@boxyhq/saml-jackson 1.1.5 → 1.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -161,6 +161,10 @@ class OAuthController {
161
161
  state,
162
162
  tenant,
163
163
  product,
164
+ access_type,
165
+ resource,
166
+ scope,
167
+ nonce,
164
168
  code_challenge,
165
169
  code_challenge_method,
166
170
  provider,
@@ -206,6 +210,10 @@ class OAuthController {
206
210
  state,
207
211
  tenant,
208
212
  product,
213
+ access_type,
214
+ resource,
215
+ scope,
216
+ nonce,
209
217
  code_challenge,
210
218
  code_challenge_method,
211
219
  provider,
@@ -0,0 +1,21 @@
1
+ import type { JacksonOption } from '../typings';
2
+ export declare class SPSAMLConfig {
3
+ private opts;
4
+ constructor(opts: JacksonOption);
5
+ private get acsUrl();
6
+ private get entityId();
7
+ private get responseSigned();
8
+ private get assertionSignature();
9
+ private get signatureAlgorithm();
10
+ private get assertionEncryption();
11
+ get(): {
12
+ acsUrl: string;
13
+ entityId: string;
14
+ response: string;
15
+ assertionSignature: string;
16
+ signatureAlgorithm: string;
17
+ assertionEncryption: string;
18
+ };
19
+ toMarkdown(): string;
20
+ toHTML(): string;
21
+ }
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SPSAMLConfig = void 0;
4
+ const marked_1 = require("marked");
5
+ // Service Provider SAML Configuration
6
+ class SPSAMLConfig {
7
+ constructor(opts) {
8
+ this.opts = opts;
9
+ }
10
+ get acsUrl() {
11
+ return `${this.opts.externalUrl}${this.opts.samlPath}`;
12
+ }
13
+ get entityId() {
14
+ return `${this.opts.samlAudience}`;
15
+ }
16
+ get responseSigned() {
17
+ return 'Signed';
18
+ }
19
+ get assertionSignature() {
20
+ return 'Signed';
21
+ }
22
+ get signatureAlgorithm() {
23
+ return 'RSA-SHA256';
24
+ }
25
+ get assertionEncryption() {
26
+ return 'Unencrypted';
27
+ }
28
+ get() {
29
+ return {
30
+ acsUrl: this.acsUrl,
31
+ entityId: this.entityId,
32
+ response: this.responseSigned,
33
+ assertionSignature: this.assertionSignature,
34
+ signatureAlgorithm: this.signatureAlgorithm,
35
+ assertionEncryption: this.assertionEncryption,
36
+ };
37
+ }
38
+ toMarkdown() {
39
+ return markdownTemplate
40
+ .replace('{{acsUrl}}', this.acsUrl)
41
+ .replace('{{entityId}}', this.entityId)
42
+ .replace('{{responseSigned}}', this.responseSigned)
43
+ .replace('{{assertionSignature}}', this.assertionSignature)
44
+ .replace('{{signatureAlgorithm}}', this.signatureAlgorithm)
45
+ .replace('{{assertionEncryption}}', this.assertionEncryption);
46
+ }
47
+ toHTML() {
48
+ return marked_1.marked.parse(this.toMarkdown());
49
+ }
50
+ }
51
+ exports.SPSAMLConfig = SPSAMLConfig;
52
+ const markdownTemplate = `
53
+ ## Service Provider (SP) SAML Configuration
54
+
55
+ Your Identity Provider (IdP) will ask for the following information while configuring the SAML application. Share this information with your IT administrator.
56
+
57
+ **ACS (Assertion Consumer Service) URL / Single Sign-On URL / Destination URL** <br />
58
+ {{acsUrl}}
59
+
60
+ **SP Entity ID / Identifier / Audience URI / Audience Restriction** <br />
61
+ {{entityId}}
62
+
63
+ **Response** <br />
64
+ {{responseSigned}}
65
+
66
+ **Assertion Signature** <br />
67
+ {{assertionSignature}}
68
+
69
+ **Signature Algorithm** <br />
70
+ {{signatureAlgorithm}}
71
+
72
+ **Assertion Encryption** <br />
73
+ {{assertionEncryption}}
74
+ `;
package/dist/index.d.ts CHANGED
@@ -4,6 +4,7 @@ import { OAuthController } from './controller/oauth';
4
4
  import { HealthCheckController } from './controller/health-check';
5
5
  import { LogoutController } from './controller/logout';
6
6
  import { OidcDiscoveryController } from './controller/oidc-discovery';
7
+ import { SPSAMLConfig } from './controller/sp-config';
7
8
  import { JacksonOption } from './typings';
8
9
  export declare const controllers: (opts: JacksonOption) => Promise<{
9
10
  apiController: APIController;
@@ -12,6 +13,7 @@ export declare const controllers: (opts: JacksonOption) => Promise<{
12
13
  logoutController: LogoutController;
13
14
  healthCheckController: HealthCheckController;
14
15
  oidcDiscoveryController: OidcDiscoveryController;
16
+ spConfig: SPSAMLConfig;
15
17
  }>;
16
18
  export default controllers;
17
19
  export * from './typings';
package/dist/index.js CHANGED
@@ -33,6 +33,7 @@ const oauth_1 = require("./controller/oauth");
33
33
  const health_check_1 = require("./controller/health-check");
34
34
  const logout_1 = require("./controller/logout");
35
35
  const oidc_discovery_1 = require("./controller/oidc-discovery");
36
+ const sp_config_1 = require("./controller/sp-config");
36
37
  const db_1 = __importDefault(require("./db/db"));
37
38
  const defaultDb_1 = __importDefault(require("./db/defaultDb"));
38
39
  const read_config_1 = __importDefault(require("./read-config"));
@@ -79,6 +80,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
79
80
  opts,
80
81
  });
81
82
  const oidcDiscoveryController = new oidc_discovery_1.OidcDiscoveryController({ opts });
83
+ const spConfig = new sp_config_1.SPSAMLConfig(opts);
82
84
  // write pre-loaded config if present
83
85
  if (opts.preLoadedConfig && opts.preLoadedConfig.length > 0) {
84
86
  const configs = yield (0, read_config_1.default)(opts.preLoadedConfig);
@@ -90,6 +92,7 @@ const controllers = (opts) => __awaiter(void 0, void 0, void 0, function* () {
90
92
  const type = opts.db.engine === 'sql' && opts.db.type ? ' Type: ' + opts.db.type : '';
91
93
  console.log(`Using engine: ${opts.db.engine}.${type}`);
92
94
  return {
95
+ spConfig,
93
96
  apiController,
94
97
  oauthController,
95
98
  adminController,
package/dist/typings.d.ts CHANGED
@@ -199,4 +199,16 @@ export interface OAuthErrorHandlerParams {
199
199
  redirect_uri: string;
200
200
  state?: string;
201
201
  }
202
+ export interface ISPSAMLConfig {
203
+ get(): {
204
+ acsUrl: string;
205
+ entityId: string;
206
+ response: string;
207
+ assertionSignature: string;
208
+ signatureAlgorithm: string;
209
+ assertionEncryption: string;
210
+ };
211
+ toMarkdown(): string;
212
+ toHTML(): string;
213
+ }
202
214
  export {};
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@boxyhq/saml-jackson",
3
- "version": "1.1.5",
3
+ "version": "1.1.6",
4
4
  "description": "SAML Jackson library",
5
5
  "keywords": [
6
6
  "SAML 2.0"
@@ -39,36 +39,37 @@
39
39
  },
40
40
  "dependencies": {
41
41
  "@boxyhq/saml20": "1.0.6",
42
- "@opentelemetry/api-metrics": "0.27.0",
43
42
  "@opentelemetry/api": "1.0.4",
43
+ "@opentelemetry/api-metrics": "0.27.0",
44
44
  "@peculiar/webcrypto": "1.4.0",
45
- "@peculiar/x509": "1.8.1",
46
- "jose": "4.8.3",
47
- "mongodb": "4.8.1",
45
+ "@peculiar/x509": "1.8.3",
46
+ "jose": "4.9.2",
47
+ "marked": "4.1.0",
48
+ "mongodb": "4.9.1",
48
49
  "mysql2": "2.3.3",
49
- "pg": "8.7.3",
50
- "redis": "4.0.6",
50
+ "pg": "8.8.0",
51
+ "redis": "4.3.1",
51
52
  "reflect-metadata": "0.1.13",
52
53
  "ripemd160": "2.0.2",
53
- "typeorm": "0.3.7",
54
+ "typeorm": "0.3.9",
54
55
  "xml2js": "0.4.23",
55
56
  "xmlbuilder": "15.1.1"
56
57
  },
57
58
  "devDependencies": {
58
- "@types/node": "18.6.3",
59
+ "@types/node": "18.7.16",
59
60
  "@types/sinon": "10.0.13",
60
61
  "@types/tap": "15.0.7",
61
- "@typescript-eslint/eslint-plugin": "5.31.0",
62
- "@typescript-eslint/parser": "5.31.0",
62
+ "@typescript-eslint/eslint-plugin": "5.36.2",
63
+ "@typescript-eslint/parser": "5.36.2",
63
64
  "cross-env": "7.0.3",
64
- "eslint": "8.21.0",
65
+ "eslint": "8.23.0",
65
66
  "eslint-config-prettier": "8.5.0",
66
67
  "prettier": "2.7.1",
67
68
  "sinon": "14.0.0",
68
69
  "tap": "16.3.0",
69
70
  "ts-node": "10.9.1",
70
- "tsconfig-paths": "4.0.0",
71
- "typescript": "4.7.4"
71
+ "tsconfig-paths": "4.1.0",
72
+ "typescript": "4.8.2"
72
73
  },
73
74
  "engines": {
74
75
  "node": ">=14.18.1 <=16.x"