All files / pages/api/auth [...nextauth].ts

26.53% Statements 13/49
25% Branches 5/20
0% Functions 0/17
28.88% Lines 13/45

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195  6x   6x 6x 6x 6x 6x     6x 6x         6x 6x                       6x               6x                                                                                                                                                                                                                                                                                                                       6x  
/* eslint-disable @typescript-eslint/no-explicit-any */
import NextAuth from 'next-auth'
import type { NextAuthOptions } from 'next-auth'
import { getLogger } from '../../../logging/log-util'
import axios from 'axios'
import * as jose from 'jose'
import https from 'https'
import fs from 'fs'
 
//The below sets the minimum logging level to error and surpresses everything below that
const logger = getLogger('next-auth')
logger.level = 'warn'
 
/*Adds the signing algorithm to the end of the private key. Necessary to decrypt the userinfo_token.
 * Simply adding this to the end of the environment variable breaks the idToken decryption so this is a workaround.
 * May need to look at regenerating the keyset at a later date.*/
const jwk = JSON.parse(process.env.AUTH_PRIVATE ?? '{}')
jwk.alg = 'RS256'
 
async function decryptJwe(jwe: string, jwk: any) {
  const key = await jose.importJWK({ ...jwk })
  const decryptResult = await jose.compactDecrypt(jwe, key, {
    keyManagementAlgorithms: ['RSA-OAEP-256'],
  })
  return jose.decodeJwt(decryptResult.plaintext.toString())
}
 
//Create httpsAgent to read in cert to make BRZ call
const httpsAgent =
  process.env.AUTH_DISABLED === 'true'
    ? new https.Agent()
    : new https.Agent({
        ca: fs.readFileSync(
          '/usr/local/share/ca-certificates/env.crt' as fs.PathOrFileDescriptor,
        ),
      })
 
export const authOptions: NextAuthOptions = {
  providers: [
    {
      id: 'ecasProvider',
      name: 'ECAS',
      clientId: process.env.CLIENT_ID,
      type: 'oauth',
      wellKnown: process.env.AUTH_ECAS_WELL_KNOWN,
      authorization: {
        url: process.env.AUTH_ECAS_AUTHORIZATION,
        params: {
          scope: 'openid profile',
        },
      },
      client: {
        token_endpoint_auth_method: 'private_key_jwt',
        introspection_endpoint_auth_method: 'private_key_jwt',
        id_token_encrypted_response_alg: 'RSA-OAEP-256',
        id_token_encrypted_response_enc: 'A256GCM',
        token_endpoint_auth_signing_alg: 'RS256',
        id_token_signed_response_alg: 'RS512',
      },
      token: {
        url: process.env.AUTH_ECAS_TOKEN,
        params: {
          scope: 'openid profile',
        },
      },
      jwks: {
        keys: [JSON.parse(process.env.AUTH_PRIVATE ?? '{}')],
      },
      userinfo: {
        async request(context) {
          //Necessary to test locally until we no longer need the proxy. Will use request without proxy on deployed app
          const res =
            process.env.AUTH_ON_PROXY &&
            process.env.AUTH_ON_PROXY.toLowerCase() === 'true'
              ? await axios
                  .get(process.env.AUTH_ECAS_USERINFO as string, {
                    headers: {
                      Authorization: `Bearer ${context.tokens.access_token}`,
                    },
                    proxy: {
                      protocol: 'http',
                      host: 'localhost',
                      port: 3128,
                    },
                  })
                  .then((response) => response)
                  .catch((error) => logger.error(error))
              : await axios
                  .get(process.env.AUTH_ECAS_USERINFO as string, {
                    headers: {
                      Authorization: `Bearer ${context.tokens.access_token}`,
                    },
                  })
                  .then((response) => response)
                  .catch((error) => logger.error(error))
          return res?.data
        },
      },
      idToken: true,
      checks: ['state', 'nonce'],
      profile: async (profile) => {
        profile = await decryptJwe(profile.userinfo_token, jwk)
 
        //Validate SIN and UID to ensure they are not null and are alphanumeric
        const sinRegex = /^[a-zA-Z0-9]+$/
        if (Boolean(profile.sin) === false || !sinRegex.test(profile.sin)) {
          logger.error('SIN is not valid')
        } else Iif (
          Boolean(profile.uid) === false ||
          !sinRegex.test(profile.uid)
        ) {
          logger.error('UID is not valid')
        }
 
        //Make call to msca-ng API to create user if it doesn't exist
        axios
          .post(
            `https://${process.env.HOSTALIAS_HOSTNAME}${process.env.MSCA_NG_USER_ENDPOINT}`,
            {
              pid: profile.sin,
              spid: profile.uid,
            },
            {
              headers: {
                'authorization': `Basic ${process.env.MSCA_NG_CREDS}`,
                'Content-Type': 'application/json',
              },
              httpsAgent: httpsAgent,
            },
          )
          .then((response) => logger.debug(response))
          .catch((error) => logger.error(error))
 
        //Make call to msca-ng API to update last login date of user
        axios({
          method: 'post',
          url: `https://${process.env.HOSTALIAS_HOSTNAME}${process.env.MSCA_NG_USER_ENDPOINT}/${profile.uid}/logins`,
          headers: {
            'Authorization': `Basic ${process.env.MSCA_NG_CREDS}`,
            'Content-Type': 'application/json',
          },
          httpsAgent: httpsAgent,
        })
          .then((response) => logger.debug(response))
          .catch((error) => logger.error(error))
        return {
          id: profile.sub,
          ...profile,
        }
      },
    },
  ],
  theme: {
    colorScheme: 'light',
    logo: 'https://www.canada.ca/etc/designs/canada/wet-boew/assets/wmms-blk.svg',
  },
  session: {
    strategy: 'jwt',
    maxAge: 5 * 10 * 24, //20 minutes
  },
  callbacks: {
    async jwt({ token, user, account }) {
      return { ...token, ...user, ...account }
    },
    async redirect({ url, baseUrl }) {
      // Allows relative callback URLs
      if (url.startsWith('/')) return `${baseUrl}${url}`
      // Allows callback URLs on the same origin
      else Iif (new URL(url).origin === baseUrl) return url
      //else if (process.env.AUTH_ECAS_GLOBAL_LOGOUT_URL === url) return url
      return baseUrl
    },
    async session({ session }) {
      return { ...session }
    },
  },
  logger: {
    error(code, metadata) {
      logger.error(code)
      logger.error(metadata)
    },
    warn(code) {
      logger.warn(code)
    },
    debug(code, metadata) {
      logger.debug(code)
      logger.debug(metadata)
    },
  },
  pages: {
    signIn: '/auth/login/',
  },
}
export default NextAuth(authOptions)