Skip to content

Commit

Permalink
feat: zitadel provider implementation
Browse files Browse the repository at this point in the history
flow: authorization code (basic authentication)
  • Loading branch information
Velka-DEV authored Nov 4, 2024
1 parent 247ec8f commit d4c0b5a
Show file tree
Hide file tree
Showing 7 changed files with 165 additions and 1 deletion.
4 changes: 4 additions & 0 deletions playground/.env.example
Original file line number Diff line number Diff line change
Expand Up @@ -77,3 +77,7 @@ NUXT_OAUTH_POLAR_CLIENT_SECRET=
# Linear
NUXT_OAUTH_LINEAR_CLIENT_ID=
NUXT_OAUTH_LINEAR_CLIENT_SECRET=
# Zitadel
NUXT_OAUTH_ZITADEL_CLIENT_ID=
NUXT_OAUTH_ZITADEL_CLIENT_SECRET=
NUXT_OAUTH_ZITADEL_DOMAIN=
6 changes: 6 additions & 0 deletions playground/app.vue
Original file line number Diff line number Diff line change
Expand Up @@ -147,6 +147,12 @@ const providers = computed(() =>
disabled: Boolean(user.value?.polar),
icon: 'i-iconoir-polar-sh',
},
{
label: user.value?.zitadel || 'Zitadel',
to: '/auth/zitadel',
disabled: Boolean(user.value?.zitadel),
icon: 'i-gravity-ui-lock',
},
].map(p => ({
...p,
prefetch: false,
Expand Down
1 change: 1 addition & 0 deletions playground/auth.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ declare module '#auth-utils' {
tiktok?: string
dropbox?: string
polar?: string
zitadel?: string
}

interface UserSession {
Expand Down
15 changes: 15 additions & 0 deletions playground/server/routes/auth/zitadel.get.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
export default defineOAuthZitadelEventHandler({
config: {
scope: ['openid', 'email', 'profile'],
},
async onSuccess(event, { user }) {
await setUserSession(event, {
user: {
zitadel: user.name,
},
loggedInAt: Date.now(),
})

return sendRedirect(event, '/')
},
})
7 changes: 7 additions & 0 deletions src/module.ts
Original file line number Diff line number Diff line change
Expand Up @@ -308,5 +308,12 @@ export default defineNuxtModule<ModuleOptions>({
clientSecret: '',
redirectURL: '',
})
// Zitadel OAuth
runtimeConfig.oauth.zitadel = defu(runtimeConfig.oauth.zitadel, {
clientId: '',
clientSecret: '',
domain: '',
redirectURL: '',
})
},
})
131 changes: 131 additions & 0 deletions src/runtime/server/lib/oauth/zitadel.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,131 @@
import type { H3Event } from 'h3'
import { eventHandler, getQuery, sendRedirect } from 'h3'
import { withQuery } from 'ufo'
import { defu } from 'defu'
import { handleMissingConfiguration, handleAccessTokenErrorResponse, getOAuthRedirectURL, requestAccessToken } from '../utils'
import { useRuntimeConfig, createError } from '#imports'
import type { OAuthConfig } from '#auth-utils'

export interface OAuthZitadelConfig {
/**
* ZITADEL OAuth Client ID
* @default process.env.NUXT_OAUTH_ZITADEL_CLIENT_ID
*/
clientId?: string
/**
* ZITADEL OAuth Client Secret
* @default process.env.NUXT_OAUTH_ZITADEL_CLIENT_SECRET
*/
clientSecret?: string
/**
* ZITADEL OAuth Domain
* @example <your-zitadel-instance>.zitadel.cloud
* @default process.env.NUXT_OAUTH_ZITADEL_DOMAIN
*/
domain?: string
/**
* ZITADEL OAuth Scope
* @default ['openid']
* @see https://zitadel.com/docs/apis/openidoauth/scopes
* @example ['openid', 'profile', 'email']
*/
scope?: string[]
/**
* Extra authorization parameters to provide to the authorization URL
* @example { ui_locales: 'de-CH de en' }
*/
authorizationParams?: Record<string, string>
/**
* Redirect URL to allow overriding for situations like prod failing to determine public hostname
* @default process.env.NUXT_OAUTH_ZITADEL_REDIRECT_URL or current URL
*/
redirectURL?: string
}

export function defineOAuthZitadelEventHandler({ config, onSuccess, onError }: OAuthConfig<OAuthZitadelConfig>) {
return eventHandler(async (event: H3Event) => {
config = defu(config, useRuntimeConfig(event).oauth?.zitadel, {
authorizationParams: {},
}) as OAuthZitadelConfig

const query = getQuery<{ code?: string, error?: string }>(event)

if (query.error) {
const error = createError({
statusCode: 401,
message: `Zitadel login failed: ${query.error || 'Unknown error'}`,
data: query,
})
if (!onError) throw error
return onError(event, error)
}

if (!config.clientId || !config.clientSecret || !config.domain) {
return handleMissingConfiguration(event, 'zitadel', ['clientId', 'clientSecret', 'issuerUrl'], onError)
}

const authorizationURL = `https://${config.domain}/oauth/v2/authorize`
const tokenURL = `https://${config.domain}/oauth/v2/token`
const redirectURL = config.redirectURL || getOAuthRedirectURL(event)

if (!query.code) {
config.scope = config.scope || ['openid']
// Redirect to Zitadel OAuth page

return sendRedirect(
event,
withQuery(authorizationURL, {
response_type: 'code',
client_id: config.clientId,
redirect_uri: redirectURL,
scope: config.scope.join(' '),
...config.authorizationParams,
}),
)
}

const tokens = await requestAccessToken(tokenURL, {
headers: {
'Authorization': `Basic ${Buffer.from(`${config.clientId}:${config.clientSecret}`).toString('base64')}`,
'Content-Type': 'application/x-www-form-urlencoded',
},
body: {
grant_type: 'authorization_code',
client_id: config.clientId,
redirect_uri: redirectURL,
code: query.code,
},
})

if (tokens.error) {
return handleAccessTokenErrorResponse(event, 'zitadel', tokens, onError)
}

const accessToken = tokens.access_token
// Fetch user info
// eslint-disable-next-line @typescript-eslint/no-explicit-any
const user: any = await $fetch(`https://${config.domain}/oidc/v1/userinfo`, {
headers: {
Authorization: `Bearer ${accessToken}`,
Accept: 'application/json',
},
})

console.log('Zitadel user:', user)

if (!user) {
const error = createError({
statusCode: 500,
message: 'Could not get Zitadel user',
data: tokens,
})
if (!onError) throw error
return onError(event, error)
}

return onSuccess(event, {
user,
tokens,
})
})
}
2 changes: 1 addition & 1 deletion src/runtime/types/oauth-config.ts
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
import type { H3Event, H3Error } from 'h3'

export type OAuthProvider = 'auth0' | 'battledotnet' | 'cognito' | 'discord' | 'dropbox' | 'facebook' | 'github' | 'gitlab' | 'google' | 'instagram' | 'keycloak' | 'linear' | 'linkedin' | 'microsoft' | 'paypal' | 'polar' | 'spotify' | 'steam' | 'tiktok' | 'twitch' | 'vk' | 'x' | 'xsuaa' | 'yandex' | (string & {})
export type OAuthProvider = 'auth0' | 'battledotnet' | 'cognito' | 'discord' | 'dropbox' | 'facebook' | 'github' | 'gitlab' | 'google' | 'instagram' | 'keycloak' | 'linear' | 'linkedin' | 'microsoft' | 'paypal' | 'polar' | 'spotify' | 'steam' | 'tiktok' | 'twitch' | 'vk' | 'x' | 'xsuaa' | 'yandex' | 'zitadel' | (string & {})

export type OnError = (event: H3Event, error: H3Error) => Promise<void> | void

Expand Down

0 comments on commit d4c0b5a

Please sign in to comment.