1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366
|
## liboidc-agent4
The C-API provides functions for getting an access token for a specific configuration as well as the associated issuer.
These functions are designed for easy usage. The C-API is available as a shared library through the `liboidc-agent4`
package. The developement files (i.e. header-files) and the static library are included in the `liboidc-agent-dev`
package.
The library depends on `libsodium` therefore the `-lsodium` linker flag must be included when linking `liboidc-agent`.
If the library was build with `liblist`
then `-llist` must be included. If the library was build with `libcjson` then
`-lcjson` must be included. On modern distros this is usually the case.
### Requesting an Access Token For an Account Configuration
The following functions can be used to obtain an access token for a specific account configuration from `oidc-agent`. If
you / your application does not know which account configuration should be used, but you know for which provider you
need an access token you can also [request an access token for a provider](#requesting-an-access-token-for-a-provider).
#### getAccessToken3
It is recommended to use [`getAgentTokenResponse`](#getagenttokenresponse) instead.
```c
char* getAccessToken3(const char* accountname, time_t min_valid_period,
const char* scope, const char* application_hint,
const char* audience)
```
This function requests an access token from oidc-agent for the `accountname`
account configuration. The access token should have `scope` scopes, be valid for at least `min_valid_period` seconds,
and have the `audience` audience.
##### Parameters
- `accountname` is the shortname of the account configuration that should be used.
- If `min_valid_period` is
`0` no guarantee about the validity of the token can be made; it is possible that it expires before it can be used.
- If `scope` is `NULL`, the default scopes for that account are used. So usually it is enough to use `NULL`.
- `application_hint` should be the name of the application that requests an access token. This string might be displayed
to the user for authorization purposes.
- If `audience` is `NULL`, no special audience is requested for this access token. This parameter is used to request an
access token with a specific audience.
##### Return Value
The function returns only the access token as a `char*`. To additionally obtain other information
use [`getTokenResponse3`](#gettokenresponse3). After usage the return value MUST be freed using `secFree`.
On failure `NULL` is returned and `oidc_errno` is set
(see [Error Handling](#error-handling)).
##### Example
A complete example can look the following:
```c
char* token = getAccessToken3(accountname, 60, NULL,
"example-app", NULL);
if(token == NULL) {
oidcagent_perror();
// Additional error handling
} else {
printf("Access token is: %s\n", token);
secFree(token);
}
```
#### getAccessToken2
This function is deprecated and should not be used in new applications. Use
[`getAccessToken3`](#getaccesstoken3) or [`getAgentTokenResponse`](#getagenttokenresponse) instead.
#### getAccessToken
This function is deprecated and should not be used in new applications. Use
[`getAccessToken3`](#getaccesstoken3) or [`getAgentTokenResponse`](#getagenttokenresponse) instead.
#### getAgentTokenResponse
```c
struct agent_response getAgentTokenResponse(const char* accountname,
time_t min_valid_period,
const char* scope,
const char* application_hint,
const char* audience)
```
This function requests an access token from oidc-agent for the `accountname`
account configuration. The access token should have `scope` scopes, be valid for at least `min_valid_period` seconds,
and have the `audience` audience.
##### Parameters
- `accountname` is the shortname of the account configuration that should be used.
- If `min_valid_period` is
`0` no guarantee about the validity of the token can be made; it is possible that it expires before it can be used.
- If `scope` is `NULL`, the default scopes for that account are used. So usually it is enough to use `NULL`.
- `application_hint` should be the name of the application that requests an access token. This string might be displayed
to the user for authorization purposes.
- If `audience` is `NULL`, no special audience is requested for this access token. This parameter is used to request an
access token with a specific audience.
##### Return Value
The function returns an `agent_response struct`. The `type` element indicates which type is returned, i.e. if an error
occurred. On success the response has a `token_response struct` that contains the requested access token, the url of the
issuer that issued the token and the time when the token expires (in seconds since the
Epoch, `1970-01-01 00:00:00 +0000 (UTC)`).
The values can be accessed the following way:
```c
struct agent_response response = getAgentTokenResponse(...);
if (response.type == AGENT_RESPONSE_TYPE_TOKEN) { // assert that we actually have a token response
struct token_response tok_res = response.token_response;
tok_res.token // access token
tok_res.issuer // issuer url
tok_res.expires_at // expiration time
}
```
**After usage the return value MUST be freed using `secFreeAgentResponse`.**
On failure `response.type` will be `AGENT_RESPONSE_TYPE_ERROR` and `response.error_response` can be accessed
(see [Error Handling](#error-handling)). So applications should check
`response.type` before accessing any of the token response values.
##### Example
A complete example can look the following:
```c
struct agent_response response = getAgentTokenResponse(accountname, 60, NULL,
"example-app", NULL);
if(response.type == AGENT_RESPONSE_TYPE_ERROR) {
oidcagent_printErrorResponse(response.error_response);
// Additional error handling
} else {
struct token_response tok_res = response.token_response
printf("Access token is: %s\n", tok_res.token);
printf("Issuer url is: %s\n", tok_res.issuer);
printf("Token expires at: %lu\n", tok_res.expires_at);
}
secFreeAgentResponse(response);
```
#### getTokenResponse3
This function is deprecated and should not be used in new applications. Use
[`getAgentTokenResponse`](#getagenttokenresponse) instead.
#### getTokenResponse
This function is deprecated and should not be used in new applications. Use
[`getAgentTokenResponse`](#getagenttokenresponse) instead.
### Requesting an Access Token For a Provider
The `getAccessTokenForIssuer3` and `getAgentTokenResponseForIssuer` methods can be used to obtain an access token for a
specific OpenID Provider (issuer). This is useful for applications that only work with a specific provider and therefore
know the issuer for which they need an access token, but do not require the user to provide an account configuration
shortname.
#### getAccessTokenForIssuer3
```c
char* getAccessTokenForIssuer3(const char* issuer_url, time_t min_valid_period,
const char* scope, const char* application_hint,
const char* audience)
```
This function requests an access token from oidc-agent for the provider with
`issuer_url`. The access token should have `scope` scopes, be valid for at least `min_valid_period` seconds, and have
the `audience` audience.
##### Parameters
- `issuer_url` is the issuer url of the provider for which an access token should be obtained.
- If `min_valid_period` is
`0` no guarantee about the validity of the token can be made; it is possible that it expires before it can be used.
- If `scope` is `NULL`, the default scopes for that account are used. So usually it is enough to use `NULL`.
- `application_hint` should be the name of the application that requests an access token. This string might be displayed
to the user for authorization purposes.
- If `audience` is `NULL`, no special audience is requested for this access token. This parameter is used to request an
access token with a specific audience.
##### Return Value
The function returns only the access token as a `char*`. To additionally obtain other information
use [`getTokenResponseForIssuer3`](#gettokenresponseforissuer3). After usage the return value MUST be freed
using `secFree`.
On failure `NULL` is returned and `oidc_errno` is set
(see [Error Handling](#error-handling)).
##### Example
A complete example can look the following:
```c
char* token = getAccessTokenForIssuer3("https://example.com/", 60, NULL,
"example-app", NULL);
if(token == NULL) {
oidcagent_perror();
// Additional error handling
} else {
printf("Access token is: %s\n", token);
secFree(token);
}
```
#### getAccessTokenForIssuer
This function is deprecated and should not be used in new applications. Use
[`getAccessTokenForIssuer3`](#getaccesstokenforissuer3)
or [`getAgentTokenResponseForIssuer`](#getagenttokenresponseforissuer)
instead.
#### getAgentTokenResponseForIssuer
```c
struct agent_response getAgentTokenResponseForIssuer(const char* issuer_url,
time_t min_valid_period,
const char* scope,
const char* application_hint,
const char* audience)
```
This function requests an access token from oidc-agent for the the provider with
`issuer_url`. The access token should have `scope` scopes, be valid for at least `min_valid_period` seconds, and have
the `audience` audience.
##### Parameters
- `issuer_url` is the issuer url of the provider for which an access token should be obtained.
- If `min_valid_period` is
`0` no guarantee about the validity of the token can be made; it is possible that it expires before it can be used.
- If `scope` is `NULL`, the default scopes for that account are used. So usually it is enough to use `NULL`.
- `application_hint` should be the name of the application that requests an access token. This string might be displayed
to the user for authorization purposes.
- If `audience` is `NULL`, no special audience is requested for this access token. This parameter is used to request an
access token with a specific audience.
##### Return Value
The function returns an `agent_response struct`. The `type` element indicates which type is returned, i.e. if an error
occurred. On success the response has a `token_response struct` that contains the requested access token, the url of the
issuer that issued the token and the time when the token expires (in seconds since the
Epoch, `1970-01-01 00:00:00 +0000 (UTC)`).
The values can be accessed the following way:
```c
struct agent_response response = getAgentTokenResponseForIssuer(...);
if (response.type == AGENT_RESPONSE_TYPE_TOKEN) { // assert that we actually have a token response
struct token_response tok_res = response.token_response;
tok_res.token // access token
tok_res.issuer // issuer url
tok_res.expires_at // expiration time
}
```
**After usage the return value MUST be freed using `secFreeAgentResponse`.**
On failure `response.type` will be `AGENT_RESPONSE_TYPE_ERROR` and `response.error_response` can be accessed
(see [Error Handling](#error-handling)). So applications should check
`response.type` before accessing any of the token response values.
##### Example
A complete example can look the following:
```c
struct agent_response response = getAgentTokenResponseForIssuer("https://oidc.example.com", 60, NULL,
"example-app", NULL);
if(response.type == AGENT_RESPONSE_TYPE_ERROR) {
oidcagent_printErrorResponse(response.error_response);
// Additional error handling
} else {
struct token_response tok_res = response.token_response
printf("Access token is: %s\n", tok_res.token);
printf("Issuer url is: %s\n", tok_res.issuer);
printf("Token expires at: %lu\n", tok_res.expires_at);
}
secFreeAgentResponse(response);
```
#### getTokenResponseForIssuer
This function is deprecated and should not be used in new applications. Use
[`getAgentTokenResponseForIssuer`](#getagenttokenresponseforissuer) instead.
#### getTokenResponseForIssuer3
This function is deprecated and should not be used in new applications. Use
[`getAgentTokenResponseForIssuer`](#getagenttokenresponseforissuer) instead.
### Error Handling
Since version `4.2.0` it is recommended to use functions that return an `agent_response struct`. This approach is
described in [Using the Error Response Structure](#using-the-error-response-structure). For functions that do not return
an `agent_response struct` [`oidc_errno`](#using-oidc_errno) must be used. This approach can also be used in addition to
the `error_response struct`.
#### Using the Error Response Structure
Since version `4.2.0` it is recommended to use functions that return an `agent_response struct`. This struct can hold
either a `token_response` or an `agent_error_response` depending on the success of the call.
The `agent_error_response struct` holds an error message and MIGHT additionally hold a help message (however, the help
message might also be `NULL`). If the help message is available it SHOULD be displayed to the user, since it gives
useful information how the user can solve the problem.
Before accessing the `agent_error_response struct` in an `agent_response` one MUST ensure that the `agent_response.type`
is `AGENT_RESPONSE_TYPE_ERROR`. This is also how one checks for the presence of an error.
```c
struct agent_response response = getAgentTokenResponse(...);
if (response.type == AGENT_RESPONSE_TYPE_ERROR) {
// error
struct agent_error_response err_res = response.error_response;
err_res.error // the error message
err_res.help // the help message (before using it assert that != NULL
} else {
// success
}
```
`liboidcagent4` also provides a helper function to easily print an `agent_error_response`:
```c
oidcagent_printErrorResponse(response.error_response);
```
#### Using `oidc_errno`
If an error occurs in any API function, `oidc_errno` is set to an error code. An application might want to check this
variable and perform specific actions on some of the errors. A list of important error codes can be found at
[Error Codes](#error-codes); for all error codes refer to the `oidc_error.h`
header file.
In most cases it is enough to print an error message to the user. For that usage
`liboidc-agent4` provides some helperfunctions:
```c
void oidcagent_perror();
char* oidcagent_serror();
```
`oidcagent_perror()` can be used similar to `perror()` and prints an error message describing the last occurred error
to `stderr`.
`oidcagent_serror()` returns the string that describes the error without printing it. The return string MUST NOT be
freed. This function behaves similar to `strerror(errno)`.
#### Error Codes
| error code | explanation |
|------------|-------------|
| OIDC_SUCCESS | success - no error |
| OIDC_EERROR | general error - check the error string|
| OIDC_ENOACCOUNT | the account is not loaded|
| OIDC_EOIDC | an error related to OpenID Connect happened - check the error string|
| OIDC_EENVVAR | the environment variable used to locate the agent is not set|
| OIDC_ECONSOCK | could not connect to the oidc-agent socket - most likely the agent is not running|
| OIDC_ELOCKED| the agent is locked and first has to be unlocked by the user|
| OIDC_EFORBIDDEN|the user forbid this action|
| OIDC_EPASS | wrong password - might occur if the account was not loaded and the user entered a wrong password in the autoload prompt|
|