2022-07-07 20:11:50 +00:00
|
|
|
// Copyright (c) All respective contributors to the Peridot Project. All rights reserved.
|
|
|
|
// Copyright (c) 2021-2022 Rocky Enterprise Software Foundation, Inc. All rights reserved.
|
|
|
|
// Copyright (c) 2021-2022 Ctrl IQ, Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without
|
|
|
|
// modification, are permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
// this list of conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
// this list of conditions and the following disclaimer in the documentation
|
|
|
|
// and/or other materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors
|
|
|
|
// may be used to endorse or promote products derived from this software without
|
|
|
|
// specific prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
// POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
package obsidianimplv1
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2024-02-24 00:34:55 +00:00
|
|
|
"peridot.resf.org/utils"
|
|
|
|
|
|
|
|
"github.com/ory/hydra-client-go/v2"
|
2022-07-07 20:11:50 +00:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
|
|
|
obsidianpb "peridot.resf.org/obsidian/pb"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
invalidCheckType = "invalid_check_type"
|
|
|
|
challengeRequired = "challenge_required"
|
|
|
|
logoutChallengeRequired = "logout_challenge_required"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (s *Server) SessionStatus(_ context.Context, req *obsidianpb.SessionStatusRequest) (*obsidianpb.SessionStatusResponse, error) {
|
|
|
|
allowedTypes := map[string]bool{"login": true, "consent": true}
|
|
|
|
if !allowedTypes[req.CheckType] {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, invalidCheckType)
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Challenge == "" {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, challengeRequired)
|
|
|
|
}
|
|
|
|
|
|
|
|
var res *obsidianpb.SessionStatusResponse
|
|
|
|
var err error
|
|
|
|
switch req.CheckType {
|
|
|
|
case "login":
|
|
|
|
res, err = s.ProcessLoginRequest(req.Challenge)
|
|
|
|
break
|
|
|
|
case "consent":
|
|
|
|
res, err = s.ProcessConsentRequest(req.Challenge)
|
|
|
|
break
|
|
|
|
default:
|
|
|
|
return nil, status.Error(codes.InvalidArgument, "")
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return res, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) ConsentDecision(ctx context.Context, req *obsidianpb.ConsentDecisionRequest) (*obsidianpb.ConsentDecisionResponse, error) {
|
|
|
|
if req.Challenge == "" {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, challengeRequired)
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
consentReq, _, err := s.hydra.OAuth2API.GetOAuth2ConsentRequest(ctx).ConsentChallenge(req.Challenge).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Error(err)
|
|
|
|
return nil, status.Error(codes.Internal, authError)
|
|
|
|
}
|
|
|
|
|
|
|
|
var redirectURL string
|
|
|
|
|
|
|
|
if req.Allow {
|
|
|
|
res, err := s.AcceptConsentRequest(ctx, req.Challenge, consentReq)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if !res.Valid {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, "invalid consent request")
|
|
|
|
}
|
|
|
|
redirectURL = res.RedirectUrl
|
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
res, _, err := s.hydra.OAuth2API.RejectOAuth2ConsentRequest(ctx).RejectOAuth2Request(client.RejectOAuth2Request{
|
|
|
|
Error: utils.Pointer[string]("no_consent"),
|
|
|
|
ErrorDescription: utils.Pointer[string]("User does not consent to data sharing"),
|
|
|
|
StatusCode: utils.Pointer[int64](int64(codes.Aborted)),
|
|
|
|
}).ConsentChallenge(req.Challenge).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Errorf("error rejecting consent request: %s", err.Error())
|
|
|
|
return nil, status.Error(codes.Internal, authError)
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
redirectURL = res.RedirectTo
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &obsidianpb.ConsentDecisionResponse{
|
|
|
|
RedirectUrl: redirectURL,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) LogoutDecision(ctx context.Context, req *obsidianpb.LogoutDecisionRequest) (*obsidianpb.LogoutDecisionResponse, error) {
|
|
|
|
if req.Challenge == "" {
|
|
|
|
return nil, status.Error(codes.InvalidArgument, logoutChallengeRequired)
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
logout, _, err := s.hydra.OAuth2API.GetOAuth2LogoutRequest(ctx).LogoutChallenge(req.Challenge).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Error(err)
|
|
|
|
return nil, status.Error(codes.Internal, authError)
|
|
|
|
}
|
|
|
|
|
|
|
|
var redirectURL string
|
|
|
|
if req.Accept {
|
2024-02-24 00:34:55 +00:00
|
|
|
_, err = s.hydra.OAuth2API.RevokeOAuth2ConsentSessions(ctx).Subject(*logout.Subject).All(true).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Errorf("error revoking consent sessions: %s", err.Error())
|
|
|
|
return nil, status.Error(codes.Internal, "error revoking consent sessions")
|
|
|
|
}
|
|
|
|
|
2024-02-24 00:34:55 +00:00
|
|
|
acceptReq, _, err := s.hydra.OAuth2API.AcceptOAuth2LogoutRequest(ctx).LogoutChallenge(req.Challenge).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Errorf("error accepting logout request: %s", err.Error())
|
|
|
|
return nil, status.Error(codes.Internal, "error accepting logout request")
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
redirectURL = acceptReq.RedirectTo
|
2022-07-07 20:11:50 +00:00
|
|
|
} else {
|
2024-02-24 00:34:55 +00:00
|
|
|
_, err = s.hydra.OAuth2API.RejectOAuth2LogoutRequest(ctx).LogoutChallenge(req.Challenge).Execute()
|
2022-07-07 20:11:50 +00:00
|
|
|
if err != nil {
|
|
|
|
s.log.Errorf("error rejecting logout request: %s", err.Error())
|
|
|
|
return nil, status.Error(codes.Internal, "error rejecting logout request")
|
|
|
|
}
|
2024-02-24 00:34:55 +00:00
|
|
|
redirectURL = *logout.RequestUrl
|
2022-07-07 20:11:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &obsidianpb.LogoutDecisionResponse{
|
|
|
|
RedirectUrl: redirectURL,
|
|
|
|
}, nil
|
|
|
|
}
|