
* init Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix some other stuff Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing format Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make it work, send verification event Signed-off-by: Jens Langhammer <jens@goauthentik.io> * progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more progress Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * save iss Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add signals for MFA devices Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * refactor more Signed-off-by: Jens Langhammer <jens@goauthentik.io> * re-work auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add API to list ssf streams Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start rbac Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add ssf icon Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix web Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix bugs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * make events expire, rewrite sending logic Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add oidc token test Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add stream list Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add jwks tests and fixes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update web ui Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix configuration endpoint Signed-off-by: Jens Langhammer <jens@goauthentik.io> * replace port number correctly Signed-off-by: Jens Langhammer <jens@goauthentik.io> * better log what went wrong Signed-off-by: Jens Langhammer <jens@goauthentik.io> * linter has opinions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix messages Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix set status Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more debug logging Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix issuer here too Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove port :443...removal apparently apple's HTTP logic is wrong and includes the port in the Host header even if the default port is used (80 or 443), which then fails as the URL doesn't exactly match what the admin configured...so instead of trying to add magic about this we'll add it in the docs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix error when no request in context Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add signal for admin session revoke Signed-off-by: Jens Langhammer <jens@goauthentik.io> * set txn based on request id Signed-off-by: Jens Langhammer <jens@goauthentik.io> * validate method and endpoint url Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix request ID detection Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add timestamp Signed-off-by: Jens Langhammer <jens@goauthentik.io> * temp migration Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix signal Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add signal tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * the final commit Signed-off-by: Jens Langhammer <jens@goauthentik.io> * ok actually the last commit Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
446 lines
20 KiB
TypeScript
446 lines
20 KiB
TypeScript
import "@goauthentik/admin/providers/RelatedApplicationButton";
|
|
import "@goauthentik/admin/providers/oauth2/OAuth2ProviderForm";
|
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
|
import { EVENT_REFRESH } from "@goauthentik/common/constants";
|
|
import renderDescriptionList from "@goauthentik/components/DescriptionList";
|
|
import "@goauthentik/components/events/ObjectChangelog";
|
|
import MDProviderOAuth2 from "@goauthentik/docs/add-secure-apps/providers/oauth2/index.md";
|
|
import { AKElement } from "@goauthentik/elements/Base";
|
|
import "@goauthentik/elements/CodeMirror";
|
|
import "@goauthentik/elements/EmptyState";
|
|
import "@goauthentik/elements/Markdown";
|
|
import "@goauthentik/elements/Tabs";
|
|
import "@goauthentik/elements/buttons/ModalButton";
|
|
import "@goauthentik/elements/buttons/SpinnerButton";
|
|
|
|
import { msg } from "@lit/localize";
|
|
import { CSSResult, TemplateResult, html } from "lit";
|
|
import { customElement, property, state } from "lit/decorators.js";
|
|
|
|
import PFBanner from "@patternfly/patternfly/components/Banner/banner.css";
|
|
import PFButton from "@patternfly/patternfly/components/Button/button.css";
|
|
import PFCard from "@patternfly/patternfly/components/Card/card.css";
|
|
import PFContent from "@patternfly/patternfly/components/Content/content.css";
|
|
import PFDescriptionList from "@patternfly/patternfly/components/DescriptionList/description-list.css";
|
|
import PFDivider from "@patternfly/patternfly/components/Divider/divider.css";
|
|
import PFForm from "@patternfly/patternfly/components/Form/form.css";
|
|
import PFFormControl from "@patternfly/patternfly/components/FormControl/form-control.css";
|
|
import PFPage from "@patternfly/patternfly/components/Page/page.css";
|
|
import PFGrid from "@patternfly/patternfly/layouts/Grid/grid.css";
|
|
import PFBase from "@patternfly/patternfly/patternfly-base.css";
|
|
|
|
import {
|
|
ClientTypeEnum,
|
|
CoreApi,
|
|
CoreUsersListRequest,
|
|
OAuth2Provider,
|
|
OAuth2ProviderSetupURLs,
|
|
PropertyMappingPreview,
|
|
ProvidersApi,
|
|
RbacPermissionsAssignedByUsersListModelEnum,
|
|
User,
|
|
} from "@goauthentik/api";
|
|
|
|
export function TypeToLabel(type?: ClientTypeEnum): string {
|
|
if (!type) return "";
|
|
switch (type) {
|
|
case ClientTypeEnum.Confidential:
|
|
return msg("Confidential");
|
|
case ClientTypeEnum.Public:
|
|
return msg("Public");
|
|
case ClientTypeEnum.UnknownDefaultOpenApi:
|
|
return msg("Unknown type");
|
|
}
|
|
}
|
|
|
|
@customElement("ak-provider-oauth2-view")
|
|
export class OAuth2ProviderViewPage extends AKElement {
|
|
@property({ type: Number })
|
|
set providerID(value: number) {
|
|
new ProvidersApi(DEFAULT_CONFIG)
|
|
.providersOauth2Retrieve({
|
|
id: value,
|
|
})
|
|
.then((prov) => {
|
|
this.provider = prov;
|
|
});
|
|
}
|
|
|
|
@property({ attribute: false })
|
|
provider?: OAuth2Provider;
|
|
|
|
@state()
|
|
providerUrls?: OAuth2ProviderSetupURLs;
|
|
|
|
@state()
|
|
preview?: PropertyMappingPreview;
|
|
|
|
@state()
|
|
previewUser?: User;
|
|
|
|
static get styles(): CSSResult[] {
|
|
return [
|
|
PFBase,
|
|
PFButton,
|
|
PFPage,
|
|
PFGrid,
|
|
PFContent,
|
|
PFCard,
|
|
PFDescriptionList,
|
|
PFForm,
|
|
PFFormControl,
|
|
PFBanner,
|
|
PFDivider,
|
|
];
|
|
}
|
|
|
|
constructor() {
|
|
super();
|
|
this.addEventListener(EVENT_REFRESH, () => {
|
|
if (!this.provider?.pk) return;
|
|
this.providerID = this.provider?.pk;
|
|
});
|
|
}
|
|
|
|
fetchPreview(): void {
|
|
new ProvidersApi(DEFAULT_CONFIG)
|
|
.providersOauth2PreviewUserRetrieve({
|
|
id: this.provider?.pk || 0,
|
|
forUser: this.previewUser?.pk,
|
|
})
|
|
.then((preview) => (this.preview = preview));
|
|
}
|
|
|
|
render(): TemplateResult {
|
|
if (!this.provider) {
|
|
return html``;
|
|
}
|
|
return html` <ak-tabs>
|
|
<section
|
|
slot="page-overview"
|
|
data-tab-title="${msg("Overview")}"
|
|
@activate=${() => {
|
|
new ProvidersApi(DEFAULT_CONFIG)
|
|
.providersOauth2SetupUrlsRetrieve({
|
|
id: this.provider?.pk || 0,
|
|
})
|
|
.then((prov) => {
|
|
this.providerUrls = prov;
|
|
});
|
|
}}
|
|
>
|
|
${this.renderTabOverview()}
|
|
</section>
|
|
<section
|
|
slot="page-preview"
|
|
data-tab-title="${msg("Preview")}"
|
|
@activate=${() => {
|
|
this.fetchPreview();
|
|
}}
|
|
>
|
|
${this.renderTabPreview()}
|
|
</section>
|
|
<section
|
|
slot="page-changelog"
|
|
data-tab-title="${msg("Changelog")}"
|
|
class="pf-c-page__main-section pf-m-no-padding-mobile"
|
|
>
|
|
<div class="pf-c-card">
|
|
<div class="pf-c-card__body">
|
|
<ak-object-changelog
|
|
targetModelPk=${this.provider?.pk || ""}
|
|
targetModelName=${this.provider?.metaModelName || ""}
|
|
>
|
|
</ak-object-changelog>
|
|
</div>
|
|
</div>
|
|
</section>
|
|
<ak-rbac-object-permission-page
|
|
slot="page-permissions"
|
|
data-tab-title="${msg("Permissions")}"
|
|
model=${RbacPermissionsAssignedByUsersListModelEnum.AuthentikProvidersOauth2Oauth2provider}
|
|
objectPk=${this.provider.pk}
|
|
></ak-rbac-object-permission-page>
|
|
</ak-tabs>`;
|
|
}
|
|
|
|
renderTabOverview(): TemplateResult {
|
|
if (!this.provider) {
|
|
return html``;
|
|
}
|
|
return html` ${this.provider?.assignedApplicationName
|
|
? html``
|
|
: html`<div slot="header" class="pf-c-banner pf-m-warning">
|
|
${msg("Warning: Provider is not used by an Application.")}
|
|
</div>`}
|
|
<div class="pf-c-page__main-section pf-m-no-padding-mobile pf-l-grid pf-m-gutter">
|
|
<div
|
|
class="pf-c-card pf-l-grid__item pf-m-12-col pf-m-4-col-on-xl pf-m-4-col-on-2xl"
|
|
>
|
|
<div class="pf-c-card__body">
|
|
<dl class="pf-c-description-list">
|
|
<div class="pf-c-description-list__group">
|
|
<dt class="pf-c-description-list__term">
|
|
<span class="pf-c-description-list__text">${msg("Name")}</span>
|
|
</dt>
|
|
<dd class="pf-c-description-list__description">
|
|
<div class="pf-c-description-list__text">
|
|
${this.provider.name}
|
|
</div>
|
|
</dd>
|
|
</div>
|
|
<div class="pf-c-description-list__group">
|
|
<dt class="pf-c-description-list__term">
|
|
<span class="pf-c-description-list__text"
|
|
>${msg("Assigned to application")}</span
|
|
>
|
|
</dt>
|
|
<dd class="pf-c-description-list__description">
|
|
<div class="pf-c-description-list__text">
|
|
<ak-provider-related-application .provider=${this.provider}>
|
|
</ak-provider-related-application>
|
|
</div>
|
|
</dd>
|
|
</div>
|
|
<div class="pf-c-description-list__group">
|
|
<dt class="pf-c-description-list__term">
|
|
<span class="pf-c-description-list__text"
|
|
>${msg("Client type")}</span
|
|
>
|
|
</dt>
|
|
<dd class="pf-c-description-list__description">
|
|
<div class="pf-c-description-list__text">
|
|
${TypeToLabel(this.provider.clientType)}
|
|
</div>
|
|
</dd>
|
|
</div>
|
|
<div class="pf-c-description-list__group">
|
|
<dt class="pf-c-description-list__term">
|
|
<span class="pf-c-description-list__text"
|
|
>${msg("Client ID")}</span
|
|
>
|
|
</dt>
|
|
<dd class="pf-c-description-list__description">
|
|
<div class="pf-c-description-list__text">
|
|
${this.provider.clientId}
|
|
</div>
|
|
</dd>
|
|
</div>
|
|
<div class="pf-c-description-list__group">
|
|
<dt class="pf-c-description-list__term">
|
|
<span class="pf-c-description-list__text"
|
|
>${msg("Redirect URIs")}</span
|
|
>
|
|
</dt>
|
|
<dd class="pf-c-description-list__description">
|
|
<div class="pf-c-description-list__text">
|
|
<ul>
|
|
${this.provider.redirectUris.map((ru) => {
|
|
return html`<li>${ru.matchingMode}: ${ru.url}</li>`;
|
|
})}
|
|
</ul>
|
|
</div>
|
|
</dd>
|
|
</div>
|
|
</dl>
|
|
</div>
|
|
<div class="pf-c-card__footer">
|
|
<ak-forms-modal>
|
|
<span slot="submit"> ${msg("Update")} </span>
|
|
<span slot="header"> ${msg("Update OAuth2 Provider")} </span>
|
|
<ak-provider-oauth2-form
|
|
slot="form"
|
|
.instancePk=${this.provider.pk || 0}
|
|
>
|
|
</ak-provider-oauth2-form>
|
|
<button slot="trigger" class="pf-c-button pf-m-primary">
|
|
${msg("Edit")}
|
|
</button>
|
|
</ak-forms-modal>
|
|
</div>
|
|
</div>
|
|
<div class="pf-c-card pf-l-grid__item pf-m-8-col">
|
|
<div class="pf-c-card__body">
|
|
<form class="pf-c-form">
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text"
|
|
>${msg("OpenID Configuration URL")}</span
|
|
>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.providerInfo || msg("-")}"
|
|
/>
|
|
</div>
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text"
|
|
>${msg("OpenID Configuration Issuer")}</span
|
|
>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.issuer || msg("-")}"
|
|
/>
|
|
</div>
|
|
<hr class="pf-c-divider" />
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text"
|
|
>${msg("Authorize URL")}</span
|
|
>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.authorize || msg("-")}"
|
|
/>
|
|
</div>
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text">${msg("Token URL")}</span>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.token || msg("-")}"
|
|
/>
|
|
</div>
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text"
|
|
>${msg("Userinfo URL")}</span
|
|
>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.userInfo || msg("-")}"
|
|
/>
|
|
</div>
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text">${msg("Logout URL")}</span>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.logout || msg("-")}"
|
|
/>
|
|
</div>
|
|
<div class="pf-c-form__group">
|
|
<label class="pf-c-form__label">
|
|
<span class="pf-c-form__label-text">${msg("JWKS URL")}</span>
|
|
</label>
|
|
<input
|
|
class="pf-c-form-control"
|
|
readonly
|
|
type="text"
|
|
value="${this.providerUrls?.jwks || msg("-")}"
|
|
/>
|
|
</div>
|
|
</form>
|
|
</div>
|
|
</div>
|
|
<div
|
|
class="pf-c-card pf-l-grid__item pf-m-12-col pf-m-12-col-on-xl pf-m-12-col-on-2xl"
|
|
>
|
|
<div class="pf-c-card__body">
|
|
<ak-markdown
|
|
.replacers=${[
|
|
(input: string) => {
|
|
if (!this.provider) {
|
|
return input;
|
|
}
|
|
return input.replaceAll(
|
|
"<application slug>",
|
|
this.provider.assignedApplicationSlug,
|
|
);
|
|
},
|
|
]}
|
|
.md=${MDProviderOAuth2}
|
|
meta="providers/oauth2/index.md"
|
|
></ak-markdown>
|
|
</div>
|
|
</div>
|
|
</div>`;
|
|
}
|
|
|
|
renderTabPreview(): TemplateResult {
|
|
if (!this.provider) {
|
|
return html``;
|
|
}
|
|
return html` <div
|
|
class="pf-c-page__main-section pf-m-no-padding-mobile pf-l-grid pf-m-gutter"
|
|
>
|
|
<div class="pf-c-card">
|
|
<div class="pf-c-card__title">${msg("JWT payload")}</div>
|
|
<div class="pf-c-card__body">
|
|
${renderDescriptionList(
|
|
[
|
|
[
|
|
msg("Preview for user"),
|
|
html`
|
|
<ak-search-select
|
|
.fetchObjects=${async (query?: string): Promise<User[]> => {
|
|
const args: CoreUsersListRequest = {
|
|
ordering: "username",
|
|
};
|
|
if (query !== undefined) {
|
|
args.search = query;
|
|
}
|
|
const users = await new CoreApi(
|
|
DEFAULT_CONFIG,
|
|
).coreUsersList(args);
|
|
return users.results;
|
|
}}
|
|
.renderElement=${(user: User): string => {
|
|
return user.username;
|
|
}}
|
|
.renderDescription=${(user: User): TemplateResult => {
|
|
return html`${user.name}`;
|
|
}}
|
|
.value=${(user: User | undefined): number | undefined => {
|
|
return user?.pk;
|
|
}}
|
|
.selected=${(user: User): boolean => {
|
|
return user.pk === this.previewUser?.pk;
|
|
}}
|
|
?blankable=${true}
|
|
@ak-change=${(ev: CustomEvent) => {
|
|
this.previewUser = ev.detail.value;
|
|
this.fetchPreview();
|
|
}}
|
|
>
|
|
</ak-search-select>
|
|
`,
|
|
],
|
|
],
|
|
{ horizontal: true },
|
|
)}
|
|
</div>
|
|
<div class="pf-c-card__body">
|
|
${this.preview
|
|
? html`<pre>${JSON.stringify(this.preview?.preview, null, 4)}</pre>`
|
|
: html` <ak-empty-state ?loading=${true}></ak-empty-state> `}
|
|
</div>
|
|
</div>
|
|
</div>`;
|
|
}
|
|
}
|
|
|
|
declare global {
|
|
interface HTMLElementTagNameMap {
|
|
"ak-provider-oauth2-view": OAuth2ProviderViewPage;
|
|
}
|
|
}
|