All checks were successful
continuous-integration/drone/push Build is passing
This change adds the ability to sync teams via a custom openid claim. Vikunja will automatically create and delete teams as necessary, it will also add and remove users when they log in. These teams are fully managed by Vikunja and cannot be updated by a user. Co-authored-by: kolaente <k@knt.li> Reviewed-on: #1393 Resolves #1279 Resolves https://github.com/go-vikunja/vikunja/issues/42 Resolves https://kolaente.dev/vikunja/vikunja/issues/950 Co-authored-by: viehlieb <pf@pragma-shift.net> Co-committed-by: viehlieb <pf@pragma-shift.net>
172 lines
4.3 KiB
Go
172 lines
4.3 KiB
Go
// Vikunja is a to-do list application to facilitate your life.
|
|
// Copyright 2018-present Vikunja and contributors. All rights reserved.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public Licensee as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public Licensee for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public Licensee
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package openid
|
|
|
|
import (
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"code.vikunja.io/api/pkg/log"
|
|
|
|
"code.vikunja.io/api/pkg/config"
|
|
"code.vikunja.io/api/pkg/modules/keyvalue"
|
|
"github.com/coreos/go-oidc/v3/oidc"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
// GetAllProviders returns all configured providers
|
|
func GetAllProviders() (providers []*Provider, err error) {
|
|
if !config.AuthOpenIDEnabled.GetBool() {
|
|
return nil, nil
|
|
}
|
|
|
|
providers = []*Provider{}
|
|
exists, err := keyvalue.GetWithValue("openid_providers", &providers)
|
|
if !exists {
|
|
rawProviders := config.AuthOpenIDProviders.Get()
|
|
if rawProviders == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
rawProvider := rawProviders.([]interface{})
|
|
|
|
for _, p := range rawProvider {
|
|
var pi map[string]interface{}
|
|
var is bool
|
|
pi, is = p.(map[string]interface{})
|
|
// JSON config is a map[string]interface{}, other providers are not. Under the hood they are all strings so
|
|
// it is save to cast.
|
|
if !is {
|
|
pis := p.(map[interface{}]interface{})
|
|
pi = make(map[string]interface{}, len(pis))
|
|
for i, s := range pis {
|
|
pi[i.(string)] = s
|
|
}
|
|
}
|
|
|
|
provider, err := getProviderFromMap(pi)
|
|
|
|
if err != nil {
|
|
if provider != nil {
|
|
log.Errorf("Error while getting openid provider %s: %s", provider.Name, err)
|
|
continue
|
|
}
|
|
log.Errorf("Error while getting openid provider: %s", err)
|
|
continue
|
|
}
|
|
|
|
providers = append(providers, provider)
|
|
|
|
k := getKeyFromName(pi["name"].(string))
|
|
err = keyvalue.Put("openid_provider_"+k, provider)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
err = keyvalue.Put("openid_providers", providers)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// GetProvider retrieves a provider from keyvalue
|
|
func GetProvider(key string) (provider *Provider, err error) {
|
|
provider = &Provider{}
|
|
exists, err := keyvalue.GetWithValue("openid_provider_"+key, provider)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !exists {
|
|
_, err = GetAllProviders() // This will put all providers in cache
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
_, err = keyvalue.GetWithValue("openid_provider_"+key, provider)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
err = provider.setOicdProvider()
|
|
return
|
|
}
|
|
|
|
func getKeyFromName(name string) string {
|
|
reg := regexp.MustCompile("[^a-z0-9]+")
|
|
return reg.ReplaceAllString(strings.ToLower(name), "")
|
|
}
|
|
|
|
func getProviderFromMap(pi map[string]interface{}) (provider *Provider, err error) {
|
|
name, is := pi["name"].(string)
|
|
if !is {
|
|
return nil, nil
|
|
}
|
|
|
|
k := getKeyFromName(name)
|
|
|
|
logoutURL, ok := pi["logouturl"].(string)
|
|
if !ok {
|
|
logoutURL = ""
|
|
}
|
|
|
|
scope, _ := pi["scope"].(string)
|
|
if scope == "" {
|
|
scope = "openid profile email"
|
|
}
|
|
provider = &Provider{
|
|
Name: pi["name"].(string),
|
|
Key: k,
|
|
AuthURL: pi["authurl"].(string),
|
|
OriginalAuthURL: pi["authurl"].(string),
|
|
ClientSecret: pi["clientsecret"].(string),
|
|
LogoutURL: logoutURL,
|
|
Scope: scope,
|
|
}
|
|
|
|
cl, is := pi["clientid"].(int)
|
|
if is {
|
|
provider.ClientID = strconv.Itoa(cl)
|
|
} else {
|
|
provider.ClientID = pi["clientid"].(string)
|
|
}
|
|
|
|
err = provider.setOicdProvider()
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
provider.Oauth2Config = &oauth2.Config{
|
|
ClientID: provider.ClientID,
|
|
ClientSecret: provider.ClientSecret,
|
|
// Discovery returns the OAuth2 endpoints.
|
|
Endpoint: provider.openIDProvider.Endpoint(),
|
|
|
|
// "openid" is a required scope for OpenID Connect flows.
|
|
Scopes: []string{oidc.ScopeOpenID, "profile", "email"},
|
|
}
|
|
|
|
provider.AuthURL = provider.Oauth2Config.Endpoint.AuthURL
|
|
|
|
return
|
|
}
|
|
|
|
func CleanupSavedOpenIDProviders() {
|
|
_ = keyvalue.Del("openid_providers")
|
|
}
|