Skip to content
Snippets Groups Projects
Unverified Commit affd4d4e authored by Sean Liao's avatar Sean Liao Committed by GitHub
Browse files

verify access tokens by checking getuserinfo during a token exchange (#3031)


The provider.Verifier.Verify endpoint we were using only works with ID
tokens. This isn't an issue with systems which use ID tokens as access
tokens (e.g. dex), but for systems with opaque access tokens (e.g.
Google / GCP), those access tokens could not be verified.
Instead, check the access token against the getUserInfo endpoint.

Signed-off-by: default avatarSean Liao <sean+git@liao.dev>
Co-authored-by: default avatarMaksim Nabokikh <max.nabokih@gmail.com>
parent f2358ef2
No related branches found
No related tags found
No related merge requests found
...@@ -301,6 +301,7 @@ func (c *oidcConnector) TokenIdentity(ctx context.Context, subjectTokenType, sub ...@@ -301,6 +301,7 @@ func (c *oidcConnector) TokenIdentity(ctx context.Context, subjectTokenType, sub
var identity connector.Identity var identity connector.Identity
token := &oauth2.Token{ token := &oauth2.Token{
AccessToken: subjectToken, AccessToken: subjectToken,
TokenType: subjectTokenType,
} }
return c.createIdentity(ctx, identity, token, exchangeCaller) return c.createIdentity(ctx, identity, token, exchangeCaller)
} }
...@@ -318,20 +319,30 @@ func (c *oidcConnector) createIdentity(ctx context.Context, identity connector.I ...@@ -318,20 +319,30 @@ func (c *oidcConnector) createIdentity(ctx context.Context, identity connector.I
return identity, fmt.Errorf("oidc: failed to decode claims: %v", err) return identity, fmt.Errorf("oidc: failed to decode claims: %v", err)
} }
} else if caller == exchangeCaller { } else if caller == exchangeCaller {
// AccessToken here could be either an id token or an access token switch token.TokenType {
idToken, err := c.provider.Verifier(&oidc.Config{SkipClientIDCheck: true}).Verify(ctx, token.AccessToken) case "urn:ietf:params:oauth:token-type:id_token":
if err != nil { // Verify only works on ID tokens
return identity, fmt.Errorf("oidc: failed to verify token: %v", err) idToken, err := c.provider.Verifier(&oidc.Config{SkipClientIDCheck: true}).Verify(ctx, token.AccessToken)
} if err != nil {
if err := idToken.Claims(&claims); err != nil { return identity, fmt.Errorf("oidc: failed to verify token: %v", err)
return identity, fmt.Errorf("oidc: failed to decode claims: %v", err) }
if err := idToken.Claims(&claims); err != nil {
return identity, fmt.Errorf("oidc: failed to decode claims: %v", err)
}
case "urn:ietf:params:oauth:token-type:access_token":
if !c.getUserInfo {
return identity, fmt.Errorf("oidc: getUserInfo is required for access token exchange")
}
default:
return identity, fmt.Errorf("unknown token type for token exchange: %s", token.TokenType)
} }
} else if caller != refreshCaller { } else if caller != refreshCaller {
// ID tokens aren't mandatory in the reply when using a refresh_token grant // ID tokens aren't mandatory in the reply when using a refresh_token grant
return identity, errors.New("oidc: no id_token in token response") return identity, errors.New("oidc: no id_token in token response")
} }
// We immediately want to run getUserInfo if configured before we validate the claims // We immediately want to run getUserInfo if configured before we validate the claims.
// For token exchanges with access tokens, this is how we verify the token.
if c.getUserInfo { if c.getUserInfo {
userInfo, err := c.provider.UserInfo(ctx, oauth2.StaticTokenSource(token)) userInfo, err := c.provider.UserInfo(ctx, oauth2.StaticTokenSource(token))
if err != nil { if err != nil {
......
...@@ -441,6 +441,7 @@ func TestTokenIdentity(t *testing.T) { ...@@ -441,6 +441,7 @@ func TestTokenIdentity(t *testing.T) {
name string name string
subjectType string subjectType string
userInfo bool userInfo bool
expectError bool
}{ }{
{ {
name: "id_token", name: "id_token",
...@@ -448,6 +449,7 @@ func TestTokenIdentity(t *testing.T) { ...@@ -448,6 +449,7 @@ func TestTokenIdentity(t *testing.T) {
}, { }, {
name: "access_token", name: "access_token",
subjectType: tokenTypeAccess, subjectType: tokenTypeAccess,
expectError: true,
}, { }, {
name: "id_token with user info", name: "id_token with user info",
subjectType: tokenTypeID, subjectType: tokenTypeID,
...@@ -494,6 +496,9 @@ func TestTokenIdentity(t *testing.T) { ...@@ -494,6 +496,9 @@ func TestTokenIdentity(t *testing.T) {
origToken := tokenResponse[long2short[tc.subjectType]].(string) origToken := tokenResponse[long2short[tc.subjectType]].(string)
identity, err := conn.TokenIdentity(ctx, tc.subjectType, origToken) identity, err := conn.TokenIdentity(ctx, tc.subjectType, origToken)
if err != nil { if err != nil {
if tc.expectError {
return
}
t.Fatal("failed to get token identity", err) t.Fatal("failed to get token identity", err)
} }
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment