mirror of
https://github.com/gyurix1968/guacamole-client.git
synced 2025-09-06 05:07:41 +00:00
Merge 1.3.0 changes back to master.
This commit is contained in:
@@ -22,6 +22,7 @@ package org.apache.guacamole.auth.openid;
|
|||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
|
import java.util.Set;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import org.apache.guacamole.auth.openid.conf.ConfigurationService;
|
import org.apache.guacamole.auth.openid.conf.ConfigurationService;
|
||||||
import org.apache.guacamole.auth.openid.form.TokenField;
|
import org.apache.guacamole.auth.openid.form.TokenField;
|
||||||
@@ -34,6 +35,7 @@ import org.apache.guacamole.language.TranslatableMessage;
|
|||||||
import org.apache.guacamole.net.auth.Credentials;
|
import org.apache.guacamole.net.auth.Credentials;
|
||||||
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
import org.apache.guacamole.net.auth.credentials.CredentialsInfo;
|
||||||
import org.apache.guacamole.net.auth.credentials.GuacamoleInvalidCredentialsException;
|
import org.apache.guacamole.net.auth.credentials.GuacamoleInvalidCredentialsException;
|
||||||
|
import org.jose4j.jwt.JwtClaims;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
@@ -91,13 +93,19 @@ public class AuthenticationProviderService {
|
|||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
|
|
||||||
String username = null;
|
String username = null;
|
||||||
|
Set<String> groups = null;
|
||||||
|
|
||||||
// Validate OpenID token in request, if present, and derive username
|
// Validate OpenID token in request, if present, and derive username
|
||||||
HttpServletRequest request = credentials.getRequest();
|
HttpServletRequest request = credentials.getRequest();
|
||||||
if (request != null) {
|
if (request != null) {
|
||||||
String token = request.getParameter(TokenField.PARAMETER_NAME);
|
String token = request.getParameter(TokenField.PARAMETER_NAME);
|
||||||
if (token != null)
|
if (token != null) {
|
||||||
username = tokenService.processUsername(token);
|
JwtClaims claims = tokenService.validateToken(token);
|
||||||
|
if (claims != null) {
|
||||||
|
username = tokenService.processUsername(claims);
|
||||||
|
groups = tokenService.processGroups(claims);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// If the username was successfully retrieved from the token, produce
|
// If the username was successfully retrieved from the token, produce
|
||||||
@@ -106,7 +114,7 @@ public class AuthenticationProviderService {
|
|||||||
|
|
||||||
// Create corresponding authenticated user
|
// Create corresponding authenticated user
|
||||||
AuthenticatedUser authenticatedUser = authenticatedUserProvider.get();
|
AuthenticatedUser authenticatedUser = authenticatedUserProvider.get();
|
||||||
authenticatedUser.init(username, credentials);
|
authenticatedUser.init(username, credentials, groups);
|
||||||
return authenticatedUser;
|
return authenticatedUser;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -39,6 +39,12 @@ public class ConfigurationService {
|
|||||||
*/
|
*/
|
||||||
private static final String DEFAULT_USERNAME_CLAIM_TYPE = "email";
|
private static final String DEFAULT_USERNAME_CLAIM_TYPE = "email";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The default claim type to use to retrieve an authenticated user's
|
||||||
|
* groups.
|
||||||
|
*/
|
||||||
|
private static final String DEFAULT_GROUPS_CLAIM_TYPE = "groups";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The default space-separated list of OpenID scopes to request.
|
* The default space-separated list of OpenID scopes to request.
|
||||||
*/
|
*/
|
||||||
@@ -108,6 +114,18 @@ public class ConfigurationService {
|
|||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The claim type which contains the authenticated user's groups within
|
||||||
|
* any valid JWT.
|
||||||
|
*/
|
||||||
|
private static final StringGuacamoleProperty OPENID_GROUPS_CLAIM_TYPE =
|
||||||
|
new StringGuacamoleProperty() {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() { return "openid-groups-claim-type"; }
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The space-separated list of OpenID scopes to request.
|
* The space-separated list of OpenID scopes to request.
|
||||||
*/
|
*/
|
||||||
@@ -292,6 +310,22 @@ public class ConfigurationService {
|
|||||||
return environment.getProperty(OPENID_USERNAME_CLAIM_TYPE, DEFAULT_USERNAME_CLAIM_TYPE);
|
return environment.getProperty(OPENID_USERNAME_CLAIM_TYPE, DEFAULT_USERNAME_CLAIM_TYPE);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the claim type which contains the authenticated user's groups
|
||||||
|
* within any valid JWT, as configured with guacamole.properties. By
|
||||||
|
* default, this will be "groups".
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The claim type which contains the authenticated user's groups
|
||||||
|
* within any valid JWT, as configured with guacamole.properties.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties cannot be parsed.
|
||||||
|
*/
|
||||||
|
public String getGroupsClaimType() throws GuacamoleException {
|
||||||
|
return environment.getProperty(OPENID_GROUPS_CLAIM_TYPE, DEFAULT_GROUPS_CLAIM_TYPE);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the space-separated list of OpenID scopes to request. By default,
|
* Returns the space-separated list of OpenID scopes to request. By default,
|
||||||
* this will be "openid email profile". The OpenID scopes determine the
|
* this will be "openid email profile". The OpenID scopes determine the
|
||||||
|
@@ -20,6 +20,10 @@
|
|||||||
package org.apache.guacamole.auth.openid.token;
|
package org.apache.guacamole.auth.openid.token;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
import org.apache.guacamole.auth.openid.conf.ConfigurationService;
|
import org.apache.guacamole.auth.openid.conf.ConfigurationService;
|
||||||
import org.apache.guacamole.GuacamoleException;
|
import org.apache.guacamole.GuacamoleException;
|
||||||
import org.jose4j.jwk.HttpsJwks;
|
import org.jose4j.jwk.HttpsJwks;
|
||||||
@@ -56,23 +60,20 @@ public class TokenValidationService {
|
|||||||
private NonceService nonceService;
|
private NonceService nonceService;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Validates and parses the given ID token, returning the username contained
|
* Validates the given ID token, returning the JwtClaims contained therein.
|
||||||
* therein, as defined by the username claim type given in
|
* If the ID token is invalid, null is returned.
|
||||||
* guacamole.properties. If the username claim type is missing or the ID
|
|
||||||
* token is invalid, null is returned.
|
|
||||||
*
|
*
|
||||||
* @param token
|
* @param token
|
||||||
* The ID token to validate and parse.
|
* The ID token to validate.
|
||||||
*
|
*
|
||||||
* @return
|
* @return
|
||||||
* The username contained within the given ID token, or null if the ID
|
* The JWT claims contained within the given ID token if it passes tests,
|
||||||
* token is not valid or the username claim type is missing,
|
* or null if the token is not valid.
|
||||||
*
|
*
|
||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If guacamole.properties could not be parsed.
|
* If guacamole.properties could not be parsed.
|
||||||
*/
|
*/
|
||||||
public String processUsername(String token) throws GuacamoleException {
|
public JwtClaims validateToken(String token) throws GuacamoleException {
|
||||||
|
|
||||||
// Validating the token requires a JWKS key resolver
|
// Validating the token requires a JWKS key resolver
|
||||||
HttpsJwks jwks = new HttpsJwks(confService.getJWKSEndpoint().toString());
|
HttpsJwks jwks = new HttpsJwks(confService.getJWKSEndpoint().toString());
|
||||||
HttpsJwksVerificationKeyResolver resolver = new HttpsJwksVerificationKeyResolver(jwks);
|
HttpsJwksVerificationKeyResolver resolver = new HttpsJwksVerificationKeyResolver(jwks);
|
||||||
@@ -89,52 +90,115 @@ public class TokenValidationService {
|
|||||||
.build();
|
.build();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
|
||||||
String usernameClaim = confService.getUsernameClaimType();
|
|
||||||
|
|
||||||
// Validate JWT
|
// Validate JWT
|
||||||
JwtClaims claims = jwtConsumer.processToClaims(token);
|
JwtClaims claims = jwtConsumer.processToClaims(token);
|
||||||
|
|
||||||
// Verify a nonce is present
|
// Verify a nonce is present
|
||||||
String nonce = claims.getStringClaimValue("nonce");
|
String nonce = claims.getStringClaimValue("nonce");
|
||||||
if (nonce == null) {
|
if (nonce != null) {
|
||||||
|
// Verify that we actually generated the nonce, and that it has not
|
||||||
|
// already been used
|
||||||
|
if (nonceService.isValid(nonce)) {
|
||||||
|
// nonce is valid, consider claims valid
|
||||||
|
return claims;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
logger.info("Rejected OpenID token with invalid/old nonce.");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
logger.info("Rejected OpenID token without nonce.");
|
logger.info("Rejected OpenID token without nonce.");
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
// Log any failures to validate/parse the JWT
|
||||||
|
catch (MalformedClaimException e) {
|
||||||
|
logger.info("Rejected OpenID token with malformed claim: {}", e.getMessage());
|
||||||
|
logger.debug("Malformed claim within received JWT.", e);
|
||||||
|
}
|
||||||
|
catch (InvalidJwtException e) {
|
||||||
|
logger.info("Rejected invalid OpenID token: {}", e.getMessage());
|
||||||
|
logger.debug("Invalid JWT received.", e);
|
||||||
|
}
|
||||||
|
|
||||||
// Verify that we actually generated the nonce, and that it has not
|
return null;
|
||||||
// already been used
|
}
|
||||||
if (!nonceService.isValid(nonce)) {
|
|
||||||
logger.debug("Rejected OpenID token with invalid/old nonce.");
|
/**
|
||||||
return null;
|
* Parses the given JwtClaims, returning the username contained
|
||||||
|
* therein, as defined by the username claim type given in
|
||||||
|
* guacamole.properties. If the username claim type is missing or
|
||||||
|
* is invalid, null is returned.
|
||||||
|
*
|
||||||
|
* @param claims
|
||||||
|
* A valid JwtClaims to extract the username from.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The username contained within the given JwtClaims, or null if the
|
||||||
|
* claim is not valid or the username claim type is missing,
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties could not be parsed.
|
||||||
|
*/
|
||||||
|
public String processUsername(JwtClaims claims) throws GuacamoleException {
|
||||||
|
String usernameClaim = confService.getUsernameClaimType();
|
||||||
|
|
||||||
|
if (claims != null) {
|
||||||
|
try {
|
||||||
|
// Pull username from claims
|
||||||
|
String username = claims.getStringClaimValue(usernameClaim);
|
||||||
|
if (username != null)
|
||||||
|
return username;
|
||||||
|
}
|
||||||
|
catch (MalformedClaimException e) {
|
||||||
|
logger.info("Rejected OpenID token with malformed claim: {}", e.getMessage());
|
||||||
|
logger.debug("Malformed claim within received JWT.", e);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Pull username from claims
|
|
||||||
String username = claims.getStringClaimValue(usernameClaim);
|
|
||||||
if (username != null)
|
|
||||||
return username;
|
|
||||||
|
|
||||||
// Warn if username was not present in token, as it likely means
|
// Warn if username was not present in token, as it likely means
|
||||||
// the system is not set up correctly
|
// the system is not set up correctly
|
||||||
logger.warn("Username claim \"{}\" missing from token. Perhaps the "
|
logger.warn("Username claim \"{}\" missing from token. Perhaps the "
|
||||||
+ "OpenID scope and/or username claim type are "
|
+ "OpenID scope and/or username claim type are "
|
||||||
+ "misconfigured?", usernameClaim);
|
+ "misconfigured?", usernameClaim);
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// Log any failures to validate/parse the JWT
|
|
||||||
catch (InvalidJwtException e) {
|
|
||||||
logger.info("Rejected invalid OpenID token: {}", e.getMessage());
|
|
||||||
logger.debug("Invalid JWT received.", e);
|
|
||||||
}
|
|
||||||
catch (MalformedClaimException e) {
|
|
||||||
logger.info("Rejected OpenID token with malformed claim: {}", e.getMessage());
|
|
||||||
logger.debug("Malformed claim within received JWT.", e);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Could not retrieve username from JWT
|
// Could not retrieve username from JWT
|
||||||
return null;
|
return null;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parses the given JwtClaims, returning the groups contained
|
||||||
|
* therein, as defined by the groups claim type given in
|
||||||
|
* guacamole.properties. If the groups claim type is missing or
|
||||||
|
* is invalid, an empty set is returned.
|
||||||
|
*
|
||||||
|
* @param claims
|
||||||
|
* A valid JwtClaims to extract groups from.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A Set of String representing the groups the user is member of
|
||||||
|
* from the OpenID provider point of view, or an empty Set if
|
||||||
|
* claim is not valid or the groups claim type is missing,
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If guacamole.properties could not be parsed.
|
||||||
|
*/
|
||||||
|
public Set<String> processGroups(JwtClaims claims) throws GuacamoleException {
|
||||||
|
String groupsClaim = confService.getGroupsClaimType();
|
||||||
|
|
||||||
|
if (claims != null) {
|
||||||
|
try {
|
||||||
|
// Pull groups from claims
|
||||||
|
List<String> oidcGroups = claims.getStringListClaimValue(groupsClaim);
|
||||||
|
if (oidcGroups != null && !oidcGroups.isEmpty())
|
||||||
|
return Collections.unmodifiableSet(new HashSet<>(oidcGroups));
|
||||||
|
}
|
||||||
|
catch (MalformedClaimException e) {
|
||||||
|
logger.info("Rejected OpenID token with malformed claim: {}", e.getMessage());
|
||||||
|
logger.debug("Malformed claim within received JWT.", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Could not retrieve groups from JWT
|
||||||
|
return Collections.emptySet();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@@ -20,14 +20,15 @@
|
|||||||
package org.apache.guacamole.auth.openid.user;
|
package org.apache.guacamole.auth.openid.user;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
import java.util.Set;
|
||||||
import org.apache.guacamole.net.auth.AbstractAuthenticatedUser;
|
import org.apache.guacamole.net.auth.AbstractAuthenticatedUser;
|
||||||
import org.apache.guacamole.net.auth.AuthenticationProvider;
|
import org.apache.guacamole.net.auth.AuthenticationProvider;
|
||||||
import org.apache.guacamole.net.auth.Credentials;
|
import org.apache.guacamole.net.auth.Credentials;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An openid-specific implementation of AuthenticatedUser, associating a
|
* An openid-specific implementation of AuthenticatedUser, associating a
|
||||||
* username and particular set of credentials with the OpenID authentication
|
* username, a particular set of credentials and the groups with the
|
||||||
* provider.
|
* OpenID authentication provider.
|
||||||
*/
|
*/
|
||||||
public class AuthenticatedUser extends AbstractAuthenticatedUser {
|
public class AuthenticatedUser extends AbstractAuthenticatedUser {
|
||||||
|
|
||||||
@@ -43,6 +44,11 @@ public class AuthenticatedUser extends AbstractAuthenticatedUser {
|
|||||||
*/
|
*/
|
||||||
private Credentials credentials;
|
private Credentials credentials;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The groups of the user that was authenticated.
|
||||||
|
*/
|
||||||
|
private Set<String> effectiveGroups;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Initializes this AuthenticatedUser using the given username and
|
* Initializes this AuthenticatedUser using the given username and
|
||||||
* credentials.
|
* credentials.
|
||||||
@@ -52,9 +58,13 @@ public class AuthenticatedUser extends AbstractAuthenticatedUser {
|
|||||||
*
|
*
|
||||||
* @param credentials
|
* @param credentials
|
||||||
* The credentials provided when this user was authenticated.
|
* The credentials provided when this user was authenticated.
|
||||||
|
*
|
||||||
|
* @param effectiveGroups
|
||||||
|
* The groups of the user that was authenticated.
|
||||||
*/
|
*/
|
||||||
public void init(String username, Credentials credentials) {
|
public void init(String username, Credentials credentials, Set<String> effectiveGroups) {
|
||||||
this.credentials = credentials;
|
this.credentials = credentials;
|
||||||
|
this.effectiveGroups = effectiveGroups;
|
||||||
setIdentifier(username);
|
setIdentifier(username);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -68,4 +78,8 @@ public class AuthenticatedUser extends AbstractAuthenticatedUser {
|
|||||||
return credentials;
|
return credentials;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getEffectiveUserGroups() {
|
||||||
|
return effectiveGroups;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user