mirror of
https://github.com/umami-software/umami.git
synced 2026-02-07 14:17:13 +01:00
Add OIDC authentification in project
This commit is contained in:
parent
777515f754
commit
7f904d9e92
17 changed files with 547 additions and 26 deletions
40
src/app/api/auth/oidc/authorize/route.ts
Normal file
40
src/app/api/auth/oidc/authorize/route.ts
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
import { NextRequest } from 'next/server';
|
||||
import {
|
||||
getEffectiveOIDCConfig,
|
||||
generateState,
|
||||
generateCodeVerifier,
|
||||
generateCodeChallenge,
|
||||
getAuthorizationUrl,
|
||||
} from '@/lib/oidc';
|
||||
import { json, badRequest } from '@/lib/response';
|
||||
|
||||
export const runtime = 'nodejs';
|
||||
|
||||
export async function GET(request: NextRequest) {
|
||||
const cfg = await getEffectiveOIDCConfig();
|
||||
|
||||
if (!cfg.enabled) {
|
||||
return badRequest('OIDC is not enabled');
|
||||
}
|
||||
|
||||
const url = new URL(request.url);
|
||||
const returnUrl = url.searchParams.get('returnUrl') || '/dashboard';
|
||||
|
||||
const state = await generateState();
|
||||
const codeVerifier = await generateCodeVerifier();
|
||||
const codeChallenge = await generateCodeChallenge(codeVerifier);
|
||||
|
||||
const authUrl = await getAuthorizationUrl(cfg, state, codeChallenge);
|
||||
|
||||
const stateData = Buffer.from(
|
||||
JSON.stringify({
|
||||
state,
|
||||
codeVerifier,
|
||||
returnUrl,
|
||||
}),
|
||||
).toString('base64url');
|
||||
|
||||
const finalAuthUrl = authUrl.replace(`state=${state}`, `state=${stateData}`);
|
||||
|
||||
return json({ url: finalAuthUrl });
|
||||
}
|
||||
79
src/app/api/auth/oidc/callback/route.ts
Normal file
79
src/app/api/auth/oidc/callback/route.ts
Normal file
|
|
@ -0,0 +1,79 @@
|
|||
import { NextRequest } from 'next/server';
|
||||
import {
|
||||
getEffectiveOIDCConfig,
|
||||
getOIDCUsernameFromIdToken,
|
||||
exchangeCodeForToken,
|
||||
} from '@/lib/oidc';
|
||||
import { badRequest, unauthorized } from '@/lib/response';
|
||||
import { saveAuth } from '@/lib/auth';
|
||||
import { ROLES } from '@/lib/constants';
|
||||
import { getUserByUsername, createUser } from '@/queries';
|
||||
import { uuid, secret } from '@/lib/crypto';
|
||||
import { createSecureToken } from '@/lib/jwt';
|
||||
import redis from '@/lib/redis';
|
||||
|
||||
export const runtime = 'nodejs';
|
||||
|
||||
export async function GET(request: NextRequest) {
|
||||
const cfg = await getEffectiveOIDCConfig();
|
||||
|
||||
if (!cfg.enabled) {
|
||||
return badRequest('OIDC is not enabled');
|
||||
}
|
||||
|
||||
const url = new URL(request.url);
|
||||
const code = url.searchParams.get('code');
|
||||
const state = url.searchParams.get('state');
|
||||
|
||||
if (!code || !state) {
|
||||
return badRequest('Missing code or state parameter');
|
||||
}
|
||||
|
||||
// Décoder les données du state
|
||||
let stateData;
|
||||
try {
|
||||
const decoded = Buffer.from(state, 'base64url').toString('utf8');
|
||||
stateData = JSON.parse(decoded);
|
||||
} catch (e) {
|
||||
return badRequest('Invalid state parameter format');
|
||||
}
|
||||
|
||||
const { codeVerifier, returnUrl } = stateData;
|
||||
const returnCookie = returnUrl || '/dashboard';
|
||||
|
||||
const tokens = await exchangeCodeForToken(cfg, code, codeVerifier);
|
||||
const idToken = tokens.id_token;
|
||||
|
||||
if (!idToken) {
|
||||
return unauthorized('Missing id_token');
|
||||
}
|
||||
|
||||
const username = getOIDCUsernameFromIdToken(idToken, cfg.usernameClaim);
|
||||
|
||||
if (!username) {
|
||||
return unauthorized('Unable to resolve username from id_token');
|
||||
}
|
||||
|
||||
let user = await getUserByUsername(username);
|
||||
|
||||
if (!user && cfg.autoCreateUsers) {
|
||||
user = await createUser({ id: uuid(), username, password: uuid(), role: ROLES.user });
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
return unauthorized('User not allowed');
|
||||
}
|
||||
|
||||
let token: string;
|
||||
if (redis.enabled) {
|
||||
token = await saveAuth({ userId: user.id, role: user.role });
|
||||
} else {
|
||||
token = createSecureToken({ userId: user.id, role: user.role }, secret());
|
||||
}
|
||||
|
||||
const baseUrl = new URL(request.url).origin;
|
||||
const ssoUrl = `${baseUrl}/sso?url=${encodeURIComponent(returnCookie)}&token=${encodeURIComponent(
|
||||
token,
|
||||
)}`;
|
||||
return Response.redirect(ssoUrl, 302);
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue