Commit graph

45 commits

Author SHA1 Message Date
Rémi Bardon
9732b0f9d8 mod_tokenauth: Fix expiry lasting one second too much
Because the code was using `< now` in a lot of places, things expiring at the current second
wouldn't be marked as expired. It isn't noticeable in real-world scenarios but I wanted to
create OAuth 2.0 tokens valid for 0 second in integration tests and it wasn't possible.

By using `<=` instead of `<`, we make sure tokens don't live a single millisecond more than
what they are supposed to.
2025-02-01 20:45:28 +01:00
Matthew Wild
ad3ab533ed mod_tokenauth: Ignore invalid grants in storage that have no id 2023-11-29 17:51:34 +00:00
Kim Alvefur
5c773be087 mod_tokenauth: Include more details in debug logs
Had a hard time following what was happening when it did not specify
which grant or token was being removed.
2023-11-12 00:33:57 +01:00
Kim Alvefur
deaa31ddc0 mod_tokenauth: Fix saving grants after clearing expired tokens
Previously the whole grant was deleted if it found one expired toke,
which was not indented.
2023-11-05 16:10:40 +01:00
Kim Alvefur
f4c203502d mod_tokenauth: Set name/description on cleanup job 2023-10-21 12:56:39 +02:00
Kim Alvefur
5425a43ba6 mod_tokenauth: Save grant after removing expired tokens
Ensures the periodic cleanup really does remove expired tokens.
2023-10-21 12:33:55 +02:00
Kim Alvefur
d9043249de mod_tokenauth: Periodically clear out expired tokens and grants
This should ensure expired grants eventually disappear.
2023-10-09 20:31:35 +02:00
Kim Alvefur
0cd9aba8e2 mod_tokenauth: Delete grants without tokens after period
Generally it is expected that a grant would have at least one token as
long as the grant is in active use.

Refresh tokens issued by mod_http_oauth2 have a lifetime of one week by
default, so the idea here is that if that refresh token expired and
another week goes by without the grant being used, then the whole grant
can be removed.
2023-10-16 23:51:52 +02:00
Kim Alvefur
9d47a1a9ef mod_tokenauth: Clear expired tokens on grant retrieval 2023-10-09 20:28:37 +02:00
Kim Alvefur
4df58bc22f mod_tokenauth: Delete grants in the wrong formats on retrieval 2023-10-09 20:26:30 +02:00
Kim Alvefur
d2cfe2fed7 mod_tokenauth: Fix revoking a single token without revoking whole grant
This appears to have been a copy-paste of the grant revocation function,
or maybe the other way around. Either way, it deleted the whole grant
instead of the individual token as might be expected.
2023-07-23 02:54:49 +02:00
Kim Alvefur
1987a7411f plugins: Switch to :get_option_period() for time range options
Improves readability ("1 day" vs 86400) and centralizes validation.
2023-07-16 20:49:33 +02:00
Kim Alvefur
e80cd078fd mod_tokenauth: Support selection of _no_ role at all
If a grant does not have a role, we should not go and make one up.
While not very useful for XMPP if you can't even login, it may be useful
for OAuth2/OIDC.
2023-05-07 20:34:07 +02:00
Kim Alvefur
98d5a50eb6 mod_tokenauth: Return error instead of session for token without role
Such a session triggers errors in module:may or other places since it is
generally expected that a session must have a role.
2023-05-07 20:33:03 +02:00
Kim Alvefur
a68169b93e mod_tokenauth: Fix parsing binary part of tokens
Fixes parsing of tokens that happen to have a `;` in their secret part,
otherwise it splits there and the later bit goes into the username and
hitting the "Invalid token in storage" condition.
2023-04-12 11:43:32 +02:00
Kim Alvefur
816d0819f2 mod_tokenauth: Only check if expiry of expiring tokens
Some tokens, e.g. OAuth2 refresh tokens, might not have their lifetime
explicitly bounded here, but rather be bounded by the lifetime of
something else, like the OAuth2 client.

Open question: Would it be better to enforce a lifetime on all tokens?
2023-04-12 10:21:32 +02:00
Matthew Wild
fb35ec60a3 mod_tokenauth: Add API method to revoke a grant by id
We probably want to refactor revoke_token() to use this one in the future.
2023-04-05 15:33:56 +01:00
Matthew Wild
24fa8c5d60 mod_tokenauth: Add API to inspect individual grants or all of a user's grants 2023-03-29 17:15:33 +01:00
Matthew Wild
2ed84fde94 mod_tokenauth: Move grant validation to a reusable function 2023-03-29 17:14:45 +01:00
Jonas Schäfer
124b4fa302 mod_tokenauth: fix traceback if password has never been changed
By checking the password_updated_at for non-nilness before using it,
we avoid a nasty crash :-).
2023-03-28 21:25:54 +02:00
Matthew Wild
ef5dfa900f mod_tokenauth: Fire events on grant creation and revocation 2023-03-28 10:43:09 +01:00
Kim Alvefur
41c23d5616 mod_tokenauth: Fix storage API mistake in revocation 2023-03-28 00:30:18 +02:00
Matthew Wild
9247a37b83 mod_tokenauth: Fix traceback when checking expiry of tokens with no expiry 2023-03-27 20:51:07 +01:00
Matthew Wild
f4c1f3b353 mod_tokenauth: Refactor API to separate tokens and grants
This is another iteration on top of the previous sub-tokens work. Essentially,
the concept of a "parent token" has been replaced with the concept of a
"grant" to which all tokens now belong. The grant does not have any tokens
when first created, but the create_token() call can add them.
2023-03-27 18:35:57 +01:00
Matthew Wild
8743ea29d5 mod_tokenauth: Support for creating sub-tokens
Properties of sub-tokens:

- They share the same id as their parent token
- Sub-tokens may not have their own sub-tokens (but may have sibling tokens)
- They always have the same or shorter lifetime compared to their parent token
- Revoking a parent token revokes all sub-tokens
- Sub-tokens always have the same JID as the parent token
- They do not have their own 'accessed' property - accessing a sub-token
  updates the parent token's accessed time

Although this is a generic API, it is designed to at least fill the needs of
OAuth2 refresh + access tokens (where the parent token is the refresh token
and the sub-tokens are access tokens).
2023-03-26 16:46:48 +01:00
Matthew Wild
295c27aa99 mod_tokenauth: return error if storage of new token fails 2023-03-26 15:53:27 +01:00
Matthew Wild
51fea18a87 mod_tokenauth: Track last access time (last time a token was used) 2023-03-24 12:59:47 +00:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Kim Alvefur
14f896bf2d mod_tokenauth: Fix traceback in get_token_session()
Errors in sha256 becasue `token_secret` is nil since it was not passed
to _get_validated_token_info().

Looks like a simple oversight in ebe3b2f96cad
2023-03-21 20:43:42 +01:00
Matthew Wild
fc80e83b42 mod_tokenauth: Switch to new token format (invalidates existing tokens!)
The new format has the following properties:

- 5 bytes longer than the previous format
- The token now has separate 'id' and 'secret' parts - the token itself is no
  longer stored in the DB, and the secret part is hashed
- The only variable length field (JID) has been moved to the end
- The 'secret-token:' prefix (RFC 8959) is now included

Compatibility with the old token format was not maintained, and all previously
issued tokens are invalid after this commit (they will be removed from the DB
if used).
2023-03-21 14:33:29 +00:00
Matthew Wild
5019bacff6 mod_tokenauth: Log error when token validation fails 2023-03-21 14:04:39 +00:00
Kim Alvefur
566a991f84 util.sasl.oauthbearer: Return username from callback instead using authzid (BC)
RFC 6120 states that
>  If the initiating entity does not wish to act on behalf of another
>  entity, it MUST NOT provide an authorization identity.

Thus it seems weird to require it here.  We can instead expect an
username from the token data passed back from the profile.

This follows the practice of util.sasl.external where the profile
callback returns the selected username, making the authentication module
responsible for extracting the username from the token.
2023-03-16 12:18:23 +01:00
Kim Alvefur
7b7cad2b66 mod_tokenauth: Fix misplaced closing parenthesis
`type(x ~= y)` is always a string, thus truthy
2023-03-02 22:34:29 +01:00
Matthew Wild
9e02d322d8 mod_tokenauth: Gracefully handle missing tokens 2023-03-01 18:43:54 +00:00
Matthew Wild
b435f6d52a mod_tokenauth: Add SASL handler backend that can accept and verify tokens
This is designed for use by other modules that want to accept tokens issued
by mod_tokenauth, without duplicating all the necessary logic.
2023-03-01 13:04:36 +00:00
Matthew Wild
f3d152eb1b mod_tokenauth: Add some sanity checking of the new optional parameters 2023-03-01 13:02:51 +00:00
Matthew Wild
a58a6d2317 mod_tokenauth: Add 'purpose' constraint
This allows tokens to be tied to specific purposes/protocols. For example, we
shouldn't (without specific consideration) allow an OAuth token to be dropped
into a slot expecting a FAST token.

While FAST doesn't currently use mod_tokenauth, it and others may do in the
future. It's better to be explicit about what kind of token code is issuing or
expecting.
2023-03-01 13:01:21 +00:00
Matthew Wild
32c38bc249 mod_tokenauth: Allow attaching an arbitrary data table to a token 2022-10-13 22:46:19 +01:00
Matthew Wild
12fc0febf1 mod_tokenauth: Remove expired tokens from storage 2022-10-06 16:00:39 +01:00
Matthew Wild
36afd999b1 mod_tokenauth: Invalidate tokens issued before most recent password change
This is a security improvement, to ensure that sessions authenticated using a
token (note: not currently possible in stock Prosody) are invalidated just
like password-authenticated sessions are.
2022-10-06 15:59:07 +01:00
Matthew Wild
f5768f63c9 mod_authz_internal, and more: New iteration of role API
These changes to the API (hopefully the last) introduce a cleaner separation
between the user's primary (default) role, and their secondary (optional)
roles.

To keep the code sane and reduce complexity, a data migration is needed for
people using stored roles in 0.12. This can be performed with

  prosodyctl mod_authz_internal migrate <host>
2022-08-17 16:38:53 +01:00
Matthew Wild
a0f2f9ee19 mod_tokenauth: New API that better fits how modules are using token auth
This also updates the module to the new role API, and improves support for
scope/role selection (currently treated as the same thing, which they almost
are).
2022-07-20 10:52:17 +01:00
Matthew Wild
40bb67c03b mod_tokenauth: Track creation time of tokens 2020-02-28 21:55:40 +00:00
Kim Alvefur
92c65ed9af mod_tokenauth: Handle tokens issued to bare hosts (eg components) 2020-02-28 14:13:04 +01:00
Matthew Wild
f6a365c970 mod_authtokens: Rename to mod_tokenauth for consistency with mod_saslauth 2020-02-26 22:46:15 +00:00
Renamed from plugins/mod_authtokens.lua (Browse further)