Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
D
dex
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
go
dex
Commits
a5d218fd
Commit
a5d218fd
authored
Jul 07, 2017
by
rithu leena john
Committed by
GitHub
Jul 07, 2017
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #974 from roguePanda/google-hosted-domain
Google hosted domain support
parents
6f2af269
cbb00766
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
144 additions
and
9 deletions
+144
-9
oidc-connector.md
Documentation/oidc-connector.md
+7
-0
oidc.go
connector/oidc/oidc.go
+36
-8
oidc_test.go
connector/oidc/oidc_test.go
+100
-1
config-dev.yaml
examples/config-dev.yaml
+1
-0
No files found.
Documentation/oidc-connector.md
View file @
a5d218fd
...
...
@@ -42,6 +42,13 @@ connectors:
# following field.
#
# basicAuthUnsupported: true
# Google supports whitelisting allowed domains when using G Suite
# (Google Apps). The following field can be set to a list of domains
# that can log in:
#
# hostedDomains:
# - example.com
```
[
oidc-doc
]:
openid-connect.md
...
...
connector/oidc/oidc.go
View file @
a5d218fd
...
...
@@ -33,6 +33,9 @@ type Config struct {
Scopes
[]
string
`json:"scopes"`
// defaults to "profile" and "email"
// Optional list of whitelisted domains when using Google
// If this field is nonempty, only users from a listed domain will be allowed to log in
HostedDomains
[]
string
`json:"hostedDomain"`
}
// Domains that don't support basic auth. golang.org/x/oauth2 has an internal
...
...
@@ -110,8 +113,9 @@ func (c *Config) Open(logger logrus.FieldLogger) (conn connector.Connector, err
verifier
:
provider
.
Verifier
(
&
oidc
.
Config
{
ClientID
:
clientID
},
),
logger
:
logger
,
cancel
:
cancel
,
logger
:
logger
,
cancel
:
cancel
,
hostedDomains
:
c
.
HostedDomains
,
},
nil
}
...
...
@@ -121,12 +125,13 @@ var (
)
type
oidcConnector
struct
{
redirectURI
string
oauth2Config
*
oauth2
.
Config
verifier
*
oidc
.
IDTokenVerifier
ctx
context
.
Context
cancel
context
.
CancelFunc
logger
logrus
.
FieldLogger
redirectURI
string
oauth2Config
*
oauth2
.
Config
verifier
*
oidc
.
IDTokenVerifier
ctx
context
.
Context
cancel
context
.
CancelFunc
logger
logrus
.
FieldLogger
hostedDomains
[]
string
}
func
(
c
*
oidcConnector
)
Close
()
error
{
...
...
@@ -138,6 +143,14 @@ func (c *oidcConnector) LoginURL(s connector.Scopes, callbackURL, state string)
if
c
.
redirectURI
!=
callbackURL
{
return
""
,
fmt
.
Errorf
(
"expected callback URL %q did not match the URL in the config %q"
,
callbackURL
,
c
.
redirectURI
)
}
if
len
(
c
.
hostedDomains
)
>
0
{
preferredDomain
:=
c
.
hostedDomains
[
0
]
if
len
(
c
.
hostedDomains
)
>
1
{
preferredDomain
=
"*"
}
return
c
.
oauth2Config
.
AuthCodeURL
(
state
,
oauth2
.
SetAuthURLParam
(
"hd"
,
preferredDomain
)),
nil
}
return
c
.
oauth2Config
.
AuthCodeURL
(
state
),
nil
}
...
...
@@ -176,11 +189,26 @@ func (c *oidcConnector) HandleCallback(s connector.Scopes, r *http.Request) (ide
Username
string
`json:"name"`
Email
string
`json:"email"`
EmailVerified
bool
`json:"email_verified"`
HostedDomain
string
`json:"hd"`
}
if
err
:=
idToken
.
Claims
(
&
claims
);
err
!=
nil
{
return
identity
,
fmt
.
Errorf
(
"oidc: failed to decode claims: %v"
,
err
)
}
if
len
(
c
.
hostedDomains
)
>
0
{
found
:=
false
for
_
,
domain
:=
range
c
.
hostedDomains
{
if
claims
.
HostedDomain
!=
domain
{
found
=
true
break
}
}
if
!
found
{
return
identity
,
fmt
.
Errorf
(
"oidc: unexpected hd claim %v"
,
claims
.
HostedDomain
)
}
}
identity
=
connector
.
Identity
{
UserID
:
idToken
.
Subject
,
Username
:
claims
.
Username
,
...
...
connector/oidc/oidc_test.go
View file @
a5d218fd
package
oidc
import
"testing"
import
(
"github.com/Sirupsen/logrus"
"github.com/coreos/dex/connector"
"net/url"
"os"
"reflect"
"testing"
)
func
TestKnownBrokenAuthHeaderProvider
(
t
*
testing
.
T
)
{
tests
:=
[]
struct
{
...
...
@@ -21,3 +28,95 @@ func TestKnownBrokenAuthHeaderProvider(t *testing.T) {
}
}
}
func
TestOidcConnector_LoginURL
(
t
*
testing
.
T
)
{
logger
:=
&
logrus
.
Logger
{
Out
:
os
.
Stderr
,
Formatter
:
&
logrus
.
TextFormatter
{
DisableColors
:
true
},
Level
:
logrus
.
DebugLevel
,
}
tests
:=
[]
struct
{
scopes
connector
.
Scopes
hostedDomains
[]
string
wantScopes
string
wantHdParam
string
}{
{
connector
.
Scopes
{},
[]
string
{
"example.com"
},
"openid profile email"
,
"example.com"
,
},
{
connector
.
Scopes
{},
[]
string
{
"mydomain.org"
,
"example.com"
},
"openid profile email"
,
"*"
,
},
{
connector
.
Scopes
{},
[]
string
{},
"openid profile email"
,
""
,
},
{
connector
.
Scopes
{
OfflineAccess
:
true
},
[]
string
{},
"openid profile email"
,
""
,
},
}
callback
:=
"https://dex.example.com/callback"
state
:=
"secret"
for
_
,
test
:=
range
tests
{
config
:=
&
Config
{
Issuer
:
"https://accounts.google.com"
,
ClientID
:
"client-id"
,
ClientSecret
:
"client-secret"
,
RedirectURI
:
"https://dex.example.com/callback"
,
HostedDomains
:
test
.
hostedDomains
,
}
conn
,
err
:=
config
.
Open
(
logger
)
if
err
!=
nil
{
t
.
Errorf
(
"failed to open connector: %v"
,
err
)
continue
}
loginURL
,
err
:=
conn
.
(
connector
.
CallbackConnector
)
.
LoginURL
(
test
.
scopes
,
callback
,
state
)
if
err
!=
nil
{
t
.
Errorf
(
"failed to get login URL: %v"
,
err
)
continue
}
actual
,
err
:=
url
.
Parse
(
loginURL
)
if
err
!=
nil
{
t
.
Errorf
(
"failed to parse login URL: %v"
,
err
)
continue
}
wanted
,
_
:=
url
.
Parse
(
"https://accounts.google.com/o/oauth2/v2/auth"
)
wantedQuery
:=
&
url
.
Values
{}
wantedQuery
.
Set
(
"client_id"
,
config
.
ClientID
)
wantedQuery
.
Set
(
"redirect_uri"
,
config
.
RedirectURI
)
wantedQuery
.
Set
(
"response_type"
,
"code"
)
wantedQuery
.
Set
(
"state"
,
"secret"
)
wantedQuery
.
Set
(
"scope"
,
test
.
wantScopes
)
if
test
.
wantHdParam
!=
""
{
wantedQuery
.
Set
(
"hd"
,
test
.
wantHdParam
)
}
wanted
.
RawQuery
=
wantedQuery
.
Encode
()
if
!
reflect
.
DeepEqual
(
actual
,
wanted
)
{
t
.
Errorf
(
"Wanted %v, got %v"
,
wanted
,
actual
)
}
}
}
//func TestOidcConnector_HandleCallback(t *testing.T) {
// logger := &logrus.Logger{
// Out: os.Stderr,
// Formatter: &logrus.TextFormatter{DisableColors: true},
// Level: logrus.DebugLevel,
// }
//
// tests := []struct {
//
// }
//}
examples/config-dev.yaml
View file @
a5d218fd
...
...
@@ -67,6 +67,7 @@ connectors:
# clientID: $GOOGLE_CLIENT_ID
# clientSecret: $GOOGLE_CLIENT_SECRET
# redirectURI: http://127.0.0.1:5556/dex/callback
# hostedDomain: $GOOGLE_HOSTED_DOMAIN
# Let dex keep a list of passwords which can be used to login to dex.
enablePasswordDB
:
true
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment