2021-05-05 05:06:05 +07:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ory/fosite"
|
|
|
|
"github.com/ory/fosite/handler/openid"
|
|
|
|
"github.com/ory/fosite/token/jwt"
|
|
|
|
|
|
|
|
"github.com/authelia/authelia/internal/middlewares"
|
|
|
|
"github.com/authelia/authelia/internal/session"
|
|
|
|
"github.com/authelia/authelia/internal/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
// isConsentMissing compares the requestedScopes and requestedAudience to the workflows
|
|
|
|
// GrantedScopes and GrantedAudience and returns true if they do not match or the workflow is nil.
|
|
|
|
func isConsentMissing(workflow *session.OIDCWorkflowSession, requestedScopes, requestedAudience []string) (isMissing bool) {
|
|
|
|
if workflow == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return len(requestedScopes) > 0 && utils.IsStringSlicesDifferent(requestedScopes, workflow.GrantedScopes) ||
|
|
|
|
len(requestedAudience) > 0 && utils.IsStringSlicesDifferentFold(requestedAudience, workflow.GrantedAudience)
|
|
|
|
}
|
|
|
|
|
|
|
|
func scopeNamesToScopes(scopeSlice []string) (scopes []Scope) {
|
|
|
|
for _, name := range scopeSlice {
|
|
|
|
if val, ok := scopeDescriptions[name]; ok {
|
|
|
|
scopes = append(scopes, Scope{name, val})
|
|
|
|
} else {
|
|
|
|
scopes = append(scopes, Scope{name, name})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return scopes
|
|
|
|
}
|
|
|
|
|
|
|
|
func audienceNamesToAudience(scopeSlice []string) (audience []Audience) {
|
|
|
|
for _, name := range scopeSlice {
|
|
|
|
if val, ok := audienceDescriptions[name]; ok {
|
|
|
|
audience = append(audience, Audience{name, val})
|
|
|
|
} else {
|
|
|
|
audience = append(audience, Audience{name, name})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return audience
|
|
|
|
}
|
|
|
|
|
|
|
|
func newOIDCSession(ctx *middlewares.AutheliaCtx, ar fosite.AuthorizeRequester) (session *openid.DefaultSession, err error) {
|
|
|
|
userSession := ctx.GetSession()
|
|
|
|
|
|
|
|
scopes := ar.GetGrantedScopes()
|
|
|
|
|
|
|
|
extra := map[string]interface{}{}
|
|
|
|
|
|
|
|
if len(userSession.Emails) != 0 && scopes.Has("email") {
|
|
|
|
extra["email"] = userSession.Emails[0]
|
|
|
|
extra["email_verified"] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if scopes.Has("groups") {
|
|
|
|
extra["groups"] = userSession.Groups
|
|
|
|
}
|
|
|
|
|
|
|
|
if scopes.Has("profile") {
|
|
|
|
extra["name"] = userSession.DisplayName
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
TODO: Adjust auth backends to return more profile information.
|
|
|
|
It's probably ideal to adjust the auth providers at this time to not store 'extra' information in the session
|
|
|
|
storage, and instead create a memory only storage for them.
|
|
|
|
This is a simple design, have a map with a key of username, and a struct with the relevant information.
|
|
|
|
*/
|
|
|
|
|
|
|
|
oidcSession, err := newDefaultOIDCSession(ctx)
|
|
|
|
if oidcSession == nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
oidcSession.Claims.Extra = extra
|
|
|
|
oidcSession.Claims.Subject = userSession.Username
|
|
|
|
oidcSession.Claims.Audience = ar.GetGrantedAudience()
|
|
|
|
|
|
|
|
return oidcSession, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func newDefaultOIDCSession(ctx *middlewares.AutheliaCtx) (session *openid.DefaultSession, err error) {
|
|
|
|
issuer, err := ctx.ForwardedProtoHost()
|
|
|
|
|
|
|
|
return &openid.DefaultSession{
|
|
|
|
Claims: &jwt.IDTokenClaims{
|
|
|
|
Issuer: issuer,
|
|
|
|
// TODO(c.michaud): make this configurable
|
|
|
|
ExpiresAt: time.Now().Add(time.Hour * 6),
|
|
|
|
IssuedAt: time.Now(),
|
|
|
|
RequestedAt: time.Now(),
|
|
|
|
AuthTime: time.Now(),
|
|
|
|
Extra: make(map[string]interface{}),
|
|
|
|
},
|
|
|
|
Headers: &jwt.Headers{
|
2021-05-07 08:59:39 +07:00
|
|
|
Extra: map[string]interface{}{
|
|
|
|
// TODO: Obtain this from the active keys when we implement key rotation.
|
|
|
|
"kid": "main-key",
|
|
|
|
},
|
2021-05-05 05:06:05 +07:00
|
|
|
},
|
|
|
|
}, err
|
|
|
|
}
|