1use std::sync::Arc;
23
24use axum::{
25 Json,
26 extract::{Query, State},
27 http::{StatusCode, header},
28 response::{IntoResponse, Redirect, Response},
29};
30use serde::{Deserialize, Serialize};
31
32use crate::auth::{OidcServerClient, PkceStateStore};
33
34pub struct AuthPkceState {
36 pub pkce_store: Arc<PkceStateStore>,
38 pub oidc_client: Arc<OidcServerClient>,
40 pub http_client: Arc<reqwest::Client>,
42 pub post_login_redirect_uri: Option<String>,
45}
46
47#[derive(Deserialize)]
53pub struct AuthStartQuery {
54 redirect_uri: String,
59}
60
61#[derive(Deserialize)]
63pub struct AuthCallbackQuery {
64 code: Option<String>,
66 state: Option<String>,
68 error: Option<String>,
70 error_description: Option<String>,
72}
73
74#[derive(Serialize)]
79struct TokenJson {
80 access_token: String,
81 #[serde(skip_serializing_if = "Option::is_none")]
82 id_token: Option<String>,
83 #[serde(skip_serializing_if = "Option::is_none")]
84 expires_in: Option<u64>,
85 token_type: &'static str,
86}
87
88fn auth_error(status: StatusCode, message: &str) -> Response {
93 (status, Json(serde_json::json!({ "error": message }))).into_response()
94}
95
96pub async fn auth_start(
115 State(state): State<Arc<AuthPkceState>>,
116 Query(q): Query<AuthStartQuery>,
117) -> Response {
118 if q.redirect_uri.is_empty() {
119 return auth_error(StatusCode::BAD_REQUEST, "redirect_uri is required");
120 }
121 if q.redirect_uri.len() > 2048 {
124 return auth_error(StatusCode::BAD_REQUEST, "redirect_uri exceeds maximum length");
125 }
126
127 let (outbound_token, verifier) = match state.pkce_store.create_state(&q.redirect_uri).await {
128 Ok(v) => v,
129 Err(e) => {
130 tracing::error!("pkce create_state failed: {e}");
131 return auth_error(
132 StatusCode::INTERNAL_SERVER_ERROR,
133 "authorization flow could not be started",
134 );
135 },
136 };
137
138 let challenge = PkceStateStore::s256_challenge(&verifier);
139 let location = state.oidc_client.authorization_url(&outbound_token, &challenge, "S256");
140
141 Redirect::to(&location).into_response()
142}
143
144#[allow(clippy::cognitive_complexity)] pub async fn auth_callback(
169 State(state): State<Arc<AuthPkceState>>,
170 Query(q): Query<AuthCallbackQuery>,
171) -> Response {
172 if let Some(err) = q.error {
174 let desc = q.error_description.as_deref().unwrap_or("(no description provided)");
175 tracing::warn!(oidc_error = %err, description = %desc, "OIDC provider returned error");
179 let client_message = match err.as_str() {
180 "access_denied" => "Access was denied",
181 "login_required" => "Authentication is required",
182 "invalid_request" | "invalid_scope" => "Invalid authorization request",
183 "server_error" | "temporarily_unavailable" => "Authorization server error",
184 _ => "Authorization failed",
185 };
186 return auth_error(StatusCode::BAD_REQUEST, client_message);
187 }
188
189 let (Some(code), Some(state_token)) = (q.code, q.state) else {
191 return auth_error(StatusCode::BAD_REQUEST, "missing code or state parameter");
192 };
193
194 let pkce = match state.pkce_store.consume_state(&state_token).await {
196 Ok(s) => s,
197 Err(e) => {
198 tracing::debug!(error = %e, "pkce consume_state failed");
201 return auth_error(StatusCode::BAD_REQUEST, &e.to_string());
202 },
203 };
204
205 let tokens = match state
207 .oidc_client
208 .exchange_code(&code, &pkce.verifier, &state.http_client)
209 .await
210 {
211 Ok(t) => t,
212 Err(e) => {
213 tracing::error!("token exchange failed: {e}");
214 return auth_error(StatusCode::BAD_GATEWAY, "token exchange with OIDC provider failed");
215 },
216 };
217
218 if let Some(redirect_uri) = &state.post_login_redirect_uri {
220 let max_age = tokens.expires_in.unwrap_or(300);
233 let token_escaped = tokens.access_token.replace('\\', r"\\").replace('"', r#"\""#);
235 let cookie = format!(
236 r#"__Host-access_token="{token_escaped}"; Path=/; HttpOnly; Secure; SameSite=Strict; Max-Age={max_age}"#,
237 );
238 let mut resp = Redirect::to(redirect_uri).into_response();
239 match cookie.parse() {
240 Ok(value) => {
241 resp.headers_mut().insert(header::SET_COOKIE, value);
242 },
243 Err(e) => {
244 tracing::error!("Failed to parse Set-Cookie header: {e}");
245 return auth_error(
246 StatusCode::INTERNAL_SERVER_ERROR,
247 "session cookie could not be set",
248 );
249 },
250 }
251 resp
252 } else {
253 Json(TokenJson {
255 access_token: tokens.access_token,
256 id_token: tokens.id_token,
257 expires_in: tokens.expires_in,
258 token_type: "Bearer",
259 })
260 .into_response()
261 }
262}
263
264#[derive(Deserialize)]
270pub struct RevokeTokenRequest {
271 pub token: String,
273}
274
275#[derive(Serialize)]
277pub struct RevokeTokenResponse {
278 pub revoked: bool,
280 #[serde(skip_serializing_if = "Option::is_none")]
282 pub expires_at: Option<String>,
283}
284
285pub struct RevocationRouteState {
287 pub revocation_manager: std::sync::Arc<crate::token_revocation::TokenRevocationManager>,
289}
290
291pub async fn revoke_token(
302 State(state): State<std::sync::Arc<RevocationRouteState>>,
303 Json(body): Json<RevokeTokenRequest>,
304) -> Response {
305 #[derive(serde::Deserialize)]
306 struct MinimalClaims {
307 jti: Option<String>,
308 exp: Option<u64>,
309 }
310
311 let claims = match jsonwebtoken::dangerous::insecure_decode::<MinimalClaims>(&body.token) {
313 Ok(data) => data.claims,
314 Err(e) => {
315 return auth_error(StatusCode::BAD_REQUEST, &format!("Invalid token: {e}"));
316 },
317 };
318
319 let jti = match claims.jti {
320 Some(j) if !j.is_empty() => j,
321 _ => {
322 return auth_error(StatusCode::BAD_REQUEST, "Token has no jti claim");
323 },
324 };
325
326 let ttl_secs = claims
328 .exp
329 .and_then(|exp| {
330 let now = chrono::Utc::now().timestamp().cast_unsigned();
331 exp.checked_sub(now)
332 })
333 .unwrap_or(86400);
334
335 if let Err(e) = state.revocation_manager.revoke(&jti, ttl_secs).await {
336 tracing::error!(error = %e, "Failed to revoke token");
337 return auth_error(StatusCode::INTERNAL_SERVER_ERROR, "Failed to revoke token");
338 }
339
340 let expires_at = claims.exp.map(|exp| {
341 chrono::DateTime::from_timestamp(exp.cast_signed(), 0)
342 .map_or_else(|| exp.to_string(), |dt| dt.to_rfc3339())
343 });
344
345 Json(RevokeTokenResponse {
346 revoked: true,
347 expires_at,
348 })
349 .into_response()
350}
351
352#[derive(Deserialize)]
358pub struct RevokeAllRequest {
359 pub sub: String,
361}
362
363#[derive(Serialize)]
365pub struct RevokeAllResponse {
366 pub revoked_count: u64,
368}
369
370pub async fn revoke_all_tokens(
377 State(state): State<std::sync::Arc<RevocationRouteState>>,
378 Json(body): Json<RevokeAllRequest>,
379) -> Response {
380 if body.sub.is_empty() {
381 return auth_error(StatusCode::BAD_REQUEST, "sub is required");
382 }
383
384 match state.revocation_manager.revoke_all_for_user(&body.sub).await {
385 Ok(count) => Json(RevokeAllResponse {
386 revoked_count: count,
387 })
388 .into_response(),
389 Err(e) => {
390 tracing::error!(error = %e, sub = %body.sub, "Failed to revoke tokens for user");
391 auth_error(StatusCode::INTERNAL_SERVER_ERROR, "Failed to revoke tokens")
392 },
393 }
394}
395
396pub struct AuthMeState {
402 pub expose_claims: Vec<String>,
405}
406
407pub async fn auth_me(
433 axum::extract::State(state): axum::extract::State<std::sync::Arc<AuthMeState>>,
434 axum::Extension(auth_user): axum::Extension<crate::middleware::AuthUser>,
435) -> axum::response::Response {
436 use axum::{Json, response::IntoResponse as _};
437
438 let user = &auth_user.0;
439
440 let mut map = serde_json::Map::new();
441 map.insert("sub".to_owned(), serde_json::Value::String(user.user_id.clone()));
442 map.insert("user_id".to_owned(), serde_json::Value::String(user.user_id.clone()));
443 map.insert("expires_at".to_owned(), serde_json::Value::String(user.expires_at.to_rfc3339()));
444
445 for claim_name in &state.expose_claims {
446 if let Some(value) = user.extra_claims.get(claim_name) {
447 map.insert(claim_name.clone(), value.clone());
448 }
449 }
450
451 Json(serde_json::Value::Object(map)).into_response()
452}
453
454#[cfg(test)]
459mod tests {
460 #![allow(clippy::unwrap_used)] use axum::{Extension, Router, body::Body, http::Request, routing::get};
463 use chrono::Utc;
464 use tower::ServiceExt as _;
465
466 use super::*;
467 use crate::{auth::PkceStateStore, middleware::AuthUser};
468
469 fn mock_pkce_store() -> Arc<PkceStateStore> {
470 Arc::new(PkceStateStore::new(600, None))
471 }
472
473 fn make_auth_user(
478 user_id: &str,
479 extra: std::collections::HashMap<String, serde_json::Value>,
480 ) -> AuthUser {
481 AuthUser(fraiseql_core::security::AuthenticatedUser {
482 user_id: user_id.to_owned(),
483 scopes: vec![],
484 expires_at: Utc::now() + chrono::Duration::hours(1),
485 extra_claims: extra,
486 })
487 }
488
489 fn make_me_state(expose_claims: Vec<&str>) -> Arc<AuthMeState> {
490 Arc::new(AuthMeState {
491 expose_claims: expose_claims.into_iter().map(str::to_owned).collect(),
492 })
493 }
494
495 #[tokio::test]
496 async fn test_auth_me_always_returns_sub_user_id_expires_at() {
497 let app = Router::new()
498 .route("/auth/me", get(auth_me))
499 .layer(Extension(make_auth_user("user-123", std::collections::HashMap::new())))
500 .with_state(make_me_state(vec![]));
501
502 let req = Request::builder().uri("/auth/me").body(Body::empty()).unwrap();
503 let resp = app.oneshot(req).await.unwrap();
504 assert_eq!(resp.status(), axum::http::StatusCode::OK);
505
506 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
507 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
508
509 assert_eq!(json["sub"], "user-123");
510 assert_eq!(json["user_id"], "user-123");
511 assert!(json["expires_at"].is_string(), "expires_at must be present");
512 }
513
514 #[tokio::test]
515 async fn test_auth_me_expose_claims_filters_correctly() {
516 let mut extra = std::collections::HashMap::new();
517 extra.insert("email".to_owned(), serde_json::json!("alice@example.com"));
518 extra.insert("https://myapp.com/role".to_owned(), serde_json::json!("admin"));
519
520 let app = Router::new()
521 .route("/auth/me", get(auth_me))
522 .layer(Extension(make_auth_user("alice", extra)))
523 .with_state(make_me_state(vec!["email"]));
524
525 let req = Request::builder().uri("/auth/me").body(Body::empty()).unwrap();
526 let resp = app.oneshot(req).await.unwrap();
527 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
528 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
529
530 assert_eq!(json["email"], "alice@example.com", "listed claim must appear");
531 assert!(json.get("https://myapp.com/role").is_none(), "unlisted claim must be absent");
532 }
533
534 #[tokio::test]
535 async fn test_auth_me_claim_absent_from_token_silently_omitted() {
536 let app = Router::new()
538 .route("/auth/me", get(auth_me))
539 .layer(Extension(make_auth_user("user-x", std::collections::HashMap::new())))
540 .with_state(make_me_state(vec!["tenant_id"]));
541
542 let req = Request::builder().uri("/auth/me").body(Body::empty()).unwrap();
543 let resp = app.oneshot(req).await.unwrap();
544 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
545 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
546
547 assert!(json.get("tenant_id").is_none(), "absent claim must not be null-padded");
548 assert_eq!(json["sub"], "user-x");
550 }
551
552 #[tokio::test]
553 async fn test_auth_me_namespaced_claim_in_expose_claims() {
554 let mut extra = std::collections::HashMap::new();
555 extra.insert("https://myapp.com/role".to_owned(), serde_json::json!("editor"));
556
557 let app = Router::new()
558 .route("/auth/me", get(auth_me))
559 .layer(Extension(make_auth_user("user-y", extra)))
560 .with_state(make_me_state(vec!["https://myapp.com/role"]));
561
562 let req = Request::builder().uri("/auth/me").body(Body::empty()).unwrap();
563 let resp = app.oneshot(req).await.unwrap();
564 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
565 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
566
567 assert_eq!(json["https://myapp.com/role"], "editor");
568 }
569
570 fn mock_oidc_client() -> Arc<OidcServerClient> {
571 Arc::new(OidcServerClient::new(
572 "test-client",
573 "test-secret",
574 "https://api.example.com/auth/callback",
575 "https://provider.example.com/authorize",
576 "https://provider.example.com/token",
577 ))
578 }
579
580 fn auth_router() -> Router {
581 let auth_state = Arc::new(AuthPkceState {
582 pkce_store: mock_pkce_store(),
583 oidc_client: mock_oidc_client(),
584 http_client: Arc::new(reqwest::Client::new()),
585 post_login_redirect_uri: None,
586 });
587 Router::new()
588 .route("/auth/start", get(auth_start))
589 .route("/auth/callback", get(auth_callback))
590 .with_state(auth_state)
591 }
592
593 #[tokio::test]
594 async fn test_auth_start_redirects_with_pkce_params() {
595 let app = auth_router();
596 let req = Request::builder()
597 .uri("/auth/start?redirect_uri=https%3A%2F%2Fapp.example.com%2Fcb")
598 .body(Body::empty())
599 .unwrap();
600 let resp = app.oneshot(req).await.unwrap();
601
602 assert!(resp.status().is_redirection(), "expected redirect, got {}", resp.status());
604 let location = resp
605 .headers()
606 .get(header::LOCATION)
607 .and_then(|v| v.to_str().ok())
608 .expect("Location header must be present");
609
610 assert!(location.contains("response_type=code"), "missing response_type");
611 assert!(location.contains("code_challenge="), "missing code_challenge");
612 assert!(location.contains("code_challenge_method=S256"), "missing challenge method");
613 assert!(location.contains("state="), "missing state param");
614 assert!(location.contains("client_id=test-client"), "missing client_id");
615 }
616
617 #[tokio::test]
618 async fn test_auth_start_missing_redirect_uri_returns_400() {
619 let app = auth_router();
620 let req = Request::builder().uri("/auth/start").body(Body::empty()).unwrap();
621 let resp = app.oneshot(req).await.unwrap();
622 assert!(
625 resp.status().is_client_error(),
626 "missing redirect_uri must be a client error, got {}",
627 resp.status()
628 );
629 }
630
631 #[tokio::test]
632 async fn test_auth_callback_unknown_state_returns_400() {
633 let app = auth_router();
634 let req = Request::builder()
635 .uri("/auth/callback?code=abc&state=completely-unknown-state")
636 .body(Body::empty())
637 .unwrap();
638 let resp = app.oneshot(req).await.unwrap();
639 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
640 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
641 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
642 assert!(json["error"].is_string(), "error field must be a string: {json}");
644 }
645
646 #[tokio::test]
647 async fn test_auth_callback_missing_code_returns_400() {
648 let app = auth_router();
649 let req = Request::builder()
650 .uri("/auth/callback?state=some-state-no-code")
651 .body(Body::empty())
652 .unwrap();
653 let resp = app.oneshot(req).await.unwrap();
654 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
655 }
656
657 #[tokio::test]
658 async fn test_auth_start_oversized_redirect_uri_returns_400() {
659 let app = auth_router();
660 let long_uri = "https://example.com/".to_string() + &"a".repeat(2100);
661 let encoded = urlencoding::encode(&long_uri);
662 let req = Request::builder()
663 .uri(format!("/auth/start?redirect_uri={encoded}"))
664 .body(Body::empty())
665 .unwrap();
666 let resp = app.oneshot(req).await.unwrap();
667 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
668 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
669 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
670 assert!(
671 json["error"].as_str().unwrap_or("").contains("maximum length"),
672 "error must mention length: {json}"
673 );
674 }
675
676 #[tokio::test]
677 async fn test_auth_callback_oidc_error_returns_mapped_message() {
678 let app = auth_router();
679 let req = Request::builder()
681 .uri("/auth/callback?error=access_denied&error_description=internal+tenant+info")
682 .body(Body::empty())
683 .unwrap();
684 let resp = app.oneshot(req).await.unwrap();
685 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
686 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
687 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
688 let error_msg = json["error"].as_str().unwrap_or("");
689 assert!(
691 !error_msg.contains("internal tenant info"),
692 "provider description must not be reflected to client: {error_msg}"
693 );
694 assert_eq!(error_msg, "Access was denied");
695 }
696
697 #[tokio::test]
698 async fn test_auth_callback_unknown_oidc_error_returns_generic_message() {
699 let app = auth_router();
700 let req = Request::builder()
701 .uri("/auth/callback?error=unknown_vendor_error&error_description=secret+details")
702 .body(Body::empty())
703 .unwrap();
704 let resp = app.oneshot(req).await.unwrap();
705 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
706 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
707 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
708 assert_eq!(json["error"].as_str().unwrap_or(""), "Authorization failed");
709 }
710
711 #[tokio::test]
712 async fn test_auth_callback_oidc_error_no_description_uses_fallback() {
713 let app = auth_router();
714 let req = Request::builder()
715 .uri("/auth/callback?error=access_denied")
716 .body(Body::empty())
717 .unwrap();
718 let resp = app.oneshot(req).await.unwrap();
719 assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
720 let body = axum::body::to_bytes(resp.into_body(), usize::MAX).await.unwrap();
724 let json: serde_json::Value = serde_json::from_slice(&body).unwrap();
725 assert_eq!(json["error"].as_str().unwrap_or(""), "Access was denied");
726 }
727
728 #[tokio::test]
737 async fn test_auth_start_to_callback_state_roundtrip_with_encryption() {
738 use crate::auth::{EncryptionAlgorithm, StateEncryptionService};
739
740 let enc = Arc::new(StateEncryptionService::from_raw_key(
741 &[0u8; 32],
742 EncryptionAlgorithm::Chacha20Poly1305,
743 ));
744 let pkce_store = Arc::new(PkceStateStore::new(600, Some(enc)));
745
746 let auth_state = Arc::new(AuthPkceState {
747 pkce_store,
748 oidc_client: mock_oidc_client(),
749 http_client: Arc::new(reqwest::Client::new()),
750 post_login_redirect_uri: None,
751 });
752
753 let app = Router::new()
754 .route("/auth/start", get(auth_start))
755 .route("/auth/callback", get(auth_callback))
756 .with_state(auth_state);
757
758 let req = Request::builder()
760 .uri("/auth/start?redirect_uri=https%3A%2F%2Fapp.example.com%2Fcb")
761 .body(Body::empty())
762 .unwrap();
763 let resp = app.clone().oneshot(req).await.unwrap();
764
765 assert!(
766 resp.status().is_redirection(),
767 "expected redirect from /auth/start, got {}",
768 resp.status(),
769 );
770
771 let location = resp
772 .headers()
773 .get(header::LOCATION)
774 .and_then(|v| v.to_str().ok())
775 .expect("Location header must be set")
776 .to_string();
777
778 let parsed_location =
782 reqwest::Url::parse(&location).expect("Location header must be a valid URL");
783 let state_token = parsed_location
784 .query_pairs()
785 .find(|(k, _)| k == "state")
786 .map(|(_, v)| v.into_owned())
787 .expect("state= must appear in the redirect Location URL");
788
789 assert!(!state_token.is_empty(), "extracted state token must not be empty");
790
791 let callback_uri = format!("/auth/callback?code=test_code&state={state_token}");
795 let req2 = Request::builder().uri(&callback_uri).body(Body::empty()).unwrap();
796 let resp2 = app.clone().oneshot(req2).await.unwrap();
797
798 assert_ne!(
799 resp2.status(),
800 StatusCode::BAD_REQUEST,
801 "state from /auth/start must be accepted by /auth/callback; \
802 400 means the PKCE state was not found or decryption failed",
803 );
804 assert_eq!(
805 resp2.status(),
806 StatusCode::BAD_GATEWAY,
807 "token exchange should fail 502 (no real OIDC provider); got {}",
808 resp2.status(),
809 );
810 }
811}