Skip to content
This repository was archived by the owner on Aug 28, 2023. It is now read-only.

Commit bb98743

Browse files
committedFeb 29, 2020
#341 add in basic proxy agent
rebased and improved readability
1 parent 48d44bb commit bb98743

File tree

3 files changed

+46
-20
lines changed

3 files changed

+46
-20
lines changed
 

‎lib/metadata.js

+17-6
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
const request = require('request');
2727
const async = require('async');
2828
const aadutils = require('./aadutils');
29-
29+
const HttpsProxyAgent = require('https-proxy-agent');
3030
const Log = require('./logging').getLogger;
3131

3232
const log = new Log('AzureAD: Metadata Parser');
@@ -46,6 +46,10 @@ function Metadata(url, authtype, options) {
4646
this.metadata = null;
4747
this.authtype = authtype;
4848
this.loggingNoPII = options.loggingNoPII;
49+
if (options.proxy) {
50+
// if user has specified proxy settings instantiate agent
51+
this.httpsProxyAgent = new HttpsProxyAgent(options.proxy);
52+
}
4953
}
5054

5155
Object.defineProperty(Metadata, 'url', {
@@ -66,6 +70,12 @@ Object.defineProperty(Metadata, 'metadata', {
6670
},
6771
});
6872

73+
Object.defineProperty(Metadata, 'httpsProxyAgent', {
74+
get: function getHttpsProxyAgent() {
75+
return this.httpsProxyAgent;
76+
}
77+
});
78+
6979
Metadata.prototype.updateOidcMetadata = function updateOidcMetadata(doc, next) {
7080
log.info('Request to update the Open ID Connect Metadata');
7181

@@ -93,7 +103,8 @@ Metadata.prototype.updateOidcMetadata = function updateOidcMetadata(doc, next) {
93103
}
94104

95105
// fetch the signing keys
96-
request.get(jwksUri, { json: true }, (err, response, body) => {
106+
107+
request.get({ uri: jwksUri, agent: self.httpsProxyAgent, json: true }, (err, response, body) => {
97108
if (err) {
98109
return next(err);
99110
}
@@ -151,7 +162,7 @@ Metadata.prototype.generateOidcPEM = function generateOidcPEM(kid) {
151162
// generate PEM from `modulus` and `exponent`
152163
pubKey = aadutils.rsaPublicKeyPem(key.n, key.e);
153164
foundKey = true;
154-
165+
155166
return pubKey;
156167
});
157168

@@ -161,14 +172,14 @@ Metadata.prototype.generateOidcPEM = function generateOidcPEM(kid) {
161172
else
162173
throw new Error(`a key with kid %s cannot be found`, kid);
163174
}
164-
175+
165176
if (!pubKey) {
166177
if (self.loggingNoPII)
167178
throw new Error('generating public key pem failed');
168179
else
169180
throw new Error(`generating public key pem failed for kid: %s`, kid);
170181
}
171-
182+
172183
return pubKey;
173184
};
174185

@@ -178,7 +189,7 @@ Metadata.prototype.fetch = function fetch(callback) {
178189
async.waterfall([
179190
// fetch the Federation metadata for the AAD tenant
180191
(next) => {
181-
request.get(self.url, (err, response, body) => {
192+
request.get({ uri: self.url, agent: self.httpsProxyAgent }, (err, response, body) => {
182193
if (err) {
183194
return next(err);
184195
}

‎lib/oidcstrategy.js

+27-13
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ const InternalOpenIDError = require('./errors/internalopeniderror');
4949
const Log = require('./logging').getLogger;
5050
const Metadata = require('./metadata').Metadata;
5151
const OAuth2 = require('oauth').OAuth2;
52+
const HttpsProxyAgent = require('https-proxy-agent');
5253
const SessionContentHandler = require('./sessionContentHandler').SessionContentHandler;
5354
const CookieContentHandler = require('./cookieContentHandler').CookieContentHandler;
5455
const Validator = require('./validator').Validator;
@@ -476,7 +477,7 @@ function Strategy(options, verify) {
476477
/****************************************************************************************
477478
* Take care of scope
478479
***************************************************************************************/
479-
// make scope an array
480+
// make scope an array
480481
if (!options.scope)
481482
options.scope = [];
482483
if (!Array.isArray(options.scope))
@@ -601,9 +602,9 @@ Strategy.prototype.authenticate = function authenticateStrategy(req, options) {
601602
var response = options && options.response || req.res;
602603

603604
// 'params': items we get from the request or metadata, such as id_token, code, policy, metadata, cacheKey, etc
604-
var params = { 'tenantIdOrName': tenantIdOrName, 'extraAuthReqQueryParams': extraAuthReqQueryParams, 'extraTokenReqQueryParams': extraTokenReqQueryParams };
605+
var params = { 'proxy': self._options.proxy, 'tenantIdOrName': tenantIdOrName, 'extraAuthReqQueryParams': extraAuthReqQueryParams, 'extraTokenReqQueryParams': extraTokenReqQueryParams };
605606
// 'oauthConfig': items needed for oauth flow (like redirection, code redemption), such as token_endpoint, userinfo_endpoint, etc
606-
var oauthConfig = { 'resource': resource, 'customState': customState, 'domain_hint': domain_hint, 'login_hint': login_hint, 'prompt': prompt, 'response': response };
607+
var oauthConfig = { 'proxy': self._options.proxy, 'resource': resource, 'customState': customState, 'domain_hint': domain_hint, 'login_hint': login_hint, 'prompt': prompt, 'response': response };
607608
// 'optionsToValidate': items we need to validate id_token against, such as issuer, audience, etc
608609
var optionsToValidate = {};
609610

@@ -672,7 +673,7 @@ Strategy.prototype.authenticate = function authenticateStrategy(req, options) {
672673
* @param {Object} req
673674
* @param {Object} next
674675
*/
675-
Strategy.prototype.collectInfoFromReq = function(params, req, next, response) {
676+
Strategy.prototype.collectInfoFromReq = function (params, req, next, response) {
676677
const self = this;
677678

678679
// the things we will put into 'params':
@@ -858,7 +859,7 @@ Strategy.prototype.setOptions = function setOptions(params, oauthConfig, options
858859
}
859860

860861
// for B2C, verify the endpoints in oauthConfig has the correct policy
861-
if (self._options.isB2C){
862+
if (self._options.isB2C) {
862863
var policyChecker = (endpoint, policy) => {
863864
var u = {};
864865
try {
@@ -956,7 +957,7 @@ Strategy.prototype._idTokenHandler = function idTokenHandler(params, optionsToVa
956957
var decrypted_token;
957958

958959
return jwe.decrypt(id_token, optionsToValidate.jweKeyStore, log, (err, decrypted_token) => {
959-
if(err)
960+
if (err)
960961
return next(err);
961962

962963
params.id_token = decrypted_token;
@@ -1415,7 +1416,12 @@ Strategy.prototype._flowInitializationHandler = function flowInitializationHandl
14151416
params[aadutils.getLibraryProductParameterName()] = aadutils.getLibraryProduct();
14161417
params[aadutils.getLibraryVersionParameterName()] = aadutils.getLibraryVersion();
14171418

1418-
const location = aadutils.concatUrl(oauthConfig.authorization_endpoint, querystring.stringify(params));
1419+
// Implement support for standard OpenID Connect params (display, prompt, etc.)
1420+
const separator = self._options.isB2C ? '&' : '?';
1421+
const location = [
1422+
oauthConfig.authorization_endpoint,
1423+
querystring.stringify(params)
1424+
].join(separator);
14191425

14201426
return self.redirect(location);
14211427
};
@@ -1462,7 +1468,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
14621468
return next(err);
14631469
else
14641470
post_params['client_assertion'] = assertion;
1465-
});
1471+
});
14661472

14671473
if (self._options.loggingNoPII)
14681474
log.info('In _getAccessTokenBySecretOrAssertion: we created a client assertion');
@@ -1480,7 +1486,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
14801486
var results;
14811487
try {
14821488
results = JSON.parse(data);
1483-
} catch(e) {
1489+
} catch (e) {
14841490
results = querystring.parse(data);
14851491
}
14861492
callback(null, results);
@@ -1493,7 +1499,7 @@ Strategy.prototype._getAccessTokenBySecretOrAssertion = function getAccessTokenB
14931499
*
14941500
* @params {String} message
14951501
*/
1496-
Strategy.prototype.failWithLog = function(message) {
1502+
Strategy.prototype.failWithLog = function (message) {
14971503
this.log.info(`authentication failed due to: ${message}`);
14981504
return this.fail(message);
14991505
};
@@ -1503,7 +1509,7 @@ Strategy.prototype.failWithLog = function(message) {
15031509
*
15041510
* @params {Object} oauthConfig
15051511
*/
1506-
var createOauth2Instance = function(oauthConfig) {
1512+
var createOauth2Instance = function (oauthConfig) {
15071513
let libraryVersion = aadutils.getLibraryVersion();
15081514
let libraryVersionParameterName = aadutils.getLibraryVersionParameterName();
15091515
let libraryProduct = aadutils.getLibraryProduct();
@@ -1515,10 +1521,18 @@ var createOauth2Instance = function(oauthConfig) {
15151521
'', // baseURL (empty string because we use absolute urls for authorize and token paths)
15161522
oauthConfig.authorization_endpoint, // authorizePath
15171523
oauthConfig.token_endpoint, // accessTokenPath
1518-
{libraryProductParameterName : libraryProduct,
1519-
libraryVersionParameterName : libraryVersion} // customHeaders
1524+
{
1525+
libraryProductParameterName: libraryProduct,
1526+
libraryVersionParameterName: libraryVersion
1527+
} // customHeaders
15201528
);
15211529

1530+
if (oauthConfig.proxy) {
1531+
// if user has specified proxy settings instantiate agent
1532+
oauth2.setAgent(new HttpsProxyAgent(oauthConfig.proxy));
1533+
}
1534+
1535+
15221536
return oauth2;
15231537
};
15241538

‎package.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,11 @@
3636
"base64url": "^3.0.0",
3737
"bunyan": "^1.8.0",
3838
"cache-manager": "2.10.2",
39+
"https-proxy-agent": "^2.2.2",
3940
"jws": "^3.1.3",
4041
"jwk-to-pem": "^1.2.6",
4142
"lodash": "^4.11.2",
42-
"oauth": "0.9.14",
43+
"oauth": "0.9.15",
4344
"passport": "^0.3.2",
4445
"request": "^2.72.0",
4546
"valid-url": "^1.0.6"

0 commit comments

Comments
 (0)
This repository has been archived.