 cd12e177ea
			
		
	
	cd12e177ea
	
	
	
		
			
			* initial implementation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * check for openid/profile claims Signed-off-by: Jens Langhammer <jens@goauthentik.io> * include jwks sources in proxy provider Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add web ui for jwks Signed-off-by: Jens Langhammer <jens@goauthentik.io> * only show sources with JWKS data configured Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix introspection tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start basic Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add basic auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add docs, update admonitions Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add client_id to api, add tab for auth Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update locale Signed-off-by: Jens Langhammer <jens@goauthentik.io> Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			59 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			59 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package application
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"net/url"
 | |
| 
 | |
| 	log "github.com/sirupsen/logrus"
 | |
| 	"golang.org/x/oauth2"
 | |
| )
 | |
| 
 | |
| func (a *Application) redeemCallback(savedState string, u *url.URL, c context.Context) (*Claims, error) {
 | |
| 	state := u.Query().Get("state")
 | |
| 	a.log.WithFields(log.Fields{
 | |
| 		"states":   savedState,
 | |
| 		"expected": state,
 | |
| 	}).Trace("tracing states")
 | |
| 	if savedState != state {
 | |
| 		return nil, fmt.Errorf("invalid state")
 | |
| 	}
 | |
| 
 | |
| 	code := u.Query().Get("code")
 | |
| 	if code == "" {
 | |
| 		return nil, fmt.Errorf("blank code")
 | |
| 	}
 | |
| 
 | |
| 	ctx := context.WithValue(c, oauth2.HTTPClient, a.httpClient)
 | |
| 	// Verify state and errors.
 | |
| 	oauth2Token, err := a.oauthConfig.Exchange(ctx, code)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Extract the ID Token from OAuth2 token.
 | |
| 	rawIDToken, ok := oauth2Token.Extra("id_token").(string)
 | |
| 	if !ok {
 | |
| 		return nil, fmt.Errorf("missing id_token")
 | |
| 	}
 | |
| 
 | |
| 	a.log.WithField("id_token", rawIDToken).Trace("id_token")
 | |
| 
 | |
| 	// Parse and verify ID Token payload.
 | |
| 	idToken, err := a.tokenVerifier.Verify(ctx, rawIDToken)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Extract custom claims
 | |
| 	var claims *Claims
 | |
| 	if err := idToken.Claims(&claims); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if claims.Proxy == nil {
 | |
| 		claims.Proxy = &ProxyClaims{}
 | |
| 	}
 | |
| 	claims.RawToken = rawIDToken
 | |
| 	return claims, nil
 | |
| }
 |