fix: restrict additional scopes
This commit is contained in:
parent
6ba72be7ea
commit
f48d6f8361
4 changed files with 24 additions and 1 deletions
|
@ -284,6 +284,14 @@ func (c *ConfClient) AllowedScopes() []string {
|
|||
return nil
|
||||
}
|
||||
|
||||
//
|
||||
//func (c *ConfClient) AssertAdditionalIdTokenScopes() bool {
|
||||
// return false
|
||||
//}
|
||||
//func (c *ConfClient) AssertAdditionalAccessTokenScopes() bool {
|
||||
// return false
|
||||
//}
|
||||
|
||||
func (c *ConfClient) RestrictAdditionalIdTokenScopes() func(scopes []string) []string {
|
||||
return func(scopes []string) []string {
|
||||
return scopes
|
||||
|
|
|
@ -34,6 +34,8 @@ type Client interface {
|
|||
AccessTokenType() AccessTokenType
|
||||
IDTokenLifetime() time.Duration
|
||||
DevMode() bool
|
||||
//AssertAdditionalIdTokenScopes() bool
|
||||
//AssertAdditionalAccessTokenScopes() bool
|
||||
RestrictAdditionalIdTokenScopes() func(scopes []string) []string
|
||||
RestrictAdditionalAccessTokenScopes() func(scopes []string) []string
|
||||
IsScopeAllowed(scope string) bool
|
||||
|
|
|
@ -171,6 +171,13 @@ func (c *ConfClient) DevMode() bool {
|
|||
func (c *ConfClient) AllowedScopes() []string {
|
||||
return nil
|
||||
}
|
||||
|
||||
//func (c *ConfClient) AssertAdditionalIdTokenScopes() bool {
|
||||
// return false
|
||||
//}
|
||||
//func (c *ConfClient) AssertAdditionalAccessTokenScopes() bool {
|
||||
// return false
|
||||
//}
|
||||
func (c *ConfClient) RestrictAdditionalIdTokenScopes() func(scopes []string) []string {
|
||||
return func(scopes []string) []string {
|
||||
return scopes
|
||||
|
|
|
@ -31,6 +31,7 @@ func CreateTokenResponse(ctx context.Context, authReq AuthRequest, client Client
|
|||
return nil, err
|
||||
}
|
||||
}
|
||||
//idToken, err := CreateIDToken(ctx, creator.Issuer(), authReq, client.IDTokenLifetime(), accessToken, code, creator.Storage(), creator.Signer(), client.AssertAdditionalIdTokenScopes())
|
||||
idToken, err := CreateIDToken(ctx, creator.Issuer(), authReq, client.IDTokenLifetime(), accessToken, code, creator.Storage(), creator.Signer(), client.RestrictAdditionalIdTokenScopes())
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
@ -87,6 +88,8 @@ func CreateJWT(ctx context.Context, issuer string, tokenRequest TokenRequest, ex
|
|||
if client != nil {
|
||||
restrictedScopes := client.RestrictAdditionalAccessTokenScopes()(tokenRequest.GetScopes())
|
||||
privateClaims, err := storage.GetPrivateClaimsFromScopes(ctx, tokenRequest.GetSubject(), client.GetID(), removeUserinfoScopes(restrictedScopes))
|
||||
//if client != nil && client.AssertAdditionalAccessTokenScopes() {
|
||||
// privateClaims, err := storage.GetPrivateClaimsFromScopes(ctx, tokenRequest.GetSubject(), client.GetID(), removeUserinfoScopes(tokenRequest.GetScopes()))
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
@ -95,6 +98,7 @@ func CreateJWT(ctx context.Context, issuer string, tokenRequest TokenRequest, ex
|
|||
return utils.Sign(claims, signer.Signer())
|
||||
}
|
||||
|
||||
//func CreateIDToken(ctx context.Context, issuer string, authReq AuthRequest, validity time.Duration, accessToken, code string, storage Storage, signer Signer, additonalScopes bool) (string, error) {
|
||||
func CreateIDToken(ctx context.Context, issuer string, authReq AuthRequest, validity time.Duration, accessToken, code string, storage Storage, signer Signer, restictAdditionalScopesFunc func([]string) []string) (string, error) {
|
||||
exp := time.Now().UTC().Add(validity)
|
||||
claims := oidc.NewIDTokenClaims(issuer, authReq.GetSubject(), authReq.GetAudience(), exp, authReq.GetAuthTime(), authReq.GetNonce(), authReq.GetACR(), authReq.GetAMR(), authReq.GetClientID())
|
||||
|
@ -109,7 +113,9 @@ func CreateIDToken(ctx context.Context, issuer string, authReq AuthRequest, vali
|
|||
scopes = removeUserinfoScopes(scopes)
|
||||
}
|
||||
scopes = restictAdditionalScopesFunc(scopes)
|
||||
|
||||
//if !additonalScopes {
|
||||
// scopes = removeAdditionalScopes(scopes)
|
||||
//}
|
||||
if len(scopes) > 0 {
|
||||
userInfo, err := storage.GetUserinfoFromScopes(ctx, authReq.GetSubject(), authReq.GetClientID(), scopes)
|
||||
if err != nil {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue