mocksaml/utils/request.ts

59 lines
1.5 KiB
TypeScript
Raw Normal View History

2022-02-22 06:14:12 +00:00
import { promisify } from 'util';
2022-02-23 13:48:20 +00:00
import xml2js from 'xml2js';
2022-02-22 06:14:12 +00:00
import { inflateRaw } from 'zlib';
2022-02-21 14:31:47 +00:00
2022-02-22 05:35:42 +00:00
const inflateRawAsync = promisify(inflateRaw);
2022-02-21 14:31:47 +00:00
// Parse XML
const parseXML = (xml: string): Promise<Record<string, any>> => {
return new Promise((resolve, reject) => {
xml2js.parseString(
xml,
{
tagNameProcessors: [xml2js.processors.stripPrefix],
strict: true,
},
(err: Error | null, result: any) => {
if (err) {
reject(err);
}
resolve(result);
2022-02-21 14:31:47 +00:00
}
);
2022-02-21 14:31:47 +00:00
});
};
// Decode the base64 string
const decodeBase64 = async (string: string, isDeflated: boolean) => {
return isDeflated
? (await inflateRawAsync(Buffer.from(string, 'base64'))).toString()
: Buffer.from(string, 'base64').toString();
};
2022-02-21 14:31:47 +00:00
// Parse SAMLRequest attributes
const extractSAMLRequestAttributes = async (rawRequest: string, isPost = true) => {
const result = await parseXML(rawRequest);
2022-02-21 14:31:47 +00:00
const attributes = result['AuthnRequest']['$'];
const issuer = result['AuthnRequest']['Issuer'];
const publicKey = result['AuthnRequest']['Signature']
? result['AuthnRequest']['Signature'][0]['KeyInfo'][0]['X509Data'][0]['X509Certificate'][0]
: null;
if (!publicKey && isPost) {
throw new Error('Missing signature');
}
2022-02-21 14:31:47 +00:00
return {
2022-02-22 05:35:42 +00:00
id: attributes.ID,
acsUrl: attributes.AssertionConsumerServiceURL,
providerName: attributes.ProviderName,
2022-02-22 06:14:12 +00:00
audience: issuer[0]['_'],
publicKey,
2022-02-21 14:31:47 +00:00
};
};
export { extractSAMLRequestAttributes, decodeBase64 };