2020-05-04 01:16:54 +00:00
|
|
|
const { Controller } = require('libflitter')
|
|
|
|
const FlitterProfileMapper = require('../../classes/saml/FlitterProfileMapper')
|
|
|
|
const samlp = require('samlp')
|
|
|
|
|
|
|
|
class SAMLController extends Controller {
|
|
|
|
static get services() {
|
2020-05-17 04:55:08 +00:00
|
|
|
return [...super.services, 'saml', 'output', 'Vue', 'configs', 'models']
|
2020-05-04 01:16:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async get_metadata(req, res, next) {
|
|
|
|
return samlp.metadata({
|
|
|
|
issuer: this.saml.config().provider_name,
|
|
|
|
cert: await this.saml.public_cert(),
|
|
|
|
logoutEndpointPaths: {
|
|
|
|
redirect: '/saml/logout',
|
|
|
|
},
|
|
|
|
redirectEndpointPath: '/saml/sso',
|
|
|
|
postEndpointPath: '/saml/sso',
|
|
|
|
})(req, res, next)
|
|
|
|
}
|
|
|
|
|
|
|
|
async get_sso(req, res, next) {
|
|
|
|
const index = await req.saml.participants.issue({ service_provider: req.saml_request.service_provider })
|
|
|
|
|
2020-05-17 04:55:08 +00:00
|
|
|
// Apply the appropriate IAM policy if this SAML SP is associated with an App
|
|
|
|
// If the SAML service provider has no associated application, just allow it
|
|
|
|
// TODO test this
|
|
|
|
const associated_app = await req.saml_request.service_provider.application()
|
|
|
|
if ( associated_app ) {
|
|
|
|
const Policy = this.models.get('iam:Policy')
|
|
|
|
const can_access = await Policy.check_user_access(req.user, associated_app.id)
|
|
|
|
if ( !can_access ) {
|
|
|
|
return this.Vue.auth_message(res, {
|
2020-05-31 01:16:10 +00:00
|
|
|
message: req.T('saml.no_access').replace('APP_NAME', associated_app.name),
|
2020-05-17 04:55:08 +00:00
|
|
|
next_destination: '/dash',
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-04 01:16:54 +00:00
|
|
|
return samlp.auth({
|
|
|
|
issuer: this.saml.config().provider_name,
|
|
|
|
cert: await this.saml.public_cert(),
|
|
|
|
key: await this.saml.private_key(),
|
|
|
|
getPostURL: (wtrealm, wreply, req, callback) => {
|
2020-05-31 01:16:10 +00:00
|
|
|
this.output.debug(`${req.T('saml.redirect_url')} ${req.saml_request.service_provider.acs_url}`)
|
2020-05-04 01:16:54 +00:00
|
|
|
return callback(null, req.saml_request.service_provider.acs_url) // fetch this from registered SAML app
|
|
|
|
},
|
|
|
|
profileMapper: user => new FlitterProfileMapper(user),
|
|
|
|
destination: req.saml_request.service_provider.acs_url,
|
|
|
|
sessionIndex: index,
|
|
|
|
})(req, res, next)
|
|
|
|
}
|
|
|
|
|
|
|
|
async post_logout(req, res, next) {
|
|
|
|
return res.api({
|
|
|
|
saml: req.saml_request,
|
|
|
|
body: req.body,
|
|
|
|
query: req.query,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
async get_logout(req, res, next) {
|
|
|
|
return samlp.logout({
|
|
|
|
deflate: true,
|
|
|
|
issuer: this.saml.config().provider_name,
|
|
|
|
cert: await this.saml.public_cert(),
|
|
|
|
key: await this.saml.private_key(),
|
|
|
|
protocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
|
|
|
|
clearIdPSession: done => {
|
2020-10-19 04:27:23 +00:00
|
|
|
this.output.info(`${req.T('saml.clear_idp_session')} ${req.user.uid.toLowerCase()}`)
|
2020-05-04 01:16:54 +00:00
|
|
|
req.saml.participants.clear().then(async () => {
|
|
|
|
if ( this.saml.config().slo.end_coreid_session ) {
|
2020-08-23 19:42:00 +00:00
|
|
|
await req.user.logout(req)
|
2020-05-04 01:16:54 +00:00
|
|
|
|
|
|
|
// show logout page
|
|
|
|
return this.Vue.auth_message(res, {
|
2020-05-31 01:16:10 +00:00
|
|
|
message: req.T('auth.logged_out'),
|
2020-05-04 01:16:54 +00:00
|
|
|
next_destination: '/',
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
return this.Vue.auth_message(res, {
|
2020-05-31 01:16:10 +00:00
|
|
|
message: req.T('auth.logged_out'),
|
2020-05-04 01:16:54 +00:00
|
|
|
next_destination: '/',
|
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
},
|
|
|
|
sessionParticipants: await req.saml.participants.wrapper(),
|
|
|
|
})(req, res, next)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module.exports = exports = SAMLController
|