0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2025-01-06 20:40:08 -05:00
logto/packages/core/src/oidc/init.ts

146 lines
4.5 KiB
TypeScript
Raw Normal View History

/* istanbul ignore file */
import { CustomClientMetadataKey } from '@logto/schemas';
import { exportJWK } from 'jose';
2021-06-27 07:44:05 -05:00
import Koa from 'koa';
import mount from 'koa-mount';
import { Provider, errors } from 'oidc-provider';
import snakecaseKeys from 'snakecase-keys';
2021-06-27 07:44:05 -05:00
import envSet from '@/env-set';
2021-08-29 22:30:54 -05:00
import postgresAdapter from '@/oidc/adapter';
import { isOriginAllowed, validateCustomClientMetadata } from '@/oidc/utils';
import { findResourceByIndicator } from '@/queries/resource';
2021-07-02 09:55:14 -05:00
import { findUserById } from '@/queries/user';
2021-08-11 09:37:21 -05:00
import { routes } from '@/routes/consts';
import { addOidcEventListeners } from '@/utils/oidc-provider-event-listener';
2021-08-29 22:30:54 -05:00
export default async function initOidc(app: Koa): Promise<Provider> {
const { issuer, cookieKeys, privateKey, defaultIdTokenTtl, defaultRefreshTokenTtl } =
envSet.values.oidc;
const keys = [await exportJWK(privateKey)];
2021-07-04 02:01:02 -05:00
const cookieConfig = Object.freeze({
sameSite: 'lax',
path: '/',
signed: true,
} as const);
2021-08-15 10:39:03 -05:00
const oidc = new Provider(issuer, {
2021-06-27 07:44:05 -05:00
adapter: postgresAdapter,
renderError: (_ctx, _out, error) => {
2021-07-04 02:01:02 -05:00
console.log('OIDC error', error);
throw error;
2021-06-27 07:44:05 -05:00
},
cookies: {
keys: cookieKeys,
2021-07-04 02:01:02 -05:00
long: cookieConfig,
short: cookieConfig,
2021-06-27 07:44:05 -05:00
},
jwks: {
keys,
},
features: {
userinfo: { enabled: true },
revocation: { enabled: true },
devInteractions: { enabled: false },
2021-08-15 10:39:03 -05:00
resourceIndicators: {
enabled: true,
// Disable the auto use of authorization_code granted resource feature
// https://github.com/panva/node-oidc-provider/blob/main/docs/README.md#usegrantedresource
useGrantedResource: () => false,
2022-04-08 03:07:34 -05:00
getResourceServerInfo: async (_, indicator) => {
const resourceServer = await findResourceByIndicator(indicator);
if (!resourceServer) {
throw new errors.InvalidTarget();
}
2022-04-08 03:07:34 -05:00
const { accessTokenTtl: accessTokenTTL } = resourceServer;
return {
accessTokenFormat: 'jwt',
2022-04-08 03:07:34 -05:00
scope: '',
accessTokenTTL,
};
},
2021-08-15 10:39:03 -05:00
},
},
interactions: {
2021-07-04 02:01:02 -05:00
url: (_, interaction) => {
switch (interaction.prompt.name) {
case 'login':
return routes.signIn.credentials;
case 'consent':
return routes.signIn.consent;
default:
throw new Error(`Prompt not supported: ${interaction.prompt.name}`);
}
},
},
extraClientMetadata: {
properties: Object.values(CustomClientMetadataKey),
validator: (_, key, value) => {
validateCustomClientMetadata(key, value);
},
},
// https://github.com/panva/node-oidc-provider/blob/main/recipes/client_based_origins.md
clientBasedCORS: (ctx, origin, client) =>
ctx.request.origin === origin || isOriginAllowed(origin, client.metadata()),
// https://github.com/panva/node-oidc-provider/blob/main/recipes/claim_configuration.md
claims: {
profile: ['username', 'name', 'avatar', 'role_names'],
},
// https://github.com/panva/node-oidc-provider/tree/main/docs#findaccount
findAccount: async (_ctx, sub) => {
const { username, name, avatar, roleNames } = await findUserById(sub);
2021-06-27 07:44:05 -05:00
return {
accountId: sub,
claims: async () => {
return snakecaseKeys({
sub,
username,
name,
avatar,
roleNames,
});
},
2021-06-27 07:44:05 -05:00
};
},
ttl: {
/**
* [OIDC Provider Default Settings](https://github.com/panva/node-oidc-provider/blob/main/docs/README.md#ttl)
*/
IdToken: (_ctx, _token, client) => {
const { idTokenTtl } = client.metadata();
2022-01-27 06:26:34 -05:00
return idTokenTtl ?? defaultIdTokenTtl;
},
RefreshToken: (_ctx, _token, client) => {
const { refreshTokenTtl } = client.metadata();
2022-01-27 06:26:34 -05:00
return refreshTokenTtl ?? defaultRefreshTokenTtl;
},
},
extraTokenClaims: async (_ctx, token) => {
// AccessToken type is not exported by default, need to asset token is AccessToken
if (token.kind === 'AccessToken') {
const { accountId } = token;
const { roleNames } = await findUserById(accountId);
// Add User Roles to the AccessToken claims. Should be removed once we have RBAC implemented.
// User Roles should be hidden and determined by the AccessToken scope only.
return snakecaseKeys({
roleNames,
});
}
},
2021-06-27 07:44:05 -05:00
});
addOidcEventListeners(oidc);
2021-06-27 07:44:05 -05:00
app.use(mount('/oidc', oidc.app));
2022-01-27 06:26:34 -05:00
return oidc;
2021-06-27 07:44:05 -05:00
}