mirror of
https://github.com/drakkan/sftpgo.git
synced 2025-12-07 14:50:55 +03:00
OIDC: allow to extract custom fields from sub-structs
Signed-off-by: Nicola Murino <nicola.murino@gmail.com>
This commit is contained in:
@@ -281,7 +281,7 @@ func TestOIDCLoginLogout(t *testing.T) {
|
||||
assert.Equal(t, http.StatusFound, rr.Code)
|
||||
assert.Equal(t, webClientLoginPath, rr.Header().Get("Location"))
|
||||
require.Len(t, oidcMgr.pendingAuths, 0)
|
||||
// invalid id token claims (no username)
|
||||
// invalid id token claims: no username
|
||||
authReq = newOIDCPendingAuth(tokenAudienceWebClient)
|
||||
oidcMgr.addPendingAuth(authReq)
|
||||
idToken := &oidc.IDToken{
|
||||
@@ -300,6 +300,25 @@ func TestOIDCLoginLogout(t *testing.T) {
|
||||
assert.Equal(t, http.StatusFound, rr.Code)
|
||||
assert.Equal(t, webClientLoginPath, rr.Header().Get("Location"))
|
||||
require.Len(t, oidcMgr.pendingAuths, 0)
|
||||
// invalid id token clamims: username not a string
|
||||
authReq = newOIDCPendingAuth(tokenAudienceWebClient)
|
||||
oidcMgr.addPendingAuth(authReq)
|
||||
idToken = &oidc.IDToken{
|
||||
Nonce: authReq.Nonce,
|
||||
Expiry: time.Now().Add(5 * time.Minute),
|
||||
}
|
||||
setIDTokenClaims(idToken, []byte(`{"aud": "my_client_id","preferred_username": 1}`))
|
||||
server.binding.OIDC.verifier = &mockOIDCVerifier{
|
||||
err: nil,
|
||||
token: idToken,
|
||||
}
|
||||
rr = httptest.NewRecorder()
|
||||
r, err = http.NewRequest(http.MethodGet, webOIDCRedirectPath+"?state="+authReq.State, nil)
|
||||
assert.NoError(t, err)
|
||||
server.router.ServeHTTP(rr, r)
|
||||
assert.Equal(t, http.StatusFound, rr.Code)
|
||||
assert.Equal(t, webClientLoginPath, rr.Header().Get("Location"))
|
||||
require.Len(t, oidcMgr.pendingAuths, 0)
|
||||
// invalid audience
|
||||
authReq = newOIDCPendingAuth(tokenAudienceWebClient)
|
||||
oidcMgr.addPendingAuth(authReq)
|
||||
@@ -835,11 +854,16 @@ func TestOIDCToken(t *testing.T) {
|
||||
|
||||
token := oidcToken{
|
||||
Username: admin.Username,
|
||||
Role: "admin",
|
||||
}
|
||||
// role not initialized, user with the specified username does not exist
|
||||
req, err := http.NewRequest(http.MethodGet, webUsersPath, nil)
|
||||
assert.NoError(t, err)
|
||||
err = token.getUser(req)
|
||||
assert.ErrorIs(t, err, util.ErrNotFound)
|
||||
token.Role = "admin"
|
||||
req, err = http.NewRequest(http.MethodGet, webUsersPath, nil)
|
||||
assert.NoError(t, err)
|
||||
err = token.getUser(req)
|
||||
if assert.Error(t, err) {
|
||||
assert.Contains(t, err.Error(), "is disabled")
|
||||
}
|
||||
@@ -1143,10 +1167,11 @@ func TestOIDCEvMgrIntegration(t *testing.T) {
|
||||
u := map[string]any{
|
||||
"username": "{{Name}}",
|
||||
"status": 1,
|
||||
"home_dir": filepath.Join(os.TempDir(), "{{IDPFieldcustom1}}"),
|
||||
"home_dir": filepath.Join(os.TempDir(), "{{IDPFieldcustom1.sub}}"),
|
||||
"permissions": map[string][]string{
|
||||
"/": {dataprovider.PermAny},
|
||||
},
|
||||
"description": "{{IDPFieldcustom2}}",
|
||||
}
|
||||
userTmpl, err := json.Marshal(u)
|
||||
require.NoError(t, err)
|
||||
@@ -1196,7 +1221,7 @@ func TestOIDCEvMgrIntegration(t *testing.T) {
|
||||
require.True(t, ok)
|
||||
server := getTestOIDCServer()
|
||||
server.binding.OIDC.ImplicitRoles = true
|
||||
server.binding.OIDC.CustomFields = []string{"custom1", "custom2"}
|
||||
server.binding.OIDC.CustomFields = []string{"custom1.sub", "custom2"}
|
||||
err = server.binding.OIDC.initialize()
|
||||
assert.NoError(t, err)
|
||||
server.initializeRouter()
|
||||
@@ -1221,7 +1246,7 @@ func TestOIDCEvMgrIntegration(t *testing.T) {
|
||||
Nonce: authReq.Nonce,
|
||||
Expiry: time.Now().Add(5 * time.Minute),
|
||||
}
|
||||
setIDTokenClaims(idToken, []byte(`{"preferred_username":"`+util.JSONEscape(username)+`","custom1":"val1"}`))
|
||||
setIDTokenClaims(idToken, []byte(`{"preferred_username":"`+util.JSONEscape(username)+`","custom1":{"sub":"val1"},"custom2":"desc"}`))
|
||||
server.binding.OIDC.verifier = &mockOIDCVerifier{
|
||||
err: nil,
|
||||
token: idToken,
|
||||
@@ -1235,6 +1260,7 @@ func TestOIDCEvMgrIntegration(t *testing.T) {
|
||||
user, err := dataprovider.UserExists(username, "")
|
||||
assert.NoError(t, err)
|
||||
assert.Equal(t, filepath.Join(os.TempDir(), "val1"), user.GetHomeDir())
|
||||
assert.Equal(t, "desc", user.Description)
|
||||
|
||||
err = dataprovider.DeleteUser(username, "", "", "")
|
||||
assert.NoError(t, err)
|
||||
@@ -1473,13 +1499,15 @@ func TestParseAdminRole(t *testing.T) {
|
||||
type test struct {
|
||||
input string
|
||||
want bool
|
||||
val any
|
||||
}
|
||||
|
||||
tests := []test{
|
||||
{input: "", want: false},
|
||||
{input: "sftpgo_role", want: false},
|
||||
{input: "params.sftpgo_role", want: true},
|
||||
{input: "params.subparams.sftpgo_role", want: true},
|
||||
{input: "params.subparams.inner.sftpgo_role", want: true},
|
||||
{input: "params.sftpgo_role", want: true, val: "admin"},
|
||||
{input: "params.subparams.sftpgo_role", want: true, val: "admin"},
|
||||
{input: "params.subparams.inner.sftpgo_role", want: true, val: []any{"user", "admin"}},
|
||||
{input: "email", want: false},
|
||||
{input: "missing", want: false},
|
||||
{input: "params.email", want: false},
|
||||
@@ -1492,6 +1520,9 @@ func TestParseAdminRole(t *testing.T) {
|
||||
token := oidcToken{}
|
||||
token.getRoleFromField(claims, tc.input)
|
||||
assert.Equal(t, tc.want, token.isAdmin(), "%q should return %t", tc.input, tc.want)
|
||||
if tc.want {
|
||||
assert.Equal(t, tc.val, token.Role)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user