|
|
|
@ -4,6 +4,7 @@ import (
|
|
|
|
|
"context"
|
|
|
|
|
"crypto/sha256"
|
|
|
|
|
"encoding/base64"
|
|
|
|
|
"fmt"
|
|
|
|
|
"regexp"
|
|
|
|
|
|
|
|
|
|
"github.com/ory/fosite"
|
|
|
|
@ -13,8 +14,6 @@ import (
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
var _ fosite.TokenEndpointHandler = (*handlerPKCE)(nil)
|
|
|
|
|
|
|
|
|
|
type handlerPKCE struct {
|
|
|
|
|
AuthorizeCodeStrategy oauth2.AuthorizeCodeStrategy
|
|
|
|
|
Storage pkce.PKCERequestStorage
|
|
|
|
@ -27,6 +26,136 @@ type handlerPKCE struct {
|
|
|
|
|
|
|
|
|
|
var verifierWrongFormat = regexp.MustCompile(`[^\w.\-~]`)
|
|
|
|
|
|
|
|
|
|
// HandleTokenEndpointRequest implements the fosite.TokenEndpointHandler for PKCE.
|
|
|
|
|
func (c *handlerPKCE) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error {
|
|
|
|
|
if !c.CanHandleTokenEndpointRequest(ctx, request) {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrUnknownRequest)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// code_verifier
|
|
|
|
|
// REQUIRED. Code verifier
|
|
|
|
|
//
|
|
|
|
|
// The "code_challenge_method" is bound to the Authorization Code when
|
|
|
|
|
// the Authorization Code is issued. That is the method that the token
|
|
|
|
|
// endpoint MUST use to verify the "code_verifier".
|
|
|
|
|
verifier := request.GetRequestForm().Get(FormParameterCodeCodeVerifier)
|
|
|
|
|
|
|
|
|
|
signature := c.AuthorizeCodeStrategy.AuthorizeCodeSignature(ctx, request.GetRequestForm().Get(FormParameterCode))
|
|
|
|
|
pkceRequest, err := c.Storage.GetPKCERequestSession(ctx, signature, request.GetSession())
|
|
|
|
|
|
|
|
|
|
switch {
|
|
|
|
|
case errors.Is(err, fosite.ErrNotFound):
|
|
|
|
|
if verifier == "" {
|
|
|
|
|
return c.validateNoPKCE(ctx, request.GetClient())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.WithHint("Unable to find initial PKCE data tied to this request").WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
case err != nil:
|
|
|
|
|
return errorsx.WithStack(fosite.ErrServerError.WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err = c.Storage.DeletePKCERequestSession(ctx, signature); err != nil {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrServerError.WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
challenge := pkceRequest.GetRequestForm().Get(FormParameterCodeChallenge)
|
|
|
|
|
method := pkceRequest.GetRequestForm().Get(FormParameterCodeChallengeMethod)
|
|
|
|
|
client := pkceRequest.GetClient()
|
|
|
|
|
|
|
|
|
|
if err = c.validate(ctx, challenge, method, client); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !c.Config.GetEnforcePKCE(ctx) && challenge == "" && verifier == "" {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch e := validatePKCEVerifier(method, challenge, verifier).(type) {
|
|
|
|
|
case nil:
|
|
|
|
|
return nil
|
|
|
|
|
case *fosite.RFC6749Error:
|
|
|
|
|
return errorsx.WithStack(e)
|
|
|
|
|
default:
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint(e.Error()))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func validatePKCEVerifier(method, challenge, verifier string) (err error) {
|
|
|
|
|
// NOTE: The code verifier SHOULD have enough entropy to make it
|
|
|
|
|
// impractical to guess the value. It is RECOMMENDED that the output of
|
|
|
|
|
// a suitable random number generator be used to create a 32-octet
|
|
|
|
|
// sequence. The octet sequence is then base64url-encoded to produce a
|
|
|
|
|
// 43-octet URL safe string to use as the code verifier.
|
|
|
|
|
|
|
|
|
|
// Validate the verifier is appropriate.
|
|
|
|
|
switch n := len(verifier); {
|
|
|
|
|
case n < 43:
|
|
|
|
|
return fmt.Errorf("The PKCE code verifier must be at least 43 characters.")
|
|
|
|
|
case n > 128:
|
|
|
|
|
return fmt.Errorf("The PKCE code verifier can not be longer than 128 characters.")
|
|
|
|
|
case verifierWrongFormat.MatchString(verifier):
|
|
|
|
|
return fmt.Errorf("The PKCE code verifier must only contain [a-Z], [0-9], '-', '.', '_', '~'.")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Upon receipt of the request at the token endpoint, the server
|
|
|
|
|
// verifies it by calculating the code challenge from the received
|
|
|
|
|
// "code_verifier" and comparing it with the previously associated
|
|
|
|
|
// "code_challenge", after first transforming it according to the
|
|
|
|
|
// "code_challenge_method" method specified by the client.
|
|
|
|
|
//
|
|
|
|
|
// If the "code_challenge_method" from Section 4.3 was "S256", the
|
|
|
|
|
// received "code_verifier" is hashed by SHA-256, base64url-encoded, and
|
|
|
|
|
// then compared to the "code_challenge", i.e.:
|
|
|
|
|
//
|
|
|
|
|
// BASE64URL-ENCODE(SHA256(ASCII(code_verifier))) == code_challenge
|
|
|
|
|
//
|
|
|
|
|
// If the "code_challenge_method" from Section 4.3 was "plain", they are
|
|
|
|
|
// compared directly, i.e.:
|
|
|
|
|
//
|
|
|
|
|
// code_verifier == code_challenge.
|
|
|
|
|
//
|
|
|
|
|
// If the values are equal, the token endpoint MUST continue processing
|
|
|
|
|
// as normal (as defined by OAuth 2.0 [RFC6749]). If the values are not
|
|
|
|
|
// equal, an error response indicating "invalid_grant" as described in
|
|
|
|
|
// Section 5.2 of [RFC6749] MUST be returned.
|
|
|
|
|
switch method {
|
|
|
|
|
case PKCEChallengeMethodSHA256:
|
|
|
|
|
hash := sha256.New()
|
|
|
|
|
if _, err = hash.Write([]byte(verifier)); err != nil {
|
|
|
|
|
return fosite.ErrServerError.WithWrap(err).WithDebug(err.Error())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if base64.RawURLEncoding.EncodeToString(hash.Sum([]byte{})) != challenge {
|
|
|
|
|
return fmt.Errorf("The PKCE code challenge did not match the code verifier.")
|
|
|
|
|
}
|
|
|
|
|
case PKCEChallengeMethodPlain:
|
|
|
|
|
fallthrough
|
|
|
|
|
default:
|
|
|
|
|
if verifier != challenge {
|
|
|
|
|
return fmt.Errorf("The PKCE code challenge did not match the code verifier.")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// PopulateTokenEndpointResponse implements the fosite.TokenEndpointHandler for PKCE.
|
|
|
|
|
func (c *handlerPKCE) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, responder fosite.AccessResponder) error {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// CanSkipClientAuth implements the fosite.TokenEndpointHandler for PKCE.
|
|
|
|
|
func (c *handlerPKCE) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// CanHandleTokenEndpointRequest implements the fosite.TokenEndpointHandler for PKCE.
|
|
|
|
|
func (c *handlerPKCE) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool {
|
|
|
|
|
return requester.GetGrantTypes().ExactOne(GrantTypeAuthorizationCode)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// HandleAuthorizeEndpointRequest implements the fosite.AuthorizeEndpointHandler for PKCE.
|
|
|
|
|
func (c *handlerPKCE) HandleAuthorizeEndpointRequest(ctx context.Context, ar fosite.AuthorizeRequester, resp fosite.AuthorizeResponder) error {
|
|
|
|
|
// This let's us define multiple response types, for example OpenID Connect 1.0's id_token.
|
|
|
|
|
if !ar.GetResponseTypes().Has(ResponseTypeAuthorizationCodeFlow) {
|
|
|
|
@ -94,6 +223,7 @@ func (c *handlerPKCE) validate(ctx context.Context, challenge, method string, cl
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidRequest.
|
|
|
|
|
WithHint("The code_challenge_method is not supported, use S256 instead."))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -119,119 +249,8 @@ func (c *handlerPKCE) validateNoPKCE(ctx context.Context, client fosite.Client)
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *handlerPKCE) HandleTokenEndpointRequest(ctx context.Context, request fosite.AccessRequester) error {
|
|
|
|
|
if !c.CanHandleTokenEndpointRequest(ctx, request) {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrUnknownRequest)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// code_verifier
|
|
|
|
|
// REQUIRED. Code verifier
|
|
|
|
|
//
|
|
|
|
|
// The "code_challenge_method" is bound to the Authorization Code when
|
|
|
|
|
// the Authorization Code is issued. That is the method that the token
|
|
|
|
|
// endpoint MUST use to verify the "code_verifier".
|
|
|
|
|
verifier := request.GetRequestForm().Get(FormParameterCodeCodeVerifier)
|
|
|
|
|
|
|
|
|
|
code := request.GetRequestForm().Get(ResponseTypeAuthorizationCodeFlow)
|
|
|
|
|
signature := c.AuthorizeCodeStrategy.AuthorizeCodeSignature(ctx, code)
|
|
|
|
|
pkceRequest, err := c.Storage.GetPKCERequestSession(ctx, signature, request.GetSession())
|
|
|
|
|
if errors.Is(err, fosite.ErrNotFound) {
|
|
|
|
|
if verifier == "" {
|
|
|
|
|
return c.validateNoPKCE(ctx, request.GetClient())
|
|
|
|
|
}
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.WithHint("Unable to find initial PKCE data tied to this request").WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
} else if err != nil {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrServerError.WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err := c.Storage.DeletePKCERequestSession(ctx, signature); err != nil {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrServerError.WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
challenge := pkceRequest.GetRequestForm().Get(FormParameterCodeChallenge)
|
|
|
|
|
method := pkceRequest.GetRequestForm().Get(FormParameterCodeChallengeMethod)
|
|
|
|
|
client := pkceRequest.GetClient()
|
|
|
|
|
if err := c.validate(ctx, challenge, method, client); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !c.Config.GetEnforcePKCE(ctx) && challenge == "" && verifier == "" {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// NOTE: The code verifier SHOULD have enough entropy to make it
|
|
|
|
|
// impractical to guess the value. It is RECOMMENDED that the output of
|
|
|
|
|
// a suitable random number generator be used to create a 32-octet
|
|
|
|
|
// sequence. The octet sequence is then base64url-encoded to produce a
|
|
|
|
|
// 43-octet URL safe string to use as the code verifier.
|
|
|
|
|
|
|
|
|
|
// Validation
|
|
|
|
|
if len(verifier) < 43 {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint("The PKCE code verifier must be at least 43 characters."))
|
|
|
|
|
} else if len(verifier) > 128 {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint("The PKCE code verifier can not be longer than 128 characters."))
|
|
|
|
|
} else if verifierWrongFormat.MatchString(verifier) {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint("The PKCE code verifier must only contain [a-Z], [0-9], '-', '.', '_', '~'."))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Upon receipt of the request at the token endpoint, the server
|
|
|
|
|
// verifies it by calculating the code challenge from the received
|
|
|
|
|
// "code_verifier" and comparing it with the previously associated
|
|
|
|
|
// "code_challenge", after first transforming it according to the
|
|
|
|
|
// "code_challenge_method" method specified by the client.
|
|
|
|
|
//
|
|
|
|
|
// If the "code_challenge_method" from Section 4.3 was "S256", the
|
|
|
|
|
// received "code_verifier" is hashed by SHA-256, base64url-encoded, and
|
|
|
|
|
// then compared to the "code_challenge", i.e.:
|
|
|
|
|
//
|
|
|
|
|
// BASE64URL-ENCODE(SHA256(ASCII(code_verifier))) == code_challenge
|
|
|
|
|
//
|
|
|
|
|
// If the "code_challenge_method" from Section 4.3 was "plain", they are
|
|
|
|
|
// compared directly, i.e.:
|
|
|
|
|
//
|
|
|
|
|
// code_verifier == code_challenge.
|
|
|
|
|
//
|
|
|
|
|
// If the values are equal, the token endpoint MUST continue processing
|
|
|
|
|
// as normal (as defined by OAuth 2.0 [RFC6749]). If the values are not
|
|
|
|
|
// equal, an error response indicating "invalid_grant" as described in
|
|
|
|
|
// Section 5.2 of [RFC6749] MUST be returned.
|
|
|
|
|
switch method {
|
|
|
|
|
case PKCEChallengeMethodSHA256:
|
|
|
|
|
hash := sha256.New()
|
|
|
|
|
if _, err := hash.Write([]byte(verifier)); err != nil {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrServerError.WithWrap(err).WithDebug(err.Error()))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if base64.RawURLEncoding.EncodeToString(hash.Sum([]byte{})) != challenge {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint("The PKCE code challenge did not match the code verifier."))
|
|
|
|
|
}
|
|
|
|
|
break
|
|
|
|
|
case PKCEChallengeMethodPlain:
|
|
|
|
|
fallthrough
|
|
|
|
|
default:
|
|
|
|
|
if verifier != challenge {
|
|
|
|
|
return errorsx.WithStack(fosite.ErrInvalidGrant.
|
|
|
|
|
WithHint("The PKCE code challenge did not match the code verifier."))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *handlerPKCE) PopulateTokenEndpointResponse(ctx context.Context, requester fosite.AccessRequester, responder fosite.AccessResponder) error {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *handlerPKCE) CanSkipClientAuth(ctx context.Context, requester fosite.AccessRequester) bool {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *handlerPKCE) CanHandleTokenEndpointRequest(ctx context.Context, requester fosite.AccessRequester) bool {
|
|
|
|
|
// grant_type REQUIRED.
|
|
|
|
|
// Value MUST be set to "authorization_code"
|
|
|
|
|
return requester.GetGrantTypes().ExactOne(GrantTypeAuthorizationCode)
|
|
|
|
|
}
|
|
|
|
|
// Serves as validation that the structures in this file implement the relevant fosite interfaces.
|
|
|
|
|
var (
|
|
|
|
|
_ fosite.AuthorizeEndpointHandler = (*handlerPKCE)(nil)
|
|
|
|
|
_ fosite.TokenEndpointHandler = (*handlerPKCE)(nil)
|
|
|
|
|
)
|