1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76
|
// Copyright 2025 OpenPubkey
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// SPDX-License-Identifier: Apache-2.0
package providers
import (
"crypto/rand"
"fmt"
"io"
"net"
"net/url"
"strings"
httphelper "github.com/zitadel/oidc/v3/pkg/http"
)
// FindAvailablePort attempts to open a listener on localhost until it finds one or runs out of redirectURIs to try
func FindAvailablePort(redirectURIs []string) (*url.URL, net.Listener, error) {
var ln net.Listener
var lnErr error
for _, v := range redirectURIs {
redirectURI, err := url.Parse(v)
if err != nil {
return nil, nil, fmt.Errorf("malformed redirectURI specified, redirectURI was %s", v)
}
if !(strings.HasPrefix(redirectURI.Host, "localhost") ||
strings.HasPrefix(redirectURI.Host, "127.0.0.1") ||
strings.HasPrefix(redirectURI.Host, "0:0:0:0:0:0:0:1") ||
strings.HasPrefix(redirectURI.Host, "::1")) {
return nil, nil, fmt.Errorf("redirectURI must be localhost, redirectURI was %s", redirectURI.Host)
}
lnStr := fmt.Sprintf("localhost:%s", redirectURI.Port())
ln, lnErr = net.Listen("tcp", lnStr)
if lnErr == nil {
return redirectURI, ln, nil
}
}
return nil, nil, fmt.Errorf("failed to start a listener for the callback from the OP, got %w", lnErr)
}
func configCookieHandler() (*httphelper.CookieHandler, error) {
// I've been unable to determine a scenario in which setting a hashKey and blockKey
// on the cookie provide protection in the localhost redirect URI case. However I
// see no harm in setting it.
hashKey := make([]byte, 64)
if _, err := io.ReadFull(rand.Reader, hashKey); err != nil {
return nil, fmt.Errorf("failed to generate random keys for cookie storage")
}
blockKey := make([]byte, 32)
if _, err := io.ReadFull(rand.Reader, blockKey); err != nil {
return nil, fmt.Errorf("failed to generate random keys for cookie storage")
}
// OpenPubkey uses a localhost redirect URI to receive the authcode
// from the OP. Localhost redirects use http not https. Thus, we should
// not set these cookies as secure-only. This should be changed if
// OpenPubkey added support for non-localhost redirect URIs.
// WithUnsecure() is equivalent to not setting the 'secure' attribute
// flag in an HTTP Set-Cookie header (see https://http.dev/set-cookie#secure)
return httphelper.NewCookieHandler(hashKey, blockKey, httphelper.WithUnsecure()), nil
}
|