1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586 |
- const _ = require('lodash')
- /* global WIKI */
- // ------------------------------------
- // SAML Account
- // ------------------------------------
- const SAMLStrategy = require('passport-saml').Strategy
- module.exports = {
- init (passport, conf) {
- const samlConfig = {
- callbackUrl: conf.callbackURL,
- entryPoint: conf.entryPoint,
- issuer: conf.issuer,
- cert: (conf.cert || '').split('|'),
- signatureAlgorithm: conf.signatureAlgorithm,
- digestAlgorithm: conf.digestAlgorithm,
- identifierFormat: conf.identifierFormat,
- wantAssertionsSigned: conf.wantAssertionsSigned,
- acceptedClockSkewMs: _.toSafeInteger(conf.acceptedClockSkewMs),
- disableRequestedAuthnContext: conf.disableRequestedAuthnContext,
- authnContext: (conf.authnContext || '').split('|'),
- racComparison: conf.racComparison,
- forceAuthn: conf.forceAuthn,
- passive: conf.passive,
- providerName: conf.providerName,
- skipRequestCompression: conf.skipRequestCompression,
- authnRequestBinding: conf.authnRequestBinding,
- passReqToCallback: true
- }
- if (!_.isEmpty(conf.audience)) {
- samlConfig.audience = conf.audience
- }
- if (!_.isEmpty(conf.privateKey)) {
- samlConfig.privateKey = conf.privateKey
- }
- if (!_.isEmpty(conf.decryptionPvk)) {
- samlConfig.decryptionPvk = conf.decryptionPvk
- }
- passport.use(conf.key,
- new SAMLStrategy(samlConfig, async (req, profile, cb) => {
- try {
- const userId = _.get(profile, [conf.mappingUID], null) || _.get(profile, 'nameID', null)
- if (!userId) {
- throw new Error('Invalid or Missing Unique ID field!')
- }
- const user = await WIKI.models.users.processProfile({
- providerKey: req.params.strategy,
- profile: {
- id: userId,
- email: _.get(profile, conf.mappingEmail, ''),
- displayName: _.get(profile, conf.mappingDisplayName, '???'),
- picture: _.get(profile, conf.mappingPicture, '')
- }
- })
- // map users provider groups to wiki groups with the same name, and remove any groups that don't match
- // Code copied from the LDAP implementation with a slight variation on the field we extract the value from
- // In SAML v2 groups come in profile.attributes and can be 1 string or an array of strings
- if (conf.mapGroups) {
- const maybeArrayOfGroups = _.get(profile.attributes, conf.mappingGroups)
- const groups = (maybeArrayOfGroups && !_.isArray(maybeArrayOfGroups)) ? [maybeArrayOfGroups] : maybeArrayOfGroups
- if (groups && _.isArray(groups)) {
- const currentGroups = (await user.$relatedQuery('groups').select('groups.id')).map(g => g.id)
- const expectedGroups = Object.values(WIKI.auth.groups).filter(g => groups.includes(g.name)).map(g => g.id)
- for (const groupId of _.difference(expectedGroups, currentGroups)) {
- await user.$relatedQuery('groups').relate(groupId)
- }
- for (const groupId of _.difference(currentGroups, expectedGroups)) {
- await user.$relatedQuery('groups').unrelate().where('groupId', groupId)
- }
- }
- }
- cb(null, user)
- } catch (err) {
- cb(err, null)
- }
- })
- )
- }
- }
|