mirror of
https://codeberg.org/pfzetto/axum-oidc
synced 2025-12-09 22:55:17 +01:00
fixed #10 by implementing a flag in the response extensions that instructs the middleware to clear the session. The flag is automatically set when using the `OidcRpInitiatedLogout` as a responder. improved documentation modified example to reflect api changes
490 lines
17 KiB
Rust
490 lines
17 KiB
Rust
use std::{
|
|
marker::PhantomData,
|
|
task::{Context, Poll},
|
|
};
|
|
|
|
use axum::{
|
|
extract::Query,
|
|
response::{IntoResponse, Redirect},
|
|
};
|
|
use axum_core::{extract::FromRequestParts, response::Response};
|
|
use futures_util::future::BoxFuture;
|
|
use http::{request::Parts, uri::PathAndQuery, Request, Uri};
|
|
use tower_layer::Layer;
|
|
use tower_service::Service;
|
|
use tower_sessions::Session;
|
|
|
|
use openidconnect::{
|
|
core::{CoreAuthenticationFlow, CoreErrorResponseType, CoreGenderClaim},
|
|
reqwest::async_http_client,
|
|
AccessToken, AccessTokenHash, AuthorizationCode, CsrfToken, IdTokenClaims, Nonce,
|
|
OAuth2TokenResponse, PkceCodeChallenge, PkceCodeVerifier, RedirectUrl, RefreshToken,
|
|
RequestTokenError::ServerResponse,
|
|
Scope, TokenResponse,
|
|
};
|
|
|
|
use crate::{
|
|
error::{Error, MiddlewareError},
|
|
extractor::{OidcAccessToken, OidcClaims, OidcRpInitiatedLogout},
|
|
AdditionalClaims, AuthenticatedSession, BoxError, ClearSessionFlag, IdToken, OidcClient,
|
|
OidcQuery, OidcSession, SESSION_KEY,
|
|
};
|
|
|
|
/// Layer for the [`OidcLoginMiddleware`].
|
|
#[derive(Clone, Default)]
|
|
pub struct OidcLoginLayer<AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
additional: PhantomData<AC>,
|
|
}
|
|
|
|
impl<AC: AdditionalClaims> OidcLoginLayer<AC> {
|
|
pub fn new() -> Self {
|
|
Self {
|
|
additional: PhantomData,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<I, AC> Layer<I> for OidcLoginLayer<AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
type Service = OidcLoginMiddleware<I, AC>;
|
|
|
|
fn layer(&self, inner: I) -> Self::Service {
|
|
OidcLoginMiddleware {
|
|
inner,
|
|
additional: PhantomData,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// This middleware forces the user to be authenticated and redirects the user to the OpenID Connect
|
|
/// Issuer to authenticate. This Middleware needs to be loaded afer [`OidcAuthMiddleware`].
|
|
#[derive(Clone)]
|
|
pub struct OidcLoginMiddleware<I, AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
inner: I,
|
|
additional: PhantomData<AC>,
|
|
}
|
|
|
|
impl<I, AC, B> Service<Request<B>> for OidcLoginMiddleware<I, AC>
|
|
where
|
|
I: Service<Request<B>, Response = Response> + Send + 'static + Clone,
|
|
I::Error: Send + Into<BoxError>,
|
|
I::Future: Send + 'static,
|
|
AC: AdditionalClaims,
|
|
B: Send + 'static,
|
|
{
|
|
type Response = I::Response;
|
|
type Error = MiddlewareError;
|
|
type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>;
|
|
|
|
fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
|
|
self.inner
|
|
.poll_ready(cx)
|
|
.map_err(|e| MiddlewareError::NextMiddleware(e.into()))
|
|
}
|
|
|
|
fn call(&mut self, request: Request<B>) -> Self::Future {
|
|
let inner = self.inner.clone();
|
|
let mut inner = std::mem::replace(&mut self.inner, inner);
|
|
|
|
if request.extensions().get::<OidcAccessToken>().is_some() {
|
|
// the OidcAuthMiddleware had a valid id token
|
|
Box::pin(async move {
|
|
let response: Response = inner
|
|
.call(request)
|
|
.await
|
|
.map_err(|e| MiddlewareError::NextMiddleware(e.into()))?;
|
|
Ok(response)
|
|
})
|
|
} else {
|
|
// no valid id token or refresh token was found and the user has to login
|
|
Box::pin(async move {
|
|
let (mut parts, _) = request.into_parts();
|
|
|
|
let mut oidcclient: OidcClient<AC> = parts
|
|
.extensions
|
|
.get()
|
|
.cloned()
|
|
.ok_or(MiddlewareError::AuthMiddlewareNotFound)?;
|
|
|
|
let query = Query::<OidcQuery>::from_request_parts(&mut parts, &())
|
|
.await
|
|
.ok();
|
|
|
|
let session = parts
|
|
.extensions
|
|
.get::<Session>()
|
|
.ok_or(MiddlewareError::SessionNotFound)?;
|
|
let login_session: Option<OidcSession<AC>> = session
|
|
.get(SESSION_KEY)
|
|
.await
|
|
.map_err(MiddlewareError::from)?;
|
|
|
|
let handler_uri =
|
|
strip_oidc_from_path(oidcclient.application_base_url.clone(), &parts.uri)?;
|
|
|
|
oidcclient.client = oidcclient
|
|
.client
|
|
.set_redirect_uri(RedirectUrl::new(handler_uri.to_string())?);
|
|
|
|
if let (Some(mut login_session), Some(query)) = (login_session, query) {
|
|
// the request has the request headers of the oidc redirect
|
|
// parse the headers and exchange the code for a valid token
|
|
|
|
if login_session.csrf_token.secret() != &query.state {
|
|
return Err(MiddlewareError::CsrfTokenInvalid);
|
|
}
|
|
|
|
let token_response = oidcclient
|
|
.client
|
|
.exchange_code(AuthorizationCode::new(query.code.to_string()))
|
|
// Set the PKCE code verifier.
|
|
.set_pkce_verifier(PkceCodeVerifier::new(
|
|
login_session.pkce_verifier.secret().to_string(),
|
|
))
|
|
.request_async(async_http_client)
|
|
.await?;
|
|
|
|
// Extract the ID token claims after verifying its authenticity and nonce.
|
|
let id_token = token_response
|
|
.id_token()
|
|
.ok_or(MiddlewareError::IdTokenMissing)?;
|
|
let claims = id_token
|
|
.claims(&oidcclient.client.id_token_verifier(), &login_session.nonce)?;
|
|
|
|
validate_access_token_hash(id_token, token_response.access_token(), claims)?;
|
|
|
|
login_session.authenticated = Some(AuthenticatedSession {
|
|
id_token: id_token.clone(),
|
|
access_token: token_response.access_token().clone(),
|
|
});
|
|
let refresh_token = token_response.refresh_token().cloned();
|
|
if let Some(refresh_token) = refresh_token {
|
|
login_session.refresh_token = Some(refresh_token);
|
|
}
|
|
|
|
session.insert(SESSION_KEY, login_session).await?;
|
|
|
|
Ok(Redirect::temporary(&handler_uri.to_string()).into_response())
|
|
} else {
|
|
// generate a login url and redirect the user to it
|
|
|
|
let (pkce_challenge, pkce_verifier) = PkceCodeChallenge::new_random_sha256();
|
|
let (auth_url, csrf_token, nonce) = {
|
|
let mut auth = oidcclient.client.authorize_url(
|
|
CoreAuthenticationFlow::AuthorizationCode,
|
|
CsrfToken::new_random,
|
|
Nonce::new_random,
|
|
);
|
|
|
|
for scope in oidcclient.scopes.iter() {
|
|
auth = auth.add_scope(Scope::new(scope.to_string()));
|
|
}
|
|
|
|
auth.set_pkce_challenge(pkce_challenge).url()
|
|
};
|
|
|
|
let oidc_session = OidcSession::<AC> {
|
|
nonce,
|
|
csrf_token,
|
|
pkce_verifier,
|
|
authenticated: None,
|
|
refresh_token: None,
|
|
};
|
|
|
|
session.insert(SESSION_KEY, oidc_session).await?;
|
|
|
|
Ok(Redirect::temporary(auth_url.as_str()).into_response())
|
|
}
|
|
})
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Layer for the [`OidcAuthMiddleware`].
|
|
#[derive(Clone)]
|
|
pub struct OidcAuthLayer<AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
client: OidcClient<AC>,
|
|
}
|
|
|
|
impl<AC: AdditionalClaims> OidcAuthLayer<AC> {
|
|
pub fn new(client: OidcClient<AC>) -> Self {
|
|
Self { client }
|
|
}
|
|
|
|
pub async fn discover_client(
|
|
application_base_url: Uri,
|
|
issuer: String,
|
|
client_id: String,
|
|
client_secret: Option<String>,
|
|
scopes: Vec<String>,
|
|
) -> Result<Self, Error> {
|
|
Ok(Self {
|
|
client: OidcClient::<AC>::discover_new(
|
|
application_base_url,
|
|
issuer,
|
|
client_id,
|
|
client_secret,
|
|
scopes,
|
|
)
|
|
.await?,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl<I, AC> Layer<I> for OidcAuthLayer<AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
type Service = OidcAuthMiddleware<I, AC>;
|
|
|
|
fn layer(&self, inner: I) -> Self::Service {
|
|
OidcAuthMiddleware {
|
|
inner,
|
|
client: self.client.clone(),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// This middleware checks if the cached session is valid and injects the Claims, the AccessToken
|
|
/// and the OidcClient in the request. This middleware needs to be loaded for every handler that is
|
|
/// using on of the Extractors. This middleware **doesn't force a user to be
|
|
/// authenticated**.
|
|
#[derive(Clone)]
|
|
pub struct OidcAuthMiddleware<I, AC>
|
|
where
|
|
AC: AdditionalClaims,
|
|
{
|
|
inner: I,
|
|
client: OidcClient<AC>,
|
|
}
|
|
|
|
impl<I, AC, B> Service<Request<B>> for OidcAuthMiddleware<I, AC>
|
|
where
|
|
I: Service<Request<B>> + Send + 'static + Clone,
|
|
I::Response: IntoResponse + Send,
|
|
I::Error: Send + Into<BoxError>,
|
|
I::Future: Send + 'static,
|
|
AC: AdditionalClaims,
|
|
B: Send + 'static,
|
|
{
|
|
type Response = Response;
|
|
type Error = MiddlewareError;
|
|
type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>;
|
|
|
|
fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
|
|
self.inner
|
|
.poll_ready(cx)
|
|
.map_err(|e| MiddlewareError::NextMiddleware(e.into()))
|
|
}
|
|
|
|
fn call(&mut self, request: Request<B>) -> Self::Future {
|
|
let inner = self.inner.clone();
|
|
let mut inner = std::mem::replace(&mut self.inner, inner);
|
|
let mut oidcclient = self.client.clone();
|
|
Box::pin(async move {
|
|
let (mut parts, body) = request.into_parts();
|
|
|
|
let session = parts
|
|
.extensions
|
|
.get::<Session>()
|
|
.ok_or(MiddlewareError::SessionNotFound)?
|
|
.clone();
|
|
let mut login_session: Option<OidcSession<AC>> = session
|
|
.get(SESSION_KEY)
|
|
.await
|
|
.map_err(MiddlewareError::from)?;
|
|
|
|
let handler_uri =
|
|
strip_oidc_from_path(oidcclient.application_base_url.clone(), &parts.uri)?;
|
|
|
|
oidcclient.client = oidcclient
|
|
.client
|
|
.set_redirect_uri(RedirectUrl::new(handler_uri.to_string())?);
|
|
|
|
if let Some(login_session) = &mut login_session {
|
|
let id_token_claims = login_session.authenticated.as_ref().and_then(|session| {
|
|
session
|
|
.id_token
|
|
.claims(&oidcclient.client.id_token_verifier(), &login_session.nonce)
|
|
.ok()
|
|
.cloned()
|
|
.map(|claims| (session, claims))
|
|
});
|
|
|
|
if let Some((session, claims)) = id_token_claims {
|
|
// stored id token is valid and can be used
|
|
insert_extensions(&mut parts, claims.clone(), &oidcclient, session);
|
|
} else if let Some(refresh_token) = login_session.refresh_token.as_ref() {
|
|
if let Some((claims, authenticated_session, refresh_token)) =
|
|
try_refresh_token(&oidcclient, refresh_token, &login_session.nonce).await?
|
|
{
|
|
insert_extensions(&mut parts, claims, &oidcclient, &authenticated_session);
|
|
login_session.authenticated = Some(authenticated_session);
|
|
|
|
if let Some(refresh_token) = refresh_token {
|
|
login_session.refresh_token = Some(refresh_token);
|
|
}
|
|
};
|
|
|
|
// save refreshed session or delete it when the token couldn't be refreshed
|
|
let session = parts
|
|
.extensions
|
|
.get::<Session>()
|
|
.ok_or(MiddlewareError::SessionNotFound)?;
|
|
|
|
session.insert(SESSION_KEY, login_session).await?;
|
|
}
|
|
}
|
|
|
|
parts.extensions.insert(oidcclient);
|
|
|
|
let request = Request::from_parts(parts, body);
|
|
let response: Response = inner
|
|
.call(request)
|
|
.await
|
|
.map_err(|e| MiddlewareError::NextMiddleware(e.into()))?
|
|
.into_response();
|
|
|
|
let has_logout_ext = response.extensions().get::<ClearSessionFlag>().is_some();
|
|
if let (true, Some(mut login_session)) = (has_logout_ext, login_session) {
|
|
login_session.authenticated = None;
|
|
session.insert(SESSION_KEY, login_session).await?;
|
|
}
|
|
|
|
Ok(response)
|
|
})
|
|
}
|
|
}
|
|
|
|
/// Helper function to remove the OpenID Connect authentication response query attributes from a
|
|
/// [`Uri`].
|
|
pub fn strip_oidc_from_path(base_url: Uri, uri: &Uri) -> Result<Uri, MiddlewareError> {
|
|
let mut base_url = base_url.into_parts();
|
|
|
|
base_url.path_and_query = uri
|
|
.path_and_query()
|
|
.map(|path_and_query| {
|
|
let query = path_and_query
|
|
.query()
|
|
.and_then(|uri| {
|
|
uri.split('&')
|
|
.filter(|x| {
|
|
!x.starts_with("code")
|
|
&& !x.starts_with("state")
|
|
&& !x.starts_with("session_state")
|
|
&& !x.starts_with("iss")
|
|
})
|
|
.map(|x| x.to_string())
|
|
.reduce(|acc, x| acc + "&" + &x)
|
|
})
|
|
.map(|x| format!("?{x}"))
|
|
.unwrap_or_default();
|
|
|
|
PathAndQuery::from_maybe_shared(format!("{}{}", path_and_query.path(), query))
|
|
})
|
|
.transpose()?;
|
|
|
|
Ok(Uri::from_parts(base_url)?)
|
|
}
|
|
|
|
/// insert all extensions that are used by the extractors
|
|
fn insert_extensions<AC: AdditionalClaims>(
|
|
parts: &mut Parts,
|
|
claims: IdTokenClaims<AC, CoreGenderClaim>,
|
|
client: &OidcClient<AC>,
|
|
authenticated_session: &AuthenticatedSession<AC>,
|
|
) {
|
|
parts.extensions.insert(OidcClaims(claims));
|
|
parts.extensions.insert(OidcAccessToken(
|
|
authenticated_session.access_token.secret().to_string(),
|
|
));
|
|
if let Some(end_session_endpoint) = &client.end_session_endpoint {
|
|
parts.extensions.insert(OidcRpInitiatedLogout {
|
|
end_session_endpoint: end_session_endpoint.clone(),
|
|
id_token_hint: authenticated_session.id_token.to_string(),
|
|
client_id: client.client_id.clone(),
|
|
post_logout_redirect_uri: None,
|
|
state: None,
|
|
});
|
|
}
|
|
}
|
|
|
|
/// Verify the access token hash to ensure that the access token hasn't been substituted for
|
|
/// another user's.
|
|
/// Returns `Ok` when access token is valid
|
|
fn validate_access_token_hash<AC: AdditionalClaims>(
|
|
id_token: &IdToken<AC>,
|
|
access_token: &AccessToken,
|
|
claims: &IdTokenClaims<AC, CoreGenderClaim>,
|
|
) -> Result<(), MiddlewareError> {
|
|
if let Some(expected_access_token_hash) = claims.access_token_hash() {
|
|
let actual_access_token_hash =
|
|
AccessTokenHash::from_token(access_token, &id_token.signing_alg()?)?;
|
|
if actual_access_token_hash == *expected_access_token_hash {
|
|
Ok(())
|
|
} else {
|
|
Err(MiddlewareError::AccessTokenHashInvalid)
|
|
}
|
|
} else {
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
async fn try_refresh_token<AC: AdditionalClaims>(
|
|
client: &OidcClient<AC>,
|
|
refresh_token: &RefreshToken,
|
|
nonce: &Nonce,
|
|
) -> Result<
|
|
Option<(
|
|
IdTokenClaims<AC, CoreGenderClaim>,
|
|
AuthenticatedSession<AC>,
|
|
Option<RefreshToken>,
|
|
)>,
|
|
MiddlewareError,
|
|
> {
|
|
let mut refresh_request = client.client.exchange_refresh_token(refresh_token);
|
|
|
|
for scope in client.scopes.iter() {
|
|
refresh_request = refresh_request.add_scope(Scope::new(scope.to_string()));
|
|
}
|
|
|
|
match refresh_request.request_async(async_http_client).await {
|
|
Ok(token_response) => {
|
|
// Extract the ID token claims after verifying its authenticity and nonce.
|
|
let id_token = token_response
|
|
.id_token()
|
|
.ok_or(MiddlewareError::IdTokenMissing)?;
|
|
let claims = id_token.claims(&client.client.id_token_verifier(), nonce)?;
|
|
|
|
validate_access_token_hash(id_token, token_response.access_token(), claims)?;
|
|
|
|
let authenticated_session = AuthenticatedSession {
|
|
id_token: id_token.clone(),
|
|
access_token: token_response.access_token().clone(),
|
|
};
|
|
|
|
Ok(Some((
|
|
claims.clone(),
|
|
authenticated_session,
|
|
token_response.refresh_token().cloned(),
|
|
)))
|
|
}
|
|
Err(ServerResponse(e)) if *e.error() == CoreErrorResponseType::InvalidGrant => {
|
|
// Refresh failed, refresh_token most likely expired or
|
|
// invalid, the session can be considered lost
|
|
Ok(None)
|
|
}
|
|
Err(err) => Err(err.into()),
|
|
}
|
|
}
|