forked from remote/oauth2
authhandler: Add support for 3-legged-OAuth
Added authhandler.go, which implements a TokenSource to support "three-legged OAuth 2.0" via a custom AuthorizationHandler. Added default_authhandler.go to provide a command line implementation for AuthorizationHandler.
This commit is contained in:
51
authhandler/authhandler.go
Normal file
51
authhandler/authhandler.go
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
// Copyright 2021 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Package authhandler implements a TokenSource to support
|
||||||
|
// "three-legged OAuth 2.0" via a custom AuthorizationHandler.
|
||||||
|
package authhandler
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
|
||||||
|
"golang.org/x/oauth2"
|
||||||
|
)
|
||||||
|
|
||||||
|
// AuthorizationHandler is a 3-legged-OAuth helper that
|
||||||
|
// prompts the user for OAuth consent at the specified Auth URL
|
||||||
|
// and returns an auth code and state upon approval.
|
||||||
|
type AuthorizationHandler func(string) (string, string, error)
|
||||||
|
|
||||||
|
// TokenSource returns an oauth2.TokenSource that fetches access tokens
|
||||||
|
// using 3-legged-OAuth flow.
|
||||||
|
//
|
||||||
|
// The provided oauth2.Config should be a full configuration containing AuthURL,
|
||||||
|
// TokenURL, and scope. An environment-specific AuthorizationHandler is used to
|
||||||
|
// obtain user consent.
|
||||||
|
//
|
||||||
|
// Per OAuth protocol, a unique "state" string should be sent and verified
|
||||||
|
// before exchanging auth code for OAuth token to prevent CSRF attacks.
|
||||||
|
func TokenSource(ctx context.Context, config *oauth2.Config, authHandler AuthorizationHandler, state string) oauth2.TokenSource {
|
||||||
|
return oauth2.ReuseTokenSource(nil, authHandlerSource{config: config, ctx: ctx, authHandler: authHandler, state: state})
|
||||||
|
}
|
||||||
|
|
||||||
|
type authHandlerSource struct {
|
||||||
|
ctx context.Context
|
||||||
|
config *oauth2.Config
|
||||||
|
authHandler AuthorizationHandler
|
||||||
|
state string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (source authHandlerSource) Token() (*oauth2.Token, error) {
|
||||||
|
url := source.config.AuthCodeURL(source.state)
|
||||||
|
code, state, err := source.authHandler(url)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if state == source.state {
|
||||||
|
return source.config.Exchange(source.ctx, code)
|
||||||
|
}
|
||||||
|
return nil, errors.New("State mismatch in 3-legged-OAuth flow.")
|
||||||
|
}
|
||||||
@@ -1,28 +1,32 @@
|
|||||||
// Copyright 2020 The Go Authors. All rights reserved.
|
// Copyright 2021 The Go Authors. All rights reserved.
|
||||||
// Use of this source code is governed by a BSD-style
|
// Use of this source code is governed by a BSD-style
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
package google
|
package authhandler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// RandomAuthorizationState generates a state via UUID generator.
|
|
||||||
func RandomAuthorizationState() string {
|
|
||||||
return uuid.New().String()
|
|
||||||
}
|
|
||||||
|
|
||||||
// DefaultAuthorizationHandler returns a command line auth handler
|
// DefaultAuthorizationHandler returns a command line auth handler
|
||||||
// that prints the auth URL on the console and prompts the user to
|
// that prints the auth URL on the console and prompts the user to
|
||||||
// authorize in the browser and paste the auth code back via stdin.
|
// authorize in the browser and paste the auth code back via stdin.
|
||||||
//
|
//
|
||||||
|
// Per OAuth protocol, a unique "state" string should be sent and verified
|
||||||
|
// before exchanging auth code for OAuth token to prevent CSRF attacks.
|
||||||
|
//
|
||||||
// For convenience, this handler returns a pre-configured state
|
// For convenience, this handler returns a pre-configured state
|
||||||
// instead of asking the user to additionally paste the state from
|
// instead of asking the user to additionally paste the state from
|
||||||
// the auth response. In order for this to work, the state
|
// the auth response. In order for this to work, the state
|
||||||
// configured here should match the one in the oauth2 AuthTokenURL.
|
// configured here must match the state used in authCodeURL.
|
||||||
|
//
|
||||||
|
// Usage example:
|
||||||
|
//
|
||||||
|
// state := uuid.New().String()
|
||||||
|
// tokenSource:= authhandler.TokenSource(ctx, conf
|
||||||
|
// authhandler.DefaultAuthorizationHandler(state), state)
|
||||||
|
// pubsubService, err := pubsub.NewService(ctx,
|
||||||
|
// option.WithTokenSource(tokenSource))
|
||||||
func DefaultAuthorizationHandler(state string) AuthorizationHandler {
|
func DefaultAuthorizationHandler(state string) AuthorizationHandler {
|
||||||
return func(authCodeURL string) (string, string, error) {
|
return func(authCodeURL string) (string, string, error) {
|
||||||
return defaultAuthorizationHandlerHelper(state, authCodeURL)
|
return defaultAuthorizationHandlerHelper(state, authCodeURL)
|
||||||
@@ -207,38 +207,3 @@ func (cs computeSource) Token() (*oauth2.Token, error) {
|
|||||||
"oauth2.google.serviceAccount": acct,
|
"oauth2.google.serviceAccount": acct,
|
||||||
}), nil
|
}), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthorizationHandler is a 3-legged-OAuth helper that
|
|
||||||
// prompts the user for OAuth consent at the specified Auth URL
|
|
||||||
// and returns an auth code and state upon approval.
|
|
||||||
type AuthorizationHandler func(string) (string, string, error)
|
|
||||||
|
|
||||||
// OAuthClientTokenSource returns an oauth2.TokenSource that fetches access tokens
|
|
||||||
// using 3-legged-OAuth workflow.
|
|
||||||
// The provided oauth2.Config should be a full configuration containing AuthURL,
|
|
||||||
// TokenURL, and scope.
|
|
||||||
// An environment-specific AuthorizationHandler is used to obtain user consent.
|
|
||||||
// Per OAuth protocol, a unique "state" string should be sent and verified
|
|
||||||
// before token exchange to prevent CSRF attacks.
|
|
||||||
func OAuthClientTokenSource(ctx context.Context, config *oauth2.Config, authHandler AuthorizationHandler, state string) oauth2.TokenSource {
|
|
||||||
return oauth2.ReuseTokenSource(nil, oauthClientSource{config: config, ctx: ctx, authHandler: authHandler, state: state})
|
|
||||||
}
|
|
||||||
|
|
||||||
type oauthClientSource struct {
|
|
||||||
ctx context.Context
|
|
||||||
config *oauth2.Config
|
|
||||||
authHandler AuthorizationHandler
|
|
||||||
state string
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ocs oauthClientSource) Token() (*oauth2.Token, error) {
|
|
||||||
url := ocs.config.AuthCodeURL(ocs.state)
|
|
||||||
code, state, err := ocs.authHandler(url)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
if state == ocs.state {
|
|
||||||
return ocs.config.Exchange(ocs.ctx, code)
|
|
||||||
}
|
|
||||||
return nil, errors.New("State mismatch in OAuth workflow.")
|
|
||||||
}
|
|
||||||
|
|||||||
Reference in New Issue
Block a user