dendrite/clientapi/auth/sso/sso.go
Tommie Gannert 09f0dca6aa Refactor SSO configuration.
It makes more sense to base provider defaults on brand. Type is not
1:1 to brand.

Splits apart OIDC and OAuth2 to match actual specs.
2022-05-27 22:15:52 +02:00

96 lines
2.7 KiB
Go

// Copyright 2022 The Matrix.org Foundation C.I.C.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package sso
import (
"context"
"fmt"
"net/http"
"net/url"
"time"
"github.com/matrix-org/dendrite/setup/config"
uapi "github.com/matrix-org/dendrite/userapi/api"
)
type Authenticator struct {
providers map[string]identityProvider
}
func NewAuthenticator(ctx context.Context, cfg *config.SSO) (*Authenticator, error) {
hc := &http.Client{
Timeout: 10 * time.Second,
Transport: &http.Transport{
DisableKeepAlives: true,
Proxy: http.ProxyFromEnvironment,
},
}
a := &Authenticator{
providers: make(map[string]identityProvider, len(cfg.Providers)),
}
for _, pcfg := range cfg.Providers {
pcfg = pcfg.WithDefaults()
switch pcfg.Type {
case config.SSOTypeOIDC:
p, err := newOIDCIdentityProvider(ctx, &pcfg, hc)
if err != nil {
return nil, fmt.Errorf("failed to create OpenID Connect provider %q: %w", pcfg.ID, err)
}
a.providers[pcfg.ID] = p
case config.SSOTypeGitHub:
a.providers[pcfg.ID] = newGitHubIdentityProvider(&pcfg, hc)
default:
return nil, fmt.Errorf("unknown SSO provider type: %s", pcfg.Type)
}
}
return a, nil
}
func (auth *Authenticator) AuthorizationURL(ctx context.Context, providerID, callbackURL, nonce string) (string, error) {
p := auth.providers[providerID]
if p == nil {
return "", fmt.Errorf("unknown identity provider: %s", providerID)
}
return p.AuthorizationURL(ctx, callbackURL, nonce)
}
func (auth *Authenticator) ProcessCallback(ctx context.Context, providerID, callbackURL, nonce string, query url.Values) (*CallbackResult, error) {
p := auth.providers[providerID]
if p == nil {
return nil, fmt.Errorf("unknown identity provider: %s", providerID)
}
return p.ProcessCallback(ctx, callbackURL, nonce, query)
}
type identityProvider interface {
AuthorizationURL(ctx context.Context, callbackURL, nonce string) (string, error)
ProcessCallback(ctx context.Context, callbackURL, nonce string, query url.Values) (*CallbackResult, error)
}
type CallbackResult struct {
RedirectURL string
Identifier *UserIdentifier
DisplayName string
SuggestedUserID string
}
type UserIdentifier struct {
Namespace uapi.SSOIssuerNamespace
Issuer, Subject string
}