GNUnet 0.25.2-12-g8d1cef5f6
 
Loading...
Searching...
No Matches
openid_plugin.c
Go to the documentation of this file.
1/*
2 This file is part of GNUnet.
3 Copyright (C) 2012-2018 GNUnet e.V.
4
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
9
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
14
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
17
18 SPDX-License-Identifier: AGPL3.0-or-later
19 */
28#include "platform.h"
29#include <inttypes.h>
30#include <jansson.h>
31#include <jose/jose.h>
32
33#include "gnunet_util_lib.h"
34#include "gnunet_gns_service.h"
37#include "gnunet_reclaim_lib.h"
39#include "gnunet_rest_lib.h"
40#include "gnunet_rest_plugin.h"
41#include "microhttpd.h"
42#include "oidc_helper.h"
43#include "openid_plugin.h"
44
48#define GNUNET_REST_API_NS_OIDC "/openid"
49
53#define GNUNET_REST_API_NS_OIDC_CONFIG "/.well-known/openid-configuration"
54
58#define GNUNET_REST_API_NS_AUTHORIZE "/openid/authorize"
59
63#define GNUNET_REST_API_NS_TOKEN "/openid/token"
64
68#define GNUNET_REST_API_JWKS "/jwks.json"
69
73#define GNUNET_REST_API_NS_USERINFO "/openid/userinfo"
74
78#define GNUNET_REST_API_NS_LOGIN "/openid/login"
79
83#define ID_REST_STATE_INIT 0
84
88#define ID_REST_STATE_POST_INIT 1
89
93#define OIDC_GRANT_TYPE_KEY "grant_type"
94
98#define OIDC_GRANT_TYPE_VALUE "authorization_code"
99
103#define OIDC_CODE_KEY "code"
104
108#define OIDC_RESPONSE_TYPE_KEY "response_type"
109
113#define OIDC_CLIENT_ID_KEY "client_id"
114
118#define OIDC_SCOPE_KEY "scope"
119
123#define OIDC_REDIRECT_URI_KEY "redirect_uri"
124
128#define OIDC_STATE_KEY "state"
129
133#define OIDC_NONCE_KEY "nonce"
134
138#define OIDC_CLAIMS_KEY "claims"
139
143#define OIDC_CODE_CHALLENGE_KEY "code_challenge"
144
148#define OIDC_CODE_VERIFIER_KEY "code_verifier"
149
153#define OIDC_COOKIE_EXPIRATION 3
154
158#define OIDC_COOKIE_HEADER_KEY "cookie"
159
163#define OIDC_AUTHORIZATION_HEADER_KEY "authorization"
164
168#define OIDC_COOKIE_HEADER_INFORMATION_KEY "Identity="
169
173#define OIDC_COOKIE_HEADER_ACCESS_DENIED "Identity=Denied"
174
178#define OIDC_EXPECTED_AUTHORIZATION_RESPONSE_TYPE "code"
179
183#define OIDC_EXPECTED_AUTHORIZATION_SCOPE "openid"
184
188#define OIDC_ERROR_KEY_INVALID_CLIENT "invalid_client"
189
193#define OIDC_ERROR_KEY_INVALID_SCOPE "invalid_scope"
194
198#define OIDC_ERROR_KEY_INVALID_REQUEST "invalid_request"
199
203#define OIDC_ERROR_KEY_INVALID_TOKEN "invalid_token"
204
208#define OIDC_ERROR_KEY_INVALID_COOKIE "invalid_cookie"
209
213#define OIDC_ERROR_KEY_SERVER_ERROR "server_error"
214
218#define OIDC_ERROR_KEY_UNSUPPORTED_GRANT_TYPE "unsupported_grant_type"
219
223#define OIDC_ERROR_KEY_UNSUPPORTED_RESPONSE_TYPE "unsupported_response_type"
224
228#define OIDC_ERROR_KEY_UNAUTHORIZED_CLIENT "unauthorized_client"
229
233#define OIDC_ERROR_KEY_ACCESS_DENIED "access_denied"
234
238#define OIDC_JWK_RSA_FILENAME "jwk_rsa.json"
239
243#define CONSUME_TIMEOUT GNUNET_TIME_relative_multiply ( \
244 GNUNET_TIME_UNIT_SECONDS,2)
245
249static const char *OIDC_ignored_parameter_array[] = { "display",
250 "prompt",
251 "ui_locales",
252 "response_mode",
253 "id_token_hint",
254 "login_hint",
255 "acr_values" };
256
261
266
271
275static char *allow_methods;
276
280static struct EgoEntry *ego_head;
281
285static struct EgoEntry *ego_tail;
286
290static int state;
291
296
301
306
311
315struct Plugin
316{
317 const struct GNUNET_CONFIGURATION_Handle *cfg;
318};
319
323json_t *oidc_jwk;
324
329{
334
339
344
348 char *scope;
349
353 char *state;
354
358 char *nonce;
359
363 char *claims;
364
369
374
379
384
389
390};
391
395struct EgoEntry
396{
400 struct EgoEntry *next;
401
405 struct EgoEntry *prev;
406
410 char *identifier;
411
415 char *keystring;
416
420 struct GNUNET_IDENTITY_Ego *ego;
421};
422
423
424struct RequestHandle
425{
429 struct RequestHandle *next;
430
434 struct RequestHandle *prev;
435
439 struct EgoEntry *ego_entry;
440
445
450
455
460
465
470
475
480
485
486
491
496
501
506
507
512
517
522
527
532
536 void *proc_cls;
537
541 char *url;
542
547
551 char *tld;
552
557
562
566 char *emsg;
567
571 char *edesc;
572
576 int response_code;
577
582};
583
588
593
594
599static void
601{
602
603 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Cleaning up\n");
604 if (NULL != handle->timeout_task)
605 GNUNET_SCHEDULER_cancel (handle->timeout_task);
606 if (NULL != handle->attr_it)
608 if (NULL != handle->cred_it)
610 if (NULL != handle->ticket_it)
612 if (NULL != handle->idp_op)
614 if (NULL != handle->consume_timeout_op)
615 GNUNET_SCHEDULER_cancel (handle->consume_timeout_op);
616 GNUNET_free (handle->url);
617 GNUNET_free (handle->tld);
618 GNUNET_free (handle->redirect_prefix);
619 GNUNET_free (handle->redirect_suffix);
620 GNUNET_free (handle->emsg);
621 GNUNET_free (handle->edesc);
622 if (NULL != handle->gns_op)
624 if (NULL != handle->oidc)
625 {
626 GNUNET_free (handle->oidc->client_id);
627 GNUNET_free (handle->oidc->login_identity);
628 GNUNET_free (handle->oidc->nonce);
629 GNUNET_free (handle->oidc->redirect_uri);
630 GNUNET_free (handle->oidc->response_type);
631 GNUNET_free (handle->oidc->scope);
632 GNUNET_free (handle->oidc->state);
633 if (NULL != handle->oidc->claims)
634 GNUNET_free (handle->oidc->claims);
635 if (NULL != handle->oidc->code_challenge)
636 GNUNET_free (handle->oidc->code_challenge);
637 GNUNET_free (handle->oidc);
638 }
639 if (NULL!=handle->attr_idtoken_list)
641 if (NULL!=handle->attr_userinfo_list)
642 GNUNET_RECLAIM_attribute_list_destroy (handle->attr_userinfo_list);
643 if (NULL!=handle->credentials)
645 if (NULL!=handle->presentations)
649 handle);
650 if (NULL != handle->access_token)
651 GNUNET_free (handle->access_token);
653}
654
655
661static void
662do_error (void *cls)
663{
664 struct RequestHandle *handle = cls;
665 struct MHD_Response *resp;
666 char *json_error;
667
668 GNUNET_asprintf (&json_error,
669 "{ \"error\" : \"%s\", \"error_description\" : \"%s\"%s%s%s}",
670 handle->emsg,
671 (NULL != handle->edesc) ? handle->edesc : "",
672 (NULL != handle->oidc->state) ? ", \"state\":\"" : "",
673 (NULL != handle->oidc->state) ? handle->oidc->state : "",
674 (NULL != handle->oidc->state) ? "\"" : "");
675 if (0 == handle->response_code)
676 handle->response_code = MHD_HTTP_BAD_REQUEST;
677 resp = GNUNET_REST_create_response (json_error);
678 if (MHD_HTTP_UNAUTHORIZED == handle->response_code)
679 GNUNET_assert (MHD_NO !=
680 MHD_add_response_header (resp,
681 MHD_HTTP_HEADER_WWW_AUTHENTICATE,
682 "Basic"));
683 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
684 MHD_HTTP_HEADER_CONTENT_TYPE,
685 "application/json"));
686 handle->proc (handle->proc_cls, resp, handle->response_code);
688 GNUNET_free (json_error);
689}
690
691
698static void
700{
701 struct RequestHandle *handle = cls;
702 struct MHD_Response *resp;
703 char *error;
704
706 "Error: %s\n", handle->edesc);
707 GNUNET_asprintf (&error,
708 "error=\"%s\", error_description=\"%s\"",
709 handle->emsg,
710 (NULL != handle->edesc) ? handle->edesc : "");
711 resp = GNUNET_REST_create_response ("");
712 GNUNET_assert (MHD_NO !=
713 MHD_add_response_header (resp,
714 MHD_HTTP_HEADER_WWW_AUTHENTICATE,
715 "Bearer"));
716 handle->proc (handle->proc_cls, resp, handle->response_code);
718 GNUNET_free (error);
719}
720
721
727static void
729{
730 struct RequestHandle *handle = cls;
731 struct MHD_Response *resp;
732 char *redirect;
733
734 GNUNET_asprintf (&redirect,
735 "%s?error=%s&error_description=%s%s%s",
736 handle->oidc->redirect_uri,
737 handle->emsg,
738 handle->edesc,
739 (NULL != handle->oidc->state) ? "&state=" : "",
740 (NULL != handle->oidc->state) ? handle->oidc->state : "");
741 resp = GNUNET_REST_create_response ("");
742 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
743 "Location", redirect));
744 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
746 GNUNET_free (redirect);
747}
748
749
755static void
756do_timeout (void *cls)
757{
758 struct RequestHandle *handle = cls;
759
760 handle->timeout_task = NULL;
762}
763
764
772static void
774 const char *url,
775 void *cls)
776{
777 struct MHD_Response *resp;
778 struct RequestHandle *handle = cls;
779
780 // For now, independent of path return all options
781 resp = GNUNET_REST_create_response (NULL);
782 MHD_add_response_header (resp, "Access-Control-Allow-Methods", allow_methods);
783 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
785 return;
786}
787
788
792static void
794{
795 struct GNUNET_HashCode cache_key;
796 char *cookies;
797 struct GNUNET_TIME_Absolute current_time, *relog_time;
798 char delimiter[] = "; ";
799 char *tmp_cookies;
800 char *token;
801 char *value;
802
803 // gets identity of login try with cookie
805 strlen (OIDC_COOKIE_HEADER_KEY),
806 &cache_key);
808 ->header_param_map,
809 &cache_key))
810 {
811 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "No cookie found\n");
812 return;
813 }
814 // splits cookies and find 'Identity' cookie
815 tmp_cookies =
816 GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->header_param_map,
817 &cache_key);
818 cookies = GNUNET_strdup (tmp_cookies);
819 token = strtok (cookies, delimiter);
820 handle->oidc->user_cancelled = GNUNET_NO;
821 handle->oidc->login_identity = NULL;
822 if (NULL == token)
823 {
825 "Unable to parse cookie: %s\n",
826 cookies);
827 GNUNET_free (cookies);
828 return;
829 }
830
831 while (NULL != token)
832 {
833 if (0 == strcmp (token, OIDC_COOKIE_HEADER_ACCESS_DENIED))
834 {
835 handle->oidc->user_cancelled = GNUNET_YES;
836 GNUNET_free (cookies);
837 return;
838 }
839 if (NULL != strstr (token, OIDC_COOKIE_HEADER_INFORMATION_KEY))
840 break;
841 token = strtok (NULL, delimiter);
842 }
843 if (NULL == token)
844 {
846 "No cookie value to process: %s\n",
847 cookies);
848 GNUNET_free (cookies);
849 return;
850 }
851 GNUNET_CRYPTO_hash (token, strlen (token), &cache_key);
852 if (GNUNET_NO ==
854 {
855 GNUNET_log (
857 "Found cookie `%s', but no corresponding expiration entry present...\n",
858 token);
859 GNUNET_free (cookies);
860 return;
861 }
862 relog_time =
864 current_time = GNUNET_TIME_absolute_get ();
865 // 30 min after old login -> redirect to login
866 if (current_time.abs_value_us > relog_time->abs_value_us)
867 {
869 "Found cookie `%s', but it is expired.\n",
870 token);
871 GNUNET_free (cookies);
872 return;
873 }
875 GNUNET_assert (NULL != value);
876 handle->oidc->login_identity = GNUNET_strdup (value);
877 GNUNET_free (cookies);
878}
879
880
889static json_t *
891{
892 json_t *jwk;
893 json_error_t error;
894
895 jwk = json_load_file (filename, JSON_DECODE_ANY, &error);
896
897 if (! jwk)
898 {
900 ("Could not read OIDC RSA key from config file; %s\n"),
901 error.text);
902 }
903
904 return jwk;
905}
906
907
915static int
917 json_t *jwk)
918{
919 if (json_dump_file (jwk, filename, JSON_INDENT (2)))
920 {
922 ("Could not write OIDC RSA key to file %s\n"),
923 filename);
925 }
926 else
927 return GNUNET_OK;
928}
929
930
936static json_t *
938{
939 json_t *jwk;
940 jwk = json_pack ("{s:s,s:i}", "kty", "RSA", "bits", 2048);
941 jose_jwk_gen (NULL, jwk);
942 json_incref (jwk);
943 return jwk;
944}
945
946
952static char *
954{
955 char *oidc_directory;
956 struct RequestHandle *handle = cls;
957
958 // Read OIDC directory from config
960 "reclaim-rest-plugin",
961 "oidc_dir",
962 &oidc_directory))
963 {
964 // Could not read Config file
966 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
967 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
969 return NULL;
970 }
971
972 return oidc_directory;
973}
974
975
981static char *
983{
984 char *oidc_directory;
985 char *oidc_jwk_path;
986
987 oidc_directory = get_oidc_dir_path (cls);
988
989 // Create path to file
990 GNUNET_asprintf (&oidc_jwk_path, "%s/%s", oidc_directory,
992
993 return oidc_jwk_path;
994}
995
996
1000static void
1002{
1003 char *login_base_url;
1004 char *new_redirect;
1005 char *tmp;
1006 struct MHD_Response *resp;
1007 struct GNUNET_Buffer buf = { 0 };
1008 struct RequestHandle *handle = cls;
1009
1011 "reclaim-rest-plugin",
1012 "address",
1013 &login_base_url))
1014 {
1015 GNUNET_buffer_write_str (&buf, login_base_url);
1017 "?%s=%s",
1019 handle->oidc->response_type);
1021 "&%s=%s",
1023 handle->oidc->client_id);
1024 GNUNET_STRINGS_urlencode (strlen (handle->oidc->redirect_uri),
1025 handle->oidc->redirect_uri,
1026 &tmp);
1028 "&%s=%s",
1030 tmp);
1031 GNUNET_free (tmp);
1032 GNUNET_STRINGS_urlencode (strlen (handle->oidc->scope),
1033 handle->oidc->scope,
1034 &tmp);
1036 "&%s=%s",
1038 tmp);
1039 GNUNET_free (tmp);
1040 if (NULL != handle->oidc->state)
1041 {
1042 GNUNET_STRINGS_urlencode (strlen (handle->oidc->state),
1043 handle->oidc->state,
1044 &tmp);
1046 "&%s=%s",
1048 handle->oidc->state);
1049 GNUNET_free (tmp);
1050 }
1051 if (NULL != handle->oidc->code_challenge)
1052 {
1054 "&%s=%s",
1056 handle->oidc->code_challenge);
1057 }
1058 if (NULL != handle->oidc->nonce)
1059 {
1061 "&%s=%s",
1063 handle->oidc->nonce);
1064 }
1065 if (NULL != handle->oidc->claims)
1066 {
1067 GNUNET_STRINGS_urlencode (strlen (handle->oidc->claims),
1068 handle->oidc->claims,
1069 &tmp);
1071 "&%s=%s",
1073 tmp);
1074 GNUNET_free (tmp);
1075 }
1076 new_redirect = GNUNET_buffer_reap_str (&buf);
1077 resp = GNUNET_REST_create_response ("");
1078 MHD_add_response_header (resp, "Location", new_redirect);
1079 GNUNET_free (login_base_url);
1080 }
1081 else
1082 {
1084 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
1085 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1087 return;
1088 }
1089 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
1090 GNUNET_free (new_redirect);
1092}
1093
1094
1098static void
1100{
1101 struct RequestHandle *handle = cls;
1102
1104 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1106}
1107
1108
1113static void
1115 const struct GNUNET_RECLAIM_Ticket *ticket,
1116 const struct
1117 GNUNET_RECLAIM_PresentationList *presentation)
1118{
1119 struct RequestHandle *handle = cls;
1120 struct MHD_Response *resp;
1121 char *ticket_str;
1122 char *redirect_uri;
1123 char *code_string;
1124
1125 handle->idp_op = NULL;
1126 if (NULL == ticket)
1127 {
1129 handle->edesc = GNUNET_strdup ("Server cannot generate ticket.");
1131 return;
1132 }
1133 handle->ticket = *ticket;
1134 ticket_str =
1136 sizeof(struct GNUNET_RECLAIM_Ticket));
1137 code_string = OIDC_build_authz_code (&handle->priv_key,
1138 &handle->ticket,
1139 handle->attr_idtoken_list,
1140 presentation,
1141 handle->oidc->nonce,
1142 handle->oidc->code_challenge);
1143 if ((NULL != handle->redirect_prefix) && (NULL != handle->redirect_suffix) &&
1144 (NULL != handle->tld))
1145 {
1146 GNUNET_asprintf (&redirect_uri,
1147 "%s.%s/%s%s%s=%s&state=%s",
1148 handle->redirect_prefix,
1149 handle->tld,
1150 handle->redirect_suffix,
1151 (NULL == strchr (handle->redirect_suffix, '?') ? "?" :
1152 "&"),
1153 handle->oidc->response_type,
1154 code_string,
1155 handle->oidc->state);
1156 }
1157 else
1158 {
1159 GNUNET_asprintf (&redirect_uri,
1160 "%s%s%s=%s&state=%s",
1161 handle->oidc->redirect_uri,
1162 (NULL == strchr (handle->oidc->redirect_uri, '?') ? "?" :
1163 "&"),
1164 handle->oidc->response_type,
1165 code_string,
1166 handle->oidc->state);
1167 }
1168 resp = GNUNET_REST_create_response ("");
1169 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
1170 "Location", redirect_uri));
1171 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
1173 GNUNET_free (redirect_uri);
1174 GNUNET_free (ticket_str);
1175 GNUNET_free (code_string);
1176}
1177
1178
1179static struct GNUNET_RECLAIM_AttributeList*
1181 struct GNUNET_RECLAIM_AttributeList *list_b)
1182{
1183 struct GNUNET_RECLAIM_AttributeList *merged_list;
1187
1188 merged_list = GNUNET_new (struct GNUNET_RECLAIM_AttributeList);
1189 for (le_a = list_a->list_head; NULL != le_a; le_a = le_a->next)
1190 {
1193 &le_a->attribute->
1194 credential,
1195 le_a->attribute->type,
1196 le_a->attribute->data,
1197 le_a->attribute->data_size);
1198 le_m->attribute->id = le_a->attribute->id;
1199 le_m->attribute->flag = le_a->attribute->flag;
1200 le_m->attribute->credential = le_a->attribute->credential;
1202 merged_list->list_tail,
1203 le_m);
1204 }
1205 le_m = NULL;
1206 for (le_b = list_b->list_head; NULL != le_b; le_b = le_b->next)
1207 {
1208 for (le_m = merged_list->list_head; NULL != le_m; le_m = le_m->next)
1209 {
1211 &le_b->attribute->id))
1212 break;
1213 }
1214 if (NULL != le_m)
1215 continue;
1218 &le_b->attribute->
1219 credential,
1220 le_b->attribute->type,
1221 le_b->attribute->data,
1222 le_b->attribute->data_size);
1223 le_m->attribute->id = le_b->attribute->id;
1224 le_m->attribute->flag = le_b->attribute->flag;
1225 le_m->attribute->credential = le_b->attribute->credential;
1227 merged_list->list_tail,
1228 le_m);
1229 }
1230 return merged_list;
1231}
1232
1233
1234static void
1236{
1237 struct RequestHandle *handle = cls;
1238 struct GNUNET_RECLAIM_AttributeList *merged_list;
1240
1241 handle->cred_it = NULL;
1242 merged_list = attribute_list_merge (handle->attr_idtoken_list,
1243 handle->attr_userinfo_list);
1244 for (le_m = merged_list->list_head; NULL != le_m; le_m = le_m->next)
1246 "List Attribute in ticket to issue: %s\n",
1247 le_m->attribute->name);
1249 &handle->priv_key,
1250 handle->oidc->client_id,
1251 merged_list,
1253 handle);
1255}
1256
1257
1261static void
1264 const struct GNUNET_RECLAIM_Credential *cred)
1265{
1266 struct RequestHandle *handle = cls;
1269
1270 for (ale = handle->credentials->list_head; NULL != ale; ale = ale->next)
1271 {
1273 &cred->id))
1274 continue;
1277 return;
1278 }
1279
1280 for (le = handle->attr_idtoken_list->list_head; NULL != le; le = le->next)
1281 {
1283 &cred->id))
1284 continue;
1288 cred->type,
1289 cred->data,
1290 cred->data_size);
1291 GNUNET_CONTAINER_DLL_insert (handle->credentials->list_head,
1292 handle->credentials->list_tail,
1293 ale);
1294 }
1296}
1297
1298
1299static void
1301{
1302 struct RequestHandle *handle = cls;
1303
1304 handle->attr_it = NULL;
1305 handle->ticket_it = NULL;
1306 if (NULL == handle->attr_idtoken_list->list_head)
1307 {
1309 handle->edesc = GNUNET_strdup ("The requested scope is not available.");
1311 return;
1312 }
1313 handle->credentials = GNUNET_new (struct GNUNET_RECLAIM_CredentialList);
1314 handle->cred_it =
1316 &handle->priv_key,
1318 handle,
1320 handle,
1322 handle);
1323
1324}
1325
1326
1327static int
1329 const char *attr_name,
1330 const char *claims_parameter)
1331{
1332 int ret = GNUNET_NO;
1333 json_t *root;
1334 json_error_t error;
1335 json_t *claims_j;
1336 const char *key;
1337 json_t *value;
1338
1341 attr_name))
1342 return GNUNET_YES;
1343
1345 if (NULL != handle->oidc->claims)
1346 {
1347 root = json_loads (handle->oidc->claims, JSON_DECODE_ANY, &error);
1348 claims_j = json_object_get (root, claims_parameter);
1349 /* obj is a JSON object */
1350 if (NULL != claims_j)
1351 {
1352 json_object_foreach (claims_j, key, value) {
1353 if (0 != strcmp (attr_name, key))
1354 continue;
1355 ret = GNUNET_YES;
1356 break;
1357 }
1358 }
1359 json_decref (root);
1360 }
1361 return ret;
1362}
1363
1364
1365static int
1367 const char *attr_name)
1368{
1369 return attr_in_claims_request (handle, attr_name, "id_token");
1370}
1371
1372
1373static int
1375 const char *attr_name)
1376{
1377 return attr_in_claims_request (handle, attr_name, "userinfo");
1378}
1379
1380
1384static void
1387 const struct GNUNET_RECLAIM_Attribute *attr)
1388{
1389 struct RequestHandle *handle = cls;
1392 {
1395 &attr->credential,
1396 attr->type,
1397 attr->data,
1398 attr->data_size);
1399 le->attribute->id = attr->id;
1400 le->attribute->flag = attr->flag;
1401 le->attribute->credential = attr->credential;
1402 GNUNET_CONTAINER_DLL_insert (handle->attr_idtoken_list->list_head,
1403 handle->attr_idtoken_list->list_tail,
1404 le);
1405 }
1407 {
1410 &attr->credential,
1411 attr->type,
1412 attr->data,
1413 attr->data_size);
1414 le->attribute->id = attr->id;
1415 le->attribute->flag = attr->flag;
1416 le->attribute->credential = attr->credential;
1417 GNUNET_CONTAINER_DLL_insert (handle->attr_userinfo_list->list_head,
1418 handle->attr_userinfo_list->list_tail,
1419 le);
1420 }
1421
1423}
1424
1425
1429static void
1430code_redirect (void *cls)
1431{
1432 struct RequestHandle *handle = cls;
1433 struct GNUNET_TIME_Absolute current_time;
1434 struct GNUNET_TIME_Absolute *relog_time;
1436 struct GNUNET_CRYPTO_BlindablePublicKey ego_pkey;
1437 struct GNUNET_HashCode cache_key;
1438 char *identity_cookie;
1439
1440 GNUNET_asprintf (&identity_cookie,
1441 "Identity=%s",
1442 handle->oidc->login_identity);
1443 GNUNET_CRYPTO_hash (identity_cookie, strlen (identity_cookie), &cache_key);
1444 GNUNET_free (identity_cookie);
1445 // No login time for identity -> redirect to login
1446 if (GNUNET_YES ==
1448 {
1449 relog_time =
1451 current_time = GNUNET_TIME_absolute_get ();
1452 // 30 min after old login -> redirect to login
1453 if (current_time.abs_value_us <= relog_time->abs_value_us)
1454 {
1455 if (GNUNET_OK !=
1457 ->login_identity,
1458 &pubkey))
1459 {
1461 handle->edesc =
1462 GNUNET_strdup ("The cookie of a login identity is not valid");
1464 return;
1465 }
1466 // iterate over egos and compare their public key
1467 for (handle->ego_entry = ego_head; NULL != handle->ego_entry;
1468 handle->ego_entry = handle->ego_entry->next)
1469 {
1470 GNUNET_IDENTITY_ego_get_public_key (handle->ego_entry->ego, &ego_pkey);
1471 if (0 == GNUNET_memcmp (&ego_pkey, &pubkey))
1472 {
1473 handle->priv_key =
1475 handle->attr_idtoken_list =
1477 handle->attr_userinfo_list =
1479 handle->attr_it =
1481 &handle->priv_key,
1483 handle,
1485 handle,
1487 handle);
1488 return;
1489 }
1490 }
1492 return;
1493 }
1494 }
1495}
1496
1497
1498static void
1500{
1501 struct RequestHandle *handle = cls;
1502 struct MHD_Response *resp;
1503 char *redirect_uri;
1504
1505 if (GNUNET_YES == handle->oidc->user_cancelled)
1506 {
1507 if ((NULL != handle->redirect_prefix) &&
1508 (NULL != handle->redirect_suffix) && (NULL != handle->tld))
1509 {
1510 GNUNET_asprintf (&redirect_uri,
1511 "%s.%s/%s?error=%s&error_description=%s&state=%s",
1512 handle->redirect_prefix,
1513 handle->tld,
1514 handle->redirect_suffix,
1515 "access_denied",
1516 "User denied access",
1517 handle->oidc->state);
1518 }
1519 else
1520 {
1521 GNUNET_asprintf (&redirect_uri,
1522 "%s?error=%s&error_description=%s&state=%s",
1523 handle->oidc->redirect_uri,
1524 "access_denied",
1525 "User denied access",
1526 handle->oidc->state);
1527 }
1528 resp = GNUNET_REST_create_response ("");
1529 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
1530 "Location",
1531 redirect_uri));
1532 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
1534 GNUNET_free (redirect_uri);
1535 return;
1536 }
1538}
1539
1540
1541static void
1543 uint32_t rd_count,
1544 const struct GNUNET_GNSRECORD_Data *rd)
1545{
1546 struct RequestHandle *handle = cls;
1547 char *tmp;
1548 char *tmp_key_str;
1549 char *pos;
1550 struct GNUNET_CRYPTO_BlindablePublicKey redirect_zone;
1551
1552 handle->gns_op = NULL;
1553 if (0 == rd_count)
1554 {
1556 handle->edesc =
1557 GNUNET_strdup ("Server cannot generate ticket, redirect uri not found.");
1559 return;
1560 }
1561 for (int i = 0; i < rd_count; i++)
1562 {
1563 if (GNUNET_GNSRECORD_TYPE_RECLAIM_OIDC_REDIRECT != rd[i].record_type)
1564 continue;
1565 if (0 != strncmp (rd[i].data, handle->oidc->redirect_uri, rd[i].data_size))
1566 continue;
1567 tmp = GNUNET_strndup (rd[i].data, rd[i].data_size);
1568 if (NULL == strstr (tmp, handle->oidc->client_id))
1569 {
1571 "Redirect uri %s does not contain client_id %s\n",
1572 tmp,
1573 handle->oidc->client_id);
1574 }
1575 else
1576 {
1577 pos = strrchr (tmp, (unsigned char) '.');
1578 if (NULL == pos)
1579 {
1581 "Redirect uri %s contains client_id but is malformed\n",
1582 tmp);
1583 GNUNET_free (tmp);
1584 continue;
1585 }
1586 *pos = '\0';
1587 handle->redirect_prefix = GNUNET_strdup (tmp);
1588 tmp_key_str = pos + 1;
1589 pos = strchr (tmp_key_str, (unsigned char) '/');
1590 if (NULL == pos)
1591 {
1593 "Redirect uri %s contains client_id but is malformed\n",
1594 tmp);
1595 GNUNET_free (tmp);
1596 continue;
1597 }
1598 *pos = '\0';
1599 handle->redirect_suffix = GNUNET_strdup (pos + 1);
1600
1601 GNUNET_STRINGS_string_to_data (tmp_key_str,
1602 strlen (tmp_key_str),
1603 &redirect_zone,
1604 sizeof(redirect_zone));
1605 }
1607 GNUNET_free (tmp);
1608 return;
1609 }
1611 handle->edesc =
1612 GNUNET_strdup ("Server cannot generate ticket, redirect uri not found.");
1614}
1615
1616
1620static void
1622{
1623 struct RequestHandle *handle = cls;
1624
1625 /* Lookup client redirect uri to verify request */
1626 handle->gns_op =
1629 &handle->oidc->client_pkey,
1633 handle);
1634}
1635
1636
1637static char *
1639{
1640 struct GNUNET_HashCode hc;
1641 char *value;
1642 char *res;
1643
1644 GNUNET_CRYPTO_hash (key, strlen (key), &hc);
1646 ->url_param_map,
1647 &hc))
1648 return NULL;
1649 value =
1650 GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->url_param_map, &hc);
1651 if (NULL == value)
1652 return NULL;
1654 return res;
1655}
1656
1657
1664static void
1666{
1667 struct RequestHandle *handle = cls;
1668 struct GNUNET_HashCode cache_key;
1669
1670 char *expected_scope;
1671 char delimiter[] = " ";
1672 char *test;
1673 int number_of_ignored_parameter, iterator;
1674
1675
1676 // REQUIRED value: redirect_uri
1677 handle->oidc->redirect_uri =
1679 if (NULL == handle->oidc->redirect_uri)
1680 {
1682 handle->edesc = GNUNET_strdup ("missing parameter redirect_uri");
1684 return;
1685 }
1686
1687 // REQUIRED value: response_type
1688 handle->oidc->response_type =
1690 if (NULL == handle->oidc->response_type)
1691 {
1693 handle->edesc = GNUNET_strdup ("missing parameter response_type");
1695 return;
1696 }
1697
1698 // REQUIRED value: scope
1700 if (NULL == handle->oidc->scope)
1701 {
1703 handle->edesc = GNUNET_strdup ("missing parameter scope");
1705 return;
1706 }
1707
1708 // OPTIONAL value: nonce
1710
1711 // OPTIONAL value: claims
1713
1714 // TODO check other values if needed
1715 number_of_ignored_parameter =
1716 sizeof(OIDC_ignored_parameter_array) / sizeof(char *);
1717 for (iterator = 0; iterator < number_of_ignored_parameter; iterator++)
1718 {
1720 strlen (OIDC_ignored_parameter_array[iterator]),
1721 &cache_key);
1722 if (GNUNET_YES ==
1724 ->url_param_map,
1725 &cache_key))
1726 {
1728 GNUNET_asprintf (&handle->edesc,
1729 "Server will not handle parameter: %s",
1732 return;
1733 }
1734 }
1735
1736 // We only support authorization code flows.
1737 if (0 != strcmp (handle->oidc->response_type,
1739 {
1741 handle->edesc = GNUNET_strdup ("The authorization server does not support "
1742 "obtaining this authorization code.");
1744 return;
1745 }
1746
1747 // Checks if scope contains 'openid'
1748 expected_scope = GNUNET_strdup (handle->oidc->scope);
1749 test = strtok (expected_scope, delimiter);
1750 while (NULL != test)
1751 {
1752 if (0 == strcmp (OIDC_EXPECTED_AUTHORIZATION_SCOPE, expected_scope))
1753 break;
1754 test = strtok (NULL, delimiter);
1755 }
1756 if (NULL == test)
1757 {
1759 handle->edesc =
1760 GNUNET_strdup ("The requested scope is invalid, unknown, or malformed.");
1762 GNUNET_free (expected_scope);
1763 return;
1764 }
1765
1766 GNUNET_free (expected_scope);
1767 if ((NULL == handle->oidc->login_identity) &&
1768 (GNUNET_NO == handle->oidc->user_cancelled))
1770 else
1772}
1773
1774
1778static void
1779tld_iter (void *cls, const char *section, const char *option, const char *value)
1780{
1781 struct RequestHandle *handle = cls;
1783
1784 if (GNUNET_OK !=
1786 {
1787 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Skipping non key %s\n", value);
1788 return;
1789 }
1790 if (0 == GNUNET_memcmp (&pkey, &handle->oidc->client_pkey))
1791 handle->tld = GNUNET_strdup (option + 1);
1792}
1793
1794
1802static void
1804 const char *url,
1805 void *cls)
1806{
1807 struct RequestHandle *handle = cls;
1808 struct EgoEntry *tmp_ego;
1809 const struct GNUNET_CRYPTO_BlindablePrivateKey *priv_key;
1811
1813
1814 // RECOMMENDED value: state - REQUIRED for answers
1816
1817 // REQUIRED value: client_id
1819 if (NULL == handle->oidc->client_id)
1820 {
1822 handle->edesc = GNUNET_strdup ("missing parameter client_id");
1823 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1825 return;
1826 }
1827
1828 // OPTIONAL value: code_challenge
1829 handle->oidc->code_challenge = get_url_parameter_copy (handle,
1831 if (NULL == handle->oidc->code_challenge)
1832 {
1834 "OAuth authorization request does not contain PKCE parameters!\n");
1835 }
1836
1837 if (GNUNET_OK !=
1839 &handle->oidc->client_pkey
1840 ))
1841 {
1843 handle->edesc = GNUNET_strdup ("The client is not authorized to request an "
1844 "authorization code using this method.");
1845 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1847 return;
1848 }
1849
1850 // If we know this identity, translated the corresponding TLD
1851 // TODO: We might want to have a reverse lookup functionality for TLDs?
1852 for (tmp_ego = ego_head; NULL != tmp_ego; tmp_ego = tmp_ego->next)
1853 {
1854 priv_key = GNUNET_IDENTITY_ego_get_private_key (tmp_ego->ego);
1856 if (0 == GNUNET_memcmp (&pkey, &handle->oidc->client_pkey))
1857 {
1858 handle->tld = GNUNET_strdup (tmp_ego->identifier);
1859 handle->ego_entry = ego_tail;
1860 }
1861 }
1862 if (NULL == handle->tld)
1864 handle);
1865 if (NULL == handle->tld)
1866 handle->tld = GNUNET_strdup (handle->oidc->client_id);
1868}
1869
1870
1878static void
1880 const char *url,
1881 void *cls)
1882{
1883 struct MHD_Response *resp = GNUNET_REST_create_response ("");
1884 struct RequestHandle *handle = cls;
1885 struct GNUNET_HashCode cache_key;
1886 struct GNUNET_TIME_Absolute *current_time;
1887 struct GNUNET_TIME_Absolute *last_time;
1888 char *cookie;
1889 char *header_val;
1890 json_t *root;
1891 json_error_t error;
1892 json_t *identity;
1893 char term_data[handle->rest_handle->data_size + 1];
1894
1895 term_data[handle->rest_handle->data_size] = '\0';
1896 GNUNET_memcpy (term_data,
1897 handle->rest_handle->data,
1898 handle->rest_handle->data_size);
1899 root = json_loads (term_data, JSON_DECODE_ANY, &error);
1900 identity = json_object_get (root, "identity");
1901 if (! json_is_string (identity))
1902 {
1904 "Error parsing json string from %s\n",
1905 term_data);
1906 handle->proc (handle->proc_cls, resp, MHD_HTTP_BAD_REQUEST);
1907 json_decref (root);
1909 return;
1910 }
1911 GNUNET_asprintf (&cookie, "Identity=%s", json_string_value (identity));
1912 GNUNET_asprintf (&header_val,
1913 "%s;Max-Age=%d",
1914 cookie,
1916 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
1917 "Set-Cookie", header_val));
1918 GNUNET_assert (MHD_NO !=
1919 MHD_add_response_header (resp,
1920 "Access-Control-Allow-Methods",
1921 "POST"));
1922 GNUNET_CRYPTO_hash (cookie, strlen (cookie), &cache_key);
1923
1924 if (0 != strcmp (json_string_value (identity), "Denied"))
1925 {
1926 current_time = GNUNET_new (struct GNUNET_TIME_Absolute);
1927 *current_time = GNUNET_TIME_relative_to_absolute (
1930 last_time =
1932 GNUNET_free (last_time);
1934 &cache_key,
1935 current_time,
1937 }
1938 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
1939 GNUNET_free (cookie);
1940 GNUNET_free (header_val);
1941 json_decref (root);
1943}
1944
1945
1946static int
1948 char **client_id,
1949 char **client_secret)
1950{
1951 struct GNUNET_HashCode cache_key;
1952 char *authorization;
1953 char *credentials;
1954 char *basic_authorization;
1955 char *client_id_tmp;
1956 char *pass;
1957
1960 &cache_key);
1962 ->header_param_map,
1963 &cache_key))
1964 return GNUNET_SYSERR;
1965 authorization =
1966 GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->header_param_map,
1967 &cache_key);
1968
1969 // split header in "Basic" and [content]
1970 credentials = strtok (authorization, " ");
1971 if ((NULL == credentials) || (0 != strcmp ("Basic", credentials)))
1972 return GNUNET_SYSERR;
1973 credentials = strtok (NULL, " ");
1974 if (NULL == credentials)
1975 return GNUNET_SYSERR;
1976 GNUNET_STRINGS_base64_decode (credentials,
1977 strlen (credentials),
1978 (void **) &basic_authorization);
1979
1980 if (NULL == basic_authorization)
1981 return GNUNET_SYSERR;
1982 client_id_tmp = strtok (basic_authorization, ":");
1983 if (NULL == client_id_tmp)
1984 {
1985 GNUNET_free (basic_authorization);
1986 return GNUNET_SYSERR;
1987 }
1988 pass = strtok (NULL, ":");
1989 if (NULL == pass)
1990 {
1991 GNUNET_free (basic_authorization);
1992 return GNUNET_SYSERR;
1993 }
1994 *client_id = strdup (client_id_tmp);
1995 *client_secret = strdup (pass);
1996 GNUNET_free (basic_authorization);
1997 return GNUNET_OK;
1998}
1999
2000
2001static int
2003 char **client_id,
2004 char **client_secret)
2005{
2006 struct GNUNET_HashCode cache_key;
2007 char *client_id_tmp;
2008 char *pass;
2009
2010 GNUNET_CRYPTO_hash ("client_id",
2011 strlen ("client_id"),
2012 &cache_key);
2014 ->url_param_map,
2015 &cache_key))
2016 return GNUNET_SYSERR;
2017 client_id_tmp = GNUNET_CONTAINER_multihashmap_get (
2018 handle->rest_handle->url_param_map,
2019 &cache_key);
2020 if (NULL == client_id_tmp)
2021 return GNUNET_SYSERR;
2022 *client_id = strdup (client_id_tmp);
2023 GNUNET_CRYPTO_hash ("client_secret",
2024 strlen ("client_secret"),
2025 &cache_key);
2027 ->url_param_map,
2028 &cache_key))
2029 {
2030 GNUNET_free (*client_id);
2031 *client_id = NULL;
2032 return GNUNET_SYSERR;
2033 }
2034 pass = GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->url_param_map,
2035 &cache_key);
2036 if (NULL == pass)
2037 {
2038 GNUNET_free (*client_id);
2039 *client_id = NULL;
2040 return GNUNET_SYSERR;
2041 }
2042 *client_secret = strdup (pass);
2043 return GNUNET_OK;
2044}
2045
2046
2047static int
2050{
2051 char *expected_pass;
2052 char *received_cid;
2053 char *received_cpw;
2054 char *pkce_cv;
2055
2057 &received_cid,
2058 &received_cpw))
2059 {
2061 "Received client credentials in HTTP AuthZ header\n");
2062 }
2064 &received_cid,
2065 &received_cpw))
2066 {
2068 "Received client credentials in POST body\n");
2069 }
2070 else
2071 {
2074 if (NULL == pkce_cv)
2075 {
2077 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2078 return GNUNET_SYSERR;
2079 }
2080 handle->public_client = GNUNET_YES;
2081 GNUNET_free (pkce_cv);
2083 GNUNET_STRINGS_string_to_data (received_cid,
2084 strlen (received_cid),
2085 cid,
2086 sizeof(struct
2088 GNUNET_free (received_cid);
2089 return GNUNET_OK;
2090
2091 }
2092
2093 // check client password
2095 "reclaim-rest-plugin",
2096 "OIDC_CLIENT_HMAC_SECRET",
2097 &expected_pass))
2098 {
2099 if (0 != strcmp (expected_pass, received_cpw))
2100 {
2101 GNUNET_free (expected_pass);
2103 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2104 GNUNET_free (received_cpw);
2105 GNUNET_free (received_cid);
2106 return GNUNET_SYSERR;
2107 }
2108 GNUNET_free (expected_pass);
2109 }
2110 else
2111 {
2112 GNUNET_free (received_cpw);
2113 GNUNET_free (received_cid);
2115 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
2116 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
2117 return GNUNET_SYSERR;
2118 }
2119 // check client_id
2120 for (handle->ego_entry = ego_head; NULL != handle->ego_entry;
2121 handle->ego_entry = handle->ego_entry->next)
2122 {
2123 if (0 == strcmp (handle->ego_entry->keystring, received_cid))
2124 break;
2125 }
2126 if (NULL == handle->ego_entry)
2127 {
2128 GNUNET_free (received_cpw);
2129 GNUNET_free (received_cid);
2131 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2132 return GNUNET_SYSERR;
2133 }
2134 GNUNET_STRINGS_string_to_data (received_cid,
2135 strlen (received_cid),
2136 cid,
2138 );
2139
2140 GNUNET_free (received_cpw);
2141 GNUNET_free (received_cid);
2142 return GNUNET_OK;
2143}
2144
2145
2146static const struct EgoEntry *
2148 struct GNUNET_CRYPTO_BlindablePublicKey *test_key)
2149{
2150 struct EgoEntry *ego_entry;
2151 struct GNUNET_CRYPTO_BlindablePublicKey pub_key;
2152
2153 for (ego_entry = ego_head; NULL != ego_entry;
2154 ego_entry = ego_entry->next)
2155 {
2156 GNUNET_IDENTITY_ego_get_public_key (ego_entry->ego, &pub_key);
2157 if (0 == GNUNET_memcmp (&pub_key, test_key))
2158 return ego_entry;
2159 }
2160 return NULL;
2161}
2162
2163
2171static void
2173 const char *url,
2174 void *cls)
2175{
2176 struct RequestHandle *handle = cls;
2177 const struct EgoEntry *ego_entry = NULL;
2178 struct GNUNET_TIME_Relative expiration_time;
2179 struct GNUNET_RECLAIM_AttributeList *cl = NULL;
2180 struct GNUNET_RECLAIM_PresentationList *pl = NULL;
2183 struct GNUNET_HashCode cache_key;
2184 struct MHD_Response *resp = NULL;
2186 char *grant_type = NULL;
2187 char *code = NULL;
2188 char *json_response = NULL;
2189 char *id_token = NULL;
2190 char *access_token = NULL;
2191 char *jwa = NULL;
2192 char *jwt_secret = NULL;
2193 char *nonce = NULL;
2194 char *code_verifier = NULL;
2195 json_t *oidc_jwk_tmp = NULL;
2196 char *oidc_jwk_path = NULL;
2197 char *oidc_directory = NULL;
2198 char *tmp_at = NULL;
2199 char *received_cid = NULL;
2200 char *emsg = NULL;
2201
2202 /*
2203 * Check Authorization
2204 */
2206 {
2208 "OIDC authorization for token endpoint failed\n");
2210 return;
2211 }
2213
2214 /*
2215 * Check parameter
2216 */
2217
2218 // TODO Do not allow multiple equal parameter names
2219 // REQUIRED grant_type
2221 strlen (OIDC_GRANT_TYPE_KEY),
2222 &cache_key);
2224 if (NULL == grant_type)
2225 {
2227 handle->edesc = GNUNET_strdup ("missing parameter grant_type");
2228 handle->response_code = MHD_HTTP_BAD_REQUEST;
2230 return;
2231 }
2232
2233 // Check parameter grant_type == "authorization_code"
2234 if (0 != strcmp (OIDC_GRANT_TYPE_VALUE, grant_type))
2235 {
2237 handle->response_code = MHD_HTTP_BAD_REQUEST;
2238 GNUNET_free (grant_type);
2240 return;
2241 }
2242 GNUNET_free (grant_type);
2243 // REQUIRED code
2245 if (NULL == code)
2246 {
2248 handle->edesc = GNUNET_strdup ("missing parameter code");
2249 handle->response_code = MHD_HTTP_BAD_REQUEST;
2251 return;
2252 }
2253 ego_entry = find_ego (handle, &cid);
2254 if (NULL == ego_entry)
2255 {
2257 handle->edesc = GNUNET_strdup ("Unknown client");
2258 handle->response_code = MHD_HTTP_BAD_REQUEST;
2259 GNUNET_free (code);
2261 return;
2262 }
2263
2264 // REQUIRED code verifier
2266 if (NULL == code_verifier)
2267 {
2269 "OAuth authorization request does not contain PKCE parameters!\n");
2270
2271 }
2272
2273 // decode code
2274 if (GNUNET_OK != OIDC_parse_authz_code (received_cid, &cid, code,
2275 code_verifier,
2276 &ticket,
2277 &cl, &pl, &nonce,
2279 &emsg))
2280 {
2282 handle->edesc = emsg;
2283 handle->response_code = MHD_HTTP_BAD_REQUEST;
2284 GNUNET_free (code);
2285 if (NULL != code_verifier)
2286 GNUNET_free (code_verifier);
2288 return;
2289 }
2290 if (NULL != code_verifier)
2291 GNUNET_free (code_verifier);
2292
2293 // create jwt
2295 "reclaim-rest-plugin",
2296 "expiration_time",
2297 &expiration_time))
2298 {
2300 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
2301 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
2302 GNUNET_free (code);
2303 if (NULL != nonce)
2304 GNUNET_free (nonce);
2308 return;
2309 }
2310
2311 // Check if HMAC or RSA should be used
2313 "reclaim-rest-plugin",
2314 "oidc_json_web_algorithm",
2315 &jwa))
2316 {
2318 "Could not read OIDC JSON Web Algorithm config attribute."
2319 "Defaulting to RS256.");
2321 }
2322
2324
2325 if (! strcmp (jwa, JWT_ALG_VALUE_RSA))
2326 {
2327 // Replace for now
2328 oidc_jwk_path = get_oidc_jwk_path (cls);
2329 oidc_jwk_tmp = read_jwk_from_file (oidc_jwk_path);
2330
2331 // Check if secret JWK exists
2332 if (! oidc_jwk_tmp)
2333 {
2334 // Generate and save a new key
2335 oidc_jwk_tmp = generate_jwk ();
2336 oidc_directory = get_oidc_dir_path (cls);
2337
2338 // Create new oidc directory
2339 if (GNUNET_OK != GNUNET_DISK_directory_create (oidc_directory))
2340 {
2342 ("Failed to create directory `%s' for storing oidc data\n"),
2343 oidc_directory);
2344 }
2345 else
2346 {
2347 write_jwk_to_file (oidc_jwk_path, oidc_jwk_tmp);
2348 }
2349 }
2350
2351 // Generate oidc token
2352 id_token = OIDC_generate_id_token_rsa (received_cid,
2353 &issuer,
2354 cl,
2355 pl,
2356 &expiration_time,
2357 (NULL != nonce) ? nonce : NULL,
2358 oidc_jwk_tmp);
2359 }
2360 else if (! strcmp (jwa, JWT_ALG_VALUE_HMAC))
2361 {
2362 // TODO OPTIONAL acr,amr,azp
2364 "reclaim-rest-plugin",
2365 "jwt_secret",
2366 &jwt_secret))
2367 {
2369 handle->edesc = GNUNET_strdup ("No signing secret configured!");
2370 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
2371 GNUNET_free (code);
2374 if (NULL != nonce)
2375 GNUNET_free (nonce);
2376 GNUNET_free (jwa);
2378 return;
2379 }
2380
2381 id_token = OIDC_generate_id_token_hmac (received_cid,
2382 &issuer,
2383 cl,
2384 pl,
2385 &expiration_time,
2386 (NULL != nonce) ? nonce : NULL,
2387 jwt_secret);
2388
2389 GNUNET_free (jwt_secret);
2390 }
2391 else
2392 {
2393 // TODO: OPTION NOT FOUND ERROR
2394 }
2395 GNUNET_free (jwa);
2396
2397 if (NULL != nonce)
2398 GNUNET_free (nonce);
2399 access_token = OIDC_access_token_new (&ticket, handle->oidc->redirect_uri);
2404 GNUNET_CRYPTO_hash (access_token,
2405 strlen (access_token),
2406 &cache_key);
2418 &cache_key);
2420 &cache_key,
2421 code,
2423 /* If there was a previous code in there, free the old value */
2424 if (NULL != tmp_at)
2425 {
2427 "OIDC access token already issued. Cleanup.\n");
2428 GNUNET_free (tmp_at);
2429 }
2430
2431 OIDC_build_token_response (access_token,
2432 id_token,
2433 &expiration_time,
2434 &json_response);
2435
2436 resp = GNUNET_REST_create_response (json_response);
2437 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
2438 "Cache-Control",
2439 "no-store"));
2440 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
2441 "Pragma", "no-cache"));
2442 GNUNET_assert (MHD_NO != MHD_add_response_header (resp,
2443 "Content-Type",
2444 "application/json"));
2445 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
2448 GNUNET_free (access_token);
2449 GNUNET_free (json_response);
2450 GNUNET_free (id_token);
2452}
2453
2454
2458static void
2461 const struct GNUNET_RECLAIM_Attribute *attr,
2462 const struct GNUNET_RECLAIM_Presentation *presentation)
2463{
2464 struct RequestHandle *handle = cls;
2467 struct MHD_Response *resp;
2468 struct GNUNET_HashCode cache_key;
2469 char *result_str;
2470 char *cached_code;
2471
2472 if (NULL != handle->consume_timeout_op)
2473 GNUNET_SCHEDULER_cancel (handle->consume_timeout_op);
2474 handle->consume_timeout_op = NULL;
2475 handle->idp_op = NULL;
2476
2480 GNUNET_CRYPTO_hash (handle->access_token,
2481 strlen (handle->access_token),
2482 &cache_key);
2484 &cache_key);
2485 if (NULL != cached_code)
2486 {
2489 &cache_key,
2490 cached_code));
2491 GNUNET_free (cached_code);
2492 }
2493
2494
2495 if (NULL == identity)
2496 {
2498 char *key;
2499 char *tmp = GNUNET_strdup (handle->ticket.gns_name);
2500 GNUNET_assert (NULL != strtok (tmp, "."));
2501 key = strtok (NULL, ".");
2502 GNUNET_assert (NULL != key);
2505 );
2506 GNUNET_free (tmp);
2507 result_str = OIDC_generate_userinfo (&issuer,
2508 handle->attr_userinfo_list,
2509 handle->presentations);
2510 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Userinfo: %s\n", result_str);
2511 resp = GNUNET_REST_create_response (result_str);
2512 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
2513 GNUNET_free (result_str);
2515 return;
2516 }
2519 &attr->credential,
2520 attr->type,
2521 attr->data,
2522 attr->data_size);
2523 ale->attribute->id = attr->id;
2524 ale->attribute->flag = attr->flag;
2525 ale->attribute->credential = attr->credential;
2526 GNUNET_CONTAINER_DLL_insert (handle->attr_userinfo_list->list_head,
2527 handle->attr_userinfo_list->list_tail,
2528 ale);
2529 if (NULL == presentation)
2530 return;
2531 for (atle = handle->presentations->list_head;
2532 NULL != atle; atle = atle->next)
2533 {
2536 &presentation->credential_id))
2537 continue;
2538 break;
2539 }
2540 if (NULL == atle)
2541 {
2544 atle->presentation = GNUNET_RECLAIM_presentation_new (presentation->type,
2545 presentation->data,
2546 presentation->
2547 data_size);
2548 atle->presentation->credential_id = presentation->credential_id;
2549 GNUNET_CONTAINER_DLL_insert (handle->presentations->list_head,
2550 handle->presentations->list_tail,
2551 atle);
2552 }
2553}
2554
2555
2556static void
2557consume_fail (void *cls)
2558{
2559 struct RequestHandle *handle = cls;
2560 struct GNUNET_HashCode cache_key;
2561 struct GNUNET_RECLAIM_AttributeList *cl = NULL;
2562 struct GNUNET_RECLAIM_PresentationList *pl = NULL;
2565 struct MHD_Response *resp;
2567 char *nonce;
2568 char *cached_code;
2569 char *result_str;
2570 char *received_cid;
2571 char *emsg;
2572 char *tmp;
2573 char *key;
2574
2575 handle->consume_timeout_op = NULL;
2576 if (NULL != handle->idp_op)
2577 GNUNET_RECLAIM_cancel (handle->idp_op);
2578 handle->idp_op = NULL;
2579
2581 "Ticket consumptioned timed out. Using cache...\n");
2582 GNUNET_CRYPTO_hash (handle->access_token,
2583 strlen (handle->access_token),
2584 &cache_key);
2586 &cache_key);
2587 if (NULL == cached_code)
2588 {
2590 handle->edesc = GNUNET_strdup ("No Access Token in cache!");
2591 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2593 return;
2594 }
2600 &cache_key,
2601 cached_code));
2603 GNUNET_STRINGS_string_to_data (received_cid,
2604 strlen (received_cid),
2605 &cid,
2607 );
2608
2609 // decode code
2610 if (GNUNET_OK != OIDC_parse_authz_code (received_cid, &cid,
2611 cached_code, NULL, &ticket,
2612 &cl, &pl, &nonce,
2614 emsg))
2615 {
2617 handle->edesc = emsg;
2618 handle->response_code = MHD_HTTP_BAD_REQUEST;
2619 GNUNET_free (cached_code);
2620 if (NULL != nonce)
2621 GNUNET_free (nonce);
2623 return;
2624 }
2625
2626 GNUNET_free (cached_code);
2627
2628 tmp = GNUNET_strdup (handle->ticket.gns_name);
2629 GNUNET_assert (NULL != strtok (tmp, "."));
2630 key = strtok (NULL, ".");
2631 GNUNET_assert (NULL != key);
2634 GNUNET_free (tmp);
2635 result_str = OIDC_generate_userinfo (&issuer,
2636 cl,
2637 pl);
2638 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Userinfo: %s\n", result_str);
2639 resp = GNUNET_REST_create_response (result_str);
2640 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
2641 GNUNET_free (result_str);
2642 GNUNET_free (nonce);
2646}
2647
2648
2656static void
2658 const char *url,
2659 void *cls)
2660{
2661 // TODO expiration time
2662 struct RequestHandle *handle = cls;
2664 char delimiter[] = " ";
2665 struct GNUNET_HashCode cache_key;
2666 char *authorization;
2667 char *authorization_type;
2668 char *authorization_access_token;
2669
2670 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Getting userinfo\n");
2673 &cache_key);
2675 ->header_param_map,
2676 &cache_key))
2677 {
2679 handle->edesc = GNUNET_strdup ("No Access Token");
2680 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2682 return;
2683 }
2684 authorization =
2685 GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->header_param_map,
2686 &cache_key);
2687
2688 // split header in "Bearer" and access_token
2689 authorization = GNUNET_strdup (authorization);
2690 authorization_type = strtok (authorization, delimiter);
2691 if ((NULL == authorization_type) ||
2692 (0 != strcmp ("Bearer", authorization_type)))
2693 {
2695 handle->edesc = GNUNET_strdup ("No Access Token");
2696 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2698 GNUNET_free (authorization);
2699 return;
2700 }
2701 authorization_access_token = strtok (NULL, delimiter);
2702 if (NULL == authorization_access_token)
2703 {
2705 handle->edesc = GNUNET_strdup ("Access token missing");
2706 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2708 GNUNET_free (authorization);
2709 return;
2710 }
2711
2712 {
2713 char *rp_uri;
2714 if (GNUNET_OK != OIDC_access_token_parse (authorization_access_token,
2715 &ticket, &rp_uri))
2716 {
2718 handle->edesc = GNUNET_strdup ("The access token is invalid");
2719 handle->response_code = MHD_HTTP_UNAUTHORIZED;
2721 GNUNET_free (authorization);
2722 return;
2723
2724 }
2725 GNUNET_assert (NULL != ticket);
2726 handle->ticket = *ticket;
2728 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Consuming ticket\n");
2729 handle->attr_userinfo_list =
2731 handle->presentations =
2733
2734 /* If the consume takes too long, we use values from the cache */
2735 handle->access_token = GNUNET_strdup (authorization_access_token);
2737 &consume_fail,
2738 handle);
2740 &handle->ticket,
2741 rp_uri,
2743 handle);
2744 GNUNET_free (authorization);
2745 GNUNET_free (rp_uri);
2746 }
2747}
2748
2749
2757static void
2759 const char *url,
2760 void *cls)
2761{
2762 char *oidc_directory;
2763 char *oidc_jwk_path;
2764 char *oidc_jwk_pub_str;
2765 json_t *oidc_jwk_tmp;
2766 struct MHD_Response *resp;
2767 struct RequestHandle *handle = cls;
2768
2769 oidc_jwk_path = get_oidc_jwk_path (cls);
2770 oidc_jwk_tmp = read_jwk_from_file (oidc_jwk_path);
2771
2772 // Check if secret JWK exists
2773 if (! oidc_jwk_tmp)
2774 {
2775 // Generate and save a new key
2776 oidc_jwk_tmp = generate_jwk ();
2777 oidc_directory = get_oidc_dir_path (cls);
2778
2779 // Create new oidc directory
2780 if (GNUNET_OK != GNUNET_DISK_directory_create (oidc_directory))
2781 {
2783 ("Failed to create directory `%s' for storing oidc data\n"),
2784 oidc_directory);
2785 }
2786 else
2787 {
2788 write_jwk_to_file (oidc_jwk_path, oidc_jwk_tmp);
2789 }
2790 }
2791
2792 // Convert secret JWK to public JWK
2793 jose_jwk_pub (NULL, oidc_jwk_tmp);
2794
2795 // Encode JWK as string and return to API endpoint
2796 oidc_jwk_pub_str = json_dumps (oidc_jwk_tmp, JSON_INDENT (1));
2797 resp = GNUNET_REST_create_response (oidc_jwk_pub_str);
2798 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
2799 json_decref (oidc_jwk_tmp);
2800 GNUNET_free (oidc_jwk_pub_str);
2801 GNUNET_free (oidc_jwk_pub_str);
2803}
2804
2805
2838static void
2839list_ego (void *cls,
2840 struct GNUNET_IDENTITY_Ego *ego,
2841 void **ctx,
2842 const char *identifier)
2843{
2844 struct EgoEntry *ego_entry;
2846
2847 if (NULL == ego)
2848 {
2850 return;
2851 }
2853
2854 {
2855 ego_entry = GNUNET_new (struct EgoEntry);
2858 ego_entry->ego = ego;
2859 ego_entry->identifier = GNUNET_strdup (identifier);
2861 ego_tail,
2862 ego_entry);
2863 return;
2864 }
2865 /* Ego renamed or added */
2866 if (identifier != NULL)
2867 {
2868 for (ego_entry = ego_head; NULL != ego_entry;
2869 ego_entry = ego_entry->next)
2870 {
2871 if (ego_entry->ego == ego)
2872 {
2873 /* Rename */
2874 GNUNET_free (ego_entry->identifier);
2875 ego_entry->identifier = GNUNET_strdup (identifier);
2876 break;
2877 }
2878 }
2879 if (NULL == ego_entry)
2880 {
2881 /* Add */
2882 ego_entry = GNUNET_new (struct EgoEntry);
2885 ego_entry->ego = ego;
2886 ego_entry->identifier = GNUNET_strdup (identifier);
2888 ego_tail,
2889 ego_entry);
2890 }
2891 }
2892 else
2893 {
2894 /* Delete */
2895 for (ego_entry = ego_head; NULL != ego_entry;
2896 ego_entry = ego_entry->next)
2897 {
2898 if (ego_entry->ego == ego)
2899 break;
2900 }
2901 if (NULL == ego_entry)
2902 return; /* Not found */
2903
2905 ego_tail,
2906 ego_entry);
2907 GNUNET_free (ego_entry->identifier);
2908 GNUNET_free (ego_entry->keystring);
2909 GNUNET_free (ego_entry);
2910 return;
2911 }
2912}
2913
2914
2915static void
2917 const char *url,
2918 void *cls)
2919{
2920 json_t *oidc_config;
2921 json_t *auth_methods;
2922 json_t *sig_algs;
2923 json_t *scopes;
2924 json_t *response_types;
2925 json_t *sub_types;
2926 json_t *claim_types;
2927 char *oidc_config_str;
2928 struct MHD_Response *resp;
2929 struct RequestHandle *handle = cls;
2930
2931 oidc_config = json_object ();
2932 // FIXME get from config?
2933 json_object_set_new (oidc_config,
2934 "issuer", json_string ("http://localhost:7776"));
2935 json_object_set_new (oidc_config,
2936 "authorization_endpoint",
2937 json_string ("https://api.reclaim/openid/authorize"));
2938 json_object_set_new (oidc_config,
2939 "token_endpoint",
2940 json_string ("http://localhost:7776/openid/token"));
2941 auth_methods = json_array ();
2942 json_array_append_new (auth_methods,
2943 json_string ("client_secret_basic"));
2944 json_array_append_new (auth_methods,
2945 json_string ("client_secret_post"));
2946 json_object_set_new (oidc_config,
2947 "token_endpoint_auth_methods_supported",
2948 auth_methods);
2949 sig_algs = json_array ();
2950 json_array_append_new (sig_algs,
2951 json_string ("HS512"));
2952 json_array_append_new (sig_algs,
2953 json_string ("RS256"));
2954 json_object_set_new (oidc_config,
2955 "id_token_signing_alg_values_supported",
2956 sig_algs);
2957 json_object_set_new (oidc_config,
2958 "jwks_uri",
2959 json_string ("http://localhost:7776/jwks.json"));
2960 json_object_set_new (oidc_config,
2961 "userinfo_endpoint",
2962 json_string ("http://localhost:7776/openid/userinfo"));
2963 scopes = json_array ();
2964 json_array_append_new (scopes,
2965 json_string ("openid"));
2966 json_array_append_new (scopes,
2967 json_string ("profile"));
2968 json_array_append_new (scopes,
2969 json_string ("email"));
2970 json_array_append_new (scopes,
2971 json_string ("address"));
2972 json_array_append_new (scopes,
2973 json_string ("phone"));
2974 json_object_set_new (oidc_config,
2975 "scopes_supported",
2976 scopes);
2977 response_types = json_array ();
2978 json_array_append_new (response_types,
2979 json_string ("code"));
2980 json_object_set_new (oidc_config,
2981 "response_types_supported",
2982 response_types);
2983 sub_types = json_array ();
2984 json_array_append_new (sub_types,
2985 json_string ("public")); /* no pairwise support */
2986 json_object_set_new (oidc_config,
2987 "subject_types_supported",
2988 sub_types);
2989 claim_types = json_array ();
2990 json_array_append_new (claim_types,
2991 json_string ("normal"));
2992 json_array_append_new (claim_types,
2993 json_string ("aggregated"));
2994 json_object_set_new (oidc_config,
2995 "claim_types_supported",
2996 claim_types);
2997 json_object_set_new (oidc_config,
2998 "claims_parameter_supported",
2999 json_boolean (1));
3000 oidc_config_str = json_dumps (oidc_config, JSON_INDENT (1));
3001 resp = GNUNET_REST_create_response (oidc_config_str);
3002 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
3003 json_decref (oidc_config);
3004 GNUNET_free (oidc_config_str);
3006}
3007
3008
3016static void
3018 const char *url,
3019 void *cls)
3020{
3021 struct MHD_Response *resp;
3022 struct RequestHandle *handle = cls;
3023
3024 // For now, independent of path return all options
3025 resp = GNUNET_REST_create_response (NULL);
3026 GNUNET_assert (MHD_NO !=
3027 MHD_add_response_header (resp,
3028 "Access-Control-Allow-Methods",
3029 allow_methods));
3030 GNUNET_assert (MHD_NO !=
3031 MHD_add_response_header (resp,
3032 "Access-Control-Allow-Origin",
3033 "*"));
3034 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
3036 return;
3037}
3038
3039
3044 void *proc_cls)
3045{
3046 struct RequestHandle *handle = GNUNET_new (struct RequestHandle);
3048 static const struct GNUNET_REST_RequestHandler handlers[] =
3049 { { MHD_HTTP_METHOD_GET, GNUNET_REST_API_NS_AUTHORIZE, &authorize_endpoint },
3050 { MHD_HTTP_METHOD_POST,
3052 { MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_LOGIN, &login_cont },
3053 { MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_TOKEN, &token_endpoint },
3054 { MHD_HTTP_METHOD_GET, GNUNET_REST_API_NS_USERINFO, &userinfo_endpoint },
3055 { MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_USERINFO, &userinfo_endpoint },
3056 { MHD_HTTP_METHOD_GET, GNUNET_REST_API_JWKS, &jwks_endpoint },
3057 { MHD_HTTP_METHOD_GET, GNUNET_REST_API_NS_OIDC_CONFIG,
3059 { MHD_HTTP_METHOD_OPTIONS, GNUNET_REST_API_NS_OIDC_CONFIG,
3061 { MHD_HTTP_METHOD_OPTIONS, GNUNET_REST_API_NS_OIDC, &options_cont },
3063
3064 handle->oidc = GNUNET_new (struct OIDC_Variables);
3065 if (NULL == OIDC_cookie_jar_map)
3067 GNUNET_NO);
3068 if (NULL == oidc_code_cache)
3070 GNUNET_NO);
3071
3072 handle->response_code = 0;
3074 handle->proc_cls = proc_cls;
3075 handle->proc = proc;
3076 handle->rest_handle = rest_handle;
3077 handle->url = GNUNET_strdup (rest_handle->url);
3078 handle->timeout_task =
3082 handle);
3083 if (handle->url[strlen (handle->url) - 1] == '/')
3084 handle->url[strlen (handle->url) - 1] = '\0';
3085 if (GNUNET_NO ==
3086 GNUNET_REST_handle_request (handle->rest_handle, handlers, &err, handle))
3087 return GNUNET_NO;
3088
3089 return GNUNET_YES;
3090}
3091
3092
3099void *
3101{
3102 static struct Plugin plugin;
3103 struct GNUNET_REST_Plugin *api;
3104
3105 oid_cfg = c;
3106 if (NULL != plugin.cfg)
3107 return NULL; /* can only initialize once! */
3108 memset (&plugin, 0, sizeof(struct Plugin));
3109 plugin.cfg = oid_cfg;
3110 api = GNUNET_new (struct GNUNET_REST_Plugin);
3111 api->cls = &plugin;
3117 "reclaim-rest-plugin",
3118 "OIDC_USERINFO_CONSUME_TIMEOUT",
3120 {
3122 }
3123
3124
3127 "%s, %s, %s, %s, %s",
3128 MHD_HTTP_METHOD_GET,
3129 MHD_HTTP_METHOD_POST,
3130 MHD_HTTP_METHOD_PUT,
3131 MHD_HTTP_METHOD_DELETE,
3132 MHD_HTTP_METHOD_OPTIONS);
3133
3135 _ ("OpenID Connect REST API initialized\n"));
3136 return api;
3137}
3138
3139
3140static int
3141cleanup_hashmap (void *cls, const struct GNUNET_HashCode *key, void *value)
3142{
3144 return GNUNET_YES;
3145}
3146
3147
3148void
3150{
3151 struct Plugin *plugin = api->cls;
3152 struct EgoEntry *ego_entry;
3153
3154 plugin->cfg = NULL;
3155 while (NULL != requests_head)
3157 if (NULL != OIDC_cookie_jar_map)
3158 {
3161 NULL);
3163 }
3164 if (NULL != oidc_code_cache)
3165 {
3168 NULL);
3170 }
3171
3173 if (NULL != gns_handle)
3175 if (NULL != identity_handle)
3177 if (NULL != idp)
3179 while (NULL != (ego_entry = ego_head))
3180 {
3182 ego_tail,
3183 ego_entry);
3184 GNUNET_free (ego_entry->identifier);
3185 GNUNET_free (ego_entry->keystring);
3186 GNUNET_free (ego_entry);
3187 }
3188 GNUNET_free (api);
3190 "OpenID Connect REST plugin is finished\n");
3191}
3192
3193
3194/* end of plugin_rest_openid_connect.c */
struct GNUNET_MQ_MessageHandlers handlers[]
Definition 003.c:1
#define GNUNET_GNSRECORD_TYPE_RECLAIM_OIDC_REDIRECT
Used reclaimID OIDC client redirect URIs.
static int ret
Final status code.
Definition gnunet-arm.c:93
static struct GNUNET_TESTING_PluginFunctions * plugin
Plugin to dynamically load a test case.
static gnutls_certificate_credentials_t cred
The credential.
static char * data
The data to insert into the dht.
struct GNUNET_HashCode key
The key used in the DHT.
static struct GNUNET_FS_Handle * ctx
static char * filename
struct GNUNET_CRYPTO_BlindablePrivateKey pk
Private key from command line option, or NULL.
static struct GNUNET_CRYPTO_BlindablePublicKey pubkey
Public key of the zone to look in.
static char * pkey
Public key of the zone to look in, in ASCII.
static unsigned int rd_count
Number of records for currently parsed set.
static char * res
Currently read line or NULL on EOF.
static struct GNUNET_GNSRECORD_Data rd[50]
The record data under a single label.
static char * value
Value of the record to add/remove.
static size_t data_size
Number of bytes in data.
static struct GNUNET_IDENTITY_Handle * identity
Which namespace do we publish to? NULL if we do not publish to a namespace.
static char * attr_name
The attribute.
static struct GNUNET_RECLAIM_Ticket ticket
Ticket to consume.
static char * consume_ticket
Ticket to consume.
static struct GNUNET_RECLAIM_Identifier credential
Credential ID.
static struct GNUNET_VPN_Handle * handle
Handle to vpn service.
Definition gnunet-vpn.c:35
API to the GNS service.
API that can be used to manipulate GNS record data.
Identity service; implements identity management for GNUnet.
Identity attribute definitions.
reclaim service; implements identity and personal data sharing for GNUnet
API for helper library to parse/create REST.
GNUnet service REST plugin header.
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_filename(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, char **value)
Get a configuration value that should be the name of a file or directory.
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_time(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, struct GNUNET_TIME_Relative *time)
Get a configuration value that should be a relative time.
enum GNUNET_GenericReturnValue GNUNET_CONFIGURATION_get_value_string(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, const char *option, char **value)
Get a configuration value that should be a string.
void GNUNET_CONFIGURATION_iterate_section_values(const struct GNUNET_CONFIGURATION_Handle *cfg, const char *section, GNUNET_CONFIGURATION_Iterator iter, void *iter_cls)
Iterate over values of a section in the configuration.
enum GNUNET_GenericReturnValue GNUNET_DISK_directory_create(const char *dir)
Implementation of "mkdir -p".
Definition disk.c:547
#define GNUNET_CONTAINER_DLL_remove(head, tail, element)
Remove an element from a DLL.
#define GNUNET_CONTAINER_DLL_insert_tail(head, tail, element)
Insert an element at the tail of a DLL.
#define GNUNET_CONTAINER_DLL_insert(head, tail, element)
Insert an element at the head of a DLL.
void GNUNET_GNS_disconnect(struct GNUNET_GNS_Handle *handle)
Shutdown connection with the GNS service.
Definition gns_api.c:289
struct GNUNET_GNS_LookupRequest * GNUNET_GNS_lookup(struct GNUNET_GNS_Handle *handle, const char *name, const struct GNUNET_CRYPTO_BlindablePublicKey *zone, uint32_t type, enum GNUNET_GNS_LocalOptions options, GNUNET_GNS_LookupResultProcessor proc, void *proc_cls)
Perform an asynchronous lookup operation on the GNS.
Definition gns_api.c:421
enum GNUNET_GenericReturnValue GNUNET_GNS_parse_ztld(const char *name, struct GNUNET_CRYPTO_BlindablePublicKey *ztld_key)
Try to parse the zTLD into a public key.
void * GNUNET_GNS_lookup_cancel(struct GNUNET_GNS_LookupRequest *lr)
Cancel pending lookup request.
Definition gns_api.c:313
struct GNUNET_GNS_Handle * GNUNET_GNS_connect(const struct GNUNET_CONFIGURATION_Handle *cfg)
Initialize the connection with the GNS service.
Definition gns_api.c:267
@ GNUNET_GNS_LO_DEFAULT
Defaults, look in cache, then in DHT.
#define GNUNET_GNS_EMPTY_LABEL_AT
String we use to indicate an empty label (top-level entry in the zone).
void GNUNET_CRYPTO_hash(const void *block, size_t size, struct GNUNET_HashCode *ret)
Compute hash of a given block.
Definition crypto_hash.c:41
enum GNUNET_GenericReturnValue GNUNET_CONTAINER_multihashmap_contains(const struct GNUNET_CONTAINER_MultiHashMap *map, const struct GNUNET_HashCode *key)
Check if the map contains any value under the given key (including values that are NULL).
int GNUNET_CONTAINER_multihashmap_iterate(struct GNUNET_CONTAINER_MultiHashMap *map, GNUNET_CONTAINER_MultiHashMapIteratorCallback it, void *it_cls)
Iterate over all entries in the map.
void * GNUNET_CONTAINER_multihashmap_get(const struct GNUNET_CONTAINER_MultiHashMap *map, const struct GNUNET_HashCode *key)
Given a key find a value in the map matching the key.
enum GNUNET_GenericReturnValue GNUNET_CONTAINER_multihashmap_remove(struct GNUNET_CONTAINER_MultiHashMap *map, const struct GNUNET_HashCode *key, const void *value)
Remove the given key-value pair from the map.
enum GNUNET_GenericReturnValue GNUNET_CONTAINER_multihashmap_put(struct GNUNET_CONTAINER_MultiHashMap *map, const struct GNUNET_HashCode *key, void *value, enum GNUNET_CONTAINER_MultiHashMapOption opt)
Store a key-value pair in the map.
void GNUNET_CONTAINER_multihashmap_destroy(struct GNUNET_CONTAINER_MultiHashMap *map)
Destroy a hash map.
struct GNUNET_CONTAINER_MultiHashMap * GNUNET_CONTAINER_multihashmap_create(unsigned int len, int do_not_copy_keys)
Create a multi hash map.
@ GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE
If a value with the given key exists, replace it.
void GNUNET_IDENTITY_ego_get_public_key(struct GNUNET_IDENTITY_Ego *ego, struct GNUNET_CRYPTO_BlindablePublicKey *pk)
Get the identifier (public key) of an ego.
struct GNUNET_IDENTITY_Handle * GNUNET_IDENTITY_connect(const struct GNUNET_CONFIGURATION_Handle *cfg, GNUNET_IDENTITY_Callback cb, void *cb_cls)
Connect to the identity service.
void GNUNET_IDENTITY_disconnect(struct GNUNET_IDENTITY_Handle *h)
Disconnect from identity service.
const struct GNUNET_CRYPTO_BlindablePrivateKey * GNUNET_IDENTITY_ego_get_private_key(const struct GNUNET_IDENTITY_Ego *ego)
Obtain the ECC key associated with a ego.
enum GNUNET_GenericReturnValue GNUNET_CRYPTO_blindable_key_get_public(const struct GNUNET_CRYPTO_BlindablePrivateKey *privkey, struct GNUNET_CRYPTO_BlindablePublicKey *key)
Retrieves the public key representation of a private key.
#define GNUNET_log(kind,...)
char * GNUNET_buffer_reap_str(struct GNUNET_Buffer *buf)
Clear the buffer and return the string it contained.
Definition buffer.c:89
char * GNUNET_CRYPTO_blindable_public_key_to_string(const struct GNUNET_CRYPTO_BlindablePublicKey *key)
Creates a (Base32) string representation of the public key.
enum GNUNET_GenericReturnValue GNUNET_CRYPTO_blindable_public_key_from_string(const char *str, struct GNUNET_CRYPTO_BlindablePublicKey *key)
Parses a (Base32) string representation of the public key.
void GNUNET_buffer_write_fstr(struct GNUNET_Buffer *buf, const char *fmt,...) __attribute__((format(printf
Write a 0-terminated formatted string to a buffer, excluding the 0-terminator.
#define GNUNET_memcmp(a, b)
Compare memory in a and b, where both must be of the same pointer type.
void GNUNET_buffer_write_str(struct GNUNET_Buffer *buf, const char *str)
Write a 0-terminated string to a buffer, excluding the 0-terminator.
Definition buffer.c:77
#define GNUNET_memcpy(dst, src, n)
Call memcpy() but check for n being 0 first.
GNUNET_GenericReturnValue
Named constants for return values.
@ GNUNET_OK
@ GNUNET_YES
@ GNUNET_NO
@ GNUNET_SYSERR
#define GNUNET_assert(cond)
Use this for fatal errors that cannot be handled.
@ GNUNET_ERROR_TYPE_WARNING
@ GNUNET_ERROR_TYPE_ERROR
@ GNUNET_ERROR_TYPE_DEBUG
int int GNUNET_asprintf(char **buf, const char *format,...) __attribute__((format(printf
Like asprintf, just portable.
#define GNUNET_strdup(a)
Wrapper around GNUNET_xstrdup_.
#define GNUNET_strndup(a, length)
Wrapper around GNUNET_xstrndup_.
#define GNUNET_new(type)
Allocate a struct or union of the given type.
#define GNUNET_free(ptr)
Wrapper around free.
#define GNUNET_RECLAIM_id_is_equal(a, b)
struct GNUNET_RECLAIM_Presentation * GNUNET_RECLAIM_presentation_new(uint32_t type, const void *data, size_t data_size)
void GNUNET_RECLAIM_attribute_list_destroy(struct GNUNET_RECLAIM_AttributeList *attrs)
Destroy claim list.
void GNUNET_RECLAIM_credential_list_destroy(struct GNUNET_RECLAIM_CredentialList *credentials)
Destroy credential list.
void GNUNET_RECLAIM_presentation_list_destroy(struct GNUNET_RECLAIM_PresentationList *presentations)
Destroy presentations list.
struct GNUNET_RECLAIM_Attribute * GNUNET_RECLAIM_attribute_new(const char *attr_name, const struct GNUNET_RECLAIM_Identifier *credential, uint32_t type, const void *data, size_t data_size)
Create a new attribute claim.
struct GNUNET_RECLAIM_Credential * GNUNET_RECLAIM_credential_new(const char *name, uint32_t type, const void *data, size_t data_size)
Create a new credential.
void GNUNET_RECLAIM_disconnect(struct GNUNET_RECLAIM_Handle *h)
Disconnect from identity provider service.
struct GNUNET_RECLAIM_Operation * GNUNET_RECLAIM_ticket_consume(struct GNUNET_RECLAIM_Handle *h, const struct GNUNET_RECLAIM_Ticket *ticket, const char *rp_uri, GNUNET_RECLAIM_AttributeTicketResult cb, void *cb_cls)
Consumes an issued ticket.
void GNUNET_RECLAIM_cancel(struct GNUNET_RECLAIM_Operation *op)
Cancel an identity provider operation.
void GNUNET_RECLAIM_get_attributes_stop(struct GNUNET_RECLAIM_AttributeIterator *it)
Stops iteration and releases the handle for further calls.
void GNUNET_RECLAIM_get_credentials_next(struct GNUNET_RECLAIM_CredentialIterator *ait)
Calls the record processor specified in GNUNET_RECLAIM_get_credentials_start for the next record.
void GNUNET_RECLAIM_get_attributes_next(struct GNUNET_RECLAIM_AttributeIterator *it)
Calls the record processor specified in GNUNET_RECLAIM_get_attributes_start for the next record.
struct GNUNET_RECLAIM_CredentialIterator * GNUNET_RECLAIM_get_credentials_start(struct GNUNET_RECLAIM_Handle *h, const struct GNUNET_CRYPTO_BlindablePrivateKey *identity, GNUNET_SCHEDULER_TaskCallback error_cb, void *error_cb_cls, GNUNET_RECLAIM_CredentialResult proc, void *proc_cls, GNUNET_SCHEDULER_TaskCallback finish_cb, void *finish_cb_cls)
List all credentials for a local identity.
struct GNUNET_RECLAIM_Handle * GNUNET_RECLAIM_connect(const struct GNUNET_CONFIGURATION_Handle *cfg)
Connect to the re:claimID service.
struct GNUNET_RECLAIM_Operation * GNUNET_RECLAIM_ticket_issue(struct GNUNET_RECLAIM_Handle *h, const struct GNUNET_CRYPTO_BlindablePrivateKey *iss, const char *rp_uri, const struct GNUNET_RECLAIM_AttributeList *attrs, GNUNET_RECLAIM_IssueTicketCallback cb, void *cb_cls)
Issues a ticket to a relying party.
void GNUNET_RECLAIM_get_credentials_stop(struct GNUNET_RECLAIM_CredentialIterator *ait)
Stops iteration and releases the handle for further calls.
struct GNUNET_RECLAIM_AttributeIterator * GNUNET_RECLAIM_get_attributes_start(struct GNUNET_RECLAIM_Handle *h, const struct GNUNET_CRYPTO_BlindablePrivateKey *identity, GNUNET_SCHEDULER_TaskCallback error_cb, void *error_cb_cls, GNUNET_RECLAIM_AttributeResult proc, void *proc_cls, GNUNET_SCHEDULER_TaskCallback finish_cb, void *finish_cb_cls)
List all attributes for a local identity.
void GNUNET_RECLAIM_ticket_iteration_stop(struct GNUNET_RECLAIM_TicketIterator *it)
Stops iteration and releases the handle for further calls.
int GNUNET_REST_handle_request(struct GNUNET_REST_RequestHandle *conn, const struct GNUNET_REST_RequestHandler *handlers, struct GNUNET_REST_RequestHandlerError *err, void *cls)
Definition rest.c:64
void(* GNUNET_REST_ResultProcessor)(void *cls, struct MHD_Response *resp, int status)
Iterator called on obtained result for a REST result.
#define GNUNET_REST_HANDLER_END
struct MHD_Response * GNUNET_REST_create_response(const char *data)
Create REST MHD response.
Definition rest.c:44
void * GNUNET_SCHEDULER_cancel(struct GNUNET_SCHEDULER_Task *task)
Cancel the task with the specified identifier.
Definition scheduler.c:980
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_now(GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run as soon as possible.
Definition scheduler.c:1304
struct GNUNET_SCHEDULER_Task * GNUNET_SCHEDULER_add_delayed(struct GNUNET_TIME_Relative delay, GNUNET_SCHEDULER_TaskCallback task, void *task_cls)
Schedule a new task to be run with a specified delay.
Definition scheduler.c:1277
size_t GNUNET_STRINGS_urlencode(size_t len, const char data[static len], char **out)
url/percent encode (RFC3986).
Definition strings.c:1882
char * GNUNET_STRINGS_data_to_string_alloc(const void *buf, size_t size)
Return the base32crockford encoding of the given buffer.
Definition strings.c:807
size_t GNUNET_STRINGS_urldecode(const char *data, size_t len, char **out)
url/percent encode (RFC3986).
Definition strings.c:1827
enum GNUNET_GenericReturnValue GNUNET_STRINGS_string_to_data(const char *enc, size_t enclen, void *out, size_t out_size)
Convert CrockfordBase32 encoding back to data.
Definition strings.c:832
size_t GNUNET_STRINGS_base64_decode(const char *data, size_t len, void **output)
Decode from Base64.
Definition strings.c:1720
#define GNUNET_TIME_UNIT_FOREVER_REL
Constant used to specify "forever".
struct GNUNET_TIME_Absolute GNUNET_TIME_absolute_get(void)
Get the current time.
Definition time.c:111
struct GNUNET_TIME_Relative GNUNET_TIME_relative_get_second_(void)
Return relative time of 1s.
Definition time.c:169
struct GNUNET_TIME_Absolute GNUNET_TIME_relative_to_absolute(struct GNUNET_TIME_Relative rel)
Convert relative time to an absolute time in the future.
Definition time.c:316
struct GNUNET_TIME_Relative GNUNET_TIME_relative_multiply(struct GNUNET_TIME_Relative rel, unsigned long long factor)
Multiply relative time by a given factor.
Definition time.c:486
char * OIDC_generate_userinfo(const struct GNUNET_CRYPTO_BlindablePublicKey *sub_key, const struct GNUNET_RECLAIM_AttributeList *attrs, const struct GNUNET_RECLAIM_PresentationList *presentations)
Generate userinfo JSON as string.
char * OIDC_build_authz_code(const struct GNUNET_CRYPTO_BlindablePrivateKey *issuer, const struct GNUNET_RECLAIM_Ticket *ticket, const struct GNUNET_RECLAIM_AttributeList *attrs, const struct GNUNET_RECLAIM_PresentationList *presentations, const char *nonce_str, const char *code_challenge)
Builds an OIDC authorization code including a reclaim ticket and nonce.
char * OIDC_generate_id_token_rsa(const char *rp_uri, const struct GNUNET_CRYPTO_BlindablePublicKey *sub_key, const struct GNUNET_RECLAIM_AttributeList *attrs, const struct GNUNET_RECLAIM_PresentationList *presentations, const struct GNUNET_TIME_Relative *expiration_time, const char *nonce, const json_t *secret_rsa_key)
Create a JWT using RSA256 algorithm from attributes.
char * OIDC_access_token_new(const struct GNUNET_RECLAIM_Ticket *ticket, const char *rp_uri)
Generate a new access token.
int OIDC_parse_authz_code(const char *rp_uri, const struct GNUNET_CRYPTO_BlindablePublicKey *cid, const char *code, const char *code_verifier, struct GNUNET_RECLAIM_Ticket *ticket, struct GNUNET_RECLAIM_AttributeList **attrs, struct GNUNET_RECLAIM_PresentationList **presentations, char **nonce_str, enum OIDC_VerificationOptions opts, char **emsg)
Parse reclaim ticket and nonce from authorization code.
int OIDC_access_token_parse(const char *token, struct GNUNET_RECLAIM_Ticket **ticket, char **rp_uri)
Parse an access token.
enum GNUNET_GenericReturnValue OIDC_check_scopes_for_claim_request(const char *scopes, const char *attr)
Checks if a claim is implicitly requested through standard scope(s) or explicitly through non-standar...
void OIDC_build_token_response(const char *access_token, const char *id_token, const struct GNUNET_TIME_Relative *expiration_time, char **token_response)
Build a token response for a token request TODO: Maybe we should add the scope here?
char * OIDC_generate_id_token_hmac(const char *rp_uri, const struct GNUNET_CRYPTO_BlindablePublicKey *sub_key, const struct GNUNET_RECLAIM_AttributeList *attrs, const struct GNUNET_RECLAIM_PresentationList *presentations, const struct GNUNET_TIME_Relative *expiration_time, const char *nonce, const char *secret_key)
Create a JWT using HMAC (HS256) from attributes.
#define JWT_ALG_VALUE_RSA
Definition oidc_helper.h:37
@ OIDC_VERIFICATION_NO_CODE_VERIFIER
Do not check code verifier even if expected.
Definition oidc_helper.h:51
@ OIDC_VERIFICATION_DEFAULT
Strict verification.
Definition oidc_helper.h:46
#define JWT_ALG_VALUE_HMAC
Definition oidc_helper.h:36
static struct EgoEntry * ego_tail
Ego list.
#define OIDC_SCOPE_KEY
OIDC scope key.
static void consume_fail(void *cls)
static int attr_in_userinfo_request(struct RequestHandle *handle, const char *attr_name)
#define OIDC_AUTHORIZATION_HEADER_KEY
OIDC cookie header information key.
#define GNUNET_REST_API_NS_OIDC_CONFIG
OIDC config.
static struct GNUNET_RECLAIM_Handle * idp
Identity Provider.
static const char * OIDC_ignored_parameter_array[]
OIDC ignored parameter array.
struct GNUNET_CONTAINER_MultiHashMap * oidc_code_cache
OIDC hashmap for cached access tokens and codes.
static void cookie_identity_interpretation(struct RequestHandle *handle)
Interprets cookie header and pass its identity keystring to handle.
static struct GNUNET_GNS_Handle * gns_handle
GNS handle.
static int write_jwk_to_file(const char *filename, json_t *jwk)
Write the JWK to file.
static char * get_oidc_dir_path(void *cls)
Return the path to the oidc directory path.
#define OIDC_ERROR_KEY_INVALID_REQUEST
OIDC error key for invalid requests.
static int attr_in_claims_request(struct RequestHandle *handle, const char *attr_name, const char *claims_parameter)
void REST_openid_done(struct GNUNET_REST_Plugin *api)
Exit point from the plugin.
static char * get_url_parameter_copy(const struct RequestHandle *handle, const char *key)
#define GNUNET_REST_API_NS_LOGIN
Login namespace.
#define OIDC_ERROR_KEY_UNAUTHORIZED_CLIENT
OIDC error key for unauthorized clients.
#define GNUNET_REST_API_NS_OIDC
REST root namespace.
static void do_timeout(void *cls)
Task run on timeout, sends error message.
static int parse_credentials_post_body(struct RequestHandle *handle, char **client_id, char **client_secret)
static void token_endpoint(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Responds to token url-encoded POST request.
static void userinfo_endpoint(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Responds to userinfo GET and url-encoded POST request.
static void jwks_endpoint(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Responds to /jwks.json.
#define OIDC_ERROR_KEY_UNSUPPORTED_GRANT_TYPE
OIDC error key for unsupported grants.
#define OIDC_ERROR_KEY_INVALID_TOKEN
OIDC error key for invalid tokens.
static struct GNUNET_TIME_Relative consume_timeout
Timeout for consume call on userinfo.
#define OIDC_CLAIMS_KEY
OIDC claims key.
struct GNUNET_CONTAINER_MultiHashMap * OIDC_cookie_jar_map
OIDC hashmap that keeps track of issued cookies.
#define OIDC_ERROR_KEY_SERVER_ERROR
OIDC error key for generic server errors.
#define OIDC_COOKIE_EXPIRATION
OIDC cookie expiration (in seconds)
#define OIDC_ERROR_KEY_ACCESS_DENIED
OIDC error key for denied access.
static void login_cont(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Combines an identity with a login time and responds OK to login request.
#define OIDC_COOKIE_HEADER_KEY
OIDC cookie header key.
enum GNUNET_GenericReturnValue REST_openid_process_request(void *plugin, struct GNUNET_REST_RequestHandle *rest_handle, GNUNET_REST_ResultProcessor proc, void *proc_cls)
Function processing the REST call.
#define GNUNET_REST_API_JWKS
JSON Web Keys endpoint.
void * REST_openid_init(const struct GNUNET_CONFIGURATION_Handle *c)
Entry point for the plugin.
#define OIDC_JWK_RSA_FILENAME
OIDC key store file name.
#define ID_REST_STATE_INIT
State while collecting all egos.
#define OIDC_REDIRECT_URI_KEY
OIDC redirect_uri key.
static void do_redirect_error(void *cls)
Task run on error, sends error message and redirects.
static void code_redirect(void *cls)
Checks time and cookie and redirects accordingly.
static struct RequestHandle * requests_head
DLL.
static void options_cont(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Respond to OPTIONS request.
static json_t * read_jwk_from_file(const char *filename)
Read the the JSON Web Key in the given file and return it.
#define OIDC_NONCE_KEY
OIDC nonce key.
#define OIDC_ERROR_KEY_INVALID_CLIENT
OIDC error key for invalid client.
static int parse_credentials_basic_auth(struct RequestHandle *handle, char **client_id, char **client_secret)
#define OIDC_GRANT_TYPE_KEY
OIDC grant_type key.
static int state
The processing state.
#define OIDC_ERROR_KEY_INVALID_COOKIE
OIDC error key for invalid cookies.
static struct EgoEntry * ego_head
Ego list.
static void list_ego(void *cls, struct GNUNET_IDENTITY_Ego *ego, void **ctx, const char *identifier)
If listing is enabled, prints information about the egos.
static void oidc_cred_collect_finished_cb(void *cls)
#define OIDC_CODE_CHALLENGE_KEY
OIDC PKCE code challenge.
static char * allow_methods
HTTP methods allows for this plugin.
static void oidc_config_endpoint(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
static void cleanup_handle(struct RequestHandle *handle)
Cleanup lookup handle.
const struct GNUNET_CONFIGURATION_Handle * oid_cfg
The configuration handle.
#define OIDC_COOKIE_HEADER_ACCESS_DENIED
OIDC cookie header if user cancelled.
#define GNUNET_REST_API_NS_TOKEN
Token endpoint.
#define CONSUME_TIMEOUT
How long to wait for a consume in userinfo endpoint.
#define OIDC_EXPECTED_AUTHORIZATION_SCOPE
OIDC expected scope part while authorizing.
static void build_authz_response(void *cls)
Iteration over all results finished, build final response.
static void do_userinfo_error(void *cls)
Task run on error in userinfo endpoint, sends error header.
static void oidc_ticket_issue_cb(void *cls, const struct GNUNET_RECLAIM_Ticket *ticket, const struct GNUNET_RECLAIM_PresentationList *presentation)
Issues ticket and redirects to relying party with the authorization code as parameter.
#define OIDC_RESPONSE_TYPE_KEY
OIDC response_type key.
static const struct EgoEntry * find_ego(struct RequestHandle *handle, struct GNUNET_CRYPTO_BlindablePublicKey *test_key)
static int check_authorization(struct RequestHandle *handle, struct GNUNET_CRYPTO_BlindablePublicKey *cid)
static struct RequestHandle * requests_tail
DLL.
#define OIDC_COOKIE_HEADER_INFORMATION_KEY
OIDC cookie header information key.
static void oidc_attr_collect(void *cls, const struct GNUNET_CRYPTO_BlindablePublicKey *identity, const struct GNUNET_RECLAIM_Attribute *attr)
Collects all attributes for an ego if in scope parameter.
static struct GNUNET_RECLAIM_AttributeList * attribute_list_merge(struct GNUNET_RECLAIM_AttributeList *list_a, struct GNUNET_RECLAIM_AttributeList *list_b)
#define OIDC_STATE_KEY
OIDC state key.
static struct GNUNET_IDENTITY_Handle * identity_handle
Handle to Identity service.
static void tld_iter(void *cls, const char *section, const char *option, const char *value)
Iterate over tlds in config.
#define OIDC_EXPECTED_AUTHORIZATION_RESPONSE_TYPE
OIDC expected response_type while authorizing.
static void oidc_cred_collect(void *cls, const struct GNUNET_CRYPTO_BlindablePublicKey *identity, const struct GNUNET_RECLAIM_Credential *cred)
Collects all attributes for an ego if in scope parameter.
#define GNUNET_REST_API_NS_USERINFO
UserInfo endpoint.
#define GNUNET_REST_API_NS_AUTHORIZE
Authorize endpoint.
static void oidc_config_cors(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Respond to OPTIONS request.
#define OIDC_CODE_KEY
OIDC code key.
#define OIDC_CODE_VERIFIER_KEY
OIDC PKCE code verifier.
static void authorize_endpoint(struct GNUNET_REST_RequestHandle *con_handle, const char *url, void *cls)
Responds to authorization GET and url-encoded POST request.
static json_t * generate_jwk()
Generate a new RSA JSON Web Key.
#define OIDC_CLIENT_ID_KEY
OIDC client_id key.
#define OIDC_GRANT_TYPE_VALUE
OIDC grant_type key.
json_t * oidc_jwk
The RSA key used by the oidc endpoint.
#define ID_REST_STATE_POST_INIT
Done collecting egos.
static int cleanup_hashmap(void *cls, const struct GNUNET_HashCode *key, void *value)
static void lookup_redirect_uri_result(void *cls, uint32_t rd_count, const struct GNUNET_GNSRECORD_Data *rd)
static void build_redirect(void *cls)
static void oidc_attr_collect_finished_cb(void *cls)
#define OIDC_ERROR_KEY_UNSUPPORTED_RESPONSE_TYPE
OIDC error key for unsupported response types.
#define OIDC_ERROR_KEY_INVALID_SCOPE
OIDC error key for invalid scopes.
static void do_error(void *cls)
Task run on error, sends error message.
static void oidc_iteration_error(void *cls)
Does internal server error when iteration failed.
static void client_redirect(void *cls)
Initiate redirect back to client.
static void login_redirect(void *cls)
Redirects to login page stored in configuration file.
static int attr_in_idtoken_request(struct RequestHandle *handle, const char *attr_name)
static char * get_oidc_jwk_path(void *cls)
Return the path to the RSA JWK key file.
#define _(String)
GNU gettext support macro.
Definition platform.h:179
The default namestore ego.
char * identifier
Ego Identifier.
struct EgoEntry * prev
DLL.
char * keystring
Public key string.
struct EgoEntry * next
DLL.
struct GNUNET_IDENTITY_Ego * ego
The Ego.
void * cls
Closure for all of the callbacks.
Dynamically growing buffer.
Internal representation of the hash map.
A private key for an identity as per LSD0001.
An identity key as per LSD0001.
size_t data_size
Number of bytes in data.
Connection to the GNS service.
Definition gns_api.h:36
Handle to a lookup request.
Definition gns_api.c:48
A 512-bit hashcode.
Handle for an ego.
Definition identity.h:37
Handle for the service.
Handle for an operation with the identity service.
Handle for a attribute iterator operation.
struct GNUNET_RECLAIM_Attribute * attribute
The attribute claim.
struct GNUNET_RECLAIM_AttributeListEntry * next
DLL.
A list of GNUNET_RECLAIM_Attribute structures.
struct GNUNET_RECLAIM_AttributeListEntry * list_tail
List tail.
struct GNUNET_RECLAIM_AttributeListEntry * list_head
List head.
const char * name
The name of the attribute.
struct GNUNET_RECLAIM_Identifier credential
Referenced ID of credential (may be GNUNET_RECLAIM_ID_ZERO if self-creded)
struct GNUNET_RECLAIM_Identifier id
ID.
uint32_t type
Type of Claim.
const void * data
Binary value stored as attribute value.
size_t data_size
Number of bytes in data.
Handle for a credential iterator operation.
struct GNUNET_RECLAIM_CredentialListEntry * next
DLL.
struct GNUNET_RECLAIM_Credential * credential
The credential.
A list of GNUNET_RECLAIM_Credential structures.
struct GNUNET_RECLAIM_Identifier id
ID.
Handle to the service.
Handle for an operation with the service.
Definition reclaim_api.c:40
struct GNUNET_RECLAIM_Presentation * presentation
The credential.
struct GNUNET_RECLAIM_PresentationListEntry * next
DLL.
A list of GNUNET_RECLAIM_Presentation structures.
A credential presentation.
const void * data
Binary value stored as presentation value.
uint32_t type
Type/Format of Claim.
struct GNUNET_RECLAIM_Identifier credential_id
The credential id of which this is a presentation.
Handle for a ticket iterator operation.
The authorization ticket.
char gns_name[63 *2+2]
The ticket.
struct returned by the initialization function of the plugin
void * cls
The closure of the plugin.
const char * name
Plugin name.
const char * url
The url as string.
void(* proc)(struct GNUNET_REST_RequestHandle *handle, const char *url, void *cls)
Namespace to handle.
Entry in list of pending tasks.
Definition scheduler.c:136
Time for absolute times used by GNUnet, in microseconds.
uint64_t abs_value_us
The actual value.
Time for relative time used by GNUnet, in microseconds.
OIDC needed variables.
char * login_identity
The identity chosen by the user to login.
char * client_id
The OIDC client id of the RP.
char * response_type
The OIDC response type.
int user_cancelled
User cancelled authorization/login.
char * redirect_uri
The OIDC redirect uri.
char * claims
The OIDC claims.
char * code_challenge
The PKCE code_challenge.
char * scope
The list of oidc scopes.
char * code_verifier
The PKCE code_verifier.
char * nonce
The OIDC nonce.
struct GNUNET_CRYPTO_BlindablePublicKey client_pkey
The RP client public key.
char * state
The OIDC state.
Handle for a plugin.
Definition block.c:38
struct GNUNET_BLOCK_PluginFunctions * api
Plugin API.
Definition block.c:47
const struct GNUNET_CONFIGURATION_Handle * cfg
Our configuration.
The request handle.
struct GNUNET_RECLAIM_TicketIterator * ticket_it
Ticket iterator.
struct GNUNET_RECLAIM_Ticket ticket
A ticket.
char * emsg
Error response message.
Definition gns_plugin.c:142
struct GNUNET_IDENTITY_Operation * op
IDENTITY Operation.
struct RequestHandle * prev
DLL.
struct GNUNET_RECLAIM_PresentationList * presentations
Presentations.
struct GNUNET_RECLAIM_Operation * idp_op
Idp Operation.
struct GNUNET_RECLAIM_AttributeList * attr_idtoken_list
Attribute claim list for id_token.
int response_code
HTTP response code.
struct EgoEntry * ego_entry
IDENTITY Operation.
struct GNUNET_SCHEDULER_Task * timeout_task
ID of a task associated with the resolution process.
Definition gns_plugin.c:122
void * proc_cls
The closure of the result processor.
char * access_token
The passed access token.
char * redirect_prefix
The redirect prefix.
struct GNUNET_RECLAIM_AttributeIterator * attr_it
Attribute iterator.
GNUNET_REST_ResultProcessor proc
The plugin result processor.
char * redirect_suffix
The redirect suffix.
struct RequestHandle * next
DLL.
struct GNUNET_RECLAIM_CredentialIterator * cred_it
Credential iterator.
struct GNUNET_CRYPTO_BlindablePrivateKey priv_key
Pointer to ego private key.
struct GNUNET_REST_RequestHandle * rest_handle
Handle to rest request.
char * url
The URL.
int public_client
Public client.
char * tld
The tld for redirect.
struct OIDC_Variables * oidc
OIDC variables.
struct GNUNET_RECLAIM_AttributeList * attr_userinfo_list
Attribute claim list for userinfo.
struct GNUNET_GNS_LookupRequest * gns_op
GNS lookup op.
struct GNUNET_RECLAIM_CredentialList * credentials
Credentials.
struct GNUNET_SCHEDULER_Task * consume_timeout_op
Timeout task for consume.
struct GNUNET_TIME_Relative timeout
Desired timeout for the lookup (default is no timeout).
Definition gns_plugin.c:117
char * edesc
Error response description.