Skip to content

Commit b80ce4d

Browse files
authored
OAuth fixes and improvements (#353)
* Fix App ID caching issue (and add tests to match) * Improve error messages for all OAuth providers
1 parent 5025170 commit b80ce4d

File tree

8 files changed

+67
-35
lines changed

8 files changed

+67
-35
lines changed

Dockerfile.test.unit

+12-1
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,13 @@
2424

2525
FROM alpine:3.9
2626

27+
ENV CJOSE_VERSION=0.5.1
28+
2729
RUN apk update && \
2830
apk add \
2931
gcc tar zlib wget make musl-dev g++ curl \
3032
libtool readline luajit luajit-dev unzip \
31-
openssl openssl-dev
33+
openssl openssl-dev git jansson jansson-dev
3234

3335
WORKDIR /tmp
3436
RUN wget https://luarocks.org/releases/luarocks-3.1.3.tar.gz && \
@@ -38,6 +40,15 @@ RUN wget https://luarocks.org/releases/luarocks-3.1.3.tar.gz && \
3840
make build && \
3941
make install
4042

43+
RUN echo " ... installing cjose ... " \
44+
&& mkdir -p /tmp/api-gateway \
45+
&& curl -L -k https://github.com/cisco/cjose/archive/${CJOSE_VERSION}.tar.gz -o /tmp/api-gateway/cjose-${CJOSE_VERSION}.tar.gz \
46+
&& tar -xf /tmp/api-gateway/cjose-${CJOSE_VERSION}.tar.gz -C /tmp/api-gateway/ \
47+
&& cd /tmp/api-gateway/cjose-${CJOSE_VERSION} \
48+
&& sh configure \
49+
&& make && make install \
50+
&& rm -rf /tmp/api-gateway
51+
4152
COPY . /etc/api-gateway
4253

4354
WORKDIR /etc/api-gateway/tests

scripts/lua/oauth/app-id.lua

+39-24
Original file line numberDiff line numberDiff line change
@@ -23,26 +23,39 @@ local _M = {}
2323
local http = require 'resty.http'
2424
local cjose = require 'resty.cjose'
2525

26-
function _M.process(dataStore, token, securityObj)
27-
local result = dataStore:getOAuthToken('appId', token)
28-
local httpc = http.new()
29-
local json_resp
30-
if result ~= ngx.null then
31-
json_resp = cjson.decode(result)
32-
ngx.header['X-OIDC-Email'] = json_resp['email']
33-
ngx.header['X-OIDC-Sub'] = json_resp['sub']
34-
return json_resp
35-
end
36-
local keyUrl = utils.concatStrings({APPID_PKURL, securityObj.tenantId, '/publickeys'})
26+
local function inject_req_headers(token_obj)
27+
ngx.header['X-OIDC-Email'] = token_obj['email']
28+
ngx.header['X-OIDC-Sub'] = token_obj['sub']
29+
end
30+
31+
local function fetchJWKs(tenantId)
32+
local keyUrl = utils.concatStrings({APPID_PKURL, tenantId, '/publickeys'})
3733
local request_options = {
3834
headers = {
3935
["Accept"] = "application/json"
4036
},
41-
ssl_verify = false
37+
ssl_verify = true
4238
}
43-
local res, err = httpc:request_uri(keyUrl, request_options)
44-
if err then
45-
request.err(500, 'error getting app id key: ' .. err)
39+
return httpc:request_uri(keyUrl, request_options)
40+
end
41+
42+
function _M.process(dataStore, token, securityObj)
43+
local cache_key = 'appid_' .. securityObj.tenantId
44+
local result = dataStore:getOAuthToken(cache_key, token)
45+
local httpc = http.new()
46+
local token_obj
47+
48+
-- Was the token in the cache?
49+
if result ~= ngx.null then
50+
token_obj = cjson.decode(result)
51+
inject_req_headers(token_obj)
52+
return token_obj
53+
end
54+
55+
-- Cache miss. Proceed to validate the token
56+
local res, err = fetchJWKs
57+
if err or res.status ~= 200 then
58+
request.err(500, 'An error occurred while fetching the App ID JWK configuration: ' .. err or res.body)
4659
end
4760

4861
local key
@@ -52,24 +65,26 @@ function _M.process(dataStore, token, securityObj)
5265
end
5366
local result = cjose.validateJWS(token, cjson.encode(key))
5467
if not result then
55-
request.err(401, 'AppId key signature verification failed.')
68+
request.err(401, 'The token signature did not match any known JWK.')
5669
return nil
5770
end
58-
local jwt_obj = cjson.decode(cjose.getJWSInfo(token))
59-
local expireTime = jwt_obj['exp']
71+
72+
token_obj = cjson.decode(cjose.getJWSInfo(token))
73+
local expireTime = token_obj['exp']
6074
if expireTime < os.time() then
61-
request.err(401, 'Access token expired.')
75+
request.err(401, 'The access token has expired.')
6276
return nil
6377
end
64-
ngx.header['X-OIDC-Email'] = jwt_obj['email']
65-
ngx.header['X-OIDC-Sub'] = jwt_obj['sub']
78+
79+
-- Add token metadata to the request headers
80+
inject_req_headers(token_obj)
81+
6682
-- keep token in cache until it expires
6783
local ttl = expireTime - os.time()
68-
dataStore:saveOAuthToken('appId', token, cjson.encode(jwt_obj), ttl)
69-
return jwt_obj
84+
dataStore:saveOAuthToken(cache_key, token, cjson.encode(token_obj), ttl)
85+
return token_obj
7086
end
7187

72-
7388
return _M
7489

7590

scripts/lua/oauth/facebook.lua

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ function exchangeOAuthToken(dataStore, token, facebookAppToken)
5656
-- convert response
5757
if not res then
5858
ngx.log(ngx.WARN, 'Could not invoke Facebook API. Error=', err)
59-
request.err(500, 'OAuth provider error.')
59+
request.err(500, 'Connection to the OAuth provider failed.')
6060
return
6161
end
6262
local json_resp = cjson.decode(res.body)

scripts/lua/oauth/github.lua

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ function _M.process(dataStore, token)
4545
-- convert response
4646
if not res then
4747
ngx.log(ngx.WARN, utils.concatStrings({"Could not invoke Github API. Error=", err}))
48-
request.err(500, 'OAuth provider error.')
48+
request.err(500, 'Connection to the OAuth provider failed.')
4949
return
5050
end
5151

scripts/lua/oauth/google.lua

+1-1
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ function _M.process (dataStore, token)
5050
-- convert response
5151
if not res then
5252
ngx.log(ngx.WARN, utils.concatStrings({"Could not invoke Google API. Error=", err}))
53-
request.err(500, 'OAuth provider error.')
53+
request.err(500, 'Connection to the OAuth provider failed.')
5454
return nil
5555
end
5656
local json_resp = cjson.decode(res.body)

scripts/lua/policies/security/oauth2.lua

+1-1
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ function exchange(dataStore, token, provider, securityObj)
6666
local loaded, impl = pcall(require, utils.concatStrings({'oauth/', provider}))
6767
if not loaded then
6868
request.err(500, 'Error loading OAuth provider authentication module')
69-
print("error loading provider.")
69+
print("error loading provider:", impl)
7070
return nil
7171
end
7272

tests/install-deps.sh

+2
Original file line numberDiff line numberDiff line change
@@ -28,3 +28,5 @@ luarocks install --tree=lua_modules sha1
2828
luarocks install --tree=lua_modules md5
2929
luarocks install --tree=lua_modules net-url
3030
luarocks install --tree=lua_modules luafilesystem
31+
luarocks install --tree=lua_modules lua-resty-http 0.10
32+
luarocks install --tree=lua_modules https://github.com/mhamann/lua-resty-cjose/raw/master/lua-resty-cjose-0.5-0.rockspec

tests/scripts/lua/security.lua

+10-6
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,7 @@ describe('OAuth security module', function()
213213
assert.same(red:exists('oauth:providers:mock:tokens:test'), 1)
214214
assert(result)
215215
end)
216+
216217
it('Exchanges a bad token, doesn\'t cache it and returns false', function()
217218
local red = fakeredis.new()
218219
local token = "bad"
@@ -237,31 +238,34 @@ describe('OAuth security module', function()
237238
assert.same(red:exists('oauth:providers:mock:tokens:bad'), 0)
238239
assert.falsy(result)
239240
end)
240-
it('Loads a facebook token from the cache with a valid app id', function()
241+
242+
it('Has no cross-contamination between App ID caches', function()
241243
local red = fakeredis.new()
242244
local ds = require "lib/dataStore"
243245
local dataStore = ds.initWithDriver(red)
244-
local token = "test"
246+
local token = "test_token"
245247
local appid = "app"
246248
local ngxattrs = [[
247249
{
248250
"http_Authorization":"]] .. token .. [[",
249-
"http_x_facebook_app_token":"]] .. appid .. [[",
250251
"tenant":"1234",
251252
"gatewayPath":"v1/test"
252253
}
253254
]]
254255
local ngx = fakengx.new()
256+
ngx.config = { ngx_lua_version = 'test' }
255257
ngx.var = cjson.decode(ngxattrs)
256258
_G.ngx = ngx
257259
local securityObj = [[
258260
{
259261
"type":"oauth2",
260-
"provider":"facebook",
261-
"scope":"resource"
262+
"provider":"app-id",
263+
"tenantId": "tenant1",
264+
"scope":"api"
262265
}
263266
]]
264-
red:set('oauth:providers:facebook:tokens:testapp', '{"token":"good"}')
267+
red:set('oauth:providers:appid_tenant2:tokens:test_token', '{"token":"good"}')
268+
red:set('oauth:providers:appid_tenant1:tokens:test_token', '{"token":"good"}')
265269
local result = oauth.process(dataStore, cjson.decode(securityObj))
266270
assert.truthy(result)
267271
end)

0 commit comments

Comments
 (0)