b5fc6db75d
We have various places with overly simple if statements that could be handled by our logging library. Also a lot of those logs are not marked as debug logs but as info logs, which can cause confusion during debugging. This patch removed unneeded if clauses around debug logging statements, reworks debug log messages towards ECMA templates and add some new logging statements which might be helpful in order to debug things like image uploads. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
96 lines
3.2 KiB
JavaScript
96 lines
3.2 KiB
JavaScript
'use strict'
|
|
|
|
const Router = require('express').Router
|
|
const passport = require('passport')
|
|
const SamlStrategy = require('passport-saml').Strategy
|
|
const config = require('../../../config')
|
|
const models = require('../../../models')
|
|
const logger = require('../../../logger')
|
|
const { urlencodedParser } = require('../../utils')
|
|
const fs = require('fs')
|
|
const intersection = function (array1, array2) { return array1.filter((n) => array2.includes(n)) }
|
|
|
|
let samlAuth = module.exports = Router()
|
|
|
|
passport.use(new SamlStrategy({
|
|
callbackUrl: config.serverURL + '/auth/saml/callback',
|
|
entryPoint: config.saml.idpSsoUrl,
|
|
issuer: config.saml.issuer || config.serverURL,
|
|
cert: fs.readFileSync(config.saml.idpCert, 'utf-8'),
|
|
identifierFormat: config.saml.identifierFormat,
|
|
disableRequestedAuthnContext: config.saml.disableRequestedAuthnContext
|
|
}, function (user, done) {
|
|
// check authorization if needed
|
|
if (config.saml.externalGroups && config.saml.groupAttribute) {
|
|
var externalGroups = intersection(config.saml.externalGroups, user[config.saml.groupAttribute])
|
|
if (externalGroups.length > 0) {
|
|
logger.error('saml permission denied: ' + externalGroups.join(', '))
|
|
return done('Permission denied', null)
|
|
}
|
|
}
|
|
if (config.saml.requiredGroups && config.saml.groupAttribute) {
|
|
if (intersection(config.saml.requiredGroups, user[config.saml.groupAttribute]).length === 0) {
|
|
logger.error('saml permission denied')
|
|
return done('Permission denied', null)
|
|
}
|
|
}
|
|
// user creation
|
|
var uuid = user[config.saml.attribute.id] || user.nameID
|
|
var profile = {
|
|
provider: 'saml',
|
|
id: 'SAML-' + uuid,
|
|
username: user[config.saml.attribute.username] || user.nameID,
|
|
emails: user[config.saml.attribute.email] ? [user[config.saml.attribute.email]] : []
|
|
}
|
|
if (profile.emails.length === 0 && config.saml.identifierFormat === 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress') {
|
|
profile.emails.push(user.nameID)
|
|
}
|
|
var stringifiedProfile = JSON.stringify(profile)
|
|
models.User.findOrCreate({
|
|
where: {
|
|
profileid: profile.id.toString()
|
|
},
|
|
defaults: {
|
|
profile: stringifiedProfile
|
|
}
|
|
}).spread(function (user, created) {
|
|
if (user) {
|
|
var needSave = false
|
|
if (user.profile !== stringifiedProfile) {
|
|
user.profile = stringifiedProfile
|
|
needSave = true
|
|
}
|
|
if (needSave) {
|
|
user.save().then(function () {
|
|
logger.debug(`user login: ${user.id}`)
|
|
return done(null, user)
|
|
})
|
|
} else {
|
|
logger.debug(`user login: ${user.id}`)
|
|
return done(null, user)
|
|
}
|
|
}
|
|
}).catch(function (err) {
|
|
logger.error('saml auth failed: ' + err)
|
|
return done(err, null)
|
|
})
|
|
}))
|
|
|
|
samlAuth.get('/auth/saml',
|
|
passport.authenticate('saml', {
|
|
successReturnToOrRedirect: config.serverURL + '/',
|
|
failureRedirect: config.serverURL + '/'
|
|
})
|
|
)
|
|
|
|
samlAuth.post('/auth/saml/callback', urlencodedParser,
|
|
passport.authenticate('saml', {
|
|
successReturnToOrRedirect: config.serverURL + '/',
|
|
failureRedirect: config.serverURL + '/'
|
|
})
|
|
)
|
|
|
|
samlAuth.get('/auth/saml/metadata', function (req, res) {
|
|
res.type('application/xml')
|
|
res.send(passport._strategy('saml').generateServiceProviderMetadata())
|
|
})
|