2023-02-02 05:34:49 +00:00
|
|
|
package validator
|
|
|
|
|
|
|
|
import (
|
2023-05-15 00:03:19 +00:00
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/ed25519"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rsa"
|
|
|
|
"fmt"
|
2023-02-02 05:34:49 +00:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"golang.org/x/net/publicsuffix"
|
2023-04-13 10:58:18 +00:00
|
|
|
|
2023-05-15 00:03:19 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
|
|
"github.com/authelia/authelia/v4/internal/oidc"
|
2023-04-13 10:58:18 +00:00
|
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
2023-02-02 05:34:49 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func isCookieDomainAPublicSuffix(domain string) (valid bool) {
|
|
|
|
var suffix string
|
|
|
|
|
|
|
|
suffix, _ = publicsuffix.PublicSuffix(domain)
|
|
|
|
|
|
|
|
return len(strings.TrimLeft(domain, ".")) == len(suffix)
|
|
|
|
}
|
2023-04-13 10:58:18 +00:00
|
|
|
|
|
|
|
func strJoinOr(items []string) string {
|
|
|
|
return strJoinComma("or", items)
|
|
|
|
}
|
|
|
|
|
|
|
|
func strJoinAnd(items []string) string {
|
|
|
|
return strJoinComma("and", items)
|
|
|
|
}
|
|
|
|
|
|
|
|
func strJoinComma(word string, items []string) string {
|
|
|
|
if word == "" {
|
|
|
|
return buildJoinedString(",", "", "'", items)
|
|
|
|
}
|
|
|
|
|
|
|
|
return buildJoinedString(",", word, "'", items)
|
|
|
|
}
|
|
|
|
|
|
|
|
func buildJoinedString(sep, sepFinal, quote string, items []string) string {
|
|
|
|
n := len(items)
|
|
|
|
|
|
|
|
if n == 0 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
b := &strings.Builder{}
|
|
|
|
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
if quote != "" {
|
|
|
|
b.WriteString(quote)
|
|
|
|
}
|
|
|
|
|
|
|
|
b.WriteString(items[i])
|
|
|
|
|
|
|
|
if quote != "" {
|
|
|
|
b.WriteString(quote)
|
|
|
|
}
|
|
|
|
|
|
|
|
if i == (n - 1) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if sep != "" {
|
|
|
|
if sepFinal == "" || n != 2 {
|
|
|
|
b.WriteString(sep)
|
|
|
|
}
|
|
|
|
|
|
|
|
b.WriteString(" ")
|
|
|
|
}
|
|
|
|
|
|
|
|
if sepFinal != "" && i == (n-2) {
|
|
|
|
b.WriteString(strings.Trim(sepFinal, " "))
|
|
|
|
b.WriteString(" ")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
func validateList(values, valid []string, chkDuplicate bool) (invalid, duplicates []string) { //nolint:unparam
|
|
|
|
chkValid := len(valid) != 0
|
|
|
|
|
|
|
|
for i, value := range values {
|
|
|
|
if chkValid {
|
|
|
|
if !utils.IsStringInSlice(value, valid) {
|
|
|
|
invalid = append(invalid, value)
|
|
|
|
|
|
|
|
// Skip checking duplicates for invalid values.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if chkDuplicate {
|
|
|
|
for j, valueAlt := range values {
|
|
|
|
if i == j {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if value != valueAlt {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if utils.IsStringInSlice(value, duplicates) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
duplicates = append(duplicates, value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2023-05-15 00:03:19 +00:00
|
|
|
|
|
|
|
type JWKProperties struct {
|
|
|
|
Use string
|
|
|
|
Algorithm string
|
|
|
|
Bits int
|
|
|
|
Curve elliptic.Curve
|
|
|
|
}
|
|
|
|
|
|
|
|
func schemaJWKGetProperties(jwk schema.JWK) (properties *JWKProperties, err error) {
|
|
|
|
switch key := jwk.Key.(type) {
|
|
|
|
case nil:
|
2023-05-15 00:32:10 +00:00
|
|
|
return nil, nil
|
2023-05-15 00:03:19 +00:00
|
|
|
case ed25519.PrivateKey, ed25519.PublicKey:
|
|
|
|
return &JWKProperties{}, nil
|
|
|
|
case *rsa.PrivateKey:
|
2023-05-15 00:32:10 +00:00
|
|
|
if key.PublicKey.N == nil {
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgRSAUsingSHA256, 0, nil}, nil
|
|
|
|
}
|
|
|
|
|
2023-05-15 00:03:19 +00:00
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgRSAUsingSHA256, key.Size(), nil}, nil
|
|
|
|
case *rsa.PublicKey:
|
2023-05-15 00:32:10 +00:00
|
|
|
if key.N == nil {
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgRSAUsingSHA256, 0, nil}, nil
|
|
|
|
}
|
|
|
|
|
2023-05-15 00:03:19 +00:00
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgRSAUsingSHA256, key.Size(), nil}, nil
|
|
|
|
case *ecdsa.PublicKey:
|
|
|
|
switch key.Curve {
|
|
|
|
case elliptic.P256():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP256AndSHA256, -1, key.Curve}, nil
|
|
|
|
case elliptic.P384():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP384AndSHA384, -1, key.Curve}, nil
|
|
|
|
case elliptic.P521():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP521AndSHA512, -1, key.Curve}, nil
|
|
|
|
default:
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, "", -1, key.Curve}, nil
|
|
|
|
}
|
|
|
|
case *ecdsa.PrivateKey:
|
|
|
|
switch key.Curve {
|
|
|
|
case elliptic.P256():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP256AndSHA256, -1, key.Curve}, nil
|
|
|
|
case elliptic.P384():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP384AndSHA384, -1, key.Curve}, nil
|
|
|
|
case elliptic.P521():
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, oidc.SigningAlgECDSAUsingP521AndSHA512, -1, key.Curve}, nil
|
|
|
|
default:
|
|
|
|
return &JWKProperties{oidc.KeyUseSignature, "", -1, key.Curve}, nil
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("the key type '%T' is unknown or not valid for the configuration", key)
|
|
|
|
}
|
|
|
|
}
|