Skip to content
Snippets Groups Projects
authproxy.go 3.72 KiB
Newer Older
  • Learn to ignore specific revisions
  • // Package authproxy implements a connector which relies on external
    // authentication (e.g. mod_auth in Apache2) and returns an identity with the
    // HTTP header X-Remote-User as verified email.
    package authproxy
    
    import (
    	"fmt"
    
    	"github.com/dexidp/dex/connector"
    
    )
    
    // Config holds the configuration parameters for a connector which returns an
    
    // identity with the HTTP header X-Remote-User as verified email,
    // X-Remote-Group and configured staticGroups as user's group.
    // Headers retrieved to fetch user's email and group can be configured
    // with userHeader and groupHeader.
    
    type Config struct {
    
    	UserIDHeader   string   `json:"userIDHeader"`
    	UserHeader     string   `json:"userHeader"`
    	UserNameHeader string   `json:"userNameHeader"`
    	EmailHeader    string   `json:"emailHeader"`
    	GroupHeader    string   `json:"groupHeader"`
    	Groups         []string `json:"staticGroups"`
    
    
    // Open returns an authentication strategy which requires no user interaction.
    
    func (c *Config) Open(id string, logger *slog.Logger) (connector.Connector, error) {
    
    	userIDHeader := c.UserIDHeader
    	if userIDHeader == "" {
    		userIDHeader = "X-Remote-User-Id"
    	}
    
    	userHeader := c.UserHeader
    	if userHeader == "" {
    		userHeader = "X-Remote-User"
    	}
    
    	userNameHeader := c.UserNameHeader
    	if userNameHeader == "" {
    		userNameHeader = "X-Remote-User-Name"
    	}
    
    	emailHeader := c.EmailHeader
    	if emailHeader == "" {
    		emailHeader = "X-Remote-User-Email"
    	}
    
    	groupHeader := c.GroupHeader
    	if groupHeader == "" {
    		groupHeader = "X-Remote-Group"
    	}
    
    		userIDHeader:   userIDHeader,
    		userHeader:     userHeader,
    		userNameHeader: userNameHeader,
    		emailHeader:    emailHeader,
    		groupHeader:    groupHeader,
    		groups:         c.Groups,
    		logger:         logger.With(slog.Group("connector", "type", "authproxy", "id", id)),
    		pathSuffix:     "/" + id,
    
    }
    
    // Callback is a connector which returns an identity with the HTTP header
    // X-Remote-User as verified email.
    type callback struct {
    
    	userIDHeader   string
    	userNameHeader string
    	userHeader     string
    	emailHeader    string
    	groupHeader    string
    	groups         []string
    	logger         *slog.Logger
    	pathSuffix     string
    
    }
    
    // LoginURL returns the URL to redirect the user to login with.
    func (m *callback) LoginURL(s connector.Scopes, callbackURL, state string) (string, error) {
    	u, err := url.Parse(callbackURL)
    	if err != nil {
    		return "", fmt.Errorf("failed to parse callbackURL %q: %v", callbackURL, err)
    	}
    
    m.nabokikh's avatar
    m.nabokikh committed
    	u.Path += m.pathSuffix
    
    	v := u.Query()
    	v.Set("state", state)
    	u.RawQuery = v.Encode()
    	return u.String(), nil
    }
    
    // HandleCallback parses the request and returns the user's identity
    func (m *callback) HandleCallback(s connector.Scopes, r *http.Request) (connector.Identity, error) {
    
    	remoteUser := r.Header.Get(m.userHeader)
    
    		return connector.Identity{}, fmt.Errorf("required HTTP header %s is not set", m.userHeader)
    
    	remoteUserName := r.Header.Get(m.userNameHeader)
    	if remoteUserName == "" {
    		remoteUserName = remoteUser
    	}
    
    	remoteUserID := r.Header.Get(m.userIDHeader)
    	if remoteUserID == "" {
    		remoteUserID = remoteUser
    	}
    	remoteUserEmail := r.Header.Get(m.emailHeader)
    	if remoteUserEmail == "" {
    		remoteUserEmail = remoteUser
    	}
    
    	groups := m.groups
    	headerGroup := r.Header.Get(m.groupHeader)
    	if headerGroup != "" {
    
    		splitheaderGroup := strings.Split(headerGroup, ",")
    		for i, v := range splitheaderGroup {
    			splitheaderGroup[i] = strings.TrimSpace(v)
    		}
    		groups = append(splitheaderGroup, groups...)
    
    		PreferredUsername: remoteUserName,
    
    		Email:             remoteUserEmail,
    		EmailVerified:     true,
    		Groups:            groups,