1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2024-12-12 11:15:02 +02:00
oauth2-proxy/providers/azure.go

222 lines
5.6 KiB
Go
Raw Normal View History

2015-11-09 10:28:34 +02:00
package providers
import (
"bytes"
"context"
2015-11-09 10:28:34 +02:00
"errors"
"net/http"
"net/url"
"time"
2018-11-29 16:26:41 +02:00
"github.com/bitly/go-simplejson"
"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/apis/sessions"
"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/logger"
"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/requests"
2015-11-09 10:28:34 +02:00
)
// AzureProvider represents an Azure based Identity Provider
2015-11-09 10:28:34 +02:00
type AzureProvider struct {
*ProviderData
Tenant string
}
var _ Provider = (*AzureProvider)(nil)
const (
azureProviderName = "Azure"
azureDefaultScope = "openid"
)
var (
// Default Login URL for Azure.
// Pre-parsed URL of https://login.microsoftonline.com/common/oauth2/authorize.
azureDefaultLoginURL = &url.URL{
Scheme: "https",
Host: "login.microsoftonline.com",
Path: "/common/oauth2/authorize",
}
// Default Redeem URL for Azure.
// Pre-parsed URL of https://login.microsoftonline.com/common/oauth2/token.
azureDefaultRedeemURL = &url.URL{
Scheme: "https",
Host: "login.microsoftonline.com",
Path: "/common/oauth2/token",
}
// Default Profile URL for Azure.
// Pre-parsed URL of https://graph.microsoft.com/v1.0/me.
azureDefaultProfileURL = &url.URL{
Scheme: "https",
Host: "graph.microsoft.com",
Path: "/v1.0/me",
}
// Default ProtectedResource URL for Azure.
// Pre-parsed URL of https://graph.microsoft.com.
azureDefaultProtectResourceURL = &url.URL{
Scheme: "https",
Host: "graph.microsoft.com",
}
)
// NewAzureProvider initiates a new AzureProvider
2015-11-09 10:28:34 +02:00
func NewAzureProvider(p *ProviderData) *AzureProvider {
p.setProviderDefaults(providerDefaults{
name: azureProviderName,
loginURL: azureDefaultLoginURL,
redeemURL: azureDefaultRedeemURL,
profileURL: azureDefaultProfileURL,
validateURL: nil,
scope: azureDefaultScope,
})
2015-11-09 10:28:34 +02:00
if p.ProtectedResource == nil || p.ProtectedResource.String() == "" {
p.ProtectedResource = azureDefaultProtectResourceURL
2015-11-09 10:28:34 +02:00
}
return &AzureProvider{
ProviderData: p,
Tenant: "common",
}
2015-11-09 10:28:34 +02:00
}
// Configure defaults the AzureProvider configuration options
2015-11-09 10:28:34 +02:00
func (p *AzureProvider) Configure(tenant string) {
if tenant == "" || tenant == "common" {
// tenant is empty or default, remain on the default "common" tenant
return
2015-11-09 10:28:34 +02:00
}
// Specific tennant specified, override the Login and RedeemURLs
p.Tenant = tenant
overrideTenantURL(p.LoginURL, azureDefaultLoginURL, tenant, "authorize")
overrideTenantURL(p.RedeemURL, azureDefaultRedeemURL, tenant, "token")
}
func overrideTenantURL(current, defaultURL *url.URL, tenant, path string) {
if current == nil || current.String() == "" || current.String() == defaultURL.String() {
*current = url.URL{
2015-11-09 10:28:34 +02:00
Scheme: "https",
Host: "login.microsoftonline.com",
Path: "/" + tenant + "/oauth2/" + path}
2015-11-09 10:28:34 +02:00
}
}
func (p *AzureProvider) Redeem(ctx context.Context, redirectURL, code string) (s *sessions.SessionState, err error) {
if code == "" {
err = errors.New("missing code")
return
}
clientSecret, err := p.GetClientSecret()
if err != nil {
return
}
params := url.Values{}
params.Add("redirect_uri", redirectURL)
params.Add("client_id", p.ClientID)
params.Add("client_secret", clientSecret)
params.Add("code", code)
params.Add("grant_type", "authorization_code")
if p.ProtectedResource != nil && p.ProtectedResource.String() != "" {
params.Add("resource", p.ProtectedResource.String())
}
var jsonResponse struct {
AccessToken string `json:"access_token"`
RefreshToken string `json:"refresh_token"`
ExpiresOn int64 `json:"expires_on,string"`
IDToken string `json:"id_token"`
}
err = requests.New(p.RedeemURL.String()).
WithContext(ctx).
WithMethod("POST").
WithBody(bytes.NewBufferString(params.Encode())).
SetHeader("Content-Type", "application/x-www-form-urlencoded").
2020-07-06 18:42:26 +02:00
Do().
UnmarshalInto(&jsonResponse)
if err != nil {
return nil, err
}
created := time.Now()
expires := time.Unix(jsonResponse.ExpiresOn, 0)
s = &sessions.SessionState{
AccessToken: jsonResponse.AccessToken,
IDToken: jsonResponse.IDToken,
CreatedAt: &created,
ExpiresOn: &expires,
RefreshToken: jsonResponse.RefreshToken,
}
return
}
func makeAzureHeader(accessToken string) http.Header {
return makeAuthorizationHeader(tokenTypeBearer, accessToken, nil)
2015-11-09 10:28:34 +02:00
}
func getEmailFromJSON(json *simplejson.Json) (string, error) {
2017-03-29 15:36:38 +02:00
var email string
var err error
2017-03-29 15:36:38 +02:00
email, err = json.Get("mail").String()
2017-03-29 15:36:38 +02:00
if err != nil || email == "" {
otherMails, otherMailsErr := json.Get("otherMails").Array()
2017-03-29 15:36:38 +02:00
if len(otherMails) > 0 {
email = otherMails[0].(string)
}
err = otherMailsErr
}
2017-03-29 15:36:38 +02:00
return email, err
2017-03-29 15:36:38 +02:00
}
// GetEmailAddress returns the Account email address
func (p *AzureProvider) GetEmailAddress(ctx context.Context, s *sessions.SessionState) (string, error) {
var email string
var err error
2017-03-29 15:36:38 +02:00
2015-11-09 10:28:34 +02:00
if s.AccessToken == "" {
return "", errors.New("missing access token")
}
json, err := requests.New(p.ProfileURL.String()).
WithContext(ctx).
WithHeaders(makeAzureHeader(s.AccessToken)).
2020-07-06 18:42:26 +02:00
Do().
UnmarshalJSON()
2015-11-09 10:28:34 +02:00
if err != nil {
return "", err
}
email, err = getEmailFromJSON(json)
if err == nil && email != "" {
return email, err
}
email, err = json.Get("userPrincipalName").String()
if err != nil {
logger.Errorf("failed making request %s", err)
return "", err
}
2017-03-29 15:36:38 +02:00
if email == "" {
logger.Errorf("failed to get email address")
return "", err
}
2017-03-29 15:36:38 +02:00
return email, err
2015-11-09 10:28:34 +02:00
}
func (p *AzureProvider) GetLoginURL(redirectURI, state string) string {
extraParams := url.Values{}
if p.ProtectedResource != nil && p.ProtectedResource.String() != "" {
extraParams.Add("resource", p.ProtectedResource.String())
}
a := makeLoginURL(p.ProviderData, redirectURI, state, extraParams)
return a.String()
}