openam-agent-custom
Version:
Customized ForgeRock AM Policy Agent for Node.js from Zoltan Tarcsay
173 lines • 9.4 kB
JavaScript
"use strict";
var __assign = (this && this.__assign) || function () {
__assign = Object.assign || function(t) {
for (var s, i = 1, n = arguments.length; i < n; i++) {
s = arguments[i];
for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p))
t[p] = s[p];
}
return t;
};
return __assign.apply(this, arguments);
};
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __generator = (this && this.__generator) || function (thisArg, body) {
var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g;
function verb(n) { return function (v) { return step([n, v]); }; }
function step(op) {
if (f) throw new TypeError("Generator is already executing.");
while (_) try {
if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;
if (y = 0, t) op = [op[0] & 2, t.value];
switch (op[0]) {
case 0: case 1: t = op; break;
case 4: _.label++; return { value: op[1], done: false };
case 5: _.label++; y = op[1]; op = [0]; continue;
case 7: op = _.ops.pop(); _.trys.pop(); continue;
default:
if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }
if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }
if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }
if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }
if (t[2]) _.ops.pop();
_.trys.pop(); continue;
}
op = body.call(thisArg, _);
} catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }
if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };
}
};
Object.defineProperty(exports, "__esModule", { value: true });
var shield_evaluation_error_1 = require("../error/shield-evaluation-error");
var deferred_1 = require("../utils/deferred");
var http_utils_1 = require("../utils/http-utils");
/**
* Shield implementation for validating session cookies. This shield checks if the request contains a session cookie
* and validates it against OpenAM. The session is cached if notifications are enabled, otherwise it's re-validated for
* every request.
*
* The returned Promise is wrapped in a Deferred object. This is because in case of a redirect to login, the Promise
* must not be resolved (if the Promise is resolved, the agent treats it as success). A redirect is neither success
* nor failure.
*/
var CookieShield = /** @class */ (function () {
function CookieShield(options) {
if (options === void 0) { options = {}; }
this.options = options;
}
CookieShield.prototype.evaluate = function (req, res, agent) {
return __awaiter(this, void 0, void 0, function () {
var deferred, sessionId, sessionData, err_1;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
deferred = new deferred_1.Deferred();
_a.label = 1;
case 1:
_a.trys.push([1, 4, , 5]);
return [4 /*yield*/, agent.getSessionIdFromRequest(req)];
case 2:
sessionId = _a.sent();
return [4 /*yield*/, this.handleSessionCookie(req, res, agent, sessionId)];
case 3:
sessionData = _a.sent();
if (sessionData) {
deferred.resolve({ key: sessionId, data: sessionData });
}
else {
this.redirectToLogin(req, res, agent);
}
return [3 /*break*/, 5];
case 4:
err_1 = _a.sent();
agent.logger.debug("CookieShield: " + err_1.message + " " + err_1.stack);
if (err_1 instanceof shield_evaluation_error_1.ShieldEvaluationError) {
throw err_1;
}
throw new shield_evaluation_error_1.ShieldEvaluationError(err_1.statusCode || err_1.status || 500, err_1.name || err_1.message, err_1.stack);
case 5: return [4 /*yield*/, deferred.promise];
case 6: return [2 /*return*/, _a.sent()];
}
});
});
};
CookieShield.prototype.handleSessionCookie = function (req, res, agent, sessionId) {
return __awaiter(this, void 0, void 0, function () {
var validationResponse, valid, dn, uid, realm, profile;
return __generator(this, function (_a) {
switch (_a.label) {
case 0: return [4 /*yield*/, agent.validateSession(sessionId)];
case 1:
validationResponse = _a.sent();
valid = validationResponse.valid, dn = validationResponse.dn, uid = validationResponse.uid, realm = validationResponse.realm;
if (!valid) return [3 /*break*/, 4];
agent.logger.info("CookieShield: " + req.url + " => allow");
if (!(dn && this.options.getProfiles)) return [3 /*break*/, 3];
return [4 /*yield*/, agent.getUserProfile(uid, realm, sessionId)];
case 2:
profile = _a.sent();
return [2 /*return*/, __assign(__assign({}, validationResponse), profile)];
case 3: return [2 /*return*/, validationResponse];
case 4:
// pass-through: no need to enforce a valid session
if (this.options.passThrough) {
agent.logger.info("CookieShield: " + req.url + " => pass-through");
return [2 /*return*/, {}];
}
agent.logger.info("CookieShield: " + req.url + " => deny");
// no-redirect: return a 401 error response
if (this.options.noRedirect) {
throw new shield_evaluation_error_1.ShieldEvaluationError(401, 'Unauthorized', 'Invalid session');
}
// cdsso: return false so can be redirected to login page.
if (this.options.cdsso) {
return [2 /*return*/, false];
}
return [4 /*yield*/, this.checkDomainMatch(req, agent)];
case 5:
if (!(_a.sent())) {
throw new shield_evaluation_error_1.ShieldEvaluationError(400, 'Bad Request', 'Domain mismatch');
}
return [2 /*return*/];
}
});
});
};
CookieShield.prototype.checkDomainMatch = function (req, agent) {
return __awaiter(this, void 0, void 0, function () {
var domainMatch, domains, _i, domains_1, domain;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
domainMatch = false;
return [4 /*yield*/, agent.getServerInfo()];
case 1:
domains = (_a.sent()).domains;
for (_i = 0, domains_1 = domains; _i < domains_1.length; _i++) {
domain = domains_1[_i];
if (req.headers.host.includes(domain)) {
domainMatch = true;
break;
}
}
return [2 /*return*/, domainMatch];
}
});
});
};
CookieShield.prototype.redirectToLogin = function (req, res, agent) {
http_utils_1.redirect(res, this.options.cdsso ? agent.getCDSSOUrl(req) : agent.getLoginUrl(req));
};
return CookieShield;
}());
exports.CookieShield = CookieShield;
//# sourceMappingURL=cookie-shield.js.map