2020-11-21 17:38:58 +01:00
|
|
|
// Vikunja is a to-do list application to facilitate your life.
|
2021-02-02 20:19:13 +01:00
|
|
|
// Copyright 2018-2021 Vikunja and contributors. All rights reserved.
|
2020-11-21 17:38:58 +01:00
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
2020-12-23 16:41:52 +01:00
|
|
|
// it under the terms of the GNU Affero General Public Licensee as published by
|
2020-11-21 17:38:58 +01:00
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2020-12-23 16:41:52 +01:00
|
|
|
// GNU Affero General Public Licensee for more details.
|
2020-11-21 17:38:58 +01:00
|
|
|
//
|
2020-12-23 16:41:52 +01:00
|
|
|
// You should have received a copy of the GNU Affero General Public Licensee
|
2020-11-21 17:38:58 +01:00
|
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package openid
|
|
|
|
|
|
|
|
import (
|
|
|
|
"regexp"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
|
2021-05-17 12:15:15 +02:00
|
|
|
"code.vikunja.io/api/pkg/log"
|
|
|
|
|
2020-11-21 17:38:58 +01:00
|
|
|
"code.vikunja.io/api/pkg/config"
|
|
|
|
"code.vikunja.io/api/pkg/modules/keyvalue"
|
2021-06-14 22:56:29 +02:00
|
|
|
"github.com/coreos/go-oidc/v3/oidc"
|
2020-11-21 17:38:58 +01:00
|
|
|
"golang.org/x/oauth2"
|
|
|
|
)
|
|
|
|
|
|
|
|
// GetAllProviders returns all configured providers
|
|
|
|
func GetAllProviders() (providers []*Provider, err error) {
|
2021-01-15 20:40:07 +01:00
|
|
|
if !config.AuthOpenIDEnabled.GetBool() {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
providers = []*Provider{}
|
|
|
|
exists, err := keyvalue.GetWithValue("openid_providers", &providers)
|
2021-01-31 12:32:46 +01:00
|
|
|
if !exists {
|
2020-11-26 21:26:31 +01:00
|
|
|
rawProviders := config.AuthOpenIDProviders.Get()
|
|
|
|
if rawProviders == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
rawProvider := rawProviders.([]interface{})
|
2020-11-21 17:38:58 +01:00
|
|
|
|
|
|
|
for _, p := range rawProvider {
|
2021-06-09 21:56:17 +02:00
|
|
|
var pi map[string]interface{}
|
|
|
|
var is bool
|
|
|
|
pi, is = p.(map[string]interface{})
|
|
|
|
// JSON config is a map[string]interface{}, other providers are not. Under the hood they are all strings so
|
|
|
|
// it is save to cast.
|
|
|
|
if !is {
|
|
|
|
pis := p.(map[interface{}]interface{})
|
|
|
|
pi = make(map[string]interface{}, len(pis))
|
|
|
|
for i, s := range pis {
|
|
|
|
pi[i.(string)] = s
|
|
|
|
}
|
|
|
|
}
|
2020-11-21 17:38:58 +01:00
|
|
|
|
|
|
|
provider, err := getProviderFromMap(pi)
|
|
|
|
if err != nil {
|
2021-05-16 13:28:15 +02:00
|
|
|
if provider != nil {
|
|
|
|
log.Errorf("Error while getting openid provider %s: %s", provider.Name, err)
|
|
|
|
}
|
|
|
|
log.Errorf("Error while getting openid provider: %s", err)
|
|
|
|
continue
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
providers = append(providers, provider)
|
|
|
|
|
|
|
|
k := getKeyFromName(pi["name"].(string))
|
|
|
|
err = keyvalue.Put("openid_provider_"+k, provider)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
err = keyvalue.Put("openid_providers", providers)
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetProvider retrieves a provider from keyvalue
|
|
|
|
func GetProvider(key string) (provider *Provider, err error) {
|
2021-05-28 10:52:32 +02:00
|
|
|
provider = &Provider{}
|
|
|
|
exists, err := keyvalue.GetWithValue("openid_provider_"+key, provider)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-05-19 14:45:24 +02:00
|
|
|
if !exists {
|
2020-11-21 17:38:58 +01:00
|
|
|
_, err = GetAllProviders() // This will put all providers in cache
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
_, err = keyvalue.GetWithValue("openid_provider_"+key, provider)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
err = provider.setOicdProvider()
|
|
|
|
return
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func getKeyFromName(name string) string {
|
|
|
|
reg := regexp.MustCompile("[^a-z0-9]+")
|
|
|
|
return reg.ReplaceAllString(strings.ToLower(name), "")
|
|
|
|
}
|
|
|
|
|
2021-06-09 21:56:17 +02:00
|
|
|
func getProviderFromMap(pi map[string]interface{}) (provider *Provider, err error) {
|
2021-01-15 20:40:07 +01:00
|
|
|
name, is := pi["name"].(string)
|
|
|
|
if !is {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
k := getKeyFromName(name)
|
2020-11-21 17:38:58 +01:00
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
provider = &Provider{
|
2021-06-09 23:00:42 +02:00
|
|
|
Name: pi["name"].(string),
|
|
|
|
Key: k,
|
|
|
|
AuthURL: pi["authurl"].(string),
|
|
|
|
OriginalAuthURL: pi["authurl"].(string),
|
|
|
|
ClientSecret: pi["clientsecret"].(string),
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
cl, is := pi["clientid"].(int)
|
|
|
|
if is {
|
|
|
|
provider.ClientID = strconv.Itoa(cl)
|
|
|
|
} else {
|
|
|
|
provider.ClientID = pi["clientid"].(string)
|
|
|
|
}
|
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
err = provider.setOicdProvider()
|
2020-11-21 17:38:58 +01:00
|
|
|
if err != nil {
|
2021-05-28 10:52:32 +02:00
|
|
|
return
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
provider.Oauth2Config = &oauth2.Config{
|
|
|
|
ClientID: provider.ClientID,
|
|
|
|
ClientSecret: provider.ClientSecret,
|
|
|
|
RedirectURL: config.AuthOpenIDRedirectURL.GetString() + k,
|
|
|
|
|
|
|
|
// Discovery returns the OAuth2 endpoints.
|
2021-05-28 10:52:32 +02:00
|
|
|
Endpoint: provider.openIDProvider.Endpoint(),
|
2020-11-21 17:38:58 +01:00
|
|
|
|
|
|
|
// "openid" is a required scope for OpenID Connect flows.
|
|
|
|
Scopes: []string{oidc.ScopeOpenID, "profile", "email"},
|
|
|
|
}
|
|
|
|
|
|
|
|
provider.AuthURL = provider.Oauth2Config.Endpoint.AuthURL
|
|
|
|
|
2021-05-28 10:52:32 +02:00
|
|
|
return
|
2020-11-21 17:38:58 +01:00
|
|
|
}
|