1
0
mirror of https://github.com/Unleash/unleash.git synced 2024-10-18 20:09:08 +02:00
unleash.unleash/examples/keycloak-auth-hook.js

94 lines
2.7 KiB
JavaScript
Raw Normal View History

/* eslint-disable import/no-extraneous-dependencies */
/* eslint-disable import/no-unresolved */
'use strict';
/**
* Keycloak hook for securing an Unleash server
*
* This example assumes that all users authenticating via
* keycloak should have access. You would probably limit access
* to users you trust.
*
2019-05-19 12:52:46 +02:00
* The implementation assumes the following environment variables:
*
* - AUTH_HOST
* - AUTH_REALM
* - AUTH_CLIENT_ID
*/
2019-05-19 12:52:46 +02:00
const KeycloakStrategy = require('@exlinc/keycloak-passport');
const passport = require('passport');
// const { User, AuthenticationRequired } = require('unleash-server');
const { User, AuthenticationRequired } = require('../lib/server-impl.js');
2019-08-10 16:06:09 +02:00
const host = process.env.AUTH_HOST;
2019-05-19 12:52:46 +02:00
const realm = process.env.AUTH_REALM;
2019-08-10 16:06:09 +02:00
const clientID = process.env.AUTH_CLIENT_ID;
2019-05-19 12:52:46 +02:00
const contextPath = process.env.CONTEXT_PATH;
passport.use(
2019-05-19 12:52:46 +02:00
'keycloak',
new KeycloakStrategy(
{
2019-05-19 12:52:46 +02:00
host,
realm,
2019-08-10 16:06:09 +02:00
clientID,
clientSecret: "We don't need that, but is required",
2019-05-19 12:52:46 +02:00
callbackURL: `${contextPath}/api/auth/callback`,
2019-08-10 16:06:09 +02:00
authorizationURL: `${host}/auth/realms/${realm}/protocol/openid-connect/auth`,
tokenURL: `${host}/auth/realms/${realm}/protocol/openid-connect/token`,
userInfoURL: `${host}/auth/realms/${realm}/protocol/openid-connect/userinfo`,
},
(accessToken, refreshToken, profile, done) => {
done(
null,
new User({
name: profile.fullName,
email: profile.email,
}),
);
},
),
);
function enableKeycloakOauth(app) {
app.use(passport.initialize());
app.use(passport.session());
passport.serializeUser((user, done) => done(null, user));
passport.deserializeUser((user, done) => done(null, user));
2019-05-19 12:52:46 +02:00
app.get('/api/admin/login', passport.authenticate('keycloak'));
2019-05-19 12:52:46 +02:00
app.get(
'/api/auth/callback',
passport.authenticate('keycloak'),
(req, res) => {
res.redirect(`${contextPath}/`);
},
2019-05-19 12:52:46 +02:00
);
app.use('/api/admin/', (req, res, next) => {
if (req.user) {
return next();
}
// Instruct unleash-frontend to pop-up auth dialog
return res
.status('401')
.json(
new AuthenticationRequired({
path: `${contextPath}/api/admin/login`,
type: 'custom',
message: `You have to identify yourself in order to use Unleash.
Click the button and follow the instructions.`,
}),
)
.end();
});
}
module.exports = enableKeycloakOauth;