2021-05-05 05:06:05 +07:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
2022-01-18 16:32:06 +07:00
|
|
|
"github.com/ory/fosite"
|
2021-05-05 05:06:05 +07:00
|
|
|
|
2022-04-01 18:18:58 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/model"
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/oidc"
|
|
|
|
"github.com/authelia/authelia/v4/internal/session"
|
2021-05-05 05:06:05 +07:00
|
|
|
)
|
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
func oidcGrantRequests(ar fosite.AuthorizeRequester, consent *model.OAuth2ConsentSession, userSession *session.UserSession) (extraClaims map[string]interface{}) {
|
2022-03-01 10:07:39 +07:00
|
|
|
extraClaims = map[string]interface{}{}
|
2022-01-18 16:32:06 +07:00
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
for _, scope := range consent.GrantedScopes {
|
2022-01-18 16:32:06 +07:00
|
|
|
if ar != nil {
|
|
|
|
ar.GrantScope(scope)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch scope {
|
|
|
|
case oidc.ScopeGroups:
|
|
|
|
extraClaims[oidc.ClaimGroups] = userSession.Groups
|
|
|
|
case oidc.ScopeProfile:
|
2022-03-01 10:07:39 +07:00
|
|
|
extraClaims[oidc.ClaimPreferredUsername] = userSession.Username
|
2022-01-18 16:32:06 +07:00
|
|
|
extraClaims[oidc.ClaimDisplayName] = userSession.DisplayName
|
|
|
|
case oidc.ScopeEmail:
|
|
|
|
if len(userSession.Emails) != 0 {
|
|
|
|
extraClaims[oidc.ClaimEmail] = userSession.Emails[0]
|
|
|
|
if len(userSession.Emails) > 1 {
|
2022-02-10 05:55:28 +07:00
|
|
|
extraClaims[oidc.ClaimEmailAlts] = userSession.Emails[1:]
|
2022-01-18 16:32:06 +07:00
|
|
|
}
|
|
|
|
// TODO (james-d-elliott): actually verify emails and record that information.
|
|
|
|
extraClaims[oidc.ClaimEmailVerified] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ar != nil {
|
2022-04-07 12:33:53 +07:00
|
|
|
for _, audience := range consent.GrantedAudience {
|
2022-01-18 16:32:06 +07:00
|
|
|
ar.GrantAudience(audience)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return extraClaims
|
|
|
|
}
|