example,dc=com"
      adminPassword: "admin"
      # Search base for users
      searchBase: "ou=People,dc=example,dc=com"
      searchFilter: "(uid={{username}})"
      # If you are using groups, this is also needed
      groupDnProperty: 'cn',
      groupSearchBase: 'ou=groups,dc=myorg,dc=com',
      # If you have memberOf support on your ldap
      searchAttributes: ['*', 'memberOf']
      # Else, if you don't (use one or the other):
      # groupSearchFilter: '(memberUid={{dn}})'
      # 
      # Optional, default false.
      # If true, then up to 100 credentials at a time will be cached for 5 minutes.
      cache: false
      # Optional
      reconnect: true

For plugin writers

It's called as:

require('verdaccio-ldap-extended')(config, stuff)

Where:

  • config - module's own config
  • stuff - collection of different internal verdaccio objects
    • stuff.config - main config
    • stuff.logger - logger

This should export two functions:

  • adduser(user, password, cb)

    It should respond with:

    • cb(err) in case of an error (error will be returned to user)
    • cb(null, false) in case registration is disabled (next auth plugin will be executed)
    • cb(null, true) in case user registered successfully

    It's useful to set err.status property to set http status code (e.g. err.status = 403).

  • authenticate(user, password, cb)

    It should respond with:

    • cb(err) in case of a fatal error (error will be returned to user, keep those rare)
    • cb(null, false) in case user not authenticated (next auth plugin will be executed)
    • cb(null, [groups]) in case user is authenticated

    Groups is an array of all users/usergroups this user has access to. You should probably include username itself here.