mirror of
https://github.com/scinote-eln/scinote-web.git
synced 2024-11-15 13:45:25 +08:00
127 lines
5.6 KiB
Ruby
127 lines
5.6 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'omniauth/strategies/custom_azure_active_directory'
|
|
|
|
AZURE_SETUP_PROC = lambda do |env|
|
|
settings = ApplicationSettings.instance
|
|
providers = settings.values['azure_ad_apps'].select { |v| v['enable_sign_in'] }
|
|
raise StandardError, 'No Azure AD config available for sign in' unless providers.present? && providers[0]['enabled']
|
|
|
|
req = Rack::Request.new(env)
|
|
|
|
if providers.size > 1
|
|
if req.params['id_token'].present? # Callback phase
|
|
unverified_jwt_payload, = JWT.decode(req.params['id_token'], nil, false)
|
|
provider_conf = providers.select { |v| v['app_id'] == unverified_jwt_payload['aud'] }
|
|
else # Authorization phase
|
|
raise ActionController::ParameterMissing, 'Provider name is missing' if req.params['provider'].blank?
|
|
|
|
provider_conf = providers.find { |v| v['provider_name'] == req.params['provider'] }
|
|
end
|
|
raise StandardError, 'No Azure AD config available for sign in' if provider_conf.blank?
|
|
end
|
|
|
|
provider_conf ||= providers.first
|
|
env['omniauth.strategy'].options[:client_id] = provider_conf['app_id']
|
|
env['omniauth.strategy'].options[:client_secret] = provider_conf['client_secret']
|
|
env['omniauth.strategy'].options[:tenant_id] = provider_conf['tenant_id']
|
|
env['omniauth.strategy'].options[:sign_in_policy] = provider_conf['sign_in_policy']
|
|
env['omniauth.strategy'].options[:name] = 'customazureactivedirectory'
|
|
env['omniauth.strategy'].options[:conf_url] = provider_conf['conf_url']
|
|
conf_uri = URI.parse(provider_conf['conf_url'])
|
|
env['omniauth.strategy'].options[:base_azure_url] = "#{conf_uri.scheme || 'https'}://#{conf_uri.host}"
|
|
end
|
|
|
|
OPENID_CONNECT_SETUP_PROC = lambda do |env|
|
|
settings = ApplicationSettings.instance
|
|
provider_conf = settings.values['openid_connect']
|
|
raise StandardError, 'No OpenID Connect config available for sign in' if provider_conf.blank?
|
|
|
|
client_options = {
|
|
identifier: provider_conf['client_id'],
|
|
secret: provider_conf['client_secret'],
|
|
redirect_uri: Rails.application.routes.url_helpers.user_openid_connect_omniauth_callback_url
|
|
}
|
|
|
|
unless provider_conf['discovery']
|
|
client_options[:host] = provider_conf['host']
|
|
client_options[:authorization_endpoint] = provider_conf['authorization_endpoint']
|
|
client_options[:token_endpoint] = provider_conf['token_endpoint']
|
|
client_options[:userinfo_endpoint] = provider_conf['userinfo_endpoint']
|
|
client_options[:jwks_uri] = provider_conf['jwks_uri']
|
|
end
|
|
|
|
env['omniauth.strategy'].options[:name] = 'openid_connect'
|
|
env['omniauth.strategy'].options[:scope] = %i(openid email profile)
|
|
env['omniauth.strategy'].options[:issuer] = provider_conf['issuer_url']
|
|
env['omniauth.strategy'].options[:discovery] = provider_conf['discovery'] == true
|
|
env['omniauth.strategy'].options[:client_options] = client_options
|
|
end
|
|
|
|
OKTA_SETUP_PROC = lambda do |env|
|
|
settings = ApplicationSettings.instance
|
|
provider_conf = settings.values['okta']
|
|
raise StandardError, 'No Okta config available for sign in' unless provider_conf.present? && provider_conf['enabled']
|
|
|
|
oauth2_base_url =
|
|
if provider_conf['auth_server_id'].blank?
|
|
"https://#{provider_conf['domain']}/oauth2"
|
|
else
|
|
"https://#{provider_conf['domain']}/oauth2/#{provider_conf['auth_server_id']}"
|
|
end
|
|
|
|
client_options = {
|
|
site: "https://#{provider_conf['domain']}",
|
|
authorize_url: "#{oauth2_base_url}/v1/authorize",
|
|
token_url: "#{oauth2_base_url}/v1/token",
|
|
user_info_url: "#{oauth2_base_url}/v1/userinfo"
|
|
}
|
|
client_options[:audience] = provider_conf['audience'] if provider_conf['audience'].present?
|
|
if provider_conf['auth_server_id'].present?
|
|
client_options[:authorization_server] = provider_conf['auth_server_id']
|
|
client_options[:use_org_auth_server] = false
|
|
else
|
|
client_options[:use_org_auth_server] = true
|
|
end
|
|
|
|
env['omniauth.strategy'].options[:client_id] = provider_conf['client_id']
|
|
env['omniauth.strategy'].options[:client_secret] = provider_conf['client_secret']
|
|
env['omniauth.strategy'].options[:client_options] = client_options
|
|
end
|
|
|
|
SAML_SETUP_PROC = lambda do |env|
|
|
settings = ApplicationSettings.instance
|
|
provider_conf = settings.values['saml']
|
|
raise StandardError, 'No SAML config available for sign in' if provider_conf.blank?
|
|
|
|
name_format = 'urn:oasis:names:tc:SAML:2.0:attrname-format:basic'
|
|
|
|
env['omniauth.strategy'].options[:idp_sso_service_url] = provider_conf['idp_sso_service_url']
|
|
env['omniauth.strategy'].options[:idp_cert] = provider_conf['idp_cert']
|
|
env['omniauth.strategy'].options[:sp_entity_id] = provider_conf['sp_entity_id']
|
|
env['omniauth.strategy'].options[:uid_attribute] = 'uid'
|
|
env['omniauth.strategy'].options[:request_attributes] = [
|
|
{ name: 'email', name_format: name_format, friendly_name: 'Email address', is_required: true },
|
|
{ name: 'first_name', name_format: name_format, friendly_name: 'First name', is_required: true },
|
|
{ name: 'last_name', name_format: name_format, friendly_name: 'Last name', is_required: true },
|
|
{ name: 'uid', name_format: name_format, friendly_name: 'Unique identifier', is_required: true }
|
|
]
|
|
end
|
|
|
|
Rails.application.config.middleware.use OmniAuth::Builder do
|
|
provider OmniAuth::Strategies::CustomAzureActiveDirectory, setup: AZURE_SETUP_PROC
|
|
end
|
|
|
|
Rails.application.config.middleware.use OmniAuth::Builder do
|
|
provider OmniAuth::Strategies::OpenIDConnect, setup: OPENID_CONNECT_SETUP_PROC
|
|
end
|
|
|
|
Rails.application.config.middleware.use OmniAuth::Builder do
|
|
provider OmniAuth::Strategies::Okta, setup: OKTA_SETUP_PROC
|
|
end
|
|
|
|
Rails.application.config.middleware.use OmniAuth::Builder do
|
|
provider OmniAuth::Strategies::SAML, setup: SAML_SETUP_PROC
|
|
end
|
|
|
|
OmniAuth.config.logger = Rails.logger
|