mirror of
https://github.com/alibaba/higress.git
synced 2026-03-06 17:40:51 +08:00
117 lines
3.3 KiB
Go
117 lines
3.3 KiB
Go
// Copyright (c) 2022 Alibaba Group Holding Ltd.
|
||
//
|
||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
// you may not use this file except in compliance with the License.
|
||
// You may obtain a copy of the License at
|
||
//
|
||
// http://www.apache.org/licenses/LICENSE-2.0
|
||
//
|
||
// Unless required by applicable law or agreed to in writing, software
|
||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
// See the License for the specific language governing permissions and
|
||
// limitations under the License.
|
||
|
||
package oc
|
||
|
||
import (
|
||
"errors"
|
||
"net/url"
|
||
"regexp"
|
||
"strings"
|
||
"time"
|
||
|
||
"github.com/alibaba/higress/plugins/wasm-go/pkg/wrapper"
|
||
"golang.org/x/oauth2"
|
||
)
|
||
|
||
type Accessmod int
|
||
|
||
const (
|
||
Access Accessmod = 0
|
||
SenBack Accessmod = 1
|
||
)
|
||
|
||
var invalidRedirectRegex = regexp.MustCompile(`[/\\](?:[\s\v]*|\.{1,2})[/\\]`)
|
||
|
||
type IDConfig struct {
|
||
ClientID string
|
||
SupportedSigningAlgs []string
|
||
SkipExpiryCheck bool
|
||
//SkipIssuerCheck 用于特殊情况,其中调用者希望推迟对签发者的验证。
|
||
//当启用时,调用者必须独立验证令牌的签发者是否为已知的有效值。
|
||
//
|
||
//
|
||
//不匹配的签发者通常指示客户端配置错误。如果不希望发生不匹配,请检查所提供的签发者URL是否正确,而不是启用这个选项。
|
||
SkipIssuerCheck bool
|
||
SkipNonceCheck bool
|
||
Now func() time.Time
|
||
}
|
||
|
||
type idToken struct {
|
||
Issuer string `json:"iss"`
|
||
Subject string `json:"sub"`
|
||
Audience audience `json:"aud"`
|
||
Expiry jsonTime `json:"exp"`
|
||
IssuedAt jsonTime `json:"iat"`
|
||
NotBefore *jsonTime `json:"nbf"`
|
||
Nonce string `json:"nonce"`
|
||
AtHash string `json:"at_hash"`
|
||
ClaimNames map[string]string `json:"_claim_names"`
|
||
ClaimSources map[string]claimSource `json:"_claim_sources"`
|
||
}
|
||
|
||
type claimSource struct {
|
||
Endpoint string `json:"endpoint"`
|
||
AccessToken string `json:"access_token"`
|
||
}
|
||
|
||
type Oatuh2Config struct {
|
||
oauth2.Config
|
||
Issuer string
|
||
JwksURL string
|
||
ClientUrl string
|
||
Path string
|
||
SupportedSigningAlgs []string
|
||
SkipExpiryCheck bool
|
||
Timeout int
|
||
Client wrapper.HttpClient
|
||
SkipNonceCheck bool
|
||
|
||
Option *OidcOption
|
||
CookieOption *CookieOption
|
||
CookieData *CookieData
|
||
}
|
||
|
||
type OidcOption struct {
|
||
StateStr string
|
||
Nonce string
|
||
Code string
|
||
Mod Accessmod
|
||
RawIdToken string
|
||
AuthStyle AuthStyle
|
||
}
|
||
|
||
func IsValidRedirect(redirect string) error {
|
||
if !strings.HasSuffix(redirect, "oauth2/callback") {
|
||
return errors.New("redirect URL must end with oauth2/callback")
|
||
}
|
||
switch {
|
||
case redirect == "":
|
||
return errors.New("redirect URL is empty")
|
||
case strings.HasPrefix(redirect, "/"):
|
||
if strings.HasPrefix(redirect, "//") || invalidRedirectRegex.MatchString(redirect) {
|
||
return errors.New("invalid local redirect URL")
|
||
}
|
||
return nil
|
||
case strings.HasPrefix(redirect, "http://"), strings.HasPrefix(redirect, "https://"):
|
||
_, err := url.ParseRequestURI(redirect)
|
||
if err != nil {
|
||
return errors.New("invalid remote redirect URL")
|
||
}
|
||
return nil
|
||
default:
|
||
return errors.New("redirect URL must start with /, http://, or https://")
|
||
}
|
||
}
|