providers/oauth2: rework OAuth2 Provider (#4652)
* always treat flow as openid flow Signed-off-by: Jens Langhammer <jens@goauthentik.io> * improve issuer URL generation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more refactoring Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update introspection Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more refinement Signed-off-by: Jens Langhammer <jens@goauthentik.io> * migrate more Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix more things, update api Signed-off-by: Jens Langhammer <jens@goauthentik.io> * regen migrations Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix a bunch of things Signed-off-by: Jens Langhammer <jens@goauthentik.io> * start updating tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix implicit flow, auto set exp Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix timeozone not used correctly Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix revoke Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more timezone shenanigans Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix userinfo tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update web Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix proxy outpost Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix api tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix missing at_hash for implicit flows Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * re-include at_hash in implicit auth flow Signed-off-by: Jens Langhammer <jens@goauthentik.io> * use folder context for outpost build Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
parent
1f88330133
commit
af43330fd6
|
@ -49,7 +49,7 @@ jobs:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- run: echo mark
|
- run: echo mark
|
||||||
build:
|
build-container:
|
||||||
timeout-minutes: 120
|
timeout-minutes: 120
|
||||||
needs:
|
needs:
|
||||||
- ci-outpost-mark
|
- ci-outpost-mark
|
||||||
|
@ -94,7 +94,8 @@ jobs:
|
||||||
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
||||||
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
||||||
platforms: ${{ matrix.arch }}
|
platforms: ${{ matrix.arch }}
|
||||||
build-outpost-binary:
|
context: .
|
||||||
|
build-binary:
|
||||||
timeout-minutes: 120
|
timeout-minutes: 120
|
||||||
needs:
|
needs:
|
||||||
- ci-outpost-mark
|
- ci-outpost-mark
|
||||||
|
|
|
@ -42,7 +42,7 @@ def bearer_auth(raw_header: bytes) -> Optional[User]:
|
||||||
|
|
||||||
def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
||||||
"""raw_header in the Format of `Bearer ....`"""
|
"""raw_header in the Format of `Bearer ....`"""
|
||||||
from authentik.providers.oauth2.models import RefreshToken
|
from authentik.providers.oauth2.models import AccessToken
|
||||||
|
|
||||||
auth_credentials = validate_auth(raw_header)
|
auth_credentials = validate_auth(raw_header)
|
||||||
if not auth_credentials:
|
if not auth_credentials:
|
||||||
|
@ -55,8 +55,8 @@ def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
||||||
CTX_AUTH_VIA.set("api_token")
|
CTX_AUTH_VIA.set("api_token")
|
||||||
return key_token.user
|
return key_token.user
|
||||||
# then try to auth via JWT
|
# then try to auth via JWT
|
||||||
jwt_token = RefreshToken.filter_not_expired(
|
jwt_token = AccessToken.filter_not_expired(
|
||||||
refresh_token=auth_credentials, _scope__icontains=SCOPE_AUTHENTIK_API
|
token=auth_credentials, _scope__icontains=SCOPE_AUTHENTIK_API
|
||||||
).first()
|
).first()
|
||||||
if jwt_token:
|
if jwt_token:
|
||||||
# Double-check scopes, since they are saved in a single string
|
# Double-check scopes, since they are saved in a single string
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
"""Test API Authentication"""
|
"""Test API Authentication"""
|
||||||
|
import json
|
||||||
from base64 import b64encode
|
from base64 import b64encode
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
|
@ -11,7 +12,7 @@ from authentik.core.models import USER_ATTRIBUTE_SA, Token, TokenIntents
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider
|
||||||
|
|
||||||
|
|
||||||
class TestAPIAuth(TestCase):
|
class TestAPIAuth(TestCase):
|
||||||
|
@ -63,24 +64,26 @@ class TestAPIAuth(TestCase):
|
||||||
provider = OAuth2Provider.objects.create(
|
provider = OAuth2Provider.objects.create(
|
||||||
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
||||||
)
|
)
|
||||||
refresh = RefreshToken.objects.create(
|
refresh = AccessToken.objects.create(
|
||||||
user=create_test_admin_user(),
|
user=create_test_admin_user(),
|
||||||
provider=provider,
|
provider=provider,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
_scope=SCOPE_AUTHENTIK_API,
|
_scope=SCOPE_AUTHENTIK_API,
|
||||||
|
_id_token=json.dumps({}),
|
||||||
)
|
)
|
||||||
self.assertEqual(bearer_auth(f"Bearer {refresh.refresh_token}".encode()), refresh.user)
|
self.assertEqual(bearer_auth(f"Bearer {refresh.token}".encode()), refresh.user)
|
||||||
|
|
||||||
def test_jwt_missing_scope(self):
|
def test_jwt_missing_scope(self):
|
||||||
"""Test valid JWT"""
|
"""Test valid JWT"""
|
||||||
provider = OAuth2Provider.objects.create(
|
provider = OAuth2Provider.objects.create(
|
||||||
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
||||||
)
|
)
|
||||||
refresh = RefreshToken.objects.create(
|
refresh = AccessToken.objects.create(
|
||||||
user=create_test_admin_user(),
|
user=create_test_admin_user(),
|
||||||
provider=provider,
|
provider=provider,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
_scope="",
|
_scope="",
|
||||||
|
_id_token=json.dumps({}),
|
||||||
)
|
)
|
||||||
with self.assertRaises(AuthenticationFailed):
|
with self.assertRaises(AuthenticationFailed):
|
||||||
self.assertEqual(bearer_auth(f"Bearer {refresh.refresh_token}".encode()), refresh.user)
|
self.assertEqual(bearer_auth(f"Bearer {refresh.token}".encode()), refresh.user)
|
||||||
|
|
|
@ -50,7 +50,11 @@ from authentik.policies.reputation.api import ReputationPolicyViewSet, Reputatio
|
||||||
from authentik.providers.ldap.api import LDAPOutpostConfigViewSet, LDAPProviderViewSet
|
from authentik.providers.ldap.api import LDAPOutpostConfigViewSet, LDAPProviderViewSet
|
||||||
from authentik.providers.oauth2.api.providers import OAuth2ProviderViewSet
|
from authentik.providers.oauth2.api.providers import OAuth2ProviderViewSet
|
||||||
from authentik.providers.oauth2.api.scopes import ScopeMappingViewSet
|
from authentik.providers.oauth2.api.scopes import ScopeMappingViewSet
|
||||||
from authentik.providers.oauth2.api.tokens import AuthorizationCodeViewSet, RefreshTokenViewSet
|
from authentik.providers.oauth2.api.tokens import (
|
||||||
|
AccessTokenViewSet,
|
||||||
|
AuthorizationCodeViewSet,
|
||||||
|
RefreshTokenViewSet,
|
||||||
|
)
|
||||||
from authentik.providers.proxy.api import ProxyOutpostConfigViewSet, ProxyProviderViewSet
|
from authentik.providers.proxy.api import ProxyOutpostConfigViewSet, ProxyProviderViewSet
|
||||||
from authentik.providers.saml.api.property_mapping import SAMLPropertyMappingViewSet
|
from authentik.providers.saml.api.property_mapping import SAMLPropertyMappingViewSet
|
||||||
from authentik.providers.saml.api.providers import SAMLProviderViewSet
|
from authentik.providers.saml.api.providers import SAMLProviderViewSet
|
||||||
|
@ -162,6 +166,7 @@ router.register("providers/saml", SAMLProviderViewSet)
|
||||||
|
|
||||||
router.register("oauth2/authorization_codes", AuthorizationCodeViewSet)
|
router.register("oauth2/authorization_codes", AuthorizationCodeViewSet)
|
||||||
router.register("oauth2/refresh_tokens", RefreshTokenViewSet)
|
router.register("oauth2/refresh_tokens", RefreshTokenViewSet)
|
||||||
|
router.register("oauth2/access_tokens", AccessTokenViewSet)
|
||||||
|
|
||||||
router.register("propertymappings/all", PropertyMappingViewSet)
|
router.register("propertymappings/all", PropertyMappingViewSet)
|
||||||
router.register("propertymappings/ldap", LDAPPropertyMappingViewSet)
|
router.register("propertymappings/ldap", LDAPPropertyMappingViewSet)
|
||||||
|
|
|
@ -13,7 +13,8 @@ from authentik.core.api.providers import ProviderSerializer
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import PassiveSerializer, PropertyMappingPreviewSerializer
|
from authentik.core.api.utils import PassiveSerializer, PropertyMappingPreviewSerializer
|
||||||
from authentik.core.models import Provider
|
from authentik.core.models import Provider
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, RefreshToken, ScopeMapping
|
from authentik.providers.oauth2.id_token import IDToken
|
||||||
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider, ScopeMapping
|
||||||
|
|
||||||
|
|
||||||
class OAuth2ProviderSerializer(ProviderSerializer):
|
class OAuth2ProviderSerializer(ProviderSerializer):
|
||||||
|
@ -27,7 +28,8 @@ class OAuth2ProviderSerializer(ProviderSerializer):
|
||||||
"client_id",
|
"client_id",
|
||||||
"client_secret",
|
"client_secret",
|
||||||
"access_code_validity",
|
"access_code_validity",
|
||||||
"token_validity",
|
"access_token_validity",
|
||||||
|
"refresh_token_validity",
|
||||||
"include_claims_in_id_token",
|
"include_claims_in_id_token",
|
||||||
"signing_key",
|
"signing_key",
|
||||||
"redirect_uris",
|
"redirect_uris",
|
||||||
|
@ -64,7 +66,8 @@ class OAuth2ProviderViewSet(UsedByMixin, ModelViewSet):
|
||||||
"client_type",
|
"client_type",
|
||||||
"client_id",
|
"client_id",
|
||||||
"access_code_validity",
|
"access_code_validity",
|
||||||
"token_validity",
|
"access_token_validity",
|
||||||
|
"refresh_token_validity",
|
||||||
"include_claims_in_id_token",
|
"include_claims_in_id_token",
|
||||||
"signing_key",
|
"signing_key",
|
||||||
"redirect_uris",
|
"redirect_uris",
|
||||||
|
@ -141,13 +144,17 @@ class OAuth2ProviderViewSet(UsedByMixin, ModelViewSet):
|
||||||
def preview_user(self, request: Request, pk: int) -> Response:
|
def preview_user(self, request: Request, pk: int) -> Response:
|
||||||
"""Preview user data for provider"""
|
"""Preview user data for provider"""
|
||||||
provider: OAuth2Provider = self.get_object()
|
provider: OAuth2Provider = self.get_object()
|
||||||
temp_token = RefreshToken()
|
scope_names = ScopeMapping.objects.filter(provider=provider).values_list(
|
||||||
temp_token.scope = ScopeMapping.objects.filter(provider=provider).values_list(
|
|
||||||
"scope_name", flat=True
|
"scope_name", flat=True
|
||||||
)
|
)
|
||||||
temp_token.provider = provider
|
temp_token = IDToken.new(
|
||||||
temp_token.user = request.user
|
provider,
|
||||||
serializer = PropertyMappingPreviewSerializer(
|
AccessToken(
|
||||||
instance={"preview": temp_token.create_id_token(request.user, request).to_dict()}
|
user=request.user,
|
||||||
|
provider=provider,
|
||||||
|
_scope=" ".join(scope_names),
|
||||||
|
),
|
||||||
|
request,
|
||||||
)
|
)
|
||||||
|
serializer = PropertyMappingPreviewSerializer(instance={"preview": temp_token.to_dict()})
|
||||||
return Response(serializer.data)
|
return Response(serializer.data)
|
||||||
|
|
|
@ -13,7 +13,7 @@ from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.users import UserSerializer
|
from authentik.core.api.users import UserSerializer
|
||||||
from authentik.core.api.utils import MetaNameSerializer
|
from authentik.core.api.utils import MetaNameSerializer
|
||||||
from authentik.providers.oauth2.api.providers import OAuth2ProviderSerializer
|
from authentik.providers.oauth2.api.providers import OAuth2ProviderSerializer
|
||||||
from authentik.providers.oauth2.models import AuthorizationCode, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, AuthorizationCode, RefreshToken
|
||||||
|
|
||||||
|
|
||||||
class ExpiringBaseGrantModelSerializer(ModelSerializer, MetaNameSerializer):
|
class ExpiringBaseGrantModelSerializer(ModelSerializer, MetaNameSerializer):
|
||||||
|
@ -29,7 +29,7 @@ class ExpiringBaseGrantModelSerializer(ModelSerializer, MetaNameSerializer):
|
||||||
depth = 2
|
depth = 2
|
||||||
|
|
||||||
|
|
||||||
class RefreshTokenModelSerializer(ExpiringBaseGrantModelSerializer):
|
class TokenModelSerializer(ExpiringBaseGrantModelSerializer):
|
||||||
"""Serializer for BaseGrantModel and RefreshToken"""
|
"""Serializer for BaseGrantModel and RefreshToken"""
|
||||||
|
|
||||||
id_token = SerializerMethodField()
|
id_token = SerializerMethodField()
|
||||||
|
@ -89,7 +89,33 @@ class RefreshTokenViewSet(
|
||||||
"""RefreshToken Viewset"""
|
"""RefreshToken Viewset"""
|
||||||
|
|
||||||
queryset = RefreshToken.objects.all()
|
queryset = RefreshToken.objects.all()
|
||||||
serializer_class = RefreshTokenModelSerializer
|
serializer_class = TokenModelSerializer
|
||||||
|
filterset_fields = ["user", "provider"]
|
||||||
|
ordering = ["provider", "expires"]
|
||||||
|
filter_backends = [
|
||||||
|
DjangoFilterBackend,
|
||||||
|
OrderingFilter,
|
||||||
|
SearchFilter,
|
||||||
|
]
|
||||||
|
|
||||||
|
def get_queryset(self):
|
||||||
|
user = self.request.user if self.request else get_anonymous_user()
|
||||||
|
if user.is_superuser:
|
||||||
|
return super().get_queryset()
|
||||||
|
return super().get_queryset().filter(user=user.pk)
|
||||||
|
|
||||||
|
|
||||||
|
class AccessTokenViewSet(
|
||||||
|
mixins.RetrieveModelMixin,
|
||||||
|
mixins.DestroyModelMixin,
|
||||||
|
UsedByMixin,
|
||||||
|
mixins.ListModelMixin,
|
||||||
|
GenericViewSet,
|
||||||
|
):
|
||||||
|
"""AccessToken Viewset"""
|
||||||
|
|
||||||
|
queryset = AccessToken.objects.all()
|
||||||
|
serializer_class = TokenModelSerializer
|
||||||
filterset_fields = ["user", "provider"]
|
filterset_fields = ["user", "provider"]
|
||||||
ordering = ["provider", "expires"]
|
ordering = ["provider", "expires"]
|
||||||
filter_backends = [
|
filter_backends = [
|
||||||
|
|
|
@ -19,6 +19,8 @@ SCOPE_OPENID = "openid"
|
||||||
SCOPE_OPENID_PROFILE = "profile"
|
SCOPE_OPENID_PROFILE = "profile"
|
||||||
SCOPE_OPENID_EMAIL = "email"
|
SCOPE_OPENID_EMAIL = "email"
|
||||||
|
|
||||||
|
TOKEN_TYPE = "Bearer" # nosec
|
||||||
|
|
||||||
SCOPE_AUTHENTIK_API = "goauthentik.io/api"
|
SCOPE_AUTHENTIK_API = "goauthentik.io/api"
|
||||||
|
|
||||||
# Read/write full user (including email)
|
# Read/write full user (including email)
|
||||||
|
|
|
@ -93,7 +93,7 @@ class TokenIntrospectionError(OAuth2Error):
|
||||||
"""
|
"""
|
||||||
Specific to the introspection endpoint. This error will be converted
|
Specific to the introspection endpoint. This error will be converted
|
||||||
to an "active: false" response, as per the spec.
|
to an "active: false" response, as per the spec.
|
||||||
See https://tools.ietf.org/html/rfc7662
|
See https://datatracker.ietf.org/doc/html/rfc7662
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
@ -102,7 +102,7 @@ class AuthorizeError(OAuth2Error):
|
||||||
|
|
||||||
errors = {
|
errors = {
|
||||||
# OAuth2 errors.
|
# OAuth2 errors.
|
||||||
# https://tools.ietf.org/html/rfc6749#section-4.1.2.1
|
# https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2.1
|
||||||
"invalid_request": "The request is otherwise malformed",
|
"invalid_request": "The request is otherwise malformed",
|
||||||
"unauthorized_client": (
|
"unauthorized_client": (
|
||||||
"The client is not authorized to request an authorization code using this method"
|
"The client is not authorized to request an authorization code using this method"
|
||||||
|
@ -185,7 +185,7 @@ class AuthorizeError(OAuth2Error):
|
||||||
class TokenError(OAuth2Error):
|
class TokenError(OAuth2Error):
|
||||||
"""
|
"""
|
||||||
OAuth2 token endpoint errors.
|
OAuth2 token endpoint errors.
|
||||||
https://tools.ietf.org/html/rfc6749#section-5.2
|
https://datatracker.ietf.org/doc/html/rfc6749#section-5.2
|
||||||
"""
|
"""
|
||||||
|
|
||||||
errors = {
|
errors = {
|
||||||
|
@ -220,7 +220,7 @@ class TokenError(OAuth2Error):
|
||||||
class TokenRevocationError(OAuth2Error):
|
class TokenRevocationError(OAuth2Error):
|
||||||
"""
|
"""
|
||||||
Specific to the revocation endpoint.
|
Specific to the revocation endpoint.
|
||||||
See https://tools.ietf.org/html/rfc7662
|
See https://datatracker.ietf.org/doc/html/rfc7662
|
||||||
"""
|
"""
|
||||||
|
|
||||||
errors = TokenError.errors | {
|
errors = TokenError.errors | {
|
||||||
|
@ -266,7 +266,7 @@ class DeviceCodeError(OAuth2Error):
|
||||||
class BearerTokenError(OAuth2Error):
|
class BearerTokenError(OAuth2Error):
|
||||||
"""
|
"""
|
||||||
OAuth2 errors.
|
OAuth2 errors.
|
||||||
https://tools.ietf.org/html/rfc6750#section-3.1
|
https://datatracker.ietf.org/doc/html/rfc6750#section-3.1
|
||||||
"""
|
"""
|
||||||
|
|
||||||
errors = {
|
errors = {
|
||||||
|
|
|
@ -0,0 +1,163 @@
|
||||||
|
"""id_token utils"""
|
||||||
|
from dataclasses import asdict, dataclass, field
|
||||||
|
from typing import TYPE_CHECKING, Any, Optional
|
||||||
|
|
||||||
|
from django.db import models
|
||||||
|
from django.http import HttpRequest
|
||||||
|
from django.utils import timezone
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
from authentik.events.signals import get_login_event
|
||||||
|
from authentik.lib.generators import generate_id
|
||||||
|
from authentik.providers.oauth2.constants import (
|
||||||
|
ACR_AUTHENTIK_DEFAULT,
|
||||||
|
AMR_MFA,
|
||||||
|
AMR_PASSWORD,
|
||||||
|
AMR_WEBAUTHN,
|
||||||
|
)
|
||||||
|
from authentik.stages.password.stage import PLAN_CONTEXT_METHOD, PLAN_CONTEXT_METHOD_ARGS
|
||||||
|
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from authentik.providers.oauth2.models import BaseGrantModel, OAuth2Provider
|
||||||
|
|
||||||
|
|
||||||
|
class SubModes(models.TextChoices):
|
||||||
|
"""Mode after which 'sub' attribute is generateed, for compatibility reasons"""
|
||||||
|
|
||||||
|
HASHED_USER_ID = "hashed_user_id", _("Based on the Hashed User ID")
|
||||||
|
USER_ID = "user_id", _("Based on user ID")
|
||||||
|
USER_USERNAME = "user_username", _("Based on the username")
|
||||||
|
USER_EMAIL = (
|
||||||
|
"user_email",
|
||||||
|
_("Based on the User's Email. This is recommended over the UPN method."),
|
||||||
|
)
|
||||||
|
USER_UPN = (
|
||||||
|
"user_upn",
|
||||||
|
_(
|
||||||
|
"Based on the User's UPN, only works if user has a 'upn' attribute set. "
|
||||||
|
"Use this method only if you have different UPN and Mail domains."
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
# pylint: disable=too-many-instance-attributes
|
||||||
|
class IDToken:
|
||||||
|
"""The primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be
|
||||||
|
Authenticated is the ID Token data structure. The ID Token is a security token that contains
|
||||||
|
Claims about the Authentication of an End-User by an Authorization Server when using a Client,
|
||||||
|
and potentially other requested Claims. The ID Token is represented as a
|
||||||
|
JSON Web Token (JWT) [JWT].
|
||||||
|
|
||||||
|
https://openid.net/specs/openid-connect-core-1_0.html#IDToken"""
|
||||||
|
|
||||||
|
# Issuer, https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.1
|
||||||
|
iss: Optional[str] = None
|
||||||
|
# Subject, https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.2
|
||||||
|
sub: Optional[str] = None
|
||||||
|
# Audience, https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.3
|
||||||
|
aud: Optional[str] = None
|
||||||
|
# Expiration time, https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.4
|
||||||
|
exp: Optional[int] = None
|
||||||
|
# Issued at, https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.6
|
||||||
|
iat: Optional[int] = None
|
||||||
|
# Time when the authentication occurred,
|
||||||
|
# https://openid.net/specs/openid-connect-core-1_0.html#IDToken
|
||||||
|
auth_time: Optional[int] = None
|
||||||
|
# Authentication Context Class Reference,
|
||||||
|
# https://openid.net/specs/openid-connect-core-1_0.html#IDToken
|
||||||
|
acr: Optional[str] = ACR_AUTHENTIK_DEFAULT
|
||||||
|
# Authentication Methods References,
|
||||||
|
# https://openid.net/specs/openid-connect-core-1_0.html#IDToken
|
||||||
|
amr: Optional[list[str]] = None
|
||||||
|
# Code hash value, http://openid.net/specs/openid-connect-core-1_0.html
|
||||||
|
c_hash: Optional[str] = None
|
||||||
|
# Value used to associate a Client session with an ID Token,
|
||||||
|
# http://openid.net/specs/openid-connect-core-1_0.html
|
||||||
|
nonce: Optional[str] = None
|
||||||
|
# Access Token hash value, http://openid.net/specs/openid-connect-core-1_0.html
|
||||||
|
at_hash: Optional[str] = None
|
||||||
|
|
||||||
|
claims: dict[str, Any] = field(default_factory=dict)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
# pylint: disable=too-many-locals
|
||||||
|
def new(
|
||||||
|
provider: "OAuth2Provider", token: "BaseGrantModel", request: HttpRequest, **kwargs
|
||||||
|
) -> "IDToken":
|
||||||
|
"""Create ID Token"""
|
||||||
|
id_token = IDToken(provider, token, **kwargs)
|
||||||
|
id_token.exp = int(token.expires.timestamp())
|
||||||
|
id_token.iss = provider.get_issuer(request)
|
||||||
|
id_token.aud = provider.client_id
|
||||||
|
id_token.claims = {}
|
||||||
|
|
||||||
|
if provider.sub_mode == SubModes.HASHED_USER_ID:
|
||||||
|
id_token.sub = token.user.uid
|
||||||
|
elif provider.sub_mode == SubModes.USER_ID:
|
||||||
|
id_token.sub = str(token.user.pk)
|
||||||
|
elif provider.sub_mode == SubModes.USER_EMAIL:
|
||||||
|
id_token.sub = token.user.email
|
||||||
|
elif provider.sub_mode == SubModes.USER_USERNAME:
|
||||||
|
id_token.sub = token.user.username
|
||||||
|
elif provider.sub_mode == SubModes.USER_UPN:
|
||||||
|
id_token.sub = token.user.attributes.get("upn", token.user.uid)
|
||||||
|
else:
|
||||||
|
raise ValueError(
|
||||||
|
f"Provider {provider} has invalid sub_mode selected: {provider.sub_mode}"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Convert datetimes into timestamps.
|
||||||
|
now = timezone.now()
|
||||||
|
id_token.iat = int(now.timestamp())
|
||||||
|
|
||||||
|
# We use the timestamp of the user's last successful login (EventAction.LOGIN) for auth_time
|
||||||
|
auth_event = get_login_event(request)
|
||||||
|
if auth_event:
|
||||||
|
auth_time = auth_event.created
|
||||||
|
id_token.auth_time = int(auth_time.timestamp())
|
||||||
|
# Also check which method was used for authentication
|
||||||
|
method = auth_event.context.get(PLAN_CONTEXT_METHOD, "")
|
||||||
|
method_args = auth_event.context.get(PLAN_CONTEXT_METHOD_ARGS, {})
|
||||||
|
amr = []
|
||||||
|
if method == "password":
|
||||||
|
amr.append(AMR_PASSWORD)
|
||||||
|
if method == "auth_webauthn_pwl":
|
||||||
|
amr.append(AMR_WEBAUTHN)
|
||||||
|
if "mfa_devices" in method_args:
|
||||||
|
if len(amr) > 0:
|
||||||
|
amr.append(AMR_MFA)
|
||||||
|
if amr:
|
||||||
|
id_token.amr = amr
|
||||||
|
|
||||||
|
# Include (or not) user standard claims in the id_token.
|
||||||
|
if provider.include_claims_in_id_token:
|
||||||
|
from authentik.providers.oauth2.views.userinfo import UserInfoView
|
||||||
|
|
||||||
|
user_info = UserInfoView()
|
||||||
|
user_info.request = request
|
||||||
|
id_token.claims = user_info.get_claims(token.provider, token)
|
||||||
|
return id_token
|
||||||
|
|
||||||
|
def to_dict(self) -> dict[str, Any]:
|
||||||
|
"""Convert dataclass to dict, and update with keys from `claims`"""
|
||||||
|
id_dict = asdict(self)
|
||||||
|
# All items without a value should be removed instead being set to None/null
|
||||||
|
# https://openid.net/specs/openid-connect-core-1_0.html#JSONSerialization
|
||||||
|
for key in list(id_dict.keys()):
|
||||||
|
if id_dict[key] is None:
|
||||||
|
id_dict.pop(key)
|
||||||
|
id_dict.pop("claims")
|
||||||
|
id_dict.update(self.claims)
|
||||||
|
return id_dict
|
||||||
|
|
||||||
|
def to_access_token(self, provider: "OAuth2Provider") -> str:
|
||||||
|
"""Encode id_token for use as access token, adding fields"""
|
||||||
|
final = self.to_dict()
|
||||||
|
final["azp"] = provider.client_id
|
||||||
|
final["uid"] = generate_id()
|
||||||
|
return provider.encode(final)
|
||||||
|
|
||||||
|
def to_jwt(self, provider: "OAuth2Provider") -> str:
|
||||||
|
"""Shortcut to encode id_token to jwt, signed by self.provider"""
|
||||||
|
return provider.encode(self.to_dict())
|
|
@ -0,0 +1,117 @@
|
||||||
|
# Generated by Django 4.1.6 on 2023-02-09 13:01
|
||||||
|
|
||||||
|
import django.db.models.deletion
|
||||||
|
from django.conf import settings
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
import authentik.core.models
|
||||||
|
import authentik.lib.generators
|
||||||
|
import authentik.lib.utils.time
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
dependencies = [
|
||||||
|
migrations.swappable_dependency(settings.AUTH_USER_MODEL),
|
||||||
|
("authentik_providers_oauth2", "0013_devicetoken"),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterModelOptions(
|
||||||
|
name="refreshtoken",
|
||||||
|
options={
|
||||||
|
"verbose_name": "OAuth2 Refresh Token",
|
||||||
|
"verbose_name_plural": "OAuth2 Refresh Tokens",
|
||||||
|
},
|
||||||
|
),
|
||||||
|
migrations.RenameField(
|
||||||
|
model_name="oauth2provider",
|
||||||
|
old_name="token_validity",
|
||||||
|
new_name="refresh_token_validity",
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name="authorizationcode",
|
||||||
|
name="is_open_id",
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name="refreshtoken",
|
||||||
|
name="access_token",
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name="refreshtoken",
|
||||||
|
name="refresh_token",
|
||||||
|
),
|
||||||
|
migrations.AddField(
|
||||||
|
model_name="oauth2provider",
|
||||||
|
name="access_token_validity",
|
||||||
|
field=models.TextField(
|
||||||
|
default="hours=1",
|
||||||
|
help_text="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).",
|
||||||
|
validators=[authentik.lib.utils.time.timedelta_string_validator],
|
||||||
|
),
|
||||||
|
),
|
||||||
|
migrations.AddField(
|
||||||
|
model_name="refreshtoken",
|
||||||
|
name="token",
|
||||||
|
field=models.TextField(default=authentik.lib.generators.generate_key),
|
||||||
|
),
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name="oauth2provider",
|
||||||
|
name="sub_mode",
|
||||||
|
field=models.TextField(
|
||||||
|
choices=[
|
||||||
|
("hashed_user_id", "Based on the Hashed User ID"),
|
||||||
|
("user_id", "Based on user ID"),
|
||||||
|
("user_username", "Based on the username"),
|
||||||
|
(
|
||||||
|
"user_email",
|
||||||
|
"Based on the User's Email. This is recommended over the UPN method.",
|
||||||
|
),
|
||||||
|
(
|
||||||
|
"user_upn",
|
||||||
|
"Based on the User's UPN, only works if user has a 'upn' attribute set. Use this method only if you have different UPN and Mail domains.",
|
||||||
|
),
|
||||||
|
],
|
||||||
|
default="hashed_user_id",
|
||||||
|
help_text="Configure what data should be used as unique User Identifier. For most cases, the default should be fine.",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name="AccessToken",
|
||||||
|
fields=[
|
||||||
|
(
|
||||||
|
"id",
|
||||||
|
models.AutoField(
|
||||||
|
auto_created=True, primary_key=True, serialize=False, verbose_name="ID"
|
||||||
|
),
|
||||||
|
),
|
||||||
|
(
|
||||||
|
"expires",
|
||||||
|
models.DateTimeField(default=authentik.core.models.default_token_duration),
|
||||||
|
),
|
||||||
|
("expiring", models.BooleanField(default=True)),
|
||||||
|
("revoked", models.BooleanField(default=False)),
|
||||||
|
("_scope", models.TextField(default="", verbose_name="Scopes")),
|
||||||
|
("token", models.TextField()),
|
||||||
|
("_id_token", models.TextField()),
|
||||||
|
(
|
||||||
|
"provider",
|
||||||
|
models.ForeignKey(
|
||||||
|
on_delete=django.db.models.deletion.CASCADE,
|
||||||
|
to="authentik_providers_oauth2.oauth2provider",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
(
|
||||||
|
"user",
|
||||||
|
models.ForeignKey(
|
||||||
|
on_delete=django.db.models.deletion.CASCADE,
|
||||||
|
to=settings.AUTH_USER_MODEL,
|
||||||
|
verbose_name="User",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
"verbose_name": "OAuth2 Access Token",
|
||||||
|
"verbose_name_plural": "OAuth2 Access Tokens",
|
||||||
|
},
|
||||||
|
),
|
||||||
|
]
|
|
@ -2,8 +2,6 @@
|
||||||
import base64
|
import base64
|
||||||
import binascii
|
import binascii
|
||||||
import json
|
import json
|
||||||
from dataclasses import asdict, dataclass, field
|
|
||||||
from datetime import datetime, timedelta
|
|
||||||
from functools import cached_property
|
from functools import cached_property
|
||||||
from hashlib import sha256
|
from hashlib import sha256
|
||||||
from typing import Any, Optional
|
from typing import Any, Optional
|
||||||
|
@ -15,26 +13,18 @@ from cryptography.hazmat.primitives.asymmetric.types import PRIVATE_KEY_TYPES
|
||||||
from dacite.core import from_dict
|
from dacite.core import from_dict
|
||||||
from django.db import models
|
from django.db import models
|
||||||
from django.http import HttpRequest
|
from django.http import HttpRequest
|
||||||
from django.utils import timezone
|
from django.urls import reverse
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
from jwt import encode
|
from jwt import encode
|
||||||
from rest_framework.serializers import Serializer
|
from rest_framework.serializers import Serializer
|
||||||
|
|
||||||
from authentik.core.models import ExpiringModel, PropertyMapping, Provider, User
|
from authentik.core.models import ExpiringModel, PropertyMapping, Provider, User
|
||||||
from authentik.crypto.models import CertificateKeyPair
|
from authentik.crypto.models import CertificateKeyPair
|
||||||
from authentik.events.signals import get_login_event
|
|
||||||
from authentik.lib.generators import generate_code_fixed_length, generate_id, generate_key
|
from authentik.lib.generators import generate_code_fixed_length, generate_id, generate_key
|
||||||
from authentik.lib.models import SerializerModel
|
from authentik.lib.models import SerializerModel
|
||||||
from authentik.lib.utils.time import timedelta_string_validator
|
from authentik.lib.utils.time import timedelta_string_validator
|
||||||
from authentik.providers.oauth2.apps import AuthentikProviderOAuth2Config
|
from authentik.providers.oauth2.id_token import IDToken, SubModes
|
||||||
from authentik.providers.oauth2.constants import (
|
|
||||||
ACR_AUTHENTIK_DEFAULT,
|
|
||||||
AMR_MFA,
|
|
||||||
AMR_PASSWORD,
|
|
||||||
AMR_WEBAUTHN,
|
|
||||||
)
|
|
||||||
from authentik.sources.oauth.models import OAuthSource
|
from authentik.sources.oauth.models import OAuthSource
|
||||||
from authentik.stages.password.stage import PLAN_CONTEXT_METHOD, PLAN_CONTEXT_METHOD_ARGS
|
|
||||||
|
|
||||||
|
|
||||||
class ClientTypes(models.TextChoices):
|
class ClientTypes(models.TextChoices):
|
||||||
|
@ -61,25 +51,6 @@ class ResponseMode(models.TextChoices):
|
||||||
FORM_POST = "form_post"
|
FORM_POST = "form_post"
|
||||||
|
|
||||||
|
|
||||||
class SubModes(models.TextChoices):
|
|
||||||
"""Mode after which 'sub' attribute is generateed, for compatibility reasons"""
|
|
||||||
|
|
||||||
HASHED_USER_ID = "hashed_user_id", _("Based on the Hashed User ID")
|
|
||||||
USER_ID = "user_id", _("Based on user ID")
|
|
||||||
USER_USERNAME = "user_username", _("Based on the username")
|
|
||||||
USER_EMAIL = (
|
|
||||||
"user_email",
|
|
||||||
_("Based on the User's Email. This is recommended over the UPN method."),
|
|
||||||
)
|
|
||||||
USER_UPN = (
|
|
||||||
"user_upn",
|
|
||||||
_(
|
|
||||||
"Based on the User's UPN, only works if user has a 'upn' attribute set. "
|
|
||||||
"Use this method only if you have different UPN and Mail domains."
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class IssuerMode(models.TextChoices):
|
class IssuerMode(models.TextChoices):
|
||||||
"""Configure how the `iss` field is created."""
|
"""Configure how the `iss` field is created."""
|
||||||
|
|
||||||
|
@ -187,7 +158,15 @@ class OAuth2Provider(Provider):
|
||||||
"(Format: hours=1;minutes=2;seconds=3)."
|
"(Format: hours=1;minutes=2;seconds=3)."
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
token_validity = models.TextField(
|
access_token_validity = models.TextField(
|
||||||
|
default="hours=1",
|
||||||
|
validators=[timedelta_string_validator],
|
||||||
|
help_text=_(
|
||||||
|
"Tokens not valid on or after current time + this value "
|
||||||
|
"(Format: hours=1;minutes=2;seconds=3)."
|
||||||
|
),
|
||||||
|
)
|
||||||
|
refresh_token_validity = models.TextField(
|
||||||
default="days=30",
|
default="days=30",
|
||||||
validators=[timedelta_string_validator],
|
validators=[timedelta_string_validator],
|
||||||
help_text=_(
|
help_text=_(
|
||||||
|
@ -230,24 +209,6 @@ class OAuth2Provider(Provider):
|
||||||
blank=True,
|
blank=True,
|
||||||
)
|
)
|
||||||
|
|
||||||
def create_refresh_token(
|
|
||||||
self,
|
|
||||||
user: User,
|
|
||||||
scope: list[str],
|
|
||||||
request: HttpRequest,
|
|
||||||
expiry: timedelta,
|
|
||||||
) -> "RefreshToken":
|
|
||||||
"""Create and populate a RefreshToken object."""
|
|
||||||
token = RefreshToken(
|
|
||||||
user=user,
|
|
||||||
provider=self,
|
|
||||||
refresh_token=base64.urlsafe_b64encode(generate_key().encode()).decode(),
|
|
||||||
expires=timezone.now() + expiry,
|
|
||||||
scope=scope,
|
|
||||||
)
|
|
||||||
token.access_token = token.create_access_token(user, request)
|
|
||||||
return token
|
|
||||||
|
|
||||||
@cached_property
|
@cached_property
|
||||||
def jwt_key(self) -> tuple[str | PRIVATE_KEY_TYPES, str]:
|
def jwt_key(self) -> tuple[str | PRIVATE_KEY_TYPES, str]:
|
||||||
"""Get either the configured certificate or the client secret"""
|
"""Get either the configured certificate or the client secret"""
|
||||||
|
@ -267,11 +228,15 @@ class OAuth2Provider(Provider):
|
||||||
if self.issuer_mode == IssuerMode.GLOBAL:
|
if self.issuer_mode == IssuerMode.GLOBAL:
|
||||||
return request.build_absolute_uri("/")
|
return request.build_absolute_uri("/")
|
||||||
try:
|
try:
|
||||||
mountpoint = AuthentikProviderOAuth2Config.mountpoints[
|
url = reverse(
|
||||||
"authentik.providers.oauth2.urls"
|
"authentik_providers_oauth2:provider-root",
|
||||||
]
|
kwargs={
|
||||||
|
# pylint: disable=no-member
|
||||||
|
"application_slug": self.application.slug,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
return request.build_absolute_uri(url)
|
||||||
# pylint: disable=no-member
|
# pylint: disable=no-member
|
||||||
return request.build_absolute_uri(f"/{mountpoint}{self.application.slug}/")
|
|
||||||
except Provider.application.RelatedObjectDoesNotExist:
|
except Provider.application.RelatedObjectDoesNotExist:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
@ -303,8 +268,6 @@ class OAuth2Provider(Provider):
|
||||||
if self.signing_key:
|
if self.signing_key:
|
||||||
headers["kid"] = self.signing_key.kid
|
headers["kid"] = self.signing_key.kid
|
||||||
key, alg = self.jwt_key
|
key, alg = self.jwt_key
|
||||||
# If the provider does not have an RSA Key assigned, it was switched to Symmetric
|
|
||||||
self.refresh_from_db()
|
|
||||||
return encode(payload, key, algorithm=alg, headers=headers)
|
return encode(payload, key, algorithm=alg, headers=headers)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
@ -338,7 +301,6 @@ class AuthorizationCode(SerializerModel, ExpiringModel, BaseGrantModel):
|
||||||
|
|
||||||
code = models.CharField(max_length=255, unique=True, verbose_name=_("Code"))
|
code = models.CharField(max_length=255, unique=True, verbose_name=_("Code"))
|
||||||
nonce = models.TextField(null=True, default=None, verbose_name=_("Nonce"))
|
nonce = models.TextField(null=True, default=None, verbose_name=_("Nonce"))
|
||||||
is_open_id = models.BooleanField(default=False, verbose_name=_("Is Authentication?"))
|
|
||||||
code_challenge = models.CharField(max_length=255, null=True, verbose_name=_("Code Challenge"))
|
code_challenge = models.CharField(max_length=255, null=True, verbose_name=_("Code Challenge"))
|
||||||
code_challenge_method = models.CharField(
|
code_challenge_method = models.CharField(
|
||||||
max_length=255, null=True, verbose_name=_("Code Challenge Method")
|
max_length=255, null=True, verbose_name=_("Code Challenge Method")
|
||||||
|
@ -368,88 +330,27 @@ class AuthorizationCode(SerializerModel, ExpiringModel, BaseGrantModel):
|
||||||
return f"Authorization code for {self.provider} for user {self.user}"
|
return f"Authorization code for {self.provider} for user {self.user}"
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
class AccessToken(SerializerModel, ExpiringModel, BaseGrantModel):
|
||||||
class IDToken:
|
"""OAuth2 access token, non-opaque using a JWT as identifier"""
|
||||||
"""The primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be
|
|
||||||
Authenticated is the ID Token data structure. The ID Token is a security token that contains
|
|
||||||
Claims about the Authentication of an End-User by an Authorization Server when using a Client,
|
|
||||||
and potentially other requested Claims. The ID Token is represented as a
|
|
||||||
JSON Web Token (JWT) [JWT].
|
|
||||||
|
|
||||||
https://openid.net/specs/openid-connect-core-1_0.html#IDToken"""
|
token = models.TextField()
|
||||||
|
_id_token = models.TextField()
|
||||||
# All these fields need to optional so we can save an empty IDToken for non-OpenID flows.
|
|
||||||
iss: Optional[str] = None
|
|
||||||
sub: Optional[str] = None
|
|
||||||
aud: Optional[str] = None
|
|
||||||
exp: Optional[int] = None
|
|
||||||
iat: Optional[int] = None
|
|
||||||
auth_time: Optional[int] = None
|
|
||||||
acr: Optional[str] = ACR_AUTHENTIK_DEFAULT
|
|
||||||
amr: Optional[list[str]] = None
|
|
||||||
|
|
||||||
c_hash: Optional[str] = None
|
|
||||||
nonce: Optional[str] = None
|
|
||||||
at_hash: Optional[str] = None
|
|
||||||
|
|
||||||
claims: dict[str, Any] = field(default_factory=dict)
|
|
||||||
|
|
||||||
def to_dict(self) -> dict[str, Any]:
|
|
||||||
"""Convert dataclass to dict, and update with keys from `claims`"""
|
|
||||||
id_dict = asdict(self)
|
|
||||||
# The following claims should be omitted if they aren't set instead of being
|
|
||||||
# set to null
|
|
||||||
if not self.at_hash:
|
|
||||||
id_dict.pop("at_hash")
|
|
||||||
if not self.nonce:
|
|
||||||
id_dict.pop("nonce")
|
|
||||||
if not self.c_hash:
|
|
||||||
id_dict.pop("c_hash")
|
|
||||||
if not self.amr:
|
|
||||||
id_dict.pop("amr")
|
|
||||||
if not self.auth_time:
|
|
||||||
id_dict.pop("auth_time")
|
|
||||||
id_dict.pop("claims")
|
|
||||||
id_dict.update(self.claims)
|
|
||||||
return id_dict
|
|
||||||
|
|
||||||
|
|
||||||
class RefreshToken(SerializerModel, ExpiringModel, BaseGrantModel):
|
|
||||||
"""OAuth2 Refresh Token"""
|
|
||||||
|
|
||||||
access_token = models.TextField(verbose_name=_("Access Token"))
|
|
||||||
refresh_token = models.CharField(max_length=255, unique=True, verbose_name=_("Refresh Token"))
|
|
||||||
_id_token = models.TextField(verbose_name=_("ID Token"))
|
|
||||||
|
|
||||||
@property
|
|
||||||
def serializer(self) -> Serializer:
|
|
||||||
from authentik.providers.oauth2.api.tokens import ExpiringBaseGrantModelSerializer
|
|
||||||
|
|
||||||
return ExpiringBaseGrantModelSerializer
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
verbose_name = _("OAuth2 Token")
|
|
||||||
verbose_name_plural = _("OAuth2 Tokens")
|
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def id_token(self) -> IDToken:
|
def id_token(self) -> IDToken:
|
||||||
"""Load ID Token from json"""
|
"""Load ID Token from json"""
|
||||||
if self._id_token:
|
|
||||||
raw_token = json.loads(self._id_token)
|
raw_token = json.loads(self._id_token)
|
||||||
return from_dict(IDToken, raw_token)
|
return from_dict(IDToken, raw_token)
|
||||||
return IDToken()
|
|
||||||
|
|
||||||
@id_token.setter
|
@id_token.setter
|
||||||
def id_token(self, value: IDToken):
|
def id_token(self, value: IDToken):
|
||||||
self._id_token = json.dumps(asdict(value))
|
self.token = value.to_access_token(self.provider)
|
||||||
|
self._id_token = json.dumps(value.to_dict())
|
||||||
def __str__(self):
|
|
||||||
return f"Refresh Token for {self.provider} for user {self.user}"
|
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def at_hash(self):
|
def at_hash(self):
|
||||||
"""Get hashed access_token"""
|
"""Get hashed access_token"""
|
||||||
hashed_access_token = sha256(self.access_token.encode("ascii")).hexdigest().encode("ascii")
|
hashed_access_token = sha256(self.token.encode("ascii")).hexdigest().encode("ascii")
|
||||||
return (
|
return (
|
||||||
base64.urlsafe_b64encode(
|
base64.urlsafe_b64encode(
|
||||||
binascii.unhexlify(hashed_access_token[: len(hashed_access_token) // 2])
|
binascii.unhexlify(hashed_access_token[: len(hashed_access_token) // 2])
|
||||||
|
@ -458,78 +359,52 @@ class RefreshToken(SerializerModel, ExpiringModel, BaseGrantModel):
|
||||||
.decode("ascii")
|
.decode("ascii")
|
||||||
)
|
)
|
||||||
|
|
||||||
def create_access_token(self, user: User, request: HttpRequest) -> str:
|
@property
|
||||||
"""Create access token with a similar format as Okta, Keycloak, ADFS"""
|
def serializer(self) -> Serializer:
|
||||||
token = self.create_id_token(user, request).to_dict()
|
from authentik.providers.oauth2.api.tokens import TokenModelSerializer
|
||||||
token["cid"] = self.provider.client_id
|
|
||||||
token["uid"] = generate_key()
|
|
||||||
return self.provider.encode(token)
|
|
||||||
|
|
||||||
# pylint: disable=too-many-locals
|
return TokenModelSerializer
|
||||||
def create_id_token(self, user: User, request: HttpRequest) -> IDToken:
|
|
||||||
"""Creates the id_token.
|
|
||||||
See: http://openid.net/specs/openid-connect-core-1_0.html#IDToken"""
|
|
||||||
sub = ""
|
|
||||||
if self.provider.sub_mode == SubModes.HASHED_USER_ID:
|
|
||||||
sub = user.uid
|
|
||||||
elif self.provider.sub_mode == SubModes.USER_ID:
|
|
||||||
sub = str(user.pk)
|
|
||||||
elif self.provider.sub_mode == SubModes.USER_EMAIL:
|
|
||||||
sub = user.email
|
|
||||||
elif self.provider.sub_mode == SubModes.USER_USERNAME:
|
|
||||||
sub = user.username
|
|
||||||
elif self.provider.sub_mode == SubModes.USER_UPN:
|
|
||||||
sub = user.attributes.get("upn", user.uid)
|
|
||||||
else:
|
|
||||||
raise ValueError(
|
|
||||||
f"Provider {self.provider} has invalid sub_mode selected: {self.provider.sub_mode}"
|
|
||||||
)
|
|
||||||
# Convert datetimes into timestamps.
|
|
||||||
now = datetime.now()
|
|
||||||
iat_time = int(now.timestamp())
|
|
||||||
exp_time = int(self.expires.timestamp())
|
|
||||||
|
|
||||||
token = IDToken(
|
class Meta:
|
||||||
iss=self.provider.get_issuer(request),
|
verbose_name = _("OAuth2 Access Token")
|
||||||
sub=sub,
|
verbose_name_plural = _("OAuth2 Access Tokens")
|
||||||
aud=self.provider.client_id,
|
|
||||||
exp=exp_time,
|
|
||||||
iat=iat_time,
|
|
||||||
)
|
|
||||||
|
|
||||||
# We use the timestamp of the user's last successful login (EventAction.LOGIN) for auth_time
|
def __str__(self):
|
||||||
auth_event = get_login_event(request)
|
return f"Access Token for {self.provider} for user {self.user}"
|
||||||
if auth_event:
|
|
||||||
auth_time = auth_event.created
|
|
||||||
token.auth_time = int(auth_time.timestamp())
|
|
||||||
# Also check which method was used for authentication
|
|
||||||
method = auth_event.context.get(PLAN_CONTEXT_METHOD, "")
|
|
||||||
method_args = auth_event.context.get(PLAN_CONTEXT_METHOD_ARGS, {})
|
|
||||||
amr = []
|
|
||||||
if method == "password":
|
|
||||||
amr.append(AMR_PASSWORD)
|
|
||||||
if method == "auth_webauthn_pwl":
|
|
||||||
amr.append(AMR_WEBAUTHN)
|
|
||||||
if "mfa_devices" in method_args:
|
|
||||||
if len(amr) > 0:
|
|
||||||
amr.append(AMR_MFA)
|
|
||||||
if amr:
|
|
||||||
token.amr = amr
|
|
||||||
|
|
||||||
# Include (or not) user standard claims in the id_token.
|
|
||||||
if self.provider.include_claims_in_id_token:
|
|
||||||
from authentik.providers.oauth2.views.userinfo import UserInfoView
|
|
||||||
|
|
||||||
user_info = UserInfoView()
|
class RefreshToken(SerializerModel, ExpiringModel, BaseGrantModel):
|
||||||
user_info.request = request
|
"""OAuth2 Refresh Token, opaque"""
|
||||||
claims = user_info.get_claims(self)
|
|
||||||
token.claims = claims
|
|
||||||
|
|
||||||
return token
|
token = models.TextField(default=generate_key)
|
||||||
|
_id_token = models.TextField(verbose_name=_("ID Token"))
|
||||||
|
|
||||||
|
@property
|
||||||
|
def id_token(self) -> IDToken:
|
||||||
|
"""Load ID Token from json"""
|
||||||
|
raw_token = json.loads(self._id_token)
|
||||||
|
return from_dict(IDToken, raw_token)
|
||||||
|
|
||||||
|
@id_token.setter
|
||||||
|
def id_token(self, value: IDToken):
|
||||||
|
self._id_token = json.dumps(value.to_dict())
|
||||||
|
|
||||||
|
@property
|
||||||
|
def serializer(self) -> Serializer:
|
||||||
|
from authentik.providers.oauth2.api.tokens import TokenModelSerializer
|
||||||
|
|
||||||
|
return TokenModelSerializer
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
verbose_name = _("OAuth2 Refresh Token")
|
||||||
|
verbose_name_plural = _("OAuth2 Refresh Tokens")
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return f"Refresh Token for {self.provider} for user {self.user}"
|
||||||
|
|
||||||
|
|
||||||
class DeviceToken(ExpiringModel):
|
class DeviceToken(ExpiringModel):
|
||||||
"""Device token for OAuth device flow"""
|
"""Temporary device token for OAuth device flow"""
|
||||||
|
|
||||||
user = models.ForeignKey(
|
user = models.ForeignKey(
|
||||||
"authentik_core.User", default=None, on_delete=models.CASCADE, null=True
|
"authentik_core.User", default=None, on_delete=models.CASCADE, null=True
|
||||||
|
|
|
@ -11,12 +11,13 @@ from authentik.events.models import Event, EventAction
|
||||||
from authentik.flows.challenge import ChallengeTypes
|
from authentik.flows.challenge import ChallengeTypes
|
||||||
from authentik.lib.generators import generate_id, generate_key
|
from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.lib.utils.time import timedelta_from_string
|
from authentik.lib.utils.time import timedelta_from_string
|
||||||
|
from authentik.providers.oauth2.constants import TOKEN_TYPE
|
||||||
from authentik.providers.oauth2.errors import AuthorizeError, ClientIdError, RedirectUriError
|
from authentik.providers.oauth2.errors import AuthorizeError, ClientIdError, RedirectUriError
|
||||||
from authentik.providers.oauth2.models import (
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
AuthorizationCode,
|
AuthorizationCode,
|
||||||
GrantTypes,
|
GrantTypes,
|
||||||
OAuth2Provider,
|
OAuth2Provider,
|
||||||
RefreshToken,
|
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
from authentik.providers.oauth2.views.authorize import OAuthAuthorizationParams
|
from authentik.providers.oauth2.views.authorize import OAuthAuthorizationParams
|
||||||
|
@ -293,21 +294,20 @@ class TestAuthorize(OAuthTestCase):
|
||||||
def test_full_implicit(self):
|
def test_full_implicit(self):
|
||||||
"""Test full authorization"""
|
"""Test full authorization"""
|
||||||
flow = create_test_flow()
|
flow = create_test_flow()
|
||||||
provider = OAuth2Provider.objects.create(
|
provider: OAuth2Provider = OAuth2Provider.objects.create(
|
||||||
name=generate_id(),
|
name=generate_id(),
|
||||||
client_id="test",
|
client_id="test",
|
||||||
client_secret=generate_key(),
|
client_secret=generate_key(),
|
||||||
authorization_flow=flow,
|
authorization_flow=flow,
|
||||||
redirect_uris="http://localhost",
|
redirect_uris="http://localhost",
|
||||||
signing_key=self.keypair,
|
signing_key=self.keypair,
|
||||||
access_code_validity="seconds=100",
|
|
||||||
)
|
)
|
||||||
Application.objects.create(name="app", slug="app", provider=provider)
|
Application.objects.create(name="app", slug="app", provider=provider)
|
||||||
state = generate_id()
|
state = generate_id()
|
||||||
user = create_test_admin_user()
|
user = create_test_admin_user()
|
||||||
self.client.force_login(user)
|
self.client.force_login(user)
|
||||||
with patch(
|
with patch(
|
||||||
"authentik.providers.oauth2.models.get_login_event",
|
"authentik.providers.oauth2.id_token.get_login_event",
|
||||||
MagicMock(
|
MagicMock(
|
||||||
return_value=Event(
|
return_value=Event(
|
||||||
action=EventAction.LOGIN,
|
action=EventAction.LOGIN,
|
||||||
|
@ -330,16 +330,17 @@ class TestAuthorize(OAuthTestCase):
|
||||||
response = self.client.get(
|
response = self.client.get(
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
||||||
)
|
)
|
||||||
token: RefreshToken = RefreshToken.objects.filter(user=user).first()
|
token: AccessToken = AccessToken.objects.filter(user=user).first()
|
||||||
expires = timedelta_from_string(provider.access_code_validity).total_seconds()
|
expires = timedelta_from_string(provider.access_token_validity).total_seconds()
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
response.content.decode(),
|
response.content.decode(),
|
||||||
{
|
{
|
||||||
"component": "xak-flow-redirect",
|
"component": "xak-flow-redirect",
|
||||||
"type": ChallengeTypes.REDIRECT.value,
|
"type": ChallengeTypes.REDIRECT.value,
|
||||||
"to": (
|
"to": (
|
||||||
f"http://localhost#access_token={token.access_token}"
|
f"http://localhost#access_token={token.token}"
|
||||||
f"&id_token={provider.encode(token.id_token.to_dict())}&token_type=bearer"
|
f"&id_token={provider.encode(token.id_token.to_dict())}"
|
||||||
|
f"&token_type={TOKEN_TYPE}"
|
||||||
f"&expires_in={int(expires)}&state={state}"
|
f"&expires_in={int(expires)}&state={state}"
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
|
@ -382,7 +383,7 @@ class TestAuthorize(OAuthTestCase):
|
||||||
response = self.client.get(
|
response = self.client.get(
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
||||||
)
|
)
|
||||||
token: RefreshToken = RefreshToken.objects.filter(user=user).first()
|
token: AccessToken = AccessToken.objects.filter(user=user).first()
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
response.content.decode(),
|
response.content.decode(),
|
||||||
{
|
{
|
||||||
|
@ -391,10 +392,10 @@ class TestAuthorize(OAuthTestCase):
|
||||||
"url": "http://localhost",
|
"url": "http://localhost",
|
||||||
"title": f"Redirecting to {app.name}...",
|
"title": f"Redirecting to {app.name}...",
|
||||||
"attrs": {
|
"attrs": {
|
||||||
"access_token": token.access_token,
|
"access_token": token.token,
|
||||||
"id_token": provider.encode(token.id_token.to_dict()),
|
"id_token": provider.encode(token.id_token.to_dict()),
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": "60",
|
"expires_in": "3600",
|
||||||
"state": state,
|
"state": state,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -9,7 +9,7 @@ from authentik.core.models import Application
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
||||||
from authentik.lib.generators import generate_id, generate_key
|
from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.providers.oauth2.constants import ACR_AUTHENTIK_DEFAULT
|
from authentik.providers.oauth2.constants import ACR_AUTHENTIK_DEFAULT
|
||||||
from authentik.providers.oauth2.models import IDToken, OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, IDToken, OAuth2Provider, RefreshToken
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
|
|
||||||
|
|
||||||
|
@ -31,11 +31,16 @@ class TesOAuth2Introspection(OAuthTestCase):
|
||||||
)
|
)
|
||||||
self.app.save()
|
self.app.save()
|
||||||
self.user = create_test_admin_user()
|
self.user = create_test_admin_user()
|
||||||
self.token: RefreshToken = RefreshToken.objects.create(
|
self.auth = b64encode(
|
||||||
|
f"{self.provider.client_id}:{self.provider.client_secret}".encode()
|
||||||
|
).decode()
|
||||||
|
|
||||||
|
def test_introspect_refresh(self):
|
||||||
|
"""Test introspect"""
|
||||||
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=self.provider,
|
provider=self.provider,
|
||||||
user=self.user,
|
user=self.user,
|
||||||
access_token=generate_id(),
|
token=generate_id(),
|
||||||
refresh_token=generate_id(),
|
|
||||||
_scope="openid user profile",
|
_scope="openid user profile",
|
||||||
_id_token=json.dumps(
|
_id_token=json.dumps(
|
||||||
asdict(
|
asdict(
|
||||||
|
@ -43,30 +48,52 @@ class TesOAuth2Introspection(OAuthTestCase):
|
||||||
)
|
)
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
self.auth = b64encode(
|
|
||||||
f"{self.provider.client_id}:{self.provider.client_secret}".encode()
|
|
||||||
).decode()
|
|
||||||
|
|
||||||
def test_introspect(self):
|
|
||||||
"""Test introspect"""
|
|
||||||
res = self.client.post(
|
res = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token-introspection"),
|
reverse("authentik_providers_oauth2:token-introspection"),
|
||||||
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
||||||
data={"token": self.token.refresh_token, "token_type_hint": "refresh_token"},
|
data={"token": token.token},
|
||||||
)
|
)
|
||||||
self.assertEqual(res.status_code, 200)
|
self.assertEqual(res.status_code, 200)
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
res.content.decode(),
|
res.content.decode(),
|
||||||
{
|
{
|
||||||
"acr": ACR_AUTHENTIK_DEFAULT,
|
"acr": ACR_AUTHENTIK_DEFAULT,
|
||||||
"aud": None,
|
|
||||||
"sub": "bar",
|
"sub": "bar",
|
||||||
"exp": None,
|
|
||||||
"iat": None,
|
|
||||||
"iss": "foo",
|
"iss": "foo",
|
||||||
"active": True,
|
"active": True,
|
||||||
"client_id": self.provider.client_id,
|
"client_id": self.provider.client_id,
|
||||||
"scope": " ".join(self.token.scope),
|
"scope": " ".join(token.scope),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_introspect_access(self):
|
||||||
|
"""Test introspect"""
|
||||||
|
token: AccessToken = AccessToken.objects.create(
|
||||||
|
provider=self.provider,
|
||||||
|
user=self.user,
|
||||||
|
token=generate_id(),
|
||||||
|
_scope="openid user profile",
|
||||||
|
_id_token=json.dumps(
|
||||||
|
asdict(
|
||||||
|
IDToken("foo", "bar"),
|
||||||
|
)
|
||||||
|
),
|
||||||
|
)
|
||||||
|
res = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token-introspection"),
|
||||||
|
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
||||||
|
data={"token": token.token},
|
||||||
|
)
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
self.assertJSONEqual(
|
||||||
|
res.content.decode(),
|
||||||
|
{
|
||||||
|
"acr": ACR_AUTHENTIK_DEFAULT,
|
||||||
|
"sub": "bar",
|
||||||
|
"iss": "foo",
|
||||||
|
"active": True,
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"scope": " ".join(token.scope),
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ from django.urls import reverse
|
||||||
from authentik.core.models import Application
|
from authentik.core.models import Application
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
||||||
from authentik.lib.generators import generate_id, generate_key
|
from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.providers.oauth2.models import IDToken, OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, IDToken, OAuth2Provider, RefreshToken
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
|
|
||||||
|
|
||||||
|
@ -30,11 +30,16 @@ class TesOAuth2Revoke(OAuthTestCase):
|
||||||
)
|
)
|
||||||
self.app.save()
|
self.app.save()
|
||||||
self.user = create_test_admin_user()
|
self.user = create_test_admin_user()
|
||||||
self.token: RefreshToken = RefreshToken.objects.create(
|
self.auth = b64encode(
|
||||||
|
f"{self.provider.client_id}:{self.provider.client_secret}".encode()
|
||||||
|
).decode()
|
||||||
|
|
||||||
|
def test_revoke_refresh(self):
|
||||||
|
"""Test revoke"""
|
||||||
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=self.provider,
|
provider=self.provider,
|
||||||
user=self.user,
|
user=self.user,
|
||||||
access_token=generate_id(),
|
token=generate_id(),
|
||||||
refresh_token=generate_id(),
|
|
||||||
_scope="openid user profile",
|
_scope="openid user profile",
|
||||||
_id_token=json.dumps(
|
_id_token=json.dumps(
|
||||||
asdict(
|
asdict(
|
||||||
|
@ -42,16 +47,34 @@ class TesOAuth2Revoke(OAuthTestCase):
|
||||||
)
|
)
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
self.auth = b64encode(
|
|
||||||
f"{self.provider.client_id}:{self.provider.client_secret}".encode()
|
|
||||||
).decode()
|
|
||||||
|
|
||||||
def test_revoke(self):
|
|
||||||
"""Test revoke"""
|
|
||||||
res = self.client.post(
|
res = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token-revoke"),
|
reverse("authentik_providers_oauth2:token-revoke"),
|
||||||
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
||||||
data={"token": self.token.refresh_token, "token_type_hint": "refresh_token"},
|
data={
|
||||||
|
"token": token.token,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
def test_revoke_access(self):
|
||||||
|
"""Test revoke"""
|
||||||
|
token: AccessToken = AccessToken.objects.create(
|
||||||
|
provider=self.provider,
|
||||||
|
user=self.user,
|
||||||
|
token=generate_id(),
|
||||||
|
_scope="openid user profile",
|
||||||
|
_id_token=json.dumps(
|
||||||
|
asdict(
|
||||||
|
IDToken("foo", "bar"),
|
||||||
|
)
|
||||||
|
),
|
||||||
|
)
|
||||||
|
res = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token-revoke"),
|
||||||
|
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
||||||
|
data={
|
||||||
|
"token": token.token,
|
||||||
|
},
|
||||||
)
|
)
|
||||||
self.assertEqual(res.status_code, 200)
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
@ -60,7 +83,9 @@ class TesOAuth2Revoke(OAuthTestCase):
|
||||||
res = self.client.post(
|
res = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token-revoke"),
|
reverse("authentik_providers_oauth2:token-revoke"),
|
||||||
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
HTTP_AUTHORIZATION=f"Basic {self.auth}",
|
||||||
data={"token": self.token.refresh_token + "foo", "token_type_hint": "refresh_token"},
|
data={
|
||||||
|
"token": generate_id(),
|
||||||
|
},
|
||||||
)
|
)
|
||||||
self.assertEqual(res.status_code, 200)
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
@ -69,6 +94,8 @@ class TesOAuth2Revoke(OAuthTestCase):
|
||||||
res = self.client.post(
|
res = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token-revoke"),
|
reverse("authentik_providers_oauth2:token-revoke"),
|
||||||
HTTP_AUTHORIZATION="Basic fqewr",
|
HTTP_AUTHORIZATION="Basic fqewr",
|
||||||
data={"token": self.token.refresh_token, "token_type_hint": "refresh_token"},
|
data={
|
||||||
|
"token": generate_id(),
|
||||||
|
},
|
||||||
)
|
)
|
||||||
self.assertEqual(res.status_code, 401)
|
self.assertEqual(res.status_code, 401)
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
"""Test token view"""
|
"""Test token view"""
|
||||||
from base64 import b64encode
|
from base64 import b64encode
|
||||||
|
from json import dumps
|
||||||
|
|
||||||
from django.test import RequestFactory
|
from django.test import RequestFactory
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
|
@ -11,9 +12,15 @@ from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.providers.oauth2.constants import (
|
from authentik.providers.oauth2.constants import (
|
||||||
GRANT_TYPE_AUTHORIZATION_CODE,
|
GRANT_TYPE_AUTHORIZATION_CODE,
|
||||||
GRANT_TYPE_REFRESH_TOKEN,
|
GRANT_TYPE_REFRESH_TOKEN,
|
||||||
|
TOKEN_TYPE,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.errors import TokenError
|
from authentik.providers.oauth2.errors import TokenError
|
||||||
from authentik.providers.oauth2.models import AuthorizationCode, OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
|
AuthorizationCode,
|
||||||
|
OAuth2Provider,
|
||||||
|
RefreshToken,
|
||||||
|
)
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
from authentik.providers.oauth2.views.token import TokenParams
|
from authentik.providers.oauth2.views.token import TokenParams
|
||||||
|
|
||||||
|
@ -91,13 +98,13 @@ class TestToken(OAuthTestCase):
|
||||||
token: RefreshToken = RefreshToken.objects.create(
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=provider,
|
provider=provider,
|
||||||
user=user,
|
user=user,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
)
|
)
|
||||||
request = self.factory.post(
|
request = self.factory.post(
|
||||||
"/",
|
"/",
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": token.refresh_token,
|
"refresh_token": token.token,
|
||||||
"redirect_uri": "http://local.invalid",
|
"redirect_uri": "http://local.invalid",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
|
@ -120,9 +127,7 @@ class TestToken(OAuthTestCase):
|
||||||
self.app.save()
|
self.app.save()
|
||||||
header = b64encode(f"{provider.client_id}:{provider.client_secret}".encode()).decode()
|
header = b64encode(f"{provider.client_id}:{provider.client_secret}".encode()).decode()
|
||||||
user = create_test_admin_user()
|
user = create_test_admin_user()
|
||||||
code = AuthorizationCode.objects.create(
|
code = AuthorizationCode.objects.create(code="foobar", provider=provider, user=user)
|
||||||
code="foobar", provider=provider, user=user, is_open_id=True
|
|
||||||
)
|
|
||||||
response = self.client.post(
|
response = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
|
@ -132,20 +137,21 @@ class TestToken(OAuthTestCase):
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
)
|
)
|
||||||
new_token: RefreshToken = RefreshToken.objects.filter(user=user).first()
|
access: AccessToken = AccessToken.objects.filter(user=user, provider=provider).first()
|
||||||
|
refresh: RefreshToken = RefreshToken.objects.filter(user=user, provider=provider).first()
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
response.content.decode(),
|
response.content.decode(),
|
||||||
{
|
{
|
||||||
"access_token": new_token.access_token,
|
"access_token": access.token,
|
||||||
"refresh_token": new_token.refresh_token,
|
"refresh_token": refresh.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": 2592000,
|
"expires_in": 3600,
|
||||||
"id_token": provider.encode(
|
"id_token": provider.encode(
|
||||||
new_token.id_token.to_dict(),
|
refresh.id_token.to_dict(),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
self.validate_jwt(new_token, provider)
|
self.validate_jwt(access, provider)
|
||||||
|
|
||||||
def test_refresh_token_view(self):
|
def test_refresh_token_view(self):
|
||||||
"""test request param"""
|
"""test request param"""
|
||||||
|
@ -165,36 +171,38 @@ class TestToken(OAuthTestCase):
|
||||||
token: RefreshToken = RefreshToken.objects.create(
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=provider,
|
provider=provider,
|
||||||
user=user,
|
user=user,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
|
_id_token=dumps({}),
|
||||||
)
|
)
|
||||||
response = self.client.post(
|
response = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": token.refresh_token,
|
"refresh_token": token.token,
|
||||||
"redirect_uri": "http://local.invalid",
|
"redirect_uri": "http://local.invalid",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
HTTP_ORIGIN="http://local.invalid",
|
HTTP_ORIGIN="http://local.invalid",
|
||||||
)
|
)
|
||||||
new_token: RefreshToken = (
|
|
||||||
RefreshToken.objects.filter(user=user).exclude(pk=token.pk).first()
|
|
||||||
)
|
|
||||||
self.assertEqual(response["Access-Control-Allow-Credentials"], "true")
|
self.assertEqual(response["Access-Control-Allow-Credentials"], "true")
|
||||||
self.assertEqual(response["Access-Control-Allow-Origin"], "http://local.invalid")
|
self.assertEqual(response["Access-Control-Allow-Origin"], "http://local.invalid")
|
||||||
|
access: AccessToken = AccessToken.objects.filter(user=user, provider=provider).first()
|
||||||
|
refresh: RefreshToken = RefreshToken.objects.filter(
|
||||||
|
user=user, provider=provider, revoked=False
|
||||||
|
).first()
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
response.content.decode(),
|
response.content.decode(),
|
||||||
{
|
{
|
||||||
"access_token": new_token.access_token,
|
"access_token": access.token,
|
||||||
"refresh_token": new_token.refresh_token,
|
"refresh_token": refresh.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": 2592000,
|
"expires_in": 3600,
|
||||||
"id_token": provider.encode(
|
"id_token": provider.encode(
|
||||||
new_token.id_token.to_dict(),
|
refresh.id_token.to_dict(),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
self.validate_jwt(new_token, provider)
|
self.validate_jwt(access, provider)
|
||||||
|
|
||||||
def test_refresh_token_view_invalid_origin(self):
|
def test_refresh_token_view_invalid_origin(self):
|
||||||
"""test request param"""
|
"""test request param"""
|
||||||
|
@ -211,32 +219,34 @@ class TestToken(OAuthTestCase):
|
||||||
token: RefreshToken = RefreshToken.objects.create(
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=provider,
|
provider=provider,
|
||||||
user=user,
|
user=user,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
|
_id_token=dumps({}),
|
||||||
)
|
)
|
||||||
response = self.client.post(
|
response = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": token.refresh_token,
|
"refresh_token": token.token,
|
||||||
"redirect_uri": "http://local.invalid",
|
"redirect_uri": "http://local.invalid",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
HTTP_ORIGIN="http://another.invalid",
|
HTTP_ORIGIN="http://another.invalid",
|
||||||
)
|
)
|
||||||
new_token: RefreshToken = (
|
access: AccessToken = AccessToken.objects.filter(user=user, provider=provider).first()
|
||||||
RefreshToken.objects.filter(user=user).exclude(pk=token.pk).first()
|
refresh: RefreshToken = RefreshToken.objects.filter(
|
||||||
)
|
user=user, provider=provider, revoked=False
|
||||||
|
).first()
|
||||||
self.assertNotIn("Access-Control-Allow-Credentials", response)
|
self.assertNotIn("Access-Control-Allow-Credentials", response)
|
||||||
self.assertNotIn("Access-Control-Allow-Origin", response)
|
self.assertNotIn("Access-Control-Allow-Origin", response)
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
response.content.decode(),
|
response.content.decode(),
|
||||||
{
|
{
|
||||||
"access_token": new_token.access_token,
|
"access_token": access.token,
|
||||||
"refresh_token": new_token.refresh_token,
|
"refresh_token": refresh.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": 2592000,
|
"expires_in": 3600,
|
||||||
"id_token": provider.encode(
|
"id_token": provider.encode(
|
||||||
new_token.id_token.to_dict(),
|
refresh.id_token.to_dict(),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
|
@ -259,14 +269,15 @@ class TestToken(OAuthTestCase):
|
||||||
token: RefreshToken = RefreshToken.objects.create(
|
token: RefreshToken = RefreshToken.objects.create(
|
||||||
provider=provider,
|
provider=provider,
|
||||||
user=user,
|
user=user,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
|
_id_token=dumps({}),
|
||||||
)
|
)
|
||||||
# Create initial refresh token
|
# Create initial refresh token
|
||||||
response = self.client.post(
|
response = self.client.post(
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": token.refresh_token,
|
"refresh_token": token.token,
|
||||||
"redirect_uri": "http://testserver",
|
"redirect_uri": "http://testserver",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
|
@ -280,7 +291,7 @@ class TestToken(OAuthTestCase):
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": new_token.refresh_token,
|
"refresh_token": new_token.token,
|
||||||
"redirect_uri": "http://local.invalid",
|
"redirect_uri": "http://local.invalid",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
|
@ -291,7 +302,7 @@ class TestToken(OAuthTestCase):
|
||||||
reverse("authentik_providers_oauth2:token"),
|
reverse("authentik_providers_oauth2:token"),
|
||||||
data={
|
data={
|
||||||
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
"grant_type": GRANT_TYPE_REFRESH_TOKEN,
|
||||||
"refresh_token": new_token.refresh_token,
|
"refresh_token": new_token.token,
|
||||||
"redirect_uri": "http://local.invalid",
|
"redirect_uri": "http://local.invalid",
|
||||||
},
|
},
|
||||||
HTTP_AUTHORIZATION=f"Basic {header}",
|
HTTP_AUTHORIZATION=f"Basic {header}",
|
||||||
|
|
|
@ -15,6 +15,7 @@ from authentik.providers.oauth2.constants import (
|
||||||
SCOPE_OPENID,
|
SCOPE_OPENID,
|
||||||
SCOPE_OPENID_EMAIL,
|
SCOPE_OPENID_EMAIL,
|
||||||
SCOPE_OPENID_PROFILE,
|
SCOPE_OPENID_PROFILE,
|
||||||
|
TOKEN_TYPE,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.errors import TokenError
|
from authentik.providers.oauth2.errors import TokenError
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, ScopeMapping
|
from authentik.providers.oauth2.models import OAuth2Provider, ScopeMapping
|
||||||
|
@ -142,7 +143,7 @@ class TestTokenClientCredentials(OAuthTestCase):
|
||||||
)
|
)
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
body = loads(response.content.decode())
|
body = loads(response.content.decode())
|
||||||
self.assertEqual(body["token_type"], "bearer")
|
self.assertEqual(body["token_type"], TOKEN_TYPE)
|
||||||
_, alg = self.provider.jwt_key
|
_, alg = self.provider.jwt_key
|
||||||
jwt = decode(
|
jwt = decode(
|
||||||
body["access_token"],
|
body["access_token"],
|
||||||
|
|
|
@ -16,6 +16,7 @@ from authentik.providers.oauth2.constants import (
|
||||||
SCOPE_OPENID,
|
SCOPE_OPENID,
|
||||||
SCOPE_OPENID_EMAIL,
|
SCOPE_OPENID_EMAIL,
|
||||||
SCOPE_OPENID_PROFILE,
|
SCOPE_OPENID_PROFILE,
|
||||||
|
TOKEN_TYPE,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, ScopeMapping
|
from authentik.providers.oauth2.models import OAuth2Provider, ScopeMapping
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
|
@ -209,7 +210,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
||||||
)
|
)
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
body = loads(response.content.decode())
|
body = loads(response.content.decode())
|
||||||
self.assertEqual(body["token_type"], "bearer")
|
self.assertEqual(body["token_type"], TOKEN_TYPE)
|
||||||
_, alg = self.provider.jwt_key
|
_, alg = self.provider.jwt_key
|
||||||
jwt = decode(
|
jwt = decode(
|
||||||
body["access_token"],
|
body["access_token"],
|
||||||
|
|
|
@ -9,7 +9,7 @@ from authentik.core.models import Application
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_cert, create_test_flow
|
||||||
from authentik.events.models import Event, EventAction
|
from authentik.events.models import Event, EventAction
|
||||||
from authentik.lib.generators import generate_id, generate_key
|
from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.providers.oauth2.models import IDToken, OAuth2Provider, RefreshToken, ScopeMapping
|
from authentik.providers.oauth2.models import AccessToken, IDToken, OAuth2Provider, ScopeMapping
|
||||||
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
|
|
||||||
|
|
||||||
|
@ -33,11 +33,10 @@ class TestUserinfo(OAuthTestCase):
|
||||||
self.app.provider = self.provider
|
self.app.provider = self.provider
|
||||||
self.app.save()
|
self.app.save()
|
||||||
self.user = create_test_admin_user()
|
self.user = create_test_admin_user()
|
||||||
self.token: RefreshToken = RefreshToken.objects.create(
|
self.token: AccessToken = AccessToken.objects.create(
|
||||||
provider=self.provider,
|
provider=self.provider,
|
||||||
user=self.user,
|
user=self.user,
|
||||||
access_token=generate_id(),
|
token=generate_id(),
|
||||||
refresh_token=generate_id(),
|
|
||||||
_scope="openid user profile",
|
_scope="openid user profile",
|
||||||
_id_token=json.dumps(
|
_id_token=json.dumps(
|
||||||
asdict(
|
asdict(
|
||||||
|
@ -50,7 +49,7 @@ class TestUserinfo(OAuthTestCase):
|
||||||
"""test user info with all normal scopes"""
|
"""test user info with all normal scopes"""
|
||||||
res = self.client.get(
|
res = self.client.get(
|
||||||
reverse("authentik_providers_oauth2:userinfo"),
|
reverse("authentik_providers_oauth2:userinfo"),
|
||||||
HTTP_AUTHORIZATION=f"Bearer {self.token.access_token}",
|
HTTP_AUTHORIZATION=f"Bearer {self.token.token}",
|
||||||
)
|
)
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
res.content.decode(),
|
res.content.decode(),
|
||||||
|
@ -73,7 +72,7 @@ class TestUserinfo(OAuthTestCase):
|
||||||
|
|
||||||
res = self.client.get(
|
res = self.client.get(
|
||||||
reverse("authentik_providers_oauth2:userinfo"),
|
reverse("authentik_providers_oauth2:userinfo"),
|
||||||
HTTP_AUTHORIZATION=f"Bearer {self.token.access_token}",
|
HTTP_AUTHORIZATION=f"Bearer {self.token.token}",
|
||||||
)
|
)
|
||||||
self.assertJSONEqual(
|
self.assertJSONEqual(
|
||||||
res.content.decode(),
|
res.content.decode(),
|
||||||
|
|
|
@ -6,7 +6,7 @@ from jwt import decode
|
||||||
|
|
||||||
from authentik.core.tests.utils import create_test_cert
|
from authentik.core.tests.utils import create_test_cert
|
||||||
from authentik.crypto.models import CertificateKeyPair
|
from authentik.crypto.models import CertificateKeyPair
|
||||||
from authentik.providers.oauth2.models import JWTAlgorithms, OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, JWTAlgorithms, OAuth2Provider
|
||||||
|
|
||||||
|
|
||||||
class OAuthTestCase(TestCase):
|
class OAuthTestCase(TestCase):
|
||||||
|
@ -25,19 +25,20 @@ class OAuthTestCase(TestCase):
|
||||||
def setUpClass(cls) -> None:
|
def setUpClass(cls) -> None:
|
||||||
cls.keypair = create_test_cert()
|
cls.keypair = create_test_cert()
|
||||||
super().setUpClass()
|
super().setUpClass()
|
||||||
|
cls.maxDiff = None
|
||||||
|
|
||||||
def assert_non_none_or_unset(self, container: dict, key: str):
|
def assert_non_none_or_unset(self, container: dict, key: str):
|
||||||
"""Check that a key, if set, is not none"""
|
"""Check that a key, if set, is not none"""
|
||||||
if key in container:
|
if key in container:
|
||||||
self.assertIsNotNone(container[key])
|
self.assertIsNotNone(container[key])
|
||||||
|
|
||||||
def validate_jwt(self, token: RefreshToken, provider: OAuth2Provider) -> dict[str, Any]:
|
def validate_jwt(self, token: AccessToken, provider: OAuth2Provider) -> dict[str, Any]:
|
||||||
"""Validate that all required fields are set"""
|
"""Validate that all required fields are set"""
|
||||||
key, alg = provider.jwt_key
|
key, alg = provider.jwt_key
|
||||||
if alg != JWTAlgorithms.HS256:
|
if alg != JWTAlgorithms.HS256:
|
||||||
key = provider.signing_key.public_key
|
key = provider.signing_key.public_key
|
||||||
jwt = decode(
|
jwt = decode(
|
||||||
token.access_token,
|
token.token,
|
||||||
key,
|
key,
|
||||||
algorithms=[alg],
|
algorithms=[alg],
|
||||||
audience=provider.client_id,
|
audience=provider.client_id,
|
||||||
|
|
|
@ -40,6 +40,11 @@ urlpatterns = [
|
||||||
name="end-session",
|
name="end-session",
|
||||||
),
|
),
|
||||||
path("<slug:application_slug>/jwks/", JWKSView.as_view(), name="jwks"),
|
path("<slug:application_slug>/jwks/", JWKSView.as_view(), name="jwks"),
|
||||||
|
path(
|
||||||
|
"<slug:application_slug>/",
|
||||||
|
RedirectView.as_view(pattern_name="authentk_providers_oauth2:provider-info"),
|
||||||
|
name="provider-root",
|
||||||
|
),
|
||||||
path(
|
path(
|
||||||
"<slug:application_slug>/.well-known/openid-configuration",
|
"<slug:application_slug>/.well-known/openid-configuration",
|
||||||
ProviderInfoView.as_view(),
|
ProviderInfoView.as_view(),
|
||||||
|
|
|
@ -13,7 +13,7 @@ from structlog.stdlib import get_logger
|
||||||
from authentik.core.middleware import CTX_AUTH_VIA, KEY_USER
|
from authentik.core.middleware import CTX_AUTH_VIA, KEY_USER
|
||||||
from authentik.events.models import Event, EventAction
|
from authentik.events.models import Event, EventAction
|
||||||
from authentik.providers.oauth2.errors import BearerTokenError
|
from authentik.providers.oauth2.errors import BearerTokenError
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ def protected_resource_view(scopes: list[str]):
|
||||||
"""View decorator. The client accesses protected resources by presenting the
|
"""View decorator. The client accesses protected resources by presenting the
|
||||||
access token to the resource server.
|
access token to the resource server.
|
||||||
|
|
||||||
https://tools.ietf.org/html/rfc6749#section-7
|
https://datatracker.ietf.org/doc/html/rfc6749#section-7
|
||||||
|
|
||||||
This decorator also injects the token into `kwargs`"""
|
This decorator also injects the token into `kwargs`"""
|
||||||
|
|
||||||
|
@ -133,9 +133,8 @@ def protected_resource_view(scopes: list[str]):
|
||||||
LOGGER.debug("No token passed")
|
LOGGER.debug("No token passed")
|
||||||
raise BearerTokenError("invalid_token")
|
raise BearerTokenError("invalid_token")
|
||||||
|
|
||||||
try:
|
token = AccessToken.objects.filter(token=access_token).first()
|
||||||
token: RefreshToken = RefreshToken.objects.get(access_token=access_token)
|
if not token:
|
||||||
except RefreshToken.DoesNotExist:
|
|
||||||
LOGGER.debug("Token does not exist", access_token=access_token)
|
LOGGER.debug("Token does not exist", access_token=access_token)
|
||||||
raise BearerTokenError("invalid_token")
|
raise BearerTokenError("invalid_token")
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
"""authentik OAuth2 Authorization views"""
|
"""authentik OAuth2 Authorization views"""
|
||||||
from dataclasses import dataclass, field
|
from dataclasses import dataclass, field
|
||||||
from datetime import timedelta
|
from datetime import timedelta
|
||||||
|
from json import dumps
|
||||||
from re import error as RegexError
|
from re import error as RegexError
|
||||||
from re import fullmatch
|
from re import fullmatch
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
|
@ -37,6 +38,7 @@ from authentik.providers.oauth2.constants import (
|
||||||
PROMPT_LOGIN,
|
PROMPT_LOGIN,
|
||||||
PROMPT_NONE,
|
PROMPT_NONE,
|
||||||
SCOPE_OPENID,
|
SCOPE_OPENID,
|
||||||
|
TOKEN_TYPE,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.errors import (
|
from authentik.providers.oauth2.errors import (
|
||||||
AuthorizeError,
|
AuthorizeError,
|
||||||
|
@ -44,7 +46,9 @@ from authentik.providers.oauth2.errors import (
|
||||||
OAuth2Error,
|
OAuth2Error,
|
||||||
RedirectUriError,
|
RedirectUriError,
|
||||||
)
|
)
|
||||||
|
from authentik.providers.oauth2.id_token import IDToken
|
||||||
from authentik.providers.oauth2.models import (
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
AuthorizationCode,
|
AuthorizationCode,
|
||||||
GrantTypes,
|
GrantTypes,
|
||||||
OAuth2Provider,
|
OAuth2Provider,
|
||||||
|
@ -264,8 +268,6 @@ class OAuthAuthorizationParams:
|
||||||
code.expires = timezone.now() + timedelta_from_string(self.provider.access_code_validity)
|
code.expires = timezone.now() + timedelta_from_string(self.provider.access_code_validity)
|
||||||
code.scope = self.scope
|
code.scope = self.scope
|
||||||
code.nonce = self.nonce
|
code.nonce = self.nonce
|
||||||
code.is_open_id = SCOPE_OPENID in self.scope
|
|
||||||
|
|
||||||
return code
|
return code
|
||||||
|
|
||||||
|
|
||||||
|
@ -517,13 +519,25 @@ class OAuthFulfillmentStage(StageView):
|
||||||
"""Create implicit response's URL Fragment dictionary"""
|
"""Create implicit response's URL Fragment dictionary"""
|
||||||
query_fragment = {}
|
query_fragment = {}
|
||||||
|
|
||||||
token = self.provider.create_refresh_token(
|
now = timezone.now()
|
||||||
|
access_token_expiry = now + timedelta_from_string(self.provider.access_token_validity)
|
||||||
|
token = AccessToken(
|
||||||
user=self.request.user,
|
user=self.request.user,
|
||||||
scope=self.params.scope,
|
scope=self.params.scope,
|
||||||
request=self.request,
|
expires=access_token_expiry,
|
||||||
expiry=timedelta_from_string(self.provider.access_code_validity),
|
provider=self.provider,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
id_token = IDToken.new(self.provider, token, self.request)
|
||||||
|
id_token.nonce = self.params.nonce
|
||||||
|
|
||||||
|
if self.params.response_type in [
|
||||||
|
ResponseTypes.CODE_ID_TOKEN,
|
||||||
|
ResponseTypes.CODE_ID_TOKEN_TOKEN,
|
||||||
|
]:
|
||||||
|
id_token.c_hash = code.c_hash
|
||||||
|
token.id_token = id_token
|
||||||
|
|
||||||
# Check if response_type must include access_token in the response.
|
# Check if response_type must include access_token in the response.
|
||||||
if self.params.response_type in [
|
if self.params.response_type in [
|
||||||
ResponseTypes.ID_TOKEN_TOKEN,
|
ResponseTypes.ID_TOKEN_TOKEN,
|
||||||
|
@ -531,25 +545,7 @@ class OAuthFulfillmentStage(StageView):
|
||||||
ResponseTypes.ID_TOKEN,
|
ResponseTypes.ID_TOKEN,
|
||||||
ResponseTypes.CODE_TOKEN,
|
ResponseTypes.CODE_TOKEN,
|
||||||
]:
|
]:
|
||||||
query_fragment["access_token"] = token.access_token
|
query_fragment["access_token"] = token.token
|
||||||
|
|
||||||
# We don't need id_token if it's an OAuth2 request.
|
|
||||||
if SCOPE_OPENID in self.params.scope:
|
|
||||||
id_token = token.create_id_token(
|
|
||||||
user=self.request.user,
|
|
||||||
request=self.request,
|
|
||||||
)
|
|
||||||
id_token.nonce = self.params.nonce
|
|
||||||
|
|
||||||
# Include at_hash when access_token is being returned.
|
|
||||||
if "access_token" in query_fragment:
|
|
||||||
id_token.at_hash = token.at_hash
|
|
||||||
|
|
||||||
if self.params.response_type in [
|
|
||||||
ResponseTypes.CODE_ID_TOKEN,
|
|
||||||
ResponseTypes.CODE_ID_TOKEN_TOKEN,
|
|
||||||
]:
|
|
||||||
id_token.c_hash = code.c_hash
|
|
||||||
|
|
||||||
# Check if response_type must include id_token in the response.
|
# Check if response_type must include id_token in the response.
|
||||||
if self.params.response_type in [
|
if self.params.response_type in [
|
||||||
|
@ -558,20 +554,20 @@ class OAuthFulfillmentStage(StageView):
|
||||||
ResponseTypes.CODE_ID_TOKEN,
|
ResponseTypes.CODE_ID_TOKEN,
|
||||||
ResponseTypes.CODE_ID_TOKEN_TOKEN,
|
ResponseTypes.CODE_ID_TOKEN_TOKEN,
|
||||||
]:
|
]:
|
||||||
|
# Get at_hash of the current token and update the id_token
|
||||||
|
id_token.at_hash = token.at_hash
|
||||||
query_fragment["id_token"] = self.provider.encode(id_token.to_dict())
|
query_fragment["id_token"] = self.provider.encode(id_token.to_dict())
|
||||||
token.id_token = id_token
|
token._id_token = dumps(id_token.to_dict())
|
||||||
|
|
||||||
# Store the token.
|
|
||||||
token.save()
|
token.save()
|
||||||
|
|
||||||
# Code parameter must be present if it's Hybrid Flow.
|
# Code parameter must be present if it's Hybrid Flow.
|
||||||
if self.params.grant_type == GrantTypes.HYBRID:
|
if self.params.grant_type == GrantTypes.HYBRID:
|
||||||
query_fragment["code"] = code.code
|
query_fragment["code"] = code.code
|
||||||
|
|
||||||
query_fragment["token_type"] = "bearer" # nosec
|
query_fragment["token_type"] = TOKEN_TYPE
|
||||||
query_fragment["expires_in"] = int(
|
query_fragment["expires_in"] = int(
|
||||||
timedelta_from_string(self.provider.access_code_validity).total_seconds()
|
timedelta_from_string(self.provider.access_token_validity).total_seconds()
|
||||||
)
|
)
|
||||||
query_fragment["state"] = self.params.state if self.params.state else ""
|
query_fragment["state"] = self.params.state if self.params.state else ""
|
||||||
|
|
||||||
return query_fragment
|
return query_fragment
|
||||||
|
|
|
@ -8,7 +8,7 @@ from django.views.decorators.csrf import csrf_exempt
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.providers.oauth2.errors import TokenIntrospectionError
|
from authentik.providers.oauth2.errors import TokenIntrospectionError
|
||||||
from authentik.providers.oauth2.models import IDToken, OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, IDToken, OAuth2Provider, RefreshToken
|
||||||
from authentik.providers.oauth2.utils import TokenResponse, authenticate_provider
|
from authentik.providers.oauth2.utils import TokenResponse, authenticate_provider
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
@ -18,7 +18,7 @@ LOGGER = get_logger()
|
||||||
class TokenIntrospectionParams:
|
class TokenIntrospectionParams:
|
||||||
"""Parameters for Token Introspection"""
|
"""Parameters for Token Introspection"""
|
||||||
|
|
||||||
token: RefreshToken
|
token: RefreshToken | AccessToken
|
||||||
provider: OAuth2Provider
|
provider: OAuth2Provider
|
||||||
|
|
||||||
id_token: IDToken = field(init=False)
|
id_token: IDToken = field(init=False)
|
||||||
|
@ -41,31 +41,26 @@ class TokenIntrospectionParams:
|
||||||
def from_request(request: HttpRequest) -> "TokenIntrospectionParams":
|
def from_request(request: HttpRequest) -> "TokenIntrospectionParams":
|
||||||
"""Extract required Parameters from HTTP Request"""
|
"""Extract required Parameters from HTTP Request"""
|
||||||
raw_token = request.POST.get("token")
|
raw_token = request.POST.get("token")
|
||||||
token_type_hint = request.POST.get("token_type_hint", "access_token")
|
|
||||||
token_filter = {token_type_hint: raw_token}
|
|
||||||
|
|
||||||
if token_type_hint not in ["access_token", "refresh_token"]:
|
|
||||||
LOGGER.debug("token_type_hint has invalid value", value=token_type_hint)
|
|
||||||
raise TokenIntrospectionError()
|
|
||||||
|
|
||||||
provider = authenticate_provider(request)
|
provider = authenticate_provider(request)
|
||||||
if not provider:
|
if not provider:
|
||||||
raise TokenIntrospectionError
|
raise TokenIntrospectionError
|
||||||
|
|
||||||
token: RefreshToken = RefreshToken.objects.filter(provider=provider, **token_filter).first()
|
access_token = AccessToken.objects.filter(token=raw_token).first()
|
||||||
if not token:
|
if access_token:
|
||||||
|
return TokenIntrospectionParams(access_token, provider)
|
||||||
|
refresh_token = RefreshToken.objects.filter(token=raw_token).first()
|
||||||
|
if refresh_token:
|
||||||
|
return TokenIntrospectionParams(refresh_token, provider)
|
||||||
LOGGER.debug("Token does not exist", token=raw_token)
|
LOGGER.debug("Token does not exist", token=raw_token)
|
||||||
raise TokenIntrospectionError()
|
raise TokenIntrospectionError()
|
||||||
|
|
||||||
return TokenIntrospectionParams(token=token, provider=provider)
|
|
||||||
|
|
||||||
|
|
||||||
@method_decorator(csrf_exempt, name="dispatch")
|
@method_decorator(csrf_exempt, name="dispatch")
|
||||||
class TokenIntrospectionView(View):
|
class TokenIntrospectionView(View):
|
||||||
"""Token Introspection
|
"""Token Introspection
|
||||||
https://tools.ietf.org/html/rfc7662"""
|
https://datatracker.ietf.org/doc/html/rfc7662"""
|
||||||
|
|
||||||
token: RefreshToken
|
token: RefreshToken | AccessToken
|
||||||
params: TokenIntrospectionParams
|
params: TokenIntrospectionParams
|
||||||
provider: OAuth2Provider
|
provider: OAuth2Provider
|
||||||
|
|
||||||
|
@ -76,9 +71,9 @@ class TokenIntrospectionView(View):
|
||||||
response = {}
|
response = {}
|
||||||
if self.params.id_token:
|
if self.params.id_token:
|
||||||
response.update(self.params.id_token.to_dict())
|
response.update(self.params.id_token.to_dict())
|
||||||
response["active"] = True
|
response["active"] = not self.params.token.is_expired and not self.params.token.revoked
|
||||||
response["scope"] = " ".join(self.params.token.scope)
|
response["scope"] = " ".join(self.params.token.scope)
|
||||||
response["client_id"] = self.params.token.provider.client_id
|
response["client_id"] = self.params.provider.client_id
|
||||||
return TokenResponse(response)
|
return TokenResponse(response)
|
||||||
except TokenIntrospectionError:
|
except TokenIntrospectionError:
|
||||||
return TokenResponse({"active": False})
|
return TokenResponse({"active": False})
|
||||||
|
|
|
@ -1,14 +1,15 @@
|
||||||
"""authentik OAuth2 Token views"""
|
"""authentik OAuth2 Token views"""
|
||||||
from base64 import urlsafe_b64encode
|
from base64 import urlsafe_b64encode
|
||||||
from dataclasses import InitVar, dataclass
|
from dataclasses import InitVar, dataclass
|
||||||
|
from datetime import datetime
|
||||||
from hashlib import sha256
|
from hashlib import sha256
|
||||||
from re import error as RegexError
|
from re import error as RegexError
|
||||||
from re import fullmatch
|
from re import fullmatch
|
||||||
from typing import Any, Optional
|
from typing import Any, Optional
|
||||||
|
|
||||||
from django.http import HttpRequest, HttpResponse
|
from django.http import HttpRequest, HttpResponse
|
||||||
|
from django.utils import timezone
|
||||||
from django.utils.decorators import method_decorator
|
from django.utils.decorators import method_decorator
|
||||||
from django.utils.timezone import datetime, now
|
|
||||||
from django.views import View
|
from django.views import View
|
||||||
from django.views.decorators.csrf import csrf_exempt
|
from django.views.decorators.csrf import csrf_exempt
|
||||||
from guardian.shortcuts import get_anonymous_user
|
from guardian.shortcuts import get_anonymous_user
|
||||||
|
@ -37,9 +38,12 @@ from authentik.providers.oauth2.constants import (
|
||||||
GRANT_TYPE_DEVICE_CODE,
|
GRANT_TYPE_DEVICE_CODE,
|
||||||
GRANT_TYPE_PASSWORD,
|
GRANT_TYPE_PASSWORD,
|
||||||
GRANT_TYPE_REFRESH_TOKEN,
|
GRANT_TYPE_REFRESH_TOKEN,
|
||||||
|
TOKEN_TYPE,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.errors import DeviceCodeError, TokenError, UserAuthError
|
from authentik.providers.oauth2.errors import DeviceCodeError, TokenError, UserAuthError
|
||||||
|
from authentik.providers.oauth2.id_token import IDToken
|
||||||
from authentik.providers.oauth2.models import (
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
AuthorizationCode,
|
AuthorizationCode,
|
||||||
ClientTypes,
|
ClientTypes,
|
||||||
DeviceToken,
|
DeviceToken,
|
||||||
|
@ -198,17 +202,17 @@ class TokenParams:
|
||||||
).from_http(request)
|
).from_http(request)
|
||||||
raise TokenError("invalid_client")
|
raise TokenError("invalid_client")
|
||||||
|
|
||||||
try:
|
self.authorization_code = AuthorizationCode.objects.filter(code=raw_code).first()
|
||||||
self.authorization_code = AuthorizationCode.objects.get(code=raw_code)
|
if not self.authorization_code:
|
||||||
|
LOGGER.warning("Code does not exist", code=raw_code)
|
||||||
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
if self.authorization_code.is_expired:
|
if self.authorization_code.is_expired:
|
||||||
LOGGER.warning(
|
LOGGER.warning(
|
||||||
"Code is expired",
|
"Code is expired",
|
||||||
token=raw_code,
|
token=raw_code,
|
||||||
)
|
)
|
||||||
raise TokenError("invalid_grant")
|
raise TokenError("invalid_grant")
|
||||||
except AuthorizationCode.DoesNotExist:
|
|
||||||
LOGGER.warning("Code does not exist", code=raw_code)
|
|
||||||
raise TokenError("invalid_grant")
|
|
||||||
|
|
||||||
if self.authorization_code.provider != self.provider or self.authorization_code.is_expired:
|
if self.authorization_code.provider != self.provider or self.authorization_code.is_expired:
|
||||||
LOGGER.warning("Invalid code: invalid client or code has expired")
|
LOGGER.warning("Invalid code: invalid client or code has expired")
|
||||||
|
@ -234,26 +238,25 @@ class TokenParams:
|
||||||
LOGGER.warning("Missing refresh token")
|
LOGGER.warning("Missing refresh token")
|
||||||
raise TokenError("invalid_grant")
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
try:
|
self.refresh_token = RefreshToken.objects.filter(
|
||||||
self.refresh_token = RefreshToken.objects.get(
|
token=raw_token, provider=self.provider
|
||||||
refresh_token=raw_token, provider=self.provider
|
).first()
|
||||||
|
if not self.refresh_token:
|
||||||
|
LOGGER.warning(
|
||||||
|
"Refresh token does not exist",
|
||||||
|
token=raw_token,
|
||||||
)
|
)
|
||||||
|
raise TokenError("invalid_grant")
|
||||||
if self.refresh_token.is_expired:
|
if self.refresh_token.is_expired:
|
||||||
LOGGER.warning(
|
LOGGER.warning(
|
||||||
"Refresh token is expired",
|
"Refresh token is expired",
|
||||||
token=raw_token,
|
token=raw_token,
|
||||||
)
|
)
|
||||||
raise TokenError("invalid_grant")
|
raise TokenError("invalid_grant")
|
||||||
# https://tools.ietf.org/html/rfc6749#section-6
|
# https://datatracker.ietf.org/doc/html/rfc6749#section-6
|
||||||
# Fallback to original token's scopes when none are given
|
# Fallback to original token's scopes when none are given
|
||||||
if not self.scope:
|
if not self.scope:
|
||||||
self.scope = self.refresh_token.scope
|
self.scope = self.refresh_token.scope
|
||||||
except RefreshToken.DoesNotExist:
|
|
||||||
LOGGER.warning(
|
|
||||||
"Refresh token does not exist",
|
|
||||||
token=raw_token,
|
|
||||||
)
|
|
||||||
raise TokenError("invalid_grant")
|
|
||||||
if self.refresh_token.revoked:
|
if self.refresh_token.revoked:
|
||||||
LOGGER.warning("Refresh token is revoked", token=raw_token)
|
LOGGER.warning("Refresh token is revoked", token=raw_token)
|
||||||
Event.new(
|
Event.new(
|
||||||
|
@ -401,7 +404,7 @@ class TokenParams:
|
||||||
"attributes": {
|
"attributes": {
|
||||||
USER_ATTRIBUTE_GENERATED: True,
|
USER_ATTRIBUTE_GENERATED: True,
|
||||||
},
|
},
|
||||||
"last_login": now(),
|
"last_login": timezone.now(),
|
||||||
"name": f"Autogenerated user from application {app.name} (client credentials JWT)",
|
"name": f"Autogenerated user from application {app.name} (client credentials JWT)",
|
||||||
"path": source.get_user_path(),
|
"path": source.get_user_path(),
|
||||||
},
|
},
|
||||||
|
@ -436,14 +439,10 @@ class TokenView(View):
|
||||||
op="authentik.providers.oauth2.post.parse",
|
op="authentik.providers.oauth2.post.parse",
|
||||||
):
|
):
|
||||||
client_id, client_secret = extract_client_auth(request)
|
client_id, client_secret = extract_client_auth(request)
|
||||||
try:
|
self.provider = OAuth2Provider.objects.filter(client_id=client_id).first()
|
||||||
self.provider = OAuth2Provider.objects.get(client_id=client_id)
|
if not self.provider:
|
||||||
except OAuth2Provider.DoesNotExist:
|
|
||||||
LOGGER.warning("OAuth2Provider does not exist", client_id=client_id)
|
LOGGER.warning("OAuth2Provider does not exist", client_id=client_id)
|
||||||
raise TokenError("invalid_client")
|
raise TokenError("invalid_client")
|
||||||
|
|
||||||
if not self.provider:
|
|
||||||
raise ValueError
|
|
||||||
self.params = TokenParams.parse(request, self.provider, client_id, client_secret)
|
self.params = TokenParams.parse(request, self.provider, client_id, client_secret)
|
||||||
|
|
||||||
with Hub.current.start_span(
|
with Hub.current.start_span(
|
||||||
|
@ -468,59 +467,89 @@ class TokenView(View):
|
||||||
return TokenResponse(error.create_dict(), status=403)
|
return TokenResponse(error.create_dict(), status=403)
|
||||||
|
|
||||||
def create_code_response(self) -> dict[str, Any]:
|
def create_code_response(self) -> dict[str, Any]:
|
||||||
"""See https://tools.ietf.org/html/rfc6749#section-4.1"""
|
"""See https://datatracker.ietf.org/doc/html/rfc6749#section-4.1"""
|
||||||
refresh_token = self.provider.create_refresh_token(
|
now = timezone.now()
|
||||||
|
access_token_expiry = now + timedelta_from_string(self.provider.access_token_validity)
|
||||||
|
access_token = AccessToken(
|
||||||
|
provider=self.provider,
|
||||||
|
user=self.params.authorization_code.user,
|
||||||
|
expires=access_token_expiry,
|
||||||
|
# Keep same scopes as previous token
|
||||||
|
scope=self.params.authorization_code.scope,
|
||||||
|
)
|
||||||
|
access_token.id_token = IDToken.new(
|
||||||
|
self.provider,
|
||||||
|
access_token,
|
||||||
|
self.request,
|
||||||
|
)
|
||||||
|
access_token.save()
|
||||||
|
|
||||||
|
refresh_token_expiry = now + timedelta_from_string(self.provider.refresh_token_validity)
|
||||||
|
refresh_token = RefreshToken(
|
||||||
user=self.params.authorization_code.user,
|
user=self.params.authorization_code.user,
|
||||||
scope=self.params.authorization_code.scope,
|
scope=self.params.authorization_code.scope,
|
||||||
request=self.request,
|
expires=refresh_token_expiry,
|
||||||
expiry=timedelta_from_string(self.provider.token_validity),
|
provider=self.provider,
|
||||||
)
|
)
|
||||||
|
id_token = IDToken.new(
|
||||||
if self.params.authorization_code.is_open_id:
|
self.provider,
|
||||||
id_token = refresh_token.create_id_token(
|
refresh_token,
|
||||||
user=self.params.authorization_code.user,
|
self.request,
|
||||||
request=self.request,
|
|
||||||
)
|
)
|
||||||
id_token.nonce = self.params.authorization_code.nonce
|
id_token.nonce = self.params.authorization_code.nonce
|
||||||
id_token.at_hash = refresh_token.at_hash
|
id_token.at_hash = access_token.at_hash
|
||||||
refresh_token.id_token = id_token
|
refresh_token.id_token = id_token
|
||||||
|
|
||||||
# Store the token.
|
|
||||||
refresh_token.save()
|
refresh_token.save()
|
||||||
|
|
||||||
# We don't need to store the code anymore.
|
# Delete old code
|
||||||
self.params.authorization_code.delete()
|
self.params.authorization_code.delete()
|
||||||
|
|
||||||
return {
|
return {
|
||||||
"access_token": refresh_token.access_token,
|
"access_token": access_token.token,
|
||||||
"refresh_token": refresh_token.refresh_token,
|
"refresh_token": refresh_token.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": int(timedelta_from_string(self.provider.token_validity).total_seconds()),
|
"expires_in": int(
|
||||||
"id_token": self.provider.encode(refresh_token.id_token.to_dict()),
|
timedelta_from_string(self.provider.access_token_validity).total_seconds()
|
||||||
|
),
|
||||||
|
"id_token": id_token.to_jwt(self.provider),
|
||||||
}
|
}
|
||||||
|
|
||||||
def create_refresh_response(self) -> dict[str, Any]:
|
def create_refresh_response(self) -> dict[str, Any]:
|
||||||
"""See https://tools.ietf.org/html/rfc6749#section-6"""
|
"""See https://datatracker.ietf.org/doc/html/rfc6749#section-6"""
|
||||||
unauthorized_scopes = set(self.params.scope) - set(self.params.refresh_token.scope)
|
unauthorized_scopes = set(self.params.scope) - set(self.params.refresh_token.scope)
|
||||||
if unauthorized_scopes:
|
if unauthorized_scopes:
|
||||||
raise TokenError("invalid_scope")
|
raise TokenError("invalid_scope")
|
||||||
|
|
||||||
refresh_token: RefreshToken = self.provider.create_refresh_token(
|
now = timezone.now()
|
||||||
|
access_token_expiry = now + timedelta_from_string(self.provider.access_token_validity)
|
||||||
|
access_token = AccessToken(
|
||||||
|
provider=self.provider,
|
||||||
user=self.params.refresh_token.user,
|
user=self.params.refresh_token.user,
|
||||||
scope=self.params.scope,
|
expires=access_token_expiry,
|
||||||
request=self.request,
|
# Keep same scopes as previous token
|
||||||
expiry=timedelta_from_string(self.provider.token_validity),
|
scope=self.params.refresh_token.scope,
|
||||||
)
|
)
|
||||||
|
access_token.id_token = IDToken.new(
|
||||||
|
self.provider,
|
||||||
|
access_token,
|
||||||
|
self.request,
|
||||||
|
)
|
||||||
|
access_token.save()
|
||||||
|
|
||||||
# If the Token has an id_token it's an Authentication request.
|
refresh_token_expiry = now + timedelta_from_string(self.provider.refresh_token_validity)
|
||||||
if self.params.refresh_token.id_token:
|
refresh_token = RefreshToken(
|
||||||
refresh_token.id_token = refresh_token.create_id_token(
|
|
||||||
user=self.params.refresh_token.user,
|
user=self.params.refresh_token.user,
|
||||||
request=self.request,
|
scope=self.params.refresh_token.scope,
|
||||||
|
expires=refresh_token_expiry,
|
||||||
|
provider=self.provider,
|
||||||
)
|
)
|
||||||
refresh_token.id_token.at_hash = refresh_token.at_hash
|
id_token = IDToken.new(
|
||||||
|
self.provider,
|
||||||
# Store the refresh_token.
|
refresh_token,
|
||||||
|
self.request,
|
||||||
|
)
|
||||||
|
id_token.nonce = self.params.refresh_token.id_token.nonce
|
||||||
|
id_token.at_hash = access_token.at_hash
|
||||||
|
refresh_token.id_token = id_token
|
||||||
refresh_token.save()
|
refresh_token.save()
|
||||||
|
|
||||||
# Mark old token as revoked
|
# Mark old token as revoked
|
||||||
|
@ -528,62 +557,83 @@ class TokenView(View):
|
||||||
self.params.refresh_token.save()
|
self.params.refresh_token.save()
|
||||||
|
|
||||||
return {
|
return {
|
||||||
"access_token": refresh_token.access_token,
|
"access_token": access_token.token,
|
||||||
"refresh_token": refresh_token.refresh_token,
|
"refresh_token": refresh_token.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": int(timedelta_from_string(self.provider.token_validity).total_seconds()),
|
"expires_in": int(
|
||||||
"id_token": self.provider.encode(refresh_token.id_token.to_dict()),
|
timedelta_from_string(self.provider.access_token_validity).total_seconds()
|
||||||
|
),
|
||||||
|
"id_token": id_token.to_jwt(self.provider),
|
||||||
}
|
}
|
||||||
|
|
||||||
def create_client_credentials_response(self) -> dict[str, Any]:
|
def create_client_credentials_response(self) -> dict[str, Any]:
|
||||||
"""See https://datatracker.ietf.org/doc/html/rfc6749#section-4.4"""
|
"""See https://datatracker.ietf.org/doc/html/rfc6749#section-4.4"""
|
||||||
refresh_token: RefreshToken = self.provider.create_refresh_token(
|
now = timezone.now()
|
||||||
|
access_token_expiry = now + timedelta_from_string(self.provider.access_token_validity)
|
||||||
|
access_token = AccessToken(
|
||||||
|
provider=self.provider,
|
||||||
user=self.params.user,
|
user=self.params.user,
|
||||||
|
expires=access_token_expiry,
|
||||||
scope=self.params.scope,
|
scope=self.params.scope,
|
||||||
request=self.request,
|
|
||||||
expiry=timedelta_from_string(self.provider.token_validity),
|
|
||||||
)
|
)
|
||||||
refresh_token.id_token = refresh_token.create_id_token(
|
access_token.id_token = IDToken.new(
|
||||||
user=self.params.user,
|
self.provider,
|
||||||
request=self.request,
|
access_token,
|
||||||
|
self.request,
|
||||||
)
|
)
|
||||||
refresh_token.id_token.at_hash = refresh_token.at_hash
|
access_token.save()
|
||||||
|
|
||||||
# Store the refresh_token.
|
|
||||||
refresh_token.save()
|
|
||||||
|
|
||||||
return {
|
return {
|
||||||
"access_token": refresh_token.access_token,
|
"access_token": access_token.token,
|
||||||
"token_type": "bearer",
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": int(timedelta_from_string(self.provider.token_validity).total_seconds()),
|
"expires_in": int(
|
||||||
"id_token": self.provider.encode(refresh_token.id_token.to_dict()),
|
timedelta_from_string(self.provider.access_token_validity).total_seconds()
|
||||||
|
),
|
||||||
|
"id_token": access_token.id_token.to_jwt(self.provider),
|
||||||
}
|
}
|
||||||
|
|
||||||
def create_device_code_response(self) -> dict[str, Any]:
|
def create_device_code_response(self) -> dict[str, Any]:
|
||||||
"""See https://datatracker.ietf.org/doc/html/rfc8628"""
|
"""See https://datatracker.ietf.org/doc/html/rfc8628"""
|
||||||
if not self.params.device_code.user:
|
if not self.params.device_code.user:
|
||||||
raise DeviceCodeError("authorization_pending")
|
raise DeviceCodeError("authorization_pending")
|
||||||
|
now = timezone.now()
|
||||||
|
access_token_expiry = now + timedelta_from_string(self.provider.access_token_validity)
|
||||||
|
access_token = AccessToken(
|
||||||
|
provider=self.provider,
|
||||||
|
user=self.params.device_code.user,
|
||||||
|
expires=access_token_expiry,
|
||||||
|
scope=self.params.device_code.scope,
|
||||||
|
)
|
||||||
|
access_token.id_token = IDToken.new(
|
||||||
|
self.provider,
|
||||||
|
access_token,
|
||||||
|
self.request,
|
||||||
|
)
|
||||||
|
access_token.save()
|
||||||
|
|
||||||
refresh_token: RefreshToken = self.provider.create_refresh_token(
|
refresh_token_expiry = now + timedelta_from_string(self.provider.refresh_token_validity)
|
||||||
|
refresh_token = RefreshToken(
|
||||||
user=self.params.device_code.user,
|
user=self.params.device_code.user,
|
||||||
scope=self.params.device_code.scope,
|
scope=self.params.device_code.scope,
|
||||||
request=self.request,
|
expires=refresh_token_expiry,
|
||||||
expiry=timedelta_from_string(self.provider.token_validity),
|
provider=self.provider,
|
||||||
)
|
)
|
||||||
refresh_token.id_token = refresh_token.create_id_token(
|
id_token = IDToken.new(
|
||||||
user=self.params.device_code.user,
|
self.provider,
|
||||||
request=self.request,
|
refresh_token,
|
||||||
|
self.request,
|
||||||
)
|
)
|
||||||
refresh_token.id_token.at_hash = refresh_token.at_hash
|
id_token.at_hash = access_token.at_hash
|
||||||
|
refresh_token.id_token = id_token
|
||||||
# Store the refresh_token.
|
|
||||||
refresh_token.save()
|
refresh_token.save()
|
||||||
|
|
||||||
|
# Delete device code
|
||||||
|
self.params.device_code.delete()
|
||||||
return {
|
return {
|
||||||
"access_token": refresh_token.access_token,
|
"access_token": access_token.token,
|
||||||
"token_type": "bearer",
|
"refresh_token": refresh_token.token,
|
||||||
|
"token_type": TOKEN_TYPE,
|
||||||
"expires_in": int(
|
"expires_in": int(
|
||||||
timedelta_from_string(refresh_token.provider.token_validity).total_seconds()
|
timedelta_from_string(self.provider.access_token_validity).total_seconds()
|
||||||
),
|
),
|
||||||
"id_token": self.provider.encode(refresh_token.id_token.to_dict()),
|
"id_token": id_token.to_jwt(self.provider),
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,7 +8,7 @@ from django.views.decorators.csrf import csrf_exempt
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.providers.oauth2.errors import TokenRevocationError
|
from authentik.providers.oauth2.errors import TokenRevocationError
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider, RefreshToken
|
||||||
from authentik.providers.oauth2.utils import TokenResponse, authenticate_provider
|
from authentik.providers.oauth2.utils import TokenResponse, authenticate_provider
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
@ -18,32 +18,27 @@ LOGGER = get_logger()
|
||||||
class TokenRevocationParams:
|
class TokenRevocationParams:
|
||||||
"""Parameters for Token Revocation"""
|
"""Parameters for Token Revocation"""
|
||||||
|
|
||||||
token: RefreshToken
|
token: RefreshToken | AccessToken
|
||||||
provider: OAuth2Provider
|
provider: OAuth2Provider
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def from_request(request: HttpRequest) -> "TokenRevocationParams":
|
def from_request(request: HttpRequest) -> "TokenRevocationParams":
|
||||||
"""Extract required Parameters from HTTP Request"""
|
"""Extract required Parameters from HTTP Request"""
|
||||||
raw_token = request.POST.get("token")
|
raw_token = request.POST.get("token")
|
||||||
token_type_hint = request.POST.get("token_type_hint", "access_token")
|
|
||||||
token_filter = {token_type_hint: raw_token}
|
|
||||||
|
|
||||||
if token_type_hint not in ["access_token", "refresh_token"]:
|
|
||||||
LOGGER.debug("token_type_hint has invalid value", value=token_type_hint)
|
|
||||||
raise TokenRevocationError("unsupported_token_type")
|
|
||||||
|
|
||||||
provider = authenticate_provider(request)
|
provider = authenticate_provider(request)
|
||||||
if not provider:
|
if not provider:
|
||||||
raise TokenRevocationError("invalid_client")
|
raise TokenRevocationError("invalid_client")
|
||||||
|
|
||||||
try:
|
access_token = AccessToken.objects.filter(token=raw_token).first()
|
||||||
token: RefreshToken = RefreshToken.objects.get(provider=provider, **token_filter)
|
if access_token:
|
||||||
except RefreshToken.DoesNotExist:
|
return TokenRevocationParams(access_token, provider)
|
||||||
|
refresh_token = RefreshToken.objects.filter(token=raw_token).first()
|
||||||
|
if refresh_token:
|
||||||
|
return TokenRevocationParams(refresh_token, provider)
|
||||||
LOGGER.debug("Token does not exist", token=raw_token)
|
LOGGER.debug("Token does not exist", token=raw_token)
|
||||||
raise Http404
|
raise Http404
|
||||||
|
|
||||||
return TokenRevocationParams(token=token, provider=provider)
|
|
||||||
|
|
||||||
|
|
||||||
@method_decorator(csrf_exempt, name="dispatch")
|
@method_decorator(csrf_exempt, name="dispatch")
|
||||||
class TokenRevokeView(View):
|
class TokenRevokeView(View):
|
||||||
|
@ -65,5 +60,6 @@ class TokenRevokeView(View):
|
||||||
except TokenRevocationError as exc:
|
except TokenRevocationError as exc:
|
||||||
return TokenResponse(exc.create_dict(), status=401)
|
return TokenResponse(exc.create_dict(), status=401)
|
||||||
except Http404:
|
except Http404:
|
||||||
# Token not found should return a HTTP 200 according to the specs
|
# Token not found should return a HTTP 200
|
||||||
|
# https://datatracker.ietf.org/doc/html/rfc7009#section-2.2
|
||||||
return TokenResponse(data={}, status=200)
|
return TokenResponse(data={}, status=200)
|
||||||
|
|
|
@ -21,7 +21,12 @@ from authentik.providers.oauth2.constants import (
|
||||||
SCOPE_GITHUB_USER_READ,
|
SCOPE_GITHUB_USER_READ,
|
||||||
SCOPE_OPENID,
|
SCOPE_OPENID,
|
||||||
)
|
)
|
||||||
from authentik.providers.oauth2.models import RefreshToken, ScopeMapping
|
from authentik.providers.oauth2.models import (
|
||||||
|
BaseGrantModel,
|
||||||
|
OAuth2Provider,
|
||||||
|
RefreshToken,
|
||||||
|
ScopeMapping,
|
||||||
|
)
|
||||||
from authentik.providers.oauth2.utils import TokenResponse, cors_allow, protected_resource_view
|
from authentik.providers.oauth2.utils import TokenResponse, cors_allow, protected_resource_view
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
@ -56,21 +61,22 @@ class UserInfoView(View):
|
||||||
)
|
)
|
||||||
return scope_descriptions
|
return scope_descriptions
|
||||||
|
|
||||||
def get_claims(self, token: RefreshToken) -> dict[str, Any]:
|
def get_claims(self, provider: OAuth2Provider, token: BaseGrantModel) -> dict[str, Any]:
|
||||||
"""Get a dictionary of claims from scopes that the token
|
"""Get a dictionary of claims from scopes that the token
|
||||||
requires and are assigned to the provider."""
|
requires and are assigned to the provider."""
|
||||||
|
|
||||||
scopes_from_client = token.scope
|
scopes_from_client = token.scope
|
||||||
final_claims = {}
|
final_claims = {}
|
||||||
for scope in ScopeMapping.objects.filter(
|
for scope in ScopeMapping.objects.filter(
|
||||||
provider=token.provider, scope_name__in=scopes_from_client
|
provider=provider, scope_name__in=scopes_from_client
|
||||||
).order_by("scope_name"):
|
).order_by("scope_name"):
|
||||||
|
scope: ScopeMapping
|
||||||
value = None
|
value = None
|
||||||
try:
|
try:
|
||||||
value = scope.evaluate(
|
value = scope.evaluate(
|
||||||
user=token.user,
|
user=token.user,
|
||||||
request=self.request,
|
request=self.request,
|
||||||
provider=token.provider,
|
provider=provider,
|
||||||
token=token,
|
token=token,
|
||||||
)
|
)
|
||||||
except PropertyMappingExpressionException as exc:
|
except PropertyMappingExpressionException as exc:
|
||||||
|
@ -108,7 +114,7 @@ class UserInfoView(View):
|
||||||
"""Handle GET Requests for UserInfo"""
|
"""Handle GET Requests for UserInfo"""
|
||||||
if not self.token:
|
if not self.token:
|
||||||
return HttpResponseBadRequest()
|
return HttpResponseBadRequest()
|
||||||
claims = self.get_claims(self.token)
|
claims = self.get_claims(self.token.provider, self.token)
|
||||||
claims["sub"] = self.token.id_token.sub
|
claims["sub"] = self.token.id_token.sub
|
||||||
if self.token.id_token.nonce:
|
if self.token.id_token.nonce:
|
||||||
claims["nonce"] = self.token.id_token.nonce
|
claims["nonce"] = self.token.id_token.nonce
|
||||||
|
|
|
@ -91,7 +91,8 @@ class ProxyProviderSerializer(ProviderSerializer):
|
||||||
"redirect_uris",
|
"redirect_uris",
|
||||||
"cookie_domain",
|
"cookie_domain",
|
||||||
"jwks_sources",
|
"jwks_sources",
|
||||||
"token_validity",
|
"access_token_validity",
|
||||||
|
"refresh_token_validity",
|
||||||
"outpost_set",
|
"outpost_set",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -130,7 +131,7 @@ class ProxyOutpostConfigSerializer(ModelSerializer):
|
||||||
assigned_application_name = ReadOnlyField(source="application.name")
|
assigned_application_name = ReadOnlyField(source="application.name")
|
||||||
|
|
||||||
oidc_configuration = SerializerMethodField()
|
oidc_configuration = SerializerMethodField()
|
||||||
token_validity = SerializerMethodField()
|
access_token_validity = SerializerMethodField()
|
||||||
scopes_to_request = SerializerMethodField()
|
scopes_to_request = SerializerMethodField()
|
||||||
|
|
||||||
@extend_schema_field(OpenIDConnectConfigurationSerializer)
|
@extend_schema_field(OpenIDConnectConfigurationSerializer)
|
||||||
|
@ -138,9 +139,9 @@ class ProxyOutpostConfigSerializer(ModelSerializer):
|
||||||
"""Embed OpenID Connect provider information"""
|
"""Embed OpenID Connect provider information"""
|
||||||
return ProviderInfoView(request=self.context["request"]._request).get_info(obj)
|
return ProviderInfoView(request=self.context["request"]._request).get_info(obj)
|
||||||
|
|
||||||
def get_token_validity(self, obj: ProxyProvider) -> Optional[float]:
|
def get_access_token_validity(self, obj: ProxyProvider) -> Optional[float]:
|
||||||
"""Get token validity as second count"""
|
"""Get token validity as second count"""
|
||||||
return timedelta_from_string(obj.token_validity).total_seconds()
|
return timedelta_from_string(obj.access_token_validity).total_seconds()
|
||||||
|
|
||||||
def get_scopes_to_request(self, obj: ProxyProvider) -> list[str]:
|
def get_scopes_to_request(self, obj: ProxyProvider) -> list[str]:
|
||||||
"""Get all the scope names the outpost should request,
|
"""Get all the scope names the outpost should request,
|
||||||
|
@ -169,7 +170,7 @@ class ProxyOutpostConfigSerializer(ModelSerializer):
|
||||||
"basic_auth_user_attribute",
|
"basic_auth_user_attribute",
|
||||||
"mode",
|
"mode",
|
||||||
"cookie_domain",
|
"cookie_domain",
|
||||||
"token_validity",
|
"access_token_validity",
|
||||||
"intercept_header_auth",
|
"intercept_header_auth",
|
||||||
"scopes_to_request",
|
"scopes_to_request",
|
||||||
"assigned_application_slug",
|
"assigned_application_slug",
|
||||||
|
|
|
@ -73,6 +73,7 @@
|
||||||
"authentik_policies_reputation.reputation",
|
"authentik_policies_reputation.reputation",
|
||||||
"authentik_policies_reputation.reputationpolicy",
|
"authentik_policies_reputation.reputationpolicy",
|
||||||
"authentik_providers_ldap.ldapprovider",
|
"authentik_providers_ldap.ldapprovider",
|
||||||
|
"authentik_providers_oauth2.accesstoken",
|
||||||
"authentik_providers_oauth2.authorizationcode",
|
"authentik_providers_oauth2.authorizationcode",
|
||||||
"authentik_providers_oauth2.oauth2provider",
|
"authentik_providers_oauth2.oauth2provider",
|
||||||
"authentik_providers_oauth2.refreshtoken",
|
"authentik_providers_oauth2.refreshtoken",
|
||||||
|
|
|
@ -29,8 +29,8 @@ func (a *Application) getStore(p api.ProxyOutpostConfig, externalHost *url.URL)
|
||||||
}
|
}
|
||||||
rs.SetMaxLength(math.MaxInt)
|
rs.SetMaxLength(math.MaxInt)
|
||||||
rs.SetKeyPrefix(RedisKeyPrefix)
|
rs.SetKeyPrefix(RedisKeyPrefix)
|
||||||
if p.TokenValidity.IsSet() {
|
if p.AccessTokenValidity.IsSet() {
|
||||||
t := p.TokenValidity.Get()
|
t := p.AccessTokenValidity.Get()
|
||||||
// Add one to the validity to ensure we don't have a session with indefinite length
|
// Add one to the validity to ensure we don't have a session with indefinite length
|
||||||
rs.SetMaxAge(int(*t) + 1)
|
rs.SetMaxAge(int(*t) + 1)
|
||||||
} else {
|
} else {
|
||||||
|
@ -49,8 +49,8 @@ func (a *Application) getStore(p api.ProxyOutpostConfig, externalHost *url.URL)
|
||||||
|
|
||||||
// Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk
|
// Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk
|
||||||
cs.MaxLength(math.MaxInt)
|
cs.MaxLength(math.MaxInt)
|
||||||
if p.TokenValidity.IsSet() {
|
if p.AccessTokenValidity.IsSet() {
|
||||||
t := p.TokenValidity.Get()
|
t := p.AccessTokenValidity.Get()
|
||||||
// Add one to the validity to ensure we don't have a session with indefinite length
|
// Add one to the validity to ensure we don't have a session with indefinite length
|
||||||
cs.MaxAge(int(*t) + 1)
|
cs.MaxAge(int(*t) + 1)
|
||||||
} else {
|
} else {
|
||||||
|
|
363
schema.yml
363
schema.yml
|
@ -8015,6 +8015,165 @@ paths:
|
||||||
schema:
|
schema:
|
||||||
$ref: '#/components/schemas/GenericError'
|
$ref: '#/components/schemas/GenericError'
|
||||||
description: ''
|
description: ''
|
||||||
|
/oauth2/access_tokens/:
|
||||||
|
get:
|
||||||
|
operationId: oauth2_access_tokens_list
|
||||||
|
description: AccessToken Viewset
|
||||||
|
parameters:
|
||||||
|
- name: ordering
|
||||||
|
required: false
|
||||||
|
in: query
|
||||||
|
description: Which field to use when ordering the results.
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
- name: page
|
||||||
|
required: false
|
||||||
|
in: query
|
||||||
|
description: A page number within the paginated result set.
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
- name: page_size
|
||||||
|
required: false
|
||||||
|
in: query
|
||||||
|
description: Number of results to return per page.
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
- in: query
|
||||||
|
name: provider
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
- name: search
|
||||||
|
required: false
|
||||||
|
in: query
|
||||||
|
description: A search term.
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
- in: query
|
||||||
|
name: user
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
tags:
|
||||||
|
- oauth2
|
||||||
|
security:
|
||||||
|
- authentik: []
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PaginatedTokenModelList'
|
||||||
|
description: ''
|
||||||
|
'400':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/ValidationError'
|
||||||
|
description: ''
|
||||||
|
'403':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/GenericError'
|
||||||
|
description: ''
|
||||||
|
/oauth2/access_tokens/{id}/:
|
||||||
|
get:
|
||||||
|
operationId: oauth2_access_tokens_retrieve
|
||||||
|
description: AccessToken Viewset
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: id
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
description: A unique integer value identifying this OAuth2 Access Token.
|
||||||
|
required: true
|
||||||
|
tags:
|
||||||
|
- oauth2
|
||||||
|
security:
|
||||||
|
- authentik: []
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/TokenModel'
|
||||||
|
description: ''
|
||||||
|
'400':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/ValidationError'
|
||||||
|
description: ''
|
||||||
|
'403':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/GenericError'
|
||||||
|
description: ''
|
||||||
|
delete:
|
||||||
|
operationId: oauth2_access_tokens_destroy
|
||||||
|
description: AccessToken Viewset
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: id
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
description: A unique integer value identifying this OAuth2 Access Token.
|
||||||
|
required: true
|
||||||
|
tags:
|
||||||
|
- oauth2
|
||||||
|
security:
|
||||||
|
- authentik: []
|
||||||
|
responses:
|
||||||
|
'204':
|
||||||
|
description: No response body
|
||||||
|
'400':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/ValidationError'
|
||||||
|
description: ''
|
||||||
|
'403':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/GenericError'
|
||||||
|
description: ''
|
||||||
|
/oauth2/access_tokens/{id}/used_by/:
|
||||||
|
get:
|
||||||
|
operationId: oauth2_access_tokens_used_by_list
|
||||||
|
description: Get a list of all objects that use this object
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: id
|
||||||
|
schema:
|
||||||
|
type: integer
|
||||||
|
description: A unique integer value identifying this OAuth2 Access Token.
|
||||||
|
required: true
|
||||||
|
tags:
|
||||||
|
- oauth2
|
||||||
|
security:
|
||||||
|
- authentik: []
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
$ref: '#/components/schemas/UsedBy'
|
||||||
|
description: ''
|
||||||
|
'400':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/ValidationError'
|
||||||
|
description: ''
|
||||||
|
'403':
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/GenericError'
|
||||||
|
description: ''
|
||||||
/oauth2/authorization_codes/:
|
/oauth2/authorization_codes/:
|
||||||
get:
|
get:
|
||||||
operationId: oauth2_authorization_codes_list
|
operationId: oauth2_authorization_codes_list
|
||||||
|
@ -8220,7 +8379,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
$ref: '#/components/schemas/PaginatedRefreshTokenModelList'
|
$ref: '#/components/schemas/PaginatedTokenModelList'
|
||||||
description: ''
|
description: ''
|
||||||
'400':
|
'400':
|
||||||
content:
|
content:
|
||||||
|
@ -8243,7 +8402,7 @@ paths:
|
||||||
name: id
|
name: id
|
||||||
schema:
|
schema:
|
||||||
type: integer
|
type: integer
|
||||||
description: A unique integer value identifying this OAuth2 Token.
|
description: A unique integer value identifying this OAuth2 Refresh Token.
|
||||||
required: true
|
required: true
|
||||||
tags:
|
tags:
|
||||||
- oauth2
|
- oauth2
|
||||||
|
@ -8254,7 +8413,7 @@ paths:
|
||||||
content:
|
content:
|
||||||
application/json:
|
application/json:
|
||||||
schema:
|
schema:
|
||||||
$ref: '#/components/schemas/RefreshTokenModel'
|
$ref: '#/components/schemas/TokenModel'
|
||||||
description: ''
|
description: ''
|
||||||
'400':
|
'400':
|
||||||
content:
|
content:
|
||||||
|
@ -8276,7 +8435,7 @@ paths:
|
||||||
name: id
|
name: id
|
||||||
schema:
|
schema:
|
||||||
type: integer
|
type: integer
|
||||||
description: A unique integer value identifying this OAuth2 Token.
|
description: A unique integer value identifying this OAuth2 Refresh Token.
|
||||||
required: true
|
required: true
|
||||||
tags:
|
tags:
|
||||||
- oauth2
|
- oauth2
|
||||||
|
@ -8306,7 +8465,7 @@ paths:
|
||||||
name: id
|
name: id
|
||||||
schema:
|
schema:
|
||||||
type: integer
|
type: integer
|
||||||
description: A unique integer value identifying this OAuth2 Token.
|
description: A unique integer value identifying this OAuth2 Refresh Token.
|
||||||
required: true
|
required: true
|
||||||
tags:
|
tags:
|
||||||
- oauth2
|
- oauth2
|
||||||
|
@ -14167,6 +14326,10 @@ paths:
|
||||||
name: access_code_validity
|
name: access_code_validity
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
|
- in: query
|
||||||
|
name: access_token_validity
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
- in: query
|
- in: query
|
||||||
name: application
|
name: application
|
||||||
schema:
|
schema:
|
||||||
|
@ -14237,6 +14400,10 @@ paths:
|
||||||
name: redirect_uris
|
name: redirect_uris
|
||||||
schema:
|
schema:
|
||||||
type: string
|
type: string
|
||||||
|
- in: query
|
||||||
|
name: refresh_token_validity
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
- name: search
|
- name: search
|
||||||
required: false
|
required: false
|
||||||
in: query
|
in: query
|
||||||
|
@ -14260,10 +14427,6 @@ paths:
|
||||||
- user_username
|
- user_username
|
||||||
description: Configure what data should be used as unique User Identifier.
|
description: Configure what data should be used as unique User Identifier.
|
||||||
For most cases, the default should be fine.
|
For most cases, the default should be fine.
|
||||||
- in: query
|
|
||||||
name: token_validity
|
|
||||||
schema:
|
|
||||||
type: string
|
|
||||||
tags:
|
tags:
|
||||||
- providers
|
- providers
|
||||||
security:
|
security:
|
||||||
|
@ -29311,7 +29474,11 @@ components:
|
||||||
type: string
|
type: string
|
||||||
description: 'Access codes not valid on or after current time + this value
|
description: 'Access codes not valid on or after current time + this value
|
||||||
(Format: hours=1;minutes=2;seconds=3).'
|
(Format: hours=1;minutes=2;seconds=3).'
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
hours=1;minutes=2;seconds=3).'
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
@ -29388,7 +29555,12 @@ components:
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Access codes not valid on or after current time + this value
|
description: 'Access codes not valid on or after current time + this value
|
||||||
(Format: hours=1;minutes=2;seconds=3).'
|
(Format: hours=1;minutes=2;seconds=3).'
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
minLength: 1
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
@ -31765,41 +31937,6 @@ components:
|
||||||
required:
|
required:
|
||||||
- pagination
|
- pagination
|
||||||
- results
|
- results
|
||||||
PaginatedRefreshTokenModelList:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
pagination:
|
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
next:
|
|
||||||
type: number
|
|
||||||
previous:
|
|
||||||
type: number
|
|
||||||
count:
|
|
||||||
type: number
|
|
||||||
current:
|
|
||||||
type: number
|
|
||||||
total_pages:
|
|
||||||
type: number
|
|
||||||
start_index:
|
|
||||||
type: number
|
|
||||||
end_index:
|
|
||||||
type: number
|
|
||||||
required:
|
|
||||||
- next
|
|
||||||
- previous
|
|
||||||
- count
|
|
||||||
- current
|
|
||||||
- total_pages
|
|
||||||
- start_index
|
|
||||||
- end_index
|
|
||||||
results:
|
|
||||||
type: array
|
|
||||||
items:
|
|
||||||
$ref: '#/components/schemas/RefreshTokenModel'
|
|
||||||
required:
|
|
||||||
- pagination
|
|
||||||
- results
|
|
||||||
PaginatedReputationList:
|
PaginatedReputationList:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -32290,6 +32427,41 @@ components:
|
||||||
required:
|
required:
|
||||||
- pagination
|
- pagination
|
||||||
- results
|
- results
|
||||||
|
PaginatedTokenModelList:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
pagination:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
next:
|
||||||
|
type: number
|
||||||
|
previous:
|
||||||
|
type: number
|
||||||
|
count:
|
||||||
|
type: number
|
||||||
|
current:
|
||||||
|
type: number
|
||||||
|
total_pages:
|
||||||
|
type: number
|
||||||
|
start_index:
|
||||||
|
type: number
|
||||||
|
end_index:
|
||||||
|
type: number
|
||||||
|
required:
|
||||||
|
- next
|
||||||
|
- previous
|
||||||
|
- count
|
||||||
|
- current
|
||||||
|
- total_pages
|
||||||
|
- start_index
|
||||||
|
- end_index
|
||||||
|
results:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
$ref: '#/components/schemas/TokenModel'
|
||||||
|
required:
|
||||||
|
- pagination
|
||||||
|
- results
|
||||||
PaginatedUserConsentList:
|
PaginatedUserConsentList:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
|
@ -33948,7 +34120,12 @@ components:
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Access codes not valid on or after current time + this value
|
description: 'Access codes not valid on or after current time + this value
|
||||||
(Format: hours=1;minutes=2;seconds=3).'
|
(Format: hours=1;minutes=2;seconds=3).'
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
minLength: 1
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
@ -34413,7 +34590,12 @@ components:
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
minLength: 1
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
@ -35723,7 +35905,7 @@ components:
|
||||||
Exclusive with internal_host.
|
Exclusive with internal_host.
|
||||||
cookie_domain:
|
cookie_domain:
|
||||||
type: string
|
type: string
|
||||||
token_validity:
|
access_token_validity:
|
||||||
type: number
|
type: number
|
||||||
format: double
|
format: double
|
||||||
nullable: true
|
nullable: true
|
||||||
|
@ -35746,6 +35928,7 @@ components:
|
||||||
description: Application's display Name.
|
description: Application's display Name.
|
||||||
readOnly: true
|
readOnly: true
|
||||||
required:
|
required:
|
||||||
|
- access_token_validity
|
||||||
- assigned_application_name
|
- assigned_application_name
|
||||||
- assigned_application_slug
|
- assigned_application_slug
|
||||||
- external_host
|
- external_host
|
||||||
|
@ -35753,7 +35936,6 @@ components:
|
||||||
- oidc_configuration
|
- oidc_configuration
|
||||||
- pk
|
- pk
|
||||||
- scopes_to_request
|
- scopes_to_request
|
||||||
- token_validity
|
|
||||||
ProxyProvider:
|
ProxyProvider:
|
||||||
type: object
|
type: object
|
||||||
description: ProxyProvider Serializer
|
description: ProxyProvider Serializer
|
||||||
|
@ -35850,7 +36032,11 @@ components:
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
hours=1;minutes=2;seconds=3).'
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
@ -35941,7 +36127,12 @@ components:
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
token_validity:
|
access_token_validity:
|
||||||
|
type: string
|
||||||
|
minLength: 1
|
||||||
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
hours=1;minutes=2;seconds=3).'
|
||||||
|
refresh_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
|
@ -35972,40 +36163,6 @@ components:
|
||||||
required:
|
required:
|
||||||
- to
|
- to
|
||||||
- type
|
- type
|
||||||
RefreshTokenModel:
|
|
||||||
type: object
|
|
||||||
description: Serializer for BaseGrantModel and RefreshToken
|
|
||||||
properties:
|
|
||||||
pk:
|
|
||||||
type: integer
|
|
||||||
readOnly: true
|
|
||||||
title: ID
|
|
||||||
provider:
|
|
||||||
$ref: '#/components/schemas/OAuth2Provider'
|
|
||||||
user:
|
|
||||||
$ref: '#/components/schemas/User'
|
|
||||||
is_expired:
|
|
||||||
type: boolean
|
|
||||||
readOnly: true
|
|
||||||
expires:
|
|
||||||
type: string
|
|
||||||
format: date-time
|
|
||||||
scope:
|
|
||||||
type: array
|
|
||||||
items:
|
|
||||||
type: string
|
|
||||||
id_token:
|
|
||||||
type: string
|
|
||||||
readOnly: true
|
|
||||||
revoked:
|
|
||||||
type: boolean
|
|
||||||
required:
|
|
||||||
- id_token
|
|
||||||
- is_expired
|
|
||||||
- pk
|
|
||||||
- provider
|
|
||||||
- scope
|
|
||||||
- user
|
|
||||||
Reputation:
|
Reputation:
|
||||||
type: object
|
type: object
|
||||||
description: Reputation Serializer
|
description: Reputation Serializer
|
||||||
|
@ -37428,6 +37585,40 @@ components:
|
||||||
- identifier
|
- identifier
|
||||||
- pk
|
- pk
|
||||||
- user_obj
|
- user_obj
|
||||||
|
TokenModel:
|
||||||
|
type: object
|
||||||
|
description: Serializer for BaseGrantModel and RefreshToken
|
||||||
|
properties:
|
||||||
|
pk:
|
||||||
|
type: integer
|
||||||
|
readOnly: true
|
||||||
|
title: ID
|
||||||
|
provider:
|
||||||
|
$ref: '#/components/schemas/OAuth2Provider'
|
||||||
|
user:
|
||||||
|
$ref: '#/components/schemas/User'
|
||||||
|
is_expired:
|
||||||
|
type: boolean
|
||||||
|
readOnly: true
|
||||||
|
expires:
|
||||||
|
type: string
|
||||||
|
format: date-time
|
||||||
|
scope:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
id_token:
|
||||||
|
type: string
|
||||||
|
readOnly: true
|
||||||
|
revoked:
|
||||||
|
type: boolean
|
||||||
|
required:
|
||||||
|
- id_token
|
||||||
|
- is_expired
|
||||||
|
- pk
|
||||||
|
- provider
|
||||||
|
- scope
|
||||||
|
- user
|
||||||
TokenRequest:
|
TokenRequest:
|
||||||
type: object
|
type: object
|
||||||
description: Token Serializer
|
description: Token Serializer
|
||||||
|
|
|
@ -253,18 +253,34 @@ ${this.instance?.redirectUris}</textarea
|
||||||
<ak-utils-time-delta-help></ak-utils-time-delta-help>
|
<ak-utils-time-delta-help></ak-utils-time-delta-help>
|
||||||
</ak-form-element-horizontal>
|
</ak-form-element-horizontal>
|
||||||
<ak-form-element-horizontal
|
<ak-form-element-horizontal
|
||||||
label=${t`Token validity`}
|
label=${t`Access Token validity`}
|
||||||
?required=${true}
|
?required=${true}
|
||||||
name="tokenValidity"
|
name="accessTokenValidity"
|
||||||
>
|
>
|
||||||
<input
|
<input
|
||||||
type="text"
|
type="text"
|
||||||
value="${first(this.instance?.tokenValidity, "days=30")}"
|
value="${first(this.instance?.accessTokenValidity, "minutes=5")}"
|
||||||
class="pf-c-form-control"
|
class="pf-c-form-control"
|
||||||
required
|
required
|
||||||
/>
|
/>
|
||||||
<p class="pf-c-form__helper-text">
|
<p class="pf-c-form__helper-text">
|
||||||
${t`Configure how long refresh tokens and their id_tokens are valid for.`}
|
${t`Configure how long access tokens are valid for.`}
|
||||||
|
</p>
|
||||||
|
<ak-utils-time-delta-help></ak-utils-time-delta-help>
|
||||||
|
</ak-form-element-horizontal>
|
||||||
|
<ak-form-element-horizontal
|
||||||
|
label=${t`Refresh Token validity`}
|
||||||
|
?required=${true}
|
||||||
|
name="refreshTokenValidity"
|
||||||
|
>
|
||||||
|
<input
|
||||||
|
type="text"
|
||||||
|
value="${first(this.instance?.refreshTokenValidity, "days=30")}"
|
||||||
|
class="pf-c-form-control"
|
||||||
|
required
|
||||||
|
/>
|
||||||
|
<p class="pf-c-form__helper-text">
|
||||||
|
${t`Configure how long refresh tokens are valid for.`}
|
||||||
</p>
|
</p>
|
||||||
<ak-utils-time-delta-help></ak-utils-time-delta-help>
|
<ak-utils-time-delta-help></ak-utils-time-delta-help>
|
||||||
</ak-form-element-horizontal>
|
</ak-form-element-horizontal>
|
||||||
|
|
|
@ -342,10 +342,10 @@ export class ProxyProviderFormPage extends ModelForm<ProxyProvider, number> {
|
||||||
</div>
|
</div>
|
||||||
<div class="pf-c-card__footer">${this.renderSettings()}</div>
|
<div class="pf-c-card__footer">${this.renderSettings()}</div>
|
||||||
</div>
|
</div>
|
||||||
<ak-form-element-horizontal label=${t`Token validity`} name="tokenValidity">
|
<ak-form-element-horizontal label=${t`Token validity`} name="accessTokenValidity">
|
||||||
<input
|
<input
|
||||||
type="text"
|
type="text"
|
||||||
value="${first(this.instance?.tokenValidity, "hours=24")}"
|
value="${first(this.instance?.accessTokenValidity, "hours=24")}"
|
||||||
class="pf-c-form-control"
|
class="pf-c-form-control"
|
||||||
/>
|
/>
|
||||||
<p class="pf-c-form__helper-text">${t`Configure how long tokens are valid for.`}</p>
|
<p class="pf-c-form__helper-text">${t`Configure how long tokens are valid for.`}</p>
|
||||||
|
|
|
@ -345,7 +345,7 @@ export class UserViewPage extends AKElement {
|
||||||
</section>
|
</section>
|
||||||
<section
|
<section
|
||||||
slot="page-oauth-refresh"
|
slot="page-oauth-refresh"
|
||||||
data-tab-title="${t`OAuth Refresh Codes`}"
|
data-tab-title="${t`OAuth Refresh Tokens`}"
|
||||||
class="pf-c-page__main-section pf-m-no-padding-mobile"
|
class="pf-c-page__main-section pf-m-no-padding-mobile"
|
||||||
>
|
>
|
||||||
<div class="pf-c-card">
|
<div class="pf-c-card">
|
||||||
|
|
|
@ -12,10 +12,10 @@ import { customElement, property } from "lit/decorators.js";
|
||||||
|
|
||||||
import PFFlex from "@patternfly/patternfly/layouts/Flex/flex.css";
|
import PFFlex from "@patternfly/patternfly/layouts/Flex/flex.css";
|
||||||
|
|
||||||
import { ExpiringBaseGrantModel, Oauth2Api, RefreshTokenModel } from "@goauthentik/api";
|
import { ExpiringBaseGrantModel, Oauth2Api, TokenModel } from "@goauthentik/api";
|
||||||
|
|
||||||
@customElement("ak-user-oauth-refresh-list")
|
@customElement("ak-user-oauth-refresh-list")
|
||||||
export class UserOAuthRefreshList extends Table<RefreshTokenModel> {
|
export class UserOAuthRefreshList extends Table<TokenModel> {
|
||||||
expandable = true;
|
expandable = true;
|
||||||
|
|
||||||
@property({ type: Number })
|
@property({ type: Number })
|
||||||
|
@ -25,7 +25,7 @@ export class UserOAuthRefreshList extends Table<RefreshTokenModel> {
|
||||||
return super.styles.concat(PFFlex);
|
return super.styles.concat(PFFlex);
|
||||||
}
|
}
|
||||||
|
|
||||||
async apiEndpoint(page: number): Promise<PaginatedResponse<RefreshTokenModel>> {
|
async apiEndpoint(page: number): Promise<PaginatedResponse<TokenModel>> {
|
||||||
return new Oauth2Api(DEFAULT_CONFIG).oauth2RefreshTokensList({
|
return new Oauth2Api(DEFAULT_CONFIG).oauth2RefreshTokensList({
|
||||||
user: this.userId,
|
user: this.userId,
|
||||||
ordering: "expires",
|
ordering: "expires",
|
||||||
|
@ -46,7 +46,7 @@ export class UserOAuthRefreshList extends Table<RefreshTokenModel> {
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
||||||
renderExpanded(item: RefreshTokenModel): TemplateResult {
|
renderExpanded(item: TokenModel): TemplateResult {
|
||||||
return html` <td role="cell" colspan="4">
|
return html` <td role="cell" colspan="4">
|
||||||
<div class="pf-c-table__expandable-row-content">
|
<div class="pf-c-table__expandable-row-content">
|
||||||
<div class="pf-l-flex">
|
<div class="pf-l-flex">
|
||||||
|
@ -64,7 +64,7 @@ export class UserOAuthRefreshList extends Table<RefreshTokenModel> {
|
||||||
renderToolbarSelected(): TemplateResult {
|
renderToolbarSelected(): TemplateResult {
|
||||||
const disabled = this.selectedElements.length < 1;
|
const disabled = this.selectedElements.length < 1;
|
||||||
return html`<ak-forms-delete-bulk
|
return html`<ak-forms-delete-bulk
|
||||||
objectLabel=${t`Refresh Code(s)`}
|
objectLabel=${t`Refresh Tokens(s)`}
|
||||||
.objects=${this.selectedElements}
|
.objects=${this.selectedElements}
|
||||||
.usedBy=${(item: ExpiringBaseGrantModel) => {
|
.usedBy=${(item: ExpiringBaseGrantModel) => {
|
||||||
return new Oauth2Api(DEFAULT_CONFIG).oauth2RefreshTokensUsedByList({
|
return new Oauth2Api(DEFAULT_CONFIG).oauth2RefreshTokensUsedByList({
|
||||||
|
@ -83,7 +83,7 @@ export class UserOAuthRefreshList extends Table<RefreshTokenModel> {
|
||||||
</ak-forms-delete-bulk>`;
|
</ak-forms-delete-bulk>`;
|
||||||
}
|
}
|
||||||
|
|
||||||
row(item: RefreshTokenModel): TemplateResult[] {
|
row(item: TokenModel): TemplateResult[] {
|
||||||
return [
|
return [
|
||||||
html`<a href="#/core/providers/${item.provider?.pk}"> ${item.provider?.name} </a>`,
|
html`<a href="#/core/providers/${item.provider?.pk}"> ${item.provider?.name} </a>`,
|
||||||
html`<ak-label color=${item.revoked ? PFColor.Orange : PFColor.Green}>
|
html`<ak-label color=${item.revoked ? PFColor.Orange : PFColor.Green}>
|
||||||
|
|
|
@ -13,6 +13,10 @@ slug: "/releases/2023.2"
|
||||||
|
|
||||||
As with the previous improvements, we've made a lot of minor improvements to the general authentik UX to make your life easier.
|
As with the previous improvements, we've made a lot of minor improvements to the general authentik UX to make your life easier.
|
||||||
|
|
||||||
|
- OAuth2 Provider improvements
|
||||||
|
|
||||||
|
The OAuth2 provider has been reworked to be closer to OAuth specifications and better support refresh tokens and offline access. Additionally the expiry for access tokens and refresh tokens can be adjusted separately now.
|
||||||
|
|
||||||
## Upgrading
|
## Upgrading
|
||||||
|
|
||||||
This release does not introduce any new requirements.
|
This release does not introduce any new requirements.
|
||||||
|
|
Reference in New Issue