1use std::sync::Arc;
23
24use axum::{
25 Json,
26 extract::{Query, State},
27 http::{StatusCode, header},
28 response::{IntoResponse, Redirect, Response},
29};
30use serde::{Deserialize, Serialize};
31
32use crate::auth::{OidcServerClient, PkceStateStore};
33
34pub struct AuthPkceState {
36 pub pkce_store: Arc<PkceStateStore>,
38 pub oidc_client: Arc<OidcServerClient>,
40 pub http_client: Arc<reqwest::Client>,
42 pub post_login_redirect_uri: Option<String>,
45}
46
47#[derive(Deserialize)]
53pub struct AuthStartQuery {
54 redirect_uri: String,
59}
60
61#[derive(Deserialize)]
63pub struct AuthCallbackQuery {
64 code: Option<String>,
66 state: Option<String>,
68 error: Option<String>,
70 error_description: Option<String>,
72}
73
74#[derive(Serialize)]
79struct TokenJson {
80 access_token: String,
81 #[serde(skip_serializing_if = "Option::is_none")]
82 id_token: Option<String>,
83 #[serde(skip_serializing_if = "Option::is_none")]
84 expires_in: Option<u64>,
85 token_type: &'static str,
86}
87
88fn auth_error(status: StatusCode, message: &str) -> Response {
93 (status, Json(serde_json::json!({ "error": message }))).into_response()
94}
95
96pub async fn auth_start(
115 State(state): State<Arc<AuthPkceState>>,
116 Query(q): Query<AuthStartQuery>,
117) -> Response {
118 if q.redirect_uri.is_empty() {
119 return auth_error(StatusCode::BAD_REQUEST, "redirect_uri is required");
120 }
121 if q.redirect_uri.len() > 2048 {
124 return auth_error(StatusCode::BAD_REQUEST, "redirect_uri exceeds maximum length");
125 }
126
127 let (outbound_token, verifier) = match state.pkce_store.create_state(&q.redirect_uri).await {
128 Ok(v) => v,
129 Err(e) => {
130 tracing::error!("pkce create_state failed: {e}");
131 return auth_error(
132 StatusCode::INTERNAL_SERVER_ERROR,
133 "authorization flow could not be started",
134 );
135 },
136 };
137
138 let challenge = PkceStateStore::s256_challenge(&verifier);
139 let location = state.oidc_client.authorization_url(&outbound_token, &challenge, "S256");
140
141 Redirect::to(&location).into_response()
142}
143
144#[allow(clippy::cognitive_complexity)] pub async fn auth_callback(
169 State(state): State<Arc<AuthPkceState>>,
170 Query(q): Query<AuthCallbackQuery>,
171) -> Response {
172 if let Some(err) = q.error {
174 let desc = q.error_description.as_deref().unwrap_or("(no description provided)");
175 tracing::warn!(oidc_error = %err, description = %desc, "OIDC provider returned error");
179 let client_message = match err.as_str() {
180 "access_denied" => "Access was denied",
181 "login_required" => "Authentication is required",
182 "invalid_request" | "invalid_scope" => "Invalid authorization request",
183 "server_error" | "temporarily_unavailable" => "Authorization server error",
184 _ => "Authorization failed",
185 };
186 return auth_error(StatusCode::BAD_REQUEST, client_message);
187 }
188
189 let (Some(code), Some(state_token)) = (q.code, q.state) else {
191 return auth_error(StatusCode::BAD_REQUEST, "missing code or state parameter");
192 };
193
194 let pkce = match state.pkce_store.consume_state(&state_token).await {
196 Ok(s) => s,
197 Err(e) => {
198 tracing::debug!(error = %e, "pkce consume_state failed");
201 return auth_error(StatusCode::BAD_REQUEST, &e.to_string());
202 },
203 };
204
205 let tokens = match state
207 .oidc_client
208 .exchange_code(&code, &pkce.verifier, &state.http_client)
209 .await
210 {
211 Ok(t) => t,
212 Err(e) => {
213 tracing::error!("token exchange failed: {e}");
214 return auth_error(StatusCode::BAD_GATEWAY, "token exchange with OIDC provider failed");
215 },
216 };
217
218 if let Some(redirect_uri) = &state.post_login_redirect_uri {
220 let max_age = tokens.expires_in.unwrap_or(300);
233 let token_escaped = tokens.access_token.replace('\\', r"\\").replace('"', r#"\""#);
235 let cookie = format!(
236 r#"__Host-access_token="{token_escaped}"; Path=/; HttpOnly; Secure; SameSite=Strict; Max-Age={max_age}"#,
237 );
238 let mut resp = Redirect::to(redirect_uri).into_response();
239 match cookie.parse() {
240 Ok(value) => {
241 resp.headers_mut().insert(header::SET_COOKIE, value);
242 },
243 Err(e) => {
244 tracing::error!("Failed to parse Set-Cookie header: {e}");
245 return auth_error(
246 StatusCode::INTERNAL_SERVER_ERROR,
247 "session cookie could not be set",
248 );
249 },
250 }
251 resp
252 } else {
253 Json(TokenJson {
255 access_token: tokens.access_token,
256 id_token: tokens.id_token,
257 expires_in: tokens.expires_in,
258 token_type: "Bearer",
259 })
260 .into_response()
261 }
262}
263
264#[derive(Deserialize)]
270pub struct RevokeTokenRequest {
271 pub token: String,
273}
274
275#[derive(Serialize)]
277pub struct RevokeTokenResponse {
278 pub revoked: bool,
280 #[serde(skip_serializing_if = "Option::is_none")]
282 pub expires_at: Option<String>,
283}
284
285pub struct RevocationRouteState {
287 pub revocation_manager: std::sync::Arc<crate::token_revocation::TokenRevocationManager>,
289}
290
291pub async fn revoke_token(
302 State(state): State<std::sync::Arc<RevocationRouteState>>,
303 Json(body): Json<RevokeTokenRequest>,
304) -> Response {
305 #[derive(serde::Deserialize)]
306 struct MinimalClaims {
307 jti: Option<String>,
308 exp: Option<u64>,
309 }
310
311 let claims = match jsonwebtoken::dangerous::insecure_decode::<MinimalClaims>(&body.token) {
313 Ok(data) => data.claims,
314 Err(e) => {
315 return auth_error(StatusCode::BAD_REQUEST, &format!("Invalid token: {e}"));
316 },
317 };
318
319 let jti = match claims.jti {
320 Some(j) if !j.is_empty() => j,
321 _ => {
322 return auth_error(StatusCode::BAD_REQUEST, "Token has no jti claim");
323 },
324 };
325
326 let ttl_secs = claims
328 .exp
329 .and_then(|exp| {
330 let now = chrono::Utc::now().timestamp().cast_unsigned();
331 exp.checked_sub(now)
332 })
333 .unwrap_or(86400);
334
335 if let Err(e) = state.revocation_manager.revoke(&jti, ttl_secs).await {
336 tracing::error!(error = %e, "Failed to revoke token");
337 return auth_error(StatusCode::INTERNAL_SERVER_ERROR, "Failed to revoke token");
338 }
339
340 let expires_at = claims.exp.map(|exp| {
341 chrono::DateTime::from_timestamp(exp.cast_signed(), 0)
342 .map_or_else(|| exp.to_string(), |dt| dt.to_rfc3339())
343 });
344
345 Json(RevokeTokenResponse {
346 revoked: true,
347 expires_at,
348 })
349 .into_response()
350}
351
352#[derive(Deserialize)]
358pub struct RevokeAllRequest {
359 pub sub: String,
361}
362
363#[derive(Serialize)]
365pub struct RevokeAllResponse {
366 pub revoked_count: u64,
368}
369
370pub async fn revoke_all_tokens(
377 State(state): State<std::sync::Arc<RevocationRouteState>>,
378 Json(body): Json<RevokeAllRequest>,
379) -> Response {
380 if body.sub.is_empty() {
381 return auth_error(StatusCode::BAD_REQUEST, "sub is required");
382 }
383
384 match state.revocation_manager.revoke_all_for_user(&body.sub).await {
385 Ok(count) => Json(RevokeAllResponse {
386 revoked_count: count,
387 })
388 .into_response(),
389 Err(e) => {
390 tracing::error!(error = %e, sub = %body.sub, "Failed to revoke tokens for user");
391 auth_error(StatusCode::INTERNAL_SERVER_ERROR, "Failed to revoke tokens")
392 },
393 }
394}
395
396#[cfg(test)]
401mod tests {
402 #![allow(clippy::unwrap_used)] use axum::{Router, body::Body, http::Request, routing::get};
405 use tower::ServiceExt as _;
406
407 use super::*;
408 use crate::auth::PkceStateStore;
409
410 fn mock_pkce_store() -> Arc<PkceStateStore> {
411 Arc::new(PkceStateStore::new(600, None))
412 }
413
414 fn mock_oidc_client() -> Arc<OidcServerClient> {
415 Arc::new(OidcServerClient::new(
416 "test-client",
417 "test-secret",
418 "https://api.example.com/auth/callback",
419 "https://provider.example.com/authorize",
420 "https://provider.example.com/token",
421 ))
422 }
423
424 fn auth_router() -> Router {
425 let auth_state = Arc::new(AuthPkceState {
426 pkce_store: mock_pkce_store(),
427 oidc_client: mock_oidc_client(),
428 http_client: Arc::new(reqwest::Client::new()),
429 post_login_redirect_uri: None,
430 });
431 Router::new()
432 .route("/auth/start", get(auth_start))
433 .route("/auth/callback", get(auth_callback))
434 .with_state(auth_state)
435 }
436
437 #[tokio::test]
438 async fn test_auth_start_redirects_with_pkce_params() {
439 let app = auth_router();
440 let req = Request::builder()
441 .uri("/auth/start?redirect_uri=https%3A%2F%2Fapp.example.com%2Fcb")
442 .body(Body::empty())
443 .unwrap();
444 let resp = app.oneshot(req).await.unwrap();
445
446 assert!(resp.status().is_redirection(), "expected redirect, got {}", resp.status());
448 let location = resp
449 .headers()
450 .get(header::LOCATION)
451 .and_then(|v| v.to_str().ok())
452 .expect("Location header must be present");
453
454 assert!(location.contains("response_type=code"), "missing response_type");
455 assert!(location.contains("code_challenge="), "missing code_challenge");
456 assert!(location.contains("code_challenge_method=S256"), "missing challenge method");
457 assert!(location.contains("state="), "missing state param");
458 assert!(location.contains("client_id=test-client"), "missing client_id");
459 }
460
461 #[tokio::test]
462 async fn test_auth_start_missing_redirect_uri_returns_400() {
463 let app = auth_router();
464 let req = Request::builder().uri("/auth/start").body(Body::empty()).unwrap();
465 let resp = app.oneshot(req).await.unwrap();
466 assert!(
469 resp.status().is_client_error(),
470 "missing redirect_uri must be a client error, got {}",
471 resp.status()
472 );
473 }
474
475 #[tokio::test]
476 async fn test_auth_callback_unknown_state_returns_400() {
477 let app = auth_router();
478 let req = Request::builder()
479 .uri("/auth/callback?code=abc&state=completely-unknown-state")
480 .body(Body::empty())
481 .unwrap();
482 let resp = app.oneshot(req).await.unwrap();
483 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
484 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
485 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
486 assert!(json["error"].is_string(), "error field must be a string: {json}");
488 }
489
490 #[tokio::test]
491 async fn test_auth_callback_missing_code_returns_400() {
492 let app = auth_router();
493 let req = Request::builder()
494 .uri("/auth/callback?state=some-state-no-code")
495 .body(Body::empty())
496 .unwrap();
497 let resp = app.oneshot(req).await.unwrap();
498 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
499 }
500
501 #[tokio::test]
502 async fn test_auth_start_oversized_redirect_uri_returns_400() {
503 let app = auth_router();
504 let long_uri = "https://example.com/".to_string() + &"a".repeat(2100);
505 let encoded = urlencoding::encode(&long_uri);
506 let req = Request::builder()
507 .uri(format!("/auth/start?redirect_uri={encoded}"))
508 .body(Body::empty())
509 .unwrap();
510 let resp = app.oneshot(req).await.unwrap();
511 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
512 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
513 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
514 assert!(
515 json["error"].as_str().unwrap_or("").contains("maximum length"),
516 "error must mention length: {json}"
517 );
518 }
519
520 #[tokio::test]
521 async fn test_auth_callback_oidc_error_returns_mapped_message() {
522 let app = auth_router();
523 let req = Request::builder()
525 .uri("/auth/callback?error=access_denied&error_description=internal+tenant+info")
526 .body(Body::empty())
527 .unwrap();
528 let resp = app.oneshot(req).await.unwrap();
529 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
530 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
531 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
532 let error_msg = json["error"].as_str().unwrap_or("");
533 assert!(
535 !error_msg.contains("internal tenant info"),
536 "provider description must not be reflected to client: {error_msg}"
537 );
538 assert_eq!(error_msg, "Access was denied");
539 }
540
541 #[tokio::test]
542 async fn test_auth_callback_unknown_oidc_error_returns_generic_message() {
543 let app = auth_router();
544 let req = Request::builder()
545 .uri("/auth/callback?error=unknown_vendor_error&error_description=secret+details")
546 .body(Body::empty())
547 .unwrap();
548 let resp = app.oneshot(req).await.unwrap();
549 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
550 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
551 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
552 assert_eq!(json["error"].as_str().unwrap_or(""), "Authorization failed");
553 }
554
555 #[tokio::test]
556 async fn test_auth_callback_oidc_error_no_description_uses_fallback() {
557 let app = auth_router();
558 let req = Request::builder()
559 .uri("/auth/callback?error=access_denied")
560 .body(Body::empty())
561 .unwrap();
562 let resp = app.oneshot(req).await.unwrap();
563 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
564 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
568 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
569 assert_eq!(json["error"].as_str().unwrap_or(""), "Access was denied");
570 }
571
572 #[tokio::test]
581 async fn test_auth_start_to_callback_state_roundtrip_with_encryption() {
582 use crate::auth::{EncryptionAlgorithm, StateEncryptionService};
583
584 let enc = Arc::new(StateEncryptionService::from_raw_key(
585 &[0u8; 32],
586 EncryptionAlgorithm::Chacha20Poly1305,
587 ));
588 let pkce_store = Arc::new(PkceStateStore::new(600, Some(enc)));
589
590 let auth_state = Arc::new(AuthPkceState {
591 pkce_store,
592 oidc_client: mock_oidc_client(),
593 http_client: Arc::new(reqwest::Client::new()),
594 post_login_redirect_uri: None,
595 });
596
597 let app = Router::new()
598 .route("/auth/start", get(auth_start))
599 .route("/auth/callback", get(auth_callback))
600 .with_state(auth_state);
601
602 let req = Request::builder()
604 .uri("/auth/start?redirect_uri=https%3A%2F%2Fapp.example.com%2Fcb")
605 .body(Body::empty())
606 .unwrap();
607 let resp = app.clone().oneshot(req).await.unwrap();
608
609 assert!(
610 resp.status().is_redirection(),
611 "expected redirect from /auth/start, got {}",
612 resp.status(),
613 );
614
615 let location = resp
616 .headers()
617 .get(header::LOCATION)
618 .and_then(|v| v.to_str().ok())
619 .expect("Location header must be set")
620 .to_string();
621
622 let parsed_location =
626 reqwest::Url::parse(&location).expect("Location header must be a valid URL");
627 let state_token = parsed_location
628 .query_pairs()
629 .find(|(k, _)| k == "state")
630 .map(|(_, v)| v.into_owned())
631 .expect("state= must appear in the redirect Location URL");
632
633 assert!(!state_token.is_empty(), "extracted state token must not be empty");
634
635 let callback_uri = format!("/auth/callback?code=test_code&state={state_token}");
639 let req2 = Request::builder().uri(&callback_uri).body(Body::empty()).unwrap();
640 let resp2 = app.clone().oneshot(req2).await.unwrap();
641
642 assert_ne!(
643 resp2.status(),
644 StatusCode::BAD_REQUEST,
645 "state from /auth/start must be accepted by /auth/callback; \
646 400 means the PKCE state was not found or decryption failed",
647 );
648 assert_eq!(
649 resp2.status(),
650 StatusCode::BAD_GATEWAY,
651 "token exchange should fail 502 (no real OIDC provider); got {}",
652 resp2.status(),
653 );
654 }
655}