| package oidc |
|
|
| import ( |
| "bytes" |
| "context" |
| "encoding/base64" |
| "encoding/binary" |
| "fmt" |
| "net/http" |
| "strings" |
| "sync" |
| "time" |
|
|
| "github.com/coreos/go-oidc/v3/oidc" |
| "github.com/jmespath/go-jmespath" |
| "github.com/pkg/errors" |
| "github.com/target/goalert/auth" |
| "github.com/target/goalert/config" |
| "github.com/target/goalert/util/log" |
| "golang.org/x/oauth2" |
| ) |
|
|
| var _ auth.IdentityProvider = &Provider{} |
|
|
| const nonceCookieName = "goalert_oidc_nonce" |
|
|
| var b64enc = base64.URLEncoding.WithPadding(base64.NoPadding) |
|
|
| |
| |
| type Provider struct { |
| cfg Config |
|
|
| mx sync.Mutex |
| providers map[string]*oidc.Provider |
| } |
|
|
| func (p *Provider) provider(ctx context.Context) (*oidc.Provider, error) { |
| cfg := config.FromContext(ctx) |
| p.mx.Lock() |
| defer p.mx.Unlock() |
|
|
| provider, ok := p.providers[cfg.OIDC.IssuerURL] |
| if ok { |
| return provider, nil |
| } |
|
|
| |
| |
| |
| oidcCtx := log.FromContext(ctx).BackgroundContext() |
| provider, err := oidc.NewProvider(oidcCtx, cfg.OIDC.IssuerURL) |
| if err != nil { |
| return nil, err |
| } |
|
|
| p.providers[cfg.OIDC.IssuerURL] = provider |
| return provider, nil |
| } |
|
|
| func (p *Provider) oaConfig(ctx context.Context) (*oauth2.Config, *oidc.IDTokenVerifier, error) { |
| provider, err := p.provider(ctx) |
| if err != nil { |
| return nil, nil, err |
| } |
| cfg := config.FromContext(ctx) |
| scopes := cfg.OIDC.Scopes |
| |
| if scopes == "" { |
| scopes = "openid profile email" |
| } |
|
|
| return &oauth2.Config{ |
| ClientID: cfg.OIDC.ClientID, |
| ClientSecret: cfg.OIDC.ClientSecret, |
|
|
| Endpoint: provider.Endpoint(), |
|
|
| Scopes: strings.Split(scopes, " "), |
| }, provider.Verifier(&oidc.Config{ClientID: cfg.OIDC.ClientID}), nil |
| } |
|
|
| |
| func NewProvider(ctx context.Context, cfg Config) (*Provider, error) { |
| if cfg.Keyring == nil { |
| return nil, errors.New("Keyring missing") |
| } |
| if cfg.NonceStore == nil { |
| return nil, errors.New("NonceStore missing") |
| } |
|
|
| return &Provider{ |
| cfg: cfg, |
| providers: make(map[string]*oidc.Provider), |
| }, nil |
| } |
|
|
| |
| |
| |
| func (p *Provider) Info(ctx context.Context) auth.ProviderInfo { |
| cfg := config.FromContext(ctx) |
| title := "OIDC" |
| if cfg.OIDC.OverrideName != "" { |
| title = cfg.OIDC.OverrideName |
| } |
| return auth.ProviderInfo{ |
| Title: title, |
| Enabled: cfg.OIDC.Enable, |
| } |
| } |
|
|
| func (p *Provider) newStateToken(nonceBytes []byte) (state string, err error) { |
| buf := bytes.NewBuffer(nil) |
|
|
| buf.Write(nonceBytes[:]) |
| buf.WriteByte('N') |
| if err := binary.Write(buf, binary.BigEndian, time.Now().Unix()); err != nil { |
| return "", err |
| } |
|
|
| sig, err := p.cfg.Keyring.Sign(buf.Bytes()) |
| if err != nil { |
| return "", err |
| } |
| buf.Write(sig) |
|
|
| |
| buf.Next(len(nonceBytes)) |
|
|
| return b64enc.EncodeToString(buf.Bytes()), nil |
| } |
|
|
| func (p *Provider) validateStateToken(ctx context.Context, nonce []byte, state string) (bool, error) { |
| var buf bytes.Buffer |
| buf.Write(nonce[:]) |
| data, err := b64enc.DecodeString(state) |
| if err != nil { |
| return false, err |
| } |
| buf.Write(data) |
| data = buf.Bytes() |
| if len(data) < 25 { |
| return false, nil |
| } |
| valid, _ := p.cfg.Keyring.Verify(data[:25], data[25:]) |
| if !valid { |
| return false, nil |
| } |
| if data[16] != 'N' { |
| return false, nil |
| } |
| var id [16]byte |
| copy(id[:], data[1:]) |
|
|
| unix := int64(binary.BigEndian.Uint64(data[17:])) |
| t := time.Unix(unix, 0) |
| if time.Since(t) > time.Hour { |
| return false, nil |
| } |
| if time.Until(t) > time.Minute*5 { |
| |
| return false, nil |
| } |
|
|
| return true, nil |
| } |
|
|
| type claimsData struct { |
| Name string `json:"name"` |
| GivenName string `json:"given_name"` |
| FamilyName string `json:"family_name"` |
| Email string `json:"email"` |
| Verified bool `json:"email_verified"` |
| } |
|
|
| |
| |
| func (p *Provider) ExtractIdentity(route *auth.RouteInfo, w http.ResponseWriter, req *http.Request) (*auth.Identity, error) { |
| ctx := req.Context() |
| cfg := config.FromContext(ctx) |
|
|
| name := "OIDC" |
| if cfg.OIDC.OverrideName != "" { |
| name = cfg.OIDC.OverrideName |
| } |
|
|
| switch route.RelativePath { |
| case "/": |
| nonce := p.cfg.NonceStore.New() |
| stateToken, err := p.newStateToken(nonce[:]) |
| if err != nil { |
| log.Log(req.Context(), errors.Wrap(err, "generate new state token")) |
| return nil, auth.Error("Failed to generate state token.") |
| } |
| nonceStr := b64enc.EncodeToString(nonce[:]) |
| auth.SetCookie(w, req, nonceCookieName, nonceStr, false) |
|
|
| oaCfg, _, err := p.oaConfig(ctx) |
| if err != nil { |
| return nil, err |
| } |
| oaCfg.RedirectURL = route.CurrentURL + "/callback" |
|
|
| u := oaCfg.AuthCodeURL(stateToken, oidc.Nonce(nonceStr)) |
| return nil, auth.RedirectURL(u) |
| case "/callback": |
| |
| default: |
| return nil, auth.Error(fmt.Sprintf("Could not login due to wrong configuration for %s.", name)) |
| } |
|
|
| stateToken := req.FormValue("state") |
| nonceC, err := req.Cookie(nonceCookieName) |
| if err != nil { |
| return nil, auth.Error("There was a problem recognizing this browser. You can try again") |
| } |
| auth.ClearCookie(w, req, nonceCookieName, false) |
|
|
| nonce, err := b64enc.DecodeString(nonceC.Value) |
| if err != nil || len(nonce) != 16 { |
| |
| return nil, auth.Error("There was a problem verifying this browser. You can try again") |
| } |
| valid, err := p.validateStateToken(req.Context(), nonce, stateToken) |
| if err != nil { |
| log.Log(req.Context(), errors.Wrap(err, "validate state token")) |
| return nil, auth.Error("There was a redirection problem. You can try again") |
| } |
| if !valid { |
| return nil, auth.Error("There was a problem while checking the request. You can try again") |
| } |
|
|
| oaCfg, verifier, err := p.oaConfig(ctx) |
| if err != nil { |
| return nil, err |
| } |
| oaCfg.RedirectURL = route.CurrentURL |
|
|
| oauth2Token, err := oaCfg.Exchange(ctx, req.URL.Query().Get("code")) |
| if err != nil { |
| log.Log(ctx, errors.Wrap(err, "exchange OIDC token")) |
| return nil, auth.Error(fmt.Sprintf("Could not communicate with %s server. You can try again", name)) |
| } |
|
|
| |
| rawIDToken, ok := oauth2Token.Extra("id_token").(string) |
| if !ok { |
| log.Log(ctx, errors.New("id_token missing")) |
| return nil, auth.Error(fmt.Sprintf("Bad response from %s server.", name)) |
| } |
|
|
| |
| idToken, err := verifier.Verify(ctx, rawIDToken) |
| if err != nil { |
| log.Log(ctx, errors.Wrap(err, "validate id_token")) |
| return nil, auth.Error(fmt.Sprintf("Invalid response from %s server.", name)) |
| } |
|
|
| remoteNonce, err := b64enc.DecodeString(idToken.Nonce) |
| if err != nil || len(remoteNonce) != 16 || !bytes.Equal(remoteNonce, nonce) { |
| return nil, auth.Error(fmt.Sprintf("Invalid nonce from %s server.", name)) |
| } |
| var remoteNonceBytes [16]byte |
| copy(remoteNonceBytes[:], remoteNonce) |
|
|
| ok, err = p.cfg.NonceStore.Consume(ctx, remoteNonceBytes) |
| if err != nil { |
| log.Log(ctx, errors.Wrap(err, "consume nonce value")) |
| return nil, auth.Error("Could not login. You can try again") |
| } |
| if !ok { |
| return nil, auth.Error("Could not login. You can try again") |
| } |
|
|
| |
| var claims claimsData |
| if err := idToken.Claims(&claims); err != nil { |
| log.Log(ctx, errors.Wrap(err, "parse claims")) |
| return nil, auth.Error(fmt.Sprintf("Invalid response from %s server.", name)) |
| } |
|
|
| if claims.Name == "" { |
| |
| |
| claims.Name = strings.TrimSpace(claims.GivenName + " " + claims.FamilyName) |
| } |
|
|
| id := auth.Identity{ |
| Email: claims.Email, |
| Name: claims.Name, |
| EmailVerified: claims.Verified, |
| SubjectID: idToken.Subject, |
| } |
|
|
| var info interface{} |
| getInfo := func(name, search string) interface{} { |
| if err != nil { |
| return nil |
| } |
| if info == nil { |
| info, err = p.userInfoData(ctx, oaCfg.TokenSource(ctx, oauth2Token)) |
| } |
| if err != nil { |
| log.Log(ctx, err) |
| return nil |
| } |
| res, searchErr := jmespath.Search(search, info) |
| if searchErr != nil { |
| log.Log(ctx, errors.Wrapf(searchErr, "lookup %s in UserInfo", name)) |
| return nil |
| } |
|
|
| return res |
| } |
| infoFieldStr := func(name, search string, field *string) { |
| if search == "" { |
| return |
| } |
| *field = "" |
| res := getInfo(name, search) |
| if res == nil { |
| return |
| } |
| s, ok := res.(string) |
| if !ok { |
| log.Log(ctx, errors.Errorf("expected %s to be a string in UserInfo", name)) |
| return |
| } |
| *field = s |
| } |
| infoFieldBool := func(name, search string, field *bool) { |
| if search == "" { |
| return |
| } |
| *field = false |
| res := getInfo(name, search) |
| if res == nil { |
| return |
| } |
| v, ok := res.(bool) |
| if !ok { |
| log.Log(ctx, errors.Errorf("expected %s to be a bool in UserInfo", name)) |
| return |
| } |
| *field = v |
| } |
| infoFieldStr("Email", cfg.OIDC.UserInfoEmailPath, &id.Email) |
| infoFieldBool("EmailVerified", cfg.OIDC.UserInfoEmailVerifiedPath, &id.EmailVerified) |
| infoFieldStr("Name", cfg.OIDC.UserInfoNamePath, &id.Name) |
|
|
| return &id, nil |
| } |
|
|
| func (p *Provider) userInfoData(ctx context.Context, token oauth2.TokenSource) (interface{}, error) { |
| provider, err := p.provider(ctx) |
| if err != nil { |
| return nil, errors.Wrap(err, "get provider") |
| } |
|
|
| info, err := provider.UserInfo(ctx, token) |
| if err != nil { |
| return nil, errors.Wrap(err, "fetch UserInfo") |
| } |
|
|
| var rawInfo interface{} |
| if err := info.Claims(&rawInfo); err != nil { |
| return nil, errors.Wrap(err, "parse UserInfo") |
| } |
|
|
| return rawInfo, nil |
| } |
|
|