scinote-web/config/initializers/omniauth.rb

127 lines
5.6 KiB
Ruby

# frozen_string_literal: true
require 'omniauth/strategies/custom_azure_active_directory'
AZURE_SETUP_PROC = lambda do |env|
settings = ApplicationSettings.instance
providers = settings.values['azure_ad_apps'].select { |v| v['enable_sign_in'] }
raise StandardError, 'No Azure AD config available for sign in' unless providers.present? && providers[0]['enabled']
req = Rack::Request.new(env)
if providers.size > 1
if req.params['id_token'].present? # Callback phase
unverified_jwt_payload, = JWT.decode(req.params['id_token'], nil, false)
provider_conf = providers.select { |v| v['app_id'] == unverified_jwt_payload['aud'] }
else # Authorization phase
raise ActionController::ParameterMissing, 'Provider name is missing' if req.params['provider'].blank?
provider_conf = providers.find { |v| v['provider_name'] == req.params['provider'] }
end
raise StandardError, 'No Azure AD config available for sign in' if provider_conf.blank?
end
provider_conf ||= providers.first
env['omniauth.strategy'].options[:client_id] = provider_conf['app_id']
env['omniauth.strategy'].options[:client_secret] = provider_conf['client_secret']
env['omniauth.strategy'].options[:tenant_id] = provider_conf['tenant_id']
env['omniauth.strategy'].options[:sign_in_policy] = provider_conf['sign_in_policy']
env['omniauth.strategy'].options[:name] = 'customazureactivedirectory'
env['omniauth.strategy'].options[:conf_url] = provider_conf['conf_url']
conf_uri = URI.parse(provider_conf['conf_url'])
env['omniauth.strategy'].options[:base_azure_url] = "#{conf_uri.scheme || 'https'}://#{conf_uri.host}"
end
OPENID_CONNECT_SETUP_PROC = lambda do |env|
settings = ApplicationSettings.instance
provider_conf = settings.values['openid_connect']
raise StandardError, 'No OpenID Connect config available for sign in' if provider_conf.blank?
client_options = {
identifier: provider_conf['client_id'],
secret: provider_conf['client_secret'],
redirect_uri: Rails.application.routes.url_helpers.user_openid_connect_omniauth_callback_url
}
unless provider_conf['discovery']
client_options[:host] = provider_conf['host']
client_options[:authorization_endpoint] = provider_conf['authorization_endpoint']
client_options[:token_endpoint] = provider_conf['token_endpoint']
client_options[:userinfo_endpoint] = provider_conf['userinfo_endpoint']
client_options[:jwks_uri] = provider_conf['jwks_uri']
end
env['omniauth.strategy'].options[:name] = 'openid_connect'
env['omniauth.strategy'].options[:scope] = %i(openid email profile)
env['omniauth.strategy'].options[:issuer] = provider_conf['issuer_url']
env['omniauth.strategy'].options[:discovery] = provider_conf['discovery'] == true
env['omniauth.strategy'].options[:client_options] = client_options
end
OKTA_SETUP_PROC = lambda do |env|
settings = ApplicationSettings.instance
provider_conf = settings.values['okta']
raise StandardError, 'No Okta config available for sign in' unless provider_conf.present? && provider_conf['enabled']
oauth2_base_url =
if provider_conf['auth_server_id'].blank?
"https://#{provider_conf['domain']}/oauth2"
else
"https://#{provider_conf['domain']}/oauth2/#{provider_conf['auth_server_id']}"
end
client_options = {
site: "https://#{provider_conf['domain']}",
authorize_url: "#{oauth2_base_url}/v1/authorize",
token_url: "#{oauth2_base_url}/v1/token",
user_info_url: "#{oauth2_base_url}/v1/userinfo"
}
client_options[:audience] = provider_conf['audience'] if provider_conf['audience'].present?
if provider_conf['auth_server_id'].present?
client_options[:authorization_server] = provider_conf['auth_server_id']
client_options[:use_org_auth_server] = false
else
client_options[:use_org_auth_server] = true
end
env['omniauth.strategy'].options[:client_id] = provider_conf['client_id']
env['omniauth.strategy'].options[:client_secret] = provider_conf['client_secret']
env['omniauth.strategy'].options[:client_options] = client_options
end
SAML_SETUP_PROC = lambda do |env|
settings = ApplicationSettings.instance
provider_conf = settings.values['saml']
raise StandardError, 'No SAML config available for sign in' if provider_conf.blank?
name_format = 'urn:oasis:names:tc:SAML:2.0:attrname-format:basic'
env['omniauth.strategy'].options[:idp_sso_service_url] = provider_conf['idp_sso_service_url']
env['omniauth.strategy'].options[:idp_cert] = provider_conf['idp_cert']
env['omniauth.strategy'].options[:sp_entity_id] = provider_conf['sp_entity_id']
env['omniauth.strategy'].options[:uid_attribute] = 'uid'
env['omniauth.strategy'].options[:request_attributes] = [
{ name: 'email', name_format: name_format, friendly_name: 'Email address', is_required: true },
{ name: 'first_name', name_format: name_format, friendly_name: 'First name', is_required: true },
{ name: 'last_name', name_format: name_format, friendly_name: 'Last name', is_required: true },
{ name: 'uid', name_format: name_format, friendly_name: 'Unique identifier', is_required: true }
]
end
Rails.application.config.middleware.use OmniAuth::Builder do
provider OmniAuth::Strategies::CustomAzureActiveDirectory, setup: AZURE_SETUP_PROC
end
Rails.application.config.middleware.use OmniAuth::Builder do
provider OmniAuth::Strategies::OpenIDConnect, setup: OPENID_CONNECT_SETUP_PROC
end
Rails.application.config.middleware.use OmniAuth::Builder do
provider OmniAuth::Strategies::Okta, setup: OKTA_SETUP_PROC
end
Rails.application.config.middleware.use OmniAuth::Builder do
provider OmniAuth::Strategies::SAML, setup: SAML_SETUP_PROC
end
OmniAuth.config.logger = Rails.logger