mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-27 09:11:53 -05:00
250 lines
7.9 KiB
Go
Vendored
250 lines
7.9 KiB
Go
Vendored
package openid
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/url"
|
|
"strings"
|
|
)
|
|
|
|
func Verify(uri string, cache DiscoveryCache, nonceStore NonceStore) (id string, err error) {
|
|
return defaultInstance.Verify(uri, cache, nonceStore)
|
|
}
|
|
|
|
func (oid *OpenID) Verify(uri string, cache DiscoveryCache, nonceStore NonceStore) (id string, err error) {
|
|
parsedURL, err := url.Parse(uri)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
values, err := url.ParseQuery(parsedURL.RawQuery)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// 11. Verifying Assertions
|
|
// When the Relying Party receives a positive assertion, it MUST
|
|
// verify the following before accepting the assertion:
|
|
|
|
// - The value of "openid.signed" contains all the required fields.
|
|
// (Section 10.1)
|
|
if err = verifySignedFields(values); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// - The signature on the assertion is valid (Section 11.4)
|
|
if err = verifySignature(uri, values, oid.urlGetter); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// - The value of "openid.return_to" matches the URL of the current
|
|
// request (Section 11.1)
|
|
if err = verifyReturnTo(parsedURL, values); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// - Discovered information matches the information in the assertion
|
|
// (Section 11.2)
|
|
if err = oid.verifyDiscovered(parsedURL, values, cache); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// - An assertion has not yet been accepted from this OP with the
|
|
// same value for "openid.response_nonce" (Section 11.3)
|
|
if err = verifyNonce(values, nonceStore); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// If all four of these conditions are met, assertion is now
|
|
// verified. If the assertion contained a Claimed Identifier, the
|
|
// user is now authenticated with that identifier.
|
|
return values.Get("openid.claimed_id"), nil
|
|
}
|
|
|
|
// 10.1. Positive Assertions
|
|
// openid.signed - Comma-separated list of signed fields.
|
|
// This entry consists of the fields without the "openid." prefix that the signature covers.
|
|
// This list MUST contain at least "op_endpoint", "return_to" "response_nonce" and "assoc_handle",
|
|
// and if present in the response, "claimed_id" and "identity".
|
|
func verifySignedFields(vals url.Values) error {
|
|
ok := map[string]bool{
|
|
"op_endpoint": false,
|
|
"return_to": false,
|
|
"response_nonce": false,
|
|
"assoc_handle": false,
|
|
"claimed_id": vals.Get("openid.claimed_id") == "",
|
|
"identity": vals.Get("openid.identity") == "",
|
|
}
|
|
signed := strings.Split(vals.Get("openid.signed"), ",")
|
|
for _, sf := range signed {
|
|
ok[sf] = true
|
|
}
|
|
for k, v := range ok {
|
|
if !v {
|
|
return fmt.Errorf("%v must be signed but isn't", k)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// 11.1. Verifying the Return URL
|
|
// To verify that the "openid.return_to" URL matches the URL that is processing this assertion:
|
|
// - The URL scheme, authority, and path MUST be the same between the two
|
|
// URLs.
|
|
// - Any query parameters that are present in the "openid.return_to" URL
|
|
// MUST also be present with the same values in the URL of the HTTP
|
|
// request the RP received.
|
|
func verifyReturnTo(uri *url.URL, vals url.Values) error {
|
|
returnTo := vals.Get("openid.return_to")
|
|
rp, err := url.Parse(returnTo)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if uri.Scheme != rp.Scheme ||
|
|
uri.Host != rp.Host ||
|
|
uri.Path != rp.Path {
|
|
return errors.New(
|
|
"Scheme, host or path don't match in return_to URL")
|
|
}
|
|
qp, err := url.ParseQuery(rp.RawQuery)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return compareQueryParams(qp, vals)
|
|
}
|
|
|
|
// Any parameter in q1 must also be present in q2, and values must match.
|
|
func compareQueryParams(q1, q2 url.Values) error {
|
|
for k := range q1 {
|
|
v1 := q1.Get(k)
|
|
v2 := q2.Get(k)
|
|
if v1 != v2 {
|
|
return fmt.Errorf(
|
|
"URLs query params don't match: Param %s different: %s vs %s",
|
|
k, v1, v2)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (oid *OpenID) verifyDiscovered(uri *url.URL, vals url.Values, cache DiscoveryCache) error {
|
|
version := vals.Get("openid.ns")
|
|
if version != "http://specs.openid.net/auth/2.0" {
|
|
return errors.New("Bad protocol version")
|
|
}
|
|
|
|
endpoint := vals.Get("openid.op_endpoint")
|
|
if len(endpoint) == 0 {
|
|
return errors.New("missing openid.op_endpoint url param")
|
|
}
|
|
localID := vals.Get("openid.identity")
|
|
if len(localID) == 0 {
|
|
return errors.New("no localId to verify")
|
|
}
|
|
claimedID := vals.Get("openid.claimed_id")
|
|
if len(claimedID) == 0 {
|
|
// If no Claimed Identifier is present in the response, the
|
|
// assertion is not about an identifier and the RP MUST NOT use the
|
|
// User-supplied Identifier associated with the current OpenID
|
|
// authentication transaction to identify the user. Extension
|
|
// information in the assertion MAY still be used.
|
|
// --- This library does not support this case. So claimed
|
|
// identifier must be present.
|
|
return errors.New("no claimed_id to verify")
|
|
}
|
|
|
|
// 11.2. Verifying Discovered Information
|
|
|
|
// If the Claimed Identifier in the assertion is a URL and contains a
|
|
// fragment, the fragment part and the fragment delimiter character "#"
|
|
// MUST NOT be used for the purposes of verifying the discovered
|
|
// information.
|
|
claimedIDVerify := claimedID
|
|
if fragmentIndex := strings.Index(claimedID, "#"); fragmentIndex != -1 {
|
|
claimedIDVerify = claimedID[0:fragmentIndex]
|
|
}
|
|
|
|
// If the Claimed Identifier is included in the assertion, it
|
|
// MUST have been discovered by the Relying Party and the
|
|
// information in the assertion MUST be present in the
|
|
// discovered information. The Claimed Identifier MUST NOT be an
|
|
// OP Identifier.
|
|
if discovered := cache.Get(claimedIDVerify); discovered != nil &&
|
|
discovered.OpEndpoint() == endpoint &&
|
|
discovered.OpLocalID() == localID &&
|
|
discovered.ClaimedID() == claimedIDVerify {
|
|
return nil
|
|
}
|
|
|
|
// If the Claimed Identifier was not previously discovered by the
|
|
// Relying Party (the "openid.identity" in the request was
|
|
// "http://specs.openid.net/auth/2.0/identifier_select" or a different
|
|
// Identifier, or if the OP is sending an unsolicited positive
|
|
// assertion), the Relying Party MUST perform discovery on the Claimed
|
|
// Identifier in the response to make sure that the OP is authorized to
|
|
// make assertions about the Claimed Identifier.
|
|
if ep, _, _, err := oid.Discover(claimedID); err == nil {
|
|
if ep == endpoint {
|
|
// This claimed ID points to the same endpoint, therefore this
|
|
// endpoint is authorized to make assertions about that claimed ID.
|
|
// TODO: There may be multiple endpoints found during discovery.
|
|
// They should all be checked.
|
|
cache.Put(claimedIDVerify, &SimpleDiscoveredInfo{opEndpoint: endpoint, opLocalID: localID, claimedID: claimedIDVerify})
|
|
return nil
|
|
}
|
|
}
|
|
|
|
return errors.New("Could not verify the claimed ID")
|
|
}
|
|
|
|
func verifyNonce(vals url.Values, store NonceStore) error {
|
|
nonce := vals.Get("openid.response_nonce")
|
|
endpoint := vals.Get("openid.op_endpoint")
|
|
return store.Accept(endpoint, nonce)
|
|
}
|
|
|
|
func verifySignature(uri string, vals url.Values, getter httpGetter) error {
|
|
// To have the signature verification performed by the OP, the
|
|
// Relying Party sends a direct request to the OP. To verify the
|
|
// signature, the OP uses a private association that was generated
|
|
// when it issued the positive assertion.
|
|
|
|
// 11.4.2.1. Request Parameters
|
|
params := make(url.Values)
|
|
// openid.mode: Value: "check_authentication"
|
|
params.Add("openid.mode", "check_authentication")
|
|
// Exact copies of all fields from the authentication response,
|
|
// except for "openid.mode".
|
|
for k, vs := range vals {
|
|
if k == "openid.mode" {
|
|
continue
|
|
}
|
|
for _, v := range vs {
|
|
params.Add(k, v)
|
|
}
|
|
}
|
|
resp, err := getter.Post(vals.Get("openid.op_endpoint"), params)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
content, err := ioutil.ReadAll(resp.Body)
|
|
response := string(content)
|
|
lines := strings.Split(response, "\n")
|
|
|
|
isValid := false
|
|
nsValid := false
|
|
for _, l := range lines {
|
|
if l == "is_valid:true" {
|
|
isValid = true
|
|
} else if l == "ns:http://specs.openid.net/auth/2.0" {
|
|
nsValid = true
|
|
}
|
|
}
|
|
if isValid && nsValid {
|
|
// Yay !
|
|
return nil
|
|
}
|
|
|
|
return errors.New("Could not verify assertion with provider")
|
|
}
|