defmodule Ueberauth.Strategy.Keycloak do
@moduledoc """
Provides an Ueberauth strategy for authenticating with Keycloak.
### Setup
Create an application in Keycloak for you to use.
Register a new application at: [your keycloak developer page](https://keycloak.com/settings/developers) and get the `client_id` and `client_secret`.
Include the provider in your configuration for Ueberauth
config :ueberauth, Ueberauth,
providers: [
keycloak: { Ueberauth.Strategy.Keycloak, [] }
]
Then include the configuration for keycloak.
config :ueberauth, Ueberauth.Strategy.Keycloak.OAuth,
client_id: System.get_env("KEYCLOAK_CLIENT_ID"),
client_secret: System.get_env("KEYCLOAK_CLIENT_SECRET")
If you haven't already, create a pipeline and setup routes for your callback handler
pipeline :auth do
Ueberauth.plug "/auth"
end
scope "/auth" do
pipe_through [:browser, :auth]
get "/:provider/callback", AuthController, :callback
end
Create an endpoint for the callback where you will handle the `Ueberauth.Auth` struct
defmodule MyApp.AuthController do
use MyApp.Web, :controller
def callback_phase(%{ assigns: %{ ueberauth_failure: fails } } = conn, _params) do
# do things with the failure
end
def callback_phase(%{ assigns: %{ ueberauth_auth: auth } } = conn, params) do
# do things with the auth
end
end
You can edit the behaviour of the Strategy by including some options when you register your provider.
To set the `uid_field`
config :ueberauth, Ueberauth,
providers: [
keycloak: { Ueberauth.Strategy.Keycloak, [uid_field: :email] }
]
Default is `:id`
To set the default 'scopes' (permissions):
config :ueberauth, Ueberauth,
providers: [
keycloak: { Ueberauth.Strategy.Keycloak, [default_scope: "api read_user read_registry", api_version: "v4"] }
]
Default is "api read_user read_registry"
"""
require Logger
use Ueberauth.Strategy,
uid_field: :id,
default_scope: "api read_user read_registry",
oauth2_module: Ueberauth.Strategy.Keycloak.OAuth
alias Ueberauth.Auth.Info
alias Ueberauth.Auth.Credentials
alias Ueberauth.Auth.Extra
alias Ueberauth.Strategy.Helpers
@doc """
Handles the initial redirect to the keycloak authentication page.
To customize the scope (permissions) that are requested by keycloak include them as part of your url:
"/auth/keycloak?scope=api read_user read_registry"
The request will include the state parameter that was set by ueberauth (if available)
"""
def handle_request!(conn) do
scopes = conn.params["scope"] || option(conn, :default_scope)
opts = [redirect_uri: callback_url(conn), scope: scopes]
opts = Helpers.with_state_param(opts, conn)
module = option(conn, :oauth2_module)
redirect!(conn, apply(module, :authorize_url!, [opts]))
end
@doc """
Handles the callback from Keycloak. When there is a failure from Keycloak the failure is included in the
`ueberauth_failure` struct. Otherwise the information returned from Keycloak is returned in the `Ueberauth.Auth` struct.
"""
def handle_callback!(%Plug.Conn{params: %{"code" => code}} = conn) do
module = option(conn, :oauth2_module)
token = apply(module, :get_token!, [[code: code, redirect_uri: callback_url(conn)]])
if token.access_token == nil do
set_errors!(conn, [
error(token.other_params["error"], token.other_params["error_description"])
])
else
fetch_user(conn, token)
end
end
@doc false
def handle_callback!(conn) do
set_errors!(conn, [error("missing_code", "No code received")])
end
@doc """
Cleans up the private area of the connection used for passing the raw Keycloak response around during the callback.
"""
def handle_cleanup!(conn) do
conn
|> put_private(:keycloak_user, nil)
end
@doc """
Fetches the uid field from the Keycloak response. This defaults to the option `uid_field` which in-turn defaults to `id`
"""
def uid(conn) do
user =
conn
|> option(:uid_field)
|> to_string
conn.private.keycloak_user[user]
end
@doc """
Includes the credentials from the Keycloak response.
"""
def credentials(conn) do
token = conn.private.keycloak_token
scope_string = token.other_params["scope"] || ""
scopes = String.split(scope_string, ",")
%Credentials{
token: token.access_token,
refresh_token: token.refresh_token,
expires_at: token.expires_at,
token_type: token.token_type,
expires: !!token.expires_at,
scopes: scopes
}
end
@doc """
Fetches the fields to populate the info section of the `Ueberauth.Auth` struct.
"""
def info(conn) do
user = conn.private.keycloak_user
%Info{
name: user["name"],
nickname: user["preferred_username"],
email: user["email"],
location: user["location"],
image: user["avatar_url"],
urls: %{
web_url: user["web_url"],
website_url: user["website_url"]
}
}
end
@doc """
Stores the raw information (including the token) obtained from the Keycloak callback.
"""
def extra(conn) do
%Extra{
raw_info: %{
token: conn.private.keycloak_token,
user: conn.private.keycloak_user
}
}
end
defp fetch_user(conn, token) do
conn = put_private(conn, :keycloak_token, token)
case Ueberauth.Strategy.Keycloak.OAuth.get(
token,
Ueberauth.Strategy.Keycloak.OAuth.userinfo_url()
) do
{:ok, %OAuth2.Response{status_code: 401, body: _body}} ->
set_errors!(conn, [error("token", "unauthorized")])
{:ok, %OAuth2.Response{status_code: status_code, body: user}}
when status_code in 200..399 ->
put_private(conn, :keycloak_user, user)
{:error, %OAuth2.Response{body: body}} ->
set_errors!(conn, [error("OAuth2", body)])
{:error, %OAuth2.Error{reason: reason}} ->
set_errors!(conn, [error("OAuth2", reason)])
end
end
defp option(conn, key) do
Keyword.get(options(conn) || [], key, Keyword.get(default_options(), key))
end
end