12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758 |
- const _ = require('lodash')
- /* global WIKI */
- // ------------------------------------
- // Azure AD Account
- // ------------------------------------
- const OIDCStrategy = require('passport-azure-ad').OIDCStrategy
- module.exports = {
- init (passport, conf) {
- // Workaround for Chrome's SameSite cookies
- // cookieSameSite needs useCookieInsteadOfSession to work correctly.
- // cookieEncryptionKeys is extracted from conf.cookieEncryptionKeyString.
- // It's a concatnation of 44-character length strings each of which represents a single pair of key/iv.
- // Valid cookieEncryptionKeys enables both cookieSameSite and useCookieInsteadOfSession.
- const keyArray = [];
- if (conf.cookieEncryptionKeyString) {
- let keyString = conf.cookieEncryptionKeyString;
- while (keyString.length >= 44) {
- keyArray.push({ key: keyString.substring(0, 32), iv: keyString.substring(32, 44) });
- keyString = keyString.substring(44);
- }
- }
- passport.use(conf.key,
- new OIDCStrategy({
- identityMetadata: conf.entryPoint,
- clientID: conf.clientId,
- redirectUrl: conf.callbackURL,
- responseType: 'id_token',
- responseMode: 'form_post',
- scope: ['profile', 'email', 'openid'],
- allowHttpForRedirectUrl: WIKI.IS_DEBUG,
- passReqToCallback: true,
- cookieSameSite: keyArray.length > 0,
- useCookieInsteadOfSession: keyArray.length > 0,
- cookieEncryptionKeys: keyArray
- }, async (req, iss, sub, profile, cb) => {
- const usrEmail = _.get(profile, '_json.email', null) || _.get(profile, '_json.preferred_username')
- try {
- const user = await WIKI.models.users.processProfile({
- providerKey: req.params.strategy,
- profile: {
- id: profile.oid,
- displayName: profile.displayName,
- email: usrEmail,
- picture: ''
- }
- })
- cb(null, user)
- } catch (err) {
- cb(err, null)
- }
- })
- )
- }
- }
|