libreoffice-online/loolwsd/Auth.cpp

239 lines
8.5 KiB
C++
Raw Normal View History

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */
/*
* This file is part of the LibreOffice project.
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*/
#include "Auth.hpp"
#include "config.h"
#include <cstdlib>
#include <string>
#include <Poco/Base64Decoder.h>
#include <Poco/Base64Encoder.h>
#include <Poco/Crypto/RSADigestEngine.h>
#include <Poco/Crypto/RSAKey.h>
#include <Poco/Dynamic/Var.h>
#include <Poco/JSON/Object.h>
#include <Poco/JSON/Parser.h>
#include <Poco/LineEndingConverter.h>
#include <Poco/Net/HTTPClientSession.h>
#include <Poco/Net/HTTPRequest.h>
#include <Poco/Net/HTTPResponse.h>
#include <Poco/Net/NetException.h>
#include <Poco/StringTokenizer.h>
#include <Poco/Timestamp.h>
#include <Poco/URI.h>
#include "Log.hpp"
#include "Util.hpp"
using Poco::Base64Decoder;
using Poco::Base64Encoder;
using Poco::OutputLineEndingConverter;
const std::string JWTAuth::getAccessToken()
{
std::string encodedHeader = createHeader();
std::string encodedPayload = createPayload();
// trim '=' from end of encoded header
encodedHeader.erase(std::find_if(encodedHeader.rbegin(), encodedHeader.rend(),
[](char& ch)->bool {return ch != '='; }).base(), encodedHeader.end());
// trim '=' from end of encoded payload
encodedPayload.erase(std::find_if(encodedPayload.rbegin(), encodedPayload.rend(),
[](char& ch)->bool { return ch != '='; }).base(), encodedPayload.end());
Log::info("Encoded JWT header: " + encodedHeader);
Log::info("Encoded JWT payload: " + encodedPayload);
// Convert to a URL and filename safe variant:
// Replace '+' with '-' && '/' with '_'
std::replace(encodedHeader.begin(), encodedHeader.end(), '+','-');
std::replace(encodedHeader.begin(), encodedHeader.end(), '/','_');
std::replace(encodedPayload.begin(), encodedPayload.end(), '+','-');
std::replace(encodedPayload.begin(), encodedPayload.end(), '/','_');
std::string encodedBody = encodedHeader + "." + encodedPayload;
// sign the encoded body
_digestEngine.update(encodedBody.c_str(), static_cast<unsigned>(encodedBody.length()));
Poco::Crypto::DigestEngine::Digest digest = _digestEngine.signature();
// The signature generated contains CRLF line endings.
// Use a line ending converter to remove these CRLF
std::ostringstream ostr;
OutputLineEndingConverter lineEndingConv(ostr, "");
Base64Encoder encoder(lineEndingConv);
encoder << std::string(digest.begin(), digest.end());
encoder.close();
std::string encodedSig = ostr.str();
// trim '=' from end of encoded signature
encodedSig.erase(std::find_if(encodedSig.rbegin(), encodedSig.rend(),
[](char& ch)->bool { return ch != '='; }).base(), encodedSig.end());
// Be URL and filename safe
std::replace(encodedSig.begin(), encodedSig.end(), '+','-');
std::replace(encodedSig.begin(), encodedSig.end(), '/','_');
Log::info("Sig generated is : " + encodedSig);
const std::string jwtToken = encodedBody + "." + encodedSig;
Log::info("JWT token generated: " + jwtToken);
return jwtToken;
}
bool JWTAuth::verify(const std::string& accessToken)
{
Poco::StringTokenizer tokens(accessToken, ".", Poco::StringTokenizer::TOK_IGNORE_EMPTY | Poco::StringTokenizer::TOK_TRIM);
try
{
std::string encodedBody = tokens[0] + "." + tokens[1];
_digestEngine.update(encodedBody.c_str(), static_cast<unsigned>(encodedBody.length()));
Poco::Crypto::DigestEngine::Digest digest = _digestEngine.signature();
std::ostringstream ostr;
OutputLineEndingConverter lineEndingConv(ostr, "");
Base64Encoder encoder(lineEndingConv);
encoder << std::string(digest.begin(), digest.end());
encoder.close();
std::string encodedSig = ostr.str();
// trim '=' from end of encoded signature.
encodedSig.erase(std::find_if(encodedSig.rbegin(), encodedSig.rend(),
[](char& ch)->bool { return ch != '='; }).base(), encodedSig.end());
// Make the encoded sig URL and filename safe
std::replace(encodedSig.begin(), encodedSig.end(), '+', '-');
std::replace(encodedSig.begin(), encodedSig.end(), '/', '_');
if (encodedSig != tokens[2])
{
Log::info("JWTAuth: verification failed; Expected: " + encodedSig + ", Received: " + tokens[2]);
return false;
}
std::istringstream istr(tokens[1]);
std::string decodedPayload;
Base64Decoder decoder(istr);
decoder >> decodedPayload;
Log::info("JWTAuth:verify: decoded payload: " + decodedPayload);
// Verify if the token is not already expired
Poco::JSON::Parser parser;
Poco::Dynamic::Var result = parser.parse(decodedPayload);
Poco::JSON::Object::Ptr object = result.extract<Poco::JSON::Object::Ptr>();
std::time_t decodedExptime = object->get("exp").convert<std::time_t>();
std::time_t curtime = Poco::Timestamp().epochTime();
if (curtime > decodedExptime)
{
Log::info("JWTAuth:verify: JWT expired; curtime:" + std::to_string(curtime) + ", exp:" + std::to_string(decodedExptime));
return false;
}
}
catch(Poco::Exception& exc)
{
Log::warn("JWTAuth:verify: Exception: " + exc.displayText());
return false;
}
return true;
}
const std::string JWTAuth::createHeader()
{
// TODO: Some sane code to represent JSON objects
std::string header = "{\"alg\":\""+_alg+"\",\"typ\":\""+_typ+"\"}";
Log::info("JWT Header: " + header);
std::ostringstream ostr;
OutputLineEndingConverter lineEndingConv(ostr, "");
Base64Encoder encoder(lineEndingConv);
encoder << header;
encoder.close();
return ostr.str();
}
const std::string JWTAuth::createPayload()
{
std::time_t curtime = Poco::Timestamp().epochTime();
std::string exptime = std::to_string(curtime + 1800);
// TODO: Some sane code to represent JSON objects
std::string payload = "{\"iss\":\""+_iss+"\",\"sub\":\""+_sub+"\",\"aud\":\""+_aud+"\",\"nme\":\""+_name+"\",\"exp\":\""+exptime+"\"}";
Log::info("JWT Payload: " + payload);
std::ostringstream ostr;
OutputLineEndingConverter lineEndingConv(ostr, "");
Base64Encoder encoder(lineEndingConv);
encoder << payload;
encoder.close();
return ostr.str();
}
//TODO: This MUST be done over TLS to protect the token.
const std::string OAuth::getAccessToken()
{
std::string url = _tokenEndPoint
+ "?client_id=" + _clientId
+ "&client_secret=" + _clientSecret
+ "&grant_type=authorization_code"
+ "&code=" + _authorizationCode;
// + "&redirect_uri="
Poco::URI uri(url);
Poco::Net::HTTPClientSession session(uri.getHost(), uri.getPort());
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_POST, url, Poco::Net::HTTPMessage::HTTP_1_1);
Poco::Net::HTTPResponse response;
session.sendRequest(request);
std::istream& rs = session.receiveResponse(response);
Log::info() << "Status: " << response.getStatus() << " " << response.getReason() << Log::end;
std::string reply(std::istreambuf_iterator<char>(rs), {});
Log::info("Response: " + reply);
//TODO: Parse the token.
return std::string();
}
bool OAuth::verify(const std::string& token)
{
const std::string url = _authVerifyUrl + token;
Log::debug("Verifying authorization token from: " + url);
Poco::URI uri(url);
Poco::Net::HTTPClientSession session(uri.getHost(), uri.getPort());
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_GET, url, Poco::Net::HTTPMessage::HTTP_1_1);
Poco::Net::HTTPResponse response;
session.sendRequest(request);
std::istream& rs = session.receiveResponse(response);
Log::info() << "Status: " << response.getStatus() << " " << response.getReason() << Log::end;
std::string reply(std::istreambuf_iterator<char>(rs), {});
Log::info("Response: " + reply);
//TODO: Parse the response.
/*
// This is used for the demo site.
const auto lastLogTime = std::strtoul(reply.c_str(), nullptr, 0);
if (lastLogTime < 1)
{
//TODO: Redirect to login page.
return;
}
*/
return true;
}
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */