1
0
mirror of https://github.com/matrix-org/matrix-authentication-service.git synced 2025-07-31 09:24:31 +03:00

Add a GraphQL mutation to create arbitrary OAuth2 sessions.

This commit is contained in:
Quentin Gliech
2023-09-08 19:28:46 +02:00
parent b8012bb66c
commit 83ca90ee3d
8 changed files with 369 additions and 71 deletions

View File

@ -131,6 +131,13 @@ impl Requester {
}
}
fn oauth2_session(&self) -> Option<&Session> {
match self {
Self::OAuth2Session(session, _) => Some(session),
Self::BrowserSession(_) | Self::Anonymous => None,
}
}
/// Returns true if the requester can access the resource.
fn is_owner_or_admin(&self, resource: &impl OwnerId) -> bool {
// If the requester is an admin, they can do anything.

View File

@ -13,13 +13,19 @@
// limitations under the License.
use anyhow::Context as _;
use async_graphql::{Context, Enum, InputObject, Object, ID};
use mas_data_model::Device;
use async_graphql::{Context, Description, Enum, InputObject, Object, ID};
use chrono::Duration;
use mas_data_model::{Device, TokenType};
use mas_storage::{
job::{DeleteDeviceJob, JobRepositoryExt},
oauth2::OAuth2SessionRepository,
job::{DeleteDeviceJob, JobRepositoryExt, ProvisionDeviceJob},
oauth2::{
OAuth2AccessTokenRepository, OAuth2ClientRepository, OAuth2RefreshTokenRepository,
OAuth2SessionRepository,
},
user::UserRepository,
RepositoryAccess,
};
use oauth2_types::scope::Scope;
use crate::{
model::{NodeType, OAuth2Session},
@ -31,6 +37,45 @@ pub struct OAuth2SessionMutations {
_private: (),
}
/// The input of the `createOauth2Session` mutation.
#[derive(InputObject)]
pub struct CreateOAuth2SessionInput {
/// The scope of the session
scope: String,
/// The ID of the user for which to create the session
user_id: ID,
/// Whether the session should issue a never-expiring access token
permanent: Option<bool>,
}
/// The payload of the `createOauth2Session` mutation.
#[derive(Description)]
pub struct CreateOAuth2SessionPayload {
access_token: String,
refresh_token: Option<String>,
session: mas_data_model::Session,
}
#[Object(use_type_description)]
impl CreateOAuth2SessionPayload {
/// Access token for this session
pub async fn access_token(&self) -> &str {
&self.access_token
}
/// Refresh token for this session, if it is not a permanent session
pub async fn refresh_token(&self) -> Option<&str> {
self.refresh_token.as_deref()
}
/// The OAuth 2.0 session which was just created
pub async fn oauth2_session(&self) -> OAuth2Session {
OAuth2Session(self.session.clone())
}
}
/// The input of the `endOauth2Session` mutation.
#[derive(InputObject)]
pub struct EndOAuth2SessionInput {
@ -75,6 +120,93 @@ impl EndOAuth2SessionPayload {
#[Object]
impl OAuth2SessionMutations {
/// Create a new arbitrary OAuth 2.0 Session.
///
/// Only available for administrators.
async fn create_oauth2_session(
&self,
ctx: &Context<'_>,
input: CreateOAuth2SessionInput,
) -> Result<CreateOAuth2SessionPayload, async_graphql::Error> {
let state = ctx.state();
let user_id = NodeType::User.extract_ulid(&input.user_id)?;
let scope: Scope = input.scope.parse().context("Invalid scope")?;
let permanent = input.permanent.unwrap_or(false);
let requester = ctx.requester();
if !requester.is_admin() {
return Err(async_graphql::Error::new("Unauthorized"));
}
let session = requester
.oauth2_session()
.context("Requester should be a OAuth 2.0 client")?;
let mut repo = state.repository().await?;
let clock = state.clock();
let mut rng = state.rng();
let client = repo
.oauth2_client()
.lookup(session.client_id)
.await?
.context("Client not found")?;
let user = repo
.user()
.lookup(user_id)
.await?
.context("User not found")?;
// Generate a new access token
let access_token = TokenType::AccessToken.generate(&mut rng);
// Create the OAuth 2.0 Session
let session = repo
.oauth2_session()
.add(&mut rng, &clock, &client, Some(&user), None, scope)
.await?;
// Look for devices to provision
for scope in &*session.scope {
if let Some(device) = Device::from_scope_token(scope) {
repo.job()
.schedule_job(ProvisionDeviceJob::new(&user, &device))
.await?;
}
}
let ttl = if permanent {
// XXX: that's lazy
Duration::days(365 * 50)
} else {
Duration::minutes(5)
};
let access_token = repo
.oauth2_access_token()
.add(&mut rng, &clock, &session, access_token, ttl)
.await?;
let refresh_token = if !permanent {
let refresh_token = TokenType::RefreshToken.generate(&mut rng);
let refresh_token = repo
.oauth2_refresh_token()
.add(&mut rng, &clock, &session, &access_token, refresh_token)
.await?;
Some(refresh_token)
} else {
None
};
Ok(CreateOAuth2SessionPayload {
session,
access_token: access_token.access_token,
refresh_token: refresh_token.map(|t| t.refresh_token),
})
}
async fn end_oauth2_session(
&self,
ctx: &Context<'_>,

View File

@ -510,6 +510,7 @@ async fn test_oauth2_client_credentials(pool: PgPool) {
mutation {
addUser(input: {username: "alice"}) {
user {
id
username
}
}
@ -519,15 +520,42 @@ async fn test_oauth2_client_credentials(pool: PgPool) {
let response = state.request(request).await;
response.assert_status(StatusCode::OK);
let response: GraphQLResponse = response.json();
assert!(response.errors.is_empty());
assert!(response.errors.is_empty(), "{:?}", response.errors);
let user_id = &response.data["addUser"]["user"]["id"];
assert_eq!(
response.data,
serde_json::json!({
"addUser": {
"user": {
"id": user_id,
"username": "alice"
}
}
})
);
// We should now be able to create an arbitrary access token for the user
let request = Request::post("/graphql")
.bearer(&access_token)
.json(serde_json::json!({
"query": r#"
mutation CreateSession($userId: String!, $scope: String!) {
createOauth2Session(input: {userId: $userId, permanent: true, scope: $scope}) {
accessToken
refreshToken
}
}
"#,
"variables": {
"userId": user_id,
"scope": "urn:matrix:org.matrix.msc2967.client:device:AABBCCDDEE urn:matrix:org.matrix.msc2967.client:api:* urn:synapse:admin:*"
},
}));
let response = state.request(request).await;
response.assert_status(StatusCode::OK);
let response: GraphQLResponse = response.json();
assert!(response.errors.is_empty(), "{:?}", response.errors);
assert!(response.data["createOauth2Session"]["refreshToken"].is_null());
assert!(response.data["createOauth2Session"]["accessToken"].is_string());
}

View File

@ -14,7 +14,7 @@
use async_trait::async_trait;
use chrono::{DateTime, Utc};
use mas_data_model::{BrowserSession, Client, Session, SessionState};
use mas_data_model::{BrowserSession, Client, Session, SessionState, User};
use mas_storage::{
oauth2::{OAuth2SessionFilter, OAuth2SessionRepository},
Clock, Page, Pagination,
@ -133,24 +133,23 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
}
#[tracing::instrument(
name = "db.oauth2_session.add_from_browser_session",
name = "db.oauth2_session.add",
skip_all,
fields(
db.statement,
%user_session.id,
user.id = %user_session.user.id,
%client.id,
session.id,
session.scope = %scope,
),
err,
)]
async fn add_from_browser_session(
async fn add(
&mut self,
rng: &mut (dyn RngCore + Send),
clock: &dyn Clock,
client: &Client,
user_session: &BrowserSession,
user: Option<&User>,
user_session: Option<&BrowserSession>,
scope: Scope,
) -> Result<Session, Self::Error> {
let created_at = clock.now();
@ -172,8 +171,8 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
VALUES ($1, $2, $3, $4, $5, $6)
"#,
Uuid::from(id),
Uuid::from(user_session.user.id),
Uuid::from(user_session.id),
user.map(|u| Uuid::from(u.id)),
user_session.map(|s| Uuid::from(s.id)),
Uuid::from(client.id),
&scope_list,
created_at,
@ -186,62 +185,8 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
id,
state: SessionState::Valid,
created_at,
user_id: Some(user_session.user.id),
user_session_id: Some(user_session.id),
client_id: client.id,
scope,
})
}
#[tracing::instrument(
name = "db.oauth2_session.add_from_client_credentials",
skip_all,
fields(
db.statement,
%client.id,
session.id,
session.scope = %scope,
),
err,
)]
async fn add_from_client_credentials(
&mut self,
rng: &mut (dyn RngCore + Send),
clock: &dyn Clock,
client: &Client,
scope: Scope,
) -> Result<Session, Self::Error> {
let created_at = clock.now();
let id = Ulid::from_datetime_with_source(created_at.into(), rng);
tracing::Span::current().record("session.id", tracing::field::display(id));
let scope_list: Vec<String> = scope.iter().map(|s| s.as_str().to_owned()).collect();
sqlx::query!(
r#"
INSERT INTO oauth2_sessions
( oauth2_session_id
, oauth2_client_id
, scope_list
, created_at
)
VALUES ($1, $2, $3, $4)
"#,
Uuid::from(id),
Uuid::from(client.id),
&scope_list,
created_at,
)
.traced()
.execute(&mut *self.conn)
.await?;
Ok(Session {
id,
state: SessionState::Valid,
created_at,
user_id: None,
user_session_id: None,
user_id: user.map(|u| u.id),
user_session_id: user_session.map(|s| s.id),
client_id: client.id,
scope,
})

View File

@ -140,6 +140,33 @@ pub trait OAuth2SessionRepository: Send + Sync {
/// Returns [`Self::Error`] if the underlying repository fails
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
/// Create a new [`Session`] with the given parameters
///
/// Returns the newly created [`Session`]
///
/// # Parameters
///
/// * `rng`: The random number generator to use
/// * `clock`: The clock used to generate timestamps
/// * `client`: The [`Client`] which created the [`Session`]
/// * `user`: The [`User`] for which the session should be created, if any
/// * `user_session`: The [`BrowserSession`] of the user which completed the
/// authorization, if any
/// * `scope`: The [`Scope`] of the [`Session`]
///
/// # Errors
///
/// Returns [`Self::Error`] if the underlying repository fails
async fn add(
&mut self,
rng: &mut (dyn RngCore + Send),
clock: &dyn Clock,
client: &Client,
user: Option<&User>,
user_session: Option<&BrowserSession>,
scope: Scope,
) -> Result<Session, Self::Error>;
/// Create a new [`Session`] out of a [`Client`] and a [`BrowserSession`]
///
/// Returns the newly created [`Session`]
@ -163,7 +190,17 @@ pub trait OAuth2SessionRepository: Send + Sync {
client: &Client,
user_session: &BrowserSession,
scope: Scope,
) -> Result<Session, Self::Error>;
) -> Result<Session, Self::Error> {
self.add(
rng,
clock,
client,
Some(&user_session.user),
Some(user_session),
scope,
)
.await
}
/// Create a new [`Session`] for a [`Client`] using the client credentials
/// flow
@ -186,7 +223,9 @@ pub trait OAuth2SessionRepository: Send + Sync {
clock: &dyn Clock,
client: &Client,
scope: Scope,
) -> Result<Session, Self::Error>;
) -> Result<Session, Self::Error> {
self.add(rng, clock, client, None, None, scope).await
}
/// Mark a [`Session`] as finished
///
@ -234,6 +273,16 @@ pub trait OAuth2SessionRepository: Send + Sync {
repository_impl!(OAuth2SessionRepository:
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
async fn add(
&mut self,
rng: &mut (dyn RngCore + Send),
clock: &dyn Clock,
client: &Client,
user: Option<&User>,
user_session: Option<&BrowserSession>,
scope: Scope,
) -> Result<Session, Self::Error>;
async fn add_from_browser_session(
&mut self,
rng: &mut (dyn RngCore + Send),

View File

@ -367,6 +367,42 @@ type CompatSsoLoginEdge {
cursor: String!
}
"""
The input of the `createOauth2Session` mutation.
"""
input CreateOAuth2SessionInput {
"""
The scope of the session
"""
scope: String!
"""
The ID of the user for which to create the session
"""
userId: ID!
"""
Whether the session should issue a never-expiring access token
"""
permanent: Boolean
}
"""
The payload of the `createOauth2Session` mutation.
"""
type CreateOAuth2SessionPayload {
"""
Access token for this session
"""
accessToken: String!
"""
Refresh token for this session, if it is not a permanent session
"""
refreshToken: String
"""
The OAuth 2.0 session which was just created
"""
oauth2Session: Oauth2Session!
}
"""
An object with a creation date.
"""
@ -580,6 +616,14 @@ type Mutation {
Lock a user. This is only available to administrators.
"""
lockUser(input: LockUserInput!): LockUserPayload!
"""
Create a new arbitrary OAuth 2.0 Session.
Only available for administrators.
"""
createOauth2Session(
input: CreateOAuth2SessionInput!
): CreateOAuth2SessionPayload!
endOauth2Session(input: EndOAuth2SessionInput!): EndOAuth2SessionPayload!
endCompatSession(input: EndCompatSessionInput!): EndCompatSessionPayload!
endBrowserSession(input: EndBrowserSessionInput!): EndBrowserSessionPayload!

View File

@ -270,6 +270,27 @@ export type CompatSsoLoginEdge = {
node: CompatSsoLogin;
};
/** The input of the `createOauth2Session` mutation. */
export type CreateOAuth2SessionInput = {
/** Whether the session should issue a never-expiring access token */
permanent?: InputMaybe<Scalars["Boolean"]["input"]>;
/** The scope of the session */
scope: Scalars["String"]["input"];
/** The ID of the user for which to create the session */
userId: Scalars["ID"]["input"];
};
/** The payload of the `createOauth2Session` mutation. */
export type CreateOAuth2SessionPayload = {
__typename?: "CreateOAuth2SessionPayload";
/** Access token for this session */
accessToken: Scalars["String"]["output"];
/** The OAuth 2.0 session which was just created */
oauth2Session: Oauth2Session;
/** Refresh token for this session, if it is not a permanent session */
refreshToken?: Maybe<Scalars["String"]["output"]>;
};
/** An object with a creation date. */
export type CreationEvent = {
/** When the object was created. */
@ -384,6 +405,12 @@ export type Mutation = {
addEmail: AddEmailPayload;
/** Add a user. This is only available to administrators. */
addUser: AddUserPayload;
/**
* Create a new arbitrary OAuth 2.0 Session.
*
* Only available for administrators.
*/
createOauth2Session: CreateOAuth2SessionPayload;
endBrowserSession: EndBrowserSessionPayload;
endCompatSession: EndCompatSessionPayload;
endOauth2Session: EndOAuth2SessionPayload;
@ -411,6 +438,11 @@ export type MutationAddUserArgs = {
input: AddUserInput;
};
/** The mutations root of the GraphQL interface. */
export type MutationCreateOauth2SessionArgs = {
input: CreateOAuth2SessionInput;
};
/** The mutations root of the GraphQL interface. */
export type MutationEndBrowserSessionArgs = {
input: EndBrowserSessionInput;

View File

@ -680,6 +680,44 @@ export default {
],
interfaces: [],
},
{
kind: "OBJECT",
name: "CreateOAuth2SessionPayload",
fields: [
{
name: "accessToken",
type: {
kind: "NON_NULL",
ofType: {
kind: "SCALAR",
name: "Any",
},
},
args: [],
},
{
name: "oauth2Session",
type: {
kind: "NON_NULL",
ofType: {
kind: "OBJECT",
name: "Oauth2Session",
ofType: null,
},
},
args: [],
},
{
name: "refreshToken",
type: {
kind: "SCALAR",
name: "Any",
},
args: [],
},
],
interfaces: [],
},
{
kind: "INTERFACE",
name: "CreationEvent",
@ -920,6 +958,29 @@ export default {
},
],
},
{
name: "createOauth2Session",
type: {
kind: "NON_NULL",
ofType: {
kind: "OBJECT",
name: "CreateOAuth2SessionPayload",
ofType: null,
},
},
args: [
{
name: "input",
type: {
kind: "NON_NULL",
ofType: {
kind: "SCALAR",
name: "Any",
},
},
},
],
},
{
name: "endBrowserSession",
type: {