Merge pull request #753 from codablock/azure-resource
Pass resource parameter in login url
This commit is contained in:
commit
7c4479791c
|
|
@ -12,9 +12,14 @@
|
||||||
## Breaking Changes
|
## Breaking Changes
|
||||||
|
|
||||||
- [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) When a Redis session store is configured, OAuth2-Proxy will fail to start up unless connection and health checks to Redis pass
|
- [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) When a Redis session store is configured, OAuth2-Proxy will fail to start up unless connection and health checks to Redis pass
|
||||||
|
- [#753](https://github.com/oauth2-proxy/oauth2-proxy/pull/753) A bug in the Azure provider prevented it from properly passing the configured protected `--resource`
|
||||||
|
via the login url. If this option was used in the past, behavior will change with this release as it will
|
||||||
|
affect the tokens returned by Azure. In the past, the tokens were always for `https://graph.microsoft.com` (the default)
|
||||||
|
and will now be for the configured resource (if it exists, otherwise it will run into errors)
|
||||||
|
|
||||||
## Changes since v6.1.1
|
## Changes since v6.1.1
|
||||||
|
|
||||||
|
- [#753](https://github.com/oauth2-proxy/oauth2-proxy/pull/753) Pass resource parameter in login url (@codablock)
|
||||||
- [#575](https://github.com/oauth2-proxy/oauth2-proxy/pull/575) Stop accepting legacy SHA1 signed cookies (@NickMeves)
|
- [#575](https://github.com/oauth2-proxy/oauth2-proxy/pull/575) Stop accepting legacy SHA1 signed cookies (@NickMeves)
|
||||||
- [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) Validate Redis configuration options at startup (@NickMeves)
|
- [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) Validate Redis configuration options at startup (@NickMeves)
|
||||||
- [#791](https://github.com/oauth2-proxy/oauth2-proxy/pull/791) Remove GetPreferredUsername method from provider interface (@NickMeves)
|
- [#791](https://github.com/oauth2-proxy/oauth2-proxy/pull/791) Remove GetPreferredUsername method from provider interface (@NickMeves)
|
||||||
|
|
|
||||||
|
|
@ -210,3 +210,12 @@ func (p *AzureProvider) GetEmailAddress(ctx context.Context, s *sessions.Session
|
||||||
|
|
||||||
return email, err
|
return email, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *AzureProvider) GetLoginURL(redirectURI, state string) string {
|
||||||
|
extraParams := url.Values{}
|
||||||
|
if p.ProtectedResource != nil && p.ProtectedResource.String() != "" {
|
||||||
|
extraParams.Add("resource", p.ProtectedResource.String())
|
||||||
|
}
|
||||||
|
a := makeLoginURL(p.ProviderData, redirectURI, state, extraParams)
|
||||||
|
return a.String()
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -213,3 +213,10 @@ func TestAzureProviderRedeemReturnsIdToken(t *testing.T) {
|
||||||
assert.Equal(t, timestamp, s.ExpiresOn.UTC())
|
assert.Equal(t, timestamp, s.ExpiresOn.UTC())
|
||||||
assert.Equal(t, "refresh1234", s.RefreshToken)
|
assert.Equal(t, "refresh1234", s.RefreshToken)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestAzureProviderProtectedResourceConfigured(t *testing.T) {
|
||||||
|
p := testAzureProvider("")
|
||||||
|
p.ProtectedResource, _ = url.Parse("http://my.resource.test")
|
||||||
|
result := p.GetLoginURL("https://my.test.app/oauth", "")
|
||||||
|
assert.Contains(t, result, "resource="+url.QueryEscape("http://my.resource.test"))
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -225,20 +225,12 @@ func (p *LoginGovProvider) Redeem(ctx context.Context, redirectURL, code string)
|
||||||
|
|
||||||
// GetLoginURL overrides GetLoginURL to add login.gov parameters
|
// GetLoginURL overrides GetLoginURL to add login.gov parameters
|
||||||
func (p *LoginGovProvider) GetLoginURL(redirectURI, state string) string {
|
func (p *LoginGovProvider) GetLoginURL(redirectURI, state string) string {
|
||||||
a := *p.LoginURL
|
extraParams := url.Values{}
|
||||||
params, _ := url.ParseQuery(a.RawQuery)
|
if p.AcrValues == "" {
|
||||||
params.Set("redirect_uri", redirectURI)
|
acr := "http://idmanagement.gov/ns/assurance/loa/1"
|
||||||
params.Set("approval_prompt", p.ApprovalPrompt)
|
extraParams.Add("acr_values", acr)
|
||||||
params.Add("scope", p.Scope)
|
|
||||||
params.Set("client_id", p.ClientID)
|
|
||||||
params.Set("response_type", "code")
|
|
||||||
params.Add("state", state)
|
|
||||||
acr := p.AcrValues
|
|
||||||
if acr == "" {
|
|
||||||
acr = "http://idmanagement.gov/ns/assurance/loa/1"
|
|
||||||
}
|
}
|
||||||
params.Add("acr_values", acr)
|
extraParams.Add("nonce", p.Nonce)
|
||||||
params.Add("nonce", p.Nonce)
|
a := makeLoginURL(p.ProviderData, redirectURI, state, extraParams)
|
||||||
a.RawQuery = params.Encode()
|
|
||||||
return a.String()
|
return a.String()
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -289,3 +289,10 @@ func TestLoginGovProviderBadNonce(t *testing.T) {
|
||||||
// The "badfakenonce" in the idtoken above should cause this to error out
|
// The "badfakenonce" in the idtoken above should cause this to error out
|
||||||
assert.Error(t, err)
|
assert.Error(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestLoginGovProviderGetLoginURL(t *testing.T) {
|
||||||
|
p, _, _ := newLoginGovProvider()
|
||||||
|
result := p.GetLoginURL("http://redirect/", "")
|
||||||
|
assert.Contains(t, result, "acr_values="+url.QueryEscape("http://idmanagement.gov/ns/assurance/loa/1"))
|
||||||
|
assert.Contains(t, result, "nonce=fakenonce")
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -75,22 +75,8 @@ func (p *ProviderData) Redeem(ctx context.Context, redirectURL, code string) (s
|
||||||
|
|
||||||
// GetLoginURL with typical oauth parameters
|
// GetLoginURL with typical oauth parameters
|
||||||
func (p *ProviderData) GetLoginURL(redirectURI, state string) string {
|
func (p *ProviderData) GetLoginURL(redirectURI, state string) string {
|
||||||
a := *p.LoginURL
|
extraParams := url.Values{}
|
||||||
params, _ := url.ParseQuery(a.RawQuery)
|
a := makeLoginURL(p, redirectURI, state, extraParams)
|
||||||
params.Set("redirect_uri", redirectURI)
|
|
||||||
if p.AcrValues != "" {
|
|
||||||
params.Add("acr_values", p.AcrValues)
|
|
||||||
}
|
|
||||||
if p.Prompt != "" {
|
|
||||||
params.Set("prompt", p.Prompt)
|
|
||||||
} else { // Legacy variant of the prompt param:
|
|
||||||
params.Set("approval_prompt", p.ApprovalPrompt)
|
|
||||||
}
|
|
||||||
params.Add("scope", p.Scope)
|
|
||||||
params.Set("client_id", p.ClientID)
|
|
||||||
params.Set("response_type", "code")
|
|
||||||
params.Add("state", state)
|
|
||||||
a.RawQuery = params.Encode()
|
|
||||||
return a.String()
|
return a.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -3,6 +3,7 @@ package providers
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/url"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
|
@ -29,3 +30,28 @@ func makeOIDCHeader(accessToken string) http.Header {
|
||||||
}
|
}
|
||||||
return makeAuthorizationHeader(tokenTypeBearer, accessToken, extraHeaders)
|
return makeAuthorizationHeader(tokenTypeBearer, accessToken, extraHeaders)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func makeLoginURL(p *ProviderData, redirectURI, state string, extraParams url.Values) url.URL {
|
||||||
|
a := *p.LoginURL
|
||||||
|
params, _ := url.ParseQuery(a.RawQuery)
|
||||||
|
params.Set("redirect_uri", redirectURI)
|
||||||
|
if p.AcrValues != "" {
|
||||||
|
params.Add("acr_values", p.AcrValues)
|
||||||
|
}
|
||||||
|
if p.Prompt != "" {
|
||||||
|
params.Set("prompt", p.Prompt)
|
||||||
|
} else { // Legacy variant of the prompt param:
|
||||||
|
params.Set("approval_prompt", p.ApprovalPrompt)
|
||||||
|
}
|
||||||
|
params.Add("scope", p.Scope)
|
||||||
|
params.Set("client_id", p.ClientID)
|
||||||
|
params.Set("response_type", "code")
|
||||||
|
params.Add("state", state)
|
||||||
|
for n, p := range extraParams {
|
||||||
|
for _, v := range p {
|
||||||
|
params.Add(n, v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
a.RawQuery = params.Encode()
|
||||||
|
return a
|
||||||
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue