This repository has been archived by the owner on Apr 26, 2024. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Record the SSO Auth Provider in the login token #9510
Merged
Merged
Changes from 3 commits
Commits
Show all changes
14 commits
Select commit
Hold shift + click to select a range
c5934f8
Factor out `satisfy_expiry` function
richvdh 444c697
Factor out `get_value_from_macaroon` utility function
richvdh 7fa4d77
get_value_from_macaroon: check only one instance of caveat
richvdh 7f104a2
Replace get_user_id_from_macaroon with calls to get_value_from_macaroon
richvdh d651626
create verify_short_term_login_token function
richvdh 0b8dfb1
Return an object from `validate_short_term_login_token_and_get_user_id`
richvdh 3d4902b
Allow login tokens to include auth_provider_id
richvdh f2466b2
Store auth provider id in login tokens
richvdh cd7448e
changelog
richvdh a7e5112
Ensure that each login token has an auth provider id
richvdh cf5b9e1
Merge remote-tracking branch 'origin/develop' into rav/auth_provider_…
richvdh 94226a4
fix tests
richvdh 92a2f05
Remove support for default values in macaroons
richvdh ee4f580
auth_provider_id is no longer Optional
richvdh File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,85 @@ | ||
# -*- coding: utf-8 -*- | ||
# Copyright 2020 Quentin Gliech | ||
# Copyright 2021 The Matrix.org Foundation C.I.C. | ||
# | ||
# Licensed under the Apache License, Version 2.0 (the "License"); | ||
# you may not use this file except in compliance with the License. | ||
# You may obtain a copy of the License at | ||
# | ||
# http://www.apache.org/licenses/LICENSE-2.0 | ||
# | ||
# Unless required by applicable law or agreed to in writing, software | ||
# distributed under the License is distributed on an "AS IS" BASIS, | ||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
# See the License for the specific language governing permissions and | ||
# limitations under the License. | ||
|
||
"""Utilities for manipulating macaroons""" | ||
|
||
from typing import Callable, Optional | ||
|
||
import pymacaroons | ||
from pymacaroons.exceptions import MacaroonVerificationFailedException | ||
|
||
|
||
def get_value_from_macaroon(macaroon: pymacaroons.Macaroon, key: str) -> str: | ||
"""Extracts a caveat value from a macaroon token. | ||
|
||
Checks that there is exactly one caveat of the form "key = <val>" in the macaroon, | ||
and returns the extracted value. | ||
|
||
Args: | ||
macaroon: the token | ||
key: the key of the caveat to extract | ||
|
||
Returns: | ||
The extracted value | ||
|
||
Raises: | ||
KeyError: if the caveat was not in the macaroon | ||
MacaroonVerificationFailedException: if there are conflicting values for the | ||
caveat in the macaroon | ||
""" | ||
prefix = key + " = " | ||
result = None # type: Optional[str] | ||
for caveat in macaroon.caveats: | ||
if not caveat.caveat_id.startswith(prefix): | ||
continue | ||
|
||
val = caveat.caveat_id[len(prefix) :] | ||
|
||
if result is None: | ||
# first time we found this caveat: record the value | ||
result = val | ||
elif val != result: | ||
# on subsequent occurrences, raise if the value is different. | ||
raise MacaroonVerificationFailedException( | ||
"Conflicting values for caveat " + key | ||
) | ||
|
||
if result is not None: | ||
return result | ||
raise KeyError("No %s caveat in macaroon" % (key,)) | ||
|
||
|
||
def satisfy_expiry(v: pymacaroons.Verifier, get_time_ms: Callable[[], int]) -> None: | ||
"""Make a macaroon verifier which accepts 'time' caveats | ||
|
||
Builds a caveat verifier which will accept unexpired 'time' caveats, and adds it to | ||
the given macaroon verifier. | ||
|
||
Args: | ||
v: the macaroon verifier | ||
get_time_ms: a callable which will return the timestamp after which the caveat | ||
should be considered expired. Normally the current time. | ||
""" | ||
|
||
def verify_expiry_caveat(caveat: str): | ||
time_msec = get_time_ms() | ||
prefix = "time < " | ||
if not caveat.startswith(prefix): | ||
return False | ||
expiry = int(caveat[len(prefix) :]) | ||
return time_msec < expiry | ||
|
||
v.satisfy_general(verify_expiry_caveat) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change is being introduced mostly in the interests of safety. We've been burnt badly by this in the past (https://matrix.org/blog/2016/07/08/critical-security-vulnerability-in-synapse-0-12-to-0-16-1-inclusive), so some double-checking feels like it is in order.