mirror of
https://github.com/pomerium/pomerium.git
synced 2025-07-19 17:50:17 +02:00
change gitlab group unique identifier from name to ID (#571)
This commit is contained in:
parent
4c5d2d8020
commit
3c6431e5bc
2 changed files with 22 additions and 53 deletions
|
@ -23,11 +23,13 @@ Name | The name of your web app
|
||||||
Redirect URI | `https://${authenticate_service_url}/oauth2/callback`
|
Redirect URI | `https://${authenticate_service_url}/oauth2/callback`
|
||||||
Scopes | **Must** select **read_user** and **openid**
|
Scopes | **Must** select **read_user** and **openid**
|
||||||
|
|
||||||
|
[Group ID](https://docs.gitlab.com/ee/api/groups.html#details-of-a-group) will be used to affirm group(s) a user belongs to.
|
||||||
|
|
||||||
Your `Client ID` and `Client Secret` will be displayed:
|
Your `Client ID` and `Client Secret` will be displayed:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Set `Client ID` and `Client Secret` in Pomerium's settings. Your [environmental variables] should look something like this.
|
Set `Client ID` and `Client Secret` in Pomerium's settings. Your environment variables should look something like this.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
authenticate_service_url: https://authenticate.localhost.pomerium.io
|
authenticate_service_url: https://authenticate.localhost.pomerium.io
|
||||||
|
@ -38,4 +40,4 @@ idp_client_secret: "REDACTED" // gitlab application secret
|
||||||
|
|
||||||
When a user first uses pomerium to login, they will be presented with an authorization screen similar to the following depending on the scope parameters setup.
|
When a user first uses pomerium to login, they will be presented with an authorization screen similar to the following depending on the scope parameters setup.
|
||||||
|
|
||||||

|

|
||||||
|
|
|
@ -2,16 +2,19 @@ package identity // import "github.com/pomerium/pomerium/internal/identity"
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
|
||||||
oidc "github.com/coreos/go-oidc"
|
oidc "github.com/coreos/go-oidc"
|
||||||
|
"golang.org/x/oauth2"
|
||||||
|
|
||||||
"github.com/pomerium/pomerium/internal/httputil"
|
"github.com/pomerium/pomerium/internal/httputil"
|
||||||
|
"github.com/pomerium/pomerium/internal/log"
|
||||||
"github.com/pomerium/pomerium/internal/sessions"
|
"github.com/pomerium/pomerium/internal/sessions"
|
||||||
"github.com/pomerium/pomerium/internal/version"
|
"github.com/pomerium/pomerium/internal/version"
|
||||||
"golang.org/x/oauth2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -61,53 +64,10 @@ func NewGitLabProvider(p *Provider) (*GitLabProvider, error) {
|
||||||
if err := p.provider.Claims(&gp); err != nil {
|
if err := p.provider.Claims(&gp); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
gp.UserGroupFn = gp.UserGroups
|
||||||
return gp, nil
|
return gp, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Authenticate creates an identity session with gitlab from a authorization code, and makes
|
|
||||||
// a call to the userinfo endpoint to get the information of the user.
|
|
||||||
func (p GitLabProvider) Authenticate(ctx context.Context, code string) (*sessions.State, error) {
|
|
||||||
oauth2Token, err := p.oauth.Exchange(ctx, code)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("internal/gitlab: token exchange failed: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
idToken, err := p.IdentityFromToken(ctx, oauth2Token)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
s, err := sessions.NewStateFromTokens(idToken, oauth2Token, p.RedirectURL.Host)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var claims struct {
|
|
||||||
ID string `json:"sub"`
|
|
||||||
UserInfoURL string `json:"userinfo_endpoint"`
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := p.provider.Claims(&claims); err == nil && claims.UserInfoURL != "" {
|
|
||||||
userInfo, err := p.provider.UserInfo(ctx, oauth2.StaticTokenSource(oauth2Token))
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("internal/gitlab: could not retrieve user info %w", err)
|
|
||||||
}
|
|
||||||
if err := userInfo.Claims(&s); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if p.UserGroupFn != nil {
|
|
||||||
s.Groups, err = p.UserGroupFn(ctx, s)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("internal/gitlab: could not retrieve groups %w", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return s, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UserGroups returns a slice of groups for the user.
|
// UserGroups returns a slice of groups for the user.
|
||||||
//
|
//
|
||||||
// By default, this request returns 20 results at a time because the API results are paginated.
|
// By default, this request returns 20 results at a time because the API results are paginated.
|
||||||
|
@ -118,11 +78,16 @@ func (p *GitLabProvider) UserGroups(ctx context.Context, s *sessions.State) ([]s
|
||||||
}
|
}
|
||||||
|
|
||||||
var response []struct {
|
var response []struct {
|
||||||
ID string `json:"id"`
|
ID json.Number `json:"id"`
|
||||||
Name string `json:"name"`
|
Name string `json:"name,omitempty"`
|
||||||
Path string `json:"path"`
|
Path string `json:"path,omitempty"`
|
||||||
Description string `json:"description"`
|
Description string `json:"description,omitempty"`
|
||||||
Visibility string `json:"visibility"`
|
Visibility string `json:"visibility,omitempty"`
|
||||||
|
ShareWithGroupLock bool `json:"share_with_group_lock,omitempty"`
|
||||||
|
RequireTwoFactorAuthentication bool `json:"require_two_factor_authentication,omitempty"`
|
||||||
|
SubgroupCreationLevel string `json:"subgroup_creation_level,omitempty"`
|
||||||
|
FullName string `json:"full_name,omitempty"`
|
||||||
|
FullPath string `json:"full_path,omitempty"`
|
||||||
}
|
}
|
||||||
headers := map[string]string{"Authorization": fmt.Sprintf("Bearer %s", s.AccessToken.AccessToken)}
|
headers := map[string]string{"Authorization": fmt.Sprintf("Bearer %s", s.AccessToken.AccessToken)}
|
||||||
err := httputil.Client(ctx, http.MethodGet, defaultGitLabGroupURL, version.UserAgent(), headers, nil, &response)
|
err := httputil.Client(ctx, http.MethodGet, defaultGitLabGroupURL, version.UserAgent(), headers, nil, &response)
|
||||||
|
@ -131,8 +96,10 @@ func (p *GitLabProvider) UserGroups(ctx context.Context, s *sessions.State) ([]s
|
||||||
}
|
}
|
||||||
|
|
||||||
var groups []string
|
var groups []string
|
||||||
|
log.Debug().Interface("response", response).Msg("identity/gitlab: groups")
|
||||||
|
|
||||||
for _, group := range response {
|
for _, group := range response {
|
||||||
groups = append(groups, group.Name)
|
groups = append(groups, group.ID.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return groups, nil
|
return groups, nil
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue