1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2025-06-21 00:29:44 +02:00

Issue 978: Fix Custom cookie name breaks redis for session (#1949)

* Issue 978: Fix Custom cookie name breaks redis for session (see https://github.com/oauth2-proxy/oauth2-proxy/issues/978)

* Issue 978: Fix Custom cookie name breaks redis for session (see https://github.com/oauth2-proxy/oauth2-proxy/issues/978)

* Update CHANGELOG.md

* Issue 978: Fix Custom cookie name breaks redis for session

* Issue 978: Fix Custom cookie name breaks redis for session

* Issue 978: Fix Custom cookie name breaks redis for session

* Issue 978: Fix Custom cookie name breaks redis for session

* Issue 978: Fix Custom cookie name breaks redis for session

* Issue 978: Fix Custom cookie name breaks redis for session

* Update CHANGELOG.md

---------

Co-authored-by: Nuno Borges <Nuno.Borges@ctw.bmwgroup.com>
Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
This commit is contained in:
Nuno Miguel Micaelo Borges
2023-11-18 14:23:00 +00:00
committed by GitHub
parent bee7879cb2
commit 1e61b65e28
3 changed files with 58 additions and 11 deletions

View File

@ -17,6 +17,7 @@
- [#2282](https://github.com/oauth2-proxy/oauth2-proxy/pull/2282) Fixed checking Google Groups membership using Google Application Credentials (@kvanzuijlen)
- [#2183](https://github.com/oauth2-proxy/oauth2-proxy/pull/2183) Allowing relative redirect url though an option (@axel7083)
- [#1866](https://github.com/oauth2-proxy/oauth2-proxy/pull/1866) Add support for unix socker as upstream (@babs)
- [#1949](https://github.com/oauth2-proxy/oauth2-proxy/pull/1949) Allow cookie names with dots in redis sessions (@miguelborges99)
- [#2297](https://github.com/oauth2-proxy/oauth2-proxy/pull/2297) Add nightly build and push (@tuunit)
# V7.5.1

View File

@ -67,22 +67,68 @@ func newTicket(cookieOpts *options.Cookie) (*ticket, error) {
// encodeTicket encodes the Ticket to a string for usage in cookies
func (t *ticket) encodeTicket() string {
return fmt.Sprintf("%s.%s", t.id, base64.RawURLEncoding.EncodeToString(t.secret))
return fmt.Sprintf("v2.%s.%s", base64.RawURLEncoding.EncodeToString([]byte(t.id)),
base64.RawURLEncoding.EncodeToString(t.secret))
}
// decodeTicketID Tickets are encoded with format: {encoding version}.{ticketID base64}.{ticketSecret base 64}.
// Tickets from old oauth2-proxy versions do not have the same format, and this method tries
// to decode the ticket ID part based on the encoding version, or lack of it.
func decodeTicketID(ticketParts []string) (string, error) {
switch {
case len(ticketParts) == 2:
// old ticket encoding
return ticketParts[0], nil
case len(ticketParts) == 3 && ticketParts[0] == "v2":
// v2 ticket encoding
ticketID, err := base64.RawURLEncoding.DecodeString(ticketParts[1])
if err != nil {
return "", fmt.Errorf("failed to decode ticket Id: %v", err)
}
return string(ticketID), nil
default:
return "", errors.New("failed to decode ticket Id")
}
}
// decodeTicketSecret Tickets are encoded with format: {encoding version}.{ticketID base64}.{ticketSecret base 64}.
// Tickets from old oauth2-proxy versions do not have the same format, and this method tries
// to decode the ticket secret part based on the encoding version, or lack of it.
func decodeTicketSecret(ticketParts []string) ([]byte, error) {
switch {
case len(ticketParts) == 2:
// old ticket encoding
secret, err := base64.RawURLEncoding.DecodeString(ticketParts[1])
if err != nil {
return nil, fmt.Errorf("failed to decode encryption secret: %v", err)
}
return secret, nil
case len(ticketParts) == 3 && ticketParts[0] == "v2":
// new ticket encode
secret, err := base64.RawURLEncoding.DecodeString(ticketParts[2])
if err != nil {
return nil, fmt.Errorf("failed to decode encryption secret: %v", err)
}
return secret, nil
default:
return nil, errors.New("failed to decode encryption secret")
}
}
// decodeTicket decodes an encoded ticket string
func decodeTicket(encTicket string, cookieOpts *options.Cookie) (*ticket, error) {
ticketParts := strings.Split(encTicket, ".")
if len(ticketParts) != 2 {
if len(ticketParts) != 2 && len(ticketParts) != 3 {
return nil, errors.New("failed to decode ticket")
}
ticketID, secretBase64 := ticketParts[0], ticketParts[1]
secret, err := base64.RawURLEncoding.DecodeString(secretBase64)
if err != nil {
return nil, fmt.Errorf("failed to decode encryption secret: %v", err)
ticketID, errTicketID := decodeTicketID(ticketParts)
if errTicketID != nil {
return nil, fmt.Errorf("failed to decode ticket: %v", errTicketID)
}
secret, errSecret := decodeTicketSecret(ticketParts)
if errSecret != nil {
return nil, fmt.Errorf("failed to decode ticket: %v", errSecret)
}
return &ticket{
id: ticketID,
secret: secret,

View File

@ -43,8 +43,8 @@ var _ = Describe("Session Ticket Tests", func() {
Name: "dummy",
},
},
encodedTicket: fmt.Sprintf("%s.%s",
"dummy-0123456789abcdef",
encodedTicket: fmt.Sprintf("v2.%s.%s",
base64.RawURLEncoding.EncodeToString([]byte("dummy-0123456789abcdef")),
base64.RawURLEncoding.EncodeToString([]byte("0123456789abcdef"))),
expectedError: nil,
}),
@ -56,7 +56,7 @@ var _ = Describe("Session Ticket Tests", func() {
Entry("with an invalid base64 encoded secret", ticketTableInput{
ticket: nil,
encodedTicket: "dummy-0123456789abcdef.@)#($*@)#(*$@)#(*$",
expectedError: fmt.Errorf("failed to decode encryption secret: illegal base64 data at input byte 0"),
expectedError: fmt.Errorf("failed to decode ticket: failed to decode encryption secret: illegal base64 data at input byte 0"),
}),
)
})