cd12e177ea
* initial implementation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * check for openid/profile claims Signed-off-by: Jens Langhammer <jens@goauthentik.io> * include jwks sources in proxy provider Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add web ui for jwks Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only show sources with JWKS data configured Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix introspection tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start basic Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add basic auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add docs, update admonitions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add client_id to api, add tab for auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update locale Signed-off-by: Jens Langhammer <jens@goauthentik.io> Signed-off-by: Jens Langhammer <jens@goauthentik.io>
63 lines
1.7 KiB
Go
63 lines
1.7 KiB
Go
package application
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
)
|
|
|
|
func (a *Application) checkAuthHeaderBearer(r *http.Request) string {
|
|
auth := r.Header.Get(HeaderAuthorization)
|
|
if auth == "" {
|
|
return ""
|
|
}
|
|
if len(auth) < len(AuthBearer) || !strings.EqualFold(auth[:len(AuthBearer)], AuthBearer) {
|
|
return ""
|
|
}
|
|
return auth[len(AuthBearer):]
|
|
}
|
|
|
|
type TokenIntrospectionResponse struct {
|
|
Claims
|
|
Scope string `json:"scope"`
|
|
Active bool `json:"active"`
|
|
ClientID string `json:"client_id"`
|
|
}
|
|
|
|
func (a *Application) attemptBearerAuth(r *http.Request, token string) *TokenIntrospectionResponse {
|
|
values := url.Values{
|
|
"client_id": []string{a.oauthConfig.ClientID},
|
|
"client_secret": []string{a.oauthConfig.ClientSecret},
|
|
"token": []string{token},
|
|
}
|
|
req, err := http.NewRequest("POST", a.endpoint.TokenIntrospection, strings.NewReader(values.Encode()))
|
|
if err != nil {
|
|
a.log.WithError(err).Warning("failed to create introspection request")
|
|
return nil
|
|
}
|
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
|
res, err := a.httpClient.Do(req)
|
|
if err != nil || res.StatusCode > 200 {
|
|
a.log.WithError(err).Warning("failed to send introspection request")
|
|
return nil
|
|
}
|
|
intro := TokenIntrospectionResponse{}
|
|
err = json.NewDecoder(res.Body).Decode(&intro)
|
|
if err != nil {
|
|
a.log.WithError(err).Warning("failed to parse introspection response")
|
|
return nil
|
|
}
|
|
if !intro.Active {
|
|
a.log.Warning("token is not active")
|
|
return nil
|
|
}
|
|
if !strings.Contains(intro.Scope, "openid") || !strings.Contains(intro.Scope, "profile") {
|
|
a.log.Error("token missing openid or profile scope")
|
|
return nil
|
|
}
|
|
intro.RawToken = token
|
|
a.log.Trace("successfully introspected bearer token")
|
|
return &intro
|
|
}
|