Compare commits

..

2 commits

32 changed files with 102 additions and 468 deletions

1
.env
View file

@ -0,0 +1 @@
APP_JWT_SECRET=bc1996ea-5464-424a-9a38-5604f2bc865a

BIN
.swp

Binary file not shown.

49
Cargo.lock generated
View file

@ -349,12 +349,6 @@ dependencies = [
"windows-targets 0.52.6", "windows-targets 0.52.6",
] ]
[[package]]
name = "base64"
version = "0.13.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8"
[[package]] [[package]]
name = "base64" name = "base64"
version = "0.21.7" version = "0.21.7"
@ -972,13 +966,11 @@ dependencies = [
"chrono", "chrono",
"env_logger", "env_logger",
"fully_pub", "fully_pub",
"jsonwebkey-convert",
"jsonwebtoken", "jsonwebtoken",
"kernel", "kernel",
"log", "log",
"minijinja", "minijinja",
"minijinja-embed", "minijinja-embed",
"pem 3.0.4",
"serde", "serde",
"serde_json", "serde_json",
"serde_urlencoded", "serde_urlencoded",
@ -1246,20 +1238,6 @@ dependencies = [
"wasm-bindgen", "wasm-bindgen",
] ]
[[package]]
name = "jsonwebkey-convert"
version = "0.3.0"
dependencies = [
"base64 0.13.1",
"lazy_static",
"num-bigint",
"pem 0.8.3",
"serde",
"serde_json",
"simple_asn1 0.5.4",
"thiserror 1.0.69",
]
[[package]] [[package]]
name = "jsonwebtoken" name = "jsonwebtoken"
version = "9.3.0" version = "9.3.0"
@ -1268,11 +1246,11 @@ checksum = "b9ae10193d25051e74945f1ea2d0b42e03cc3b890f7e4cc5faa44997d808193f"
dependencies = [ dependencies = [
"base64 0.21.7", "base64 0.21.7",
"js-sys", "js-sys",
"pem 3.0.4", "pem",
"ring", "ring",
"serde", "serde",
"serde_json", "serde_json",
"simple_asn1 0.6.2", "simple_asn1",
] ]
[[package]] [[package]]
@ -1583,17 +1561,6 @@ version = "1.0.15"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "57c0d7b74b563b49d38dae00a0c37d4d6de9b432382b2892f0574ddcae73fd0a" checksum = "57c0d7b74b563b49d38dae00a0c37d4d6de9b432382b2892f0574ddcae73fd0a"
[[package]]
name = "pem"
version = "0.8.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "fd56cbd21fea48d0c440b41cd69c589faacade08c992d9a54e471b79d0fd13eb"
dependencies = [
"base64 0.13.1",
"once_cell",
"regex",
]
[[package]] [[package]]
name = "pem" name = "pem"
version = "3.0.4" version = "3.0.4"
@ -1954,18 +1921,6 @@ dependencies = [
"rand_core", "rand_core",
] ]
[[package]]
name = "simple_asn1"
version = "0.5.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "8eb4ea60fb301dc81dfc113df680571045d375ab7345d171c5dc7d7e13107a80"
dependencies = [
"chrono",
"num-bigint",
"num-traits",
"thiserror 1.0.69",
]
[[package]] [[package]]
name = "simple_asn1" name = "simple_asn1"
version = "0.6.2" version = "0.6.2"

View file

@ -1,8 +1,5 @@
# TODO # TODO
- [ ] better OIDC support
- [ ] better support of `profile` `openid` `email` `roles` scopes
- [ ] i18n strings in the http website. - [ ] i18n strings in the http website.
- [ ] Instance customization support - [ ] Instance customization support
@ -53,5 +50,3 @@
- [X] basic docker setup - [X] basic docker setup
- [ ] make `docker stop` working (handle SIGTERM/SIGINT) - [ ] make `docker stop` working (handle SIGTERM/SIGINT)
- [ ] implement docker secrets. https://docs.docker.com/engine/swarm/secrets/ - [ ] implement docker secrets. https://docs.docker.com/engine/swarm/secrets/
- [ ] Find a minimal OpenID client implementation like Listmonk but a little bit more mature

View file

@ -1,23 +1,8 @@
signing_key = "tmp/secrets/signing.key"
[instance] [instance]
base_uri = "https://auth.fictive.org" base_uri = "http://localhost:8085"
name = "Fictive's auth" name = "Example org"
logo_uri = "https://example.org/logo.png" logo_uri = "https://example.org/logo.png"
[[applications]]
slug = "listmonk"
name = "Listmonk"
description = "Newsletter tool."
client_id = "da2120b4-635d-4eb5-8b2f-dbae89f6a6e9"
client_secret = "59da2291-8999-40e2-afe9-a54ac7cd0a94"
login_uri = "https://lists.fictive.org"
allowed_redirect_uris = [
"https://lists.fictive.org/auth/oidc",
]
visibility = "Internal"
authorize_flow = "Implicit"
[[applications]] [[applications]]
slug = "demo_app" slug = "demo_app"
name = "Demo app" name = "Demo app"

View file

@ -2,17 +2,17 @@ export RUST_BACKTRACE := "1"
export RUST_LOG := "trace" export RUST_LOG := "trace"
export CONTEXT_ARGS := "--config config.toml --database tmp/dbs/minauthator.db --static-assets ./assets" export CONTEXT_ARGS := "--config config.toml --database tmp/dbs/minauthator.db --static-assets ./assets"
watch-server *args: watch-server:
cargo-watch -x "run --bin minauthator-server -- $CONTEXT_ARGS {{args}}" cargo-watch -x "run --bin minauthator-server -- $CONTEXT_ARGS"
server *args: server:
cargo run --bin minauthator-server -- $CONTEXT_ARGS {{args}} cargo run --bin minauthator-server -- $CONTEXT_ARGS
admin *args: admin:
cargo run --bin minauthator-admin -- $CONTEXT_ARGS {{args}} cargo run --bin minauthator-admin -- $CONTEXT_ARGS
docker-build *args: docker-build:
docker build -t lefuturiste/minauthator {{args}} . docker build -t lefuturiste/minauthator .
docker-init-db: docker-init-db:
docker run \ docker run \
@ -28,6 +28,6 @@ docker-run:
-v minauthator-db:/var/lib/minauthator \ -v minauthator-db:/var/lib/minauthator \
lefuturiste/minauthator lefuturiste/minauthator
init-db *args: init-db:
sqlite3 {{args}} tmp/dbs/minauthator.db < migrations/all.sql sqlite3 -echo tmp/dbs/minauthator.db < migrations/all.sql

View file

@ -43,15 +43,6 @@ argh = { workspace = true }
sqlx = { workspace = true } sqlx = { workspace = true }
uuid = { workspace = true } uuid = { workspace = true }
url = { workspace = true } url = { workspace = true }
pem = "3.0.4"
# For now, we test if it's viable, and later we will fork it to fix the build (cf. issue
# https://github.com/informationsea/jsonwebkey-rs#1 )
[dependencies.jsonwebkey-convert]
path = "/home/mbess/workspace/foss/rust_libs/jsonwebkey-rs/jsonwebkey-convert"
features = ["simple_asn1", "pem"]
pem = "3.0.4"
[build-dependencies] [build-dependencies]
minijinja-embed = "2.3.1" minijinja-embed = "2.3.1"

View file

@ -4,9 +4,9 @@ use fully_pub::fully_pub;
use log::error; use log::error;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use kernel::{models::authorization::Authorization, repositories::users::get_user_by_id}; use kernel::models::authorization::Authorization;
use crate::{ use crate::{
services::{app_session::AppClientSession, session::create_token}, token_claims::{OAuth2AccessTokenClaims, OIDCIdTokenClaims}, AppState services::{app_session::AppClientSession, session::create_token}, token_claims::AppUserTokenClaims, AppState
}; };
const AUTHORIZATION_CODE_TTL_SECONDS: i64 = 120; const AUTHORIZATION_CODE_TTL_SECONDS: i64 = 120;
@ -22,7 +22,6 @@ struct AccessTokenRequestParams {
#[derive(Serialize, Deserialize)] #[derive(Serialize, Deserialize)]
#[fully_pub] #[fully_pub]
struct AccessTokenResponse { struct AccessTokenResponse {
id_token: String,
access_token: String, access_token: String,
token_type: String, token_type: String,
expires_in: u64 expires_in: u64
@ -61,7 +60,6 @@ pub async fn get_access_token(
).into_response(); ).into_response();
} }
}; };
// 2.2. Validate that the authorization code is not expired // 2.2. Validate that the authorization code is not expired
let is_code_valid = authorization.last_used_at let is_code_valid = authorization.last_used_at
.map_or(false, |ts| { .map_or(false, |ts| {
@ -74,38 +72,19 @@ pub async fn get_access_token(
).into_response(); ).into_response();
} }
// 2.3. Fetch user resource owner // 3. Generate JWT for oauth2 client user session
let user = get_user_by_id(&app_state.db, &authorization.user_id) let jwt = create_token(
.await
.expect("Expected to get user from authorization.");
// 3.1. Generate JWT for OAuth2 client user session
let access_token_jwt = create_token(
&app_state.config,
&app_state.secrets, &app_state.secrets,
OAuth2AccessTokenClaims::new( AppUserTokenClaims::new(
&app_state.config, &app_client_session.client_id,
&user, &authorization.user_id,
authorization.scopes.to_vec() authorization.scopes.to_vec()
) )
); );
// 3.2. Generate id_token for OIDC client
let id_token_claims = OIDCIdTokenClaims::new(
&app_state.config,
&app_client_session.client_id,
user.clone(),
authorization.nonce.clone()
);
let id_token_jwt = create_token(
&app_state.config,
&app_state.secrets,
id_token_claims
);
// 4. return JWT // 4. return JWT
let access_token_res = AccessTokenResponse { let access_token_res = AccessTokenResponse {
id_token: id_token_jwt, access_token: jwt,
access_token: access_token_jwt, token_type: "jwt".to_string(),
token_type: "Bearer".to_string(),
expires_in: 3600 expires_in: 3600
}; };
Json(access_token_res).into_response() Json(access_token_res).into_response()

View file

@ -1,45 +0,0 @@
use jsonwebkey_convert::RSAPublicKey;
use jsonwebkey_convert::der::FromPem;
use axum::{extract::State, response::IntoResponse, Json};
use fully_pub::fully_pub;
use serde::Serialize;
use crate::AppState;
// /// JSON Web Key
// /// @See https://www.rfc-editor.org/rfc/rfc7517.html
// #[derive(Serialize)]
// #[fully_pub]
// struct RsaJWK {
// #[serde(rename = "use")]
// utilisation: String,
// alg: String,
// kid: String,
// #[serde(rename = "modulus")]
// modulus: String,
// exp: String
// }
/// JSON Web Key set
/// @See https://www.rfc-editor.org/rfc/rfc7517.html
#[derive(Serialize)]
#[fully_pub]
struct JWKs {
keys: Vec<RSAPublicKey>
}
pub async fn get_signing_public_keys(
State(app_state): State<AppState>,
) -> impl IntoResponse {
let pem_data = app_state.secrets.signing_keypair.0;
// extract modulus and exp number from ASN.1 encoded PCKS 1 package
let rsa_jwk = RSAPublicKey::from_pem(pem_data)
.expect("Expected to decode PEM public key");
dbg!(&rsa_jwk);
Json(JWKs {
keys: vec![rsa_jwk]
}).into_response()
}

View file

@ -1,2 +1 @@
pub mod well_known; pub mod well_known;
pub mod keys;

View file

@ -6,8 +6,6 @@ use strum::IntoEnumIterator;
use crate::AppState; use crate::AppState;
/// Manifest used by OpenID Connect clients
/// @See https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata
#[derive(Serialize)] #[derive(Serialize)]
#[fully_pub] #[fully_pub]
struct WellKnownOpenIdConfiguration { struct WellKnownOpenIdConfiguration {
@ -17,9 +15,7 @@ struct WellKnownOpenIdConfiguration {
userinfo_endpoint: String, userinfo_endpoint: String,
scopes_supported: Vec<String>, scopes_supported: Vec<String>,
response_types_supported: Vec<String>, response_types_supported: Vec<String>,
token_endpoint_auth_methods_supported: Vec<String>, token_endpoint_auth_methods_supported: Vec<String>
id_token_signing_alg_values_supported: Vec<String>,
jwks_uri: String
} }
pub async fn get_well_known_openid_configuration( pub async fn get_well_known_openid_configuration(
@ -34,9 +30,5 @@ pub async fn get_well_known_openid_configuration(
scopes_supported: AuthorizationScope::iter().map(|v| v.to_string()).collect(), scopes_supported: AuthorizationScope::iter().map(|v| v.to_string()).collect(),
response_types_supported: vec!["code".into()], response_types_supported: vec!["code".into()],
token_endpoint_auth_methods_supported: vec!["client_secret_basic".into()], token_endpoint_auth_methods_supported: vec!["client_secret_basic".into()],
id_token_signing_alg_values_supported: vec!["RS256".into()],
jwks_uri: format!("{}/.well-known/jwks", base_url)
// jwks_uri:
// subject_types_supported
}) })
} }

View file

@ -2,7 +2,7 @@ use axum::{extract::State, response::IntoResponse, Extension, Json};
use fully_pub::fully_pub; use fully_pub::fully_pub;
use serde::Serialize; use serde::Serialize;
use crate::{token_claims::OAuth2AccessTokenClaims, AppState}; use crate::{token_claims::AppUserTokenClaims, AppState};
use kernel::models::user::User; use kernel::models::user::User;
#[derive(Serialize)] #[derive(Serialize)]
@ -18,11 +18,11 @@ struct ReadUserBasicExtract {
pub async fn read_user_basic( pub async fn read_user_basic(
State(app_state): State<AppState>, State(app_state): State<AppState>,
Extension(token_claims): Extension<OAuth2AccessTokenClaims>, Extension(token_claims): Extension<AppUserTokenClaims>,
) -> impl IntoResponse { ) -> impl IntoResponse {
// 1. This handler require app user authentification (JWT) // 1. This handler require app user authentification (JWT)
let user_res = sqlx::query_as::<_, User>("SELECT * FROM users WHERE id = $1") let user_res = sqlx::query_as::<_, User>("SELECT * FROM users WHERE id = $1")
.bind(&token_claims.sub) .bind(&token_claims.user_id)
.fetch_one(&app_state.db.0) .fetch_one(&app_state.db.0)
.await .await
.expect("To get user from claim"); .expect("To get user from claim");

View file

@ -7,7 +7,9 @@ use serde::{Deserialize, Serialize};
use url::Url; use url::Url;
use uuid::Uuid; use uuid::Uuid;
use kernel::models::{authorization::Authorization, config::AppAuthorizeFlow}; use kernel::{
models::{authorization::Authorization, config::AppAuthorizeFlow}
};
use utils::get_random_alphanumerical; use utils::get_random_alphanumerical;
use crate::{ use crate::{
renderer::TemplateRenderer, services::oauth2::{parse_scope, verify_redirect_uri}, token_claims::UserTokenClaims, AppState renderer::TemplateRenderer, services::oauth2::{parse_scope, verify_redirect_uri}, token_claims::UserTokenClaims, AppState
@ -23,7 +25,6 @@ struct AuthorizationParams {
redirect_uri: String, redirect_uri: String,
/// An opaque value used by the client to maintain state between the request and callback /// An opaque value used by the client to maintain state between the request and callback
state: String, state: String,
nonce: Option<String>
} }
fn redirect_to_client( fn redirect_to_client(
@ -33,7 +34,7 @@ fn redirect_to_client(
let target_url = format!("{}?code={}&state={}", let target_url = format!("{}?code={}&state={}",
authorization_params.redirect_uri, authorization_params.redirect_uri,
authorization_code, authorization_code,
authorization_params.state authorization_params.state,
); );
debug!("Redirecting to {}", target_url); debug!("Redirecting to {}", target_url);
@ -55,7 +56,6 @@ pub async fn authorize_form(
query_params: Query<AuthorizationParams> query_params: Query<AuthorizationParams>
) -> impl IntoResponse { ) -> impl IntoResponse {
let Query(authorization_params) = query_params; let Query(authorization_params) = query_params;
dbg!(&authorization_params);
// 1. Verify the app details // 1. Verify the app details
let app = match app_state.config.applications let app = match app_state.config.applications
@ -116,10 +116,9 @@ pub async fn authorize_form(
// Create new auth code // Create new auth code
let authorization_code = get_random_alphanumerical(32); let authorization_code = get_random_alphanumerical(32);
// Update last used timestamp for this authorization // Update last used timestamp for this authorization
let _result = sqlx::query("UPDATE authorizations SET code = $2, nonce = $3, last_used_at = $4 WHERE id = $1") let _result = sqlx::query("UPDATE authorizations SET code = $2, last_used_at = $3 WHERE id = $1")
.bind(existing_authorization.id) .bind(existing_authorization.id)
.bind(authorization_code.clone()) .bind(authorization_code.clone())
.bind(authorization_params.nonce.clone())
.bind(Utc::now().to_rfc3339_opts(SecondsFormat::Millis, true)) .bind(Utc::now().to_rfc3339_opts(SecondsFormat::Millis, true))
.execute(&app_state.db.0) .execute(&app_state.db.0)
.await.unwrap(); .await.unwrap();
@ -173,7 +172,6 @@ pub async fn perform_authorize(
Extension(token_claims): Extension<UserTokenClaims>, Extension(token_claims): Extension<UserTokenClaims>,
Form(authorize_form): Form<AuthorizationParams> Form(authorize_form): Form<AuthorizationParams>
) -> impl IntoResponse { ) -> impl IntoResponse {
dbg!(&authorize_form);
// 1. Get the app details // 1. Get the app details
let app = match app_state.config.applications let app = match app_state.config.applications
.iter() .iter()
@ -205,7 +203,6 @@ pub async fn perform_authorize(
client_id: app.client_id.clone(), client_id: app.client_id.clone(),
scopes: sqlx::types::Json(scopes), scopes: sqlx::types::Json(scopes),
code: authorization_code.clone(), code: authorization_code.clone(),
nonce: authorize_form.nonce.clone(),
last_used_at: Some(Utc::now()), last_used_at: Some(Utc::now()),
created_at: Utc::now(), created_at: Utc::now(),
}; };
@ -213,15 +210,14 @@ pub async fn perform_authorize(
// 3. Save authorization in DB with state // 3. Save authorization in DB with state
let res = sqlx::query(" let res = sqlx::query("
INSERT INTO authorizations INSERT INTO authorizations
(id, user_id, client_id, scopes, code, nonce, last_used_at, created_at) (id, user_id, client_id, scopes, code, last_used_at, created_at)
VALUES ($1, $2, $3, $4, $5, $6, $7, $8) VALUES ($1, $2, $3, $4, $5, $6, $7)
") ")
.bind(authorization.id.clone()) .bind(authorization.id.clone())
.bind(authorization.user_id) .bind(authorization.user_id)
.bind(authorization.client_id) .bind(authorization.client_id)
.bind(authorization.scopes) .bind(authorization.scopes)
.bind(authorization.code) .bind(authorization.code)
.bind(authorization.nonce)
.bind(authorization.last_used_at.map(|x| x.to_rfc3339_opts(SecondsFormat::Millis, true))) .bind(authorization.last_used_at.map(|x| x.to_rfc3339_opts(SecondsFormat::Millis, true)))
.bind(authorization.created_at.to_rfc3339_opts(SecondsFormat::Millis, true)) .bind(authorization.created_at.to_rfc3339_opts(SecondsFormat::Millis, true))
.execute(&app_state.db.0) .execute(&app_state.db.0)

View file

@ -91,8 +91,8 @@ pub async fn perform_login(
.await.unwrap(); .await.unwrap();
let jwt_max_age = Duration::days(15); let jwt_max_age = Duration::days(15);
let claims = UserTokenClaims::new(&app_state.config, &user.id, jwt_max_age); let claims = UserTokenClaims::new(&user.id, jwt_max_age);
let jwt = create_token(&app_state.config, &app_state.secrets, claims); let jwt = create_token(&app_state.secrets, claims);
// TODO: handle keep_session boolean from form and specify cookie max age only if this setting // TODO: handle keep_session boolean from form and specify cookie max age only if this setting
// is true // is true

View file

@ -9,7 +9,7 @@ use utils::parse_basic_auth;
use crate::{ use crate::{
services::{app_session::AppClientSession, session::verify_token}, services::{app_session::AppClientSession, session::verify_token},
token_claims::OAuth2AccessTokenClaims, token_claims::AppUserTokenClaims,
AppState AppState
}; };
@ -102,16 +102,14 @@ pub async fn enforce_jwt_auth_middleware(
); );
} }
}; };
let token_claims: OAuth2AccessTokenClaims = let token_claims: AppUserTokenClaims = match verify_token(&app_state.secrets, jwt) {
match verify_token(&app_state.config, &app_state.secrets, jwt) { Ok(val) => val,
Ok(val) => val, Err(_e) => {
Err(_e) => { return Err(
dbg!(_e); (StatusCode::UNAUTHORIZED, Html("Unauthorized: The provided JWT is invalid."))
return Err( );
(StatusCode::UNAUTHORIZED, Html("Unauthorized: The provided JWT is invalid.")) }
); };
}
};
req.extensions_mut().insert(token_claims); req.extensions_mut().insert(token_claims);
Ok(next.run(req).await) Ok(next.run(req).await)
} }

View file

@ -28,20 +28,18 @@ pub async fn auth_middleware(
return Ok(next.run(req).await) return Ok(next.run(req).await)
} }
}; };
let token_claims: UserTokenClaims = let token_claims: UserTokenClaims = match verify_token(&app_state.secrets, jwt) {
match verify_token(&app_state.config, &app_state.secrets, jwt) { Ok(val) => val,
Ok(val) => val, Err(_e) => {
Err(_e) => { // UserWebGUI: delete invalid JWT cookie
dbg!(&_e); return Err(
// UserWebGUI: delete invalid JWT cookie (
return Err( cookies.remove(WEB_GUI_JWT_COOKIE_NAME),
( Redirect::to(&original_uri.to_string())
cookies.remove(WEB_GUI_JWT_COOKIE_NAME), )
Redirect::to(&original_uri.to_string()) );
) }
); };
}
};
req.extensions_mut().insert(token_claims); req.extensions_mut().insert(token_claims);
Ok(next.run(req).await) Ok(next.run(req).await)
} }

View file

@ -51,8 +51,7 @@ pub fn build_router(server_config: &ServerConfig, app_state: AppState) -> Router
.route("/api/user-assets/:asset_id", get(api::public_assets::get_user_asset)); .route("/api/user-assets/:asset_id", get(api::public_assets::get_user_asset));
let well_known_routes = Router::new() let well_known_routes = Router::new()
.route("/.well-known/openid-configuration", get(api::openid::well_known::get_well_known_openid_configuration)) .route("/.well-known/openid-configuration", get(api::openid::well_known::get_well_known_openid_configuration));
.route("/.well-known/jwks", get(api::openid::keys::get_signing_public_keys));
Router::new() Router::new()
.merge(public_routes) .merge(public_routes)

View file

@ -12,16 +12,9 @@ pub fn verify_redirect_uri(app: &Application, input_redirect_uri: &str) -> bool
pub fn parse_scope(scope_str: &str) -> Result<Vec<AuthorizationScope>> { pub fn parse_scope(scope_str: &str) -> Result<Vec<AuthorizationScope>> {
let mut scopes: Vec<AuthorizationScope> = vec![]; let mut scopes: Vec<AuthorizationScope> = vec![];
for part in scope_str.split(' ') { for part in scope_str.split(' ') {
if part == "openid" { scopes.push(
scopes.push(AuthorizationScope::UserReadBasic); AuthorizationScope::from_str(part).context("Cannot parse space-delimited scope.")?
scopes.push(AuthorizationScope::UserReadRoles); )
continue;
}
if part == "profile" || part == "email" {
continue;
}
scopes.push(AuthorizationScope::from_str(part).context("Cannot parse space-delimited scope.")?);
} }
dbg!(&scopes);
Ok(scopes) Ok(scopes)
} }

View file

@ -1,37 +1,24 @@
use anyhow::Result; use anyhow::Result;
use serde::{de::DeserializeOwned, Serialize}; use serde::{de::DeserializeOwned, Serialize};
use jsonwebtoken::{encode, decode, Header, Algorithm, Validation, EncodingKey, DecodingKey}; use jsonwebtoken::{encode, decode, Header, Algorithm, Validation, EncodingKey, DecodingKey};
use kernel::{context::AppSecrets, models::config::Config}; use kernel::context::AppSecrets;
pub fn create_token<T: Serialize>( pub fn create_token<T: Serialize>(secrets: &AppSecrets, claims: T) -> String {
_config: &Config,
secrets: &AppSecrets,
claims: T
) -> String {
let token = encode( let token = encode(
&Header::new(Algorithm::RS256), &Header::default(),
&claims, &claims,
&EncodingKey::from_rsa_pem(&secrets.signing_keypair.1) &EncodingKey::from_secret(secrets.jwt_secret.as_bytes())
.expect("To build encoding key from signing key.")
).expect("Create token"); ).expect("Create token");
token token
} }
pub fn verify_token<T: DeserializeOwned>( pub fn verify_token<T: DeserializeOwned>(secrets: &AppSecrets, jwt: &str) -> Result<T> {
config: &Config,
secrets: &AppSecrets,
jwt: &str
) -> Result<T> {
let mut validation = Validation::new(Algorithm::RS256);
validation.set_issuer(&[config.instance.base_uri.clone()]);
validation.set_audience(&[config.instance.base_uri.clone()]);
let token_data = decode::<T>( let token_data = decode::<T>(
jwt, jwt,
&DecodingKey::from_rsa_pem(&secrets.signing_keypair.0) &DecodingKey::from_secret(secrets.jwt_secret.as_bytes()),
.expect("To build decoding key from signing key."), &Validation::new(Algorithm::HS256)
&validation
)?; )?;
Ok(token_data.claims) Ok(token_data.claims)

View file

@ -1,6 +1,6 @@
use fully_pub::fully_pub; use fully_pub::fully_pub;
use jsonwebtoken::get_current_timestamp; use jsonwebtoken::get_current_timestamp;
use kernel::models::{authorization::AuthorizationScope, config::Config, user::User}; use kernel::models::authorization::AuthorizationScope;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use time::Duration; use time::Duration;
@ -12,91 +12,41 @@ struct UserTokenClaims {
/// token expiration /// token expiration
exp: u64, exp: u64,
/// token issuer /// token issuer
iss: String, iss: String
// TODO: add roles // TODO: add roles
/// token audience
aud: String
} }
impl UserTokenClaims { impl UserTokenClaims {
pub fn new(config: &Config, user_id: &str, max_age: Duration) -> Self { pub fn new(user_id: &str, max_age: Duration) -> Self {
UserTokenClaims { UserTokenClaims {
sub: user_id.into(), sub: user_id.into(),
exp: get_current_timestamp() + max_age.whole_seconds() as u64, exp: get_current_timestamp() + max_age.whole_seconds() as u64,
iss: config.instance.base_uri.clone(), iss: "Minauthator".into()
aud: config.instance.base_uri.clone(),
} }
} }
} }
/// Access token for OAuth2 defined in RFC 9068
/// @See https://datatracker.ietf.org/doc/html/rfc9068
#[derive(Debug, Serialize, Deserialize, Clone)] #[derive(Debug, Serialize, Deserialize, Clone)]
#[fully_pub] #[fully_pub]
struct OAuth2AccessTokenClaims { struct AppUserTokenClaims {
/// Token issuer (URI to the issuer) /// combined subject
iss: String, client_id: String,
/// Audiance (In this case, the audiance is equal to the issuer) user_id: String,
aud: String, scopes: Vec<AuthorizationScope>,
/// End-user id assigned by the issuer (user_id) /// token expiration
sub: String,
/// Token expiration
exp: u64, exp: u64,
/// List of OAuth 2 scopes asked by the client /// token issuer
scopes: Vec<AuthorizationScope> iss: String
} }
impl OAuth2AccessTokenClaims { impl AppUserTokenClaims {
pub fn new(config: &Config, user: &User, scopes: Vec<AuthorizationScope>) -> Self { pub fn new(client_id: &str, user_id: &str, scopes: Vec<AuthorizationScope>) -> Self {
OAuth2AccessTokenClaims { AppUserTokenClaims {
iss: config.instance.base_uri.clone(), client_id: client_id.into(),
aud: config.instance.base_uri.clone(), user_id: user_id.into(),
sub: user.id.clone(),
exp: get_current_timestamp() + 86_000,
scopes, scopes,
}
}
}
/// @See https://openid.net/specs/openid-connect-core-1_0.html#IDToken
/// @See https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
#[derive(Debug, Serialize, Deserialize, Clone)]
#[fully_pub]
struct OIDCIdTokenClaims {
/// Token expiration
exp: u64,
/// Token issuer (URI to the issuer)
iss: String,
/// Audiance (client_id)
aud: String,
/// End-user id assigned by the issuer (user_id)
sub: String,
/// additional claims
name: Option<String>,
email: Option<String>,
preferred_username: Option<String>,
roles: Vec<String>,
nonce: Option<String>
}
impl OIDCIdTokenClaims {
pub fn new(
config: &Config,
client_id: &str,
user: User,
nonce: Option<String>
) -> Self {
OIDCIdTokenClaims {
iss: config.instance.base_uri.clone(),
aud: client_id.into(),
sub: user.id,
exp: get_current_timestamp() + 86_000, exp: get_current_timestamp() + 86_000,
email: user.email, iss: "Minauth".into()
name: user.full_name,
preferred_username: Some(user.handle),
roles: user.roles.0,
nonce
} }
} }
} }

View file

@ -1,5 +1,4 @@
pub const DEFAULT_DB_PATH: &str = "/var/lib/minauthator/minauthator.db"; pub const DEFAULT_DB_PATH: &str = "/var/lib/minauthator/minauthator.db";
pub const DEFAULT_ASSETS_PATH: &str = "/usr/local/lib/minauthator/assets"; pub const DEFAULT_ASSETS_PATH: &str = "/usr/local/lib/minauthator/assets";
pub const DEFAULT_CONFIG_PATH: &str = "/etc/minauthator/config.toml"; pub const DEFAULT_CONFIG_PATH: &str = "/etc/minauthator/config.toml";
pub const DEFAULT_SIGNING_KEY_PATH: &str = "/etc/minauthator/secrets/jwt.key.pem";

View file

@ -1,13 +1,11 @@
use std::{env, fs, path::Path}; use std::{env, fs};
use anyhow::{Result, Context, anyhow}; use anyhow::{Result, Context, anyhow};
use fully_pub::fully_pub; use fully_pub::fully_pub;
use log::info; use log::info;
use sqlx::{Pool, Sqlite};
use crate::{ use crate::{
consts::{DEFAULT_CONFIG_PATH, DEFAULT_DB_PATH, DEFAULT_SIGNING_KEY_PATH}, consts::{DEFAULT_CONFIG_PATH, DEFAULT_DB_PATH}, database::prepare_database, models::config::Config, repositories::storage::Storage
database::prepare_database,
models::config::Config,
repositories::storage::Storage
}; };
/// get server config /// get server config
@ -28,18 +26,9 @@ struct StartKernelConfig {
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
#[fully_pub] #[fully_pub]
struct AppSecrets { struct AppSecrets {
/// RSA keypair (public, private) used to signed the JWT issued by minauthator in PEM conainer format jwt_secret: String
signing_keypair: (Vec<u8>, Vec<u8>)
} }
#[derive(Debug, Clone)]
#[fully_pub]
struct ComputedConfig {
signing_public_key: Vec<u8>,
signing_private_key: Vec<u8>
}
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
#[fully_pub] #[fully_pub]
struct KernelContext { struct KernelContext {
@ -48,19 +37,6 @@ struct KernelContext {
storage: Storage storage: Storage
} }
fn get_signing_keypair(key_path: &str) -> Result<(Vec<u8>, Vec<u8>)> {
let key_path = Path::new(key_path);
let pub_key_path = key_path.with_extension("pub");
let private_key: Vec<u8> = fs::read_to_string(&key_path)
.context(format!("Failed to read private key from path {:?}.", key_path))?
.as_bytes().to_vec();
let public_key: Vec<u8> = fs::read_to_string(&pub_key_path)
.context(format!("Failed to read public key from path {:?}.", pub_key_path))?
.as_bytes().to_vec();
Ok((public_key, private_key))
}
pub async fn get_kernel_context(start_config: StartKernelConfig) -> Result<KernelContext> { pub async fn get_kernel_context(start_config: StartKernelConfig) -> Result<KernelContext> {
env_logger::init(); env_logger::init();
let _ = dotenvy::dotenv(); let _ = dotenvy::dotenv();
@ -74,13 +50,10 @@ pub async fn get_kernel_context(start_config: StartKernelConfig) -> Result<Kerne
let config: Config = get_config(config_path) let config: Config = get_config(config_path)
.expect("Cannot get config."); .expect("Cannot get config.");
let signing_key_path = config.signing_key.clone().unwrap_or(DEFAULT_SIGNING_KEY_PATH.to_string());
// optionally load dotenv file
let _ = dotenvy::dotenv(); let _ = dotenvy::dotenv();
let secrets = AppSecrets { let secrets = AppSecrets {
signing_keypair: get_signing_keypair(&signing_key_path)? jwt_secret: env::var("APP_JWT_SECRET")
.context("Expected APP_JWT_SECRET environment variable to exists.")?
}; };
Ok(KernelContext { Ok(KernelContext {

View file

@ -25,8 +25,6 @@ struct Authorization {
client_id: String, client_id: String,
scopes: Json<Vec<AuthorizationScope>>, scopes: Json<Vec<AuthorizationScope>>,
nonce: Option<String>,
/// defined in https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2 /// defined in https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2
code: String, code: String,
last_used_at: Option<DateTime<Utc>>, last_used_at: Option<DateTime<Utc>>,

View file

@ -66,6 +66,11 @@ struct Role {
struct Config { struct Config {
instance: InstanceConfig, instance: InstanceConfig,
applications: Vec<Application>, applications: Vec<Application>,
roles: Vec<Role>, roles: Vec<Role>
signing_key: Option<String> }
#[derive(Debug, Clone)]
#[fully_pub]
struct AppSecrets {
jwt_secret: String
} }

View file

@ -14,7 +14,7 @@ enum UserStatus {
Active Active
} }
#[derive(sqlx::FromRow, Deserialize, Serialize, Debug, Clone)] #[derive(sqlx::FromRow, Deserialize, Serialize, Debug)]
#[fully_pub] #[fully_pub]
struct User { struct User {
/// uuid /// uuid

View file

@ -33,7 +33,6 @@ CREATE TABLE authorizations (
client_id TEXT NOT NULL, client_id TEXT NOT NULL,
scopes TEXT, -- json array of app scope (permissions) scopes TEXT, -- json array of app scope (permissions)
code TEXT, code TEXT,
nonce TEXT, -- code used to associate client session to id_token
last_used_at DATETIME, last_used_at DATETIME,
created_at DATETIME NOT NULL created_at DATETIME NOT NULL

View file

@ -1,58 +0,0 @@
signing_key = "tmp/secrets/signing.key"
[instance]
base_uri = "http://localhost:8086"
name = "Example org"
logo_uri = "https://example.org/logo.png"
[[applications]]
slug = "demo_app"
name = "Demo app"
description = "A super application where you can do everything you want."
client_id = "00000001-0000-0000-0000-000000000001"
client_secret = "dummy_client_secret"
login_uri = "https://localhost:9876"
allowed_redirect_uris = [
"http://localhost:9090/callback",
"http://localhost:9876/callback"
]
visibility = "Internal"
authorize_flow = "Implicit"
[[applications]]
slug = "wiki"
name = "Wiki app"
description = "The knowledge base of the exemple org."
client_id = "f9de1885-448d-44bb-8c48-7e985486a8c6"
client_secret = "49c6c16a-0a8a-4981-a60d-5cb96582cc1a"
login_uri = "https://wiki.example.org/login"
allowed_redirect_uris = [
"https://wiki.example.org/oauth2/callback"
]
visibility = "Public"
authorize_flow = "Implicit"
[[applications]]
slug = "private_app"
name = "Demo app"
description = "Private app you should never discover"
client_id = "c8a08783-2342-4ce3-a3cb-9dc89b6bdf"
client_secret = "this_is_the_secret"
login_uri = "https://private-app.org"
allowed_redirect_uris = [
"http://localhost:9091/authorize",
]
visibility = "Private"
authorize_flow = "Implicit"
[[roles]]
slug = "basic"
name = "Basic"
description = "Basic user"
default = true
[[roles]]
slug = "admin"
name = "Administrator"
description = "Full power on organization instance"

View file

@ -1,11 +0,0 @@
#!/usr/bin/bash
password_hash="$(echo -n "root" | argon2 salt_06cGGWYDJCZ -e)"
echo $password_hash
SQL=$(cat <<EOF
INSERT INTO users
(id, handle, email, roles, status, password_hash, created_at)
VALUES
('$(uuid)', 'john.doe', 'john.doe@example.org', '[]', 'Active', '$password_hash', '2024-11-30T00:00:00Z');
EOF)
echo $SQL | sqlite3 $DB_PATH

View file

@ -1,41 +0,0 @@
POST {{ base_url }}/login
[FormParams]
login: john.doe
password: root
HTTP 303
[Captures]
user_jwt: cookie "minauthator_jwt"
# OAuth2 implicit flow (pre-granted app)
GET {{ base_url }}/authorize
[QueryStringParams]
client_id: 00000001-0000-0000-0000-000000000001
response_type: code
redirect_uri: http://localhost:9090/callback
state: Afk4kf6pbZkms78jM
scope: openid profile email
HTTP 302
[Captures]
authorization_code: header "Location" regex "\\?code=(.*)&"
# OIDC Token exchange
POST {{ base_url }}/api/token
[BasicAuth]
00000001-0000-0000-0000-000000000001: dummy_client_secret
[FormParams]
code: {{ authorization_code }}
scope: user_read_basic
redirect_uri: http://localhost:9090/callback
grant_type: authorization_code
HTTP 200
Content-Type: application/json
[Asserts]
jsonpath "$.access_token" exists
jsonpath "$.id_token" exists
jsonpath "$.id_token" matches "eyJ[[:alpha:]0-9].[[:alpha:]0-9].[[:alpha:]0-9]"
[Captures]
id_token: jsonpath "$.id_token"
# TODO: assert id_token JWT claims fields
# TODO: contribute to hurl to add JWT extraction and assertion
# See. https://github.com/Orange-OpenSource/hurl/issues/2223

View file

@ -1,5 +1,3 @@
signing_key = "tmp/secrets/signing.key"
[instance] [instance]
base_uri = "http://localhost:8086" base_uri = "http://localhost:8086"
name = "Example org" name = "Example org"

View file

@ -27,7 +27,7 @@ handle: root
email: root@johndoe.net email: root@johndoe.net
full_name: John Doe full_name: John Doe
website: https://johndoe.net website: https://johndoe.net
avatar: file,john_doe_profile_pic.jpg; image/jpeg picture: file,john_doe_profile_pic.jpg; image/jpeg
HTTP 200 HTTP 200
GET {{ base_url }}/me/authorizations GET {{ base_url }}/me/authorizations

View file

@ -1,4 +1,3 @@
signing_key = "tmp/secrets/signing.key"
applications = [] applications = []
roles = [] roles = []