use std::borrow::Cow;
use std::str::from_utf8;
use std::marker::PhantomData;
use base64::{engine::general_purpose::STANDARD, Engine};
use oxide_auth::{
endpoint::{
NormalizedParameter, QueryParameter, WebResponse, WebRequest, Template, is_authorization_method,
},
code_grant::{
accesstoken::ErrorDescription,
client_credentials::{Error as ClientCredentialsError, Request as ClientCredentialsRequest},
error::{AccessTokenError, AccessTokenErrorType},
},
};
use super::{Endpoint, OAuthError, OwnerConsent};
use crate::{
primitives::{Issuer, Registrar, Authorizer},
code_grant::client_credentials::{
Extension, client_credentials, Endpoint as ClientCredentialsEndpoint,
},
};
pub struct ClientCredentialsFlow<E, R>
where
E: Endpoint<R> + Send,
R: WebRequest,
{
endpoint: WrappedToken<E, R>,
allow_credentials_in_body: bool,
allow_refresh_token: bool,
}
struct WrappedToken<E: Endpoint<R>, R: WebRequest> {
inner: E,
extension_fallback: (),
r_type: PhantomData<R>,
}
struct WrappedRequest<R: WebRequest> {
request: PhantomData<R>,
body: NormalizedParameter,
authorization: Option<Authorization>,
error: Option<FailParse<R::Error>>,
allow_credentials_in_body: bool,
}
struct Invalid;
enum FailParse<E> {
Invalid,
Err(E),
}
struct Authorization(String, Vec<u8>);
impl<E, R> ClientCredentialsFlow<E, R>
where
E: Endpoint<R> + Send + Sync,
R: WebRequest + Send + Sync,
<R as WebRequest>::Error: Send + Sync,
{
pub fn prepare(mut endpoint: E) -> Result<Self, E::Error> {
if endpoint.registrar().is_none() {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
if endpoint.issuer_mut().is_none() {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
Ok(ClientCredentialsFlow {
endpoint: WrappedToken {
inner: endpoint,
extension_fallback: (),
r_type: PhantomData,
},
allow_credentials_in_body: false,
allow_refresh_token: false,
})
}
pub fn allow_credentials_in_body(&mut self, allow: bool) {
self.allow_credentials_in_body = allow;
}
pub fn allow_refresh_token(&mut self, allow: bool) {
self.allow_refresh_token = allow;
}
pub async fn execute(&mut self, mut request: R) -> Result<R::Response, E::Error> {
let pending = client_credentials(
&mut self.endpoint,
&WrappedRequest::new(&mut request, self.allow_credentials_in_body),
)
.await;
let pending = match pending {
Err(error) => {
return client_credentials_error(&mut self.endpoint.inner, &mut request, error)
}
Ok(pending) => pending,
};
let consent = self
.endpoint
.inner
.owner_solicitor()
.unwrap()
.check_consent(&mut request, pending.as_solicitation())
.await;
let owner_id = match consent {
OwnerConsent::Authorized(owner_id) => owner_id,
OwnerConsent::Error(error) => return Err(self.endpoint.inner.web_error(error)),
OwnerConsent::InProgress(..) => {
return Err(self.endpoint.inner.error(OAuthError::PrimitiveError));
}
OwnerConsent::Denied => {
let mut error = AccessTokenError::default();
error.set_type(AccessTokenErrorType::InvalidClient);
let mut json = ErrorDescription::new(error);
let mut response = self.endpoint.inner.response(
&mut request,
Template::new_unauthorized(None, Some(json.description())).into(),
)?;
response
.client_error()
.map_err(|err| self.endpoint.inner.web_error(err))?;
response
.body_json(&json.to_json())
.map_err(|err| self.endpoint.inner.web_error(err))?;
return Ok(response);
}
};
let token = match pending
.issue(&mut self.endpoint, owner_id, self.allow_refresh_token)
.await
{
Err(error) => {
return client_credentials_error(&mut self.endpoint.inner, &mut request, error)
}
Ok(token) => token,
};
let mut response = self
.endpoint
.inner
.response(&mut request, Template::new_ok().into())?;
response
.body_json(&token.to_json())
.map_err(|err| self.endpoint.inner.web_error(err))?;
Ok(response)
}
}
fn client_credentials_error<E: Endpoint<R>, R: WebRequest>(
endpoint: &mut E, request: &mut R, error: ClientCredentialsError,
) -> Result<R::Response, E::Error> {
Ok(match error {
ClientCredentialsError::Ignore => return Err(endpoint.error(OAuthError::DenySilently)),
ClientCredentialsError::Invalid(mut json) => {
let mut response =
endpoint.response(request, Template::new_bad(Some(json.description())).into())?;
response.client_error().map_err(|err| endpoint.web_error(err))?;
response
.body_json(&json.to_json())
.map_err(|err| endpoint.web_error(err))?;
response
}
ClientCredentialsError::Unauthorized(mut json, scheme) => {
let mut response = endpoint.response(
request,
Template::new_unauthorized(None, Some(json.description())).into(),
)?;
response
.unauthorized(&scheme)
.map_err(|err| endpoint.web_error(err))?;
response
.body_json(&json.to_json())
.map_err(|err| endpoint.web_error(err))?;
response
}
ClientCredentialsError::Primitive(_) => {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
})
}
impl<E: Endpoint<R>, R: WebRequest> ClientCredentialsEndpoint for WrappedToken<E, R> {
fn registrar(&self) -> &(dyn Registrar + Sync) {
self.inner.registrar().unwrap()
}
fn authorizer(&mut self) -> &mut (dyn Authorizer + Send) {
self.inner.authorizer_mut().unwrap()
}
fn issuer(&mut self) -> &mut (dyn Issuer + Send) {
self.inner.issuer_mut().unwrap()
}
fn extension(&mut self) -> &mut (dyn Extension + Send) {
self.inner
.extension()
.and_then(super::Extension::client_credentials)
.unwrap_or(&mut self.extension_fallback)
}
}
impl<R: WebRequest> WrappedRequest<R> {
pub fn new(request: &mut R, credentials: bool) -> Self {
Self::new_or_fail(request, credentials).unwrap_or_else(Self::from_err)
}
fn new_or_fail(request: &mut R, credentials: bool) -> Result<Self, FailParse<R::Error>> {
let authorization = match request.authheader() {
Err(err) => return Err(FailParse::Err(err)),
Ok(Some(header)) => Self::parse_header(header).map(Some)?,
Ok(None) => None,
};
Ok(WrappedRequest {
request: PhantomData,
body: request
.urlbody()
.map(|body| body.into_owned())
.map_err(FailParse::Err)?,
authorization,
error: None,
allow_credentials_in_body: credentials,
})
}
fn from_err(err: FailParse<R::Error>) -> Self {
WrappedRequest {
request: PhantomData,
body: Default::default(),
authorization: None,
error: Some(err),
allow_credentials_in_body: false,
}
}
fn parse_header(header: Cow<str>) -> Result<Authorization, Invalid> {
let authorization = {
let auth_data = match is_authorization_method(&header, "Basic ") {
None => return Err(Invalid),
Some(data) => data,
};
let combined = match STANDARD.decode(auth_data) {
Err(_) => return Err(Invalid),
Ok(vec) => vec,
};
let mut split = combined.splitn(2, |&c| c == b':');
let client_bin = match split.next() {
None => return Err(Invalid),
Some(client) => client,
};
let passwd = match split.next() {
None => return Err(Invalid),
Some(passwd64) => passwd64,
};
let client = match from_utf8(client_bin) {
Err(_) => return Err(Invalid),
Ok(client) => client,
};
Authorization(client.to_string(), passwd.to_vec())
};
Ok(authorization)
}
}
impl<R: WebRequest> ClientCredentialsRequest for WrappedRequest<R> {
fn valid(&self) -> bool {
self.error.is_none()
}
fn authorization(&self) -> Option<(Cow<str>, Cow<[u8]>)> {
self.authorization
.as_ref()
.map(|auth| (auth.0.as_str().into(), auth.1.as_slice().into()))
}
fn grant_type(&self) -> Option<Cow<str>> {
self.body.unique_value("grant_type")
}
fn scope(&self) -> Option<Cow<str>> {
self.body.unique_value("scope")
}
fn extension(&self, key: &str) -> Option<Cow<str>> {
self.body.unique_value(key)
}
fn allow_credentials_in_body(&self) -> bool {
self.allow_credentials_in_body
}
}
impl<E> From<Invalid> for FailParse<E> {
fn from(_: Invalid) -> Self {
FailParse::Invalid
}
}