mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
130 lines
3.8 KiB
Go
130 lines
3.8 KiB
Go
|
package handlers
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"net/http"
|
||
|
"strings"
|
||
|
|
||
|
"github.com/ory/fosite"
|
||
|
|
||
|
"github.com/authelia/authelia/internal/logging"
|
||
|
"github.com/authelia/authelia/internal/middlewares"
|
||
|
"github.com/authelia/authelia/internal/oidc"
|
||
|
"github.com/authelia/authelia/internal/session"
|
||
|
)
|
||
|
|
||
|
func oidcAuthorize(ctx *middlewares.AutheliaCtx, rw http.ResponseWriter, r *http.Request) {
|
||
|
ar, err := ctx.Providers.OpenIDConnect.Fosite.NewAuthorizeRequest(ctx, r)
|
||
|
if err != nil {
|
||
|
logging.Logger().Errorf("Error occurred in NewAuthorizeRequest: %+v", err)
|
||
|
ctx.Providers.OpenIDConnect.Fosite.WriteAuthorizeError(rw, ar, err)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
clientID := ar.GetClient().GetID()
|
||
|
client, err := ctx.Providers.OpenIDConnect.Store.GetInternalClient(clientID)
|
||
|
|
||
|
if err != nil {
|
||
|
err := fmt.Errorf("Unable to find related client configuration with name '%s': %v", ar.GetID(), err)
|
||
|
ctx.Logger.Error(err)
|
||
|
ctx.Providers.OpenIDConnect.Fosite.WriteAuthorizeError(rw, ar, err)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
userSession := ctx.GetSession()
|
||
|
|
||
|
requestedScopes := ar.GetRequestedScopes()
|
||
|
requestedAudience := ar.GetRequestedAudience()
|
||
|
|
||
|
isAuthInsufficient := !client.IsAuthenticationLevelSufficient(userSession.AuthenticationLevel)
|
||
|
|
||
|
if isAuthInsufficient || (isConsentMissing(userSession.OIDCWorkflowSession, requestedScopes, requestedAudience)) {
|
||
|
oidcAuthorizeHandleAuthorizationOrConsentInsufficient(ctx, userSession, client, isAuthInsufficient, rw, r, ar)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
for _, scope := range requestedScopes {
|
||
|
ar.GrantScope(scope)
|
||
|
}
|
||
|
|
||
|
for _, a := range requestedAudience {
|
||
|
ar.GrantAudience(a)
|
||
|
}
|
||
|
|
||
|
userSession.OIDCWorkflowSession = nil
|
||
|
if err := ctx.SaveSession(userSession); err != nil {
|
||
|
ctx.Logger.Errorf("%v", err)
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
oauthSession, err := newOIDCSession(ctx, ar)
|
||
|
if err != nil {
|
||
|
ctx.Logger.Errorf("Error occurred in NewOIDCSession: %+v", err)
|
||
|
ctx.Providers.OpenIDConnect.Fosite.WriteAuthorizeError(rw, ar, err)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
response, err := ctx.Providers.OpenIDConnect.Fosite.NewAuthorizeResponse(ctx, ar, oauthSession)
|
||
|
if err != nil {
|
||
|
ctx.Logger.Errorf("Error occurred in NewAuthorizeResponse: %+v", err)
|
||
|
ctx.Providers.OpenIDConnect.Fosite.WriteAuthorizeError(rw, ar, err)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.Providers.OpenIDConnect.Fosite.WriteAuthorizeResponse(rw, ar, response)
|
||
|
}
|
||
|
|
||
|
func oidcAuthorizeHandleAuthorizationOrConsentInsufficient(
|
||
|
ctx *middlewares.AutheliaCtx, userSession session.UserSession, client *oidc.InternalClient, isAuthInsufficient bool,
|
||
|
rw http.ResponseWriter, r *http.Request,
|
||
|
ar fosite.AuthorizeRequester) {
|
||
|
forwardedProtoHost, err := ctx.ForwardedProtoHost()
|
||
|
if err != nil {
|
||
|
ctx.Logger.Errorf("%v", err)
|
||
|
http.Error(rw, err.Error(), http.StatusBadRequest)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
redirectURL := fmt.Sprintf("%s%s", forwardedProtoHost, string(ctx.Request.RequestURI()))
|
||
|
|
||
|
ctx.Logger.Debugf("User %s must consent with scopes %s",
|
||
|
userSession.Username, strings.Join(ar.GetRequestedScopes(), ", "))
|
||
|
|
||
|
userSession.OIDCWorkflowSession = new(session.OIDCWorkflowSession)
|
||
|
userSession.OIDCWorkflowSession.ClientID = client.ID
|
||
|
userSession.OIDCWorkflowSession.RequestedScopes = ar.GetRequestedScopes()
|
||
|
userSession.OIDCWorkflowSession.RequestedAudience = ar.GetRequestedAudience()
|
||
|
userSession.OIDCWorkflowSession.AuthURI = redirectURL
|
||
|
userSession.OIDCWorkflowSession.TargetURI = ar.GetRedirectURI().String()
|
||
|
userSession.OIDCWorkflowSession.RequiredAuthorizationLevel = client.Policy
|
||
|
|
||
|
if err := ctx.SaveSession(userSession); err != nil {
|
||
|
ctx.Logger.Errorf("%v", err)
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
uri, err := ctx.ForwardedProtoHost()
|
||
|
if err != nil {
|
||
|
ctx.Logger.Errorf("%v", err)
|
||
|
http.Error(rw, err.Error(), http.StatusBadRequest)
|
||
|
|
||
|
return
|
||
|
}
|
||
|
|
||
|
if isAuthInsufficient {
|
||
|
http.Redirect(rw, r, uri, http.StatusFound)
|
||
|
} else {
|
||
|
http.Redirect(rw, r, fmt.Sprintf("%s/consent", uri), http.StatusFound)
|
||
|
}
|
||
|
}
|