2 This file is part of GNUnet.
3 Copyright (C) 2012-2015 GNUnet e.V.
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
19 * @author Martin Schanzenbach
20 * @author Philippe Buschmann
21 * @file identity/plugin_rest_openid_connect.c
22 * @brief GNUnet Namestore REST plugin
27 #include "gnunet_rest_plugin.h"
28 #include "gnunet_identity_service.h"
29 #include "gnunet_gns_service.h"
30 #include "gnunet_gnsrecord_lib.h"
31 #include "gnunet_namestore_service.h"
32 #include "gnunet_rest_lib.h"
33 #include "gnunet_jsonapi_lib.h"
34 #include "gnunet_jsonapi_util.h"
35 #include "microhttpd.h"
38 #include "gnunet_signatures.h"
39 #include "gnunet_reclaim_attribute_lib.h"
40 #include "gnunet_reclaim_service.h"
41 #include "oidc_helper.h"
46 #define GNUNET_REST_API_NS_OIDC "/openid"
51 #define GNUNET_REST_API_NS_AUTHORIZE "/openid/authorize"
56 #define GNUNET_REST_API_NS_TOKEN "/openid/token"
61 #define GNUNET_REST_API_NS_USERINFO "/openid/userinfo"
66 #define GNUNET_REST_API_NS_LOGIN "/openid/login"
71 #define GNUNET_REST_JSONAPI_RECLAIM_ATTRIBUTE "attribute"
76 #define GNUNET_REST_JSONAPI_IDENTITY_TICKET "ticket"
82 #define GNUNET_REST_JSONAPI_RECLAIM_ATTRIBUTE_VALUE "value"
85 * State while collecting all egos
87 #define ID_REST_STATE_INIT 0
90 * Done collecting egos
92 #define ID_REST_STATE_POST_INIT 1
97 #define OIDC_GRANT_TYPE_KEY "grant_type"
100 * OIDC grant_type key
102 #define OIDC_GRANT_TYPE_VALUE "authorization_code"
107 #define OIDC_CODE_KEY "code"
110 * OIDC response_type key
112 #define OIDC_RESPONSE_TYPE_KEY "response_type"
117 #define OIDC_CLIENT_ID_KEY "client_id"
122 #define OIDC_SCOPE_KEY "scope"
125 * OIDC redirect_uri key
127 #define OIDC_REDIRECT_URI_KEY "redirect_uri"
132 #define OIDC_STATE_KEY "state"
137 #define OIDC_NONCE_KEY "nonce"
140 * OIDC cookie header key
142 #define OIDC_COOKIE_HEADER_KEY "cookie"
145 * OIDC cookie header information key
147 #define OIDC_AUTHORIZATION_HEADER_KEY "authorization"
150 * OIDC cookie header information key
152 #define OIDC_COOKIE_HEADER_INFORMATION_KEY "Identity="
155 * OIDC expected response_type while authorizing
157 #define OIDC_EXPECTED_AUTHORIZATION_RESPONSE_TYPE "code"
160 * OIDC expected scope part while authorizing
162 #define OIDC_EXPECTED_AUTHORIZATION_SCOPE "openid"
165 * OIDC ignored parameter array
167 static char* OIDC_ignored_parameter_array [] =
179 * OIDC authorized identities and times hashmap
181 struct GNUNET_CONTAINER_MultiHashMap *OIDC_identity_login_time;
184 * OIDC authorized identities and times hashmap
186 struct GNUNET_CONTAINER_MultiHashMap *OIDC_identity_grants;
189 * OIDC ticket/code use only once
191 struct GNUNET_CONTAINER_MultiHashMap *OIDC_ticket_once;
194 * OIDC access_token to ticket and ego
196 struct GNUNET_CONTAINER_MultiHashMap *OIDC_interpret_access_token;
199 * The configuration handle
201 const struct GNUNET_CONFIGURATION_Handle *cfg;
204 * HTTP methods allows for this plugin
206 static char* allow_methods;
209 * @brief struct returned by the initialization function of the plugin
213 const struct GNUNET_CONFIGURATION_Handle *cfg;
217 * OIDC needed variables
219 struct OIDC_Variables
222 * The RP client public key
224 struct GNUNET_CRYPTO_EcdsaPublicKey client_pkey;
227 * The OIDC client id of the RP
232 * The OIDC redirect uri
237 * The list of oidc scopes
252 * The OIDC response type
257 * The identity chosen by the user to login
259 char *login_identity;
276 struct EgoEntry *next;
281 struct EgoEntry *prev;
296 struct GNUNET_IDENTITY_Ego *ego;
305 struct EgoEntry *ego_head;
310 struct EgoEntry *ego_tail;
315 struct EgoEntry *ego_entry;
318 * Pointer to ego private key
320 struct GNUNET_CRYPTO_EcdsaPrivateKey priv_key;
325 struct OIDC_Variables *oidc;
328 * The processing state
333 * Handle to Identity service.
335 struct GNUNET_IDENTITY_Handle *identity_handle;
340 struct GNUNET_REST_RequestHandle *rest_handle;
345 struct GNUNET_GNS_Handle *gns_handle;
350 struct GNUNET_GNS_LookupRequest *gns_op;
353 * Handle to NAMESTORE
355 struct GNUNET_NAMESTORE_Handle *namestore_handle;
358 * Iterator for NAMESTORE
360 struct GNUNET_NAMESTORE_ZoneIterator *namestore_handle_it;
363 * Attribute claim list
365 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimList *attr_list;
370 struct GNUNET_IDENTITY_Operation *op;
375 struct GNUNET_RECLAIM_Handle *idp;
380 struct GNUNET_RECLAIM_Operation *idp_op;
385 struct GNUNET_RECLAIM_AttributeIterator *attr_it;
390 struct GNUNET_RECLAIM_TicketIterator *ticket_it;
395 struct GNUNET_RECLAIM_Ticket ticket;
398 * Desired timeout for the lookup (default is no timeout).
400 struct GNUNET_TIME_Relative timeout;
403 * ID of a task associated with the resolution process.
405 struct GNUNET_SCHEDULER_Task *timeout_task;
408 * The plugin result processor
410 GNUNET_REST_ResultProcessor proc;
413 * The closure of the result processor
423 * The tld for redirect
428 * The redirect prefix
430 char *redirect_prefix;
433 * The redirect suffix
435 char *redirect_suffix;
438 * Error response message
443 * Error response description
455 struct GNUNET_JSONAPI_Document *resp_object;
460 * Cleanup lookup handle
461 * @param handle Handle to clean up
464 cleanup_handle (struct RequestHandle *handle)
466 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimListEntry *claim_entry;
467 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimListEntry *claim_tmp;
468 struct EgoEntry *ego_entry;
469 struct EgoEntry *ego_tmp;
470 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
472 if (NULL != handle->resp_object)
473 GNUNET_JSONAPI_document_delete (handle->resp_object);
474 if (NULL != handle->timeout_task)
475 GNUNET_SCHEDULER_cancel (handle->timeout_task);
476 if (NULL != handle->identity_handle)
477 GNUNET_IDENTITY_disconnect (handle->identity_handle);
478 if (NULL != handle->attr_it)
479 GNUNET_RECLAIM_get_attributes_stop (handle->attr_it);
480 if (NULL != handle->ticket_it)
481 GNUNET_RECLAIM_ticket_iteration_stop (handle->ticket_it);
482 if (NULL != handle->idp)
483 GNUNET_RECLAIM_disconnect (handle->idp);
484 if (NULL != handle->url)
485 GNUNET_free (handle->url);
486 if (NULL != handle->tld)
487 GNUNET_free (handle->tld);
488 if (NULL != handle->redirect_prefix)
489 GNUNET_free (handle->redirect_prefix);
490 if (NULL != handle->redirect_suffix)
491 GNUNET_free (handle->redirect_suffix);
492 if (NULL != handle->emsg)
493 GNUNET_free (handle->emsg);
494 if (NULL != handle->edesc)
495 GNUNET_free (handle->edesc);
496 if (NULL != handle->gns_op)
497 GNUNET_GNS_lookup_cancel (handle->gns_op);
498 if (NULL != handle->gns_handle)
499 GNUNET_GNS_disconnect (handle->gns_handle);
501 if (NULL != handle->namestore_handle)
502 GNUNET_NAMESTORE_disconnect (handle->namestore_handle);
503 if (NULL != handle->oidc)
505 if (NULL != handle->oidc->client_id)
506 GNUNET_free(handle->oidc->client_id);
507 if (NULL != handle->oidc->login_identity)
508 GNUNET_free(handle->oidc->login_identity);
509 if (NULL != handle->oidc->nonce)
510 GNUNET_free(handle->oidc->nonce);
511 if (NULL != handle->oidc->redirect_uri)
512 GNUNET_free(handle->oidc->redirect_uri);
513 if (NULL != handle->oidc->response_type)
514 GNUNET_free(handle->oidc->response_type);
515 if (NULL != handle->oidc->scope)
516 GNUNET_free(handle->oidc->scope);
517 if (NULL != handle->oidc->state)
518 GNUNET_free(handle->oidc->state);
519 if (NULL != handle->oidc->response)
520 json_decref(handle->oidc->response);
521 GNUNET_free(handle->oidc);
523 if ( NULL != handle->attr_list )
525 for (claim_entry = handle->attr_list->list_head;
526 NULL != claim_entry;)
528 claim_tmp = claim_entry;
529 claim_entry = claim_entry->next;
530 GNUNET_free(claim_tmp->claim);
531 GNUNET_free(claim_tmp);
533 GNUNET_free (handle->attr_list);
535 for (ego_entry = handle->ego_head;
539 ego_entry = ego_entry->next;
540 GNUNET_free (ego_tmp->identifier);
541 GNUNET_free (ego_tmp->keystring);
542 GNUNET_free (ego_tmp);
544 if (NULL != handle->attr_it)
546 GNUNET_free(handle->attr_it);
548 GNUNET_free (handle);
552 cleanup_handle_delayed (void *cls)
554 cleanup_handle (cls);
559 * Task run on error, sends error message. Cleans up everything.
561 * @param cls the `struct RequestHandle`
566 struct RequestHandle *handle = cls;
567 struct MHD_Response *resp;
570 GNUNET_asprintf (&json_error, "{ \"error\" : \"%s\", \"error_description\" : \"%s\"%s%s%s}",
572 (NULL != handle->edesc) ? handle->edesc : "",
573 (NULL != handle->oidc->state) ? ", \"state\":\"" : "",
574 (NULL != handle->oidc->state) ? handle->oidc->state : "",
575 (NULL != handle->oidc->state) ? "\"" : "");
576 if ( 0 == handle->response_code )
578 handle->response_code = MHD_HTTP_BAD_REQUEST;
580 resp = GNUNET_REST_create_response (json_error);
581 if (MHD_HTTP_UNAUTHORIZED == handle->response_code)
583 MHD_add_response_header(resp, "WWW-Authenticate", "Basic");
585 MHD_add_response_header (resp, "Content-Type", "application/json");
586 handle->proc (handle->proc_cls, resp, handle->response_code);
587 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
588 GNUNET_free (json_error);
593 * Task run on error in userinfo endpoint, sends error header. Cleans up
596 * @param cls the `struct RequestHandle`
599 do_userinfo_error (void *cls)
601 struct RequestHandle *handle = cls;
602 struct MHD_Response *resp;
605 GNUNET_asprintf (&error, "error=\"%s\", error_description=\"%s\"",
607 (NULL != handle->edesc) ? handle->edesc : "");
608 resp = GNUNET_REST_create_response ("");
609 MHD_add_response_header(resp, "WWW-Authenticate", error);
610 handle->proc (handle->proc_cls, resp, handle->response_code);
611 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
617 * Task run on error, sends error message and redirects. Cleans up everything.
619 * @param cls the `struct RequestHandle`
622 do_redirect_error (void *cls)
624 struct RequestHandle *handle = cls;
625 struct MHD_Response *resp;
627 GNUNET_asprintf (&redirect,
628 "%s?error=%s&error_description=%s%s%s",
629 handle->oidc->redirect_uri, handle->emsg, handle->edesc,
630 (NULL != handle->oidc->state) ? "&state=" : "",
631 (NULL != handle->oidc->state) ? handle->oidc->state : "");
632 resp = GNUNET_REST_create_response ("");
633 MHD_add_response_header (resp, "Location", redirect);
634 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
635 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
636 GNUNET_free (redirect);
640 * Task run on timeout, sends error message. Cleans up everything.
642 * @param cls the `struct RequestHandle`
645 do_timeout (void *cls)
647 struct RequestHandle *handle = cls;
649 handle->timeout_task = NULL;
654 * Return attributes for claim
656 * @param cls the request handle
659 return_userinfo_response (void *cls)
662 struct RequestHandle *handle = cls;
663 struct MHD_Response *resp;
665 result_str = json_dumps (handle->oidc->response, 0);
667 resp = GNUNET_REST_create_response (result_str);
668 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
669 GNUNET_free (result_str);
670 cleanup_handle (handle);
674 * Returns base64 encoded string without padding
676 * @param string the string to encode
677 * @return base64 encoded string
680 base_64_encode(const char *s)
685 GNUNET_STRINGS_base64_encode(s, strlen(s), &enc);
686 tmp = strrchr (enc, '=');
692 * Respond to OPTIONS request
694 * @param con_handle the connection handle
696 * @param cls the RequestHandle
699 options_cont (struct GNUNET_REST_RequestHandle *con_handle,
703 struct MHD_Response *resp;
704 struct RequestHandle *handle = cls;
706 //For now, independent of path return all options
707 resp = GNUNET_REST_create_response (NULL);
708 MHD_add_response_header (resp,
709 "Access-Control-Allow-Methods",
711 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
712 cleanup_handle (handle);
717 * Interprets cookie header and pass its identity keystring to handle
720 cookie_identity_interpretation (struct RequestHandle *handle)
722 struct GNUNET_HashCode cache_key;
724 struct GNUNET_TIME_Absolute current_time, *relog_time;
725 char delimiter[] = "; ";
727 //gets identity of login try with cookie
728 GNUNET_CRYPTO_hash (OIDC_COOKIE_HEADER_KEY, strlen (OIDC_COOKIE_HEADER_KEY),
730 if ( GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->header_param_map,
733 //splits cookies and find 'Identity' cookie
734 cookies = GNUNET_CONTAINER_multihashmap_get ( handle->rest_handle->header_param_map, &cache_key);
735 handle->oidc->login_identity = strtok(cookies, delimiter);
737 while ( NULL != handle->oidc->login_identity )
739 if ( NULL != strstr (handle->oidc->login_identity, OIDC_COOKIE_HEADER_INFORMATION_KEY) )
743 handle->oidc->login_identity = strtok (NULL, delimiter);
745 GNUNET_CRYPTO_hash (handle->oidc->login_identity, strlen (handle->oidc->login_identity),
747 if ( GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (OIDC_identity_login_time, &cache_key) )
749 relog_time = GNUNET_CONTAINER_multihashmap_get (OIDC_identity_login_time,
751 current_time = GNUNET_TIME_absolute_get ();
752 // 30 min after old login -> redirect to login
753 if ( current_time.abs_value_us <= relog_time->abs_value_us )
755 handle->oidc->login_identity = strtok(handle->oidc->login_identity, OIDC_COOKIE_HEADER_INFORMATION_KEY);
756 handle->oidc->login_identity = GNUNET_strdup(handle->oidc->login_identity);
758 handle->oidc->login_identity = NULL;
763 handle->oidc->login_identity = NULL;
769 * Redirects to login page stored in configuration file
772 login_redirection(void *cls)
774 char *login_base_url;
776 struct MHD_Response *resp;
777 struct RequestHandle *handle = cls;
780 == GNUNET_CONFIGURATION_get_value_string (cfg, "reclaim-rest-plugin",
781 "address", &login_base_url) )
783 GNUNET_asprintf (&new_redirect, "%s?%s=%s&%s=%s&%s=%s&%s=%s&%s=%s&%s=%s",
785 OIDC_RESPONSE_TYPE_KEY,
786 handle->oidc->response_type,
788 handle->oidc->client_id,
789 OIDC_REDIRECT_URI_KEY,
790 handle->oidc->redirect_uri,
794 (NULL != handle->oidc->state) ? handle->oidc->state : "",
796 (NULL != handle->oidc->nonce) ? handle->oidc->nonce : "");
797 resp = GNUNET_REST_create_response ("");
798 MHD_add_response_header (resp, "Location", new_redirect);
799 GNUNET_free(login_base_url);
803 handle->emsg = GNUNET_strdup("server_error");
804 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
805 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
806 GNUNET_SCHEDULER_add_now (&do_error, handle);
809 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
810 GNUNET_free(new_redirect);
811 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
815 * Does internal server error when iteration failed.
818 oidc_iteration_error (void *cls)
820 struct RequestHandle *handle = cls;
821 handle->emsg = GNUNET_strdup("INTERNAL_SERVER_ERROR");
822 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
823 GNUNET_SCHEDULER_add_now (&do_error, handle);
827 get_client_name_result (void *cls,
828 const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone,
830 unsigned int rd_count,
831 const struct GNUNET_GNSRECORD_Data *rd)
833 struct RequestHandle *handle = cls;
834 struct MHD_Response *resp;
837 char *code_json_string;
838 char *code_base64_final_string;
840 ticket_str = GNUNET_STRINGS_data_to_string_alloc (&handle->ticket,
841 sizeof (struct GNUNET_RECLAIM_Ticket));
842 //TODO change if more attributes are needed (see max_age)
843 code_json_string = OIDC_build_authz_code (&handle->priv_key,
845 handle->oidc->nonce);
846 code_base64_final_string = base_64_encode(code_json_string);
847 GNUNET_asprintf (&redirect_uri, "%s.%s/%s?%s=%s&state=%s",
848 handle->redirect_prefix,
850 handle->redirect_suffix,
851 handle->oidc->response_type,
852 code_base64_final_string, handle->oidc->state);
853 resp = GNUNET_REST_create_response ("");
854 MHD_add_response_header (resp, "Location", redirect_uri);
855 handle->proc (handle->proc_cls, resp, MHD_HTTP_FOUND);
856 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
857 GNUNET_free (redirect_uri);
858 GNUNET_free (ticket_str);
859 GNUNET_free (code_json_string);
860 GNUNET_free (code_base64_final_string);
867 get_client_name_error (void *cls)
869 struct RequestHandle *handle = cls;
871 handle->emsg = GNUNET_strdup("server_error");
872 handle->edesc = GNUNET_strdup("Server cannot generate ticket, no name found for client.");
873 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
878 lookup_redirect_uri_result (void *cls,
880 const struct GNUNET_GNSRECORD_Data *rd)
882 struct RequestHandle *handle = cls;
886 struct GNUNET_CRYPTO_EcdsaPublicKey redirect_zone;
888 handle->gns_op = NULL;
891 handle->emsg = GNUNET_strdup("server_error");
892 handle->edesc = GNUNET_strdup("Server cannot generate ticket, redirect uri not found.");
893 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
896 for (int i = 0; i < rd_count; i++)
898 if (0 != strcmp (rd[0].data,
899 handle->oidc->redirect_uri))
901 tmp = GNUNET_strdup (rd[0].data);
903 (unsigned char) '.');
905 handle->redirect_prefix = GNUNET_strdup (tmp);
906 tmp_key_str = pos + 1;
907 pos = strchr (tmp_key_str,
908 (unsigned char) '/');
910 handle->redirect_suffix = GNUNET_strdup (pos + 1);
912 GNUNET_STRINGS_string_to_data (tmp_key_str,
913 strlen (tmp_key_str),
915 sizeof (redirect_zone));
917 GNUNET_NAMESTORE_zone_to_name (handle->namestore_handle,
920 &get_client_name_error,
922 &get_client_name_result,
927 handle->emsg = GNUNET_strdup("server_error");
928 handle->edesc = GNUNET_strdup("Server cannot generate ticket, redirect uri not found.");
929 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
933 * Issues ticket and redirects to relying party with the authorization code as
934 * parameter. Otherwise redirects with error
937 oidc_ticket_issue_cb (void* cls,
938 const struct GNUNET_RECLAIM_Ticket *ticket)
940 struct RequestHandle *handle = cls;
942 handle->idp_op = NULL;
943 handle->ticket = *ticket;
946 handle->emsg = GNUNET_strdup("server_error");
947 handle->edesc = GNUNET_strdup("Server cannot generate ticket.");
948 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
951 handle->gns_op = GNUNET_GNS_lookup (handle->gns_handle,
953 &handle->oidc->client_pkey,
954 GNUNET_GNSRECORD_TYPE_RECLAIM_OIDC_REDIRECT,
955 GNUNET_GNS_LO_DEFAULT,
956 &lookup_redirect_uri_result,
962 oidc_collect_finished_cb (void *cls)
964 struct RequestHandle *handle = cls;
965 handle->attr_it = NULL;
966 handle->ticket_it = NULL;
967 if (NULL == handle->attr_list->list_head)
969 handle->emsg = GNUNET_strdup("invalid_scope");
970 handle->edesc = GNUNET_strdup("The requested scope is not available.");
971 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
974 handle->idp_op = GNUNET_RECLAIM_ticket_issue (handle->idp,
976 &handle->oidc->client_pkey,
978 &oidc_ticket_issue_cb,
984 * Collects all attributes for an ego if in scope parameter
987 oidc_attr_collect (void *cls,
988 const struct GNUNET_CRYPTO_EcdsaPublicKey *identity,
989 const struct GNUNET_RECLAIM_ATTRIBUTE_Claim *attr)
991 struct RequestHandle *handle = cls;
992 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimListEntry *le;
993 char* scope_variables;
994 char* scope_variable;
995 char delimiter[]=" ";
997 if ( (NULL == attr->name) || (NULL == attr->data) )
999 GNUNET_RECLAIM_get_attributes_next (handle->attr_it);
1003 scope_variables = GNUNET_strdup(handle->oidc->scope);
1004 scope_variable = strtok (scope_variables, delimiter);
1005 while (NULL != scope_variable)
1007 if ( 0 == strcmp (attr->name, scope_variable) )
1011 scope_variable = strtok (NULL, delimiter);
1013 if ( NULL == scope_variable )
1015 GNUNET_RECLAIM_get_attributes_next (handle->attr_it);
1016 GNUNET_free(scope_variables);
1019 GNUNET_free(scope_variables);
1021 le = GNUNET_new(struct GNUNET_RECLAIM_ATTRIBUTE_ClaimListEntry);
1022 le->claim = GNUNET_RECLAIM_ATTRIBUTE_claim_new (attr->name, attr->type,
1023 attr->data, attr->data_size);
1024 GNUNET_CONTAINER_DLL_insert(handle->attr_list->list_head,
1025 handle->attr_list->list_tail, le);
1026 GNUNET_RECLAIM_get_attributes_next (handle->attr_it);
1031 * Checks time and cookie and redirects accordingly
1034 login_check (void *cls)
1036 struct RequestHandle *handle = cls;
1037 struct GNUNET_TIME_Absolute current_time, *relog_time;
1038 struct GNUNET_CRYPTO_EcdsaPublicKey pubkey, ego_pkey;
1039 struct GNUNET_HashCode cache_key;
1040 char *identity_cookie;
1042 GNUNET_asprintf (&identity_cookie, "Identity=%s", handle->oidc->login_identity);
1043 GNUNET_CRYPTO_hash (identity_cookie, strlen (identity_cookie), &cache_key);
1044 GNUNET_free(identity_cookie);
1045 //No login time for identity -> redirect to login
1047 == GNUNET_CONTAINER_multihashmap_contains (OIDC_identity_login_time,
1050 relog_time = GNUNET_CONTAINER_multihashmap_get (OIDC_identity_login_time,
1052 current_time = GNUNET_TIME_absolute_get ();
1053 // 30 min after old login -> redirect to login
1054 if ( current_time.abs_value_us <= relog_time->abs_value_us )
1057 != GNUNET_CRYPTO_ecdsa_public_key_from_string (
1058 handle->oidc->login_identity,
1059 strlen (handle->oidc->login_identity), &pubkey) )
1061 handle->emsg = GNUNET_strdup("invalid_cookie");
1062 handle->edesc = GNUNET_strdup(
1063 "The cookie of a login identity is not valid");
1064 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1067 // iterate over egos and compare their public key
1068 for (handle->ego_entry = handle->ego_head;
1069 NULL != handle->ego_entry; handle->ego_entry = handle->ego_entry->next)
1071 GNUNET_IDENTITY_ego_get_public_key (handle->ego_entry->ego, &ego_pkey);
1073 == memcmp (&ego_pkey, &pubkey,
1074 sizeof(struct GNUNET_CRYPTO_EcdsaPublicKey)) )
1076 handle->priv_key = *GNUNET_IDENTITY_ego_get_private_key (
1077 handle->ego_entry->ego);
1078 handle->resp_object = GNUNET_JSONAPI_document_new ();
1079 handle->idp = GNUNET_RECLAIM_connect (cfg);
1080 handle->attr_list = GNUNET_new(
1081 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimList);
1082 handle->attr_it = GNUNET_RECLAIM_get_attributes_start (
1083 handle->idp, &handle->priv_key, &oidc_iteration_error, handle,
1084 &oidc_attr_collect, handle, &oidc_collect_finished_cb, handle);
1088 //handle->emsg = GNUNET_strdup("invalid_cookie");
1089 //handle->edesc = GNUNET_strdup(
1090 // "The cookie of the login identity is not valid");
1091 //GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1092 GNUNET_SCHEDULER_add_now (&login_redirection,handle);
1099 * Iteration over all results finished, build final
1102 * @param cls the `struct RequestHandle`
1105 build_authz_response (void *cls)
1107 struct RequestHandle *handle = cls;
1108 struct GNUNET_HashCode cache_key;
1110 char *expected_scope;
1111 char delimiter[]=" ";
1112 int number_of_ignored_parameter, iterator;
1115 // REQUIRED value: redirect_uri
1116 GNUNET_CRYPTO_hash (OIDC_REDIRECT_URI_KEY, strlen (OIDC_REDIRECT_URI_KEY),
1118 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1121 handle->emsg=GNUNET_strdup("invalid_request");
1122 handle->edesc=GNUNET_strdup("missing parameter redirect_uri");
1123 GNUNET_SCHEDULER_add_now (&do_error, handle);
1126 handle->oidc->redirect_uri = GNUNET_strdup (GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1129 // REQUIRED value: response_type
1130 GNUNET_CRYPTO_hash (OIDC_RESPONSE_TYPE_KEY, strlen (OIDC_RESPONSE_TYPE_KEY),
1132 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1135 handle->emsg=GNUNET_strdup("invalid_request");
1136 handle->edesc=GNUNET_strdup("missing parameter response_type");
1137 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1140 handle->oidc->response_type = GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1142 handle->oidc->response_type = GNUNET_strdup (handle->oidc->response_type);
1144 // REQUIRED value: scope
1145 GNUNET_CRYPTO_hash (OIDC_SCOPE_KEY, strlen (OIDC_SCOPE_KEY), &cache_key);
1146 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1149 handle->emsg=GNUNET_strdup("invalid_request");
1150 handle->edesc=GNUNET_strdup("missing parameter scope");
1151 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1154 handle->oidc->scope = GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1156 handle->oidc->scope = GNUNET_strdup(handle->oidc->scope);
1158 //OPTIONAL value: nonce
1159 GNUNET_CRYPTO_hash (OIDC_NONCE_KEY, strlen (OIDC_NONCE_KEY), &cache_key);
1160 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1163 handle->oidc->nonce = GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1165 handle->oidc->nonce = GNUNET_strdup (handle->oidc->nonce);
1168 //TODO check other values if needed
1169 number_of_ignored_parameter = sizeof(OIDC_ignored_parameter_array) / sizeof(char *);
1170 for( iterator = 0; iterator < number_of_ignored_parameter; iterator++ )
1172 GNUNET_CRYPTO_hash (OIDC_ignored_parameter_array[iterator],
1173 strlen(OIDC_ignored_parameter_array[iterator]),
1175 if(GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains(handle->rest_handle->url_param_map,
1178 handle->emsg=GNUNET_strdup("access_denied");
1179 GNUNET_asprintf (&handle->edesc, "Server will not handle parameter: %s",
1180 OIDC_ignored_parameter_array[iterator]);
1181 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1186 // Checks if response_type is 'code'
1187 if( 0 != strcmp( handle->oidc->response_type, OIDC_EXPECTED_AUTHORIZATION_RESPONSE_TYPE ) )
1189 handle->emsg=GNUNET_strdup("unsupported_response_type");
1190 handle->edesc=GNUNET_strdup("The authorization server does not support "
1191 "obtaining this authorization code.");
1192 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1196 // Checks if scope contains 'openid'
1197 expected_scope = GNUNET_strdup(handle->oidc->scope);
1199 test = strtok (expected_scope, delimiter);
1200 while (NULL != test)
1202 if ( 0 == strcmp (OIDC_EXPECTED_AUTHORIZATION_SCOPE, expected_scope) )
1206 test = strtok (NULL, delimiter);
1210 handle->emsg = GNUNET_strdup("invalid_scope");
1211 handle->edesc=GNUNET_strdup("The requested scope is invalid, unknown, or "
1213 GNUNET_SCHEDULER_add_now (&do_redirect_error, handle);
1214 GNUNET_free(expected_scope);
1218 GNUNET_free(expected_scope);
1220 if( NULL != handle->oidc->login_identity )
1222 GNUNET_SCHEDULER_add_now(&login_check,handle);
1226 GNUNET_SCHEDULER_add_now(&login_redirection,handle);
1230 * Responds to authorization GET and url-encoded POST request
1232 * @param con_handle the connection handle
1233 * @param url the url
1234 * @param cls the RequestHandle
1237 authorize_endpoint (struct GNUNET_REST_RequestHandle *con_handle,
1241 struct RequestHandle *handle = cls;
1242 struct GNUNET_HashCode cache_key;
1243 struct EgoEntry *tmp_ego;
1244 const struct GNUNET_CRYPTO_EcdsaPrivateKey *priv_key;
1245 struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
1247 cookie_identity_interpretation(handle);
1249 //RECOMMENDED value: state - REQUIRED for answers
1250 GNUNET_CRYPTO_hash (OIDC_STATE_KEY, strlen (OIDC_STATE_KEY), &cache_key);
1251 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1254 handle->oidc->state = GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1256 handle->oidc->state = GNUNET_strdup (handle->oidc->state);
1259 // REQUIRED value: client_id
1260 GNUNET_CRYPTO_hash (OIDC_CLIENT_ID_KEY, strlen (OIDC_CLIENT_ID_KEY),
1262 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1265 handle->emsg=GNUNET_strdup("invalid_request");
1266 handle->edesc=GNUNET_strdup("missing parameter client_id");
1267 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1268 GNUNET_SCHEDULER_add_now (&do_error, handle);
1271 handle->oidc->client_id = GNUNET_strdup (GNUNET_CONTAINER_multihashmap_get(handle->rest_handle->url_param_map,
1275 != GNUNET_CRYPTO_ecdsa_public_key_from_string (handle->oidc->client_id,
1276 strlen (handle->oidc->client_id),
1277 &handle->oidc->client_pkey) )
1279 handle->emsg = GNUNET_strdup("unauthorized_client");
1280 handle->edesc = GNUNET_strdup("The client is not authorized to request an "
1281 "authorization code using this method.");
1282 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1283 GNUNET_SCHEDULER_add_now (&do_error, handle);
1288 if ( NULL == handle->ego_head )
1290 handle->emsg = GNUNET_strdup("server_error");
1291 handle->edesc = GNUNET_strdup ("Egos are missing");
1292 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1293 GNUNET_SCHEDULER_add_now (&do_error, handle);
1297 handle->ego_entry = handle->ego_head;
1298 handle->priv_key = *GNUNET_IDENTITY_ego_get_private_key (handle->ego_head->ego);
1299 //If we know this identity, translated the corresponding TLD
1300 //TODO: We might want to have a reverse lookup functionality for TLDs?
1301 for (tmp_ego = handle->ego_head; NULL != tmp_ego; tmp_ego = tmp_ego->next)
1303 priv_key = GNUNET_IDENTITY_ego_get_private_key (tmp_ego->ego);
1304 GNUNET_CRYPTO_ecdsa_key_get_public (priv_key,
1306 if ( 0 == memcmp (&pkey, &handle->oidc->client_pkey,
1307 sizeof(struct GNUNET_CRYPTO_EcdsaPublicKey)) )
1309 handle->tld = GNUNET_strdup (tmp_ego->identifier);
1310 handle->ego_entry = handle->ego_tail;
1313 GNUNET_SCHEDULER_add_now (&build_authz_response, handle);
1317 * Combines an identity with a login time and responds OK to login request
1319 * @param con_handle the connection handle
1320 * @param url the url
1321 * @param cls the RequestHandle
1324 login_cont (struct GNUNET_REST_RequestHandle *con_handle,
1328 struct MHD_Response *resp = GNUNET_REST_create_response ("");
1329 struct RequestHandle *handle = cls;
1330 struct GNUNET_HashCode cache_key;
1331 struct GNUNET_TIME_Absolute *current_time;
1332 struct GNUNET_TIME_Absolute *last_time;
1337 char term_data[handle->rest_handle->data_size+1];
1338 term_data[handle->rest_handle->data_size] = '\0';
1339 GNUNET_memcpy (term_data, handle->rest_handle->data, handle->rest_handle->data_size);
1340 root = json_loads (term_data, JSON_DECODE_ANY, &error);
1341 identity = json_object_get (root, "identity");
1342 if ( json_is_string(identity) )
1344 GNUNET_asprintf (&cookie, "Identity=%s", json_string_value (identity));
1345 MHD_add_response_header (resp, "Set-Cookie", cookie);
1346 MHD_add_response_header (resp, "Access-Control-Allow-Methods", "POST");
1347 GNUNET_CRYPTO_hash (cookie, strlen (cookie), &cache_key);
1349 current_time = GNUNET_new(struct GNUNET_TIME_Absolute);
1350 *current_time = GNUNET_TIME_relative_to_absolute (
1351 GNUNET_TIME_relative_multiply (GNUNET_TIME_relative_get_second_ (),
1353 last_time = GNUNET_CONTAINER_multihashmap_get(OIDC_identity_login_time, &cache_key);
1354 if (NULL != last_time)
1356 GNUNET_free(last_time);
1358 GNUNET_CONTAINER_multihashmap_put (
1359 OIDC_identity_login_time, &cache_key, current_time,
1360 GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE);
1362 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
1363 GNUNET_free(cookie);
1367 handle->proc (handle->proc_cls, resp, MHD_HTTP_BAD_REQUEST);
1370 GNUNET_SCHEDULER_add_now (&cleanup_handle_delayed, handle);
1375 check_authorization (struct RequestHandle *handle,
1376 struct GNUNET_CRYPTO_EcdsaPublicKey *cid)
1378 struct GNUNET_HashCode cache_key;
1379 char *authorization;
1381 char *basic_authorization;
1384 char *expected_pass;
1385 int client_exists = GNUNET_NO;
1387 GNUNET_CRYPTO_hash (OIDC_AUTHORIZATION_HEADER_KEY,
1388 strlen (OIDC_AUTHORIZATION_HEADER_KEY),
1390 if ( GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->header_param_map,
1393 handle->emsg=GNUNET_strdup("invalid_client");
1394 handle->edesc=GNUNET_strdup("missing authorization");
1395 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1396 return GNUNET_SYSERR;
1398 authorization = GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->header_param_map,
1401 //split header in "Basic" and [content]
1402 credentials = strtok (authorization, " ");
1403 if (0 != strcmp ("Basic", credentials))
1405 handle->emsg=GNUNET_strdup("invalid_client");
1406 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1407 return GNUNET_SYSERR;
1409 credentials = strtok(NULL, " ");
1410 if (NULL == credentials)
1412 handle->emsg=GNUNET_strdup("invalid_client");
1413 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1414 return GNUNET_SYSERR;
1416 GNUNET_STRINGS_base64_decode (credentials,
1417 strlen (credentials),
1418 (void**)&basic_authorization);
1420 if ( NULL == basic_authorization )
1422 handle->emsg=GNUNET_strdup("invalid_client");
1423 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1424 return GNUNET_SYSERR;
1426 client_id = strtok (basic_authorization, ":");
1427 if ( NULL == client_id )
1429 GNUNET_free_non_null(basic_authorization);
1430 handle->emsg=GNUNET_strdup("invalid_client");
1431 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1432 return GNUNET_SYSERR;
1434 pass = strtok (NULL, ":");
1437 GNUNET_free_non_null(basic_authorization);
1438 handle->emsg=GNUNET_strdup("invalid_client");
1439 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1440 return GNUNET_SYSERR;
1443 //check client password
1445 == GNUNET_CONFIGURATION_get_value_string (cfg, "reclaim-rest-plugin",
1446 "psw", &expected_pass) )
1448 if (0 != strcmp (expected_pass, pass))
1450 GNUNET_free_non_null(basic_authorization);
1451 GNUNET_free(expected_pass);
1452 handle->emsg=GNUNET_strdup("invalid_client");
1453 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1454 return GNUNET_SYSERR;
1456 GNUNET_free(expected_pass);
1460 GNUNET_free_non_null(basic_authorization);
1461 handle->emsg = GNUNET_strdup("server_error");
1462 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
1463 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1464 return GNUNET_SYSERR;
1468 for (handle->ego_entry = handle->ego_head; NULL != handle->ego_entry->next; )
1470 if ( 0 == strcmp(handle->ego_entry->keystring, client_id))
1472 client_exists = GNUNET_YES;
1475 handle->ego_entry = handle->ego_entry->next;
1477 if (GNUNET_NO == client_exists)
1479 GNUNET_free_non_null(basic_authorization);
1480 handle->emsg=GNUNET_strdup("invalid_client");
1481 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1482 return GNUNET_SYSERR;
1484 GNUNET_STRINGS_string_to_data (client_id,
1487 sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey));
1489 GNUNET_free (basic_authorization);
1494 ego_exists (struct RequestHandle *handle,
1495 struct GNUNET_CRYPTO_EcdsaPublicKey *test_key)
1497 struct EgoEntry *ego_entry;
1498 struct GNUNET_CRYPTO_EcdsaPublicKey pub_key;
1500 for (ego_entry = handle->ego_head; NULL != ego_entry; ego_entry = ego_entry->next)
1502 GNUNET_IDENTITY_ego_get_public_key (ego_entry->ego, &pub_key);
1503 if (0 == memcmp (&pub_key,
1505 sizeof(struct GNUNET_CRYPTO_EcdsaPublicKey)))
1510 if (NULL == ego_entry)
1516 store_ticket_reference (const struct RequestHandle *handle,
1517 const char* access_token,
1518 const struct GNUNET_RECLAIM_Ticket *ticket,
1519 const struct GNUNET_CRYPTO_EcdsaPublicKey *cid)
1521 struct GNUNET_HashCode cache_key;
1522 char *id_ticket_combination;
1523 char *ticket_string;
1526 GNUNET_CRYPTO_hash(access_token, strlen(access_token), &cache_key);
1527 client_id = GNUNET_STRINGS_data_to_string_alloc (cid,
1528 sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey));
1529 ticket_string = GNUNET_STRINGS_data_to_string_alloc (ticket,
1530 sizeof (struct GNUNET_RECLAIM_Ticket));
1531 GNUNET_asprintf(&id_ticket_combination,
1535 GNUNET_CONTAINER_multihashmap_put(OIDC_interpret_access_token,
1537 id_ticket_combination,
1538 GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE);
1540 GNUNET_free (client_id);
1541 GNUNET_free (ticket_string);
1545 * Responds to token url-encoded POST request
1547 * @param con_handle the connection handle
1548 * @param url the url
1549 * @param cls the RequestHandle
1552 token_endpoint (struct GNUNET_REST_RequestHandle *con_handle,
1556 struct RequestHandle *handle = cls;
1557 struct GNUNET_TIME_Relative expiration_time;
1558 struct GNUNET_RECLAIM_ATTRIBUTE_ClaimList *cl;
1559 struct GNUNET_RECLAIM_Ticket *ticket;
1560 struct GNUNET_CRYPTO_EcdsaPublicKey cid;
1561 struct GNUNET_HashCode cache_key;
1562 struct MHD_Response *resp;
1565 char *json_response;
1573 * Check Authorization
1575 if (GNUNET_SYSERR == check_authorization (handle,
1578 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1579 "OIDC authorization for token endpoint failed\n");
1580 GNUNET_SCHEDULER_add_now (&do_error, handle);
1588 //TODO Do not allow multiple equal parameter names
1589 //REQUIRED grant_type
1590 GNUNET_CRYPTO_hash (OIDC_GRANT_TYPE_KEY, strlen (OIDC_GRANT_TYPE_KEY), &cache_key);
1592 GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1595 handle->emsg = GNUNET_strdup("invalid_request");
1596 handle->edesc = GNUNET_strdup("missing parameter grant_type");
1597 handle->response_code = MHD_HTTP_BAD_REQUEST;
1598 GNUNET_SCHEDULER_add_now (&do_error, handle);
1601 grant_type = GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->url_param_map,
1605 GNUNET_CRYPTO_hash (OIDC_CODE_KEY, strlen (OIDC_CODE_KEY), &cache_key);
1607 GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1610 handle->emsg = GNUNET_strdup("invalid_request");
1611 handle->edesc = GNUNET_strdup("missing parameter code");
1612 handle->response_code = MHD_HTTP_BAD_REQUEST;
1613 GNUNET_SCHEDULER_add_now (&do_error, handle);
1616 code = GNUNET_CONTAINER_multihashmap_get (handle->rest_handle->url_param_map,
1619 //REQUIRED redirect_uri
1620 GNUNET_CRYPTO_hash (OIDC_REDIRECT_URI_KEY, strlen (OIDC_REDIRECT_URI_KEY),
1623 GNUNET_CONTAINER_multihashmap_contains (handle->rest_handle->url_param_map,
1626 handle->emsg = GNUNET_strdup("invalid_request");
1627 handle->edesc = GNUNET_strdup("missing parameter redirect_uri");
1628 handle->response_code = MHD_HTTP_BAD_REQUEST;
1629 GNUNET_SCHEDULER_add_now (&do_error, handle);
1633 //Check parameter grant_type == "authorization_code"
1634 if (0 != strcmp(OIDC_GRANT_TYPE_VALUE, grant_type))
1636 handle->emsg=GNUNET_strdup("unsupported_grant_type");
1637 handle->response_code = MHD_HTTP_BAD_REQUEST;
1638 GNUNET_SCHEDULER_add_now (&do_error, handle);
1641 GNUNET_CRYPTO_hash (code, strlen (code), &cache_key);
1642 if (GNUNET_SYSERR ==
1643 GNUNET_CONTAINER_multihashmap_put (OIDC_ticket_once,
1646 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY) )
1648 handle->emsg = GNUNET_strdup("invalid_request");
1649 handle->edesc = GNUNET_strdup("Cannot use the same code more than once");
1650 handle->response_code = MHD_HTTP_BAD_REQUEST;
1651 GNUNET_SCHEDULER_add_now (&do_error, handle);
1656 if(GNUNET_OK != OIDC_parse_authz_code (&cid,
1661 handle->emsg = GNUNET_strdup("invalid_request");
1662 handle->edesc = GNUNET_strdup("invalid code");
1663 handle->response_code = MHD_HTTP_BAD_REQUEST;
1664 GNUNET_SCHEDULER_add_now (&do_error, handle);
1670 GNUNET_CONFIGURATION_get_value_time(cfg,
1671 "reclaim-rest-plugin",
1675 handle->emsg = GNUNET_strdup("server_error");
1676 handle->edesc = GNUNET_strdup ("gnunet configuration failed");
1677 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1678 GNUNET_SCHEDULER_add_now (&do_error, handle);
1679 GNUNET_free(ticket);
1684 //TODO OPTIONAL acr,amr,azp
1685 if (GNUNET_NO == ego_exists (handle,
1688 handle->emsg = GNUNET_strdup("invalid_request");
1689 handle->edesc = GNUNET_strdup("invalid code...");
1690 handle->response_code = MHD_HTTP_BAD_REQUEST;
1691 GNUNET_SCHEDULER_add_now (&do_error, handle);
1692 GNUNET_free(ticket);
1695 != GNUNET_CONFIGURATION_get_value_string (cfg, "reclaim-rest-plugin",
1696 "jwt_secret", &jwt_secret) )
1698 handle->emsg = GNUNET_strdup("invalid_request");
1699 handle->edesc = GNUNET_strdup("No signing secret configured!");
1700 handle->response_code = MHD_HTTP_INTERNAL_SERVER_ERROR;
1701 GNUNET_SCHEDULER_add_now (&do_error, handle);
1702 GNUNET_free(ticket);
1705 //TODO We should collect the attributes here. cl always empty
1706 cl = GNUNET_new (struct GNUNET_RECLAIM_ATTRIBUTE_ClaimList);
1707 id_token = OIDC_id_token_new (&ticket->audience,
1711 (NULL != nonce) ? nonce : NULL,
1713 access_token = OIDC_access_token_new ();
1714 OIDC_build_token_response (access_token,
1719 store_ticket_reference (handle,
1723 resp = GNUNET_REST_create_response (json_response);
1724 MHD_add_response_header (resp, "Cache-Control", "no-store");
1725 MHD_add_response_header (resp, "Pragma", "no-cache");
1726 MHD_add_response_header (resp, "Content-Type", "application/json");
1727 handle->proc (handle->proc_cls, resp, MHD_HTTP_OK);
1728 GNUNET_RECLAIM_ATTRIBUTE_list_destroy(cl);
1729 GNUNET_free(access_token);
1730 GNUNET_free(json_response);
1731 GNUNET_free(ticket);
1732 GNUNET_free(id_token);
1733 GNUNET_SCHEDULER_add_now(&cleanup_handle_delayed, handle);
1737 * Collects claims and stores them in handle
1740 consume_ticket (void *cls,
1741 const struct GNUNET_CRYPTO_EcdsaPublicKey *identity,
1742 const struct GNUNET_RECLAIM_ATTRIBUTE_Claim *attr)
1744 struct RequestHandle *handle = cls;
1748 if (NULL == identity)
1750 GNUNET_SCHEDULER_add_now (&return_userinfo_response, handle);
1754 tmp_value = GNUNET_RECLAIM_ATTRIBUTE_value_to_string (attr->type,
1758 value = json_string (tmp_value);
1761 json_object_set_new (handle->oidc->response,
1764 GNUNET_free (tmp_value);
1768 * Responds to userinfo GET and url-encoded POST request
1770 * @param con_handle the connection handle
1771 * @param url the url
1772 * @param cls the RequestHandle
1775 userinfo_endpoint (struct GNUNET_REST_RequestHandle *con_handle,
1776 const char* url, void *cls)
1778 //TODO expiration time
1779 struct RequestHandle *handle = cls;
1780 char delimiter[] = " ";
1781 char delimiter_db[] = ";";
1782 struct GNUNET_HashCode cache_key;
1783 char *authorization, *authorization_type, *authorization_access_token;
1784 char *client_ticket, *client, *ticket_str;
1785 struct GNUNET_RECLAIM_Ticket *ticket;
1787 GNUNET_CRYPTO_hash (OIDC_AUTHORIZATION_HEADER_KEY,
1788 strlen (OIDC_AUTHORIZATION_HEADER_KEY),
1791 == GNUNET_CONTAINER_multihashmap_contains (
1792 handle->rest_handle->header_param_map, &cache_key) )
1794 handle->emsg = GNUNET_strdup("invalid_token");
1795 handle->edesc = GNUNET_strdup("No Access Token");
1796 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1797 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1800 authorization = GNUNET_CONTAINER_multihashmap_get (
1801 handle->rest_handle->header_param_map, &cache_key);
1803 //split header in "Bearer" and access_token
1804 authorization = GNUNET_strdup(authorization);
1805 authorization_type = strtok (authorization, delimiter);
1806 if ( 0 != strcmp ("Bearer", authorization_type) )
1808 handle->emsg = GNUNET_strdup("invalid_token");
1809 handle->edesc = GNUNET_strdup("No Access Token");
1810 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1811 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1812 GNUNET_free(authorization);
1815 authorization_access_token = strtok (NULL, delimiter);
1816 if ( NULL == authorization_access_token )
1818 handle->emsg = GNUNET_strdup("invalid_token");
1819 handle->edesc = GNUNET_strdup("No Access Token");
1820 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1821 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1822 GNUNET_free(authorization);
1826 GNUNET_CRYPTO_hash (authorization_access_token,
1827 strlen (authorization_access_token),
1829 if ( GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (OIDC_interpret_access_token,
1832 handle->emsg = GNUNET_strdup("invalid_token");
1833 handle->edesc = GNUNET_strdup("The Access Token expired");
1834 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1835 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1836 GNUNET_free(authorization);
1840 client_ticket = GNUNET_CONTAINER_multihashmap_get(OIDC_interpret_access_token,
1842 client_ticket = GNUNET_strdup(client_ticket);
1843 client = strtok(client_ticket,delimiter_db);
1846 handle->emsg = GNUNET_strdup("invalid_token");
1847 handle->edesc = GNUNET_strdup("The Access Token expired");
1848 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1849 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1850 GNUNET_free(authorization);
1851 GNUNET_free(client_ticket);
1854 handle->ego_entry = handle->ego_head;
1855 for(; NULL != handle->ego_entry; handle->ego_entry = handle->ego_entry->next)
1857 if (0 == strcmp(handle->ego_entry->keystring,client))
1862 if (NULL == handle->ego_entry)
1864 handle->emsg = GNUNET_strdup("invalid_token");
1865 handle->edesc = GNUNET_strdup("The Access Token expired");
1866 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1867 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1868 GNUNET_free(authorization);
1869 GNUNET_free(client_ticket);
1872 ticket_str = strtok(NULL, delimiter_db);
1873 if (NULL == ticket_str)
1875 handle->emsg = GNUNET_strdup("invalid_token");
1876 handle->edesc = GNUNET_strdup("The Access Token expired");
1877 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1878 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1879 GNUNET_free(authorization);
1880 GNUNET_free(client_ticket);
1883 ticket = GNUNET_new(struct GNUNET_RECLAIM_Ticket);
1885 != GNUNET_STRINGS_string_to_data (ticket_str,
1886 strlen (ticket_str),
1888 sizeof(struct GNUNET_RECLAIM_Ticket)))
1890 handle->emsg = GNUNET_strdup("invalid_token");
1891 handle->edesc = GNUNET_strdup("The Access Token expired");
1892 handle->response_code = MHD_HTTP_UNAUTHORIZED;
1893 GNUNET_SCHEDULER_add_now (&do_userinfo_error, handle);
1894 GNUNET_free(ticket);
1895 GNUNET_free(authorization);
1896 GNUNET_free(client_ticket);
1900 handle->idp = GNUNET_RECLAIM_connect (cfg);
1901 handle->oidc->response = json_object();
1902 json_object_set_new( handle->oidc->response, "sub", json_string( handle->ego_entry->keystring));
1903 handle->idp_op = GNUNET_RECLAIM_ticket_consume (
1905 GNUNET_IDENTITY_ego_get_private_key (handle->ego_entry->ego),
1909 GNUNET_free(ticket);
1910 GNUNET_free(authorization);
1911 GNUNET_free(client_ticket);
1917 * Handle rest request
1919 * @param handle the request handle
1922 init_cont (struct RequestHandle *handle)
1924 struct GNUNET_REST_RequestHandlerError err;
1925 static const struct GNUNET_REST_RequestHandler handlers[] = {
1926 {MHD_HTTP_METHOD_GET, GNUNET_REST_API_NS_AUTHORIZE, &authorize_endpoint},
1927 {MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_AUTHORIZE, &authorize_endpoint}, //url-encoded
1928 {MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_LOGIN, &login_cont},
1929 {MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_TOKEN, &token_endpoint },
1930 {MHD_HTTP_METHOD_GET, GNUNET_REST_API_NS_USERINFO, &userinfo_endpoint },
1931 {MHD_HTTP_METHOD_POST, GNUNET_REST_API_NS_USERINFO, &userinfo_endpoint },
1932 {MHD_HTTP_METHOD_OPTIONS, GNUNET_REST_API_NS_OIDC,
1934 GNUNET_REST_HANDLER_END
1937 if (GNUNET_NO == GNUNET_REST_handle_request (handle->rest_handle,
1942 handle->response_code = err.error_code;
1943 GNUNET_SCHEDULER_add_now (&do_error, handle);
1948 * If listing is enabled, prints information about the egos.
1950 * This function is initially called for all egos and then again
1951 * whenever a ego's identifier changes or if it is deleted. At the
1952 * end of the initial pass over all egos, the function is once called
1953 * with 'NULL' for 'ego'. That does NOT mean that the callback won't
1954 * be invoked in the future or that there was an error.
1956 * When used with 'GNUNET_IDENTITY_create' or 'GNUNET_IDENTITY_get',
1957 * this function is only called ONCE, and 'NULL' being passed in
1958 * 'ego' does indicate an error (i.e. name is taken or no default
1959 * value is known). If 'ego' is non-NULL and if '*ctx'
1960 * is set in those callbacks, the value WILL be passed to a subsequent
1961 * call to the identity callback of 'GNUNET_IDENTITY_connect' (if
1962 * that one was not NULL).
1964 * When an identity is renamed, this function is called with the
1965 * (known) ego but the NEW identifier.
1967 * When an identity is deleted, this function is called with the
1968 * (known) ego and "NULL" for the 'identifier'. In this case,
1969 * the 'ego' is henceforth invalid (and the 'ctx' should also be
1972 * @param cls closure
1973 * @param ego ego handle
1974 * @param ctx context for application to store data for this ego
1975 * (during the lifetime of this process, initially NULL)
1976 * @param identifier identifier assigned by the user for this ego,
1977 * NULL if the user just deleted the ego and it
1978 * must thus no longer be used
1981 list_ego (void *cls,
1982 struct GNUNET_IDENTITY_Ego *ego,
1984 const char *identifier)
1986 struct RequestHandle *handle = cls;
1987 struct EgoEntry *ego_entry;
1988 struct GNUNET_CRYPTO_EcdsaPublicKey pk;
1990 if ((NULL == ego) && (ID_REST_STATE_INIT == handle->state))
1992 handle->state = ID_REST_STATE_POST_INIT;
1996 if (ID_REST_STATE_INIT == handle->state) {
1997 ego_entry = GNUNET_new (struct EgoEntry);
1998 GNUNET_IDENTITY_ego_get_public_key (ego, &pk);
1999 ego_entry->keystring =
2000 GNUNET_CRYPTO_ecdsa_public_key_to_string (&pk);
2001 ego_entry->ego = ego;
2002 ego_entry->identifier = GNUNET_strdup (identifier);
2003 GNUNET_CONTAINER_DLL_insert_tail(handle->ego_head,handle->ego_tail, ego_entry);
2006 /* Ego renamed or added */
2007 if (identifier != NULL) {
2008 for (ego_entry = handle->ego_head; NULL != ego_entry; ego_entry = ego_entry->next) {
2009 if (ego_entry->ego == ego) {
2011 GNUNET_free (ego_entry->identifier);
2012 ego_entry->identifier = GNUNET_strdup (identifier);
2016 if (NULL == ego_entry) {
2018 ego_entry = GNUNET_new (struct EgoEntry);
2019 GNUNET_IDENTITY_ego_get_public_key (ego, &pk);
2020 ego_entry->keystring =
2021 GNUNET_CRYPTO_ecdsa_public_key_to_string (&pk);
2022 ego_entry->ego = ego;
2023 ego_entry->identifier = GNUNET_strdup (identifier);
2024 GNUNET_CONTAINER_DLL_insert_tail(handle->ego_head,handle->ego_tail, ego_entry);
2028 for (ego_entry = handle->ego_head; NULL != ego_entry; ego_entry = ego_entry->next) {
2029 if (ego_entry->ego == ego)
2032 if (NULL != ego_entry)
2033 GNUNET_CONTAINER_DLL_remove(handle->ego_head,handle->ego_tail, ego_entry);
2039 rest_identity_process_request(struct GNUNET_REST_RequestHandle *rest_handle,
2040 GNUNET_REST_ResultProcessor proc,
2043 struct RequestHandle *handle = GNUNET_new (struct RequestHandle);
2044 handle->oidc = GNUNET_new (struct OIDC_Variables);
2045 if ( NULL == OIDC_identity_login_time )
2046 OIDC_identity_login_time = GNUNET_CONTAINER_multihashmap_create (10, GNUNET_NO);
2047 if ( NULL == OIDC_identity_grants )
2048 OIDC_identity_grants = GNUNET_CONTAINER_multihashmap_create (10, GNUNET_NO);
2049 if ( NULL == OIDC_ticket_once )
2050 OIDC_ticket_once = GNUNET_CONTAINER_multihashmap_create (10, GNUNET_NO);
2051 if ( NULL == OIDC_interpret_access_token )
2052 OIDC_interpret_access_token = GNUNET_CONTAINER_multihashmap_create (10, GNUNET_NO);
2053 handle->response_code = 0;
2054 handle->timeout = GNUNET_TIME_UNIT_FOREVER_REL;
2055 handle->proc_cls = proc_cls;
2056 handle->proc = proc;
2057 handle->state = ID_REST_STATE_INIT;
2058 handle->rest_handle = rest_handle;
2060 handle->url = GNUNET_strdup (rest_handle->url);
2061 if (handle->url[strlen (handle->url)-1] == '/')
2062 handle->url[strlen (handle->url)-1] = '\0';
2063 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2065 handle->identity_handle = GNUNET_IDENTITY_connect (cfg,
2068 handle->gns_handle = GNUNET_GNS_connect (cfg);
2069 handle->namestore_handle = GNUNET_NAMESTORE_connect (cfg);
2070 handle->timeout_task =
2071 GNUNET_SCHEDULER_add_delayed (handle->timeout,
2074 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2079 * Entry point for the plugin.
2081 * @param cls Config info
2082 * @return NULL on error, otherwise the plugin context
2085 libgnunet_plugin_rest_openid_connect_init (void *cls)
2087 static struct Plugin plugin;
2088 struct GNUNET_REST_Plugin *api;
2091 if (NULL != plugin.cfg)
2092 return NULL; /* can only initialize once! */
2093 memset (&plugin, 0, sizeof (struct Plugin));
2095 api = GNUNET_new (struct GNUNET_REST_Plugin);
2097 api->name = GNUNET_REST_API_NS_OIDC;
2098 api->process_request = &rest_identity_process_request;
2099 GNUNET_asprintf (&allow_methods,
2100 "%s, %s, %s, %s, %s",
2101 MHD_HTTP_METHOD_GET,
2102 MHD_HTTP_METHOD_POST,
2103 MHD_HTTP_METHOD_PUT,
2104 MHD_HTTP_METHOD_DELETE,
2105 MHD_HTTP_METHOD_OPTIONS);
2107 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2108 _("Identity Provider REST API initialized\n"));
2114 * Exit point from the plugin.
2116 * @param cls the plugin context (as returned by "init")
2117 * @return always NULL
2120 libgnunet_plugin_rest_openid_connect_done (void *cls)
2122 struct GNUNET_REST_Plugin *api = cls;
2123 struct Plugin *plugin = api->cls;
2126 struct GNUNET_CONTAINER_MultiHashMapIterator *hashmap_it;
2128 hashmap_it = GNUNET_CONTAINER_multihashmap_iterator_create (
2129 OIDC_identity_login_time);
2130 while (GNUNET_YES ==
2131 GNUNET_CONTAINER_multihashmap_iterator_next (hashmap_it, NULL, value))
2136 GNUNET_CONTAINER_multihashmap_destroy(OIDC_identity_login_time);
2137 hashmap_it = GNUNET_CONTAINER_multihashmap_iterator_create (OIDC_identity_grants);
2138 while (GNUNET_YES ==
2139 GNUNET_CONTAINER_multihashmap_iterator_next (hashmap_it, NULL, value))
2144 GNUNET_CONTAINER_multihashmap_destroy(OIDC_identity_grants);
2145 hashmap_it = GNUNET_CONTAINER_multihashmap_iterator_create (OIDC_ticket_once);
2146 while (GNUNET_YES ==
2147 GNUNET_CONTAINER_multihashmap_iterator_next (hashmap_it, NULL, value))
2152 GNUNET_CONTAINER_multihashmap_destroy(OIDC_ticket_once);
2153 hashmap_it = GNUNET_CONTAINER_multihashmap_iterator_create (OIDC_interpret_access_token);
2154 while (GNUNET_YES ==
2155 GNUNET_CONTAINER_multihashmap_iterator_next (hashmap_it, NULL, value))
2160 GNUNET_CONTAINER_multihashmap_destroy(OIDC_interpret_access_token);
2161 GNUNET_CONTAINER_multihashmap_iterator_destroy(hashmap_it);
2162 GNUNET_free_non_null (allow_methods);
2164 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2165 "Identity Provider REST plugin is finished\n");
2169 /* end of plugin_rest_identity_provider.c */