| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586 | 
							- const _ = require('lodash')
 
- /* global WIKI */
 
- // ------------------------------------
 
- // SAML Account
 
- // ------------------------------------
 
- const SAMLStrategy = require('passport-saml').Strategy
 
- module.exports = {
 
-   init (passport, conf) {
 
-     const samlConfig = {
 
-       callbackUrl: conf.callbackURL,
 
-       entryPoint: conf.entryPoint,
 
-       issuer: conf.issuer,
 
-       cert: (conf.cert || '').split('|'),
 
-       signatureAlgorithm: conf.signatureAlgorithm,
 
-       digestAlgorithm: conf.digestAlgorithm,
 
-       identifierFormat: conf.identifierFormat,
 
-       wantAssertionsSigned: conf.wantAssertionsSigned,
 
-       acceptedClockSkewMs: _.toSafeInteger(conf.acceptedClockSkewMs),
 
-       disableRequestedAuthnContext: conf.disableRequestedAuthnContext,
 
-       authnContext: (conf.authnContext || '').split('|'),
 
-       racComparison: conf.racComparison,
 
-       forceAuthn: conf.forceAuthn,
 
-       passive: conf.passive,
 
-       providerName: conf.providerName,
 
-       skipRequestCompression: conf.skipRequestCompression,
 
-       authnRequestBinding: conf.authnRequestBinding,
 
-       passReqToCallback: true
 
-     }
 
-     if (!_.isEmpty(conf.audience)) {
 
-       samlConfig.audience = conf.audience
 
-     }
 
-     if (!_.isEmpty(conf.privateKey)) {
 
-       samlConfig.privateKey = conf.privateKey
 
-     }
 
-     if (!_.isEmpty(conf.decryptionPvk)) {
 
-       samlConfig.decryptionPvk = conf.decryptionPvk
 
-     }
 
-     passport.use(conf.key,
 
-       new SAMLStrategy(samlConfig, async (req, profile, cb) => {
 
-         try {
 
-           const userId = _.get(profile, [conf.mappingUID], null) || _.get(profile, 'nameID', null)
 
-           if (!userId) {
 
-             throw new Error('Invalid or Missing Unique ID field!')
 
-           }
 
-           const user = await WIKI.models.users.processProfile({
 
-             providerKey: req.params.strategy,
 
-             profile: {
 
-               id: userId,
 
-               email: _.get(profile, conf.mappingEmail, ''),
 
-               displayName: _.get(profile, conf.mappingDisplayName, '???'),
 
-               picture: _.get(profile, conf.mappingPicture, '')
 
-             }
 
-           })
 
-           // map users provider groups to wiki groups with the same name, and remove any groups that don't match
 
-           // Code copied from the LDAP implementation with a slight variation on the field we extract the value from
 
-           // In SAML v2 groups come in profile.attributes and can be 1 string or an array of strings
 
-           if (conf.mapGroups) {
 
-             const maybeArrayOfGroups = _.get(profile.attributes, conf.mappingGroups)
 
-             const groups = (maybeArrayOfGroups && !_.isArray(maybeArrayOfGroups)) ? [maybeArrayOfGroups] : maybeArrayOfGroups
 
-             if (groups && _.isArray(groups)) {
 
-               const currentGroups = (await user.$relatedQuery('groups').select('groups.id')).map(g => g.id)
 
-               const expectedGroups = Object.values(WIKI.auth.groups).filter(g => groups.includes(g.name)).map(g => g.id)
 
-               for (const groupId of _.difference(expectedGroups, currentGroups)) {
 
-                 await user.$relatedQuery('groups').relate(groupId)
 
-               }
 
-               for (const groupId of _.difference(currentGroups, expectedGroups)) {
 
-                 await user.$relatedQuery('groups').unrelate().where('groupId', groupId)
 
-               }
 
-             }
 
-           }
 
-           cb(null, user)
 
-         } catch (err) {
 
-           cb(err, null)
 
-         }
 
-       })
 
-     )
 
-   }
 
- }
 
 
  |