2021-05-04 22:06:05 +00:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
2022-01-18 09:32:06 +00:00
|
|
|
"github.com/ory/fosite"
|
2021-05-04 22:06:05 +00:00
|
|
|
|
2022-04-01 11:18:58 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/model"
|
2021-08-11 01:04:35 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/oidc"
|
|
|
|
"github.com/authelia/authelia/v4/internal/session"
|
|
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
2021-05-04 22:06:05 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// isConsentMissing compares the requestedScopes and requestedAudience to the workflows
|
|
|
|
// GrantedScopes and GrantedAudience and returns true if they do not match or the workflow is nil.
|
2022-04-01 11:18:58 +00:00
|
|
|
func isConsentMissing(workflow *model.OIDCWorkflowSession, requestedScopes, requestedAudience []string) (isMissing bool) {
|
2021-05-04 22:06:05 +00:00
|
|
|
if workflow == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return len(requestedScopes) > 0 && utils.IsStringSlicesDifferent(requestedScopes, workflow.GrantedScopes) ||
|
|
|
|
len(requestedAudience) > 0 && utils.IsStringSlicesDifferentFold(requestedAudience, workflow.GrantedAudience)
|
|
|
|
}
|
|
|
|
|
2022-01-18 09:32:06 +00:00
|
|
|
func oidcGrantRequests(ar fosite.AuthorizeRequester, scopes, audiences []string, userSession *session.UserSession) (extraClaims map[string]interface{}) {
|
2022-03-01 03:07:39 +00:00
|
|
|
extraClaims = map[string]interface{}{}
|
2022-01-18 09:32:06 +00:00
|
|
|
|
|
|
|
for _, scope := range scopes {
|
|
|
|
if ar != nil {
|
|
|
|
ar.GrantScope(scope)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch scope {
|
|
|
|
case oidc.ScopeGroups:
|
|
|
|
extraClaims[oidc.ClaimGroups] = userSession.Groups
|
|
|
|
case oidc.ScopeProfile:
|
2022-03-01 03:07:39 +00:00
|
|
|
extraClaims[oidc.ClaimPreferredUsername] = userSession.Username
|
2022-01-18 09:32:06 +00:00
|
|
|
extraClaims[oidc.ClaimDisplayName] = userSession.DisplayName
|
|
|
|
case oidc.ScopeEmail:
|
|
|
|
if len(userSession.Emails) != 0 {
|
|
|
|
extraClaims[oidc.ClaimEmail] = userSession.Emails[0]
|
|
|
|
if len(userSession.Emails) > 1 {
|
2022-02-09 22:55:28 +00:00
|
|
|
extraClaims[oidc.ClaimEmailAlts] = userSession.Emails[1:]
|
2022-01-18 09:32:06 +00:00
|
|
|
}
|
|
|
|
// TODO (james-d-elliott): actually verify emails and record that information.
|
|
|
|
extraClaims[oidc.ClaimEmailVerified] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ar != nil {
|
|
|
|
for _, audience := range audiences {
|
|
|
|
ar.GrantAudience(audience)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !utils.IsStringInSlice(ar.GetClient().GetID(), ar.GetGrantedAudience()) {
|
|
|
|
ar.GrantAudience(ar.GetClient().GetID())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return extraClaims
|
|
|
|
}
|