2015-05-13 03:48:13 +02:00
|
|
|
package providers
|
|
|
|
|
|
|
|
import (
|
2020-05-05 17:53:33 +02:00
|
|
|
"context"
|
2015-06-22 21:10:08 +02:00
|
|
|
"io/ioutil"
|
2015-05-13 03:48:13 +02:00
|
|
|
"net/http"
|
2015-06-22 21:10:08 +02:00
|
|
|
"net/url"
|
|
|
|
|
2020-03-29 15:54:36 +02:00
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/logger"
|
|
|
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/requests"
|
2015-05-13 03:48:13 +02:00
|
|
|
)
|
|
|
|
|
2016-08-03 04:27:50 +02:00
|
|
|
// stripToken is a helper function to obfuscate "access_token"
|
|
|
|
// query parameters
|
|
|
|
func stripToken(endpoint string) string {
|
|
|
|
return stripParam("access_token", endpoint)
|
|
|
|
}
|
|
|
|
|
|
|
|
// stripParam generalizes the obfuscation of a particular
|
|
|
|
// query parameter - typically 'access_token' or 'client_secret'
|
|
|
|
// The parameter's second half is replaced by '...' and returned
|
|
|
|
// as part of the encoded query parameters.
|
|
|
|
// If the target parameter isn't found, the endpoint is returned
|
|
|
|
// unmodified.
|
|
|
|
func stripParam(param, endpoint string) string {
|
|
|
|
u, err := url.Parse(endpoint)
|
|
|
|
if err != nil {
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("error attempting to strip %s: %s", param, err)
|
2016-08-03 04:27:50 +02:00
|
|
|
return endpoint
|
|
|
|
}
|
|
|
|
|
|
|
|
if u.RawQuery != "" {
|
|
|
|
values, err := url.ParseQuery(u.RawQuery)
|
|
|
|
if err != nil {
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("error attempting to strip %s: %s", param, err)
|
2016-08-03 04:27:50 +02:00
|
|
|
return u.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
if val := values.Get(param); val != "" {
|
|
|
|
values.Set(param, val[:(len(val)/2)]+"...")
|
|
|
|
u.RawQuery = values.Encode()
|
|
|
|
return u.String()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return endpoint
|
|
|
|
}
|
|
|
|
|
2015-06-23 13:23:39 +02:00
|
|
|
// validateToken returns true if token is valid
|
2020-05-05 17:53:33 +02:00
|
|
|
func validateToken(ctx context.Context, p Provider, accessToken string, header http.Header) bool {
|
2019-06-14 17:33:05 +02:00
|
|
|
if accessToken == "" || p.Data().ValidateURL == nil || p.Data().ValidateURL.String() == "" {
|
2015-05-13 03:48:13 +02:00
|
|
|
return false
|
|
|
|
}
|
2015-11-09 01:47:44 +02:00
|
|
|
endpoint := p.Data().ValidateURL.String()
|
2015-05-13 03:48:13 +02:00
|
|
|
if len(header) == 0 {
|
2018-11-29 16:26:41 +02:00
|
|
|
params := url.Values{"access_token": {accessToken}}
|
2015-06-22 21:10:08 +02:00
|
|
|
endpoint = endpoint + "?" + params.Encode()
|
2015-05-13 03:48:13 +02:00
|
|
|
}
|
2020-05-05 17:53:33 +02:00
|
|
|
resp, err := requests.RequestUnparsedResponse(ctx, endpoint, header)
|
2015-06-22 21:10:08 +02:00
|
|
|
if err != nil {
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("GET %s", stripToken(endpoint))
|
|
|
|
logger.Printf("token validation request failed: %s", err)
|
2015-05-13 03:48:13 +02:00
|
|
|
return false
|
|
|
|
}
|
2015-06-22 21:10:08 +02:00
|
|
|
|
|
|
|
body, _ := ioutil.ReadAll(resp.Body)
|
|
|
|
resp.Body.Close()
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("%d GET %s %s", resp.StatusCode, stripToken(endpoint), body)
|
2015-06-23 13:23:39 +02:00
|
|
|
|
2015-06-22 21:10:08 +02:00
|
|
|
if resp.StatusCode == 200 {
|
|
|
|
return true
|
|
|
|
}
|
2019-02-10 18:37:45 +02:00
|
|
|
logger.Printf("token validation request failed: status %d - %s", resp.StatusCode, body)
|
2015-06-22 21:10:08 +02:00
|
|
|
return false
|
2015-05-13 03:48:13 +02:00
|
|
|
}
|