mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 00:40:14 +01:00
* feat: integrate OpenID Connect support with token reuse
- Added `jwks-rsa` and `new-openid-client` dependencies for OpenID Connect functionality.
- Implemented OpenID token refresh logic in `AuthController`.
- Enhanced `LogoutController` to handle OpenID logout and session termination.
- Updated JWT authentication middleware to support OpenID token provider.
- Modified OAuth routes to accommodate OpenID authentication and token management.
- Created `setOpenIDAuthTokens` function to manage OpenID tokens in cookies.
- Upgraded OpenID strategy with user info fetching and token exchange protocol.
- Introduced `openIdJwtLogin` strategy for handling OpenID JWT tokens.
- Added caching mechanism for exchanged OpenID tokens.
- Updated configuration to include OpenID exchanged tokens cache key.
- updated .env.example to include the new env variables needed for the feature.
* fix: update return type in downloadImage documentation for clarity and fixed openIdJwtLogin env variables
* fix: update Jest configuration and tests for OpenID strategy integration
* fix: update OpenID strategy to include callback URL in setup
* fix: fix optionalJwtAuth middleware to support OpenID token reuse and improve currentUrl method in CustomOpenIDStrategy to override the dynamic host issue related to proxy (e.g. cloudfront)
* fix: fixed code formatting
* Fix: Add mocks for openid-client and passport strategy in Jest configuration to fix unit tests
* fix eslint errors: Format mock file openid-client.
* ✨ feat: Add PKCE support for OpenID and default handling in strategy setup
---------
Co-authored-by: Atef Bellaaj <slalom.bellaaj@external.daimlertruck.com>
Co-authored-by: Ruben Talstra <RubenTalstra1211@outlook.com>
41 lines
1.2 KiB
JavaScript
41 lines
1.2 KiB
JavaScript
const { createSocialUser, handleExistingUser } = require('./process');
|
|
const { isEnabled } = require('~/server/utils');
|
|
const { findUser } = require('~/models');
|
|
const { logger } = require('~/config');
|
|
|
|
const socialLogin =
|
|
(provider, getProfileDetails) => async (accessToken, refreshToken, idToken, profile, cb) => {
|
|
try {
|
|
const { email, id, avatarUrl, username, name, emailVerified } = getProfileDetails({
|
|
idToken,
|
|
profile,
|
|
});
|
|
|
|
const oldUser = await findUser({ email: email.trim() });
|
|
const ALLOW_SOCIAL_REGISTRATION = isEnabled(process.env.ALLOW_SOCIAL_REGISTRATION);
|
|
|
|
if (oldUser) {
|
|
await handleExistingUser(oldUser, avatarUrl);
|
|
return cb(null, oldUser);
|
|
}
|
|
|
|
if (ALLOW_SOCIAL_REGISTRATION) {
|
|
const newUser = await createSocialUser({
|
|
email,
|
|
avatarUrl,
|
|
provider,
|
|
providerKey: `${provider}Id`,
|
|
providerId: id,
|
|
username,
|
|
name,
|
|
emailVerified,
|
|
});
|
|
return cb(null, newUser);
|
|
}
|
|
} catch (err) {
|
|
logger.error(`[${provider}Login]`, err);
|
|
return cb(err);
|
|
}
|
|
};
|
|
|
|
module.exports = socialLogin;
|