File: pkce.go

package info (click to toggle)
golang-github-sigstore-sigstore 1.9.5-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 2,052 kB
  • sloc: makefile: 87; sh: 45
file content (109 lines) | stat: -rw-r--r-- 3,688 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
//
// Copyright 2021 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package oauthflow

import (
	"crypto/sha256"
	"encoding/base64"
	"fmt"
	"regexp"

	"github.com/coreos/go-oidc/v3/oidc"
	"golang.org/x/oauth2"
)

const (
	// PKCES256 is the SHA256 option required by the PKCE RFC
	PKCES256 = "S256"
)

// PKCE specifies the challenge and value pair required to fulfill RFC7636
type PKCE struct {
	Challenge string
	Method    string
	Value     string
}

// NewPKCE creates a new PKCE challenge for the specified provider per its supported methods (obtained through OIDC discovery endpoint)
func NewPKCE(provider *oidc.Provider) (*PKCE, error) {
	var providerClaims struct {
		CodeChallengeMethodsSupported []string `json:"code_challenge_methods_supported"`
	}

	if err := provider.Claims(&providerClaims); err != nil {
		// will only error out if the JSON was malformed, which shouldn't happen at this point
		return nil, err
	}

	var chosenMethod string
	for _, method := range providerClaims.CodeChallengeMethodsSupported {
		// per RFC7636, any server that supports PKCE must support S256
		if method == PKCES256 && chosenMethod != PKCES256 {
			chosenMethod = PKCES256
			break
		} else if method != "plain" {
			fmt.Printf("Unsupported code challenge method in list: '%v'", method)
		}
	}
	if chosenMethod == "" {
		if providerIsAzureBacked(provider) {
			chosenMethod = PKCES256
		} else {
			return nil, fmt.Errorf("PKCE is not supported by OIDC provider '%v'", provider.Endpoint().AuthURL)
		}
	}

	// we use two 27 character strings to meet requirements of RFC 7636:
	// (minimum length of 43 characters and a maximum length of 128 characters)
	value := randStr() + randStr()

	h := sha256.New()
	_, _ = h.Write([]byte(value))
	challenge := base64.RawURLEncoding.EncodeToString(h.Sum(nil))

	return &PKCE{
		Challenge: challenge,
		Method:    chosenMethod,
		Value:     value,
	}, nil
}

// AuthURLOpts returns the set of request parameters required during the initial exchange of the OAuth2 flow
func (p *PKCE) AuthURLOpts() []oauth2.AuthCodeOption {
	return []oauth2.AuthCodeOption{
		oauth2.SetAuthURLParam("code_challenge_method", p.Method),
		oauth2.SetAuthURLParam("code_challenge", p.Challenge),
	}
}

// TokenURLOpts returns the set of request parameters required during the token request exchange flow
func (p *PKCE) TokenURLOpts() []oauth2.AuthCodeOption {
	return []oauth2.AuthCodeOption{
		oauth2.SetAuthURLParam("code_verifier", p.Value),
	}
}

var azureregex = regexp.MustCompile(`^https:\/\/login\.microsoftonline\.(com|us)\/`)

// providerIsAzureBacked returns a boolean indicating whether the provider is Azure-backed;
// Azure supports PKCE but does not advertise it in their OIDC discovery endpoint
func providerIsAzureBacked(p *oidc.Provider) bool {
	// Per https://docs.microsoft.com/en-us/azure/active-directory/develop/authentication-national-cloud#azure-ad-authentication-endpoints
	// if endpoint starts with any of these strings then we should attempt PKCE anyway as their OIDC discovery doc
	// does not advertise supporting PKCE but they actually do

	return p != nil && azureregex.MatchString(p.Endpoint().AuthURL)
}