| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586 | const _ = require('lodash')/* global WIKI */// ------------------------------------// SAML Account// ------------------------------------const SAMLStrategy = require('passport-saml').Strategymodule.exports = {  init (passport, conf) {    const samlConfig = {      callbackUrl: conf.callbackURL,      entryPoint: conf.entryPoint,      issuer: conf.issuer,      cert: (conf.cert || '').split('|'),      signatureAlgorithm: conf.signatureAlgorithm,      digestAlgorithm: conf.digestAlgorithm,      identifierFormat: conf.identifierFormat,      wantAssertionsSigned: conf.wantAssertionsSigned,      acceptedClockSkewMs: _.toSafeInteger(conf.acceptedClockSkewMs),      disableRequestedAuthnContext: conf.disableRequestedAuthnContext,      authnContext: (conf.authnContext || '').split('|'),      racComparison: conf.racComparison,      forceAuthn: conf.forceAuthn,      passive: conf.passive,      providerName: conf.providerName,      skipRequestCompression: conf.skipRequestCompression,      authnRequestBinding: conf.authnRequestBinding,      passReqToCallback: true    }    if (!_.isEmpty(conf.audience)) {      samlConfig.audience = conf.audience    }    if (!_.isEmpty(conf.privateKey)) {      samlConfig.privateKey = conf.privateKey    }    if (!_.isEmpty(conf.decryptionPvk)) {      samlConfig.decryptionPvk = conf.decryptionPvk    }    passport.use(conf.key,      new SAMLStrategy(samlConfig, async (req, profile, cb) => {        try {          const userId = _.get(profile, [conf.mappingUID], null) || _.get(profile, 'nameID', null)          if (!userId) {            throw new Error('Invalid or Missing Unique ID field!')          }          const user = await WIKI.models.users.processProfile({            providerKey: req.params.strategy,            profile: {              id: userId,              email: _.get(profile, conf.mappingEmail, ''),              displayName: _.get(profile, conf.mappingDisplayName, '???'),              picture: _.get(profile, conf.mappingPicture, '')            }          })          // map users provider groups to wiki groups with the same name, and remove any groups that don't match          // Code copied from the LDAP implementation with a slight variation on the field we extract the value from          // In SAML v2 groups come in profile.attributes and can be 1 string or an array of strings          if (conf.mapGroups) {            const maybeArrayOfGroups = _.get(profile.attributes, conf.mappingGroups)            const groups = (maybeArrayOfGroups && !_.isArray(maybeArrayOfGroups)) ? [maybeArrayOfGroups] : maybeArrayOfGroups            if (groups && _.isArray(groups)) {              const currentGroups = (await user.$relatedQuery('groups').select('groups.id')).map(g => g.id)              const expectedGroups = Object.values(WIKI.auth.groups).filter(g => groups.includes(g.name)).map(g => g.id)              for (const groupId of _.difference(expectedGroups, currentGroups)) {                await user.$relatedQuery('groups').relate(groupId)              }              for (const groupId of _.difference(currentGroups, expectedGroups)) {                await user.$relatedQuery('groups').unrelate().where('groupId', groupId)              }            }          }          cb(null, user)        } catch (err) {          cb(err, null)        }      })    )  }}
 |