* initial implementation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * check for openid/profile claims Signed-off-by: Jens Langhammer <jens@goauthentik.io> * include jwks sources in proxy provider Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add web ui for jwks Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only show sources with JWKS data configured Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix introspection tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start basic Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add basic auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add docs, update admonitions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add client_id to api, add tab for auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update locale Signed-off-by: Jens Langhammer <jens@goauthentik.io> Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			59 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			59 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package application
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"net/url"
 | 
						|
 | 
						|
	log "github.com/sirupsen/logrus"
 | 
						|
	"golang.org/x/oauth2"
 | 
						|
)
 | 
						|
 | 
						|
func (a *Application) redeemCallback(savedState string, u *url.URL, c context.Context) (*Claims, error) {
 | 
						|
	state := u.Query().Get("state")
 | 
						|
	a.log.WithFields(log.Fields{
 | 
						|
		"states":   savedState,
 | 
						|
		"expected": state,
 | 
						|
	}).Trace("tracing states")
 | 
						|
	if savedState != state {
 | 
						|
		return nil, fmt.Errorf("invalid state")
 | 
						|
	}
 | 
						|
 | 
						|
	code := u.Query().Get("code")
 | 
						|
	if code == "" {
 | 
						|
		return nil, fmt.Errorf("blank code")
 | 
						|
	}
 | 
						|
 | 
						|
	ctx := context.WithValue(c, oauth2.HTTPClient, a.httpClient)
 | 
						|
	// Verify state and errors.
 | 
						|
	oauth2Token, err := a.oauthConfig.Exchange(ctx, code)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Extract the ID Token from OAuth2 token.
 | 
						|
	rawIDToken, ok := oauth2Token.Extra("id_token").(string)
 | 
						|
	if !ok {
 | 
						|
		return nil, fmt.Errorf("missing id_token")
 | 
						|
	}
 | 
						|
 | 
						|
	a.log.WithField("id_token", rawIDToken).Trace("id_token")
 | 
						|
 | 
						|
	// Parse and verify ID Token payload.
 | 
						|
	idToken, err := a.tokenVerifier.Verify(ctx, rawIDToken)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Extract custom claims
 | 
						|
	var claims *Claims
 | 
						|
	if err := idToken.Claims(&claims); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if claims.Proxy == nil {
 | 
						|
		claims.Proxy = &ProxyClaims{}
 | 
						|
	}
 | 
						|
	claims.RawToken = rawIDToken
 | 
						|
	return claims, nil
 | 
						|
}
 |