@@ -49,6 +49,7 @@ const InternalOpenIDError = require('./errors/internalopeniderror');
49
49
const Log = require ( './logging' ) . getLogger ;
50
50
const Metadata = require ( './metadata' ) . Metadata ;
51
51
const OAuth2 = require ( 'oauth' ) . OAuth2 ;
52
+ const HttpsProxyAgent = require ( 'https-proxy-agent' ) ;
52
53
const SessionContentHandler = require ( './sessionContentHandler' ) . SessionContentHandler ;
53
54
const CookieContentHandler = require ( './cookieContentHandler' ) . CookieContentHandler ;
54
55
const Validator = require ( './validator' ) . Validator ;
@@ -476,7 +477,7 @@ function Strategy(options, verify) {
476
477
/****************************************************************************************
477
478
* Take care of scope
478
479
***************************************************************************************/
479
- // make scope an array
480
+ // make scope an array
480
481
if ( ! options . scope )
481
482
options . scope = [ ] ;
482
483
if ( ! Array . isArray ( options . scope ) )
@@ -601,9 +602,9 @@ Strategy.prototype.authenticate = function authenticateStrategy(req, options) {
601
602
var response = options && options . response || req . res ;
602
603
603
604
// 'params': items we get from the request or metadata, such as id_token, code, policy, metadata, cacheKey, etc
604
- var params = { 'tenantIdOrName' : tenantIdOrName , 'extraAuthReqQueryParams' : extraAuthReqQueryParams , 'extraTokenReqQueryParams' : extraTokenReqQueryParams } ;
605
+ var params = { 'proxy' : self . _options . proxy , ' tenantIdOrName' : tenantIdOrName , 'extraAuthReqQueryParams' : extraAuthReqQueryParams , 'extraTokenReqQueryParams' : extraTokenReqQueryParams } ;
605
606
// 'oauthConfig': items needed for oauth flow (like redirection, code redemption), such as token_endpoint, userinfo_endpoint, etc
606
- var oauthConfig = { 'resource' : resource , 'customState' : customState , 'domain_hint' : domain_hint , 'login_hint' : login_hint , 'prompt' : prompt , 'response' : response } ;
607
+ var oauthConfig = { 'proxy' : self . _options . proxy , ' resource' : resource , 'customState' : customState , 'domain_hint' : domain_hint , 'login_hint' : login_hint , 'prompt' : prompt , 'response' : response } ;
607
608
// 'optionsToValidate': items we need to validate id_token against, such as issuer, audience, etc
608
609
var optionsToValidate = { } ;
609
610
@@ -672,7 +673,7 @@ Strategy.prototype.authenticate = function authenticateStrategy(req, options) {
672
673
* @param {Object } req
673
674
* @param {Object } next
674
675
*/
675
- Strategy . prototype . collectInfoFromReq = function ( params , req , next , response ) {
676
+ Strategy . prototype . collectInfoFromReq = function ( params , req , next , response ) {
676
677
const self = this ;
677
678
678
679
// the things we will put into 'params':
@@ -858,7 +859,7 @@ Strategy.prototype.setOptions = function setOptions(params, oauthConfig, options
858
859
}
859
860
860
861
// for B2C, verify the endpoints in oauthConfig has the correct policy
861
- if ( self . _options . isB2C ) {
862
+ if ( self . _options . isB2C ) {
862
863
var policyChecker = ( endpoint , policy ) => {
863
864
var u = { } ;
864
865
try {
@@ -956,7 +957,7 @@ Strategy.prototype._idTokenHandler = function idTokenHandler(params, optionsToVa
956
957
var decrypted_token ;
957
958
958
959
return jwe . decrypt ( id_token , optionsToValidate . jweKeyStore , log , ( err , decrypted_token ) => {
959
- if ( err )
960
+ if ( err )
960
961
return next ( err ) ;
961
962
962
963
params . id_token = decrypted_token ;
@@ -1415,7 +1416,12 @@ Strategy.prototype._flowInitializationHandler = function flowInitializationHandl
1415
1416
params [ aadutils . getLibraryProductParameterName ( ) ] = aadutils . getLibraryProduct ( ) ;
1416
1417
params [ aadutils . getLibraryVersionParameterName ( ) ] = aadutils . getLibraryVersion ( ) ;
1417
1418
1418
- const location = aadutils . concatUrl ( oauthConfig . authorization_endpoint , querystring . stringify ( params ) ) ;
1419
+ // Implement support for standard OpenID Connect params (display, prompt, etc.)
1420
+ const separator = self . _options . isB2C ? '&' : '?' ;
1421
+ const location = [
1422
+ oauthConfig . authorization_endpoint ,
1423
+ querystring . stringify ( params )
1424
+ ] . join ( separator ) ;
1419
1425
1420
1426
return self . redirect ( location ) ;
1421
1427
} ;
@@ -1462,7 +1468,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
1462
1468
return next ( err ) ;
1463
1469
else
1464
1470
post_params [ 'client_assertion' ] = assertion ;
1465
- } ) ;
1471
+ } ) ;
1466
1472
1467
1473
if ( self . _options . loggingNoPII )
1468
1474
log . info ( 'In _getAccessTokenBySecretOrAssertion: we created a client assertion' ) ;
@@ -1480,7 +1486,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
1480
1486
var results ;
1481
1487
try {
1482
1488
results = JSON . parse ( data ) ;
1483
- } catch ( e ) {
1489
+ } catch ( e ) {
1484
1490
results = querystring . parse ( data ) ;
1485
1491
}
1486
1492
callback ( null , results ) ;
@@ -1493,7 +1499,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
1493
1499
*
1494
1500
* @params {String} message
1495
1501
*/
1496
- Strategy . prototype . failWithLog = function ( message ) {
1502
+ Strategy . prototype . failWithLog = function ( message ) {
1497
1503
this . log . info ( `authentication failed due to: ${ message } ` ) ;
1498
1504
return this . fail ( message ) ;
1499
1505
} ;
@@ -1503,7 +1509,7 @@ Strategy.prototype.failWithLog = function(message) {
1503
1509
*
1504
1510
* @params {Object} oauthConfig
1505
1511
*/
1506
- var createOauth2Instance = function ( oauthConfig ) {
1512
+ var createOauth2Instance = function ( oauthConfig ) {
1507
1513
let libraryVersion = aadutils . getLibraryVersion ( ) ;
1508
1514
let libraryVersionParameterName = aadutils . getLibraryVersionParameterName ( ) ;
1509
1515
let libraryProduct = aadutils . getLibraryProduct ( ) ;
@@ -1515,10 +1521,18 @@ var createOauth2Instance = function(oauthConfig) {
1515
1521
'' , // baseURL (empty string because we use absolute urls for authorize and token paths)
1516
1522
oauthConfig . authorization_endpoint , // authorizePath
1517
1523
oauthConfig . token_endpoint , // accessTokenPath
1518
- { libraryProductParameterName : libraryProduct ,
1519
- libraryVersionParameterName : libraryVersion } // customHeaders
1524
+ {
1525
+ libraryProductParameterName : libraryProduct ,
1526
+ libraryVersionParameterName : libraryVersion
1527
+ } // customHeaders
1520
1528
) ;
1521
1529
1530
+ if ( oauthConfig . proxy ) {
1531
+ // if user has specified proxy settings instantiate agent
1532
+ oauth2 . setAgent ( new HttpsProxyAgent ( oauthConfig . proxy ) ) ;
1533
+ }
1534
+
1535
+
1522
1536
return oauth2 ;
1523
1537
} ;
1524
1538
0 commit comments