mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 04:18:01 +00:00
120ed0af73
# Which Problems Are Solved An admin / application might want to be able to reduce the amount of roles returned in the token, for example if a user is granted to many organizations or for specific cases where the application want to narrow down the access for that token to a specific organization or multiple. This can now be achieved by providing a scope with the id of the organization, resp. multiple scopes for every organization, which should be included. ``` urn:zitadel:iam:org:roles🆔{orgID} ``` **Note:** the new scope does not work when Introspection / Userinfo are set to legacy mode. # How the Problems Are Solved The user info query now has two variants: 1. Variant that returns all organization authorization grants if the new scope wasn't provided for backward compatibility. 2. Variant that filters the organizations based on the IDs passed in one or more of the above scopes and returns only those authorization grants. The query is defined as a `text/template` and both variants are rendered once in package `init()`. # Additional Changes - In the integration tests `assertProjectRoleClaims` now also checks the org IDs in the roles. # Additional Context - Closes #7996
62 lines
1.5 KiB
Go
62 lines
1.5 KiB
Go
package domain
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
)
|
|
|
|
func AddAudScopeToAudience(ctx context.Context, audience, scopes []string) []string {
|
|
for _, scope := range scopes {
|
|
if !(strings.HasPrefix(scope, ProjectIDScope) && strings.HasSuffix(scope, AudSuffix)) {
|
|
continue
|
|
}
|
|
projectID := strings.TrimSuffix(strings.TrimPrefix(scope, ProjectIDScope), AudSuffix)
|
|
if projectID == ProjectIDScopeZITADEL {
|
|
projectID = authz.GetInstance(ctx).ProjectID()
|
|
}
|
|
audience = addProjectID(audience, projectID)
|
|
}
|
|
return audience
|
|
}
|
|
|
|
// RoleOrgIDsFromScope parses orgIDs from [OrgRoleIDScope] prefixed scopes.
|
|
func RoleOrgIDsFromScope(scopes []string) (orgIDs []string) {
|
|
for _, scope := range scopes {
|
|
orgID, found := strings.CutPrefix(scope, OrgRoleIDScope)
|
|
if found {
|
|
orgIDs = append(orgIDs, orgID)
|
|
}
|
|
}
|
|
return orgIDs
|
|
}
|
|
|
|
func addProjectID(audience []string, projectID string) []string {
|
|
for _, a := range audience {
|
|
if a == projectID {
|
|
return audience
|
|
}
|
|
}
|
|
return append(audience, projectID)
|
|
}
|
|
|
|
//go:generate enumer -type TokenReason -transform snake -trimprefix TokenReason -json
|
|
type TokenReason int
|
|
|
|
const (
|
|
TokenReasonUnspecified TokenReason = iota
|
|
TokenReasonAuthRequest
|
|
TokenReasonRefresh
|
|
TokenReasonJWTProfile
|
|
TokenReasonClientCredentials
|
|
TokenReasonExchange
|
|
TokenReasonImpersonation
|
|
)
|
|
|
|
type TokenActor struct {
|
|
Actor *TokenActor `json:"actor,omitempty"`
|
|
UserID string `json:"user_id,omitempty"`
|
|
Issuer string `json:"issuer,omitempty"`
|
|
}
|