mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-22 08:12:00 +02:00
228 lines
7.4 KiB
JavaScript
228 lines
7.4 KiB
JavaScript
const fetch = require('node-fetch');
|
|
const passport = require('passport');
|
|
const jwtDecode = require('jsonwebtoken/decode');
|
|
const { HttpsProxyAgent } = require('https-proxy-agent');
|
|
const { Issuer, Strategy: OpenIDStrategy, custom } = require('openid-client');
|
|
const { getStrategyFunctions } = require('~/server/services/Files/strategies');
|
|
const { findUser, createUser, updateUser } = require('~/models/userMethods');
|
|
const { logger } = require('~/config');
|
|
|
|
let crypto;
|
|
try {
|
|
crypto = require('node:crypto');
|
|
} catch (err) {
|
|
logger.error('[openidStrategy] crypto support is disabled!', err);
|
|
}
|
|
/**
|
|
* Downloads an image from a URL using an access token.
|
|
* @param {string} url
|
|
* @param {string} accessToken
|
|
* @returns {Promise<Buffer>}
|
|
*/
|
|
const downloadImage = async (url, accessToken) => {
|
|
if (!url) {
|
|
return '';
|
|
}
|
|
|
|
try {
|
|
const response = await fetch(url, {
|
|
method: 'GET',
|
|
headers: {
|
|
Authorization: `Bearer ${accessToken}`,
|
|
},
|
|
});
|
|
|
|
if (response.ok) {
|
|
const buffer = await response.buffer();
|
|
return buffer;
|
|
} else {
|
|
throw new Error(`${response.statusText} (HTTP ${response.status})`);
|
|
}
|
|
} catch (error) {
|
|
logger.error(
|
|
`[openidStrategy] downloadImage: Error downloading image at URL "${url}": ${error}`,
|
|
);
|
|
return '';
|
|
}
|
|
};
|
|
|
|
/**
|
|
* Converts an input into a string suitable for a username.
|
|
* If the input is a string, it will be returned as is.
|
|
* If the input is an array, elements will be joined with underscores.
|
|
* In case of undefined or other falsy values, a default value will be returned.
|
|
*
|
|
* @param {string | string[] | undefined} input - The input value to be converted into a username.
|
|
* @param {string} [defaultValue=''] - The default value to return if the input is falsy.
|
|
* @returns {string} The processed input as a string suitable for a username.
|
|
*/
|
|
function convertToUsername(input, defaultValue = '') {
|
|
if (typeof input === 'string') {
|
|
return input;
|
|
} else if (Array.isArray(input)) {
|
|
return input.join('_');
|
|
}
|
|
|
|
return defaultValue;
|
|
}
|
|
|
|
async function setupOpenId() {
|
|
try {
|
|
if (process.env.PROXY) {
|
|
const proxyAgent = new HttpsProxyAgent(process.env.PROXY);
|
|
custom.setHttpOptionsDefaults({
|
|
agent: proxyAgent,
|
|
});
|
|
logger.info(`[openidStrategy] proxy agent added: ${process.env.PROXY}`);
|
|
}
|
|
const issuer = await Issuer.discover(process.env.OPENID_ISSUER);
|
|
const client = new issuer.Client({
|
|
client_id: process.env.OPENID_CLIENT_ID,
|
|
client_secret: process.env.OPENID_CLIENT_SECRET,
|
|
redirect_uris: [process.env.DOMAIN_SERVER + process.env.OPENID_CALLBACK_URL],
|
|
});
|
|
const requiredRole = process.env.OPENID_REQUIRED_ROLE;
|
|
const requiredRoleParameterPath = process.env.OPENID_REQUIRED_ROLE_PARAMETER_PATH;
|
|
const requiredRoleTokenKind = process.env.OPENID_REQUIRED_ROLE_TOKEN_KIND;
|
|
const openidLogin = new OpenIDStrategy(
|
|
{
|
|
client,
|
|
params: {
|
|
scope: process.env.OPENID_SCOPE,
|
|
},
|
|
},
|
|
async (tokenset, userinfo, done) => {
|
|
try {
|
|
logger.info(`[openidStrategy] verify login openidId: ${userinfo.sub}`);
|
|
logger.debug('[openidStrategy] very login tokenset and userinfo', { tokenset, userinfo });
|
|
|
|
let user = await findUser({ openidId: userinfo.sub });
|
|
logger.info(
|
|
`[openidStrategy] user ${user ? 'found' : 'not found'} with openidId: ${userinfo.sub}`,
|
|
);
|
|
|
|
if (!user) {
|
|
user = await findUser({ email: userinfo.email });
|
|
logger.info(
|
|
`[openidStrategy] user ${user ? 'found' : 'not found'} with email: ${
|
|
userinfo.email
|
|
} for openidId: ${userinfo.sub}`,
|
|
);
|
|
}
|
|
|
|
let fullName = '';
|
|
if (userinfo.given_name && userinfo.family_name) {
|
|
fullName = userinfo.given_name + ' ' + userinfo.family_name;
|
|
} else if (userinfo.given_name) {
|
|
fullName = userinfo.given_name;
|
|
} else if (userinfo.family_name) {
|
|
fullName = userinfo.family_name;
|
|
} else {
|
|
fullName = userinfo.username || userinfo.email;
|
|
}
|
|
|
|
if (requiredRole) {
|
|
let decodedToken = '';
|
|
if (requiredRoleTokenKind === 'access') {
|
|
decodedToken = jwtDecode(tokenset.access_token);
|
|
} else if (requiredRoleTokenKind === 'id') {
|
|
decodedToken = jwtDecode(tokenset.id_token);
|
|
}
|
|
const pathParts = requiredRoleParameterPath.split('.');
|
|
let found = true;
|
|
let roles = pathParts.reduce((o, key) => {
|
|
if (o === null || o === undefined || !(key in o)) {
|
|
found = false;
|
|
return [];
|
|
}
|
|
return o[key];
|
|
}, decodedToken);
|
|
|
|
if (!found) {
|
|
logger.error(
|
|
`[openidStrategy] Key '${requiredRoleParameterPath}' not found in ${requiredRoleTokenKind} token!`,
|
|
);
|
|
}
|
|
|
|
if (!roles.includes(requiredRole)) {
|
|
return done(null, false, {
|
|
message: `You must have the "${requiredRole}" role to log in.`,
|
|
});
|
|
}
|
|
}
|
|
|
|
const username = convertToUsername(
|
|
userinfo.username || userinfo.given_name || userinfo.email,
|
|
);
|
|
|
|
if (!user) {
|
|
user = {
|
|
provider: 'openid',
|
|
openidId: userinfo.sub,
|
|
username,
|
|
email: userinfo.email || '',
|
|
emailVerified: userinfo.email_verified || false,
|
|
name: fullName,
|
|
};
|
|
user = await createUser(user, true, true);
|
|
} else {
|
|
user.provider = 'openid';
|
|
user.openidId = userinfo.sub;
|
|
user.username = username;
|
|
user.name = fullName;
|
|
}
|
|
|
|
if (userinfo.picture && !user.avatar?.includes('manual=true')) {
|
|
/** @type {string | undefined} */
|
|
const imageUrl = userinfo.picture;
|
|
|
|
let fileName;
|
|
if (crypto) {
|
|
const hash = crypto.createHash('sha256');
|
|
hash.update(userinfo.sub);
|
|
fileName = hash.digest('hex') + '.png';
|
|
} else {
|
|
fileName = userinfo.sub + '.png';
|
|
}
|
|
|
|
const imageBuffer = await downloadImage(imageUrl, tokenset.access_token);
|
|
if (imageBuffer) {
|
|
const { saveBuffer } = getStrategyFunctions(process.env.CDN_PROVIDER);
|
|
const imagePath = await saveBuffer({
|
|
fileName,
|
|
userId: user._id.toString(),
|
|
buffer: imageBuffer,
|
|
});
|
|
user.avatar = imagePath ?? '';
|
|
}
|
|
}
|
|
|
|
user = await updateUser(user._id, user);
|
|
|
|
logger.info(
|
|
`[openidStrategy] login success openidId: ${user.openidId} | email: ${user.email} | username: ${user.username} `,
|
|
{
|
|
user: {
|
|
openidId: user.openidId,
|
|
username: user.username,
|
|
email: user.email,
|
|
name: user.name,
|
|
},
|
|
},
|
|
);
|
|
|
|
done(null, user);
|
|
} catch (err) {
|
|
logger.error('[openidStrategy] login failed', err);
|
|
done(err);
|
|
}
|
|
},
|
|
);
|
|
|
|
passport.use('openid', openidLogin);
|
|
} catch (err) {
|
|
logger.error('[openidStrategy]', err);
|
|
}
|
|
}
|
|
|
|
module.exports = setupOpenId;
|