-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
Improve OAuth handling #9517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve OAuth handling #9517
Changes from all commits
49795d2
4e3aef2
c28b25c
f7ecec8
5a97148
461998d
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -21,67 +21,151 @@ | |
|
|
||
| namespace OCA\OAuth2\Controller; | ||
|
|
||
| use OC\Authentication\Token\DefaultTokenMapper; | ||
| use OC\Authentication\Exceptions\InvalidTokenException; | ||
| use OC\Authentication\Token\ExpiredTokenException; | ||
| use OC\Authentication\Token\IProvider as TokenProvider; | ||
| use OCA\OAuth2\Db\AccessTokenMapper; | ||
| use OCA\OAuth2\Db\ClientMapper; | ||
| use OCA\OAuth2\Exceptions\AccessTokenNotFoundException; | ||
| use OCA\OAuth2\Exceptions\ClientNotFoundException; | ||
| use OCP\AppFramework\Controller; | ||
| use OCP\AppFramework\Http; | ||
| use OCP\AppFramework\Http\JSONResponse; | ||
| use OCP\AppFramework\Utility\ITimeFactory; | ||
| use OCP\IRequest; | ||
| use OCP\Security\ICrypto; | ||
| use OCP\Security\ISecureRandom; | ||
|
|
||
| class OauthApiController extends Controller { | ||
| /** @var AccessTokenMapper */ | ||
| private $accessTokenMapper; | ||
| /** @var ClientMapper */ | ||
| private $clientMapper; | ||
| /** @var ICrypto */ | ||
| private $crypto; | ||
| /** @var DefaultTokenMapper */ | ||
| private $defaultTokenMapper; | ||
| /** @var TokenProvider */ | ||
| private $tokenProvider; | ||
| /** @var ISecureRandom */ | ||
| private $secureRandom; | ||
| /** @var ITimeFactory */ | ||
| private $time; | ||
|
|
||
| /** | ||
| * @param string $appName | ||
| * @param IRequest $request | ||
| * @param ICrypto $crypto | ||
| * @param AccessTokenMapper $accessTokenMapper | ||
| * @param DefaultTokenMapper $defaultTokenMapper | ||
| * @param ClientMapper $clientMapper | ||
| * @param TokenProvider $tokenProvider | ||
| * @param ISecureRandom $secureRandom | ||
| * @param ITimeFactory $time | ||
| */ | ||
| public function __construct($appName, | ||
| IRequest $request, | ||
| ICrypto $crypto, | ||
| AccessTokenMapper $accessTokenMapper, | ||
| DefaultTokenMapper $defaultTokenMapper, | ||
| ISecureRandom $secureRandom) { | ||
| ClientMapper $clientMapper, | ||
| TokenProvider $tokenProvider, | ||
| ISecureRandom $secureRandom, | ||
| ITimeFactory $time) { | ||
| parent::__construct($appName, $request); | ||
| $this->crypto = $crypto; | ||
| $this->accessTokenMapper = $accessTokenMapper; | ||
| $this->defaultTokenMapper = $defaultTokenMapper; | ||
| $this->clientMapper = $clientMapper; | ||
| $this->tokenProvider = $tokenProvider; | ||
| $this->secureRandom = $secureRandom; | ||
| $this->time = $time; | ||
| } | ||
|
|
||
| /** | ||
| * @PublicPage | ||
| * @NoCSRFRequired | ||
| * | ||
| * @param string $grant_type | ||
| * @param string $code | ||
| * @param string $refresh_token | ||
| * @param string $client_id | ||
| * @param string $client_secret | ||
| * @return JSONResponse | ||
| */ | ||
| public function getToken($code) { | ||
| $accessToken = $this->accessTokenMapper->getByCode($code); | ||
| public function getToken($grant_type, $code, $refresh_token, $client_id, $client_secret) { | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. cases
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. No I can't change those as they are post variables and defined in the OAuth spec
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. okay then |
||
|
|
||
| // We only handle two types | ||
| if ($grant_type !== 'authorization_code' && $grant_type !== 'refresh_token') { | ||
| return new JSONResponse([ | ||
| 'error' => 'invalid_grant', | ||
| ], Http::STATUS_BAD_REQUEST); | ||
| } | ||
|
|
||
| // We handle the initial and refresh tokens the same way | ||
| if ($grant_type === 'refresh_token' ) { | ||
| $code = $refresh_token; | ||
| } | ||
|
|
||
| try { | ||
| $accessToken = $this->accessTokenMapper->getByCode($code); | ||
| } catch (AccessTokenNotFoundException $e) { | ||
| return new JSONResponse([ | ||
| 'error' => 'invalid_request', | ||
| ], Http::STATUS_BAD_REQUEST); | ||
| } | ||
|
|
||
| try { | ||
| $client = $this->clientMapper->getByUid($accessToken->getClientId()); | ||
| } catch (ClientNotFoundException $e) { | ||
| return new JSONResponse([ | ||
| 'error' => 'invalid_request', | ||
| ], Http::STATUS_BAD_REQUEST); | ||
| } | ||
|
|
||
| // The client id and secret must match. Else we don't provide an access token! | ||
| if ($client->getClientIdentifier() !== $client_id || $client->getSecret() !== $client_secret) { | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
|
||
| return new JSONResponse([ | ||
| 'error' => 'invalid_client', | ||
| ], Http::STATUS_BAD_REQUEST); | ||
| } | ||
|
|
||
| $decryptedToken = $this->crypto->decrypt($accessToken->getEncryptedToken(), $code); | ||
| $newCode = $this->secureRandom->generate(128); | ||
|
|
||
| // Obtain the appToken assoicated | ||
| try { | ||
| $appToken = $this->tokenProvider->getTokenById($accessToken->getTokenId()); | ||
| } catch (ExpiredTokenException $e) { | ||
| $appToken = $e->getToken(); | ||
| } catch (InvalidTokenException $e) { | ||
| //We can't do anything... | ||
| $this->accessTokenMapper->delete($accessToken); | ||
| return new JSONResponse([ | ||
| 'error' => 'invalid_request', | ||
| ], Http::STATUS_BAD_REQUEST); | ||
| } | ||
|
|
||
| // Rotate the apptoken (so the old one becomes invalid basically) | ||
| $newToken = $this->secureRandom->generate(72, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS); | ||
|
|
||
| $appToken = $this->tokenProvider->rotate( | ||
| $appToken, | ||
| $decryptedToken, | ||
| $newToken | ||
| ); | ||
|
|
||
| // Expiration is in 1 hour again | ||
| $appToken->setExpires($this->time->getTime() + 3600); | ||
| $this->tokenProvider->updateToken($appToken); | ||
|
|
||
| // Generate a new refresh token and encrypt the new apptoken in the DB | ||
| $newCode = $this->secureRandom->generate(128, ISecureRandom::CHAR_UPPER.ISecureRandom::CHAR_LOWER.ISecureRandom::CHAR_DIGITS); | ||
| $accessToken->setHashedCode(hash('sha512', $newCode)); | ||
| $accessToken->setEncryptedToken($this->crypto->encrypt($decryptedToken, $newCode)); | ||
| $accessToken->setEncryptedToken($this->crypto->encrypt($newToken, $newCode)); | ||
| $this->accessTokenMapper->update($accessToken); | ||
|
|
||
| return new JSONResponse( | ||
| [ | ||
| 'access_token' => $decryptedToken, | ||
| 'access_token' => $newToken, | ||
| 'token_type' => 'Bearer', | ||
| 'expires_in' => 3600, | ||
| 'refresh_token' => $newCode, | ||
| 'user_id' => $this->defaultTokenMapper->getTokenById($accessToken->getTokenId())->getUID(), | ||
| 'user_id' => $appToken->getUID(), | ||
| ] | ||
| ); | ||
| } | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,77 @@ | ||
| <?php | ||
| /** | ||
| * @copyright Copyright 2018, Roeland Jago Douma <roeland@famdouma.nl> | ||
| * | ||
| * @author Roeland Jago Douma <roeland@famdouma.nl> | ||
| * | ||
| * @license GNU AGPL version 3 or any later version | ||
| * | ||
| * This program is free software: you can redistribute it and/or modify | ||
| * it under the terms of the GNU Affero General Public License as | ||
| * published by the Free Software Foundation, either version 3 of the | ||
| * License, or (at your option) any later version. | ||
| * | ||
| * This program is distributed in the hope that it will be useful, | ||
| * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
| * GNU Affero General Public License for more details. | ||
| * | ||
| * You should have received a copy of the GNU Affero General Public License | ||
| * along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
| * | ||
| */ | ||
|
|
||
| namespace OCA\OAuth2\Migration; | ||
|
|
||
| use OC\Authentication\Exceptions\InvalidTokenException; | ||
| use OC\Authentication\Token\IProvider as TokenProvider; | ||
| use OCA\OAuth2\Db\AccessToken; | ||
| use OCP\AppFramework\Utility\ITimeFactory; | ||
| use OCP\IDBConnection; | ||
| use OCP\Migration\IOutput; | ||
| use OCP\Migration\IRepairStep; | ||
|
|
||
| class SetTokenExpiration implements IRepairStep { | ||
|
|
||
| /** @var IDBConnection */ | ||
| private $connection; | ||
|
|
||
| /** @var ITimeFactory */ | ||
| private $time; | ||
|
|
||
| /** @var TokenProvider */ | ||
| private $tokenProvider; | ||
|
|
||
| public function __construct(IDBConnection $connection, | ||
| ITimeFactory $timeFactory, | ||
| TokenProvider $tokenProvider) { | ||
| $this->connection = $connection; | ||
| $this->time = $timeFactory; | ||
| $this->tokenProvider = $tokenProvider; | ||
| } | ||
|
|
||
| public function getName() { | ||
| return 'Update OAuth token expiration times'; | ||
| } | ||
|
|
||
| public function run(IOutput $output) { | ||
| $qb = $this->connection->getQueryBuilder(); | ||
| $qb->select('*') | ||
| ->from('oauth2_access_tokens'); | ||
|
|
||
| $cursor = $qb->execute(); | ||
|
|
||
| while($row = $cursor->fetch()) { | ||
| $token = AccessToken::fromRow($row); | ||
| try { | ||
| $appToken = $this->tokenProvider->getTokenById($token->getTokenId()); | ||
| $appToken->setExpires($this->time->getTime() + 3600); | ||
| $this->tokenProvider->updateToken($appToken); | ||
| } catch (InvalidTokenException $e) { | ||
| //Skip this token | ||
| } | ||
| } | ||
| $cursor->closeCursor(); | ||
| } | ||
|
|
||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
camelCase?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No I can't change those as they are post variables and defined in the OAuth spec
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
okay then