2021-01-14 22:21:41 +00:00
|
|
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
2020-11-13 17:31:39 +00:00
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
|
|
|
// Package callback provides a handler for the OIDC callback endpoint.
|
|
|
|
package callback
|
|
|
|
|
|
|
|
import (
|
2020-11-20 21:33:08 +00:00
|
|
|
"crypto/subtle"
|
2020-11-20 01:57:07 +00:00
|
|
|
"fmt"
|
2020-11-13 17:31:39 +00:00
|
|
|
"net/http"
|
2020-11-16 22:07:34 +00:00
|
|
|
"net/url"
|
2020-11-19 01:15:01 +00:00
|
|
|
"time"
|
2020-11-13 17:31:39 +00:00
|
|
|
|
2021-01-20 17:54:44 +00:00
|
|
|
coreosoidc "github.com/coreos/go-oidc/v3/oidc"
|
2020-11-18 21:38:13 +00:00
|
|
|
"github.com/ory/fosite"
|
2020-11-19 01:15:01 +00:00
|
|
|
"github.com/ory/fosite/handler/openid"
|
|
|
|
"github.com/ory/fosite/token/jwt"
|
2020-11-18 21:38:13 +00:00
|
|
|
|
2020-11-13 17:31:39 +00:00
|
|
|
"go.pinniped.dev/internal/httputil/httperr"
|
2020-12-14 23:28:32 +00:00
|
|
|
"go.pinniped.dev/internal/httputil/securityheader"
|
2020-11-13 23:59:51 +00:00
|
|
|
"go.pinniped.dev/internal/oidc"
|
2020-11-16 16:47:49 +00:00
|
|
|
"go.pinniped.dev/internal/oidc/csrftoken"
|
2020-11-13 23:59:51 +00:00
|
|
|
"go.pinniped.dev/internal/oidc/provider"
|
2020-11-16 19:41:00 +00:00
|
|
|
"go.pinniped.dev/internal/plog"
|
2020-11-13 17:31:39 +00:00
|
|
|
)
|
|
|
|
|
2021-01-25 17:53:52 +00:00
|
|
|
const (
|
|
|
|
// The name of the email claim from https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
|
|
|
|
emailClaimName = "email"
|
|
|
|
|
|
|
|
// The name of the email_verified claim from https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
|
|
|
|
emailVerifiedClaimName = "email_verified"
|
|
|
|
)
|
|
|
|
|
2020-11-19 16:35:23 +00:00
|
|
|
func NewHandler(
|
2021-04-07 23:12:13 +00:00
|
|
|
upstreamIDPs oidc.UpstreamOIDCIdentityProvidersLister,
|
2020-11-19 16:35:23 +00:00
|
|
|
oauthHelper fosite.OAuth2Provider,
|
|
|
|
stateDecoder, cookieDecoder oidc.Decoder,
|
2020-12-02 16:36:07 +00:00
|
|
|
redirectURI string,
|
2020-11-19 16:35:23 +00:00
|
|
|
) http.Handler {
|
2020-12-14 23:28:32 +00:00
|
|
|
return securityheader.Wrap(httperr.HandlerFunc(func(w http.ResponseWriter, r *http.Request) error {
|
2020-11-16 22:07:34 +00:00
|
|
|
state, err := validateRequest(r, stateDecoder, cookieDecoder)
|
|
|
|
if err != nil {
|
2020-11-16 16:47:49 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-04-07 23:12:13 +00:00
|
|
|
upstreamIDPConfig := findUpstreamIDPConfig(state.UpstreamName, upstreamIDPs)
|
2020-11-19 01:15:01 +00:00
|
|
|
if upstreamIDPConfig == nil {
|
2020-11-16 19:41:00 +00:00
|
|
|
plog.Warning("upstream provider not found")
|
2020-11-13 23:59:51 +00:00
|
|
|
return httperr.New(http.StatusUnprocessableEntity, "upstream provider not found")
|
|
|
|
}
|
|
|
|
|
2020-11-16 22:07:34 +00:00
|
|
|
downstreamAuthParams, err := url.ParseQuery(state.AuthParams)
|
|
|
|
if err != nil {
|
2020-11-19 19:19:01 +00:00
|
|
|
plog.Error("error reading state downstream auth params", err)
|
2020-11-19 13:51:23 +00:00
|
|
|
return httperr.New(http.StatusBadRequest, "error reading state downstream auth params")
|
2020-11-16 22:07:34 +00:00
|
|
|
}
|
|
|
|
|
2020-11-19 01:15:01 +00:00
|
|
|
// Recreate enough of the original authorize request so we can pass it to NewAuthorizeRequest().
|
|
|
|
reconstitutedAuthRequest := &http.Request{Form: downstreamAuthParams}
|
|
|
|
authorizeRequester, err := oauthHelper.NewAuthorizeRequest(r.Context(), reconstitutedAuthRequest)
|
|
|
|
if err != nil {
|
2020-11-19 19:19:01 +00:00
|
|
|
plog.Error("error using state downstream auth params", err)
|
2020-11-19 13:51:23 +00:00
|
|
|
return httperr.New(http.StatusBadRequest, "error using state downstream auth params")
|
2020-11-19 01:15:01 +00:00
|
|
|
}
|
|
|
|
|
2020-12-16 03:59:57 +00:00
|
|
|
// Automatically grant the openid, offline_access, and pinniped:request-audience scopes, but only if they were requested.
|
2020-12-08 01:22:34 +00:00
|
|
|
oidc.GrantScopeIfRequested(authorizeRequester, coreosoidc.ScopeOpenID)
|
|
|
|
oidc.GrantScopeIfRequested(authorizeRequester, coreosoidc.ScopeOfflineAccess)
|
2020-12-16 03:59:57 +00:00
|
|
|
oidc.GrantScopeIfRequested(authorizeRequester, "pinniped:request-audience")
|
2020-11-19 01:15:01 +00:00
|
|
|
|
2020-12-04 21:33:36 +00:00
|
|
|
token, err := upstreamIDPConfig.ExchangeAuthcodeAndValidateTokens(
|
2020-11-19 01:15:01 +00:00
|
|
|
r.Context(),
|
2020-11-19 16:53:53 +00:00
|
|
|
authcode(r),
|
2020-11-19 15:20:46 +00:00
|
|
|
state.PKCECode,
|
|
|
|
state.Nonce,
|
2020-12-02 16:36:07 +00:00
|
|
|
redirectURI,
|
2020-11-16 22:07:34 +00:00
|
|
|
)
|
2020-11-19 01:15:01 +00:00
|
|
|
if err != nil {
|
2020-11-19 19:19:01 +00:00
|
|
|
plog.WarningErr("error exchanging and validating upstream tokens", err, "upstreamName", upstreamIDPConfig.GetName())
|
2020-11-19 14:00:41 +00:00
|
|
|
return httperr.New(http.StatusBadGateway, "error exchanging and validating upstream tokens")
|
2020-11-19 01:15:01 +00:00
|
|
|
}
|
|
|
|
|
2020-12-15 01:05:53 +00:00
|
|
|
subject, username, err := getSubjectAndUsernameFromUpstreamIDToken(upstreamIDPConfig, token.IDToken.Claims)
|
2020-11-19 19:19:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2020-11-19 16:08:21 +00:00
|
|
|
}
|
2020-11-19 01:15:01 +00:00
|
|
|
|
2020-12-04 21:33:36 +00:00
|
|
|
groups, err := getGroupsFromUpstreamIDToken(upstreamIDPConfig, token.IDToken.Claims)
|
2020-11-19 20:53:21 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-12-15 01:05:53 +00:00
|
|
|
openIDSession := makeDownstreamSession(subject, username, groups)
|
2020-11-19 19:19:01 +00:00
|
|
|
authorizeResponder, err := oauthHelper.NewAuthorizeResponse(r.Context(), authorizeRequester, openIDSession)
|
2020-11-19 01:15:01 +00:00
|
|
|
if err != nil {
|
2020-11-20 01:57:07 +00:00
|
|
|
plog.WarningErr("error while generating and saving authcode", err, "upstreamName", upstreamIDPConfig.GetName())
|
|
|
|
return httperr.Wrap(http.StatusInternalServerError, "error while generating and saving authcode", err)
|
2020-11-19 01:15:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
oauthHelper.WriteAuthorizeResponse(w, authorizeRequester, authorizeResponder)
|
2020-11-16 22:07:34 +00:00
|
|
|
|
2020-11-16 19:41:00 +00:00
|
|
|
return nil
|
2020-12-14 23:28:32 +00:00
|
|
|
}))
|
2020-11-13 17:31:39 +00:00
|
|
|
}
|
2020-11-13 23:59:51 +00:00
|
|
|
|
2020-11-19 16:53:53 +00:00
|
|
|
func authcode(r *http.Request) string {
|
|
|
|
return r.FormValue("code")
|
|
|
|
}
|
|
|
|
|
2020-11-16 22:07:34 +00:00
|
|
|
func validateRequest(r *http.Request, stateDecoder, cookieDecoder oidc.Decoder) (*oidc.UpstreamStateParamData, error) {
|
2020-11-16 19:41:00 +00:00
|
|
|
if r.Method != http.MethodGet {
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, httperr.Newf(http.StatusMethodNotAllowed, "%s (try GET)", r.Method)
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
csrfValue, err := readCSRFCookie(r, cookieDecoder)
|
|
|
|
if err != nil {
|
|
|
|
plog.InfoErr("error reading CSRF cookie", err)
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, err
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
2020-11-19 16:53:53 +00:00
|
|
|
if authcode(r) == "" {
|
2020-11-16 19:41:00 +00:00
|
|
|
plog.Info("code param not found")
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, httperr.New(http.StatusBadRequest, "code param not found")
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if r.FormValue("state") == "" {
|
|
|
|
plog.Info("state param not found")
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, httperr.New(http.StatusBadRequest, "state param not found")
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
state, err := readState(r, stateDecoder)
|
|
|
|
if err != nil {
|
|
|
|
plog.InfoErr("error reading state", err)
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, err
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
2020-11-20 21:33:08 +00:00
|
|
|
if subtle.ConstantTimeCompare([]byte(state.CSRFToken), []byte(csrfValue)) != 1 {
|
2020-11-16 19:41:00 +00:00
|
|
|
plog.InfoErr("CSRF value does not match", err)
|
2020-11-16 22:07:34 +00:00
|
|
|
return nil, httperr.Wrap(http.StatusForbidden, "CSRF value does not match", err)
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
2020-11-16 22:07:34 +00:00
|
|
|
return state, nil
|
2020-11-16 19:41:00 +00:00
|
|
|
}
|
|
|
|
|
2021-04-07 23:12:13 +00:00
|
|
|
func findUpstreamIDPConfig(upstreamName string, upstreamIDPs oidc.UpstreamOIDCIdentityProvidersLister) provider.UpstreamOIDCIdentityProviderI {
|
|
|
|
for _, p := range upstreamIDPs.GetOIDCIdentityProviders() {
|
2020-11-20 21:33:08 +00:00
|
|
|
if p.GetName() == upstreamName {
|
2020-11-19 01:15:01 +00:00
|
|
|
return p
|
2020-11-13 23:59:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-11-16 16:47:49 +00:00
|
|
|
|
2020-11-16 19:41:00 +00:00
|
|
|
func readCSRFCookie(r *http.Request, cookieDecoder oidc.Decoder) (csrftoken.CSRFToken, error) {
|
2020-11-16 16:47:49 +00:00
|
|
|
receivedCSRFCookie, err := r.Cookie(oidc.CSRFCookieName)
|
|
|
|
if err != nil {
|
|
|
|
// Error means that the cookie was not found
|
2020-11-16 19:41:00 +00:00
|
|
|
return "", httperr.Wrap(http.StatusForbidden, "CSRF cookie is missing", err)
|
2020-11-16 16:47:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var csrfFromCookie csrftoken.CSRFToken
|
|
|
|
err = cookieDecoder.Decode(oidc.CSRFCookieEncodingName, receivedCSRFCookie.Value, &csrfFromCookie)
|
|
|
|
if err != nil {
|
2020-11-16 19:41:00 +00:00
|
|
|
return "", httperr.Wrap(http.StatusForbidden, "error reading CSRF cookie", err)
|
2020-11-16 16:47:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return csrfFromCookie, nil
|
|
|
|
}
|
2020-11-16 19:41:00 +00:00
|
|
|
|
|
|
|
func readState(r *http.Request, stateDecoder oidc.Decoder) (*oidc.UpstreamStateParamData, error) {
|
|
|
|
var state oidc.UpstreamStateParamData
|
|
|
|
if err := stateDecoder.Decode(
|
|
|
|
oidc.UpstreamStateParamEncodingName,
|
|
|
|
r.FormValue("state"),
|
|
|
|
&state,
|
|
|
|
); err != nil {
|
|
|
|
return nil, httperr.New(http.StatusBadRequest, "error reading state")
|
|
|
|
}
|
|
|
|
|
|
|
|
if state.FormatVersion != oidc.UpstreamStateParamFormatVersion {
|
|
|
|
return nil, httperr.New(http.StatusUnprocessableEntity, "state format version is invalid")
|
|
|
|
}
|
|
|
|
|
|
|
|
return &state, nil
|
|
|
|
}
|
2020-11-19 14:28:56 +00:00
|
|
|
|
2020-12-15 01:05:53 +00:00
|
|
|
func getSubjectAndUsernameFromUpstreamIDToken(
|
2020-11-19 19:19:01 +00:00
|
|
|
upstreamIDPConfig provider.UpstreamOIDCIdentityProviderI,
|
|
|
|
idTokenClaims map[string]interface{},
|
2020-12-15 01:05:53 +00:00
|
|
|
) (string, string, error) {
|
|
|
|
// The spec says the "sub" claim is only unique per issuer,
|
|
|
|
// so we will prepend the issuer string to make it globally unique.
|
2020-12-15 02:27:14 +00:00
|
|
|
upstreamIssuer := idTokenClaims[oidc.IDTokenIssuerClaim]
|
2020-12-15 01:05:53 +00:00
|
|
|
if upstreamIssuer == "" {
|
|
|
|
plog.Warning(
|
|
|
|
"issuer claim in upstream ID token missing",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
"issClaim", upstreamIssuer,
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "issuer claim in upstream ID token missing")
|
|
|
|
}
|
|
|
|
upstreamIssuerAsString, ok := upstreamIssuer.(string)
|
|
|
|
if !ok {
|
|
|
|
plog.Warning(
|
|
|
|
"issuer claim in upstream ID token has invalid format",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
"issClaim", upstreamIssuer,
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "issuer claim in upstream ID token has invalid format")
|
|
|
|
}
|
|
|
|
|
2020-12-15 02:27:14 +00:00
|
|
|
subjectAsInterface, ok := idTokenClaims[oidc.IDTokenSubjectClaim]
|
2020-12-15 01:05:53 +00:00
|
|
|
if !ok {
|
|
|
|
plog.Warning(
|
|
|
|
"no subject claim in upstream ID token",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "no subject claim in upstream ID token")
|
|
|
|
}
|
|
|
|
|
|
|
|
upstreamSubject, ok := subjectAsInterface.(string)
|
|
|
|
if !ok {
|
|
|
|
plog.Warning(
|
|
|
|
"subject claim in upstream ID token has invalid format",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "subject claim in upstream ID token has invalid format")
|
|
|
|
}
|
|
|
|
|
2021-05-27 16:25:48 +00:00
|
|
|
subject := downstreamSubjectFromUpstreamOIDC(upstreamIssuerAsString, upstreamSubject)
|
2020-11-20 01:57:07 +00:00
|
|
|
|
2021-01-25 17:53:52 +00:00
|
|
|
usernameClaimName := upstreamIDPConfig.GetUsernameClaim()
|
|
|
|
if usernameClaimName == "" {
|
2020-12-15 01:05:53 +00:00
|
|
|
return subject, subject, nil
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-01-25 17:53:52 +00:00
|
|
|
// If the upstream username claim is configured to be the special "email" claim and the upstream "email_verified"
|
|
|
|
// claim is present, then validate that the "email_verified" claim is true.
|
|
|
|
emailVerifiedAsInterface, ok := idTokenClaims[emailVerifiedClaimName]
|
|
|
|
if usernameClaimName == emailClaimName && ok {
|
|
|
|
emailVerified, ok := emailVerifiedAsInterface.(bool)
|
|
|
|
if !ok {
|
|
|
|
plog.Warning(
|
|
|
|
"username claim configured as \"email\" and upstream email_verified claim is not a boolean",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
"configuredUsernameClaim", usernameClaimName,
|
|
|
|
"emailVerifiedClaim", emailVerifiedAsInterface,
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "email_verified claim in upstream ID token has invalid format")
|
|
|
|
}
|
|
|
|
if !emailVerified {
|
|
|
|
plog.Warning(
|
|
|
|
"username claim configured as \"email\" and upstream email_verified claim has false value",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
|
|
|
"configuredUsernameClaim", usernameClaimName,
|
|
|
|
)
|
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "email_verified claim in upstream ID token has false value")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
usernameAsInterface, ok := idTokenClaims[usernameClaimName]
|
2020-11-19 19:19:01 +00:00
|
|
|
if !ok {
|
|
|
|
plog.Warning(
|
|
|
|
"no username claim in upstream ID token",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
2021-01-25 17:53:52 +00:00
|
|
|
"configuredUsernameClaim", usernameClaimName,
|
2020-11-19 19:19:01 +00:00
|
|
|
)
|
2020-12-15 01:05:53 +00:00
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "no username claim in upstream ID token")
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
username, ok := usernameAsInterface.(string)
|
|
|
|
if !ok {
|
2020-11-19 20:53:21 +00:00
|
|
|
plog.Warning(
|
|
|
|
"username claim in upstream ID token has invalid format",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
2021-01-25 17:53:52 +00:00
|
|
|
"configuredUsernameClaim", usernameClaimName,
|
2020-11-19 20:53:21 +00:00
|
|
|
)
|
2020-12-15 01:05:53 +00:00
|
|
|
return "", "", httperr.New(http.StatusUnprocessableEntity, "username claim in upstream ID token has invalid format")
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2020-12-15 01:05:53 +00:00
|
|
|
return subject, username, nil
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-05-27 16:25:48 +00:00
|
|
|
func downstreamSubjectFromUpstreamOIDC(upstreamIssuerAsString string, upstreamSubject string) string {
|
|
|
|
return fmt.Sprintf("%s?%s=%s", upstreamIssuerAsString, oidc.IDTokenSubjectClaim, url.QueryEscape(upstreamSubject))
|
|
|
|
}
|
|
|
|
|
2020-11-19 19:19:01 +00:00
|
|
|
func getGroupsFromUpstreamIDToken(
|
|
|
|
upstreamIDPConfig provider.UpstreamOIDCIdentityProviderI,
|
|
|
|
idTokenClaims map[string]interface{},
|
2021-01-14 22:21:41 +00:00
|
|
|
) ([]string, error) {
|
2021-01-25 17:53:52 +00:00
|
|
|
groupsClaimName := upstreamIDPConfig.GetGroupsClaim()
|
|
|
|
if groupsClaimName == "" {
|
2021-01-14 23:11:00 +00:00
|
|
|
return nil, nil
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-01-25 17:53:52 +00:00
|
|
|
groupsAsInterface, ok := idTokenClaims[groupsClaimName]
|
2020-11-19 19:19:01 +00:00
|
|
|
if !ok {
|
2020-11-19 20:53:21 +00:00
|
|
|
plog.Warning(
|
|
|
|
"no groups claim in upstream ID token",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
2021-01-25 17:53:52 +00:00
|
|
|
"configuredGroupsClaim", groupsClaimName,
|
2020-11-19 20:53:21 +00:00
|
|
|
)
|
2021-01-14 23:11:00 +00:00
|
|
|
return nil, nil // the upstream IDP may have omitted the claim if the user has no groups
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-01-14 22:21:41 +00:00
|
|
|
groupsAsArray, okAsArray := extractGroups(groupsAsInterface)
|
|
|
|
if !okAsArray {
|
2020-11-19 20:53:21 +00:00
|
|
|
plog.Warning(
|
|
|
|
"groups claim in upstream ID token has invalid format",
|
|
|
|
"upstreamName", upstreamIDPConfig.GetName(),
|
2021-01-25 17:53:52 +00:00
|
|
|
"configuredGroupsClaim", groupsClaimName,
|
2020-11-19 20:53:21 +00:00
|
|
|
)
|
|
|
|
return nil, httperr.New(http.StatusUnprocessableEntity, "groups claim in upstream ID token has invalid format")
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-01-14 22:21:41 +00:00
|
|
|
return groupsAsArray, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func extractGroups(groupsAsInterface interface{}) ([]string, bool) {
|
|
|
|
groupsAsString, okAsString := groupsAsInterface.(string)
|
|
|
|
if okAsString {
|
|
|
|
return []string{groupsAsString}, true
|
2020-12-15 16:34:24 +00:00
|
|
|
}
|
2021-01-14 22:21:41 +00:00
|
|
|
|
|
|
|
groupsAsStringArray, okAsStringArray := groupsAsInterface.([]string)
|
|
|
|
if okAsStringArray {
|
|
|
|
return groupsAsStringArray, true
|
|
|
|
}
|
|
|
|
|
|
|
|
groupsAsInterfaceArray, okAsArray := groupsAsInterface.([]interface{})
|
|
|
|
if !okAsArray {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
2021-01-14 23:11:00 +00:00
|
|
|
var groupsAsStrings []string
|
|
|
|
for _, groupAsInterface := range groupsAsInterfaceArray {
|
2021-01-14 22:21:41 +00:00
|
|
|
groupAsString, okAsString := groupAsInterface.(string)
|
|
|
|
if !okAsString {
|
|
|
|
return nil, false
|
|
|
|
}
|
2021-01-14 23:11:00 +00:00
|
|
|
if groupAsString != "" {
|
|
|
|
groupsAsStrings = append(groupsAsStrings, groupAsString)
|
|
|
|
}
|
2021-01-14 22:21:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return groupsAsStrings, true
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
|
2021-01-14 22:21:41 +00:00
|
|
|
func makeDownstreamSession(subject string, username string, groups []string) *openid.DefaultSession {
|
2020-11-20 20:36:51 +00:00
|
|
|
now := time.Now().UTC()
|
2020-11-19 19:19:01 +00:00
|
|
|
openIDSession := &openid.DefaultSession{
|
|
|
|
Claims: &jwt.IDTokenClaims{
|
2020-12-15 01:05:53 +00:00
|
|
|
Subject: subject,
|
2020-11-20 01:57:07 +00:00
|
|
|
RequestedAt: now,
|
|
|
|
AuthTime: now,
|
2020-11-19 19:19:01 +00:00
|
|
|
},
|
|
|
|
}
|
2021-01-14 23:11:00 +00:00
|
|
|
if groups == nil {
|
|
|
|
groups = []string{}
|
|
|
|
}
|
2020-12-15 01:05:53 +00:00
|
|
|
openIDSession.Claims.Extra = map[string]interface{}{
|
2020-12-15 02:27:14 +00:00
|
|
|
oidc.DownstreamUsernameClaim: username,
|
2021-01-14 22:21:41 +00:00
|
|
|
oidc.DownstreamGroupsClaim: groups,
|
2020-11-19 19:19:01 +00:00
|
|
|
}
|
|
|
|
return openIDSession
|
|
|
|
}
|