mirror of
https://github.com/1f349/lavender.git
synced 2024-12-22 23:54:10 +00:00
113 lines
3.2 KiB
Go
113 lines
3.2 KiB
Go
package issuer
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"github.com/1f349/lavender/utils"
|
|
"golang.org/x/oauth2"
|
|
"net/http"
|
|
"net/url"
|
|
"slices"
|
|
)
|
|
|
|
var httpGet = http.Get
|
|
|
|
// SsoConfig is the base URL for an OAUTH/OPENID/SSO login service
|
|
// The path `/.well-known/openid-configuration` should be available
|
|
type SsoConfig struct {
|
|
Addr utils.JsonUrl `json:"addr" yaml:"addr"` // https://login.example.com
|
|
Namespace string `json:"namespace" yaml:"namespace"` // example.com
|
|
Registration bool `json:"registration" yaml:"registration"`
|
|
LoginWithButton bool `json:"login_with_button" yaml:"loginWithButton"`
|
|
Client SsoConfigClient `json:"client" yaml:"client"`
|
|
}
|
|
|
|
type SsoConfigClient struct {
|
|
ID string `json:"id"`
|
|
Secret string `json:"secret"`
|
|
Scopes []string `json:"scopes"`
|
|
}
|
|
|
|
func (s SsoConfig) FetchConfig() (*WellKnownOIDC, error) {
|
|
// generate openid config url
|
|
u := s.Addr.JoinPath(".well-known/openid-configuration")
|
|
|
|
// fetch metadata
|
|
get, err := httpGet(u.String())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer get.Body.Close()
|
|
|
|
var c WellKnownOIDC
|
|
err = json.NewDecoder(get.Body).Decode(&c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
c.Config = s
|
|
c.OAuth2Config = oauth2.Config{
|
|
ClientID: c.Config.Client.ID,
|
|
ClientSecret: c.Config.Client.Secret,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: c.AuthorizationEndpoint,
|
|
TokenURL: c.TokenEndpoint,
|
|
AuthStyle: oauth2.AuthStyleInHeader,
|
|
},
|
|
Scopes: c.Config.Client.Scopes,
|
|
}
|
|
return &c, nil
|
|
}
|
|
|
|
type WellKnownOIDC struct {
|
|
Namespace string `json:"-"`
|
|
Config SsoConfig `json:"-"`
|
|
Issuer string `json:"issuer"`
|
|
AuthorizationEndpoint string `json:"authorization_endpoint"`
|
|
TokenEndpoint string `json:"token_endpoint"`
|
|
UserInfoEndpoint string `json:"userinfo_endpoint"`
|
|
ResponseTypesSupported []string `json:"response_types_supported"`
|
|
ScopesSupported []string `json:"scopes_supported"`
|
|
ClaimsSupported []string `json:"claims_supported"`
|
|
GrantTypesSupported []string `json:"grant_types_supported"`
|
|
OAuth2Config oauth2.Config `json:"-"`
|
|
}
|
|
|
|
func (o WellKnownOIDC) Validate() error {
|
|
if o.Issuer == "" {
|
|
return errors.New("missing issuer")
|
|
}
|
|
|
|
// check URLs are valid
|
|
if _, err := url.Parse(o.AuthorizationEndpoint); err != nil {
|
|
return err
|
|
}
|
|
if _, err := url.Parse(o.TokenEndpoint); err != nil {
|
|
return err
|
|
}
|
|
if _, err := url.Parse(o.UserInfoEndpoint); err != nil {
|
|
return err
|
|
}
|
|
|
|
// check oidc supported values
|
|
if !slices.Contains(o.ResponseTypesSupported, "code") {
|
|
return errors.New("missing required response type 'code'")
|
|
}
|
|
if !slices.Contains(o.ScopesSupported, "openid") {
|
|
return errors.New("missing required scope 'openid'")
|
|
}
|
|
requiredClaims := []string{"sub", "name", "preferred_username", "email", "email_verified"}
|
|
for _, i := range requiredClaims {
|
|
if !slices.Contains(o.ClaimsSupported, i) {
|
|
return fmt.Errorf("missing required claim '%s'", i)
|
|
}
|
|
}
|
|
|
|
// oidc valid
|
|
return nil
|
|
}
|
|
|
|
func (o WellKnownOIDC) ValidReturnUrl(u *url.URL) bool {
|
|
return o.Config.Addr.Scheme == u.Scheme && o.Config.Addr.Host == u.Host
|
|
}
|