identity/oidc: Adds default provider, key, and allow_all assignment (#14119)

This commit is contained in:
Austin Gebauer 2022-02-22 08:33:19 -08:00 committed by GitHub
parent a156036934
commit 462a924722
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 416 additions and 55 deletions

9
changelog/14119.txt Normal file
View File

@ -0,0 +1,9 @@
```release-note:improvement
identity/oidc: Adds a default OIDC provider
```
```release-note:improvement
identity/oidc: Adds a default key for OIDC clients
```
```release-note:improvement
identity/oidc: Adds an `allow_all` assignment that permits all entities to authenticate via an OIDC client
```

View File

@ -39,6 +39,228 @@ const (
`
)
// TestOIDC_Auth_Code_Flow_Default_Resources tests the authorization
// code flow using the default OIDC provider, default key, and allow_all
// assignment. This ensures that the resources are created and usable with
// an initial setup of Vault.
func TestOIDC_Auth_Code_Flow_Default_Resources(t *testing.T) {
cluster := setupOIDCTestCluster(t, 2)
defer cluster.Cleanup()
active := cluster.Cores[0].Client
standby := cluster.Cores[1].Client
// Enable userpass auth and create a user
err := active.Sys().EnableAuthWithOptions("userpass", &api.EnableAuthOptions{
Type: "userpass",
})
require.NoError(t, err)
_, err = active.Logical().Write("auth/userpass/users/end-user", map[string]interface{}{
"password": testPassword,
})
require.NoError(t, err)
// Create a confidential client
_, err = active.Logical().Write("identity/oidc/client/confidential", map[string]interface{}{
"redirect_uris": []string{testRedirectURI},
"assignments": []string{"allow_all"},
"id_token_ttl": "1h",
"access_token_ttl": "30m",
})
require.NoError(t, err)
// Read the client ID and secret in order to configure the OIDC client
resp, err := active.Logical().Read("identity/oidc/client/confidential")
require.NoError(t, err)
clientID := resp.Data["client_id"].(string)
clientSecret := resp.Data["client_secret"].(string)
// We aren't going to open up a browser to facilitate the login and redirect
// from this test, so we'll log in via userpass and set the client's token as
// the token that results from the authentication.
resp, err = active.Logical().Write("auth/userpass/login/end-user", map[string]interface{}{
"password": testPassword,
})
require.NoError(t, err)
clientToken := resp.Auth.ClientToken
entityID := resp.Auth.EntityID
// Look up the token to get its creation time. This will be used for test
// cases that make assertions on the max_age parameter and auth_time claim.
resp, err = active.Logical().Write("auth/token/lookup", map[string]interface{}{
"token": clientToken,
})
require.NoError(t, err)
expectedAuthTime, err := strconv.Atoi(string(resp.Data["creation_time"].(json.Number)))
require.NoError(t, err)
// Read the issuer from the OIDC provider's discovery document
var discovery struct {
Issuer string `json:"issuer"`
}
decodeRawRequest(t, active, http.MethodGet,
"/v1/identity/oidc/provider/default/.well-known/openid-configuration",
nil, &discovery)
// Create the client-side OIDC provider config
pc, err := oidc.NewConfig(discovery.Issuer, clientID,
oidc.ClientSecret(clientSecret), []oidc.Alg{oidc.RS256},
[]string{testRedirectURI}, oidc.WithProviderCA(string(cluster.CACertPEM)))
require.NoError(t, err)
// Create the client-side OIDC provider
p, err := oidc.NewProvider(pc)
require.NoError(t, err)
defer p.Done()
// Create the client-side PKCE code verifier
v, err := oidc.NewCodeVerifier()
require.NoError(t, err)
type args struct {
useStandby bool
options []oidc.Option
}
tests := []struct {
name string
args args
expected string
}{
{
name: "active: authorization code flow",
args: args{
options: []oidc.Option{
oidc.WithScopes("openid"),
},
},
expected: fmt.Sprintf(`{
"iss": "%s",
"aud": "%s",
"sub": "%s",
"namespace": "root"
}`, discovery.Issuer, clientID, entityID),
},
{
name: "active: authorization code flow with max_age parameter",
args: args{
options: []oidc.Option{
oidc.WithScopes("openid"),
oidc.WithMaxAge(60),
},
},
expected: fmt.Sprintf(`{
"iss": "%s",
"aud": "%s",
"sub": "%s",
"namespace": "root",
"auth_time": %d
}`, discovery.Issuer, clientID, entityID, expectedAuthTime),
},
{
name: "active: authorization code flow with Proof Key for Code Exchange (PKCE)",
args: args{
options: []oidc.Option{
oidc.WithScopes("openid"),
oidc.WithPKCE(v),
},
},
expected: fmt.Sprintf(`{
"iss": "%s",
"aud": "%s",
"sub": "%s",
"namespace": "root"
}`, discovery.Issuer, clientID, entityID),
},
{
name: "standby: authorization code flow",
args: args{
useStandby: true,
options: []oidc.Option{
oidc.WithScopes("openid"),
},
},
expected: fmt.Sprintf(`{
"iss": "%s",
"aud": "%s",
"sub": "%s",
"namespace": "root"
}`, discovery.Issuer, clientID, entityID),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
client := active
if tt.args.useStandby {
client = standby
}
client.SetToken(clientToken)
// Create the client-side OIDC request state
oidcRequest, err := oidc.NewRequest(10*time.Minute, testRedirectURI, tt.args.options...)
require.NoError(t, err)
// Get the URL for the authorization endpoint from the OIDC client
authURL, err := p.AuthURL(context.Background(), oidcRequest)
require.NoError(t, err)
parsedAuthURL, err := url.Parse(authURL)
require.NoError(t, err)
// This replace only occurs because we're not using the browser in this test
authURLPath := strings.Replace(parsedAuthURL.Path, "/ui/vault/", "/v1/", 1)
// Kick off the authorization code flow
var authResp struct {
Code string `json:"code"`
State string `json:"state"`
}
decodeRawRequest(t, client, http.MethodGet, authURLPath, parsedAuthURL.Query(), &authResp)
// The returned state must match the OIDC client state
require.Equal(t, oidcRequest.State(), authResp.State)
// Exchange the authorization code for an ID token and access token.
// The ID token signature is verified using the provider's public keys after
// the exchange takes place. The ID token is also validated according to the
// client-side requirements of the OIDC spec. See the validation code at:
// - https://github.com/hashicorp/cap/blob/main/oidc/provider.go#L240
// - https://github.com/hashicorp/cap/blob/main/oidc/provider.go#L441
token, err := p.Exchange(context.Background(), oidcRequest, authResp.State, authResp.Code)
require.NoError(t, err)
require.NotNil(t, token)
idToken := token.IDToken()
accessToken := token.StaticTokenSource()
// Get the ID token claims
allClaims := make(map[string]interface{})
require.NoError(t, idToken.Claims(&allClaims))
// Get the sub claim for userinfo validation
require.NotEmpty(t, allClaims["sub"])
subject := allClaims["sub"].(string)
// Request userinfo using the access token
err = p.UserInfo(context.Background(), accessToken, subject, &allClaims)
require.NoError(t, err)
// Assert that claims computed during the flow (i.e., not known
// ahead of time in this test) are present as top-level keys
for _, claim := range []string{"iat", "exp", "nonce", "at_hash", "c_hash"} {
_, ok := allClaims[claim]
require.True(t, ok)
}
// Assert that all other expected claims are populated
expectedClaims := make(map[string]interface{})
require.NoError(t, json.Unmarshal([]byte(tt.expected), &expectedClaims))
for k, expectedVal := range expectedClaims {
actualVal, ok := allClaims[k]
require.True(t, ok)
require.EqualValues(t, expectedVal, actualVal)
}
})
}
}
// TestOIDC_Auth_Code_Flow_Confidential_CAP_Client tests the authorization code
// flow using a Vault OIDC provider. The test uses the CAP OIDC client to verify
// that the Vault OIDC provider's responses pass the various client-side validation

View File

@ -492,6 +492,10 @@ func (i *IdentityStore) initialize(ctx context.Context, req *logical.Initializat
return nil
}
if err := i.storeOIDCDefaultResources(ctx, req.Storage); err != nil {
return err
}
entry, err := logical.StorageEntryJSON(caseSensitivityKey, &casesensitivity{
DisableLowerCasedNames: i.disableLowerCasedNames,
})

View File

@ -683,6 +683,11 @@ func (i *IdentityStore) pathOIDCDeleteKey(ctx context.Context, req *logical.Requ
targetKeyName := d.Get("name").(string)
if targetKeyName == defaultKeyName {
return logical.ErrorResponse("deletion of key %q not allowed",
defaultKeyName), nil
}
i.oidcLock.Lock()
roleNames, err := i.roleNamesReferencingTargetKeyName(ctx, req, targetKeyName)

View File

@ -35,6 +35,9 @@ const (
clientSecretPrefix = "hvo_secret_"
codeChallengeMethodPlain = "plain"
codeChallengeMethodS256 = "S256"
defaultProviderName = "default"
defaultKeyName = "default"
allowAllAssignmentName = "allow_all"
// Storage path constants
oidcProviderPrefix = "oidc_provider/"
@ -266,8 +269,8 @@ func oidcProviderPaths(i *IdentityStore) []*framework.Path {
},
"key": {
Type: framework.TypeString,
Description: "A reference to a named key resource. Cannot be modified after creation.",
Required: true,
Description: "A reference to a named key resource. Cannot be modified after creation. Defaults to the 'default' key.",
Default: "default",
},
"id_token_ttl": {
Type: framework.TypeDurationSecond,
@ -654,6 +657,11 @@ func (i *IdentityStore) providersReferencingTargetScopeName(ctx context.Context,
func (i *IdentityStore) pathOIDCCreateUpdateAssignment(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
name := d.Get("name").(string)
if name == allowAllAssignmentName {
return logical.ErrorResponse("modification of assignment %q not allowed",
allowAllAssignmentName), nil
}
i.oidcLock.Lock()
defer i.oidcLock.Unlock()
@ -749,6 +757,11 @@ func (i *IdentityStore) getOIDCAssignment(ctx context.Context, s logical.Storage
func (i *IdentityStore) pathOIDCDeleteAssignment(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
name := d.Get("name").(string)
if name == allowAllAssignmentName {
return logical.ErrorResponse("deletion of assignment %q not allowed",
allowAllAssignmentName), nil
}
i.oidcLock.Lock()
defer i.oidcLock.Unlock()
@ -1005,10 +1018,6 @@ func (i *IdentityStore) pathOIDCCreateUpdateClient(ctx context.Context, req *log
client.Key = d.Get("key").(string)
}
if client.Key == "" {
return logical.ErrorResponse("the key parameter is required"), nil
}
// enforce key existence on client creation
key, err := i.getNamedKey(ctx, req.Storage, client.Key)
if err != nil {
@ -1348,6 +1357,12 @@ func (i *IdentityStore) getOIDCProvider(ctx context.Context, s logical.Storage,
// pathOIDCDeleteProvider is used to delete a provider
func (i *IdentityStore) pathOIDCDeleteProvider(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
name := d.Get("name").(string)
if name == defaultProviderName {
return logical.ErrorResponse("deletion of OIDC provider %q not allowed",
defaultProviderName), nil
}
return nil, req.Storage.Delete(ctx, providerPath+name)
}
@ -1388,7 +1403,11 @@ func (i *IdentityStore) pathOIDCProviderDiscovery(ctx context.Context, req *logi
ResponseTypes: []string{"code"},
Subjects: []string{"public"},
GrantTypes: []string{"authorization_code"},
AuthMethods: []string{"client_secret_basic"},
AuthMethods: []string{
// PKCE is required for auth method "none"
"none",
"client_secret_basic",
},
}
data, err := json.Marshal(disc)
@ -2294,6 +2313,10 @@ func (i *IdentityStore) entityHasAssignment(ctx context.Context, s logical.Stora
return false, nil
}
if strutil.StrListContains(assignments, allowAllAssignmentName) {
return true, nil
}
// Get the group IDs that the entity is a member of
groups, inheritedGroups, err := i.groupsByEntityID(entity.GetID())
if err != nil {
@ -2329,6 +2352,131 @@ func (i *IdentityStore) entityHasAssignment(ctx context.Context, s logical.Stora
return false, nil
}
func defaultOIDCProvider() provider {
return provider{
AllowedClientIDs: []string{"*"},
ScopesSupported: []string{},
}
}
func defaultOIDCKey() namedKey {
return namedKey{
Algorithm: "RS256",
VerificationTTL: 24 * time.Hour,
RotationPeriod: 24 * time.Hour,
NextRotation: time.Now().Add(24 * time.Hour),
AllowedClientIDs: []string{"*"},
}
}
func allowAllAssignment() assignment {
return assignment{
EntityIDs: []string{"*"},
GroupIDs: []string{"*"},
}
}
func (i *IdentityStore) storeOIDCDefaultResources(ctx context.Context, view logical.Storage) error {
// Store the default provider
storageKey := providerPath + defaultProviderName
entry, err := view.Get(ctx, storageKey)
if err != nil {
return err
}
if entry == nil {
entry, err := logical.StorageEntryJSON(storageKey, defaultOIDCProvider())
if err != nil {
return err
}
if err := view.Put(ctx, entry); err != nil {
return err
}
i.Logger().Debug("wrote OIDC default provider")
}
// Store the default key
storageKey = namedKeyConfigPath + defaultKeyName
entry, err = view.Get(ctx, storageKey)
if err != nil {
return err
}
if entry == nil {
defaultKey := defaultOIDCKey()
// Generate initial key material for current and next keys
err = defaultKey.generateAndSetKey(ctx, i.Logger(), view)
if err != nil {
return err
}
err = defaultKey.generateAndSetNextKey(ctx, i.Logger(), view)
if err != nil {
return err
}
// Store the entry
entry, err := logical.StorageEntryJSON(storageKey, defaultKey)
if err != nil {
return err
}
if err := view.Put(ctx, entry); err != nil {
return err
}
i.Logger().Debug("wrote OIDC default key")
}
// Store the allow all assignment
storageKey = assignmentPath + allowAllAssignmentName
entry, err = view.Get(ctx, storageKey)
if err != nil {
return err
}
if entry == nil {
entry, err := logical.StorageEntryJSON(storageKey, allowAllAssignment())
if err != nil {
return err
}
if err := view.Put(ctx, entry); err != nil {
return err
}
i.Logger().Debug("wrote OIDC allow_all assignment")
}
return nil
}
func (i *IdentityStore) loadOIDCClients(ctx context.Context) error {
i.logger.Debug("identity loading OIDC clients")
clients, err := i.view.List(ctx, clientPath)
if err != nil {
return err
}
txn := i.db.Txn(true)
defer txn.Abort()
for _, name := range clients {
entry, err := i.view.Get(ctx, clientPath+name)
if err != nil {
return err
}
if entry == nil {
continue
}
var client client
if err := entry.DecodeJSON(&client); err != nil {
return err
}
if err := i.memDBUpsertClientInTxn(txn, &client); err != nil {
return err
}
}
txn.Commit()
return nil
}
// clientByID returns the client with the given ID.
func (i *IdentityStore) clientByID(ctx context.Context, s logical.Storage, id string) (*client, error) {
// Read the client from memdb

View File

@ -1647,25 +1647,31 @@ func TestOIDC_Path_OIDC_Client_Type(t *testing.T) {
}
}
// TestOIDC_Path_OIDC_ProviderClient_NoKeyParameter tests that a client cannot
// be created without a key parameter
func TestOIDC_Path_OIDC_ProviderClient_NoKeyParameter(t *testing.T) {
// TestOIDC_Path_OIDC_ProviderClient_DefaultKey tests that a
// client uses the default key if none provided at creation time.
func TestOIDC_Path_OIDC_ProviderClient_DefaultKey(t *testing.T) {
c, _, _ := TestCoreUnsealed(t)
ctx := namespace.RootContext(nil)
storage := &logical.InmemStorage{}
require.NoError(t, c.identityStore.storeOIDCDefaultResources(ctx, c.identityStore.view))
// Create a test client "test-client1" without a key param -- should fail
// Create a test client "test-client" without a key param
resp, err := c.identityStore.HandleRequest(ctx, &logical.Request{
Path: "oidc/client/test-client1",
Path: "oidc/client/test-client",
Operation: logical.CreateOperation,
Storage: storage,
Storage: c.identityStore.view,
})
expectError(t, resp, err)
// validate error message
expectedStrings := map[string]interface{}{
"the key parameter is required": true,
}
expectStrings(t, []string{resp.Data["error"].(string)}, expectedStrings)
expectSuccess(t, resp, err)
// Read "test-client" to validate it uses the default key
resp, err = c.identityStore.HandleRequest(ctx, &logical.Request{
Path: "oidc/client/test-client",
Operation: logical.ReadOperation,
Storage: c.identityStore.view,
})
expectSuccess(t, resp, err)
// Assert that the client uses the default key
require.Equal(t, defaultKeyName, resp.Data["key"].(string))
}
// TestOIDC_Path_OIDC_ProviderClient_NilKeyEntry tests that a client cannot be
@ -3394,7 +3400,7 @@ func TestOIDC_Path_OpenIDProviderConfig(t *testing.T) {
TokenEndpoint: basePath + "/token",
UserinfoEndpoint: basePath + "/userinfo",
GrantTypes: []string{"authorization_code"},
AuthMethods: []string{"client_secret_basic"},
AuthMethods: []string{"none", "client_secret_basic"},
RequestURIParameter: false,
}
discoveryResp := &providerDiscovery{}
@ -3448,7 +3454,7 @@ func TestOIDC_Path_OpenIDProviderConfig(t *testing.T) {
TokenEndpoint: basePath + "/token",
UserinfoEndpoint: basePath + "/userinfo",
GrantTypes: []string{"authorization_code"},
AuthMethods: []string{"client_secret_basic"},
AuthMethods: []string{"none", "client_secret_basic"},
RequestURIParameter: false,
}
discoveryResp = &providerDiscovery{}

View File

@ -90,39 +90,6 @@ func (i *IdentityStore) sanitizeName(name string) string {
return strings.ToLower(name)
}
func (i *IdentityStore) loadOIDCClients(ctx context.Context) error {
i.logger.Debug("identity loading OIDC clients")
clients, err := i.view.List(ctx, clientPath)
if err != nil {
return err
}
txn := i.db.Txn(true)
defer txn.Abort()
for _, name := range clients {
entry, err := i.view.Get(ctx, clientPath+name)
if err != nil {
return err
}
if entry == nil {
continue
}
var client client
if err := entry.DecodeJSON(&client); err != nil {
return err
}
if err := i.memDBUpsertClientInTxn(txn, &client); err != nil {
return err
}
}
txn.Commit()
return nil
}
func (i *IdentityStore) loadGroups(ctx context.Context) error {
i.logger.Debug("identity loading groups")
existing, err := i.groupPacker.View().List(ctx, groupBucketsPrefix)