2024-02-15 12:23:33 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2024-03-11 12:39:52 +00:00
|
|
|
"context"
|
2024-02-15 12:23:33 +00:00
|
|
|
"github.com/1f349/mjwt"
|
|
|
|
"github.com/1f349/tulip/database"
|
|
|
|
"github.com/go-oauth2/oauth2/v4"
|
|
|
|
"github.com/go-oauth2/oauth2/v4/server"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2024-03-11 12:39:52 +00:00
|
|
|
func addIdTokenSupport(srv *server.Server, db *database.Queries, key mjwt.Signer) {
|
2024-02-15 12:23:33 +00:00
|
|
|
srv.SetExtensionFieldsHandler(func(ti oauth2.TokenInfo) (fieldsValue map[string]interface{}) {
|
|
|
|
scope := ti.GetScope()
|
|
|
|
if containsScope(scope, "openid") {
|
|
|
|
idToken, err := generateIDToken(ti, db, key)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
fieldsValue = map[string]interface{}{}
|
|
|
|
fieldsValue["id_token"] = idToken
|
|
|
|
}
|
|
|
|
return
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// IdTokenClaims contains the JWT claims for an access token
|
|
|
|
type IdTokenClaims struct{}
|
|
|
|
|
|
|
|
func (a IdTokenClaims) Valid() error { return nil }
|
|
|
|
func (a IdTokenClaims) Type() string { return "access-token" }
|
|
|
|
|
2024-03-11 12:39:52 +00:00
|
|
|
func generateIDToken(ti oauth2.TokenInfo, us *database.Queries, key mjwt.Signer) (token string, err error) {
|
|
|
|
user, err := us.GetUser(context.Background(), ti.GetUserID())
|
2024-02-15 12:23:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2024-03-11 12:39:52 +00:00
|
|
|
token, err = key.GenerateJwt(user.Subject, "", jwt.ClaimStrings{ti.GetClientID()}, ti.GetAccessExpiresIn(), IdTokenClaims{})
|
2024-02-15 12:23:33 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func containsScope(scopes, s string) bool {
|
|
|
|
_scopes := strings.Split(scopes, " ")
|
|
|
|
for _, _s := range _scopes {
|
|
|
|
if _s == s {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|