himari 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.rspec +3 -0
- data/Gemfile +11 -0
- data/Gemfile.lock +152 -0
- data/LICENSE.txt +21 -0
- data/Rakefile +8 -0
- data/himari.gemspec +44 -0
- data/lib/himari/access_token.rb +119 -0
- data/lib/himari/app.rb +193 -0
- data/lib/himari/authorization_code.rb +83 -0
- data/lib/himari/client_registration.rb +47 -0
- data/lib/himari/config.rb +39 -0
- data/lib/himari/decisions/authentication.rb +16 -0
- data/lib/himari/decisions/authorization.rb +48 -0
- data/lib/himari/decisions/base.rb +63 -0
- data/lib/himari/decisions/claims.rb +58 -0
- data/lib/himari/id_token.rb +57 -0
- data/lib/himari/item_provider.rb +11 -0
- data/lib/himari/item_providers/static.rb +20 -0
- data/lib/himari/log_line.rb +9 -0
- data/lib/himari/middlewares/authentication_rule.rb +24 -0
- data/lib/himari/middlewares/authorization_rule.rb +24 -0
- data/lib/himari/middlewares/claims_rule.rb +24 -0
- data/lib/himari/middlewares/client.rb +24 -0
- data/lib/himari/middlewares/config.rb +24 -0
- data/lib/himari/middlewares/signing_key.rb +24 -0
- data/lib/himari/provider_chain.rb +26 -0
- data/lib/himari/rule.rb +7 -0
- data/lib/himari/rule_processor.rb +81 -0
- data/lib/himari/services/downstream_authorization.rb +73 -0
- data/lib/himari/services/jwks_endpoint.rb +40 -0
- data/lib/himari/services/oidc_authorization_endpoint.rb +82 -0
- data/lib/himari/services/oidc_provider_metadata_endpoint.rb +56 -0
- data/lib/himari/services/oidc_token_endpoint.rb +86 -0
- data/lib/himari/services/oidc_userinfo_endpoint.rb +73 -0
- data/lib/himari/services/upstream_authentication.rb +106 -0
- data/lib/himari/session_data.rb +7 -0
- data/lib/himari/signing_key.rb +128 -0
- data/lib/himari/storages/base.rb +57 -0
- data/lib/himari/storages/filesystem.rb +36 -0
- data/lib/himari/storages/memory.rb +31 -0
- data/lib/himari/version.rb +5 -0
- data/lib/himari.rb +4 -0
- data/public/public/index.css +74 -0
- data/sig/himari.rbs +4 -0
- data/views/login.erb +37 -0
- metadata +174 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 9534716186569cef82a629dd4c15fdcc2f30b6b79712445ef67156b33c99a299
|
4
|
+
data.tar.gz: 8243f15a8bdf914c8b73447aab430a243b0dffea2ea2b84af032d92de3fcdc49
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 30386ab57b39997a8634f63a99466f7efad64d0596767c8ad5f2123e877a1cd3b85f97f5ab29eb6a40d534a223582f56294220c5b3b9b5a873a5a61e928885d5
|
7
|
+
data.tar.gz: 207828253833d92b746ed271a8118e3389b9bbc51302ad57cf99bfb7dd339e337b27a770d6c63ebaa02e31c21264ca0b923fdee9ac3d28e5b55280cfd033aadf
|
data/.rspec
ADDED
data/Gemfile
ADDED
data/Gemfile.lock
ADDED
@@ -0,0 +1,152 @@
|
|
1
|
+
PATH
|
2
|
+
remote: .
|
3
|
+
specs:
|
4
|
+
himari (0.1.0)
|
5
|
+
addressable
|
6
|
+
omniauth (>= 2.0)
|
7
|
+
openid_connect
|
8
|
+
rack-oauth2
|
9
|
+
rack-protection
|
10
|
+
sinatra (>= 3.0)
|
11
|
+
|
12
|
+
GEM
|
13
|
+
remote: https://rubygems.org/
|
14
|
+
specs:
|
15
|
+
activemodel (7.0.4.3)
|
16
|
+
activesupport (= 7.0.4.3)
|
17
|
+
activesupport (7.0.4.3)
|
18
|
+
concurrent-ruby (~> 1.0, >= 1.0.2)
|
19
|
+
i18n (>= 1.6, < 2)
|
20
|
+
minitest (>= 5.1)
|
21
|
+
tzinfo (~> 2.0)
|
22
|
+
addressable (2.8.1)
|
23
|
+
public_suffix (>= 2.0.2, < 6.0)
|
24
|
+
aes_key_wrap (1.1.0)
|
25
|
+
attr_required (1.0.1)
|
26
|
+
bindata (2.4.15)
|
27
|
+
concurrent-ruby (1.2.2)
|
28
|
+
date (3.3.3)
|
29
|
+
diff-lcs (1.5.0)
|
30
|
+
docile (1.4.0)
|
31
|
+
faraday (2.7.4)
|
32
|
+
faraday-net_http (>= 2.0, < 3.1)
|
33
|
+
ruby2_keywords (>= 0.0.4)
|
34
|
+
faraday-follow_redirects (0.3.0)
|
35
|
+
faraday (>= 1, < 3)
|
36
|
+
faraday-net_http (3.0.2)
|
37
|
+
hashie (5.0.0)
|
38
|
+
i18n (1.12.0)
|
39
|
+
concurrent-ruby (~> 1.0)
|
40
|
+
json-jwt (1.16.3)
|
41
|
+
activesupport (>= 4.2)
|
42
|
+
aes_key_wrap
|
43
|
+
bindata
|
44
|
+
faraday (~> 2.0)
|
45
|
+
faraday-follow_redirects
|
46
|
+
mail (2.8.1)
|
47
|
+
mini_mime (>= 0.1.1)
|
48
|
+
net-imap
|
49
|
+
net-pop
|
50
|
+
net-smtp
|
51
|
+
mini_mime (1.1.2)
|
52
|
+
minitest (5.18.0)
|
53
|
+
mustermann (3.0.0)
|
54
|
+
ruby2_keywords (~> 0.0.1)
|
55
|
+
net-imap (0.3.4)
|
56
|
+
date
|
57
|
+
net-protocol
|
58
|
+
net-pop (0.1.2)
|
59
|
+
net-protocol
|
60
|
+
net-protocol (0.2.1)
|
61
|
+
timeout
|
62
|
+
net-smtp (0.3.3)
|
63
|
+
net-protocol
|
64
|
+
omniauth (2.1.1)
|
65
|
+
hashie (>= 3.4.6)
|
66
|
+
rack (>= 2.2.3)
|
67
|
+
rack-protection
|
68
|
+
openid_connect (2.2.0)
|
69
|
+
activemodel
|
70
|
+
attr_required (>= 1.0.0)
|
71
|
+
faraday (~> 2.0)
|
72
|
+
faraday-follow_redirects
|
73
|
+
json-jwt (>= 1.16)
|
74
|
+
net-smtp
|
75
|
+
rack-oauth2 (~> 2.2)
|
76
|
+
swd (~> 2.0)
|
77
|
+
tzinfo
|
78
|
+
validate_email
|
79
|
+
validate_url
|
80
|
+
webfinger (~> 2.0)
|
81
|
+
public_suffix (5.0.1)
|
82
|
+
rack (2.2.6.4)
|
83
|
+
rack-oauth2 (2.2.0)
|
84
|
+
activesupport
|
85
|
+
attr_required
|
86
|
+
faraday (~> 2.0)
|
87
|
+
faraday-follow_redirects
|
88
|
+
json-jwt (>= 1.11.0)
|
89
|
+
rack (>= 2.1.0)
|
90
|
+
rack-protection (3.0.5)
|
91
|
+
rack
|
92
|
+
rack-test (2.1.0)
|
93
|
+
rack (>= 1.3)
|
94
|
+
rake (13.0.6)
|
95
|
+
rspec (3.12.0)
|
96
|
+
rspec-core (~> 3.12.0)
|
97
|
+
rspec-expectations (~> 3.12.0)
|
98
|
+
rspec-mocks (~> 3.12.0)
|
99
|
+
rspec-core (3.12.1)
|
100
|
+
rspec-support (~> 3.12.0)
|
101
|
+
rspec-expectations (3.12.2)
|
102
|
+
diff-lcs (>= 1.2.0, < 2.0)
|
103
|
+
rspec-support (~> 3.12.0)
|
104
|
+
rspec-mocks (3.12.4)
|
105
|
+
diff-lcs (>= 1.2.0, < 2.0)
|
106
|
+
rspec-support (~> 3.12.0)
|
107
|
+
rspec-support (3.12.0)
|
108
|
+
ruby2_keywords (0.0.5)
|
109
|
+
simplecov (0.22.0)
|
110
|
+
docile (~> 1.1)
|
111
|
+
simplecov-html (~> 0.11)
|
112
|
+
simplecov_json_formatter (~> 0.1)
|
113
|
+
simplecov-html (0.12.3)
|
114
|
+
simplecov_json_formatter (0.1.4)
|
115
|
+
sinatra (3.0.5)
|
116
|
+
mustermann (~> 3.0)
|
117
|
+
rack (~> 2.2, >= 2.2.4)
|
118
|
+
rack-protection (= 3.0.5)
|
119
|
+
tilt (~> 2.0)
|
120
|
+
swd (2.0.2)
|
121
|
+
activesupport (>= 3)
|
122
|
+
attr_required (>= 0.0.5)
|
123
|
+
faraday (~> 2.0)
|
124
|
+
faraday-follow_redirects
|
125
|
+
tilt (2.1.0)
|
126
|
+
timeout (0.3.2)
|
127
|
+
tzinfo (2.0.6)
|
128
|
+
concurrent-ruby (~> 1.0)
|
129
|
+
validate_email (0.1.6)
|
130
|
+
activemodel (>= 3.0)
|
131
|
+
mail (>= 2.2.5)
|
132
|
+
validate_url (1.0.15)
|
133
|
+
activemodel (>= 3.0.0)
|
134
|
+
public_suffix
|
135
|
+
webfinger (2.1.2)
|
136
|
+
activesupport
|
137
|
+
faraday (~> 2.0)
|
138
|
+
faraday-follow_redirects
|
139
|
+
|
140
|
+
PLATFORMS
|
141
|
+
ruby
|
142
|
+
|
143
|
+
DEPENDENCIES
|
144
|
+
himari!
|
145
|
+
rack-test
|
146
|
+
rake
|
147
|
+
rspec
|
148
|
+
simplecov
|
149
|
+
simplecov-html
|
150
|
+
|
151
|
+
BUNDLED WITH
|
152
|
+
2.4.8
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
The MIT License (MIT)
|
2
|
+
|
3
|
+
Copyright (c) 2023 Sorah Fukumori
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
7
|
+
in the Software without restriction, including without limitation the rights
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
10
|
+
furnished to do so, subject to the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be included in
|
13
|
+
all copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
21
|
+
THE SOFTWARE.
|
data/Rakefile
ADDED
data/himari.gemspec
ADDED
@@ -0,0 +1,44 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require_relative "lib/himari/version"
|
4
|
+
|
5
|
+
Gem::Specification.new do |spec|
|
6
|
+
spec.name = "himari"
|
7
|
+
spec.version = Himari::VERSION
|
8
|
+
spec.authors = ["Sorah Fukumori"]
|
9
|
+
spec.email = ["her@sorah.jp"]
|
10
|
+
|
11
|
+
spec.summary = "Small OIDC IdP for small teams - Omniauth to OIDC"
|
12
|
+
spec.homepage = "https://github.com/sorah/himari"
|
13
|
+
spec.license = "MIT"
|
14
|
+
spec.required_ruby_version = ">= 2.7.0"
|
15
|
+
|
16
|
+
spec.metadata["homepage_uri"] = spec.homepage
|
17
|
+
spec.metadata["source_code_uri"] = "https://github.com/sorah/himari"
|
18
|
+
|
19
|
+
# Specify which files should be added to the gem when it is released.
|
20
|
+
# The `git ls-files -z` loads the files in the RubyGem that have been added into git.
|
21
|
+
spec.files = Dir.chdir(__dir__) do
|
22
|
+
`git ls-files -z`.split("\x0").reject do |f|
|
23
|
+
(f == __FILE__) || f.match(%r{\A(?:(?:bin|test|spec|features)/|\.(?:git|travis|circleci)|appveyor)})
|
24
|
+
end
|
25
|
+
end
|
26
|
+
spec.bindir = "exe"
|
27
|
+
spec.executables = spec.files.grep(%r{\Aexe/}) { |f| File.basename(f) }
|
28
|
+
spec.require_paths = ["lib"]
|
29
|
+
|
30
|
+
spec.add_dependency "sinatra", '>= 3.0'
|
31
|
+
spec.add_dependency 'rack-protection'
|
32
|
+
spec.add_dependency "omniauth", ">= 2.0"
|
33
|
+
|
34
|
+
spec.add_dependency 'addressable'
|
35
|
+
|
36
|
+
spec.add_dependency "rack-oauth2"
|
37
|
+
spec.add_dependency "openid_connect"
|
38
|
+
|
39
|
+
# Uncomment to register a new dependency of your gem
|
40
|
+
# spec.add_dependency "example-gem", "~> 1.0"
|
41
|
+
|
42
|
+
# For more information and examples about making a new gem, check out our
|
43
|
+
# guide at: https://bundler.io/guides/creating_gem.html
|
44
|
+
end
|
@@ -0,0 +1,119 @@
|
|
1
|
+
require 'securerandom'
|
2
|
+
require 'base64'
|
3
|
+
require 'digest/sha2'
|
4
|
+
require 'rack/utils'
|
5
|
+
|
6
|
+
require 'rack/oauth2'
|
7
|
+
require 'openid_connect'
|
8
|
+
|
9
|
+
module Himari
|
10
|
+
class AccessToken
|
11
|
+
class SecretMissing < StandardError; end
|
12
|
+
class SecretIncorrect < StandardError; end
|
13
|
+
class TokenExpired < StandardError; end
|
14
|
+
class InvalidFormat < StandardError; end
|
15
|
+
|
16
|
+
Format = Struct.new(:handler, :secret, keyword_init: true) do
|
17
|
+
HEADER = 'hmat'
|
18
|
+
|
19
|
+
def self.parse(str)
|
20
|
+
parts = str.split('.')
|
21
|
+
raise InvalidFormat unless parts.size == 3
|
22
|
+
raise InvalidFormat unless parts[0] == HEADER
|
23
|
+
new(handler: parts[1], secret: parts[2])
|
24
|
+
end
|
25
|
+
|
26
|
+
def to_s
|
27
|
+
"#{HEADER}.#{handler}.#{secret}"
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
class Bearer < Rack::OAuth2::AccessToken::Bearer
|
32
|
+
def token_response(options = {})
|
33
|
+
super.tap do |r|
|
34
|
+
r[:token_type] = 'Bearer' # https://github.com/nov/openid_connect_sample/blob/a5b7ee5b63508d99a3a36b4537809dfa64ba3b1f/lib/token_endpoint.rb#L37
|
35
|
+
end
|
36
|
+
end
|
37
|
+
end
|
38
|
+
|
39
|
+
def self.make(**kwargs)
|
40
|
+
new(
|
41
|
+
handler: SecureRandom.urlsafe_base64(32),
|
42
|
+
secret: SecureRandom.urlsafe_base64(32),
|
43
|
+
expiry: Time.now.to_i + 3600,
|
44
|
+
**kwargs
|
45
|
+
)
|
46
|
+
end
|
47
|
+
|
48
|
+
# @param authz [Himari::AuthorizationCode]
|
49
|
+
def self.from_authz(authz)
|
50
|
+
make(
|
51
|
+
client_id: authz.client_id,
|
52
|
+
claims: authz.claims,
|
53
|
+
)
|
54
|
+
end
|
55
|
+
|
56
|
+
def initialize(handler:, client_id:, claims:, expiry:, secret: nil, secret_hash: nil)
|
57
|
+
@handler = handler
|
58
|
+
@client_id = client_id
|
59
|
+
@claims = claims
|
60
|
+
@expiry = expiry
|
61
|
+
|
62
|
+
@secret = secret
|
63
|
+
@secret_hash = secret_hash
|
64
|
+
end
|
65
|
+
|
66
|
+
attr_reader :handler, :client_id, :claims, :expiry
|
67
|
+
|
68
|
+
def secret
|
69
|
+
raise SecretMissing unless @secret
|
70
|
+
@secret
|
71
|
+
end
|
72
|
+
|
73
|
+
def secret_hash
|
74
|
+
@secret_hash ||= Base64.urlsafe_encode64(Digest::SHA384.digest(secret), padding: false)
|
75
|
+
end
|
76
|
+
|
77
|
+
def verify_secret!(given_secret)
|
78
|
+
dgst = Base64.urlsafe_decode64(secret_hash)
|
79
|
+
given_dgst = Digest::SHA384.digest(given_secret)
|
80
|
+
raise SecretIncorrect unless Rack::Utils.secure_compare(dgst, given_dgst)
|
81
|
+
@secret = given_secret
|
82
|
+
true
|
83
|
+
end
|
84
|
+
|
85
|
+
def verify_expiry!(now = Time.now)
|
86
|
+
raise TokenExpired if @expiry <= now.to_i
|
87
|
+
end
|
88
|
+
|
89
|
+
def format
|
90
|
+
Format.new(handler: handler, secret: secret)
|
91
|
+
end
|
92
|
+
|
93
|
+
def to_bearer
|
94
|
+
Bearer.new(
|
95
|
+
access_token: format.to_s,
|
96
|
+
expires_in: (expiry - Time.now.to_i).to_i,
|
97
|
+
)
|
98
|
+
end
|
99
|
+
|
100
|
+
def as_log
|
101
|
+
{
|
102
|
+
handler_dgst: Digest::SHA256.hexdigest(handler),
|
103
|
+
client_id: client_id,
|
104
|
+
claims: claims,
|
105
|
+
expiry: expiry,
|
106
|
+
}
|
107
|
+
end
|
108
|
+
|
109
|
+
def as_json
|
110
|
+
{
|
111
|
+
handler: handler,
|
112
|
+
secret_hash: secret_hash,
|
113
|
+
client_id: client_id,
|
114
|
+
claims: claims,
|
115
|
+
expiry: expiry.to_i,
|
116
|
+
}
|
117
|
+
end
|
118
|
+
end
|
119
|
+
end
|
data/lib/himari/app.rb
ADDED
@@ -0,0 +1,193 @@
|
|
1
|
+
require 'sinatra/base'
|
2
|
+
require 'addressable'
|
3
|
+
|
4
|
+
require 'himari/log_line'
|
5
|
+
|
6
|
+
require 'himari/provider_chain'
|
7
|
+
require 'himari/authorization_code'
|
8
|
+
|
9
|
+
require 'himari/middlewares/client'
|
10
|
+
require 'himari/middlewares/config'
|
11
|
+
require 'himari/middlewares/signing_key'
|
12
|
+
|
13
|
+
require 'himari/services/downstream_authorization'
|
14
|
+
require 'himari/services/upstream_authentication'
|
15
|
+
|
16
|
+
require 'himari/services/jwks_endpoint'
|
17
|
+
require 'himari/services/oidc_authorization_endpoint'
|
18
|
+
require 'himari/services/oidc_provider_metadata_endpoint'
|
19
|
+
require 'himari/services/oidc_token_endpoint'
|
20
|
+
require 'himari/services/oidc_userinfo_endpoint'
|
21
|
+
|
22
|
+
module Himari
|
23
|
+
class App < Sinatra::Base
|
24
|
+
set :root, File.expand_path(File.join(__dir__, '..', '..'))
|
25
|
+
|
26
|
+
set :protection, use: %i(authenticity_token), except: %i(remote_token)
|
27
|
+
set :logging, nil
|
28
|
+
|
29
|
+
ProviderCandidate = Struct.new(:name, :button, :action, keyword_init: true)
|
30
|
+
|
31
|
+
helpers do
|
32
|
+
def current_user
|
33
|
+
session[:session_data]
|
34
|
+
end
|
35
|
+
|
36
|
+
def config
|
37
|
+
env[Himari::Middlewares::Config::RACK_KEY]
|
38
|
+
end
|
39
|
+
|
40
|
+
def signing_key_provider
|
41
|
+
Himari::ProviderChain.new(request.env[Himari::Middlewares::SigningKey::RACK_KEY] || [])
|
42
|
+
end
|
43
|
+
|
44
|
+
def client_provider
|
45
|
+
Himari::ProviderChain.new(request.env[Himari::Middlewares::Client::RACK_KEY] || [])
|
46
|
+
end
|
47
|
+
|
48
|
+
def known_providers
|
49
|
+
query = Addressable::URI.form_encode(back_to: request.fullpath)
|
50
|
+
config.providers.map do |pr|
|
51
|
+
name = pr.fetch(:name)
|
52
|
+
ProviderCandidate.new(
|
53
|
+
name: name,
|
54
|
+
button: pr[:button] || "Log in with #{name}",
|
55
|
+
action: "/auth/#{name}?#{query}",
|
56
|
+
)
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
def csrf_token_value
|
61
|
+
Rack::Protection::AuthenticityToken.token(session)
|
62
|
+
end
|
63
|
+
|
64
|
+
def csrf_token_name
|
65
|
+
'authenticity_token'
|
66
|
+
end
|
67
|
+
|
68
|
+
def cachebuster
|
69
|
+
env['himari.cachebuster'] || "#{Process.pid}"
|
70
|
+
end
|
71
|
+
|
72
|
+
def request_id
|
73
|
+
env['HTTP_X_REQUEST_ID'] ||= SecureRandom.uuid
|
74
|
+
end
|
75
|
+
|
76
|
+
def request_as_log
|
77
|
+
env['himari.request_as_log'] ||= {
|
78
|
+
id: request_id,
|
79
|
+
method: request.request_method,
|
80
|
+
path: request.path,
|
81
|
+
ip: request.ip,
|
82
|
+
cip: env['REMOTE_ADDR'],
|
83
|
+
xff: env['HTTP_X_FORWARDED_FOR'],
|
84
|
+
}
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
before do
|
89
|
+
request_as_log()
|
90
|
+
end
|
91
|
+
|
92
|
+
get '/' do
|
93
|
+
content_type :text
|
94
|
+
"Himari\n"
|
95
|
+
end
|
96
|
+
|
97
|
+
get '/oidc/authorize' do
|
98
|
+
client = client_provider.find(id: params[:client_id])
|
99
|
+
unless client
|
100
|
+
logger&.warn(Himari::LogLine.new('authorize: no client registration found', req: request_as_log, client_id: params[:client_id]))
|
101
|
+
next halt 401, 'unknown client'
|
102
|
+
end
|
103
|
+
if current_user
|
104
|
+
# do downstream authz and process oidc request
|
105
|
+
decision = Himari::Services::DownstreamAuthorization.from_request(session: current_user, client: client, request: request).perform
|
106
|
+
logger&.info(Himari::LogLine.new('authorize: downstream authorized', req: request_as_log, allowed: decision.authz_result.allowed, result: decision.as_log))
|
107
|
+
raise unless decision.authz_result.allowed # sanity check
|
108
|
+
|
109
|
+
authz = AuthorizationCode.make(
|
110
|
+
client_id: decision.client.id,
|
111
|
+
claims: decision.claims,
|
112
|
+
)
|
113
|
+
|
114
|
+
Himari::Services::OidcAuthorizationEndpoint.new(
|
115
|
+
authz: authz,
|
116
|
+
client: client,
|
117
|
+
storage: config.storage,
|
118
|
+
logger: logger,
|
119
|
+
).call(env)
|
120
|
+
else
|
121
|
+
logger&.info(Himari::LogLine.new('authorize: prompt login', req: request_as_log, client_id: params[:client_id]))
|
122
|
+
erb :login
|
123
|
+
end
|
124
|
+
rescue Himari::Services::DownstreamAuthorization::ForbiddenError => e
|
125
|
+
logger&.warn(Himari::LogLine.new('authorize: downstream forbidden', req: request_as_log, allowed: e.result.authz_result.allowed, err: e.class.inspect, result: e.as_log))
|
126
|
+
halt 403, "Forbidden"
|
127
|
+
end
|
128
|
+
|
129
|
+
token_ep = proc do
|
130
|
+
Himari::Services::OidcTokenEndpoint.new(
|
131
|
+
client_provider: client_provider,
|
132
|
+
signing_key_provider: signing_key_provider,
|
133
|
+
storage: config.storage,
|
134
|
+
issuer: config.issuer,
|
135
|
+
logger: logger,
|
136
|
+
).call(env)
|
137
|
+
end
|
138
|
+
post '/oidc/token', &token_ep
|
139
|
+
post '/public/oidc/token', &token_ep
|
140
|
+
|
141
|
+
userinfo_ep = proc do
|
142
|
+
Himari::Services::OidcUserinfoEndpoint.new(
|
143
|
+
storage: config.storage,
|
144
|
+
logger: logger,
|
145
|
+
).call(env)
|
146
|
+
end
|
147
|
+
get '/oidc/userinfo', &userinfo_ep
|
148
|
+
get '/public/oidc/userinfo', &userinfo_ep
|
149
|
+
|
150
|
+
|
151
|
+
jwks_ep = proc do
|
152
|
+
Himari::Services::JwksEndpoint.new(
|
153
|
+
signing_key_provider: signing_key_provider,
|
154
|
+
).call(env)
|
155
|
+
end
|
156
|
+
get '/jwks', &jwks_ep
|
157
|
+
get '/public/jwks', &jwks_ep
|
158
|
+
|
159
|
+
get '/.well-known/openid-configuration' do
|
160
|
+
Himari::Services::OidcProviderMetadataEndpoint.new(
|
161
|
+
signing_key_provider: signing_key_provider,
|
162
|
+
issuer: config.issuer,
|
163
|
+
).call(env)
|
164
|
+
end
|
165
|
+
|
166
|
+
omniauth_callback = proc do
|
167
|
+
# do upstream auth
|
168
|
+
authn = Himari::Services::UpstreamAuthentication.from_request(request).perform
|
169
|
+
logger&.info(Himari::LogLine.new('authentication allowed', req: request_as_log, allowed: authn.authn_result.allowed, uid: request.env.fetch('omniauth.auth')[:uid], provider: request.env.fetch('omniauth.auth')[:provider], result: authn.as_log))
|
170
|
+
raise unless authn.authn_result.allowed # sanity check
|
171
|
+
|
172
|
+
given_back_to = request.env['omniauth.params']&.fetch('back_to', nil)
|
173
|
+
back_to = if given_back_to
|
174
|
+
uri = Addressable::URI.parse(given_back_to)
|
175
|
+
if uri && uri.host.nil? && uri.scheme.nil? && uri.path.start_with?('/')
|
176
|
+
given_back_to
|
177
|
+
else
|
178
|
+
logger&.warn(Himari::LogLine.new('invalid back_to', req: request_as_log, given_back_to: given_back_to))
|
179
|
+
nil
|
180
|
+
end
|
181
|
+
end || '/'
|
182
|
+
|
183
|
+
session.destroy
|
184
|
+
session[:session_data] = authn.session_data
|
185
|
+
redirect back_to
|
186
|
+
rescue Himari::Services::UpstreamAuthentication::UnauthorizedError => e
|
187
|
+
logger&.warn(Himari::LogLine.new('authentication denied', req: request_as_log, err: e.class.inspect, allowed: e.result.authn_result.allowed, uid: request.env.fetch('omniauth.auth')[:uid], provider: request.env.fetch('omniauth.auth')[:provider], result: e.as_log))
|
188
|
+
halt(401, 'Unauthorized')
|
189
|
+
end
|
190
|
+
get '/auth/:provider/callback', &omniauth_callback
|
191
|
+
post '/auth/:provider/callback', &omniauth_callback
|
192
|
+
end
|
193
|
+
end
|
@@ -0,0 +1,83 @@
|
|
1
|
+
require 'digest/sha2'
|
2
|
+
|
3
|
+
module Himari
|
4
|
+
authz_attrs = %i(
|
5
|
+
code
|
6
|
+
client_id
|
7
|
+
claims
|
8
|
+
openid
|
9
|
+
redirect_uri
|
10
|
+
nonce
|
11
|
+
code_challenge
|
12
|
+
code_challenge_method
|
13
|
+
expiry
|
14
|
+
)
|
15
|
+
AuthorizationCode = Struct.new(*authz_attrs, keyword_init: true) do
|
16
|
+
def self.make(**kwargs)
|
17
|
+
new(
|
18
|
+
code: SecureRandom.urlsafe_base64(32),
|
19
|
+
expiry: Time.now.to_i + 900,
|
20
|
+
**kwargs,
|
21
|
+
)
|
22
|
+
end
|
23
|
+
|
24
|
+
def valid_redirect_uri?(given_uri)
|
25
|
+
redirect_uri == given_uri
|
26
|
+
end
|
27
|
+
|
28
|
+
def pkce?
|
29
|
+
!!(code_challenge && code_challenge_method)
|
30
|
+
end
|
31
|
+
|
32
|
+
def pkce_known_method?
|
33
|
+
# https://datatracker.ietf.org/doc/html/rfc7636#section-4.2
|
34
|
+
%w(S256 plain).include?(code_challenge_method.to_s)
|
35
|
+
end
|
36
|
+
|
37
|
+
def pkce_valid_challenge?
|
38
|
+
# https://datatracker.ietf.org/doc/html/rfc7636#section-4.1
|
39
|
+
case code_challenge_method.to_s
|
40
|
+
when 'plain'
|
41
|
+
(43..128).cover?(code_challenge.size)
|
42
|
+
when 'S256'
|
43
|
+
(43..45).cover?(code_challenge.size)
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
def pkce_valid_request?
|
48
|
+
pkce? && pkce_known_method? && pkce_valid_challenge?
|
49
|
+
end
|
50
|
+
|
51
|
+
def code_dgst_for_log
|
52
|
+
@code_dgst_for_log ||= code ? Digest::SHA256.hexdigest(code) : nil
|
53
|
+
end
|
54
|
+
|
55
|
+
def as_log
|
56
|
+
{
|
57
|
+
code_dgst: code_dgst_for_log,
|
58
|
+
client_id: client_id,
|
59
|
+
claims: claims,
|
60
|
+
nonce: nonce,
|
61
|
+
openid: openid,
|
62
|
+
expiry: expiry.to_i,
|
63
|
+
pkce: pkce?,
|
64
|
+
pkce_method: code_challenge_method,
|
65
|
+
pkce_valid_chal: pkce_valid_challenge?,
|
66
|
+
}
|
67
|
+
end
|
68
|
+
|
69
|
+
def as_json
|
70
|
+
{
|
71
|
+
code: code,
|
72
|
+
client_id: client_id,
|
73
|
+
claims: claims,
|
74
|
+
openid: openid,
|
75
|
+
redirect_uri: redirect_uri,
|
76
|
+
nonce: nonce,
|
77
|
+
code_challenge: code_challenge,
|
78
|
+
code_challenge_method: code_challenge_method,
|
79
|
+
expiry: expiry.to_i,
|
80
|
+
}
|
81
|
+
end
|
82
|
+
end
|
83
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
require 'digest/sha2'
|
2
|
+
|
3
|
+
module Himari
|
4
|
+
class ClientRegistration
|
5
|
+
def initialize(name:, id:, secret: nil, secret_hash: nil, redirect_uris:, preferred_key_group: nil)
|
6
|
+
@name = name
|
7
|
+
@id = id
|
8
|
+
@secret = secret
|
9
|
+
@secret_hash = secret_hash
|
10
|
+
@redirect_uris = redirect_uris
|
11
|
+
@preferred_key_group = preferred_key_group
|
12
|
+
|
13
|
+
raise ArgumentError, "either secret or secret_hash must be present" if !@secret && !@secret_hash
|
14
|
+
end
|
15
|
+
|
16
|
+
attr_reader :name, :id, :redirect_uris, :preferred_key_group
|
17
|
+
|
18
|
+
def secret_hash
|
19
|
+
@secret_hash ||= Digest::SHA384.hexdigest(secret)
|
20
|
+
end
|
21
|
+
|
22
|
+
def match_secret?(given_secret)
|
23
|
+
if @secret
|
24
|
+
Rack::Utils.secure_compare(@secret, given_secret)
|
25
|
+
else
|
26
|
+
dgst = [secret_hash].pack('H*')
|
27
|
+
Rack::Utils.secure_compare(dgst, Digest::SHA384.digest(given_secret))
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
def as_log
|
32
|
+
{name: name, id: id}
|
33
|
+
end
|
34
|
+
|
35
|
+
def match_hint?(id: nil)
|
36
|
+
result = true
|
37
|
+
|
38
|
+
result &&= if id
|
39
|
+
id == self.id
|
40
|
+
else
|
41
|
+
true
|
42
|
+
end
|
43
|
+
|
44
|
+
result
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|