-
Notifications
You must be signed in to change notification settings - Fork 421
/
check-sso.js
80 lines (66 loc) · 2.56 KB
/
check-sso.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
/*
* Copyright 2016 Red Hat Inc. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http:https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
'use strict'
const UUID = require('./../uuid')
const URL = require('url')
function forceCheckSSO (keycloak, request, response) {
const host = request.hostname
const headerHost = request.headers.host.split(':')
const port = headerHost[1] || ''
const protocol = request.protocol
const hasQuery = ~(request.originalUrl || request.url).indexOf('?')
const redirectUrl = protocol + ':https://' + host + (port === '' ? '' : ':' + port) + (request.originalUrl || request.url) + (hasQuery ? '&' : '?') + 'auth_callback=1'
if (request.session) {
request.session.auth_redirect_uri = redirectUrl
}
const uuid = UUID()
const loginURL = keycloak.loginUrl(uuid, redirectUrl)
const checkSsoUrl = loginURL + '&response_mode=query&prompt=none'
response.redirect(checkSsoUrl)
}
module.exports = function (keycloak) {
return function checkSso (request, response, next) {
if (request.kauth && request.kauth.grant) {
return next()
}
// Check SSO process is completed and user is not logged in
if (request.session.auth_is_check_sso_complete) {
request.session.auth_is_check_sso_complete = false
return next()
}
// Keycloak server has just answered that user is not logged in
if (request.query.error === 'login_required') {
const urlParts = {
pathname: request.path,
query: request.query
}
delete urlParts.query.error
delete urlParts.query.auth_callback
delete urlParts.query.state
// Collapse leading slashes to a single slash to prevent open redirects
const cleanUrl = URL.format(urlParts).replace(/^\/+/, '/')
// Check SSO process is completed
request.session.auth_is_check_sso_complete = true
// Redirect back to the original URL
return response.redirect(cleanUrl)
}
if (keycloak.redirectToLogin(request)) {
forceCheckSSO(keycloak, request, response)
} else {
return keycloak.accessDenied(request, response, next)
}
}
}