forked from Shiloh/githaven
0eeee9c721
- Fixes a JWT decoding issue in the OpenID provider - Updates the GitHub provider to use the authorization header for authentication - Updates the Twitch provider for Twitch's v5 API changes - Adds the email and is_private_email fields to the Apple provider's GetUser implementation - Modifies gothic to export a non-collidable context key for setting the Provider in a context.Context - Adds new scopes to the Spotify provider - Adds the IDToken from OpenID providers on the user struct - Make Apple provider's SecretParams public - Adds support for sign in with Apple, and drops support for Go versions 1.7 and 1.8 - Fixes the Slack provider's FetchURL logic to use the appropriate scope for the info it needs Signed-off-by: Oscar LÃfwenhamn <oscar.lofwenhamn@cgi.com>
410 lines
12 KiB
Go
Vendored
410 lines
12 KiB
Go
Vendored
package openidConnect
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/markbates/goth"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
const (
|
|
// Standard Claims http://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
|
|
// fixed, cannot be changed
|
|
subjectClaim = "sub"
|
|
expiryClaim = "exp"
|
|
audienceClaim = "aud"
|
|
issuerClaim = "iss"
|
|
|
|
PreferredUsernameClaim = "preferred_username"
|
|
EmailClaim = "email"
|
|
NameClaim = "name"
|
|
NicknameClaim = "nickname"
|
|
PictureClaim = "picture"
|
|
GivenNameClaim = "given_name"
|
|
FamilyNameClaim = "family_name"
|
|
AddressClaim = "address"
|
|
|
|
// Unused but available to set in Provider claims
|
|
MiddleNameClaim = "middle_name"
|
|
ProfileClaim = "profile"
|
|
WebsiteClaim = "website"
|
|
EmailVerifiedClaim = "email_verified"
|
|
GenderClaim = "gender"
|
|
BirthdateClaim = "birthdate"
|
|
ZoneinfoClaim = "zoneinfo"
|
|
LocaleClaim = "locale"
|
|
PhoneNumberClaim = "phone_number"
|
|
PhoneNumberVerifiedClaim = "phone_number_verified"
|
|
UpdatedAtClaim = "updated_at"
|
|
|
|
clockSkew = 10 * time.Second
|
|
)
|
|
|
|
// Provider is the implementation of `goth.Provider` for accessing OpenID Connect provider
|
|
type Provider struct {
|
|
ClientKey string
|
|
Secret string
|
|
CallbackURL string
|
|
HTTPClient *http.Client
|
|
config *oauth2.Config
|
|
openIDConfig *OpenIDConfig
|
|
providerName string
|
|
|
|
UserIdClaims []string
|
|
NameClaims []string
|
|
NickNameClaims []string
|
|
EmailClaims []string
|
|
AvatarURLClaims []string
|
|
FirstNameClaims []string
|
|
LastNameClaims []string
|
|
LocationClaims []string
|
|
|
|
SkipUserInfoRequest bool
|
|
}
|
|
|
|
type OpenIDConfig struct {
|
|
AuthEndpoint string `json:"authorization_endpoint"`
|
|
TokenEndpoint string `json:"token_endpoint"`
|
|
UserInfoEndpoint string `json:"userinfo_endpoint"`
|
|
Issuer string `json:"issuer"`
|
|
}
|
|
|
|
// New creates a new OpenID Connect provider, and sets up important connection details.
|
|
// You should always call `openidConnect.New` to get a new Provider. Never try to create
|
|
// one manually.
|
|
// New returns an implementation of an OpenID Connect Authorization Code Flow
|
|
// See http://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth
|
|
// ID Token decryption is not (yet) supported
|
|
// UserInfo decryption is not (yet) supported
|
|
func New(clientKey, secret, callbackURL, openIDAutoDiscoveryURL string, scopes ...string) (*Provider, error) {
|
|
p := &Provider{
|
|
ClientKey: clientKey,
|
|
Secret: secret,
|
|
CallbackURL: callbackURL,
|
|
|
|
UserIdClaims: []string{subjectClaim},
|
|
NameClaims: []string{NameClaim},
|
|
NickNameClaims: []string{NicknameClaim, PreferredUsernameClaim},
|
|
EmailClaims: []string{EmailClaim},
|
|
AvatarURLClaims: []string{PictureClaim},
|
|
FirstNameClaims: []string{GivenNameClaim},
|
|
LastNameClaims: []string{FamilyNameClaim},
|
|
LocationClaims: []string{AddressClaim},
|
|
|
|
providerName: "openid-connect",
|
|
}
|
|
|
|
openIDConfig, err := getOpenIDConfig(p, openIDAutoDiscoveryURL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
p.openIDConfig = openIDConfig
|
|
|
|
p.config = newConfig(p, scopes, openIDConfig)
|
|
return p, nil
|
|
}
|
|
|
|
// Name is the name used to retrieve this provider later.
|
|
func (p *Provider) Name() string {
|
|
return p.providerName
|
|
}
|
|
|
|
// SetName is to update the name of the provider (needed in case of multiple providers of 1 type)
|
|
func (p *Provider) SetName(name string) {
|
|
p.providerName = name
|
|
}
|
|
|
|
func (p *Provider) Client() *http.Client {
|
|
return goth.HTTPClientWithFallBack(p.HTTPClient)
|
|
}
|
|
|
|
// Debug is a no-op for the openidConnect package.
|
|
func (p *Provider) Debug(debug bool) {}
|
|
|
|
// BeginAuth asks the OpenID Connect provider for an authentication end-point.
|
|
func (p *Provider) BeginAuth(state string) (goth.Session, error) {
|
|
url := p.config.AuthCodeURL(state)
|
|
session := &Session{
|
|
AuthURL: url,
|
|
}
|
|
return session, nil
|
|
}
|
|
|
|
// FetchUser will use the the id_token and access requested information about the user.
|
|
func (p *Provider) FetchUser(session goth.Session) (goth.User, error) {
|
|
sess := session.(*Session)
|
|
|
|
expiresAt := sess.ExpiresAt
|
|
|
|
if sess.IDToken == "" {
|
|
return goth.User{}, fmt.Errorf("%s cannot get user information without id_token", p.providerName)
|
|
}
|
|
|
|
// decode returned id token to get expiry
|
|
claims, err := decodeJWT(sess.IDToken)
|
|
|
|
if err != nil {
|
|
return goth.User{}, fmt.Errorf("oauth2: error decoding JWT token: %v", err)
|
|
}
|
|
|
|
expiry, err := p.validateClaims(claims)
|
|
if err != nil {
|
|
return goth.User{}, fmt.Errorf("oauth2: error validating JWT token: %v", err)
|
|
}
|
|
|
|
if expiry.Before(expiresAt) {
|
|
expiresAt = expiry
|
|
}
|
|
|
|
if err := p.getUserInfo(sess.AccessToken, claims); err != nil {
|
|
return goth.User{}, err
|
|
}
|
|
|
|
user := goth.User{
|
|
AccessToken: sess.AccessToken,
|
|
Provider: p.Name(),
|
|
RefreshToken: sess.RefreshToken,
|
|
ExpiresAt: expiresAt,
|
|
RawData: claims,
|
|
IDToken: sess.IDToken,
|
|
}
|
|
|
|
p.userFromClaims(claims, &user)
|
|
return user, err
|
|
}
|
|
|
|
//RefreshTokenAvailable refresh token is provided by auth provider or not
|
|
func (p *Provider) RefreshTokenAvailable() bool {
|
|
return true
|
|
}
|
|
|
|
//RefreshToken get new access token based on the refresh token
|
|
func (p *Provider) RefreshToken(refreshToken string) (*oauth2.Token, error) {
|
|
token := &oauth2.Token{RefreshToken: refreshToken}
|
|
ts := p.config.TokenSource(oauth2.NoContext, token)
|
|
newToken, err := ts.Token()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return newToken, err
|
|
}
|
|
|
|
// validate according to standard, returns expiry
|
|
// http://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
|
|
func (p *Provider) validateClaims(claims map[string]interface{}) (time.Time, error) {
|
|
audience := getClaimValue(claims, []string{audienceClaim})
|
|
if audience != p.ClientKey {
|
|
found := false
|
|
audiences := getClaimValues(claims, []string{audienceClaim})
|
|
for _, aud := range audiences {
|
|
if aud == p.ClientKey {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if !found {
|
|
return time.Time{}, errors.New("audience in token does not match client key")
|
|
}
|
|
}
|
|
|
|
issuer := getClaimValue(claims, []string{issuerClaim})
|
|
if issuer != p.openIDConfig.Issuer {
|
|
return time.Time{}, errors.New("issuer in token does not match issuer in OpenIDConfig discovery")
|
|
}
|
|
|
|
// expiry is required for JWT, not for UserInfoResponse
|
|
// is actually a int64, so force it in to that type
|
|
expiryClaim := int64(claims[expiryClaim].(float64))
|
|
expiry := time.Unix(expiryClaim, 0)
|
|
if expiry.Add(clockSkew).Before(time.Now()) {
|
|
return time.Time{}, errors.New("user info JWT token is expired")
|
|
}
|
|
return expiry, nil
|
|
}
|
|
|
|
func (p *Provider) userFromClaims(claims map[string]interface{}, user *goth.User) {
|
|
// required
|
|
user.UserID = getClaimValue(claims, p.UserIdClaims)
|
|
|
|
user.Name = getClaimValue(claims, p.NameClaims)
|
|
user.NickName = getClaimValue(claims, p.NickNameClaims)
|
|
user.Email = getClaimValue(claims, p.EmailClaims)
|
|
user.AvatarURL = getClaimValue(claims, p.AvatarURLClaims)
|
|
user.FirstName = getClaimValue(claims, p.FirstNameClaims)
|
|
user.LastName = getClaimValue(claims, p.LastNameClaims)
|
|
user.Location = getClaimValue(claims, p.LocationClaims)
|
|
}
|
|
|
|
func (p *Provider) getUserInfo(accessToken string, claims map[string]interface{}) error {
|
|
// skip if there is no UserInfoEndpoint or is explicitly disabled
|
|
if p.openIDConfig.UserInfoEndpoint == "" || p.SkipUserInfoRequest {
|
|
return nil
|
|
}
|
|
|
|
userInfoClaims, err := p.fetchUserInfo(p.openIDConfig.UserInfoEndpoint, accessToken)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// The sub (subject) Claim MUST always be returned in the UserInfo Response.
|
|
// http://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse
|
|
userInfoSubject := getClaimValue(userInfoClaims, []string{subjectClaim})
|
|
if userInfoSubject == "" {
|
|
return fmt.Errorf("userinfo response did not contain a 'sub' claim: %#v", userInfoClaims)
|
|
}
|
|
|
|
// The sub Claim in the UserInfo Response MUST be verified to exactly match the sub Claim in the ID Token;
|
|
// if they do not match, the UserInfo Response values MUST NOT be used.
|
|
// http://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse
|
|
subject := getClaimValue(claims, []string{subjectClaim})
|
|
if userInfoSubject != subject {
|
|
return fmt.Errorf("userinfo 'sub' claim (%s) did not match id_token 'sub' claim (%s)", userInfoSubject, subject)
|
|
}
|
|
|
|
// Merge in userinfo claims in case id_token claims contained some that userinfo did not
|
|
for k, v := range userInfoClaims {
|
|
claims[k] = v
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// fetch and decode JSON from the given UserInfo URL
|
|
func (p *Provider) fetchUserInfo(url, accessToken string) (map[string]interface{}, error) {
|
|
req, _ := http.NewRequest("GET", url, nil)
|
|
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", accessToken))
|
|
|
|
resp, err := p.Client().Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
return nil, fmt.Errorf("Non-200 response from UserInfo: %d, WWW-Authenticate=%s", resp.StatusCode, resp.Header.Get("WWW-Authenticate"))
|
|
}
|
|
|
|
// The UserInfo Claims MUST be returned as the members of a JSON object
|
|
// http://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse
|
|
data, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return unMarshal(data)
|
|
}
|
|
|
|
func getOpenIDConfig(p *Provider, openIDAutoDiscoveryURL string) (*OpenIDConfig, error) {
|
|
res, err := p.Client().Get(openIDAutoDiscoveryURL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer res.Body.Close()
|
|
|
|
body, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
openIDConfig := &OpenIDConfig{}
|
|
err = json.Unmarshal(body, openIDConfig)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return openIDConfig, nil
|
|
}
|
|
|
|
func newConfig(provider *Provider, scopes []string, openIDConfig *OpenIDConfig) *oauth2.Config {
|
|
c := &oauth2.Config{
|
|
ClientID: provider.ClientKey,
|
|
ClientSecret: provider.Secret,
|
|
RedirectURL: provider.CallbackURL,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: openIDConfig.AuthEndpoint,
|
|
TokenURL: openIDConfig.TokenEndpoint,
|
|
},
|
|
Scopes: []string{},
|
|
}
|
|
|
|
if len(scopes) > 0 {
|
|
foundOpenIDScope := false
|
|
|
|
for _, scope := range scopes {
|
|
if scope == "openid" {
|
|
foundOpenIDScope = true
|
|
}
|
|
c.Scopes = append(c.Scopes, scope)
|
|
}
|
|
|
|
if !foundOpenIDScope {
|
|
c.Scopes = append(c.Scopes, "openid")
|
|
}
|
|
} else {
|
|
c.Scopes = []string{"openid"}
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
func getClaimValue(data map[string]interface{}, claims []string) string {
|
|
for _, claim := range claims {
|
|
if value, ok := data[claim]; ok {
|
|
if stringValue, ok := value.(string); ok && len(stringValue) > 0 {
|
|
return stringValue
|
|
}
|
|
}
|
|
}
|
|
|
|
return ""
|
|
}
|
|
|
|
func getClaimValues(data map[string]interface{}, claims []string) []string {
|
|
var result []string
|
|
|
|
for _, claim := range claims {
|
|
if value, ok := data[claim]; ok {
|
|
if stringValues, ok := value.([]interface{}); ok {
|
|
for _, stringValue := range stringValues {
|
|
if s, ok := stringValue.(string); ok && len(s) > 0 {
|
|
result = append(result, s)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return result
|
|
}
|
|
|
|
// decodeJWT decodes a JSON Web Token into a simple map
|
|
// http://openid.net/specs/draft-jones-json-web-token-07.html
|
|
func decodeJWT(jwt string) (map[string]interface{}, error) {
|
|
jwtParts := strings.Split(jwt, ".")
|
|
if len(jwtParts) != 3 {
|
|
return nil, errors.New("jws: invalid token received, not all parts available")
|
|
}
|
|
|
|
decodedPayload, err := base64.URLEncoding.WithPadding(base64.NoPadding).DecodeString(jwtParts[1])
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return unMarshal(decodedPayload)
|
|
}
|
|
|
|
func unMarshal(payload []byte) (map[string]interface{}, error) {
|
|
data := make(map[string]interface{})
|
|
|
|
return data, json.NewDecoder(bytes.NewBuffer(payload)).Decode(&data)
|
|
}
|