fix(saml): adapt for new package @node-saml/passport-saml

Signed-off-by: Erik Michelson <github@erik.michelson.eu>
This commit is contained in:
Erik Michelson 2025-02-14 01:53:41 +01:00
parent 38578f2b4c
commit 1a5030dbc1

View file

@ -2,7 +2,7 @@
const Router = require('express').Router const Router = require('express').Router
const passport = require('passport') const passport = require('passport')
const SamlStrategy = require('passport-saml').Strategy const SamlStrategy = require('@node-saml/passport-saml').Strategy
const config = require('../../../config') const config = require('../../../config')
const models = require('../../../models') const models = require('../../../models')
const logger = require('../../../logger') const logger = require('../../../logger')
@ -12,98 +12,120 @@ const intersection = function (array1, array2) { return array1.filter((n) => arr
const samlAuth = module.exports = Router() const samlAuth = module.exports = Router()
passport.use(new SamlStrategy({ passport.use(
callbackUrl: config.serverURL + '/auth/saml/callback', new SamlStrategy(
entryPoint: config.saml.idpSsoUrl, {
issuer: config.saml.issuer || config.serverURL, callbackUrl: config.serverURL + '/auth/saml/callback',
privateKey: config.saml.clientCert === undefined entryPoint: config.saml.idpSsoUrl,
? undefined issuer: config.saml.issuer || config.serverURL,
: (function () { privateKey: config.saml.clientCert === undefined
? undefined
: (function () {
try {
return fs.readFileSync(config.saml.clientCert, 'utf-8')
} catch (e) {
logger.error(`SAML client certificate: ${e.message}`)
}
}()),
idpCert: (function () {
try { try {
return fs.readFileSync(config.saml.clientCert, 'utf-8') return fs.readFileSync(config.saml.idpCert, 'utf-8')
} catch (e) { } catch (e) {
logger.error(`SAML client certificate: ${e.message}`) logger.error(`SAML idp certificate: ${e.message}`)
process.exit(1)
} }
}()), }()),
cert: (function () { identifierFormat: config.saml.identifierFormat,
try { disableRequestedAuthnContext: config.saml.disableRequestedAuthnContext
return fs.readFileSync(config.saml.idpCert, 'utf-8')
} catch (e) {
logger.error(`SAML idp certificate: ${e.message}`)
process.exit(1)
}
}()),
identifierFormat: config.saml.identifierFormat,
disableRequestedAuthnContext: config.saml.disableRequestedAuthnContext
}, function (user, done) {
// check authorization if needed
if (config.saml.externalGroups && config.saml.groupAttribute) {
const externalGroups = intersection(config.saml.externalGroups, user[config.saml.groupAttribute])
if (externalGroups.length > 0) {
logger.error('saml permission denied: ' + externalGroups.join(', '))
return done('Permission denied', null)
}
}
if (config.saml.requiredGroups && config.saml.groupAttribute) {
if (intersection(config.saml.requiredGroups, user[config.saml.groupAttribute]).length === 0) {
logger.error('saml permission denied')
return done('Permission denied', null)
}
}
// user creation
const uuid = user[config.saml.attribute.id] || user.nameID
const profile = {
provider: 'saml',
id: 'SAML-' + uuid,
username: user[config.saml.attribute.username] || user.nameID,
emails: user[config.saml.attribute.email] ? [user[config.saml.attribute.email]] : []
}
if (profile.emails.length === 0 && config.saml.identifierFormat === 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress') {
profile.emails.push(user.nameID)
}
const stringifiedProfile = JSON.stringify(profile)
models.User.findOrCreate({
where: {
profileid: profile.id.toString()
}, },
defaults: { // sign-in
profile: stringifiedProfile function (user, done) {
} // check authorization if needed
}).spread(function (user, created) { if (config.saml.externalGroups && config.saml.groupAttribute) {
if (user) { const externalGroups = intersection(config.saml.externalGroups, user[config.saml.groupAttribute])
let needSave = false if (externalGroups.length > 0) {
if (user.profile !== stringifiedProfile) { logger.error('saml permission denied: ' + externalGroups.join(', '))
user.profile = stringifiedProfile return done('Permission denied', null)
needSave = true }
} }
if (needSave) { if (config.saml.requiredGroups && config.saml.groupAttribute) {
user.save().then(function () { if (intersection(config.saml.requiredGroups, user[config.saml.groupAttribute]).length === 0) {
logger.debug(`user login: ${user.id}`) logger.error('saml permission denied')
return done(null, user) return done('Permission denied', null)
}) }
} else {
logger.debug(`user login: ${user.id}`)
return done(null, user)
} }
// user creation
const uuid = user[config.saml.attribute.id] || user.nameID
const profile = {
provider: 'saml',
id: 'SAML-' + uuid,
username: user[config.saml.attribute.username] || user.nameID,
emails: user[config.saml.attribute.email] ? [user[config.saml.attribute.email]] : []
}
if (profile.emails.length === 0 && config.saml.identifierFormat === 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress') {
profile.emails.push(user.nameID)
}
const stringifiedProfile = JSON.stringify(profile)
models.User.findOrCreate({
where: {
profileid: profile.id.toString()
},
defaults: {
profile: stringifiedProfile
}
}).spread(function (user, created) {
if (user) {
let needSave = false
if (user.profile !== stringifiedProfile) {
user.profile = stringifiedProfile
needSave = true
}
if (needSave) {
user.save().then(function () {
logger.debug(`user login: ${user.id}`)
return done(null, user)
})
} else {
logger.debug(`user login: ${user.id}`)
return done(null, user)
}
}
}).catch(function (err) {
logger.error('saml auth failed: ' + err.message)
return done(err, null)
})
},
// logout
function (profile, done) {
return done(null, profile)
} }
}).catch(function (err) { )
logger.error('saml auth failed: ' + err.message) )
return done(err, null)
})
}))
samlAuth.get('/auth/saml', samlAuth.get('/auth/saml',
passport.authenticate('saml', { passport.authenticate('saml', {
successReturnToOrRedirect: config.serverURL + '/', failureRedirect: config.serverURL + '/',
failureRedirect: config.serverURL + '/' failureFlash: true
}) }),
function (req, res) {
res.redirect('/')
}
) )
samlAuth.post('/auth/saml/callback', urlencodedParser, samlAuth.use('/auth/saml/callback', urlencodedParser,
function (req, res, next) {
if (req.method !== 'GET' && req.method !== 'POST') {
return res.status(405).end()
}
return next()
},
passport.authenticate('saml', { passport.authenticate('saml', {
successReturnToOrRedirect: config.serverURL + '/', successReturnToOrRedirect: config.serverURL + '/',
failureRedirect: config.serverURL + '/' failureRedirect: config.serverURL + '/'
}) }),
function (req, res) {
res.redirect('/')
}
) )
samlAuth.get('/auth/saml/metadata', function (req, res) { samlAuth.get('/auth/saml/metadata', function (req, res) {