1
0
Fork 0
httpserver/modules/saml/saml.go

171 Zeilen
4.3 KiB
Go

2021-01-09 20:39:05 +00:00
package saml
import (
"context"
"crypto/rsa"
"crypto/x509"
"fmt"
"net/http"
"net/url"
"time"
"github.com/crewjam/saml"
"github.com/crewjam/saml/samlsp"
"github.com/gin-gonic/gin"
"github.com/pelletier/go-toml"
"github.com/phuslu/log"
"go.sebtobie.de/httpserver"
2021-01-10 00:35:50 +00:00
"go.sebtobie.de/httpserver/auth"
2021-01-09 20:39:05 +00:00
"gopkg.in/dgrijalva/jwt-go.v3"
)
var (
defaultsaml = &SAML{
Selfsigned: false,
UnkownAuthority: false,
IDP: "https://samltest.id/saml/idp",
Domain: "example.com",
Cookiename: "ILOVECOOKIES",
}
_ httpserver.Site = defaultsaml
2021-01-09 20:39:05 +00:00
)
type metadata struct{}
// SAML is an Applicance to react on Events from the SAML-IDP and that provides an interface to get data from the IDP in a standartised fashion.
type SAML struct {
router *gin.RouterGroup
config *toml.Tree
publicroot string
Keyfiles []string
SPPublicKey string
sppublickey *x509.Certificate
SPPrivatekey string
spprivatekey *rsa.PrivateKey
JWTPrivatekey string
jwtprivatekey *rsa.PrivateKey
Selfsigned bool
UnkownAuthority bool
IDP string `comment:"URL of the Metadata of the IDP"`
sp *saml.ServiceProvider
2021-01-18 23:19:33 +00:00
HTTPClient http.Client `toml:"-"`
2021-01-09 20:39:05 +00:00
Domain string
Cookiename string
}
// NewSAMLEndpoint creates an endpoint which handles SAML Requests.
func NewSAMLEndpoint(config *toml.Tree) (s *SAML, err error) {
s = &(*defaultsaml)
s.config = config
log.Trace().Str("config", config.String()).Msg("config")
2021-01-09 20:39:05 +00:00
var key interface{}
s.config = config
2021-01-16 18:20:38 +00:00
if err = config.Unmarshal(s); err != nil {
2021-01-09 20:39:05 +00:00
log.Error().Err(err).Msg("Error while mapping config to struct")
return
2021-01-09 20:39:05 +00:00
}
key, err = initcert(s.SPPrivatekey, func(key interface{}) bool {
_, ok := key.(*rsa.PrivateKey)
return ok
})
if err != nil {
return
2021-01-09 20:39:05 +00:00
}
s.spprivatekey = key.(*rsa.PrivateKey)
key, err = initcert(s.SPPublicKey, func(key interface{}) bool {
_, ok := key.(*x509.Certificate)
return ok
})
if err != nil {
return
2021-01-09 20:39:05 +00:00
}
s.sppublickey = key.(*x509.Certificate)
key, err = initcert(s.SPPrivatekey, func(key interface{}) bool {
_, ok := key.(*rsa.PrivateKey)
return ok
})
if err != nil {
return
2021-01-09 20:39:05 +00:00
}
s.jwtprivatekey = key.(*rsa.PrivateKey)
s.sp = &saml.ServiceProvider{
Key: s.spprivatekey,
Certificate: s.sppublickey,
}
var idpurl *url.URL
idpurl, err = url.ParseRequestURI(s.IDP)
if err != nil {
return
2021-01-09 20:39:05 +00:00
}
2021-01-18 23:19:33 +00:00
s.sp.IDPMetadata, err = samlsp.FetchMetadata(context.Background(), &s.HTTPClient, *idpurl)
2021-01-09 20:39:05 +00:00
if err != nil {
return
2021-01-09 20:39:05 +00:00
}
s.sp.AuthnNameIDFormat = saml.UnspecifiedNameIDFormat
return
2021-01-09 20:39:05 +00:00
}
// Init initalizes the routes
func (s *SAML) Init(router *gin.RouterGroup) {
s.publicroot = router.BasePath()
s.router = router
s.sp.AcsURL = url.URL{
Scheme: "https",
Host: s.Domain,
Path: s.publicroot + "/acs",
}
s.sp.MetadataURL = url.URL{
Scheme: "https",
Host: s.Domain,
Path: s.publicroot + "/metadata.xml",
}
router.GET("/metadata.xml", s.metadataHF)
router.POST("/acs", s.acsHF)
}
// Teardown is to satisfy the httpserver.Site interface.
func (s *SAML) Teardown() {}
2021-01-09 20:39:05 +00:00
func (s *SAML) metadataHF(c *gin.Context) {
m := s.sp.Metadata()
log.Debug().Time("Validuntil", m.ValidUntil).Msg("SP MEtadata")
c.XML(http.StatusOK, m)
}
func (s *SAML) acsHF(c *gin.Context) {
2021-01-10 00:35:50 +00:00
account := c.MustGet("account").(auth.Account)
2021-01-09 20:39:05 +00:00
err := c.Request.ParseForm()
if err != nil {
c.AbortWithError(http.StatusNotAcceptable, err)
}
var assert *saml.Assertion
assert, err = s.sp.ParseResponse(c.Request, []string{account.Get("jti").(string)})
if err != nil {
realerr, _ := err.(*saml.InvalidResponseError)
err = realerr.PrivateErr
log.Error().AnErr("Assertionerror", err).Msgf("Assertion Error")
fmt.Print(realerr.Response)
c.AbortWithStatus(http.StatusBadRequest)
return
}
data := attributeStatementstomap(assert.AttributeStatements)
token, err := jwttoken(jwt.MapClaims{
2021-01-10 00:35:50 +00:00
auth.AccountAnon: false,
auth.AccountID: account.Get(auth.AccountID).(string),
auth.AccountUser: data["uid"][0],
2021-01-09 20:39:05 +00:00
}, s.jwtprivatekey)
if err != nil {
c.AbortWithStatus(http.StatusInternalServerError)
return
}
c.SetCookie(s.Cookiename, token, int(time.Hour*24*30), "", "", true, true)
redirect, found := c.GetPostForm("RelayState")
if !found {
c.AbortWithStatus(http.StatusNotAcceptable)
return
}
c.Redirect(http.StatusSeeOther, redirect)
}