forked from friendica/friendica-addons
Merge pull request #1116 from very-ape/keycloakpassword
Add an addon for password-based authentication against Keycloak.
This commit is contained in:
commit
225fbd0677
9
keycloakpassword/README.md
Normal file
9
keycloakpassword/README.md
Normal file
|
@ -0,0 +1,9 @@
|
|||
Keycloak Password Auth
|
||||
======================
|
||||
|
||||
Allows for password-based authentication against a Keycloak backend. (Should in
|
||||
theory work with any OpenID Connect provider with "direct grant" enabled, but
|
||||
it's only been tested against Keycloak.)
|
||||
|
||||
Setting up Keycloak for use with this addon is detailed [in this RedHat
|
||||
blog entry](https://developers.redhat.com/blog/2020/01/29/api-login-and-jwt-token-generation-using-keycloak#set_up_a_client).
|
156
keycloakpassword/keycloakpassword.php
Normal file
156
keycloakpassword/keycloakpassword.php
Normal file
|
@ -0,0 +1,156 @@
|
|||
<?php
|
||||
/**
|
||||
* Name: Keycloak Password Auth
|
||||
* Description: Allow password-based authentication via the user's Keycloak credentials.
|
||||
* Version: 1.0
|
||||
* Author: Ryan <https://verya.pe/profile/ryan>
|
||||
*/
|
||||
|
||||
use Friendica\App;
|
||||
use Friendica\Core\Hook;
|
||||
use Friendica\Core\Logger;
|
||||
use Friendica\Core\Renderer;
|
||||
use Friendica\Database\DBA;
|
||||
use Friendica\DI;
|
||||
use Friendica\Model\User;
|
||||
|
||||
function keycloakpassword_install()
|
||||
{
|
||||
Hook::register('authenticate', __FILE__, 'keycloakpassword_authenticate');
|
||||
}
|
||||
|
||||
function keycloakpassword_request($client_id, $secret, $url, $params = [])
|
||||
{
|
||||
$ch = curl_init();
|
||||
curl_setopt($ch, CURLOPT_URL, $url);
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
curl_setopt($ch, CURLOPT_POST, 1);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query([
|
||||
'client_id' => $client_id,
|
||||
'grant_type' => 'password',
|
||||
'client_secret' => $secret,
|
||||
'scope' => 'openid',
|
||||
] + $params));
|
||||
|
||||
$headers = array();
|
||||
$headers[] = 'Content-Type: application/x-www-form-urlencoded';
|
||||
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
|
||||
$res = curl_exec($ch);
|
||||
|
||||
if (curl_errno($ch)) {
|
||||
Logger::error(curl_error($ch));
|
||||
}
|
||||
curl_close($ch);
|
||||
|
||||
return $res;
|
||||
}
|
||||
|
||||
function keycloakpassword_authenticate($a, &$b)
|
||||
{
|
||||
if (empty($b['password'])) {
|
||||
return;
|
||||
}
|
||||
|
||||
$client_id = DI::config()->get('keycloakpassword', 'client_id', null);
|
||||
$endpoint = DI::config()->get('keycloakpassword', 'endpoint', null);
|
||||
$secret = DI::config()->get('keycloakpassword', 'secret', null);
|
||||
|
||||
if (!$client_id || !$endpoint || !$secret) {
|
||||
return;
|
||||
}
|
||||
|
||||
$condition = [
|
||||
'nickname' => $b['username'],
|
||||
'blocked' => false,
|
||||
'account_expired' => false,
|
||||
'account_removed' => false
|
||||
];
|
||||
|
||||
try {
|
||||
$user = DBA::selectFirst('user', ['uid'], $condition);
|
||||
} catch (Exception $e) {
|
||||
return;
|
||||
}
|
||||
|
||||
$json = keycloakpassword_request(
|
||||
$client_id,
|
||||
$secret,
|
||||
$endpoint . '/token',
|
||||
[
|
||||
'username' => $b['username'],
|
||||
'password' => $b['password']
|
||||
]
|
||||
);
|
||||
|
||||
$res = json_decode($json, true);
|
||||
if (array_key_exists('access_token', $res) && !array_key_exists('error', $res)) {
|
||||
$b['user_record'] = User::getById($user['uid']);
|
||||
$b['authenticated'] = 1;
|
||||
|
||||
// Invalidate the Keycloak session we just created, as we have no use for it.
|
||||
keycloakpassword_request(
|
||||
$client_id,
|
||||
$secret,
|
||||
$endpoint . '/logout',
|
||||
[ 'refresh_token' => res['refresh_token'] ]
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
function keycloakpassword_admin_input($key, $label, $description)
|
||||
{
|
||||
return [
|
||||
'$' . $key => [
|
||||
$key,
|
||||
$label,
|
||||
DI::config()->get('keycloakpassword', $key),
|
||||
$description,
|
||||
true, // all the fields are required
|
||||
]
|
||||
];
|
||||
}
|
||||
|
||||
function keycloakpassword_addon_admin(&$a, &$o)
|
||||
{
|
||||
$form =
|
||||
keycloakpassword_admin_input(
|
||||
'client_id',
|
||||
DI::l10n()->t('Client ID'),
|
||||
DI::l10n()->t('The name of the OpenID Connect client you created for this addon in Keycloak.'),
|
||||
) +
|
||||
keycloakpassword_admin_input(
|
||||
'secret',
|
||||
DI::l10n()->t('Client secret'),
|
||||
DI::l10n()->t('The secret assigned to the OpenID Connect client you created for this addon in Keycloak.'),
|
||||
) +
|
||||
keycloakpassword_admin_input(
|
||||
'endpoint',
|
||||
DI::l10n()->t('OpenID Connect endpoint'),
|
||||
DI::l10n()->t(
|
||||
'URL to the Keycloak endpoint for your client. '
|
||||
. '(E.g., https://example.com/auth/realms/some-realm/protocol/openid-connect)'
|
||||
),
|
||||
) +
|
||||
[
|
||||
'$msg' => DI::session()->get('keycloakpassword-msg', false),
|
||||
'$submit' => DI::l10n()->t('Save Settings'),
|
||||
];
|
||||
|
||||
$t = Renderer::getMarkupTemplate('admin.tpl', 'addon/keycloakpassword/');
|
||||
$o = Renderer::replaceMacros($t, $form);
|
||||
}
|
||||
|
||||
function keycloakpassword_addon_admin_post(&$a)
|
||||
{
|
||||
if (!local_user()) {
|
||||
return;
|
||||
}
|
||||
|
||||
$set = function ($key) {
|
||||
$val = (!empty($_POST[$key]) ? trim($_POST[$key]) : '');
|
||||
DI::config()->set('keycloakpassword', $key, $val);
|
||||
};
|
||||
$set('client_id');
|
||||
$set('secret');
|
||||
$set('endpoint');
|
||||
}
|
4
keycloakpassword/templates/admin.tpl
Executable file
4
keycloakpassword/templates/admin.tpl
Executable file
|
@ -0,0 +1,4 @@
|
|||
{{include file="field_input.tpl" field=$client_id}}
|
||||
{{include file="field_input.tpl" field=$secret}}
|
||||
{{include file="field_input.tpl" field=$endpoint}}
|
||||
<div class="submit"><input type="submit" name="page_site" value="{{$submit}}" /></div>
|
Loading…
Reference in a new issue