mirror of
https://github.com/pomerium/pomerium.git
synced 2025-07-24 12:08:19 +02:00
oidc: fix token revocation (#3810)
This commit is contained in:
parent
0b3d4f3a6f
commit
73d8900c47
2 changed files with 79 additions and 10 deletions
|
@ -176,6 +176,11 @@ func (p *Provider) UpdateUserInfo(ctx context.Context, t *oauth2.Token, v interf
|
|||
// Group membership is also refreshed.
|
||||
// https://openid.net/specs/openid-connect-core-1_0.html#RefreshTokens
|
||||
func (p *Provider) Refresh(ctx context.Context, t *oauth2.Token, v identity.State) (*oauth2.Token, error) {
|
||||
oa, err := p.GetOauthConfig()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if t == nil {
|
||||
return nil, ErrMissingAccessToken
|
||||
}
|
||||
|
@ -183,11 +188,6 @@ func (p *Provider) Refresh(ctx context.Context, t *oauth2.Token, v identity.Stat
|
|||
return nil, ErrMissingRefreshToken
|
||||
}
|
||||
|
||||
oa, err := p.GetOauthConfig()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
newToken, err := oa.TokenSource(ctx, t).Token()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("identity/oidc: refresh failed: %w", err)
|
||||
|
@ -230,6 +230,11 @@ func (p *Provider) getIDToken(ctx context.Context, t *oauth2.Token) (*go_oidc.ID
|
|||
//
|
||||
// https://tools.ietf.org/html/rfc7009#section-2.1
|
||||
func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
|
||||
oa, err := p.GetOauthConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if p.RevocationURL == "" {
|
||||
return ErrRevokeNotImplemented
|
||||
}
|
||||
|
@ -237,11 +242,6 @@ func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
|
|||
return ErrMissingAccessToken
|
||||
}
|
||||
|
||||
oa, err := p.GetOauthConfig()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
params := url.Values{}
|
||||
params.Add("token", t.AccessToken)
|
||||
params.Add("token_type_hint", "access_token")
|
||||
|
@ -263,6 +263,10 @@ func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
|
|||
// session to be initiated.
|
||||
// https://openid.net/specs/openid-connect-frontchannel-1_0.html#RPInitiated
|
||||
func (p *Provider) LogOut() (*url.URL, error) {
|
||||
_, err := p.GetProvider()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if p.EndSessionURL == "" {
|
||||
return nil, ErrSignoutNotImplemented
|
||||
}
|
||||
|
|
65
internal/identity/oidc/oidc_test.go
Normal file
65
internal/identity/oidc/oidc_test.go
Normal file
|
@ -0,0 +1,65 @@
|
|||
package oidc
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"net/url"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
"golang.org/x/oauth2"
|
||||
|
||||
"github.com/pomerium/pomerium/internal/identity/oauth"
|
||||
)
|
||||
|
||||
func TestRevoke(t *testing.T) {
|
||||
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
|
||||
t.Cleanup(clearTimeout)
|
||||
|
||||
var srv *httptest.Server
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
baseURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
switch r.URL.Path {
|
||||
case "/.well-known/openid-configuration":
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"issuer": baseURL.String(),
|
||||
"revocation_endpoint": baseURL.ResolveReference(&url.URL{
|
||||
Path: "/revoke",
|
||||
}).String(),
|
||||
})
|
||||
case "/revoke":
|
||||
assert.Equal(t, "ACCESS_TOKEN", r.FormValue("token"))
|
||||
assert.Equal(t, "access_token", r.FormValue("token_type_hint"))
|
||||
assert.Equal(t, "CLIENT_ID", r.FormValue("client_id"))
|
||||
assert.Equal(t, "CLIENT_SECRET", r.FormValue("client_secret"))
|
||||
|
||||
default:
|
||||
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
|
||||
}
|
||||
})
|
||||
srv = httptest.NewServer(handler)
|
||||
t.Cleanup(srv.Close)
|
||||
|
||||
redirectURL, err := url.Parse(srv.URL)
|
||||
require.NoError(t, err)
|
||||
|
||||
p, err := New(ctx, &oauth.Options{
|
||||
ProviderURL: srv.URL,
|
||||
RedirectURL: redirectURL,
|
||||
ClientID: "CLIENT_ID",
|
||||
ClientSecret: "CLIENT_SECRET",
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, p)
|
||||
|
||||
assert.NoError(t, p.Revoke(ctx, &oauth2.Token{
|
||||
AccessToken: "ACCESS_TOKEN",
|
||||
}))
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue