tulip/server/id_token.go

53 lines
1.3 KiB
Go
Raw Normal View History

2024-02-15 12:23:33 +00:00
package server
import (
2024-03-11 12:39:52 +00:00
"context"
2024-02-15 12:23:33 +00:00
"github.com/1f349/mjwt"
"github.com/1f349/tulip/database"
"github.com/go-oauth2/oauth2/v4"
"github.com/go-oauth2/oauth2/v4/server"
"github.com/golang-jwt/jwt/v4"
"strings"
)
2024-03-11 12:39:52 +00:00
func addIdTokenSupport(srv *server.Server, db *database.Queries, key mjwt.Signer) {
2024-02-15 12:23:33 +00:00
srv.SetExtensionFieldsHandler(func(ti oauth2.TokenInfo) (fieldsValue map[string]interface{}) {
scope := ti.GetScope()
if containsScope(scope, "openid") {
idToken, err := generateIDToken(ti, db, key)
if err != nil {
return
}
fieldsValue = map[string]interface{}{}
fieldsValue["id_token"] = idToken
}
return
})
}
// IdTokenClaims contains the JWT claims for an access token
type IdTokenClaims struct{}
func (a IdTokenClaims) Valid() error { return nil }
func (a IdTokenClaims) Type() string { return "access-token" }
2024-03-11 12:39:52 +00:00
func generateIDToken(ti oauth2.TokenInfo, us *database.Queries, key mjwt.Signer) (token string, err error) {
user, err := us.GetUser(context.Background(), ti.GetUserID())
2024-02-15 12:23:33 +00:00
if err != nil {
return "", err
}
2024-03-11 12:39:52 +00:00
token, err = key.GenerateJwt(user.Subject, "", jwt.ClaimStrings{ti.GetClientID()}, ti.GetAccessExpiresIn(), IdTokenClaims{})
2024-02-15 12:23:33 +00:00
return
}
func containsScope(scopes, s string) bool {
_scopes := strings.Split(scopes, " ")
for _, _s := range _scopes {
if _s == s {
return true
}
}
return false
}