Add OAuth2 PKCE support

This commit is contained in:
Frédéric Guillot 2023-09-02 21:35:10 -07:00
parent fa1148915e
commit ff5d391701
12 changed files with 126 additions and 68 deletions

View file

@ -20,6 +20,7 @@ const (
SessionIDContextKey SessionIDContextKey
CSRFContextKey CSRFContextKey
OAuth2StateContextKey OAuth2StateContextKey
OAuth2CodeVerifierContextKey
FlashMessageContextKey FlashMessageContextKey
FlashErrorMessageContextKey FlashErrorMessageContextKey
PocketRequestTokenContextKey PocketRequestTokenContextKey
@ -94,6 +95,10 @@ func OAuth2State(r *http.Request) string {
return getContextStringValue(r, OAuth2StateContextKey) return getContextStringValue(r, OAuth2StateContextKey)
} }
func OAuth2CodeVerifier(r *http.Request) string {
return getContextStringValue(r, OAuth2CodeVerifierContextKey)
}
// FlashMessage returns the message message if any. // FlashMessage returns the message message if any.
func FlashMessage(r *http.Request) string { func FlashMessage(r *http.Request) string {
return getContextStringValue(r, FlashMessageContextKey) return getContextStringValue(r, FlashMessageContextKey)

View file

@ -14,6 +14,7 @@ import (
type SessionData struct { type SessionData struct {
CSRF string `json:"csrf"` CSRF string `json:"csrf"`
OAuth2State string `json:"oauth2_state"` OAuth2State string `json:"oauth2_state"`
OAuth2CodeVerifier string `json:"oauth2_code_verifier"`
FlashMessage string `json:"flash_message"` FlashMessage string `json:"flash_message"`
FlashErrorMessage string `json:"flash_error_message"` FlashErrorMessage string `json:"flash_error_message"`
Language string `json:"language"` Language string `json:"language"`
@ -22,8 +23,8 @@ type SessionData struct {
} }
func (s SessionData) String() string { func (s SessionData) String() string {
return fmt.Sprintf(`CSRF=%q, OAuth2State=%q, FlashMsg=%q, FlashErrMsg=%q, Lang=%q, Theme=%q, PocketTkn=%q`, return fmt.Sprintf(`CSRF=%q, OAuth2State=%q, OAuth2CodeVerifier=%q, FlashMsg=%q, FlashErrMsg=%q, Lang=%q, Theme=%q, PocketTkn=%q`,
s.CSRF, s.OAuth2State, s.FlashMessage, s.FlashErrorMessage, s.Language, s.Theme, s.PocketRequestToken) s.CSRF, s.OAuth2State, s.OAuth2CodeVerifier, s.FlashMessage, s.FlashErrorMessage, s.Language, s.Theme, s.PocketRequestToken)
} }
// Value converts the session data to JSON. // Value converts the session data to JSON.

View file

@ -0,0 +1,54 @@
// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
// SPDX-License-Identifier: Apache-2.0
package oauth2 // import "miniflux.app/v2/internal/oauth2"
import (
"crypto/sha256"
"encoding/base64"
"io"
"golang.org/x/oauth2"
"miniflux.app/v2/internal/crypto"
)
type Authorization struct {
url string
state string
codeVerifier string
}
func (u *Authorization) RedirectURL() string {
return u.url
}
func (u *Authorization) State() string {
return u.state
}
func (u *Authorization) CodeVerifier() string {
return u.codeVerifier
}
func GenerateAuthorization(config *oauth2.Config) *Authorization {
codeVerifier := crypto.GenerateRandomStringHex(32)
sha2 := sha256.New()
io.WriteString(sha2, codeVerifier)
codeChallenge := base64.RawURLEncoding.EncodeToString(sha2.Sum(nil))
state := crypto.GenerateRandomStringHex(24)
authUrl := config.AuthCodeURL(
state,
oauth2.SetAuthURLParam("code_challenge_method", "S256"),
oauth2.SetAuthURLParam("code_challenge", codeChallenge),
)
return &Authorization{
url: authUrl,
state: state,
codeVerifier: codeVerifier,
}
}

View file

@ -24,17 +24,30 @@ type googleProvider struct {
redirectURL string redirectURL string
} }
func NewGoogleProvider(clientID, clientSecret, redirectURL string) *googleProvider {
return &googleProvider{clientID: clientID, clientSecret: clientSecret, redirectURL: redirectURL}
}
func (g *googleProvider) GetConfig() *oauth2.Config {
return &oauth2.Config{
RedirectURL: g.redirectURL,
ClientID: g.clientID,
ClientSecret: g.clientSecret,
Scopes: []string{"email"},
Endpoint: oauth2.Endpoint{
AuthURL: "https://accounts.google.com/o/oauth2/auth",
TokenURL: "https://accounts.google.com/o/oauth2/token",
},
}
}
func (g *googleProvider) GetUserExtraKey() string { func (g *googleProvider) GetUserExtraKey() string {
return "google_id" return "google_id"
} }
func (g *googleProvider) GetRedirectURL(state string) string { func (g *googleProvider) GetProfile(ctx context.Context, code, codeVerifier string) (*Profile, error) {
return g.config().AuthCodeURL(state) conf := g.GetConfig()
} token, err := conf.Exchange(ctx, code, oauth2.SetAuthURLParam("code_verifier", codeVerifier))
func (g *googleProvider) GetProfile(ctx context.Context, code string) (*Profile, error) {
conf := g.config()
token, err := conf.Exchange(ctx, code)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -67,20 +80,3 @@ func (g *googleProvider) PopulateUserWithProfileID(user *model.User, profile *Pr
func (g *googleProvider) UnsetUserProfileID(user *model.User) { func (g *googleProvider) UnsetUserProfileID(user *model.User) {
user.GoogleID = "" user.GoogleID = ""
} }
func (g *googleProvider) config() *oauth2.Config {
return &oauth2.Config{
RedirectURL: g.redirectURL,
ClientID: g.clientID,
ClientSecret: g.clientSecret,
Scopes: []string{"email"},
Endpoint: oauth2.Endpoint{
AuthURL: "https://accounts.google.com/o/oauth2/auth",
TokenURL: "https://accounts.google.com/o/oauth2/token",
},
}
}
func newGoogleProvider(clientID, clientSecret, redirectURL string) *googleProvider {
return &googleProvider{clientID: clientID, clientSecret: clientSecret, redirectURL: redirectURL}
}

View file

@ -10,12 +10,10 @@ import (
"miniflux.app/v2/internal/logger" "miniflux.app/v2/internal/logger"
) )
// Manager handles OAuth2 providers.
type Manager struct { type Manager struct {
providers map[string]Provider providers map[string]Provider
} }
// FindProvider returns the given provider.
func (m *Manager) FindProvider(name string) (Provider, error) { func (m *Manager) FindProvider(name string) (Provider, error) {
if provider, found := m.providers[name]; found { if provider, found := m.providers[name]; found {
return provider, nil return provider, nil
@ -24,18 +22,16 @@ func (m *Manager) FindProvider(name string) (Provider, error) {
return nil, errors.New("oauth2 provider not found") return nil, errors.New("oauth2 provider not found")
} }
// AddProvider add a new OAuth2 provider.
func (m *Manager) AddProvider(name string, provider Provider) { func (m *Manager) AddProvider(name string, provider Provider) {
m.providers[name] = provider m.providers[name] = provider
} }
// NewManager returns a new Manager.
func NewManager(ctx context.Context, clientID, clientSecret, redirectURL, oidcDiscoveryEndpoint string) *Manager { func NewManager(ctx context.Context, clientID, clientSecret, redirectURL, oidcDiscoveryEndpoint string) *Manager {
m := &Manager{providers: make(map[string]Provider)} m := &Manager{providers: make(map[string]Provider)}
m.AddProvider("google", newGoogleProvider(clientID, clientSecret, redirectURL)) m.AddProvider("google", NewGoogleProvider(clientID, clientSecret, redirectURL))
if oidcDiscoveryEndpoint != "" { if oidcDiscoveryEndpoint != "" {
if genericOidcProvider, err := newOidcProvider(ctx, clientID, clientSecret, redirectURL, oidcDiscoveryEndpoint); err != nil { if genericOidcProvider, err := NewOidcProvider(ctx, clientID, clientSecret, redirectURL, oidcDiscoveryEndpoint); err != nil {
logger.Error("[OAuth2] failed to initialize OIDC provider: %v", err) logger.Error("[OAuth2] failed to initialize OIDC provider: %v", err)
} else { } else {
m.AddProvider("oidc", genericOidcProvider) m.AddProvider("oidc", genericOidcProvider)

View file

@ -19,17 +19,32 @@ type oidcProvider struct {
provider *oidc.Provider provider *oidc.Provider
} }
func NewOidcProvider(ctx context.Context, clientID, clientSecret, redirectURL, discoveryEndpoint string) (*oidcProvider, error) {
provider, err := oidc.NewProvider(ctx, discoveryEndpoint)
if err != nil {
return nil, err
}
return &oidcProvider{clientID: clientID, clientSecret: clientSecret, redirectURL: redirectURL, provider: provider}, nil
}
func (o *oidcProvider) GetUserExtraKey() string { func (o *oidcProvider) GetUserExtraKey() string {
return "openid_connect_id" return "openid_connect_id"
} }
func (o *oidcProvider) GetRedirectURL(state string) string { func (o *oidcProvider) GetConfig() *oauth2.Config {
return o.config().AuthCodeURL(state) return &oauth2.Config{
RedirectURL: o.redirectURL,
ClientID: o.clientID,
ClientSecret: o.clientSecret,
Scopes: []string{"openid", "email"},
Endpoint: o.provider.Endpoint(),
}
} }
func (o *oidcProvider) GetProfile(ctx context.Context, code string) (*Profile, error) { func (o *oidcProvider) GetProfile(ctx context.Context, code, codeVerifier string) (*Profile, error) {
conf := o.config() conf := o.GetConfig()
token, err := conf.Exchange(ctx, code) token, err := conf.Exchange(ctx, code, oauth2.SetAuthURLParam("code_verifier", codeVerifier))
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -54,22 +69,3 @@ func (o *oidcProvider) PopulateUserWithProfileID(user *model.User, profile *Prof
func (o *oidcProvider) UnsetUserProfileID(user *model.User) { func (o *oidcProvider) UnsetUserProfileID(user *model.User) {
user.OpenIDConnectID = "" user.OpenIDConnectID = ""
} }
func (o *oidcProvider) config() *oauth2.Config {
return &oauth2.Config{
RedirectURL: o.redirectURL,
ClientID: o.clientID,
ClientSecret: o.clientSecret,
Scopes: []string{"openid", "email"},
Endpoint: o.provider.Endpoint(),
}
}
func newOidcProvider(ctx context.Context, clientID, clientSecret, redirectURL, discoveryEndpoint string) (*oidcProvider, error) {
provider, err := oidc.NewProvider(ctx, discoveryEndpoint)
if err != nil {
return nil, err
}
return &oidcProvider{clientID: clientID, clientSecret: clientSecret, redirectURL: redirectURL, provider: provider}, nil
}

View file

@ -6,14 +6,16 @@ package oauth2 // import "miniflux.app/v2/internal/oauth2"
import ( import (
"context" "context"
"golang.org/x/oauth2"
"miniflux.app/v2/internal/model" "miniflux.app/v2/internal/model"
) )
// Provider is an interface for OAuth2 providers. // Provider is an interface for OAuth2 providers.
type Provider interface { type Provider interface {
GetConfig() *oauth2.Config
GetUserExtraKey() string GetUserExtraKey() string
GetRedirectURL(state string) string GetProfile(ctx context.Context, code, codeVerifier string) (*Profile, error)
GetProfile(ctx context.Context, code string) (*Profile, error)
PopulateUserCreationWithProfileID(user *model.UserCreationRequest, profile *Profile) PopulateUserCreationWithProfileID(user *model.UserCreationRequest, profile *Profile)
PopulateUserWithProfileID(user *model.User, profile *Profile) PopulateUserWithProfileID(user *model.User, profile *Profile)
UnsetUserProfileID(user *model.User) UnsetUserProfileID(user *model.User)

View file

@ -53,7 +53,7 @@ func (s *Storage) createAppSession(session *model.Session) (*model.Session, erro
} }
// UpdateAppSessionField updates only one session field. // UpdateAppSessionField updates only one session field.
func (s *Storage) UpdateAppSessionField(sessionID, field string, value interface{}) error { func (s *Storage) UpdateAppSessionField(sessionID, field string, value any) error {
query := ` query := `
UPDATE UPDATE
sessions sessions

View file

@ -94,7 +94,7 @@ func (m *middleware) handleAppSession(next http.Handler) http.Handler {
return return
} }
html.BadRequest(w, r, errors.New("Invalid or missing CSRF")) html.BadRequest(w, r, errors.New("invalid or missing CSRF"))
return return
} }
} }
@ -103,6 +103,7 @@ func (m *middleware) handleAppSession(next http.Handler) http.Handler {
ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID) ctx = context.WithValue(ctx, request.SessionIDContextKey, session.ID)
ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF) ctx = context.WithValue(ctx, request.CSRFContextKey, session.Data.CSRF)
ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State) ctx = context.WithValue(ctx, request.OAuth2StateContextKey, session.Data.OAuth2State)
ctx = context.WithValue(ctx, request.OAuth2CodeVerifierContextKey, session.Data.OAuth2CodeVerifier)
ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage) ctx = context.WithValue(ctx, request.FlashMessageContextKey, session.Data.FlashMessage)
ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage) ctx = context.WithValue(ctx, request.FlashErrorMessageContextKey, session.Data.FlashErrorMessage)
ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language) ctx = context.WithValue(ctx, request.UserLanguageContextKey, session.Data.Language)

View file

@ -4,6 +4,7 @@
package ui // import "miniflux.app/v2/internal/ui" package ui // import "miniflux.app/v2/internal/ui"
import ( import (
"crypto/subtle"
"errors" "errors"
"net/http" "net/http"
@ -38,7 +39,7 @@ func (h *handler) oauth2Callback(w http.ResponseWriter, r *http.Request) {
} }
state := request.QueryStringParam(r, "state", "") state := request.QueryStringParam(r, "state", "")
if state == "" || state != request.OAuth2State(r) { if subtle.ConstantTimeCompare([]byte(state), []byte(request.OAuth2State(r))) == 0 {
logger.Error(`[OAuth2] Invalid state value: got "%s" instead of "%s"`, state, request.OAuth2State(r)) logger.Error(`[OAuth2] Invalid state value: got "%s" instead of "%s"`, state, request.OAuth2State(r))
html.Redirect(w, r, route.Path(h.router, "login")) html.Redirect(w, r, route.Path(h.router, "login"))
return return
@ -51,7 +52,7 @@ func (h *handler) oauth2Callback(w http.ResponseWriter, r *http.Request) {
return return
} }
profile, err := authProvider.GetProfile(r.Context(), code) profile, err := authProvider.GetProfile(r.Context(), code, request.OAuth2CodeVerifier(r))
if err != nil { if err != nil {
logger.Error("[OAuth2] %v", err) logger.Error("[OAuth2] %v", err)
html.Redirect(w, r, route.Path(h.router, "login")) html.Redirect(w, r, route.Path(h.router, "login"))

View file

@ -10,6 +10,7 @@ import (
"miniflux.app/v2/internal/http/response/html" "miniflux.app/v2/internal/http/response/html"
"miniflux.app/v2/internal/http/route" "miniflux.app/v2/internal/http/route"
"miniflux.app/v2/internal/logger" "miniflux.app/v2/internal/logger"
"miniflux.app/v2/internal/oauth2"
"miniflux.app/v2/internal/ui/session" "miniflux.app/v2/internal/ui/session"
) )
@ -30,5 +31,10 @@ func (h *handler) oauth2Redirect(w http.ResponseWriter, r *http.Request) {
return return
} }
html.Redirect(w, r, authProvider.GetRedirectURL(sess.NewOAuth2State())) auth := oauth2.GenerateAuthorization(authProvider.GetConfig())
sess.SetOAuth2State(auth.State())
sess.SetOAuth2CodeVerifier(auth.CodeVerifier())
html.Redirect(w, r, auth.RedirectURL())
} }

View file

@ -4,7 +4,6 @@
package session // import "miniflux.app/v2/internal/ui/session" package session // import "miniflux.app/v2/internal/ui/session"
import ( import (
"miniflux.app/v2/internal/crypto"
"miniflux.app/v2/internal/storage" "miniflux.app/v2/internal/storage"
) )
@ -14,11 +13,12 @@ type Session struct {
sessionID string sessionID string
} }
// NewOAuth2State generates a new OAuth2 state and stores the value into the database. func (s *Session) SetOAuth2State(state string) {
func (s *Session) NewOAuth2State() string {
state := crypto.GenerateRandomString(32)
s.store.UpdateAppSessionField(s.sessionID, "oauth2_state", state) s.store.UpdateAppSessionField(s.sessionID, "oauth2_state", state)
return state }
func (s *Session) SetOAuth2CodeVerifier(codeVerfier string) {
s.store.UpdateAppSessionField(s.sessionID, "oauth2_code_verifier", codeVerfier)
} }
// NewFlashMessage creates a new flash message. // NewFlashMessage creates a new flash message.