2021-05-05 05:06:05 +07:00
|
|
|
package oidc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"github.com/ory/fosite"
|
|
|
|
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/authentication"
|
|
|
|
"github.com/authelia/authelia/v4/internal/authorization"
|
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
2022-04-01 18:18:58 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/model"
|
2021-05-05 05:06:05 +07:00
|
|
|
)
|
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
// NewClient creates a new Client.
|
|
|
|
func NewClient(config schema.OpenIDConnectClientConfiguration) (client *Client) {
|
|
|
|
client = &Client{
|
2022-04-07 13:13:01 +07:00
|
|
|
ID: config.ID,
|
|
|
|
Description: config.Description,
|
|
|
|
Secret: []byte(config.Secret),
|
|
|
|
SectorIdentifier: config.SectorIdentifier.String(),
|
|
|
|
Public: config.Public,
|
2021-07-15 18:02:03 +07:00
|
|
|
|
|
|
|
Audience: config.Audience,
|
|
|
|
Scopes: config.Scopes,
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
RedirectURIs: config.RedirectURIs,
|
|
|
|
GrantTypes: config.GrantTypes,
|
|
|
|
ResponseTypes: config.ResponseTypes,
|
2021-07-15 18:02:03 +07:00
|
|
|
ResponseModes: []fosite.ResponseModeType{fosite.ResponseModeDefault},
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
|
2021-07-10 11:56:33 +07:00
|
|
|
UserinfoSigningAlgorithm: config.UserinfoSigningAlgorithm,
|
2022-04-08 12:35:21 +07:00
|
|
|
|
2022-07-26 12:43:39 +07:00
|
|
|
Policy: authorization.StringToLevel(config.Policy),
|
2022-04-08 12:35:21 +07:00
|
|
|
|
|
|
|
PreConfiguredConsentDuration: config.PreConfiguredConsentDuration,
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, mode := range config.ResponseModes {
|
|
|
|
client.ResponseModes = append(client.ResponseModes, fosite.ResponseModeType(mode))
|
|
|
|
}
|
|
|
|
|
|
|
|
return client
|
2021-05-05 05:06:05 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
// IsAuthenticationLevelSufficient returns if the provided authentication.Level is sufficient for the client of the AutheliaClient.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) IsAuthenticationLevelSufficient(level authentication.Level) bool {
|
2021-05-05 05:06:05 +07:00
|
|
|
return authorization.IsAuthLevelSufficient(level, c.Policy)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetID returns the ID.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetID() string {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.ID
|
|
|
|
}
|
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
// GetSectorIdentifier returns the SectorIdentifier for this client.
|
|
|
|
func (c Client) GetSectorIdentifier() string {
|
|
|
|
return c.SectorIdentifier
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetConsentResponseBody returns the proper consent response body for this session.OIDCWorkflowSession.
|
|
|
|
func (c Client) GetConsentResponseBody(consent *model.OAuth2ConsentSession) ConsentGetResponseBody {
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
body := ConsentGetResponseBody{
|
|
|
|
ClientID: c.ID,
|
|
|
|
ClientDescription: c.Description,
|
2022-04-08 12:35:21 +07:00
|
|
|
PreConfiguration: c.PreConfiguredConsentDuration != nil,
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
}
|
|
|
|
|
2022-04-07 12:33:53 +07:00
|
|
|
if consent != nil {
|
|
|
|
body.Scopes = consent.RequestedScopes
|
|
|
|
body.Audience = consent.RequestedAudience
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return body
|
|
|
|
}
|
|
|
|
|
2021-05-05 05:06:05 +07:00
|
|
|
// GetHashedSecret returns the Secret.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetHashedSecret() []byte {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.Secret
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetRedirectURIs returns the RedirectURIs.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetRedirectURIs() []string {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.RedirectURIs
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetGrantTypes returns the GrantTypes.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetGrantTypes() fosite.Arguments {
|
2021-05-05 05:06:05 +07:00
|
|
|
if len(c.GrantTypes) == 0 {
|
|
|
|
return fosite.Arguments{"authorization_code"}
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.GrantTypes
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetResponseTypes returns the ResponseTypes.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetResponseTypes() fosite.Arguments {
|
2021-05-05 05:06:05 +07:00
|
|
|
if len(c.ResponseTypes) == 0 {
|
|
|
|
return fosite.Arguments{"code"}
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.ResponseTypes
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetScopes returns the Scopes.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetScopes() fosite.Arguments {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.Scopes
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsPublic returns the value of the Public property.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) IsPublic() bool {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.Public
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetAudience returns the Audience.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetAudience() fosite.Arguments {
|
2021-05-05 05:06:05 +07:00
|
|
|
return c.Audience
|
|
|
|
}
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
|
|
|
|
// GetResponseModes returns the valid response modes for this client.
|
|
|
|
//
|
|
|
|
// Implements the fosite.ResponseModeClient.
|
2022-04-07 12:33:53 +07:00
|
|
|
func (c Client) GetResponseModes() []fosite.ResponseModeType {
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
return c.ResponseModes
|
|
|
|
}
|