1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
use super::super::{GetError, Store, User};
use drawbridge_type::UserContext;
use std::ops::Deref;
use axum::extract::rejection::{TypedHeaderRejection, TypedHeaderRejectionReason};
use axum::extract::{Extension, FromRequest, RequestParts};
use axum::headers::authorization::Bearer;
use axum::headers::Authorization;
use axum::http::StatusCode;
use axum::response::{IntoResponse, Response};
use axum::{async_trait, TypedHeader};
use log::{debug, error, trace, warn};
use openidconnect::core::{CoreClient, CoreUserInfoClaims};
use openidconnect::ureq::http_client;
use openidconnect::AccessToken;
#[repr(transparent)]
#[derive(Clone, Debug)]
pub struct Claims(CoreUserInfoClaims);
impl Deref for Claims {
type Target = CoreUserInfoClaims;
fn deref(&self) -> &Self::Target {
&self.0
}
}
impl Claims {
pub async fn get_user<'a>(
&self,
store: &'a Store,
) -> Result<(UserContext, User<'a>), impl IntoResponse> {
let subj = self.0.subject();
store.user_by_subject(subj).await.map_err(|e|{
match e {
GetError::NotFound => (StatusCode::UNAUTHORIZED, format!("User with OpenID Connect subject `{}` not found", subj.as_str())).into_response(),
_ => {
warn!(target: "app::auth::oidc", "failed to get user by OpenID Connect subject `{}`: {:?}", subj.as_str(), e);
e.into_response()
},
}
})
}
pub async fn assert_user<'a>(
&self,
store: &'a Store,
cx: &UserContext,
) -> Result<User<'a>, impl IntoResponse> {
let (ref oidc_cx, user) = self
.get_user(store)
.await
.map_err(IntoResponse::into_response)?;
if oidc_cx != cx {
return Err((
StatusCode::UNAUTHORIZED,
format!( "You are logged in as `{oidc_cx}`, please relogin as `{cx}` to access the resource"),
)
.into_response());
}
Ok(user)
}
}
#[async_trait]
impl<B: Send> FromRequest<B> for Claims {
type Rejection = Response;
async fn from_request(req: &mut RequestParts<B>) -> Result<Self, Self::Rejection> {
let TypedHeader(Authorization::<Bearer>(token)) =
req.extract()
.await
.map_err(|e: TypedHeaderRejection| match e.reason() {
TypedHeaderRejectionReason::Missing => {
(StatusCode::UNAUTHORIZED, "Bearer token header missing").into_response()
}
_ => e.into_response(),
})?;
let token = AccessToken::new(token.token().into());
let Extension(oidc) = req.extract::<Extension<CoreClient>>().await.map_err(|e| {
error!(target: "app::auth::oidc", "OpenID Connect client extension missing");
e.into_response()
})?;
let info_req = oidc.user_info(token, None).map_err(|e| {
error!(target: "app::auth::oidc", "failed to construct user info request: {e}");
(
StatusCode::INTERNAL_SERVER_ERROR,
"OpenID Connect client initialization failed",
)
.into_response()
})?;
trace!(target: "app:auth::oidc", "request user info");
let claims = info_req.request(http_client).map_err(|e| {
debug!(target: "app::auth::oidc", "failed to request user info: {e}");
(
StatusCode::UNAUTHORIZED,
format!("OpenID Connect credential validation failed: {e}"),
)
.into_response()
})?;
trace!(target: "app:auth::oidc", "received user claims: {:?}", claims);
Ok(Self(claims))
}
}