@nuvo-prime/np-samlify
Version:
High-level API for Single Sign On (SAML 2.0)
200 lines • 10.8 kB
JavaScript
var __extends = (this && this.__extends) || (function () {
var extendStatics = function (d, b) {
extendStatics = Object.setPrototypeOf ||
({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||
function (d, b) { for (var p in b) if (Object.prototype.hasOwnProperty.call(b, p)) d[p] = b[p]; };
return extendStatics(d, b);
};
return function (d, b) {
if (typeof b !== "function" && b !== null)
throw new TypeError("Class extends value " + String(b) + " is not a constructor or null");
extendStatics(d, b);
function __() { this.constructor = d; }
d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());
};
})();
var __assign = (this && this.__assign) || function () {
__assign = Object.assign || function(t) {
for (var s, i = 1, n = arguments.length; i < n; i++) {
s = arguments[i];
for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p))
t[p] = s[p];
}
return t;
};
return __assign.apply(this, arguments);
};
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __generator = (this && this.__generator) || function (thisArg, body) {
var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g;
function verb(n) { return function (v) { return step([n, v]); }; }
function step(op) {
if (f) throw new TypeError("Generator is already executing.");
while (g && (g = 0, op[0] && (_ = 0)), _) try {
if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;
if (y = 0, t) op = [op[0] & 2, t.value];
switch (op[0]) {
case 0: case 1: t = op; break;
case 4: _.label++; return { value: op[1], done: false };
case 5: _.label++; y = op[1]; op = [0]; continue;
case 7: op = _.ops.pop(); _.trys.pop(); continue;
default:
if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }
if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }
if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }
if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }
if (t[2]) _.ops.pop();
_.trys.pop(); continue;
}
op = body.call(thisArg, _);
} catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }
if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };
}
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.IdentityProvider = void 0;
/**
* @file entity-idp.ts
* @author tngan
* @desc Declares the actions taken by identity provider
*/
var entity_1 = __importDefault(require("./entity"));
var libsaml_1 = __importDefault(require("./libsaml"));
var urn_1 = require("./urn");
var binding_post_1 = __importDefault(require("./binding-post"));
var binding_redirect_1 = __importDefault(require("./binding-redirect"));
var binding_simplesign_1 = __importDefault(require("./binding-simplesign"));
var flow_1 = require("./flow");
var utility_1 = require("./utility");
/**
* Identity provider can be configured using either metadata importing or idpSetting
*/
function default_1(props) {
return new IdentityProvider(props);
}
exports.default = default_1;
/**
* Identity provider can be configured using either metadata importing or idpSetting
*/
var IdentityProvider = /** @class */ (function (_super) {
__extends(IdentityProvider, _super);
function IdentityProvider(idpSetting) {
var defaultIdpEntitySetting = {
wantAuthnRequestsSigned: false,
tagPrefix: {
encryptedAssertion: 'saml',
},
};
var entitySetting = Object.assign(defaultIdpEntitySetting, idpSetting);
// build attribute part
if (idpSetting.loginResponseTemplate) {
if ((0, utility_1.isString)(idpSetting.loginResponseTemplate.context) && Array.isArray(idpSetting.loginResponseTemplate.attributes)) {
var attributeStatementTemplate = void 0;
var attributeTemplate = void 0;
if (!idpSetting.loginResponseTemplate.additionalTemplates || !idpSetting.loginResponseTemplate.additionalTemplates.attributeStatementTemplate) {
attributeStatementTemplate = libsaml_1.default.defaultAttributeStatementTemplate;
}
else {
attributeStatementTemplate = idpSetting.loginResponseTemplate.additionalTemplates.attributeStatementTemplate;
}
if (!idpSetting.loginResponseTemplate.additionalTemplates || !idpSetting.loginResponseTemplate.additionalTemplates.attributeTemplate) {
attributeTemplate = libsaml_1.default.defaultAttributeTemplate;
}
else {
attributeTemplate = idpSetting.loginResponseTemplate.additionalTemplates.attributeTemplate;
}
var replacement = {
AttributeStatement: libsaml_1.default.attributeStatementBuilder(idpSetting.loginResponseTemplate.attributes, attributeTemplate, attributeStatementTemplate),
};
entitySetting.loginResponseTemplate = __assign(__assign({}, entitySetting.loginResponseTemplate), { context: libsaml_1.default.replaceTagsByValue(entitySetting.loginResponseTemplate.context, replacement) });
}
else {
console.warn('Invalid login response template');
}
}
return _super.call(this, entitySetting, 'idp') || this;
}
/**
* @desc Generates the login response for developers to design their own method
* @param sp object of service provider
* @param requestInfo corresponding request, used to obtain the id
* @param binding protocol binding
* @param user current logged user (e.g. req.user)
* @param customTagReplacement used when developers have their own login response template
* @param encryptThenSign whether or not to encrypt then sign first (if signing)
* @param relayState the relayState from corresponding request
*/
IdentityProvider.prototype.createLoginResponse = function (sp, requestInfo, binding, user, customTagReplacement, encryptThenSign, relayState) {
return __awaiter(this, void 0, void 0, function () {
var protocol, context, _a;
return __generator(this, function (_b) {
switch (_b.label) {
case 0:
protocol = urn_1.namespace.binding[binding];
context = null;
_a = protocol;
switch (_a) {
case urn_1.namespace.binding.post: return [3 /*break*/, 1];
case urn_1.namespace.binding.simpleSign: return [3 /*break*/, 3];
case urn_1.namespace.binding.redirect: return [3 /*break*/, 5];
}
return [3 /*break*/, 6];
case 1: return [4 /*yield*/, binding_post_1.default.base64LoginResponse(requestInfo, {
idp: this,
sp: sp,
}, user, customTagReplacement, encryptThenSign)];
case 2:
context = _b.sent();
return [3 /*break*/, 7];
case 3: return [4 /*yield*/, binding_simplesign_1.default.base64LoginResponse(requestInfo, {
idp: this,
sp: sp,
}, user, relayState, customTagReplacement)];
case 4:
context = _b.sent();
return [3 /*break*/, 7];
case 5: return [2 /*return*/, binding_redirect_1.default.loginResponseRedirectURL(requestInfo, {
idp: this,
sp: sp,
}, user, relayState, customTagReplacement)];
case 6: throw new Error('ERR_CREATE_RESPONSE_UNDEFINED_BINDING');
case 7: return [2 /*return*/, __assign(__assign({}, context), { relayState: relayState, entityEndpoint: sp.entityMeta.getAssertionConsumerService(binding), type: 'SAMLResponse' })];
}
});
});
};
/**
* Validation of the parsed URL parameters
* @param sp ServiceProvider instance
* @param binding Protocol binding
* @param req RequesmessageSigningOrderst
*/
IdentityProvider.prototype.parseLoginRequest = function (sp, binding, req) {
var self = this;
return (0, flow_1.flow)({
from: sp,
self: self,
checkSignature: self.entityMeta.isWantAuthnRequestsSigned(),
parserType: 'SAMLRequest',
type: 'login',
binding: binding,
request: req
});
};
return IdentityProvider;
}(entity_1.default));
exports.IdentityProvider = IdentityProvider;
//# sourceMappingURL=entity-idp.js.map
;