Skip to content

Commit

Permalink
oidc: fix token revocation (#3810)
Browse files Browse the repository at this point in the history
  • Loading branch information
calebdoxsey committed Dec 16, 2022
1 parent 2602b91 commit c3b9adf
Show file tree
Hide file tree
Showing 2 changed files with 79 additions and 10 deletions.
24 changes: 14 additions & 10 deletions internal/identity/oidc/oidc.go
Expand Up @@ -176,18 +176,18 @@ func (p *Provider) UpdateUserInfo(ctx context.Context, t *oauth2.Token, v interf
// Group membership is also refreshed.
// https://openid.net/specs/openid-connect-core-1_0.html#RefreshTokens
func (p *Provider) Refresh(ctx context.Context, t *oauth2.Token, v identity.State) (*oauth2.Token, error) {
oa, err := p.GetOauthConfig()
if err != nil {
return nil, err
}

if t == nil {
return nil, ErrMissingAccessToken
}
if t.RefreshToken == "" {
return nil, ErrMissingRefreshToken
}

oa, err := p.GetOauthConfig()
if err != nil {
return nil, err
}

newToken, err := oa.TokenSource(ctx, t).Token()
if err != nil {
return nil, fmt.Errorf("identity/oidc: refresh failed: %w", err)
Expand Down Expand Up @@ -230,18 +230,18 @@ func (p *Provider) getIDToken(ctx context.Context, t *oauth2.Token) (*go_oidc.ID
//
// https://tools.ietf.org/html/rfc7009#section-2.1
func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
oa, err := p.GetOauthConfig()
if err != nil {
return err
}

if p.RevocationURL == "" {
return ErrRevokeNotImplemented
}
if t == nil {
return ErrMissingAccessToken
}

oa, err := p.GetOauthConfig()
if err != nil {
return err
}

params := url.Values{}
params.Add("token", t.AccessToken)
params.Add("token_type_hint", "access_token")
Expand All @@ -263,6 +263,10 @@ func (p *Provider) Revoke(ctx context.Context, t *oauth2.Token) error {
// session to be initiated.
// https://openid.net/specs/openid-connect-frontchannel-1_0.html#RPInitiated
func (p *Provider) LogOut() (*url.URL, error) {
_, err := p.GetProvider()
if err != nil {
return nil, err
}
if p.EndSessionURL == "" {
return nil, ErrSignoutNotImplemented
}
Expand Down
65 changes: 65 additions & 0 deletions internal/identity/oidc/oidc_test.go
@@ -0,0 +1,65 @@
package oidc

import (
"context"
"encoding/json"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"time"

"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"golang.org/x/oauth2"

"github.com/pomerium/pomerium/internal/identity/oauth"
)

func TestRevoke(t *testing.T) {
ctx, clearTimeout := context.WithTimeout(context.Background(), time.Second*10)
t.Cleanup(clearTimeout)

var srv *httptest.Server
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
baseURL, err := url.Parse(srv.URL)
require.NoError(t, err)

w.Header().Set("Content-Type", "application/json")
switch r.URL.Path {
case "/.well-known/openid-configuration":
json.NewEncoder(w).Encode(map[string]any{
"issuer": baseURL.String(),
"revocation_endpoint": baseURL.ResolveReference(&url.URL{
Path: "/revoke",
}).String(),
})
case "/revoke":
assert.Equal(t, "ACCESS_TOKEN", r.FormValue("token"))
assert.Equal(t, "access_token", r.FormValue("token_type_hint"))
assert.Equal(t, "CLIENT_ID", r.FormValue("client_id"))
assert.Equal(t, "CLIENT_SECRET", r.FormValue("client_secret"))

default:
assert.Failf(t, "unexpected http request", "url: %s", r.URL.String())
}
})
srv = httptest.NewServer(handler)
t.Cleanup(srv.Close)

redirectURL, err := url.Parse(srv.URL)
require.NoError(t, err)

p, err := New(ctx, &oauth.Options{
ProviderURL: srv.URL,
RedirectURL: redirectURL,
ClientID: "CLIENT_ID",
ClientSecret: "CLIENT_SECRET",
})
require.NoError(t, err)
require.NotNil(t, p)

assert.NoError(t, p.Revoke(ctx, &oauth2.Token{
AccessToken: "ACCESS_TOKEN",
}))
}

0 comments on commit c3b9adf

Please sign in to comment.