mirror of
https://github.com/advplyr/audiobookshelf.git
synced 2025-04-02 01:16:54 +02:00
OpenID/SSO: Implement Logout functionality
This commit is contained in:
parent
3906dca04e
commit
87ebf4722b
@ -86,15 +86,24 @@ export default {
|
|||||||
const logoutPayload = {
|
const logoutPayload = {
|
||||||
socketId: rootSocket.id
|
socketId: rootSocket.id
|
||||||
}
|
}
|
||||||
this.$axios.$post('/logout', logoutPayload).catch((error) => {
|
|
||||||
console.error(error)
|
|
||||||
})
|
|
||||||
if (localStorage.getItem('token')) {
|
if (localStorage.getItem('token')) {
|
||||||
localStorage.removeItem('token')
|
localStorage.removeItem('token')
|
||||||
}
|
}
|
||||||
this.$store.commit('libraries/setUserPlaylists', [])
|
this.$store.commit('libraries/setUserPlaylists', [])
|
||||||
this.$store.commit('libraries/setCollections', [])
|
this.$store.commit('libraries/setCollections', [])
|
||||||
this.$router.push('/login')
|
|
||||||
|
this.$axios.$post('/logout').then((logoutPayload) => {
|
||||||
|
const redirect_url = logoutPayload.redirect_url
|
||||||
|
|
||||||
|
if (redirect_url) {
|
||||||
|
window.location.href = redirect_url
|
||||||
|
} else {
|
||||||
|
this.$router.push('/login')
|
||||||
|
}
|
||||||
|
}).catch((error) => {
|
||||||
|
console.error(error)
|
||||||
|
})
|
||||||
},
|
},
|
||||||
resetForm() {
|
resetForm() {
|
||||||
this.password = null
|
this.password = null
|
||||||
|
109
server/Auth.js
109
server/Auth.js
@ -81,7 +81,8 @@ class Auth {
|
|||||||
authorization_endpoint: global.ServerSettings.authOpenIDAuthorizationURL,
|
authorization_endpoint: global.ServerSettings.authOpenIDAuthorizationURL,
|
||||||
token_endpoint: global.ServerSettings.authOpenIDTokenURL,
|
token_endpoint: global.ServerSettings.authOpenIDTokenURL,
|
||||||
userinfo_endpoint: global.ServerSettings.authOpenIDUserInfoURL,
|
userinfo_endpoint: global.ServerSettings.authOpenIDUserInfoURL,
|
||||||
jwks_uri: global.ServerSettings.authOpenIDJwksURL
|
jwks_uri: global.ServerSettings.authOpenIDJwksURL,
|
||||||
|
end_session_endpoint: global.ServerSettings.authOpenIDLogoutURL
|
||||||
}).Client
|
}).Client
|
||||||
const openIdClient = new openIdIssuerClient({
|
const openIdClient = new openIdIssuerClient({
|
||||||
client_id: global.ServerSettings.authOpenIDClientID,
|
client_id: global.ServerSettings.authOpenIDClientID,
|
||||||
@ -153,6 +154,9 @@ class Auth {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// We also have to save the id_token for later (used for logout) because we cannot set cookies here
|
||||||
|
user.openid_id_token = tokenset.id_token
|
||||||
|
|
||||||
// permit login
|
// permit login
|
||||||
return done(null, user)
|
return done(null, user)
|
||||||
}))
|
}))
|
||||||
@ -183,49 +187,42 @@ class Auth {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Stores the client's choice how the login callback should happen in temp cookies
|
* Stores the client's choice of login callback method in temporary cookies.
|
||||||
|
*
|
||||||
|
* The `authMethod` parameter specifies the authentication strategy and can have the following values:
|
||||||
|
* - 'local': Standard authentication,
|
||||||
|
* - 'api': Authentication for API use
|
||||||
|
* - 'openid': OpenID authentication directly over web
|
||||||
|
* - 'openid-mobile': OpenID authentication, but done via an mobile device
|
||||||
*
|
*
|
||||||
* @param {import('express').Request} req
|
* @param {import('express').Request} req
|
||||||
* @param {import('express').Response} res
|
* @param {import('express').Response} res
|
||||||
|
* @param {string} authMethod - The authentication method, default is 'local'.
|
||||||
*/
|
*/
|
||||||
paramsToCookies(req, res) {
|
paramsToCookies(req, res, authMethod = 'local') {
|
||||||
// Set if isRest flag is set or if mobile oauth flow is used
|
const TWO_MINUTES = 120000 // 2 minutes in milliseconds
|
||||||
if (req.query.isRest?.toLowerCase() == 'true' || req.query.redirect_uri) {
|
const isRest = ['api', 'openid-mobile'].includes(authMethod)
|
||||||
// store the isRest flag to the is_rest cookie
|
const callback = req.query.redirect_uri || req.query.callback
|
||||||
res.cookie('is_rest', 'true', {
|
|
||||||
maxAge: 120000, // 2 min
|
|
||||||
httpOnly: true
|
|
||||||
})
|
|
||||||
} else {
|
|
||||||
// no isRest-flag set -> set is_rest cookie to false
|
|
||||||
res.cookie('is_rest', 'false', {
|
|
||||||
maxAge: 120000, // 2 min
|
|
||||||
httpOnly: true
|
|
||||||
})
|
|
||||||
|
|
||||||
// persist state if passed in
|
// Set the 'is_rest' cookie based on the authentication method
|
||||||
|
res.cookie('is_rest', isRest.toString(), { maxAge: TWO_MINUTES, httpOnly: true })
|
||||||
|
|
||||||
|
// Additional handling for 'local' authMethod
|
||||||
|
if (!isRest) {
|
||||||
|
// Store 'auth_state' if present in the request
|
||||||
if (req.query.state) {
|
if (req.query.state) {
|
||||||
res.cookie('auth_state', req.query.state, {
|
res.cookie('auth_state', req.query.state, { maxAge: TWO_MINUTES, httpOnly: true })
|
||||||
maxAge: 120000, // 2 min
|
|
||||||
httpOnly: true
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const callback = req.query.redirect_uri || req.query.callback
|
// Validate and store the callback URL
|
||||||
|
|
||||||
// check if we are missing a callback parameter - we need one if isRest=false
|
|
||||||
if (!callback) {
|
if (!callback) {
|
||||||
res.status(400).send({
|
return res.status(400).send({ message: 'No callback parameter' })
|
||||||
message: 'No callback parameter'
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
// store the callback url to the auth_cb cookie
|
res.cookie('auth_cb', callback, { maxAge: TWO_MINUTES, httpOnly: true })
|
||||||
res.cookie('auth_cb', callback, {
|
|
||||||
maxAge: 120000, // 2 min
|
|
||||||
httpOnly: true
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Store the authentication method for a year
|
||||||
|
res.cookie('auth_method', authMethod, { maxAge: 1000 * 60 * 60 * 24 * 365, httpOnly: true })
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -364,7 +361,7 @@ class Auth {
|
|||||||
})
|
})
|
||||||
|
|
||||||
// params (isRest, callback) to a cookie that will be send to the client
|
// params (isRest, callback) to a cookie that will be send to the client
|
||||||
this.paramsToCookies(req, res)
|
this.paramsToCookies(req, res, mobile_redirect_uri ? 'openid-mobile' : 'openid')
|
||||||
|
|
||||||
// Redirect the user agent (browser) to the authorization URL
|
// Redirect the user agent (browser) to the authorization URL
|
||||||
res.redirect(authorizationUrl)
|
res.redirect(authorizationUrl)
|
||||||
@ -453,6 +450,12 @@ class Auth {
|
|||||||
if (loginError) {
|
if (loginError) {
|
||||||
return handleAuthError(isMobile, 500, 'Error during login', `[Auth] Error in openid callback: ${loginError}`)
|
return handleAuthError(isMobile, 500, 'Error during login', `[Auth] Error in openid callback: ${loginError}`)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// The id_token does not provide access to the user, but is used to identify the user to the SSO provider
|
||||||
|
// instead it containts a JWT with userinfo like user email, username, etc.
|
||||||
|
// the client will get to know it anyway in the logout url according to the oauth2 spec
|
||||||
|
// so it is safe to send it to the client, but we use strict settings
|
||||||
|
res.cookie('openid_id_token', user.openid_id_token, { maxAge: 1000 * 60 * 60 * 24 * 365, httpOnly: true, secure: true, sameSite: 'Strict' })
|
||||||
next()
|
next()
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
@ -521,7 +524,43 @@ class Auth {
|
|||||||
if (err) {
|
if (err) {
|
||||||
res.sendStatus(500)
|
res.sendStatus(500)
|
||||||
} else {
|
} else {
|
||||||
res.sendStatus(200)
|
const authMethod = req.cookies.auth_method
|
||||||
|
|
||||||
|
res.clearCookie('auth_method')
|
||||||
|
|
||||||
|
if (authMethod === 'openid' || authMethod === 'openid-mobile') {
|
||||||
|
// If we are using openid, we need to redirect to the logout endpoint
|
||||||
|
// node-openid-client does not support doing it over passport
|
||||||
|
const oidcStrategy = passport._strategy('openid-client')
|
||||||
|
const client = oidcStrategy._client
|
||||||
|
|
||||||
|
let postLogoutRedirectUri = null
|
||||||
|
|
||||||
|
if (authMethod === 'openid') {
|
||||||
|
const protocol = (req.secure || req.get('x-forwarded-proto') === 'https') ? 'https' : 'http'
|
||||||
|
const host = req.get('host')
|
||||||
|
// TODO: ABS does currently not support subfolders for installation
|
||||||
|
// If we want to support it we need to include a config for the serverurl
|
||||||
|
postLogoutRedirectUri = `${protocol}://${host}/login`
|
||||||
|
}
|
||||||
|
// else for openid-mobile we keep postLogoutRedirectUri on null
|
||||||
|
// nice would be to redirect to the app, but for example Authentik does not implement
|
||||||
|
// the post_logout_redirect_uri parameter at all and for other providers
|
||||||
|
// we would also need again to implement (and even before get to know somehow for 3rd party apps)
|
||||||
|
// the correct app link like audiobookshelf://login (and maybe also provide a redirect like mobile-redirect)
|
||||||
|
|
||||||
|
const logoutUrl = client.endSessionUrl({
|
||||||
|
id_token_hint: req.cookies.openid_id_token,
|
||||||
|
post_logout_redirect_uri: postLogoutRedirectUri
|
||||||
|
})
|
||||||
|
|
||||||
|
res.clearCookie('openid_id_token')
|
||||||
|
|
||||||
|
// Tell the user agent (browser) to redirect to the authentification provider's logout URL
|
||||||
|
res.send({ redirect_url: logoutUrl })
|
||||||
|
} else {
|
||||||
|
res.sendStatus(200)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
Loading…
Reference in New Issue
Block a user