73 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"net/url"
 | |
| 	"strings"
 | |
| )
 | |
| 
 | |
| type TokenResponse struct {
 | |
| 	AccessToken string `json:"access_token"`
 | |
| 	IDToken     string `json:"id_token"`
 | |
| }
 | |
| 
 | |
| const JWTUsername = "goauthentik.io/token"
 | |
| 
 | |
| func (a *Application) attemptBasicAuth(username, password string) *Claims {
 | |
| 	if username == JWTUsername {
 | |
| 		res := a.attemptBearerAuth(password)
 | |
| 		if res != nil {
 | |
| 			return &res.Claims
 | |
| 		}
 | |
| 	}
 | |
| 	values := url.Values{
 | |
| 		"grant_type": []string{"client_credentials"},
 | |
| 		"client_id":  []string{a.oauthConfig.ClientID},
 | |
| 		"username":   []string{username},
 | |
| 		"password":   []string{password},
 | |
| 		"scope":      []string{strings.Join(a.oauthConfig.Scopes, " ")},
 | |
| 	}
 | |
| 	req, err := http.NewRequest("POST", a.endpoint.TokenURL, strings.NewReader(values.Encode()))
 | |
| 	if err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to create token request")
 | |
| 		return nil
 | |
| 	}
 | |
| 	req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
 | |
| 	res, err := a.publicHostHTTPClient.Do(req)
 | |
| 	if err != nil || res.StatusCode > 200 {
 | |
| 		b, err := io.ReadAll(res.Body)
 | |
| 		if err != nil {
 | |
| 			b = []byte(err.Error())
 | |
| 		}
 | |
| 		a.log.WithError(err).WithField("body", string(b)).Warning("failed to send token request")
 | |
| 		return nil
 | |
| 	}
 | |
| 	var token TokenResponse
 | |
| 	err = json.NewDecoder(res.Body).Decode(&token)
 | |
| 	if err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to parse token response")
 | |
| 		return nil
 | |
| 	}
 | |
| 	// Parse and verify ID Token payload.
 | |
| 	idToken, err := a.tokenVerifier.Verify(context.Background(), token.IDToken)
 | |
| 	if err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to verify token")
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Extract custom claims
 | |
| 	var claims *Claims
 | |
| 	if err := idToken.Claims(&claims); err != nil {
 | |
| 		a.log.WithError(err).Warning("failed to convert token to claims")
 | |
| 		return nil
 | |
| 	}
 | |
| 	if claims.Proxy == nil {
 | |
| 		claims.Proxy = &ProxyClaims{}
 | |
| 	}
 | |
| 	claims.RawToken = token.IDToken
 | |
| 	return claims
 | |
| }
 | 
