oidc_server.js 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. import { addGroupsWithAttributes, addEmail, changeFullname, changeUsername } from './loginHandler';
  2. const fs = Npm.require('fs'); // For file handling
  3. Oidc = {};
  4. httpCa = false;
  5. // Load CA certificate if specified in the environment variable
  6. if (process.env.OAUTH2_CA_CERT !== undefined) {
  7. try {
  8. if (fs.existsSync(process.env.OAUTH2_CA_CERT)) {
  9. httpCa = fs.readFileSync(process.env.OAUTH2_CA_CERT);
  10. }
  11. } catch (e) {
  12. console.log('WARNING: failed loading: ' + process.env.OAUTH2_CA_CERT);
  13. console.log(e);
  14. }
  15. }
  16. var profile = {};
  17. var serviceData = {};
  18. var userinfo = {};
  19. // Function to read the allowed emails from a local file specified in the environment variable
  20. var getAllowedEmailsFromFile = function() {
  21. var allowedEmails = [];
  22. const filePath = process.env.OAUTH2_ALLOWEDEMAILS_FILEPATH; // Get the file path from environment variable
  23. if (!filePath) {
  24. throw new Error("OAUTH2_ALLOWEDEMAILS_FILEPATH environment variable is not set.");
  25. }
  26. try {
  27. // Read the allowed emails file
  28. const data = fs.readFileSync(filePath, 'utf-8');
  29. allowedEmails = data.split('\n').map(email => email.trim());
  30. } catch (error) {
  31. console.error("Error reading allowed emails file:", error);
  32. }
  33. return allowedEmails;
  34. };
  35. // OAuth service registration
  36. OAuth.registerService('oidc', 2, null, function (query) {
  37. var debug = process.env.DEBUG === 'true';
  38. var token = getToken(query);
  39. if (debug) console.log('XXX: register token:', token);
  40. var accessToken = token.access_token || token.id_token;
  41. var expiresAt = (+new Date) + (1000 * parseInt(token.expires_in, 10));
  42. var claimsInAccessToken = (process.env.OAUTH2_ADFS_ENABLED === 'true' ||
  43. process.env.OAUTH2_ADFS_ENABLED === true ||
  44. process.env.OAUTH2_B2C_ENABLED === 'true' ||
  45. process.env.OAUTH2_B2C_ENABLED === true) || false;
  46. if (claimsInAccessToken) {
  47. userinfo = getTokenContent(accessToken);
  48. } else {
  49. userinfo = getUserInfo(accessToken);
  50. }
  51. if (userinfo.ocs) userinfo = userinfo.ocs.data;
  52. if (userinfo.metadata) userinfo = userinfo.metadata;
  53. if (debug) console.log('XXX: userinfo:', userinfo);
  54. serviceData.id = userinfo[process.env.OAUTH2_ID_MAP];
  55. serviceData.username = userinfo[process.env.OAUTH2_USERNAME_MAP];
  56. serviceData.fullname = userinfo[process.env.OAUTH2_FULLNAME_MAP];
  57. serviceData.accessToken = accessToken;
  58. serviceData.expiresAt = expiresAt;
  59. // Oracle OIM and B2C checks remain the same
  60. if (process.env.ORACLE_OIM_ENABLED === 'true' || process.env.ORACLE_OIM_ENABLED === true) {
  61. if (userinfo[process.env.OAUTH2_EMAIL_MAP]) {
  62. serviceData.email = userinfo[process.env.OAUTH2_EMAIL_MAP];
  63. } else {
  64. serviceData.email = userinfo[process.env.OAUTH2_USERNAME_MAP];
  65. }
  66. }
  67. if (process.env.ORACLE_OIM_ENABLED !== 'true' && process.env.ORACLE_OIM_ENABLED !== true) {
  68. serviceData.email = userinfo[process.env.OAUTH2_EMAIL_MAP];
  69. }
  70. if (process.env.OAUTH2_B2C_ENABLED === 'true' || process.env.OAUTH2_B2C_ENABLED === true) {
  71. serviceData.email = userinfo["emails"][0];
  72. }
  73. if (accessToken) {
  74. var tokenContent = getTokenContent(accessToken);
  75. var fields = _.pick(tokenContent, getConfiguration().idTokenWhitelistFields);
  76. _.extend(serviceData, fields);
  77. }
  78. if (token.refresh_token)
  79. serviceData.refreshToken = token.refresh_token;
  80. if (debug) console.log('XXX: serviceData:', serviceData);
  81. profile.name = userinfo[process.env.OAUTH2_FULLNAME_MAP];
  82. profile.email = userinfo[process.env.OAUTH2_EMAIL_MAP];
  83. if (process.env.OAUTH2_B2C_ENABLED === 'true' || process.env.OAUTH2_B2C_ENABLED === true) {
  84. profile.email = userinfo["emails"][0];
  85. }
  86. if (debug) console.log('XXX: profile:', profile);
  87. // New code: Check if the user's email is in the allowed emails list (only if oauth2-checkemails is true)
  88. if (process.env.OAUTH2_CHECKEMAILS === 'true') {
  89. const allowedEmails = getAllowedEmailsFromFile();
  90. if (!allowedEmails.includes(profile.email)) {
  91. throw new Error("Email not allowed: " + profile.email);
  92. }
  93. }
  94. // Temporarily store data from oidc in user.services.oidc.groups to update groups
  95. serviceData.groups = (userinfo["groups"] && userinfo["wekanGroups"]) ? userinfo["wekanGroups"] : userinfo["groups"];
  96. if (Array.isArray(serviceData.groups) && serviceData.groups.length && typeof serviceData.groups[0] === "string") {
  97. user = Meteor.users.findOne({'_id': serviceData.id});
  98. serviceData.groups.forEach(function (groupName, i) {
  99. if (user?.isAdmin && i == 0) {
  100. serviceData.groups[i] = {"isAdmin": true};
  101. serviceData.groups[i]["displayName"] = groupName;
  102. } else {
  103. serviceData.groups[i] = {"displayName": groupName};
  104. }
  105. });
  106. }
  107. // Fix OIDC login loop for integer user ID. Thanks to danielkaiser.
  108. Meteor.call('groupRoutineOnLogin', serviceData, "" + serviceData.id);
  109. Meteor.call('boardRoutineOnLogin', serviceData, "" + serviceData.id);
  110. return {
  111. serviceData: serviceData,
  112. options: { profile: profile }
  113. };
  114. });
  115. // Function to retrieve token based on environment
  116. var getToken = function (query) {
  117. var debug = process.env.DEBUG === 'true';
  118. var config = getConfiguration();
  119. var serverTokenEndpoint = config.tokenEndpoint.includes('https://') ?
  120. config.tokenEndpoint : config.serverUrl + config.tokenEndpoint;
  121. var response;
  122. try {
  123. var postOptions = {
  124. headers: {
  125. Accept: 'application/json',
  126. "User-Agent": "Meteor"
  127. },
  128. params: {
  129. code: query.code,
  130. client_id: config.clientId,
  131. client_secret: OAuth.openSecret(config.secret),
  132. redirect_uri: OAuth._redirectUri('oidc', config),
  133. grant_type: 'authorization_code',
  134. state: query.state
  135. }
  136. };
  137. if (httpCa) {
  138. postOptions['npmRequestOptions'] = { ca: httpCa };
  139. }
  140. response = HTTP.post(serverTokenEndpoint, postOptions);
  141. } catch (err) {
  142. throw _.extend(new Error("Failed to get token from OIDC " + serverTokenEndpoint + ": " + err.message),
  143. { response: err.response });
  144. }
  145. if (response.data.error) {
  146. throw new Error("Failed to complete handshake with OIDC " + serverTokenEndpoint + ": " + response.data.error);
  147. } else {
  148. return response.data;
  149. }
  150. };
  151. // Function to fetch user information from the OIDC service
  152. var getUserInfo = function (accessToken) {
  153. var debug = process.env.DEBUG === 'true';
  154. var config = getConfiguration();
  155. var serverUserinfoEndpoint = config.userinfoEndpoint.includes("https://") ?
  156. config.userinfoEndpoint : config.serverUrl + config.userinfoEndpoint;
  157. var response;
  158. try {
  159. var getOptions = {
  160. headers: {
  161. "User-Agent": "Meteor",
  162. "Authorization": "Bearer " + accessToken
  163. }
  164. };
  165. if (httpCa) {
  166. getOptions['npmRequestOptions'] = { ca: httpCa };
  167. }
  168. response = HTTP.get(serverUserinfoEndpoint, getOptions);
  169. } catch (err) {
  170. throw _.extend(new Error("Failed to fetch userinfo from OIDC " + serverUserinfoEndpoint + ": " + err.message),
  171. {response: err.response});
  172. }
  173. return response.data;
  174. };
  175. // Function to get the configuration of the OIDC service
  176. var getConfiguration = function () {
  177. var config = ServiceConfiguration.configurations.findOne({ service: 'oidc' });
  178. if (!config) {
  179. throw new ServiceConfiguration.ConfigError('Service oidc not configured.');
  180. }
  181. return config;
  182. };
  183. // Function to decode the token content (JWT)
  184. var getTokenContent = function (token) {
  185. var content = null;
  186. if (token) {
  187. try {
  188. var parts = token.split('.');
  189. var header = JSON.parse(Buffer.from(parts[0], 'base64').toString());
  190. content = JSON.parse(Buffer.from(parts[1], 'base64').toString());
  191. } catch (err) {
  192. content = { exp: 0 };
  193. }
  194. }
  195. return content;
  196. }
  197. // Meteor methods to update groups and boards on login
  198. Meteor.methods({
  199. 'groupRoutineOnLogin': function(info, userId) {
  200. check(info, Object);
  201. check(userId, String);
  202. var propagateOidcData = process.env.PROPAGATE_OIDC_DATA || false;
  203. if (propagateOidcData) {
  204. users = Meteor.users;
  205. user = users.findOne({'services.oidc.id': userId});
  206. if (user) {
  207. if (info.groups) {
  208. addGroupsWithAttributes(user, info.groups);
  209. }
  210. if(info.email) addEmail(user, info.email);
  211. if(info.fullname) changeFullname(user, info.fullname);
  212. if(info.username) changeUsername(user, info.username);
  213. }
  214. }
  215. }
  216. });
  217. Meteor.methods({
  218. 'boardRoutineOnLogin': function(info, userId) {
  219. check(info, Object);
  220. check(userId, String);
  221. // Add board updates here if needed
  222. }
  223. });