forked from atinux/nuxt-auth-utils
-
Notifications
You must be signed in to change notification settings - Fork 0
/
authentik.ts
113 lines (100 loc) · 3.49 KB
/
authentik.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
import type { H3Event } from 'h3'
import { eventHandler, getQuery, sendRedirect } from 'h3'
import { withQuery } from 'ufo'
import { defu } from 'defu'
import { handleMissingConfiguration, handleAccessTokenErrorResponse, getOAuthRedirectURL, requestAccessToken } from '../utils'
import { useRuntimeConfig, createError } from '#imports'
import type { OAuthConfig } from '#auth-utils'
export interface OAuthAuthentikConfig {
/**
* Authentik OAuth Client ID
* @default process.env.NUXT_OAUTH_AUTHENTIK_CLIENT_ID
*/
clientId?: string
/**
* Authentik OAuth Client Secret
* @default process.env.NUXT_OAUTH_AUTHENTIK_CLIENT_SECRET
*/
clientSecret?: string
/**
* Authentik OAuth Domain
* @example https://<your-authentik-instance>
* @default process.env.NUXT_OAUTH_AUTHENTIK_DOMAIN
*/
domain?: string
/**
* Redirect URL to allow overriding for situations like prod failing to determine public hostname
* @default process.env.NUXT_OAUTH_AUTHENTIK_REDIRECT_URL or current URL
*/
redirectURL?: string
}
export function defineOAuthAuthentikEventHandler({ config, onSuccess, onError }: OAuthConfig<OAuthAuthentikConfig>) {
return eventHandler(async (event: H3Event) => {
config = defu(config, useRuntimeConfig(event).oauth?.authentik) as OAuthAuthentikConfig
const query = getQuery<{ code?: string, error?: string }>(event)
if (query.error) {
const error = createError({
statusCode: 401,
message: `Authentik login failed: ${query.error || 'Unknown error'}`,
data: query,
})
if (!onError) throw error
return onError(event, error)
}
if (!config.clientId || !config.clientSecret || !config.domain) {
return handleMissingConfiguration(event, 'authentik', ['clientId', 'clientSecret', 'domain'], onError)
}
const authorizationURL = `https://${config.domain}/application/o/authorize/`
const tokenURL = `https://${config.domain}/application/o/token/`
const redirectURL = config.redirectURL || getOAuthRedirectURL(event)
if (!query.code) {
// Redirect to Authentik OAuth page
return sendRedirect(
event,
withQuery(authorizationURL, {
response_type: 'code',
client_id: config.clientId,
redirect_uri: redirectURL,
scope: ['openid', 'profile', 'email'].join(' '),
}),
)
}
const tokens = await requestAccessToken(tokenURL, {
headers: {
'Authorization': `Basic ${Buffer.from(`${config.clientId}:${config.clientSecret}`).toString('base64')}`,
'Content-Type': 'application/x-www-form-urlencoded',
},
body: {
grant_type: 'authorization_code',
client_id: config.clientId,
redirect_uri: redirectURL,
code: query.code,
},
})
if (tokens.error) {
return handleAccessTokenErrorResponse(event, 'authentik', tokens, onError)
}
const accessToken = tokens.access_token
// Fetch user info
// eslint-disable-next-line @typescript-eslint/no-explicit-any
const user: any = await $fetch(`https://${config.domain}/application/o/userinfo/`, {
headers: {
Authorization: `Bearer ${accessToken}`,
Accept: 'application/json',
},
})
if (!user) {
const error = createError({
statusCode: 500,
message: 'Could not get Authentik user',
data: tokens,
})
if (!onError) throw error
return onError(event, error)
}
return onSuccess(event, {
user,
tokens,
})
})
}