package controller import ( "encoding/json" "fmt" "log/slog" "net/http" "os" "github.com/gin-gonic/gin" "github.com/pocket-id/pocket-id/backend/internal/common" "github.com/pocket-id/pocket-id/backend/internal/service" ) // NewWellKnownController creates a new controller for OIDC discovery endpoints // @Summary OIDC Discovery controller // @Description Initializes OIDC discovery and JWKS endpoints // @Tags Well Known func NewWellKnownController(group *gin.RouterGroup, jwtService *service.JwtService) { wkc := &WellKnownController{jwtService: jwtService} // Pre-compute the OIDC configuration document, which is static var err error wkc.oidcConfig, err = wkc.computeOIDCConfiguration() if err != nil { slog.Error("Failed to pre-compute OpenID Connect configuration document", slog.Any("error", err)) os.Exit(1) return } group.GET("/.well-known/jwks.json", wkc.jwksHandler) group.GET("/.well-known/openid-configuration", wkc.openIDConfigurationHandler) } type WellKnownController struct { jwtService *service.JwtService oidcConfig []byte } // jwksHandler godoc // @Summary Get JSON Web Key Set (JWKS) // @Description Returns the JSON Web Key Set used for token verification // @Tags Well Known // @Produce json // @Success 200 {object} object "{ \"keys\": []interface{} }" // @Router /.well-known/jwks.json [get] func (wkc *WellKnownController) jwksHandler(c *gin.Context) { jwks, err := wkc.jwtService.GetPublicJWKSAsJSON() if err != nil { _ = c.Error(err) return } c.Data(http.StatusOK, "application/json; charset=utf-8", jwks) } // openIDConfigurationHandler godoc // @Summary Get OpenID Connect discovery configuration // @Description Returns the OpenID Connect discovery document with endpoints and capabilities // @Tags Well Known // @Success 200 {object} object "OpenID Connect configuration" // @Router /.well-known/openid-configuration [get] func (wkc *WellKnownController) openIDConfigurationHandler(c *gin.Context) { c.Data(http.StatusOK, "application/json; charset=utf-8", wkc.oidcConfig) } func (wkc *WellKnownController) computeOIDCConfiguration() ([]byte, error) { appUrl := common.EnvConfig.AppURL internalAppUrl := common.EnvConfig.InternalAppURL alg, err := wkc.jwtService.GetKeyAlg() if err != nil { return nil, fmt.Errorf("failed to get key algorithm: %w", err) } config := map[string]any{ "issuer": appUrl, "authorization_endpoint": appUrl + "/authorize", "token_endpoint": internalAppUrl + "/api/oidc/token", "userinfo_endpoint": internalAppUrl + "/api/oidc/userinfo", "end_session_endpoint": appUrl + "/api/oidc/end-session", "introspection_endpoint": internalAppUrl + "/api/oidc/introspect", "device_authorization_endpoint": appUrl + "/api/oidc/device/authorize", "jwks_uri": internalAppUrl + "/.well-known/jwks.json", "grant_types_supported": []string{service.GrantTypeAuthorizationCode, service.GrantTypeRefreshToken, service.GrantTypeDeviceCode, service.GrantTypeClientCredentials}, "scopes_supported": []string{"openid", "profile", "email", "groups"}, "claims_supported": []string{"sub", "given_name", "family_name", "name", "email", "email_verified", "preferred_username", "picture", "groups"}, "response_types_supported": []string{"code", "id_token"}, "subject_types_supported": []string{"public"}, "id_token_signing_alg_values_supported": []string{alg.String()}, "authorization_response_iss_parameter_supported": true, "code_challenge_methods_supported": []string{"plain", "S256"}, } return json.Marshal(config) }