A shitton of documentation
This commit is contained in:
parent
ce0506c09a
commit
7599699755
|
@ -25,6 +25,8 @@ You'll need to store two things in local storage:
|
||||||
|
|
||||||
## OAuth2
|
## OAuth2
|
||||||
|
|
||||||
|
RDIR - /login - start the oauth2 login process, see OAuth2.md
|
||||||
|
|
||||||
POST - /api/auth - interface directly with the burgerauth system, provide "secretKey, appId, code and codemethod"
|
POST - /api/auth - interface directly with the burgerauth system, provide "secretKey, appId, code and codemethod"
|
||||||
|
|
||||||
Code and Codemethod are only used for PKCE, if PKCE is not enabled set the value of both to "none"
|
Code and Codemethod are only used for PKCE, if PKCE is not enabled set the value of both to "none"
|
||||||
|
|
|
@ -0,0 +1,152 @@
|
||||||
|
# Burgerauth as an oauth2 provider
|
||||||
|
|
||||||
|
## Endpoints
|
||||||
|
|
||||||
|
GET - /.well-known/openid-configuration - OpenID Connect Discovery
|
||||||
|
|
||||||
|
GET - /login - Authorization Endpoint
|
||||||
|
|
||||||
|
POST - /login/oauth/access_token - Token Exchange Endpoint
|
||||||
|
|
||||||
|
POST - /userinfo - OpenID Connect UserInfo
|
||||||
|
|
||||||
|
## Supported OAuth2 Grants
|
||||||
|
|
||||||
|
Burgerauth supports the authorization code grant standard with support for:
|
||||||
|
|
||||||
|
- Proof Key for Code Exchange (PKCE)
|
||||||
|
- OpenID Connect (OCID)
|
||||||
|
|
||||||
|
To use the Authorization Code Grant as a third party application it is required to register a new application in the dashboard (/dashboard)
|
||||||
|
|
||||||
|
## Scopes
|
||||||
|
|
||||||
|
Burgerauth does not currently support scopes, and by default grants all scopes regarding user infomation
|
||||||
|
|
||||||
|
## Client types
|
||||||
|
|
||||||
|
Burgerauth supports both confidential and public client types, as defined by RFC 6749.
|
||||||
|
|
||||||
|
You can view this spec here: https://datatracker.ietf.org/doc/html/rfc6749#section-2.1
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
### Confidential client
|
||||||
|
|
||||||
|
This example does not use PKCE.
|
||||||
|
|
||||||
|
1. Redirect the user to the authorization endpoint in order to get their consent for accessing the resources:
|
||||||
|
|
||||||
|
```
|
||||||
|
/login?client_id=CLIENT_ID&redirect_uri=REDIRECT_URI&response_type=code&state=STATE
|
||||||
|
```
|
||||||
|
|
||||||
|
The CLIENT_ID can be obtained by registering an application in the dashboard. The STATE is a random string that will be sent back to your application after the user authorizes. The state parameter is optional, but should be used to prevent CSRF attacks.
|
||||||
|
|
||||||
|
The user will now be asked to authorize your application. If they authorize it, the user will be redirected to the REDIRECT_URL, for example:
|
||||||
|
|
||||||
|
```
|
||||||
|
https://[REDIRECT_URI]?code=RETURNED_CODE&state=STATE
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Using the provided code from the redirect, you can request a new application and refresh token. The access token endpoint accepts POST requests with application/json and application/x-www-form-urlencoded body, for example:
|
||||||
|
|
||||||
|
POST - /api/tokenauth
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"client_id": "YOUR_CLIENT_ID",
|
||||||
|
"client_secret": "YOUR_CLIENT_SECRET",
|
||||||
|
"code": "RETURNED_CODE",
|
||||||
|
"grant_type": "authorization_code",
|
||||||
|
"redirect_uri": "REDIRECT_URI" (optional, since redirect_uri is not verified on the server)
|
||||||
|
}
|
||||||
|
```
|
||||||
|
Response:
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"access_token": "(random string)",
|
||||||
|
"token_type": "bearer",
|
||||||
|
"expires_in": 3600,
|
||||||
|
"refresh_token": "(random string)",
|
||||||
|
"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.C_M48hKf9Ccj-lRV6X0co2vwUee5coxYEwoYfSL0ZlM"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
ID Token is a jwt encoded string in this format:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"sub": "(username)",
|
||||||
|
"iss": "(issuer URL)",
|
||||||
|
"name": "(username)",
|
||||||
|
"aud": "(appid)",
|
||||||
|
"exp": (expiration time),
|
||||||
|
"iat": (time of issue),
|
||||||
|
"auth_time": (time of auth),
|
||||||
|
"nonce": "(random string)"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Use id_token to contact the /userinfo endpoint, with the "Authorization" HTTP header structured like this:
|
||||||
|
|
||||||
|
```
|
||||||
|
Bearer (id_token)
|
||||||
|
```
|
||||||
|
|
||||||
|
Use access_token to access other scopes, defined in scopes.md
|
||||||
|
|
||||||
|
### Public Client (PKCE)
|
||||||
|
|
||||||
|
1. PKCE (Proof Key for Code Exchange) is an extension to the OAuth flow which allows for a secure credential exchange without the requirement to provide a client secret. To achieve this, you have to provide a code_verifier for every authorization request. A code_verifier has to be a random string with a minimum length of 43 characters and a maximum length of 128 characters. It can contain alphanumeric characters as well as the characters -, ., _ and ~.
|
||||||
|
|
||||||
|
Using this code_verifier string, a new one called code_challenge is created by using one of two methods:
|
||||||
|
|
||||||
|
- If you have the required functionality on your client, set code_challenge to be a URL-safe base64-encoded string of the SHA256 hash of code_verifier. In that case, your code_challenge_method becomes S256.
|
||||||
|
- If you are unable to do so, you can provide your code_verifier as a plain string to code_challenge. Then you have to set your code_challenge_method as plain.
|
||||||
|
|
||||||
|
2. Redirect the user to the authorization endpoint in order to get their consent for accessing the resources:
|
||||||
|
|
||||||
|
```
|
||||||
|
/login?client_id=CLIENT_ID&redirect_uri=REDIRECT_URI&response_type=code&code_challenge_method=CODE_CHALLENGE_METHOD&code_challenge=CODE_CHALLENGE&state=STATE
|
||||||
|
```
|
||||||
|
|
||||||
|
The CLIENT_ID can be obtained by registering an application in the dashboard. The STATE is a random string that will be sent back to your application after the user authorizes. The state parameter is optional, but should be used to prevent CSRF attacks.
|
||||||
|
|
||||||
|
The user will now be asked to authorize your application. If they authorize it, the user will be redirected to the REDIRECT_URL, for example:
|
||||||
|
|
||||||
|
```
|
||||||
|
https://[REDIRECT_URI]?code=RETURNED_CODE&state=STATE
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Using the provided code from the redirect, you can request a new application and refresh token. The access token endpoint accepts POST requests with application/json and application/x-www-form-urlencoded body, for example:
|
||||||
|
|
||||||
|
POST - /api/tokenauth
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"client_id": "YOUR_CLIENT_ID",
|
||||||
|
"code": "RETURNED_CODE",
|
||||||
|
"grant_type": "authorization_code",
|
||||||
|
"redirect_uri": "REDIRECT_URI", (optional, since redirect_uri is not verified on the server)
|
||||||
|
"code_verifier": "CODE_VERIFIER"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
Response:
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"access_token": "(random string)",
|
||||||
|
"token_type": "bearer",
|
||||||
|
"expires_in": 3600,
|
||||||
|
"refresh_token": "(random string)",
|
||||||
|
"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.C_M48hKf9Ccj-lRV6X0co2vwUee5coxYEwoYfSL0ZlM"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Use id_token to contact the /userinfo endpoint, with the "Authorization" HTTP header structured like this:
|
||||||
|
|
||||||
|
```
|
||||||
|
Bearer (id_token)
|
||||||
|
```
|
||||||
|
|
||||||
|
Use access_token to access other scopes, defined in scopes.md
|
|
@ -0,0 +1,598 @@
|
||||||
|
#!/usr/bin/python3
|
||||||
|
import hashlib
|
||||||
|
import base64
|
||||||
|
import jwt
|
||||||
|
import os
|
||||||
|
import sqlite3
|
||||||
|
import time
|
||||||
|
import secrets
|
||||||
|
import configparser
|
||||||
|
import asyncio
|
||||||
|
from hypercorn.config import Config
|
||||||
|
from hypercorn.asyncio import serve
|
||||||
|
from werkzeug.security import generate_password_hash, check_password_hash
|
||||||
|
from quart import Quart, render_template, request, url_for, flash, redirect, session, make_response, send_from_directory, stream_with_context, Response, request
|
||||||
|
|
||||||
|
# Parse configuration file, and check if anything is wrong with it
|
||||||
|
if not os.path.exists("config.ini"):
|
||||||
|
print("config.ini does not exist")
|
||||||
|
quit(1)
|
||||||
|
|
||||||
|
config = configparser.ConfigParser()
|
||||||
|
config.read("config.ini")
|
||||||
|
|
||||||
|
HOST = config["config"]["HOST"]
|
||||||
|
PORT = config["config"]["PORT"]
|
||||||
|
SECRET_KEY = config["config"]["SECRET_KEY"]
|
||||||
|
MAX_STORAGE = config["config"]["MAX_STORAGE"]
|
||||||
|
|
||||||
|
if SECRET_KEY == "supersecretkey" or SECRET_KEY == "placeholder":
|
||||||
|
print("[WARNING] Secret key not set")
|
||||||
|
|
||||||
|
# Define Quart
|
||||||
|
app = Quart(__name__)
|
||||||
|
app.config["SECRET_KEY"] = SECRET_KEY
|
||||||
|
|
||||||
|
# Hash creation function
|
||||||
|
def sha256_base64(s: str) -> str:
|
||||||
|
hashed = hashlib.sha256(s.encode()).digest()
|
||||||
|
encoded = base64.urlsafe_b64encode(hashed).rstrip(b'=').decode()
|
||||||
|
return encoded
|
||||||
|
|
||||||
|
# Database functions
|
||||||
|
def get_db_connection():
|
||||||
|
conn = sqlite3.connect("database.db")
|
||||||
|
conn.row_factory = sqlite3.Row
|
||||||
|
return conn
|
||||||
|
|
||||||
|
def get_user(id):
|
||||||
|
conn = get_db_connection()
|
||||||
|
post = conn.execute("SELECT * FROM users WHERE id = ?",
|
||||||
|
(id,)).fetchone()
|
||||||
|
conn.close()
|
||||||
|
if post is None:
|
||||||
|
return None
|
||||||
|
return post
|
||||||
|
|
||||||
|
def get_session(id):
|
||||||
|
conn = get_db_connection()
|
||||||
|
post = conn.execute("SELECT * FROM sessions WHERE session = ?",
|
||||||
|
(id,)).fetchone()
|
||||||
|
conn.close()
|
||||||
|
if post is None:
|
||||||
|
return None
|
||||||
|
return post
|
||||||
|
|
||||||
|
def get_session_from_sessionid(id):
|
||||||
|
conn = get_db_connection()
|
||||||
|
post = conn.execute("SELECT * FROM sessions WHERE sessionid = ?",
|
||||||
|
(id,)).fetchone()
|
||||||
|
conn.close()
|
||||||
|
if post is None:
|
||||||
|
return None
|
||||||
|
return post
|
||||||
|
|
||||||
|
def check_username_taken(username):
|
||||||
|
conn = get_db_connection()
|
||||||
|
post = conn.execute("SELECT * FROM users WHERE lower(username) = ?",
|
||||||
|
(username.lower(),)).fetchone()
|
||||||
|
conn.close()
|
||||||
|
if post is None:
|
||||||
|
return None
|
||||||
|
return post["id"]
|
||||||
|
|
||||||
|
async def oauth2_token_refresh(openid, appId):
|
||||||
|
while True:
|
||||||
|
await asyncio.sleep(3600)
|
||||||
|
conn = get_db_connection()
|
||||||
|
|
||||||
|
# Fetch required data in a single query
|
||||||
|
login_data = conn.execute("SELECT nextcode, nextsecret, nextopenid, creator FROM logins WHERE appId = ? AND openid = ?", (str(appId), str(openid))).fetchone()
|
||||||
|
|
||||||
|
user = get_user(int(login_data[3]))
|
||||||
|
|
||||||
|
datatemplate = {
|
||||||
|
"sub": user["username"],
|
||||||
|
"iss": "https://auth.hectabit.org",
|
||||||
|
"name": user["username"],
|
||||||
|
"aud": appId,
|
||||||
|
"exp": time.time() + 3600,
|
||||||
|
"iat": time.time(),
|
||||||
|
"auth_time": time.time(),
|
||||||
|
"nonce": str(secrets.token_hex(512))
|
||||||
|
}
|
||||||
|
|
||||||
|
jwt_token = jwt.encode(datatemplate, SECRET_KEY, algorithm='HS256')
|
||||||
|
|
||||||
|
if login_data:
|
||||||
|
nextcode = login_data[0]
|
||||||
|
nextsecret = login_data[1]
|
||||||
|
nextopenid = login_data[2]
|
||||||
|
conn.execute("UPDATE logins SET code = ?, nextcode = ?, secret = ?, nextsecret = ?, openid = ?, nextopenid = ? WHERE appId = ? AND openid = ?", (nextcode, str(secrets.token_hex(512)), nextsecret, str(secrets.token_hex(512)), nextopenid, str(jwt_token), str(appId), str(openid)))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
else:
|
||||||
|
conn.close()
|
||||||
|
return
|
||||||
|
|
||||||
|
# Disable CORS
|
||||||
|
@app.after_request
|
||||||
|
async def add_cors_headers(response):
|
||||||
|
response.headers.add("Access-Control-Allow-Origin", "*")
|
||||||
|
response.headers.add("Access-Control-Allow-Headers", "*")
|
||||||
|
response.headers.add("Access-Control-Allow-Methods", "*")
|
||||||
|
return response
|
||||||
|
|
||||||
|
@app.route("/api/version", methods=("GET", "POST"))
|
||||||
|
async def apiversion():
|
||||||
|
return "Burgerauth Version 1.2"
|
||||||
|
|
||||||
|
@app.route("/api/signup", methods=("GET", "POST"))
|
||||||
|
async def apisignup():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
username = data["username"]
|
||||||
|
password = data["password"]
|
||||||
|
|
||||||
|
if username == "":
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
if len(username) > 20:
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
if not username.isalnum():
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
if password == "":
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
if len(password) < 14:
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
if not check_username_taken(username) == None:
|
||||||
|
return {}, 409
|
||||||
|
|
||||||
|
hashedpassword = generate_password_hash(password)
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
conn.execute("INSERT INTO users (username, password, created) VALUES (?, ?, ?)",
|
||||||
|
(username, hashedpassword, str(time.time())))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
userID = check_username_taken(username)
|
||||||
|
user = get_user(userID)
|
||||||
|
|
||||||
|
randomCharacters = secrets.token_hex(512)
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
conn.execute("INSERT INTO sessions (session, id, device) VALUES (?, ?, ?)",
|
||||||
|
(randomCharacters, userID, request.headers.get("user-agent")))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
return {
|
||||||
|
"key": randomCharacters
|
||||||
|
}, 200
|
||||||
|
|
||||||
|
@app.route("/api/login", methods=("GET", "POST"))
|
||||||
|
async def apilogin():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
username = data["username"]
|
||||||
|
password = data["password"]
|
||||||
|
passwordchange = data["passwordchange"]
|
||||||
|
newpass = data["newpass"]
|
||||||
|
|
||||||
|
check_username_thing = check_username_taken(username)
|
||||||
|
|
||||||
|
if check_username_thing == None:
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
userID = check_username_taken(username)
|
||||||
|
user = get_user(userID)
|
||||||
|
|
||||||
|
if not check_password_hash(user["password"], (password)):
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
randomCharacters = secrets.token_hex(512)
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
conn.execute("INSERT INTO sessions (session, id, device) VALUES (?, ?, ?)",
|
||||||
|
(randomCharacters, userID, request.headers.get("user-agent")))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
if passwordchange == "yes":
|
||||||
|
hashedpassword = generate_password_hash(newpass)
|
||||||
|
conn = get_db_connection()
|
||||||
|
conn.execute("UPDATE users SET password = ? WHERE username = ?", (hashedpassword, username))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
return {
|
||||||
|
"key": randomCharacters,
|
||||||
|
}, 200
|
||||||
|
|
||||||
|
|
||||||
|
@app.route("/api/userinfo", methods=("GET", "POST"))
|
||||||
|
async def apiuserinfo():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
datatemplate = {
|
||||||
|
"username": user["username"],
|
||||||
|
"id": user["id"],
|
||||||
|
"created": user["created"]
|
||||||
|
}
|
||||||
|
return datatemplate
|
||||||
|
|
||||||
|
@app.route("/userinfo", methods=("GET", "POST"))
|
||||||
|
async def apiopeniduserinfo():
|
||||||
|
if request.method == "GET":
|
||||||
|
access_token = request.headers.get('Authorization').split(' ')[1]
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
userid = int(conn.execute("SELECT creator FROM logins WHERE code = ?", (str(access_token),)).fetchone()[0])
|
||||||
|
user = get_user(userid)
|
||||||
|
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
datatemplate = {
|
||||||
|
"sub": user["username"],
|
||||||
|
"name": user["username"]
|
||||||
|
}
|
||||||
|
|
||||||
|
return datatemplate
|
||||||
|
|
||||||
|
@app.route("/api/auth", methods=("GET", "POST"))
|
||||||
|
async def apiauthenticate():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
appId = data["appId"]
|
||||||
|
code = data["code"]
|
||||||
|
codemethod = data["codemethod"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
conn = get_db_connection()
|
||||||
|
secretkey = str(secrets.token_hex(512))
|
||||||
|
|
||||||
|
appidcheck = str(conn.execute("SELECT appId FROM oauth WHERE appId = ?", (str(appId),)).fetchone()[0])
|
||||||
|
if not str(appidcheck) == str(appId):
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
datatemplate = {
|
||||||
|
"sub": user["username"],
|
||||||
|
"iss": "https://auth.hectabit.org",
|
||||||
|
"name": user["username"],
|
||||||
|
"aud": appId,
|
||||||
|
"exp": time.time() + 3600,
|
||||||
|
"iat": time.time(),
|
||||||
|
"auth_time": time.time(),
|
||||||
|
"nonce": str(secrets.token_hex(512))
|
||||||
|
}
|
||||||
|
|
||||||
|
jwt_token = jwt.encode(datatemplate, SECRET_KEY, algorithm='HS256')
|
||||||
|
|
||||||
|
datatemplate2 = {
|
||||||
|
"sub": user["username"],
|
||||||
|
"iss": "https://auth.hectabit.org",
|
||||||
|
"name": user["username"],
|
||||||
|
"aud": appId,
|
||||||
|
"exp": time.time() + 7200,
|
||||||
|
"iat": time.time() + 3600,
|
||||||
|
"auth_time": time.time(),
|
||||||
|
"nonce": str(secrets.token_hex(512))
|
||||||
|
}
|
||||||
|
|
||||||
|
nextjwt_token = jwt.encode(datatemplate2, SECRET_KEY, algorithm='HS256')
|
||||||
|
|
||||||
|
conn.execute("INSERT INTO logins (appId, secret, nextsecret, code, nextcode, creator, openid, nextopenid, pkce, pkcemethod) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?)",
|
||||||
|
(str(appId), str(secretkey), str(secrets.token_hex(512)), str(secrets.token_hex(512)), str(secrets.token_hex(512)), int(user["id"]), str(jwt_token), str(nextjwt_token), str(code), str(codemethod)))
|
||||||
|
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
if secretkey:
|
||||||
|
return secretkey, 200
|
||||||
|
else:
|
||||||
|
return {}, 400
|
||||||
|
|
||||||
|
@app.route("/api/tokenauth", methods=("GET", "POST"))
|
||||||
|
async def apitokenexchange():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.form
|
||||||
|
appId = data["client_id"]
|
||||||
|
code = data["code"]
|
||||||
|
|
||||||
|
if "code_verifier" in data:
|
||||||
|
code_verify = data["code_verifier"]
|
||||||
|
verifycode = True
|
||||||
|
else:
|
||||||
|
secret = data["client_secret"]
|
||||||
|
verifycode = False
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
|
||||||
|
# Fetch required data in a single query
|
||||||
|
oauth_data = conn.execute("SELECT appId, secret FROM oauth WHERE appId = ?", (str(appId),)).fetchone()
|
||||||
|
if not oauth_data or oauth_data["appId"] != appId:
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
login_data = conn.execute("SELECT openid, code, pkce, pkcemethod FROM logins WHERE appId = ? AND secret = ?", (str(appId), str(code))).fetchone()
|
||||||
|
|
||||||
|
if verifycode:
|
||||||
|
if str(login_data["pkce"]) == "none":
|
||||||
|
return {}, 400
|
||||||
|
else:
|
||||||
|
if str(login_data["pkcemethod"]) == "S256":
|
||||||
|
if str(sha256_base64(code_verify)) != str(login_data["pkce"]):
|
||||||
|
return {}, 403
|
||||||
|
elif str(login_data["pkcemethod"]) == "plain":
|
||||||
|
if str(code_verify) != str(login_data["pkce"]):
|
||||||
|
return {}, 403
|
||||||
|
else:
|
||||||
|
return {}, 501
|
||||||
|
else:
|
||||||
|
if not oauth_data["secret"] == secret:
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
newkey = str(secrets.token_hex(512))
|
||||||
|
conn.execute("UPDATE logins SET secret = ?, nextsecret = ? WHERE appId = ? AND secret = ?", (str(newkey), str(secrets.token_hex(512)), str(appId), str(code)))
|
||||||
|
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
if login_data:
|
||||||
|
access_token = {
|
||||||
|
"access_token": str(login_data["code"]),
|
||||||
|
"token_type": "bearer",
|
||||||
|
"expires_in": 3600,
|
||||||
|
"refresh_token": newkey,
|
||||||
|
"id_token": str(login_data["openid"])
|
||||||
|
}
|
||||||
|
asyncio.create_task(oauth2_token_refresh(login_data["openid"], appId))
|
||||||
|
return access_token, 200
|
||||||
|
else:
|
||||||
|
return {}, 400
|
||||||
|
|
||||||
|
@app.route("/api/deleteauth", methods=("GET", "POST"))
|
||||||
|
async def apideleteauth():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
appId = data["appId"]
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn.execute("DELETE FROM oauth WHERE appId = ? AND creator = ?", (str(appId), int(user["id"])))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
except:
|
||||||
|
return {}, 400
|
||||||
|
else:
|
||||||
|
return {}, 200
|
||||||
|
|
||||||
|
@app.route("/api/newauth", methods=("GET", "POST"))
|
||||||
|
async def apicreateauth():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
appId = data["appId"]
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
secret = str(secrets.token_hex(512))
|
||||||
|
conn = get_db_connection()
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
conn.execute("SELECT secret FROM oauth WHERE secret = ?", (str(secret),)).fetchone()[0]
|
||||||
|
except:
|
||||||
|
break
|
||||||
|
else:
|
||||||
|
secret = str(secrets.token_hex(512))
|
||||||
|
continue
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn.execute("SELECT secret FROM oauth WHERE appId = ?", (str(appId),)).fetchone()[0]
|
||||||
|
except:
|
||||||
|
print("New Oauth added with ID", appId)
|
||||||
|
else:
|
||||||
|
return {}, 401
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
conn.execute("INSERT INTO oauth (appId, creator, secret) VALUES (?, ?, ?)",
|
||||||
|
(str(appId),int(user["id"]),str(secret)))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
secretkey = {
|
||||||
|
"key": secret
|
||||||
|
}
|
||||||
|
return secretkey, 200
|
||||||
|
|
||||||
|
@app.route("/api/listauth", methods=("GET", "POST"))
|
||||||
|
async def apiauthlist():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
oauths = conn.execute("SELECT * FROM oauth WHERE creator = ? ORDER BY creator DESC;", (user["id"],)).fetchall()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
datatemplate = []
|
||||||
|
|
||||||
|
for i in oauths:
|
||||||
|
template = {
|
||||||
|
"appId": i["appId"]
|
||||||
|
}
|
||||||
|
datatemplate.append(template)
|
||||||
|
|
||||||
|
return datatemplate, 200
|
||||||
|
|
||||||
|
@app.route("/api/deleteaccount", methods=("GET", "POST"))
|
||||||
|
async def apideleteaccount():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
try:
|
||||||
|
conn.execute("DELETE FROM userdata WHERE creator = ?", (userCookie["id"],))
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn.execute("DELETE FROM logins WHERE creator = ?", (userCookie["id"],))
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn.execute("DELETE FROM oauth WHERE creator = ?", (userCookie["id"],))
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn.execute("DELETE FROM users WHERE id = ?", (userCookie["id"],))
|
||||||
|
except:
|
||||||
|
return {}, 400
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
return {}, 200
|
||||||
|
|
||||||
|
@app.route("/api/sessions/list", methods=("GET", "POST"))
|
||||||
|
async def apisessionslist():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
conn = get_db_connection()
|
||||||
|
sessions = conn.execute("SELECT * FROM sessions WHERE id = ? ORDER BY id DESC;", (user["id"],)).fetchall()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
datatemplate = []
|
||||||
|
|
||||||
|
for x in sessions:
|
||||||
|
device = x["device"]
|
||||||
|
thisSession = False
|
||||||
|
if (x["session"] == secretKey):
|
||||||
|
thisSession = True
|
||||||
|
sessiontemplate = {
|
||||||
|
"id": x["sessionid"],
|
||||||
|
"thisSession": thisSession,
|
||||||
|
"device": device
|
||||||
|
}
|
||||||
|
datatemplate.append(sessiontemplate)
|
||||||
|
|
||||||
|
return datatemplate, 200
|
||||||
|
|
||||||
|
@app.route("/api/sessions/remove", methods=("GET", "POST"))
|
||||||
|
async def apisessionsremove():
|
||||||
|
if request.method == "POST":
|
||||||
|
data = await request.get_json()
|
||||||
|
secretKey = data["secretKey"]
|
||||||
|
sessionId = data["sessionId"]
|
||||||
|
|
||||||
|
userCookie = get_session(secretKey)
|
||||||
|
user = get_user(userCookie["id"])
|
||||||
|
|
||||||
|
session = get_session_from_sessionid(sessionId)
|
||||||
|
|
||||||
|
if (session != None):
|
||||||
|
if (user["id"] == session["id"]):
|
||||||
|
conn = get_db_connection()
|
||||||
|
conn.execute("DELETE FROM sessions WHERE sessionid = ?", (session["sessionid"],))
|
||||||
|
conn.commit()
|
||||||
|
conn.close()
|
||||||
|
|
||||||
|
return {}, 200
|
||||||
|
else:
|
||||||
|
return {}, 403
|
||||||
|
else:
|
||||||
|
return {}, 422
|
||||||
|
|
||||||
|
|
||||||
|
@app.route("/listusers/<secretkey>", methods=("GET", "POST"))
|
||||||
|
def listusers(secretkey):
|
||||||
|
if secretkey == SECRET_KEY:
|
||||||
|
conn = get_db_connection()
|
||||||
|
users = conn.execute("SELECT * FROM users").fetchall()
|
||||||
|
conn.close()
|
||||||
|
thing = ""
|
||||||
|
for x in users:
|
||||||
|
thing = str(x["id"]) + " - " + x["username"] + " - " + str(get_space(x["id"])) + "<br>" + thing
|
||||||
|
|
||||||
|
return thing
|
||||||
|
else:
|
||||||
|
return redirect("/")
|
||||||
|
|
||||||
|
@app.errorhandler(500)
|
||||||
|
async def burger(e):
|
||||||
|
return {}, 500
|
||||||
|
|
||||||
|
@app.errorhandler(404)
|
||||||
|
async def burger(e):
|
||||||
|
return {}, 404
|
||||||
|
|
||||||
|
@app.route("/")
|
||||||
|
async def index():
|
||||||
|
return redirect("/login", code=302)
|
||||||
|
|
||||||
|
@app.route("/login")
|
||||||
|
async def login():
|
||||||
|
return await render_template("login.html")
|
||||||
|
|
||||||
|
@app.route("/signup")
|
||||||
|
async def signup():
|
||||||
|
return await render_template("signup.html")
|
||||||
|
|
||||||
|
@app.route("/logout")
|
||||||
|
async def logout():
|
||||||
|
return await render_template("logout.html")
|
||||||
|
|
||||||
|
@app.route("/app")
|
||||||
|
async def mainapp():
|
||||||
|
return await render_template("main.html")
|
||||||
|
|
||||||
|
@app.route("/dashboard")
|
||||||
|
async def dashboard():
|
||||||
|
return await render_template("dashboard.html")
|
||||||
|
|
||||||
|
@app.route("/.well-known/openid-configuration")
|
||||||
|
async def openid():
|
||||||
|
return await render_template("openid.json")
|
||||||
|
|
||||||
|
# Start server
|
||||||
|
hypercornconfig = Config()
|
||||||
|
hypercornconfig.bind = (HOST + ":" + PORT)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
print("[INFO] Server started")
|
||||||
|
asyncio.run(serve(app, hypercornconfig))
|
||||||
|
print("[INFO] Server stopped")
|
|
@ -0,0 +1,39 @@
|
||||||
|
# Scopes
|
||||||
|
|
||||||
|
Burgerauth comes with predefined scopes used for syncing data across applications.
|
||||||
|
|
||||||
|
However, Burgerauth assumes all clients request all scopes in OAuth2 mode, as to keep compatibility with the base Burgerauth system.
|
||||||
|
|
||||||
|
## Endpoints
|
||||||
|
|
||||||
|
### RDIR - /rsakeyshare
|
||||||
|
|
||||||
|
This one requires more explanation. This is used for clients who wish to have a RSA key unique to the account. To get this RSA Key, create a redirect like this in JS:
|
||||||
|
|
||||||
|
```
|
||||||
|
window.postMessage("JSON.stringify({"access_token": "ACCESS_TOKEN", "redirect_uri": "REDIRECT_URI"})", https://auth.hectabit.org/rsakeyshare);
|
||||||
|
```
|
||||||
|
REDIRECT_URI is the correspondding URI where a Burgerauth LocalStorage acceptor is set up. Here is some JS code for a basic acceptor:
|
||||||
|
|
||||||
|
```
|
||||||
|
window.addEventListener(
|
||||||
|
"message",
|
||||||
|
(event) => {
|
||||||
|
if (event.origin !== "https://auth.hectabit.org/rsakeyshare") return;
|
||||||
|
localStorage.setItem("DONOTSHARE-rsakey", message)
|
||||||
|
},
|
||||||
|
false,
|
||||||
|
);
|
||||||
|
```
|
||||||
|
Please use this on client-side only, to maintain security and E2EE best practices.
|
||||||
|
|
||||||
|
### POST - /api/uniqueid
|
||||||
|
Provide "access_token"
|
||||||
|
|
||||||
|
Returns a ID unique to the user in this format:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"uniqueid": "(random string)"
|
||||||
|
}
|
||||||
|
```
|
Reference in New Issue