2021-11-14 15:05:55 +01:00
|
|
|
package oidc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2022-10-18 12:00:09 +02:00
|
|
|
"code.icod.de/dalu/oidc/options"
|
2021-11-14 15:05:55 +01:00
|
|
|
"github.com/lestrrat-go/jwx/jwa"
|
|
|
|
"github.com/lestrrat-go/jwx/jwk"
|
|
|
|
"github.com/lestrrat-go/jwx/jws"
|
|
|
|
"github.com/lestrrat-go/jwx/jwt"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
errSignatureVerification = fmt.Errorf("failed to verify signature")
|
|
|
|
)
|
|
|
|
|
|
|
|
type handler struct {
|
|
|
|
issuer string
|
|
|
|
discoveryUri string
|
|
|
|
jwksUri string
|
|
|
|
jwksFetchTimeout time.Duration
|
|
|
|
jwksRateLimit uint
|
|
|
|
fallbackSignatureAlgorithm jwa.SignatureAlgorithm
|
|
|
|
allowedTokenDrift time.Duration
|
|
|
|
requiredAudience string
|
|
|
|
requiredTokenType string
|
|
|
|
requiredClaims map[string]interface{}
|
|
|
|
disableKeyID bool
|
|
|
|
httpClient *http.Client
|
|
|
|
|
|
|
|
keyHandler *keyHandler
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewHandler(setters ...options.Option) (*handler, error) {
|
|
|
|
opts := options.New(setters...)
|
|
|
|
|
|
|
|
h := &handler{
|
|
|
|
issuer: opts.Issuer,
|
|
|
|
discoveryUri: opts.DiscoveryUri,
|
|
|
|
jwksUri: opts.JwksUri,
|
|
|
|
jwksFetchTimeout: opts.JwksFetchTimeout,
|
|
|
|
jwksRateLimit: opts.JwksRateLimit,
|
|
|
|
allowedTokenDrift: opts.AllowedTokenDrift,
|
|
|
|
requiredTokenType: opts.RequiredTokenType,
|
|
|
|
requiredAudience: opts.RequiredAudience,
|
|
|
|
requiredClaims: opts.RequiredClaims,
|
|
|
|
disableKeyID: opts.DisableKeyID,
|
|
|
|
httpClient: opts.HttpClient,
|
|
|
|
}
|
|
|
|
|
|
|
|
if h.issuer == "" {
|
|
|
|
return nil, fmt.Errorf("issuer is empty")
|
|
|
|
}
|
|
|
|
if h.discoveryUri == "" {
|
|
|
|
h.discoveryUri = GetDiscoveryUriFromIssuer(h.issuer)
|
|
|
|
}
|
|
|
|
if opts.FallbackSignatureAlgorithm != "" {
|
|
|
|
alg, err := getSignatureAlgorithmFromString(opts.FallbackSignatureAlgorithm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("FallbackSignatureAlgorithm not accepted: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
h.fallbackSignatureAlgorithm = alg
|
|
|
|
}
|
|
|
|
if !opts.LazyLoadJwks {
|
|
|
|
err := h.loadJwks()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to load jwks: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return h, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *handler) loadJwks() error {
|
|
|
|
if h.jwksUri == "" {
|
|
|
|
jwksUri, err := getJwksUriFromDiscoveryUri(h.httpClient, h.discoveryUri, 5*time.Second)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to fetch jwksUri from discoveryUri (%s): %w", h.discoveryUri, err)
|
|
|
|
}
|
|
|
|
h.jwksUri = jwksUri
|
|
|
|
}
|
|
|
|
|
|
|
|
keyHandler, err := newKeyHandler(h.httpClient, h.jwksUri, h.jwksFetchTimeout, h.jwksRateLimit, h.disableKeyID)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to initialize keyHandler: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
h.keyHandler = keyHandler
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *handler) SetIssuer(issuer string) {
|
|
|
|
h.issuer = issuer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *handler) SetDiscoveryUri(discoveryUri string) {
|
|
|
|
h.discoveryUri = discoveryUri
|
|
|
|
}
|
|
|
|
|
|
|
|
type ParseTokenFunc func(ctx context.Context, tokenString string) (jwt.Token, error)
|
|
|
|
|
|
|
|
func (h *handler) ParseToken(ctx context.Context, tokenString string) (jwt.Token, error) {
|
|
|
|
if h.keyHandler == nil {
|
|
|
|
err := h.loadJwks()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to load jwks: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tokenTypeValid := isTokenTypeValid(h.requiredTokenType, tokenString)
|
|
|
|
if !tokenTypeValid {
|
|
|
|
return nil, fmt.Errorf("token type %q required", h.requiredTokenType)
|
|
|
|
}
|
|
|
|
|
|
|
|
keyID := ""
|
|
|
|
if !h.disableKeyID {
|
|
|
|
var err error
|
|
|
|
keyID, err = getKeyIDFromTokenString(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := h.keyHandler.getKey(ctx, keyID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to get public key: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
alg, err := getSignatureAlgorithm(key.KeyType(), key.Algorithm(), h.fallbackSignatureAlgorithm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err := getAndValidateTokenFromString(tokenString, key, alg)
|
|
|
|
if err != nil {
|
|
|
|
if h.disableKeyID && errors.Is(err, errSignatureVerification) {
|
|
|
|
updatedKey, err := h.keyHandler.waitForUpdateKeySetAndGetKey(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
alg, err := getSignatureAlgorithm(key.KeyType(), key.Algorithm(), h.fallbackSignatureAlgorithm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err = getAndValidateTokenFromString(tokenString, updatedKey, alg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
validExpiration := isTokenExpirationValid(token.Expiration(), h.allowedTokenDrift)
|
|
|
|
if !validExpiration {
|
|
|
|
return nil, fmt.Errorf("token has expired: %s", token.Expiration())
|
|
|
|
}
|
|
|
|
|
|
|
|
validIssuer := isTokenIssuerValid(h.issuer, token.Issuer())
|
|
|
|
if !validIssuer {
|
|
|
|
return nil, fmt.Errorf("required issuer %q was not found, received: %s", h.issuer, token.Issuer())
|
|
|
|
}
|
|
|
|
|
|
|
|
validAudience := isTokenAudienceValid(h.requiredAudience, token.Audience())
|
|
|
|
if !validAudience {
|
|
|
|
return nil, fmt.Errorf("required audience %q was not found, received: %v", h.requiredAudience, token.Audience())
|
|
|
|
}
|
|
|
|
|
|
|
|
if h.requiredClaims != nil {
|
|
|
|
tokenClaims, err := token.AsMap(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to get token claims: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = isRequiredClaimsValid(h.requiredClaims, tokenClaims)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to validate required claims: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func GetDiscoveryUriFromIssuer(issuer string) string {
|
|
|
|
return fmt.Sprintf("%s/.well-known/openid-configuration", strings.TrimSuffix(issuer, "/"))
|
|
|
|
}
|
|
|
|
|
|
|
|
func getJwksUriFromDiscoveryUri(httpClient *http.Client, discoveryUri string, fetchTimeout time.Duration) (string, error) {
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), fetchTimeout)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, discoveryUri, nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
req.Header.Set("Accept", "application/json")
|
|
|
|
|
|
|
|
res, err := httpClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
bodyBytes, err := io.ReadAll(res.Body)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = res.Body.Close()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
var discoveryData struct {
|
|
|
|
JwksUri string `json:"jwks_uri"`
|
|
|
|
}
|
|
|
|
|
|
|
|
err = json.Unmarshal(bodyBytes, &discoveryData)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
if discoveryData.JwksUri == "" {
|
|
|
|
return "", fmt.Errorf("JwksUri is empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
return discoveryData.JwksUri, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getKeyIDFromTokenString(tokenString string) (string, error) {
|
|
|
|
headers, err := getHeadersFromTokenString(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
keyID := headers.KeyID()
|
|
|
|
if keyID == "" {
|
|
|
|
return "", fmt.Errorf("token header does not contain key id (kid)")
|
|
|
|
}
|
|
|
|
|
|
|
|
return keyID, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getTokenTypeFromTokenString(tokenString string) (string, error) {
|
|
|
|
headers, err := getHeadersFromTokenString(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
tokenType := headers.Type()
|
|
|
|
if tokenType == "" {
|
|
|
|
return "", fmt.Errorf("token header does not contain type (typ)")
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokenType, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getHeadersFromTokenString(tokenString string) (jws.Headers, error) {
|
|
|
|
msg, err := jws.ParseString(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to parse tokenString: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
signatures := msg.Signatures()
|
|
|
|
if len(signatures) != 1 {
|
|
|
|
return nil, fmt.Errorf("more than one signature in token")
|
|
|
|
}
|
|
|
|
|
|
|
|
headers := signatures[0].ProtectedHeaders()
|
|
|
|
|
|
|
|
return headers, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isTokenAudienceValid(requiredAudience string, audiences []string) bool {
|
|
|
|
if requiredAudience == "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, audience := range audiences {
|
|
|
|
if audience == requiredAudience {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func isTokenExpirationValid(expiration time.Time, allowedDrift time.Duration) bool {
|
|
|
|
expirationWithAllowedDrift := expiration.Round(0).Add(allowedDrift)
|
|
|
|
|
|
|
|
return expirationWithAllowedDrift.After(time.Now())
|
|
|
|
}
|
|
|
|
|
|
|
|
func isTokenIssuerValid(requiredIssuer string, tokenIssuer string) bool {
|
|
|
|
if requiredIssuer == "" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokenIssuer == requiredIssuer
|
|
|
|
}
|
|
|
|
|
|
|
|
func isTokenTypeValid(requiredTokenType string, tokenString string) bool {
|
|
|
|
if requiredTokenType == "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
tokenType, err := getTokenTypeFromTokenString(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if tokenType != requiredTokenType {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func isRequiredClaimsValid(requiredClaims map[string]interface{}, tokenClaims map[string]interface{}) error {
|
|
|
|
for requiredKey, requiredValue := range requiredClaims {
|
|
|
|
tokenValue, ok := tokenClaims[requiredKey]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("token does not have the claim: %s", requiredKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
required, received, err := getCtyValues(requiredValue, tokenValue)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = isCtyValueValid(required, received)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("claim %q not valid: %w", requiredKey, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getAndValidateTokenFromString(tokenString string, key jwk.Key, alg jwa.SignatureAlgorithm) (jwt.Token, error) {
|
|
|
|
token, err := jwt.ParseString(tokenString, jwt.WithVerify(alg, key))
|
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), errSignatureVerification.Error()) {
|
|
|
|
return nil, errSignatureVerification
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSignatureAlgorithm(kty jwa.KeyType, keyAlg string, fallbackAlg jwa.SignatureAlgorithm) (jwa.SignatureAlgorithm, error) {
|
|
|
|
if keyAlg != "" {
|
|
|
|
return getSignatureAlgorithmFromString(keyAlg)
|
|
|
|
}
|
|
|
|
|
|
|
|
if fallbackAlg != "" {
|
|
|
|
return fallbackAlg, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch kty {
|
|
|
|
case jwa.RSA:
|
|
|
|
return jwa.RS256, nil
|
|
|
|
case jwa.EC:
|
|
|
|
return jwa.ES256, nil
|
|
|
|
default:
|
|
|
|
return "", fmt.Errorf("unable to get signature algorithm with kty=%s, alg=%s, fallbackAlg=%s", kty, keyAlg, fallbackAlg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSignatureAlgorithmFromString(s string) (jwa.SignatureAlgorithm, error) {
|
|
|
|
var alg jwa.SignatureAlgorithm
|
|
|
|
err := alg.Accept(s)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return alg, nil
|
|
|
|
}
|