8c01c55684
- Got basic signing support and structure checking done. - Need to run through actual claim checking before providing details back to app.
56 lines
1.5 KiB
PHP
56 lines
1.5 KiB
PHP
<?php
|
|
|
|
namespace BookStack\Http\Controllers\Auth;
|
|
|
|
use BookStack\Auth\Access\OpenIdConnect\OpenIdConnectService;
|
|
use BookStack\Http\Controllers\Controller;
|
|
use Illuminate\Http\Request;
|
|
|
|
class OpenIdConnectController extends Controller
|
|
{
|
|
|
|
protected $oidcService;
|
|
|
|
/**
|
|
* OpenIdController constructor.
|
|
*/
|
|
public function __construct(OpenIdConnectService $oidcService)
|
|
{
|
|
$this->oidcService = $oidcService;
|
|
$this->middleware('guard:oidc');
|
|
}
|
|
|
|
/**
|
|
* Start the authorization login flow via OIDC.
|
|
*/
|
|
public function login()
|
|
{
|
|
$loginDetails = $this->oidcService->login();
|
|
session()->flash('oidc_state', $loginDetails['state']);
|
|
|
|
return redirect($loginDetails['url']);
|
|
}
|
|
|
|
/**
|
|
* Authorization flow redirect.
|
|
* Processes authorization response from the OIDC Authorization Server.
|
|
*/
|
|
public function redirect(Request $request)
|
|
{
|
|
$storedState = session()->pull('oidc_state');
|
|
$responseState = $request->query('state');
|
|
|
|
if ($storedState !== $responseState) {
|
|
$this->showErrorNotification(trans('errors.oidc_fail_authed', ['system' => config('oidc.name')]));
|
|
return redirect('/login');
|
|
}
|
|
|
|
$user = $this->oidcService->processAuthorizeResponse($request->query('code'));
|
|
if ($user === null) {
|
|
$this->showErrorNotification(trans('errors.oidc_fail_authed', ['system' => config('oidc.name')]));
|
|
return redirect('/login');
|
|
}
|
|
|
|
return redirect()->intended();
|
|
}
|
|
}
|