Compare commits
12 Commits
main
...
refactor/o
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f1a69e8b6b | ||
|
|
7faff2c75f | ||
|
|
083710d4c9 | ||
|
|
c9b04ef1b4 | ||
|
|
81fe64da05 | ||
|
|
b0ebc265a3 | ||
|
|
e5743a0b10 | ||
|
|
ec5c9fef48 | ||
|
|
f74b9a3018 | ||
|
|
1083014464 | ||
|
|
124533f09f | ||
|
|
c77d13d269 |
@@ -20,8 +20,8 @@ DOMAIN_CLIENT=http://localhost:3080
|
|||||||
DOMAIN_SERVER=http://localhost:3080
|
DOMAIN_SERVER=http://localhost:3080
|
||||||
|
|
||||||
NO_INDEX=true
|
NO_INDEX=true
|
||||||
# Use the address that is at most n number of hops away from the Express application.
|
# Use the address that is at most n number of hops away from the Express application.
|
||||||
# req.socket.remoteAddress is the first hop, and the rest are looked for in the X-Forwarded-For header from right to left.
|
# req.socket.remoteAddress is the first hop, and the rest are looked for in the X-Forwarded-For header from right to left.
|
||||||
# A value of 0 means that the first untrusted address would be req.socket.remoteAddress, i.e. there is no reverse proxy.
|
# A value of 0 means that the first untrusted address would be req.socket.remoteAddress, i.e. there is no reverse proxy.
|
||||||
# Defaulted to 1.
|
# Defaulted to 1.
|
||||||
TRUST_PROXY=1
|
TRUST_PROXY=1
|
||||||
@@ -428,9 +428,12 @@ OPENID_CLIENT_ID=
|
|||||||
OPENID_CLIENT_SECRET=
|
OPENID_CLIENT_SECRET=
|
||||||
OPENID_ISSUER=
|
OPENID_ISSUER=
|
||||||
OPENID_SESSION_SECRET=
|
OPENID_SESSION_SECRET=
|
||||||
|
# OPENID_USE_PKCE=
|
||||||
OPENID_SCOPE="openid profile email"
|
OPENID_SCOPE="openid profile email"
|
||||||
OPENID_CALLBACK_URL=/oauth/openid/callback
|
OPENID_CALLBACK_URL=/oauth/openid/callback
|
||||||
OPENID_REQUIRED_ROLE=
|
OPENID_REQUIRED_ROLE=
|
||||||
|
# Set to 'userinfo' or 'token' to determine witch role source to use, Default is 'token'
|
||||||
|
OPENID_REQUIRED_ROLE_SOURCE=
|
||||||
OPENID_REQUIRED_ROLE_TOKEN_KIND=
|
OPENID_REQUIRED_ROLE_TOKEN_KIND=
|
||||||
OPENID_REQUIRED_ROLE_PARAMETER_PATH=
|
OPENID_REQUIRED_ROLE_PARAMETER_PATH=
|
||||||
# Set to determine which user info property returned from OpenID Provider to store as the User's username
|
# Set to determine which user info property returned from OpenID Provider to store as the User's username
|
||||||
|
|||||||
@@ -17,12 +17,15 @@ try {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Downloads an image from a URL using an access token.
|
* Downloads an image from a URL using an access token, returning a Buffer.
|
||||||
* @param {string} url
|
*
|
||||||
* @param {string} accessToken
|
* @async
|
||||||
* @returns {Promise<Buffer>}
|
* @function downloadImage
|
||||||
|
* @param {string} url - The image URL
|
||||||
|
* @param {string} accessToken - The OAuth2 access token, if required by the server
|
||||||
|
* @returns {Promise<Buffer|string>} A Buffer if successful, or an empty string on failure
|
||||||
*/
|
*/
|
||||||
const downloadImage = async (url, accessToken) => {
|
async function downloadImage(url, accessToken) {
|
||||||
if (!url) {
|
if (!url) {
|
||||||
return '';
|
return '';
|
||||||
}
|
}
|
||||||
@@ -30,34 +33,33 @@ const downloadImage = async (url, accessToken) => {
|
|||||||
try {
|
try {
|
||||||
const options = {
|
const options = {
|
||||||
method: 'GET',
|
method: 'GET',
|
||||||
headers: {
|
headers: { Authorization: `Bearer ${accessToken}` },
|
||||||
Authorization: `Bearer ${accessToken}`,
|
|
||||||
},
|
|
||||||
};
|
};
|
||||||
|
|
||||||
if (process.env.PROXY) {
|
if (process.env.PROXY) {
|
||||||
options.agent = new HttpsProxyAgent(process.env.PROXY);
|
options.agent = new HttpsProxyAgent(process.env.PROXY);
|
||||||
}
|
}
|
||||||
|
|
||||||
const response = await fetch(url, options);
|
const response = await fetch(url, options);
|
||||||
|
if (!response.ok) {
|
||||||
if (response.ok) {
|
|
||||||
const buffer = await response.buffer();
|
|
||||||
return buffer;
|
|
||||||
} else {
|
|
||||||
throw new Error(`${response.statusText} (HTTP ${response.status})`);
|
throw new Error(`${response.statusText} (HTTP ${response.status})`);
|
||||||
}
|
}
|
||||||
|
return await response.buffer();
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
logger.error(
|
logger.error(`[openidStrategy] downloadImage: Failed to fetch "${url}": ${error}`);
|
||||||
`[openidStrategy] downloadImage: Error downloading image at URL "${url}": ${error}`,
|
|
||||||
);
|
|
||||||
return '';
|
return '';
|
||||||
}
|
}
|
||||||
};
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Determines the full name of a user based on OpenID userinfo and environment configuration.
|
* Derives a user's "full name" from userinfo or environment-specified claim.
|
||||||
*
|
*
|
||||||
|
* Priority:
|
||||||
|
* 1) process.env.OPENID_NAME_CLAIM
|
||||||
|
* 2) userinfo.given_name + userinfo.family_name
|
||||||
|
* 3) userinfo.given_name OR userinfo.family_name
|
||||||
|
* 4) userinfo.username or userinfo.email
|
||||||
|
*
|
||||||
|
* @function getFullName
|
||||||
* @param {Object} userinfo - The user information object from OpenID Connect
|
* @param {Object} userinfo - The user information object from OpenID Connect
|
||||||
* @param {string} [userinfo.given_name] - The user's first name
|
* @param {string} [userinfo.given_name] - The user's first name
|
||||||
* @param {string} [userinfo.family_name] - The user's last name
|
* @param {string} [userinfo.family_name] - The user's last name
|
||||||
@@ -66,153 +68,252 @@ const downloadImage = async (url, accessToken) => {
|
|||||||
* @returns {string} The determined full name of the user
|
* @returns {string} The determined full name of the user
|
||||||
*/
|
*/
|
||||||
function getFullName(userinfo) {
|
function getFullName(userinfo) {
|
||||||
if (process.env.OPENID_NAME_CLAIM) {
|
if (process.env.OPENID_NAME_CLAIM && userinfo[process.env.OPENID_NAME_CLAIM]) {
|
||||||
return userinfo[process.env.OPENID_NAME_CLAIM];
|
return userinfo[process.env.OPENID_NAME_CLAIM];
|
||||||
}
|
}
|
||||||
|
|
||||||
if (userinfo.given_name && userinfo.family_name) {
|
if (userinfo.given_name && userinfo.family_name) {
|
||||||
return `${userinfo.given_name} ${userinfo.family_name}`;
|
return `${userinfo.given_name} ${userinfo.family_name}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (userinfo.given_name) {
|
if (userinfo.given_name) {
|
||||||
return userinfo.given_name;
|
return userinfo.given_name;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (userinfo.family_name) {
|
if (userinfo.family_name) {
|
||||||
return userinfo.family_name;
|
return userinfo.family_name;
|
||||||
}
|
}
|
||||||
|
return userinfo.username || userinfo.email || '';
|
||||||
return userinfo.username || userinfo.email;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Converts an input into a string suitable for a username.
|
* Converts an input into a string suitable for a username.
|
||||||
* If the input is a string, it will be returned as is.
|
|
||||||
* If the input is an array, elements will be joined with underscores.
|
|
||||||
* In case of undefined or other falsy values, a default value will be returned.
|
|
||||||
*
|
*
|
||||||
* @param {string | string[] | undefined} input - The input value to be converted into a username.
|
* @function convertToUsername
|
||||||
* @param {string} [defaultValue=''] - The default value to return if the input is falsy.
|
* @param {string|string[]|undefined} input - Could be a string or array of strings
|
||||||
* @returns {string} The processed input as a string suitable for a username.
|
* @param {string} [defaultValue=''] - Fallback if input is invalid or not provided
|
||||||
|
* @returns {string} A processed username string
|
||||||
*/
|
*/
|
||||||
function convertToUsername(input, defaultValue = '') {
|
function convertToUsername(input, defaultValue = '') {
|
||||||
if (typeof input === 'string') {
|
if (typeof input === 'string') {
|
||||||
return input;
|
return input;
|
||||||
} else if (Array.isArray(input)) {
|
}
|
||||||
|
if (Array.isArray(input)) {
|
||||||
return input.join('_');
|
return input.join('_');
|
||||||
}
|
}
|
||||||
|
|
||||||
return defaultValue;
|
return defaultValue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Safely extracts an array of roles from an object using dot notation (e.g. realm_access.roles).
|
||||||
|
*
|
||||||
|
* @function extractRolesFrom
|
||||||
|
* @param {Object} obj
|
||||||
|
* @param {string} path
|
||||||
|
* @returns {string[]} Array of roles, or empty array if not found
|
||||||
|
*/
|
||||||
|
function extractRolesFrom(obj, path) {
|
||||||
|
try {
|
||||||
|
let current = obj;
|
||||||
|
for (const part of path.split('.')) {
|
||||||
|
if (!current || typeof current !== 'object') {
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
current = current[part];
|
||||||
|
}
|
||||||
|
return Array.isArray(current) ? current : [];
|
||||||
|
} catch {
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Retrieves user roles from either a token, the userinfo object, or both.
|
||||||
|
*
|
||||||
|
* Supports three strategies based on the roleSource:
|
||||||
|
* - 'token': Extract roles from the token (access or id token), fallback to userinfo if extraction fails.
|
||||||
|
* - 'userinfo': Extract roles solely from the userinfo object.
|
||||||
|
* - 'both': Extract roles from both token and userinfo and merge them.
|
||||||
|
*
|
||||||
|
* Also supports encrypted tokens by falling back to userinfo if the token is not JWT-decodable.
|
||||||
|
*
|
||||||
|
* @function getUserRoles
|
||||||
|
* @param {import('openid-client').TokenSet} tokenSet
|
||||||
|
* @param {Object} userinfo
|
||||||
|
* @param {string} rolePath - Dot-notation path to where roles are stored
|
||||||
|
* @param {'access'|'id'} tokenKind - Which token to parse for roles
|
||||||
|
* @param {'token'|'userinfo'|'both'} roleSource - Source of roles for extraction
|
||||||
|
* @returns {string[]} Array of roles, possibly empty
|
||||||
|
*/
|
||||||
|
function getUserRoles(tokenSet, userinfo, rolePath, tokenKind, roleSource) {
|
||||||
|
if (!tokenSet) {
|
||||||
|
return extractRolesFrom(userinfo, rolePath);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (roleSource === 'userinfo') {
|
||||||
|
const roles = extractRolesFrom(userinfo, rolePath);
|
||||||
|
if (!roles.length) {
|
||||||
|
logger.warn(`[openidStrategy] Key '${rolePath}' not found in userinfo.`);
|
||||||
|
}
|
||||||
|
return roles;
|
||||||
|
} else if (roleSource === 'both') {
|
||||||
|
let tokenRoles = [];
|
||||||
|
try {
|
||||||
|
let tokenToDecode = tokenKind === 'access' ? tokenSet.access_token : tokenSet.id_token;
|
||||||
|
if (tokenToDecode && tokenToDecode.includes('.')) {
|
||||||
|
const tokenData = jwtDecode(tokenToDecode);
|
||||||
|
tokenRoles = extractRolesFrom(tokenData, rolePath);
|
||||||
|
} else {
|
||||||
|
logger.warn(
|
||||||
|
'[openidStrategy] Token is not a valid JWT for decoding, skipping token roles extraction.',
|
||||||
|
);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
logger.error(`[openidStrategy] Failed to decode ${tokenKind} token: ${err}.`);
|
||||||
|
}
|
||||||
|
const userinfoRoles = extractRolesFrom(userinfo, rolePath);
|
||||||
|
const combinedRoles = Array.from(new Set([...tokenRoles, ...userinfoRoles]));
|
||||||
|
if (!combinedRoles.length) {
|
||||||
|
logger.warn(`[openidStrategy] Key '${rolePath}' not found in both token and userinfo.`);
|
||||||
|
}
|
||||||
|
return combinedRoles;
|
||||||
|
} else {
|
||||||
|
// default 'token' strategy
|
||||||
|
try {
|
||||||
|
let tokenToDecode = tokenKind === 'access' ? tokenSet.access_token : tokenSet.id_token;
|
||||||
|
if (!tokenToDecode || !tokenToDecode.includes('.')) {
|
||||||
|
throw new Error('Token is not a valid JWT for decoding.');
|
||||||
|
}
|
||||||
|
const tokenData = jwtDecode(tokenToDecode);
|
||||||
|
const roles = extractRolesFrom(tokenData, rolePath);
|
||||||
|
if (!roles.length) {
|
||||||
|
logger.warn(
|
||||||
|
`[openidStrategy] Key '${rolePath}' not found in ${tokenKind} token. Falling back to userinfo.`,
|
||||||
|
);
|
||||||
|
return extractRolesFrom(userinfo, rolePath);
|
||||||
|
}
|
||||||
|
return roles;
|
||||||
|
} catch (err) {
|
||||||
|
logger.error(`[openidStrategy] ${err}. Falling back to userinfo for role extraction.`);
|
||||||
|
return extractRolesFrom(userinfo, rolePath);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Registers and configures the OpenID Connect strategy with Passport, enabling PKCE when toggled.
|
||||||
|
*
|
||||||
|
* @async
|
||||||
|
* @function setupOpenId
|
||||||
|
* @returns {Promise<void>}
|
||||||
|
*/
|
||||||
async function setupOpenId() {
|
async function setupOpenId() {
|
||||||
try {
|
try {
|
||||||
|
// Set up a proxy if specified
|
||||||
if (process.env.PROXY) {
|
if (process.env.PROXY) {
|
||||||
const proxyAgent = new HttpsProxyAgent(process.env.PROXY);
|
const proxyAgent = new HttpsProxyAgent(process.env.PROXY);
|
||||||
custom.setHttpOptionsDefaults({
|
custom.setHttpOptionsDefaults({ agent: proxyAgent });
|
||||||
agent: proxyAgent,
|
logger.info(`[openidStrategy] Using proxy: ${process.env.PROXY}`);
|
||||||
});
|
|
||||||
logger.info(`[openidStrategy] proxy agent added: ${process.env.PROXY}`);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Discover issuer configuration
|
||||||
const issuer = await Issuer.discover(process.env.OPENID_ISSUER);
|
const issuer = await Issuer.discover(process.env.OPENID_ISSUER);
|
||||||
/* Supported Algorithms, openid-client v5 doesn't set it automatically as discovered from server.
|
logger.info(`[openidStrategy] Discovered issuer: ${issuer.issuer}`);
|
||||||
- id_token_signed_response_alg // defaults to 'RS256'
|
|
||||||
- request_object_signing_alg // defaults to 'RS256'
|
/**
|
||||||
- userinfo_signed_response_alg // not in v5
|
* Supported Algorithms, openid-client v5 doesn't set it automatically as discovered from server.
|
||||||
- introspection_signed_response_alg // not in v5
|
* - id_token_signed_response_alg // defaults to 'RS256'
|
||||||
- authorization_signed_response_alg // not in v5
|
* - request_object_signing_alg // defaults to 'RS256'
|
||||||
*/
|
* - userinfo_signed_response_alg // not in v5
|
||||||
|
* - introspection_signed_response_alg // not in v5
|
||||||
|
* - authorization_signed_response_alg // not in v5
|
||||||
|
*/
|
||||||
/** @type {import('openid-client').ClientMetadata} */
|
/** @type {import('openid-client').ClientMetadata} */
|
||||||
const clientMetadata = {
|
const clientMetadata = {
|
||||||
client_id: process.env.OPENID_CLIENT_ID,
|
client_id: process.env.OPENID_CLIENT_ID,
|
||||||
client_secret: process.env.OPENID_CLIENT_SECRET,
|
client_secret: process.env.OPENID_CLIENT_SECRET || '',
|
||||||
redirect_uris: [process.env.DOMAIN_SERVER + process.env.OPENID_CALLBACK_URL],
|
redirect_uris: [process.env.DOMAIN_SERVER + process.env.OPENID_CALLBACK_URL],
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Optionally force the first supported signing algorithm
|
||||||
if (isEnabled(process.env.OPENID_SET_FIRST_SUPPORTED_ALGORITHM)) {
|
if (isEnabled(process.env.OPENID_SET_FIRST_SUPPORTED_ALGORITHM)) {
|
||||||
clientMetadata.id_token_signed_response_alg =
|
clientMetadata.id_token_signed_response_alg =
|
||||||
issuer.id_token_signing_alg_values_supported?.[0] || 'RS256';
|
issuer.id_token_signing_alg_values_supported?.[0] || 'RS256';
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = new issuer.Client(clientMetadata);
|
const client = new issuer.Client(clientMetadata);
|
||||||
|
|
||||||
|
// Determine whether to enable PKCE
|
||||||
|
const usePKCE = process.env.OPENID_USE_PKCE === 'true';
|
||||||
|
|
||||||
|
// Set up authorization parameters. Include code_challenge_method if PKCE is enabled.
|
||||||
|
const openidScope = process.env.OPENID_SCOPE || 'openid profile email';
|
||||||
|
/** @type {import('openid-client').AuthorizationParameters} */
|
||||||
|
const params = {
|
||||||
|
scope: openidScope,
|
||||||
|
response_type: 'code',
|
||||||
|
};
|
||||||
|
if (usePKCE) {
|
||||||
|
params.code_challenge_method = 'S256'; // Enable PKCE by specifying the code challenge method
|
||||||
|
}
|
||||||
|
|
||||||
|
// Role-based config
|
||||||
const requiredRole = process.env.OPENID_REQUIRED_ROLE;
|
const requiredRole = process.env.OPENID_REQUIRED_ROLE;
|
||||||
const requiredRoleParameterPath = process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH;
|
const rolePath = process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH;
|
||||||
const requiredRoleTokenKind = process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND;
|
const tokenKind = process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND || 'id'; // 'id'|'access'
|
||||||
const openidLogin = new OpenIDStrategy(
|
const roleSource = process.env.OPENID_REQUIRED_ROLE_SOURCE || 'both'; // 'token'|'userinfo'|'both'
|
||||||
|
|
||||||
|
// Create the Passport strategy using the new type-correct instantiation and toggle for PKCE
|
||||||
|
const openidStrategy = new OpenIDStrategy(
|
||||||
{
|
{
|
||||||
client,
|
client,
|
||||||
params: {
|
params,
|
||||||
scope: process.env.OPENID_SCOPE,
|
usePKCE,
|
||||||
},
|
|
||||||
},
|
},
|
||||||
async (tokenset, userinfo, done) => {
|
async (tokenSet, userinfo, done) => {
|
||||||
try {
|
try {
|
||||||
logger.info(`[openidStrategy] verify login openidId: ${userinfo.sub}`);
|
logger.info(`[openidStrategy] Verifying login for sub=${userinfo.sub}`);
|
||||||
logger.debug('[openidStrategy] very login tokenset and userinfo', { tokenset, userinfo });
|
|
||||||
|
|
||||||
|
// Find user by openidId or fallback to email
|
||||||
let user = await findUser({ openidId: userinfo.sub });
|
let user = await findUser({ openidId: userinfo.sub });
|
||||||
logger.info(
|
if (!user && userinfo.email) {
|
||||||
`[openidStrategy] user ${user ? 'found' : 'not found'} with openidId: ${userinfo.sub}`,
|
|
||||||
);
|
|
||||||
|
|
||||||
if (!user) {
|
|
||||||
user = await findUser({ email: userinfo.email });
|
user = await findUser({ email: userinfo.email });
|
||||||
logger.info(
|
logger.info(
|
||||||
`[openidStrategy] user ${user ? 'found' : 'not found'} with email: ${
|
`[openidStrategy] User ${user ? 'found' : 'not found'} by email=${userinfo.email}.`,
|
||||||
userinfo.email
|
|
||||||
} for openidId: ${userinfo.sub}`,
|
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
const fullName = getFullName(userinfo);
|
// If a role is required, check user roles
|
||||||
|
if (requiredRole && rolePath) {
|
||||||
if (requiredRole) {
|
const roles = getUserRoles(tokenSet, userinfo, rolePath, tokenKind, roleSource);
|
||||||
let decodedToken = '';
|
|
||||||
if (requiredRoleTokenKind === 'access') {
|
|
||||||
decodedToken = jwtDecode(tokenset.access_token);
|
|
||||||
} else if (requiredRoleTokenKind === 'id') {
|
|
||||||
decodedToken = jwtDecode(tokenset.id_token);
|
|
||||||
}
|
|
||||||
const pathParts = requiredRoleParameterPath.split('.');
|
|
||||||
let found = true;
|
|
||||||
let roles = pathParts.reduce((o, key) => {
|
|
||||||
if (o === null || o === undefined || !(key in o)) {
|
|
||||||
found = false;
|
|
||||||
return [];
|
|
||||||
}
|
|
||||||
return o[key];
|
|
||||||
}, decodedToken);
|
|
||||||
|
|
||||||
if (!found) {
|
|
||||||
logger.error(
|
|
||||||
`[openidStrategy] Key '${requiredRoleParameterPath}' not found in ${requiredRoleTokenKind} token!`,
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!roles.includes(requiredRole)) {
|
if (!roles.includes(requiredRole)) {
|
||||||
|
logger.warn(
|
||||||
|
`[openidStrategy] Missing required role "${requiredRole}". Roles: [${roles.join(', ')}]`,
|
||||||
|
);
|
||||||
return done(null, false, {
|
return done(null, false, {
|
||||||
message: `You must have the "${requiredRole}" role to log in.`,
|
message: `You must have the "${requiredRole}" role to log in.`,
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
let username = '';
|
// Derive name and username
|
||||||
if (process.env.OPENID_USERNAME_CLAIM) {
|
const fullName = getFullName(userinfo);
|
||||||
username = userinfo[process.env.OPENID_USERNAME_CLAIM];
|
const username = process.env.OPENID_USERNAME_CLAIM
|
||||||
} else {
|
? convertToUsername(userinfo[process.env.OPENID_USERNAME_CLAIM])
|
||||||
username = convertToUsername(
|
: convertToUsername(userinfo.username || userinfo.given_name || userinfo.email);
|
||||||
userinfo.username || userinfo.given_name || userinfo.email,
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
// Create or update user
|
||||||
if (!user) {
|
if (!user) {
|
||||||
user = {
|
logger.info(`[openidStrategy] Creating a new user for sub=${userinfo.sub}`);
|
||||||
provider: 'openid',
|
user = await createUser(
|
||||||
openidId: userinfo.sub,
|
{
|
||||||
username,
|
provider: 'openid',
|
||||||
email: userinfo.email || '',
|
openidId: userinfo.sub,
|
||||||
emailVerified: userinfo.email_verified || false,
|
username,
|
||||||
name: fullName,
|
email: userinfo.email || '',
|
||||||
};
|
emailVerified: Boolean(userinfo.email_verified) || false,
|
||||||
user = await createUser(user, true, true);
|
name: fullName,
|
||||||
|
},
|
||||||
|
true,
|
||||||
|
true,
|
||||||
|
);
|
||||||
} else {
|
} else {
|
||||||
user.provider = 'openid';
|
user.provider = 'openid';
|
||||||
user.openidId = userinfo.sub;
|
user.openidId = userinfo.sub;
|
||||||
@@ -220,54 +321,44 @@ async function setupOpenId() {
|
|||||||
user.name = fullName;
|
user.name = fullName;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (userinfo.picture && !user.avatar?.includes('manual=true')) {
|
// Fetch avatar if not manually overridden
|
||||||
/** @type {string | undefined} */
|
if (userinfo.picture && !String(user.avatar || '').includes('manual=true')) {
|
||||||
const imageUrl = userinfo.picture;
|
const imageBuffer = await downloadImage(userinfo.picture, tokenSet.access_token);
|
||||||
|
|
||||||
let fileName;
|
|
||||||
if (crypto) {
|
|
||||||
fileName = (await hashToken(userinfo.sub)) + '.png';
|
|
||||||
} else {
|
|
||||||
fileName = userinfo.sub + '.png';
|
|
||||||
}
|
|
||||||
|
|
||||||
const imageBuffer = await downloadImage(imageUrl, tokenset.access_token);
|
|
||||||
if (imageBuffer) {
|
if (imageBuffer) {
|
||||||
const { saveBuffer } = getStrategyFunctions(process.env.CDN_PROVIDER);
|
const { saveBuffer } = getStrategyFunctions(process.env.CDN_PROVIDER);
|
||||||
|
const fileHash = crypto ? await hashToken(userinfo.sub) : userinfo.sub;
|
||||||
|
const fileName = `${fileHash}.png`;
|
||||||
|
|
||||||
const imagePath = await saveBuffer({
|
const imagePath = await saveBuffer({
|
||||||
fileName,
|
fileName,
|
||||||
userId: user._id.toString(),
|
userId: user._id.toString(),
|
||||||
buffer: imageBuffer,
|
buffer: imageBuffer,
|
||||||
});
|
});
|
||||||
user.avatar = imagePath ?? '';
|
if (imagePath) {
|
||||||
|
user.avatar = imagePath;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Persist user changes
|
||||||
user = await updateUser(user._id, user);
|
user = await updateUser(user._id, user);
|
||||||
|
|
||||||
|
// Success
|
||||||
logger.info(
|
logger.info(
|
||||||
`[openidStrategy] login success openidId: ${user.openidId} | email: ${user.email} | username: ${user.username} `,
|
`[openidStrategy] Login success for sub=${user.openidId}, email=${user.email}, username=${user.username}`,
|
||||||
{
|
|
||||||
user: {
|
|
||||||
openidId: user.openidId,
|
|
||||||
username: user.username,
|
|
||||||
email: user.email,
|
|
||||||
name: user.name,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
);
|
);
|
||||||
|
return done(null, user);
|
||||||
done(null, user);
|
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
logger.error('[openidStrategy] login failed', err);
|
logger.error('[openidStrategy] Login verification failed:', err);
|
||||||
done(err);
|
return done(err);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
||||||
passport.use('openid', openidLogin);
|
// Register the strategy under the 'openid' name
|
||||||
|
passport.use('openid', openidStrategy);
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
logger.error('[openidStrategy]', err);
|
logger.error('[openidStrategy] Error setting up OpenID strategy:', err);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -10,7 +10,6 @@ jest.mock('openid-client');
|
|||||||
jest.mock('jsonwebtoken/decode');
|
jest.mock('jsonwebtoken/decode');
|
||||||
jest.mock('~/server/services/Files/strategies', () => ({
|
jest.mock('~/server/services/Files/strategies', () => ({
|
||||||
getStrategyFunctions: jest.fn(() => ({
|
getStrategyFunctions: jest.fn(() => ({
|
||||||
// You can modify this mock as needed (here returning a dummy function)
|
|
||||||
saveBuffer: jest.fn().mockResolvedValue('/fake/path/to/avatar.png'),
|
saveBuffer: jest.fn().mockResolvedValue('/fake/path/to/avatar.png'),
|
||||||
})),
|
})),
|
||||||
}));
|
}));
|
||||||
@@ -23,18 +22,20 @@ jest.mock('~/server/utils/crypto', () => ({
|
|||||||
hashToken: jest.fn().mockResolvedValue('hashed-token'),
|
hashToken: jest.fn().mockResolvedValue('hashed-token'),
|
||||||
}));
|
}));
|
||||||
jest.mock('~/server/utils', () => ({
|
jest.mock('~/server/utils', () => ({
|
||||||
isEnabled: jest.fn(() => false), // default to false, override per test if needed
|
isEnabled: jest.fn(() => false), // default to false; override per test if needed
|
||||||
}));
|
}));
|
||||||
jest.mock('~/config', () => ({
|
jest.mock('~/config', () => ({
|
||||||
logger: {
|
logger: {
|
||||||
info: jest.fn(),
|
info: jest.fn(),
|
||||||
debug: jest.fn(),
|
debug: jest.fn(),
|
||||||
error: jest.fn(),
|
error: jest.fn(),
|
||||||
|
warn: jest.fn(),
|
||||||
},
|
},
|
||||||
}));
|
}));
|
||||||
|
|
||||||
// Mock Issuer.discover so that setupOpenId gets a fake issuer and client
|
// Update Issuer.discover mock so that the returned issuer has an 'issuer' property.
|
||||||
Issuer.discover = jest.fn().mockResolvedValue({
|
Issuer.discover = jest.fn().mockResolvedValue({
|
||||||
|
issuer: 'https://fake-issuer.com',
|
||||||
id_token_signing_alg_values_supported: ['RS256'],
|
id_token_signing_alg_values_supported: ['RS256'],
|
||||||
Client: jest.fn().mockImplementation((clientMetadata) => {
|
Client: jest.fn().mockImplementation((clientMetadata) => {
|
||||||
return {
|
return {
|
||||||
@@ -43,7 +44,7 @@ Issuer.discover = jest.fn().mockResolvedValue({
|
|||||||
}),
|
}),
|
||||||
});
|
});
|
||||||
|
|
||||||
// To capture the verify callback from the strategy, we grab it from the mock constructor
|
// To capture the verify callback from the strategy, we grab it from the mock constructor.
|
||||||
let verifyCallback;
|
let verifyCallback;
|
||||||
OpenIDStrategy.mockImplementation((options, verify) => {
|
OpenIDStrategy.mockImplementation((options, verify) => {
|
||||||
verifyCallback = verify;
|
verifyCallback = verify;
|
||||||
@@ -51,21 +52,21 @@ OpenIDStrategy.mockImplementation((options, verify) => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
describe('setupOpenId', () => {
|
describe('setupOpenId', () => {
|
||||||
// Helper to wrap the verify callback in a promise
|
// Helper to wrap the verify callback in a promise.
|
||||||
const validate = (tokenset, userinfo) =>
|
const validate = (tokenset, userinfo) =>
|
||||||
new Promise((resolve, reject) => {
|
new Promise((resolve, reject) => {
|
||||||
verifyCallback(tokenset, userinfo, (err, user, details) => {
|
verifyCallback(tokenset, userinfo, (err, user, details) => {
|
||||||
if (err) {
|
if (err) {
|
||||||
reject(err);
|
return reject(err);
|
||||||
} else {
|
|
||||||
resolve({ user, details });
|
|
||||||
}
|
}
|
||||||
|
resolve({ user, details });
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
const tokenset = {
|
// Default tokenset: tokens include a period to simulate a JWT.
|
||||||
id_token: 'fake_id_token',
|
const validTokenSet = {
|
||||||
access_token: 'fake_access_token',
|
id_token: 'header.payload.signature',
|
||||||
|
access_token: 'header.payload.signature',
|
||||||
};
|
};
|
||||||
|
|
||||||
const baseUserinfo = {
|
const baseUserinfo = {
|
||||||
@@ -77,13 +78,14 @@ describe('setupOpenId', () => {
|
|||||||
name: 'My Full',
|
name: 'My Full',
|
||||||
username: 'flast',
|
username: 'flast',
|
||||||
picture: 'https://example.com/avatar.png',
|
picture: 'https://example.com/avatar.png',
|
||||||
|
roles: ['requiredRole'],
|
||||||
};
|
};
|
||||||
|
|
||||||
beforeEach(async () => {
|
beforeEach(async () => {
|
||||||
// Clear previous mock calls and reset implementations
|
// Clear previous mock calls and reset implementations.
|
||||||
jest.clearAllMocks();
|
jest.clearAllMocks();
|
||||||
|
|
||||||
// Reset environment variables needed by the strategy
|
// Reset environment variables needed by the strategy.
|
||||||
process.env.OPENID_ISSUER = 'https://fake-issuer.com';
|
process.env.OPENID_ISSUER = 'https://fake-issuer.com';
|
||||||
process.env.OPENID_CLIENT_ID = 'fake_client_id';
|
process.env.OPENID_CLIENT_ID = 'fake_client_id';
|
||||||
process.env.OPENID_CLIENT_SECRET = 'fake_client_secret';
|
process.env.OPENID_CLIENT_SECRET = 'fake_client_secret';
|
||||||
@@ -93,26 +95,29 @@ describe('setupOpenId', () => {
|
|||||||
process.env.OPENID_REQUIRED_ROLE = 'requiredRole';
|
process.env.OPENID_REQUIRED_ROLE = 'requiredRole';
|
||||||
process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH = 'roles';
|
process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH = 'roles';
|
||||||
process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND = 'id';
|
process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND = 'id';
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'token';
|
||||||
delete process.env.OPENID_USERNAME_CLAIM;
|
delete process.env.OPENID_USERNAME_CLAIM;
|
||||||
delete process.env.OPENID_NAME_CLAIM;
|
delete process.env.OPENID_NAME_CLAIM;
|
||||||
delete process.env.PROXY;
|
delete process.env.PROXY;
|
||||||
|
delete process.env.OPENID_USE_PKCE;
|
||||||
|
delete process.env.OPENID_SET_FIRST_SUPPORTED_ALGORITHM;
|
||||||
|
|
||||||
// Default jwtDecode mock returns a token that includes the required role.
|
// By default, jwtDecode returns a token that includes the required role.
|
||||||
jwtDecode.mockReturnValue({
|
jwtDecode.mockReturnValue({
|
||||||
roles: ['requiredRole'],
|
roles: ['requiredRole'],
|
||||||
});
|
});
|
||||||
|
|
||||||
// By default, assume that no user is found, so createUser will be called
|
// By default, assume that no user is found so that createUser will be called.
|
||||||
findUser.mockResolvedValue(null);
|
findUser.mockResolvedValue(null);
|
||||||
createUser.mockImplementation(async (userData) => {
|
createUser.mockImplementation(async (userData) => {
|
||||||
// simulate created user with an _id property
|
// Simulate created user with an _id property.
|
||||||
return { _id: 'newUserId', ...userData };
|
return { _id: 'newUserId', ...userData };
|
||||||
});
|
});
|
||||||
updateUser.mockImplementation(async (id, userData) => {
|
updateUser.mockImplementation(async (id, userData) => {
|
||||||
return { _id: id, ...userData };
|
return { _id: id, ...userData };
|
||||||
});
|
});
|
||||||
|
|
||||||
// For image download, simulate a successful response
|
// For image download, simulate a successful response.
|
||||||
const fakeBuffer = Buffer.from('fake image');
|
const fakeBuffer = Buffer.from('fake image');
|
||||||
const fakeResponse = {
|
const fakeResponse = {
|
||||||
ok: true,
|
ok: true,
|
||||||
@@ -120,18 +125,13 @@ describe('setupOpenId', () => {
|
|||||||
};
|
};
|
||||||
fetch.mockResolvedValue(fakeResponse);
|
fetch.mockResolvedValue(fakeResponse);
|
||||||
|
|
||||||
// Finally, call the setup function so that passport.use gets called
|
// (Re)initialize the strategy with current env settings.
|
||||||
await setupOpenId();
|
await setupOpenId();
|
||||||
});
|
});
|
||||||
|
|
||||||
it('should create a new user with correct username when username claim exists', async () => {
|
it('should create a new user with correct username when username claim exists', async () => {
|
||||||
// Arrange – our userinfo already has username 'flast'
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
expect(user.username).toBe(userinfo.username);
|
expect(user.username).toBe(userinfo.username);
|
||||||
expect(createUser).toHaveBeenCalledWith(
|
expect(createUser).toHaveBeenCalledWith(
|
||||||
expect.objectContaining({
|
expect.objectContaining({
|
||||||
@@ -147,16 +147,10 @@ describe('setupOpenId', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should use given_name as username when username claim is missing', async () => {
|
it('should use given_name as username when username claim is missing', async () => {
|
||||||
// Arrange – remove username from userinfo
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
delete userinfo.username;
|
delete userinfo.username;
|
||||||
// Expect the username to be the given name (unchanged case)
|
|
||||||
const expectUsername = userinfo.given_name;
|
const expectUsername = userinfo.given_name;
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
expect(user.username).toBe(expectUsername);
|
expect(user.username).toBe(expectUsername);
|
||||||
expect(createUser).toHaveBeenCalledWith(
|
expect(createUser).toHaveBeenCalledWith(
|
||||||
expect.objectContaining({ username: expectUsername }),
|
expect.objectContaining({ username: expectUsername }),
|
||||||
@@ -166,16 +160,11 @@ describe('setupOpenId', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should use email as username when username and given_name are missing', async () => {
|
it('should use email as username when username and given_name are missing', async () => {
|
||||||
// Arrange – remove username and given_name
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
delete userinfo.username;
|
delete userinfo.username;
|
||||||
delete userinfo.given_name;
|
delete userinfo.given_name;
|
||||||
const expectUsername = userinfo.email;
|
const expectUsername = userinfo.email;
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
expect(user.username).toBe(expectUsername);
|
expect(user.username).toBe(expectUsername);
|
||||||
expect(createUser).toHaveBeenCalledWith(
|
expect(createUser).toHaveBeenCalledWith(
|
||||||
expect.objectContaining({ username: expectUsername }),
|
expect.objectContaining({ username: expectUsername }),
|
||||||
@@ -185,14 +174,10 @@ describe('setupOpenId', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should override username with OPENID_USERNAME_CLAIM when set', async () => {
|
it('should override username with OPENID_USERNAME_CLAIM when set', async () => {
|
||||||
// Arrange – set OPENID_USERNAME_CLAIM so that the sub claim is used
|
|
||||||
process.env.OPENID_USERNAME_CLAIM = 'sub';
|
process.env.OPENID_USERNAME_CLAIM = 'sub';
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
|
await setupOpenId();
|
||||||
// Act
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert – username should equal the sub (converted as-is)
|
|
||||||
expect(user.username).toBe(userinfo.sub);
|
expect(user.username).toBe(userinfo.sub);
|
||||||
expect(createUser).toHaveBeenCalledWith(
|
expect(createUser).toHaveBeenCalledWith(
|
||||||
expect.objectContaining({ username: userinfo.sub }),
|
expect.objectContaining({ username: userinfo.sub }),
|
||||||
@@ -202,31 +187,21 @@ describe('setupOpenId', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should set the full name correctly when given_name and family_name exist', async () => {
|
it('should set the full name correctly when given_name and family_name exist', async () => {
|
||||||
// Arrange
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
const expectedFullName = `${userinfo.given_name} ${userinfo.family_name}`;
|
const expectedFullName = `${userinfo.given_name} ${userinfo.family_name}`;
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
expect(user.name).toBe(expectedFullName);
|
expect(user.name).toBe(expectedFullName);
|
||||||
});
|
});
|
||||||
|
|
||||||
it('should override full name with OPENID_NAME_CLAIM when set', async () => {
|
it('should override full name with OPENID_NAME_CLAIM when set', async () => {
|
||||||
// Arrange – use the name claim as the full name
|
|
||||||
process.env.OPENID_NAME_CLAIM = 'name';
|
process.env.OPENID_NAME_CLAIM = 'name';
|
||||||
const userinfo = { ...baseUserinfo, name: 'Custom Name' };
|
const userinfo = { ...baseUserinfo, name: 'Custom Name' };
|
||||||
|
await setupOpenId();
|
||||||
// Act
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
expect(user.name).toBe('Custom Name');
|
expect(user.name).toBe('Custom Name');
|
||||||
});
|
});
|
||||||
|
|
||||||
it('should update an existing user on login', async () => {
|
it('should update an existing user on login', async () => {
|
||||||
// Arrange – simulate that a user already exists
|
|
||||||
const existingUser = {
|
const existingUser = {
|
||||||
_id: 'existingUserId',
|
_id: 'existingUserId',
|
||||||
provider: 'local',
|
provider: 'local',
|
||||||
@@ -241,13 +216,8 @@ describe('setupOpenId', () => {
|
|||||||
}
|
}
|
||||||
return null;
|
return null;
|
||||||
});
|
});
|
||||||
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
|
await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert – updateUser should be called and the user object updated
|
|
||||||
expect(updateUser).toHaveBeenCalledWith(
|
expect(updateUser).toHaveBeenCalledWith(
|
||||||
existingUser._id,
|
existingUser._id,
|
||||||
expect.objectContaining({
|
expect.objectContaining({
|
||||||
@@ -260,43 +230,154 @@ describe('setupOpenId', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should enforce the required role and reject login if missing', async () => {
|
it('should enforce the required role and reject login if missing', async () => {
|
||||||
// Arrange – simulate a token without the required role.
|
jwtDecode.mockReturnValue({ roles: ['SomeOtherRole'] });
|
||||||
jwtDecode.mockReturnValue({
|
|
||||||
roles: ['SomeOtherRole'],
|
|
||||||
});
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
|
const { user, details } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user, details } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert – verify that the strategy rejects login
|
|
||||||
expect(user).toBe(false);
|
expect(user).toBe(false);
|
||||||
expect(details.message).toBe('You must have the "requiredRole" role to log in.');
|
expect(details.message).toBe('You must have the "requiredRole" role to log in.');
|
||||||
});
|
});
|
||||||
|
|
||||||
it('should attempt to download and save the avatar if picture is provided', async () => {
|
it('should attempt to download and save the avatar if picture is provided', async () => {
|
||||||
// Arrange – ensure userinfo contains a picture URL
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
const { user } = await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert – verify that download was attempted and the avatar field was set via updateUser
|
|
||||||
expect(fetch).toHaveBeenCalled();
|
expect(fetch).toHaveBeenCalled();
|
||||||
// Our mock getStrategyFunctions.saveBuffer returns '/fake/path/to/avatar.png'
|
|
||||||
expect(user.avatar).toBe('/fake/path/to/avatar.png');
|
expect(user.avatar).toBe('/fake/path/to/avatar.png');
|
||||||
});
|
});
|
||||||
|
|
||||||
it('should not attempt to download avatar if picture is not provided', async () => {
|
it('should not attempt to download avatar if picture is not provided', async () => {
|
||||||
// Arrange – remove picture
|
|
||||||
const userinfo = { ...baseUserinfo };
|
const userinfo = { ...baseUserinfo };
|
||||||
delete userinfo.picture;
|
delete userinfo.picture;
|
||||||
|
await validate(validTokenSet, userinfo);
|
||||||
// Act
|
|
||||||
await validate(tokenset, userinfo);
|
|
||||||
|
|
||||||
// Assert – fetch should not be called and avatar should remain undefined or empty
|
|
||||||
expect(fetch).not.toHaveBeenCalled();
|
expect(fetch).not.toHaveBeenCalled();
|
||||||
// Depending on your implementation, user.avatar may be undefined or an empty string.
|
});
|
||||||
|
|
||||||
|
it('should fallback to userinfo roles if the id_token is invalid (missing a period)', async () => {
|
||||||
|
const invalidTokenSet = { ...validTokenSet, id_token: 'invalidtoken' };
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['requiredRole'] };
|
||||||
|
const { user } = await validate(invalidTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should handle downloadImage failure gracefully and not set an avatar', async () => {
|
||||||
|
fetch.mockRejectedValue(new Error('network error'));
|
||||||
|
const userinfo = { ...baseUserinfo };
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(fetch).toHaveBeenCalled();
|
||||||
|
expect(user.avatar).toBeUndefined();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should allow login if no required role is specified', async () => {
|
||||||
|
delete process.env.OPENID_REQUIRED_ROLE;
|
||||||
|
delete process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH;
|
||||||
|
jwtDecode.mockReturnValue({});
|
||||||
|
const userinfo = { ...baseUserinfo };
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should use roles from userinfo when OPENID_REQUIRED_ROLE_SOURCE is set to "userinfo"', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'userinfo';
|
||||||
|
jwtDecode.mockReturnValue({});
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['requiredRole'] };
|
||||||
|
await setupOpenId();
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should merge roles from both token and userinfo when OPENID_REQUIRED_ROLE_SOURCE is "both"', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'both';
|
||||||
|
jwtDecode.mockReturnValue({ roles: ['extraRole'] });
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['requiredRole'] };
|
||||||
|
await setupOpenId();
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should fall back to userinfo roles when token decode fails and roleSource is "both"', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'both';
|
||||||
|
jwtDecode.mockImplementation(() => {
|
||||||
|
throw new Error('Decode error');
|
||||||
|
});
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['requiredRole'] };
|
||||||
|
await setupOpenId();
|
||||||
|
const { user } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should merge roles from both token and userinfo when token is invalid and roleSource is "both"', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'both';
|
||||||
|
const invalidTokenSet = { ...validTokenSet, id_token: 'invalidtoken' };
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['requiredRole'] };
|
||||||
|
await setupOpenId();
|
||||||
|
const { user } = await validate(invalidTokenSet, userinfo);
|
||||||
|
expect(user).toBeDefined();
|
||||||
|
expect(createUser).toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should reject login if merged roles from both token and userinfo do not include required role', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_SOURCE = 'both';
|
||||||
|
jwtDecode.mockReturnValue({ roles: ['SomeOtherRole'] });
|
||||||
|
const userinfo = { ...baseUserinfo, roles: ['AnotherRole'] };
|
||||||
|
await setupOpenId();
|
||||||
|
const { user, details } = await validate(validTokenSet, userinfo);
|
||||||
|
expect(user).toBe(false);
|
||||||
|
expect(details.message).toBe('You must have the "requiredRole" role to log in.');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should pass usePKCE true and set code_challenge_method in params when OPENID_USE_PKCE is "true"', async () => {
|
||||||
|
process.env.OPENID_USE_PKCE = 'true';
|
||||||
|
await setupOpenId();
|
||||||
|
const callOptions = OpenIDStrategy.mock.calls[OpenIDStrategy.mock.calls.length - 1][0];
|
||||||
|
expect(callOptions.usePKCE).toBe(true);
|
||||||
|
expect(callOptions.params.code_challenge_method).toBe('S256');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should pass usePKCE false and not set code_challenge_method in params when OPENID_USE_PKCE is "false"', async () => {
|
||||||
|
process.env.OPENID_USE_PKCE = 'false';
|
||||||
|
await setupOpenId();
|
||||||
|
const callOptions = OpenIDStrategy.mock.calls[OpenIDStrategy.mock.calls.length - 1][0];
|
||||||
|
expect(callOptions.usePKCE).toBe(false);
|
||||||
|
expect(callOptions.params.code_challenge_method).toBeUndefined();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should default to usePKCE false when OPENID_USE_PKCE is not defined', async () => {
|
||||||
|
delete process.env.OPENID_USE_PKCE;
|
||||||
|
await setupOpenId();
|
||||||
|
const callOptions = OpenIDStrategy.mock.calls[OpenIDStrategy.mock.calls.length - 1][0];
|
||||||
|
expect(callOptions.usePKCE).toBe(false);
|
||||||
|
expect(callOptions.params.code_challenge_method).toBeUndefined();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should set id_token_signed_response_alg if OPENID_SET_FIRST_SUPPORTED_ALGORITHM is enabled', async () => {
|
||||||
|
process.env.OPENID_SET_FIRST_SUPPORTED_ALGORITHM = 'true';
|
||||||
|
// Override isEnabled so that it returns true.
|
||||||
|
const { isEnabled } = require('~/server/utils');
|
||||||
|
isEnabled.mockReturnValue(true);
|
||||||
|
await setupOpenId();
|
||||||
|
const callOptions = OpenIDStrategy.mock.calls[OpenIDStrategy.mock.calls.length - 1][0];
|
||||||
|
expect(callOptions.client.metadata.id_token_signed_response_alg).toBe('RS256');
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should use access token when OPENID_REQUIRED_ROLE_TOKEN_KIND is set to "access"', async () => {
|
||||||
|
process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND = 'access';
|
||||||
|
// Reinitialize strategy so that the new token kind is used.
|
||||||
|
await setupOpenId();
|
||||||
|
jwtDecode.mockClear();
|
||||||
|
jwtDecode.mockReturnValue({ roles: ['requiredRole'] });
|
||||||
|
const userinfo = { ...baseUserinfo };
|
||||||
|
await validate(validTokenSet, userinfo);
|
||||||
|
expect(jwtDecode).toHaveBeenCalledWith(validTokenSet.access_token);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should use proxy agent if PROXY is provided', async () => {
|
||||||
|
process.env.PROXY = 'http://fake-proxy.com';
|
||||||
|
await setupOpenId();
|
||||||
|
const { logger } = require('~/config');
|
||||||
|
expect(logger.info).toHaveBeenCalledWith(`[openidStrategy] Using proxy: ${process.env.PROXY}`);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
Reference in New Issue
Block a user