@boxyhq/saml-jackson 1.1.3 → 1.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -161,6 +161,10 @@ class OAuthController {
161
161
  state,
162
162
  tenant,
163
163
  product,
164
+ access_type,
165
+ resource,
166
+ scope,
167
+ nonce,
164
168
  code_challenge,
165
169
  code_challenge_method,
166
170
  provider,
@@ -206,6 +210,10 @@ class OAuthController {
206
210
  state,
207
211
  tenant,
208
212
  product,
213
+ access_type,
214
+ resource,
215
+ scope,
216
+ nonce,
209
217
  code_challenge,
210
218
  code_challenge_method,
211
219
  provider,
@@ -294,7 +302,7 @@ class OAuthController {
294
302
  publicKey: samlConfig.certs.publicKey,
295
303
  });
296
304
  const sessionId = crypto_1.default.randomBytes(16).toString('hex');
297
- const requested = { client_id, state };
305
+ const requested = { client_id, state, redirect_uri };
298
306
  if (requestedTenant) {
299
307
  requested.tenant = requestedTenant;
300
308
  }
@@ -542,8 +550,9 @@ class OAuthController {
542
550
  * expires_in: 300
543
551
  */
544
552
  token(body) {
553
+ var _a, _b, _c;
545
554
  return __awaiter(this, void 0, void 0, function* () {
546
- const { client_id, client_secret, code_verifier, code, grant_type = 'authorization_code' } = body;
555
+ const { client_id, client_secret, code_verifier, code, grant_type = 'authorization_code', redirect_uri, } = body;
547
556
  metrics.increment('oauthToken');
548
557
  if (grant_type !== 'authorization_code') {
549
558
  throw new error_1.JacksonError('Unsupported grant_type', 400);
@@ -555,6 +564,11 @@ class OAuthController {
555
564
  if (!codeVal || !codeVal.profile) {
556
565
  throw new error_1.JacksonError('Invalid code', 403);
557
566
  }
567
+ if ((_a = codeVal.requested) === null || _a === void 0 ? void 0 : _a.redirect_uri) {
568
+ if (redirect_uri !== codeVal.requested.redirect_uri) {
569
+ throw new error_1.JacksonError(`Invalid request: ${!redirect_uri ? 'redirect_uri missing' : 'redirect_uri mismatch'}`, 400);
570
+ }
571
+ }
558
572
  if (code_verifier) {
559
573
  // PKCE flow
560
574
  let cv = code_verifier;
@@ -594,8 +608,8 @@ class OAuthController {
594
608
  // store details against a token
595
609
  const token = crypto_1.default.randomBytes(20).toString('hex');
596
610
  const tokenVal = Object.assign(Object.assign({}, codeVal.profile), { requested: codeVal.requested });
597
- const requestedOIDCFlow = !!codeVal.requested.oidc;
598
- const requestHasNonce = !!codeVal.requested.nonce;
611
+ const requestedOIDCFlow = !!((_b = codeVal.requested) === null || _b === void 0 ? void 0 : _b.oidc);
612
+ const requestHasNonce = !!((_c = codeVal.requested) === null || _c === void 0 ? void 0 : _c.nonce);
599
613
  if (requestedOIDCFlow) {
600
614
  const { jwtSigningKeys, jwsAlg } = this.opts.openid;
601
615
  if (!jwtSigningKeys || !(0, utils_1.isJWSKeyPairLoaded)(jwtSigningKeys)) {
@@ -0,0 +1,21 @@
1
+ import type { JacksonOption } from '../typings';
2
+ export declare class SPSAMLConfig {
3
+ private opts;
4
+ constructor(opts: JacksonOption);
5
+ private get acsUrl();
6
+ private get entityId();
7
+ private get responseSigned();
8
+ private get assertionSignature();
9
+ private get signatureAlgorithm();
10
+ private get assertionEncryption();
11
+ get(): {
12
+ acsUrl: string;
13
+ entityId: string;
14
+ response: string;
15
+ assertionSignature: string;
16
+ signatureAlgorithm: string;
17
+ assertionEncryption: string;
18
+ };
19
+ toMarkdown(): string;
20
+ toHTML(): string;
21
+ }
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SPSAMLConfig = void 0;
4
+ const marked_1 = require("marked");
5
+ // Service Provider SAML Configuration
6
+ class SPSAMLConfig {
7
+ constructor(opts) {
8
+ this.opts = opts;
9
+ }
10
+ get acsUrl() {
11
+ return `${this.opts.externalUrl}${this.opts.samlPath}`;
12
+ }
13
+ get entityId() {
14
+ return `${this.opts.samlAudience}`;
15
+ }
16
+ get responseSigned() {
17
+ return 'Signed';
18
+ }
19
+ get assertionSignature() {
20
+ return 'Signed';
21
+ }
22
+ get signatureAlgorithm() {
23
+ return 'RSA-SHA256';
24
+ }
25
+ get assertionEncryption() {
26
+ return 'Unencrypted';
27
+ }
28
+ get() {
29
+ return {
30
+ acsUrl: this.acsUrl,
31
+ entityId: this.entityId,
32
+ response: this.responseSigned,
33
+ assertionSignature: this.assertionSignature,
34
+ signatureAlgorithm: this.signatureAlgorithm,
35
+ assertionEncryption: this.assertionEncryption,
36
+ };
37
+ }
38
+ toMarkdown() {
39
+ return markdownTemplate
40
+ .replace('{{acsUrl}}', this.acsUrl)
41
+ .replace('{{entityId}}', this.entityId)
42
+ .replace('{{responseSigned}}', this.responseSigned)
43
+ .replace('{{assertionSignature}}', this.assertionSignature)
44
+ .replace('{{signatureAlgorithm}}', this.signatureAlgorithm)
45
+ .replace('{{assertionEncryption}}', this.assertionEncryption);
46
+ }
47
+ toHTML() {
48
+ return marked_1.marked.parse(this.toMarkdown());
49
+ }
50
+ }
51
+ exports.SPSAMLConfig = SPSAMLConfig;
52
+ const markdownTemplate = `
53
+ ## Service Provider (SP) SAML Configuration
54
+
55
+ Your Identity Provider (IdP) will ask for the following information while configuring the SAML application. Share this information with your IT administrator.
56
+
57
+ **ACS (Assertion Consumer Service) URL / Single Sign-On URL / Destination URL** <br />
58
+ {{acsUrl}}
59
+
60
+ **SP Entity ID / Identifier / Audience URI / Audience Restriction** <br />
61
+ {{entityId}}
62
+
63
+ **Response** <br />
64
+ {{responseSigned}}
65
+
66
+ **Assertion Signature** <br />
67
+ {{assertionSignature}}
68
+
69
+ **Signature Algorithm** <br />
70
+ {{signatureAlgorithm}}
71
+
72
+ **Assertion Encryption** <br />
73
+ {{assertionEncryption}}
74
+ `;
package/dist/db/mem.js CHANGED
@@ -108,7 +108,6 @@ class Mem {
108
108
  return __awaiter(this, void 0, void 0, function* () {
109
109
  const k = dbutils.key(namespace, key);
110
110
  this.store[k] = val;
111
- // console.log(this.store)
112
111
  if (ttl) {
113
112
  this.ttlStore[k] = {
114
113
  namespace,
package/dist/index.d.ts CHANGED
@@ -4,6 +4,7 @@ import { OAuthController } from './controller/oauth';
4
4
  import { HealthCheckController } from './controller/health-check';
5
5
  import { LogoutController } from './controller/logout';
6
6
  import { OidcDiscoveryController } from './controller/oidc-discovery';
7
+ import { SPSAMLConfig } from './controller/sp-config';
7
8
  import { JacksonOption } from './typings';
8
9
  export declare const controllers: (opts: JacksonOption) => Promise<{
9
10
  apiController: APIController;
@@ -12,6 +13,7 @@ export declare const controllers: (opts: JacksonOption) => Promise<{
12
13
  logoutController: LogoutController;
13
14
  healthCheckController: HealthCheckController;
14
15
  oidcDiscoveryController: OidcDiscoveryController;
16
+ spConfig: SPSAMLConfig;
15
17
  }>;
16
18
  export default controllers;
17
19
  export * from './typings';
package/dist/index.js CHANGED
@@ -33,6 +33,7 @@ const oauth_1 = require("./controller/oauth");
33
33
  const health_check_1 = require("./controller/health-check");
34
34
  const logout_1 = require("./controller/logout");
35
35
  const oidc_discovery_1 = require("./controller/oidc-discovery");
36
+ const sp_config_1 = require("./controller/sp-config");
36
37
  const db_1 = __importDefault(require("./db/db"));
37
38
  const defaultDb_1 = __importDefault(require("./db/defaultDb"));
38
39
  const read_config_1 = __importDefault(require("./read-config"));
@@ -79,6 +80,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
79
80
  opts,
80
81
  });
81
82
  const oidcDiscoveryController = new oidc_discovery_1.OidcDiscoveryController({ opts });
83
+ const spConfig = new sp_config_1.SPSAMLConfig(opts);
82
84
  // write pre-loaded config if present
83
85
  if (opts.preLoadedConfig && opts.preLoadedConfig.length > 0) {
84
86
  const configs = yield (0, read_config_1.default)(opts.preLoadedConfig);
@@ -90,6 +92,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
90
92
  const type = opts.db.engine === 'sql' && opts.db.type ? ' Type: ' + opts.db.type : '';
91
93
  console.log(`Using engine: ${opts.db.engine}.${type}`);
92
94
  return {
95
+ spConfig,
93
96
  apiController,
94
97
  oauthController,
95
98
  adminController,
package/dist/typings.d.ts CHANGED
@@ -4,8 +4,8 @@ export declare type IdPConfig = {
4
4
  redirectUrl: string[] | string;
5
5
  tenant: string;
6
6
  product: string;
7
- name: string;
8
- description: string;
7
+ name?: string;
8
+ description?: string;
9
9
  rawMetadata?: string;
10
10
  encodedRawMetadata?: string;
11
11
  };
@@ -89,6 +89,7 @@ export interface OAuthTokenReq {
89
89
  code_verifier: string;
90
90
  code: string;
91
91
  grant_type: 'authorization_code';
92
+ redirect_uri?: string;
92
93
  }
93
94
  export interface OAuthTokenRes {
94
95
  access_token: string;
@@ -198,4 +199,16 @@ export interface OAuthErrorHandlerParams {
198
199
  redirect_uri: string;
199
200
  state?: string;
200
201
  }
202
+ export interface ISPSAMLConfig {
203
+ get(): {
204
+ acsUrl: string;
205
+ entityId: string;
206
+ response: string;
207
+ assertionSignature: string;
208
+ signatureAlgorithm: string;
209
+ assertionEncryption: string;
210
+ };
211
+ toMarkdown(): string;
212
+ toHTML(): string;
213
+ }
201
214
  export {};
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@boxyhq/saml-jackson",
3
- "version": "1.1.3",
3
+ "version": "1.1.6",
4
4
  "description": "SAML Jackson library",
5
5
  "keywords": [
6
6
  "SAML 2.0"
@@ -39,36 +39,37 @@
39
39
  },
40
40
  "dependencies": {
41
41
  "@boxyhq/saml20": "1.0.6",
42
- "@opentelemetry/api-metrics": "0.27.0",
43
42
  "@opentelemetry/api": "1.0.4",
43
+ "@opentelemetry/api-metrics": "0.27.0",
44
44
  "@peculiar/webcrypto": "1.4.0",
45
- "@peculiar/x509": "1.8.1",
46
- "jose": "4.8.3",
47
- "mongodb": "4.8.1",
45
+ "@peculiar/x509": "1.8.3",
46
+ "jose": "4.9.2",
47
+ "marked": "4.1.0",
48
+ "mongodb": "4.9.1",
48
49
  "mysql2": "2.3.3",
49
- "pg": "8.7.3",
50
- "redis": "4.0.6",
50
+ "pg": "8.8.0",
51
+ "redis": "4.3.1",
51
52
  "reflect-metadata": "0.1.13",
52
53
  "ripemd160": "2.0.2",
53
- "typeorm": "0.3.7",
54
+ "typeorm": "0.3.9",
54
55
  "xml2js": "0.4.23",
55
56
  "xmlbuilder": "15.1.1"
56
57
  },
57
58
  "devDependencies": {
58
- "@types/node": "18.6.3",
59
+ "@types/node": "18.7.16",
59
60
  "@types/sinon": "10.0.13",
60
61
  "@types/tap": "15.0.7",
61
- "@typescript-eslint/eslint-plugin": "5.31.0",
62
- "@typescript-eslint/parser": "5.31.0",
62
+ "@typescript-eslint/eslint-plugin": "5.36.2",
63
+ "@typescript-eslint/parser": "5.36.2",
63
64
  "cross-env": "7.0.3",
64
- "eslint": "8.21.0",
65
+ "eslint": "8.23.0",
65
66
  "eslint-config-prettier": "8.5.0",
66
67
  "prettier": "2.7.1",
67
68
  "sinon": "14.0.0",
68
69
  "tap": "16.3.0",
69
70
  "ts-node": "10.9.1",
70
- "tsconfig-paths": "4.0.0",
71
- "typescript": "4.7.4"
71
+ "tsconfig-paths": "4.1.0",
72
+ "typescript": "4.8.2"
72
73
  },
73
74
  "engines": {
74
75
  "node": ">=14.18.1 <=16.x"