All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.http4k.security.InsecureCookieBasedOAuthPersistence.kt Maven / Gradle / Ivy

package org.http4k.security

import org.http4k.core.Request
import org.http4k.core.Response
import org.http4k.core.Status.Companion.FORBIDDEN
import org.http4k.core.Uri
import org.http4k.core.cookie.Cookie
import org.http4k.core.cookie.cookie
import org.http4k.core.cookie.invalidateCookie
import org.http4k.security.openid.IdToken
import java.time.Clock
import java.time.Duration

/**
 * This is an example implementation which stores CSRF and AccessToken values in an INSECURE client-side cookie.
 * Access-tokens for end-services are fully available to the browser so do not use this in production!
 */
class InsecureCookieBasedOAuthPersistence(
    cookieNamePrefix: String,
    private val cookieValidity: Duration = Duration.ofDays(1),
    private val clock: Clock = Clock.systemUTC()
) : OAuthPersistence {

    private val csrfName = "${cookieNamePrefix}Csrf"
    private val nonceName = "${cookieNamePrefix}Nonce"
    private val originalUriName = "${cookieNamePrefix}OriginalUri"
    private val pkceChallengeCookieName = "${cookieNamePrefix}PkceChallenge"
    private val pkceVerifierCookieName = "${cookieNamePrefix}PkceVerifier"
    private val accessTokenCookieName = "${cookieNamePrefix}AccessToken"

    override fun retrieveCsrf(request: Request) =
        request.cookie(csrfName)?.value?.let(::CrossSiteRequestForgeryToken)

    override fun retrieveToken(request: Request): AccessToken? =
        request.cookie(accessTokenCookieName)?.value?.let { AccessToken(it) }

    override fun retrieveNonce(request: Request): Nonce? =
        request.cookie(nonceName)?.value?.let { Nonce(it) }

    override fun retrieveOriginalUri(request: Request): Uri? =
        request.cookie(originalUriName)?.value?.let { Uri.of(it) }

    override fun retrievePkce(request: Request): PkceChallengeAndVerifier? {
        return PkceChallengeAndVerifier(
            challenge = request.cookie(pkceChallengeCookieName)?.value ?: return null,
            verifier = request.cookie(pkceVerifierCookieName)?.value ?: return null
        )
    }

    override fun assignCsrf(redirect: Response, csrf: CrossSiteRequestForgeryToken) =
        redirect.cookie(expiring(csrfName, csrf.value))

    override fun assignToken(request: Request, redirect: Response, accessToken: AccessToken, idToken: IdToken?) =
        redirect.cookie(expiring(accessTokenCookieName, accessToken.value))
            .invalidateCookie(csrfName)
            .invalidateCookie(nonceName)
            .invalidateCookie(originalUriName)

    override fun assignNonce(redirect: Response, nonce: Nonce): Response =
        redirect.cookie(expiring(nonceName, nonce.value))

    override fun assignOriginalUri(redirect: Response, originalUri: Uri): Response =
        redirect.cookie(expiring(originalUriName, originalUri.toString()))

    override fun assignPkce(redirect: Response, pkce: PkceChallengeAndVerifier): Response =
        redirect.cookie(expiring(pkceChallengeCookieName, pkce.challenge))
            .cookie(expiring(pkceVerifierCookieName, pkce.verifier))

    override fun authFailureResponse(reason: OAuthCallbackError) =
        Response(FORBIDDEN)
            .invalidateCookie(csrfName)
            .invalidateCookie(accessTokenCookieName)
            .invalidateCookie(nonceName)
            .invalidateCookie(originalUriName)

    private fun expiring(name: String, value: String) =
        Cookie(name, value, expires = clock.instant().plus(cookieValidity), path = "/")
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy