1 | /* |
2 | * librdkafka - The Apache Kafka C/C++ library |
3 | * |
4 | * Copyright (c) 2019 Magnus Edenhill |
5 | * All rights reserved. |
6 | * |
7 | * Redistribution and use in source and binary forms, with or without |
8 | * modification, are permitted provided that the following conditions are met: |
9 | * |
10 | * 1. Redistributions of source code must retain the above copyright notice, |
11 | * this list of conditions and the following disclaimer. |
12 | * 2. Redistributions in binary form must reproduce the above copyright notice, |
13 | * this list of conditions and the following disclaimer in the documentation |
14 | * and/or other materials provided with the distribution. |
15 | * |
16 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
17 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
18 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
19 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE |
20 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
21 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
22 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
23 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
24 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
25 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
26 | * POSSIBILITY OF SUCH DAMAGE. |
27 | */ |
28 | |
29 | |
30 | /** |
31 | * Builtin SASL OAUTHBEARER support |
32 | */ |
33 | #include "rdkafka_int.h" |
34 | #include "rdkafka_transport_int.h" |
35 | #include "rdkafka_sasl_int.h" |
36 | #include <openssl/evp.h> |
37 | #include "rdunittest.h" |
38 | |
39 | |
40 | |
41 | /** |
42 | * @struct Per-client-instance SASL/OAUTHBEARER handle. |
43 | */ |
44 | typedef struct rd_kafka_sasl_oauthbearer_handle_s { |
45 | /**< Read-write lock for fields in the handle. */ |
46 | rwlock_t lock; |
47 | |
48 | /**< The b64token value as defined in RFC 6750 Section 2.1 |
49 | * https://tools.ietf.org/html/rfc6750#section-2.1 |
50 | */ |
51 | char *token_value; |
52 | |
53 | /**< When the token expires, in terms of the number of |
54 | * milliseconds since the epoch. Wall clock time. |
55 | */ |
56 | rd_ts_t wts_md_lifetime; |
57 | |
58 | /**< The point after which this token should be replaced with a |
59 | * new one, in terms of the number of milliseconds since the |
60 | * epoch. Wall clock time. |
61 | */ |
62 | rd_ts_t wts_refresh_after; |
63 | |
64 | /**< When the last token refresh was equeued (0 = never) |
65 | * in terms of the number of milliseconds since the epoch. |
66 | * Wall clock time. |
67 | */ |
68 | rd_ts_t wts_enqueued_refresh; |
69 | |
70 | /**< The name of the principal to which this token applies. */ |
71 | char *md_principal_name; |
72 | |
73 | /**< The SASL extensions, as per RFC 7628 Section 3.1 |
74 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
75 | */ |
76 | rd_list_t extensions; /* rd_strtup_t list */ |
77 | |
78 | /**< Error message for validation and/or token retrieval problems. */ |
79 | char *errstr; |
80 | |
81 | /**< Back-pointer to client instance. */ |
82 | rd_kafka_t *rk; |
83 | |
84 | /**< Token refresh timer */ |
85 | rd_kafka_timer_t token_refresh_tmr; |
86 | |
87 | } rd_kafka_sasl_oauthbearer_handle_t; |
88 | |
89 | |
90 | /** |
91 | * @struct Unsecured JWS info populated when sasl.oauthbearer.config is parsed |
92 | */ |
93 | struct rd_kafka_sasl_oauthbearer_parsed_ujws { |
94 | char *principal_claim_name; |
95 | char *principal; |
96 | char *scope_claim_name; |
97 | char *scope_csv_text; |
98 | int life_seconds; |
99 | rd_list_t extensions; /* rd_strtup_t list */ |
100 | }; |
101 | |
102 | /** |
103 | * @struct Unsecured JWS token to be set on the client handle |
104 | */ |
105 | struct rd_kafka_sasl_oauthbearer_token { |
106 | char *token_value; |
107 | int64_t md_lifetime_ms; |
108 | char *md_principal_name; |
109 | char **extensions; |
110 | size_t extension_size; |
111 | }; |
112 | |
113 | /** |
114 | * @brief Per-connection state |
115 | */ |
116 | struct rd_kafka_sasl_oauthbearer_state { |
117 | enum { |
118 | RD_KAFKA_SASL_OAUTHB_STATE_SEND_CLIENT_FIRST_MESSAGE, |
119 | RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_FIRST_MSG, |
120 | RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_MSG_AFTER_FAIL, |
121 | } state; |
122 | char * server_error_msg; |
123 | |
124 | /* |
125 | * A place to store a consistent view of the token and extensions |
126 | * throughout the authentication process -- even if it is refreshed |
127 | * midway through this particular authentication. |
128 | */ |
129 | char *token_value; |
130 | char *md_principal_name; |
131 | rd_list_t extensions; /* rd_strtup_t list */ |
132 | }; |
133 | |
134 | |
135 | |
136 | /** |
137 | * @brief free memory inside the given token |
138 | */ |
139 | static void rd_kafka_sasl_oauthbearer_token_free ( |
140 | struct rd_kafka_sasl_oauthbearer_token *token) { |
141 | size_t i; |
142 | |
143 | RD_IF_FREE(token->token_value, rd_free); |
144 | RD_IF_FREE(token->md_principal_name, rd_free); |
145 | |
146 | for (i = 0 ; i < token->extension_size ; i++) |
147 | rd_free(token->extensions[i]); |
148 | |
149 | RD_IF_FREE(token->extensions, rd_free); |
150 | |
151 | memset(token, 0, sizeof(*token)); |
152 | } |
153 | |
154 | |
155 | /** |
156 | * @brief Op callback for RD_KAFKA_OP_OAUTHBEARER_REFRESH |
157 | * |
158 | * @locality Application thread |
159 | */ |
160 | static rd_kafka_op_res_t |
161 | rd_kafka_oauthbearer_refresh_op (rd_kafka_t *rk, |
162 | rd_kafka_q_t *rkq, |
163 | rd_kafka_op_t *rko) { |
164 | /* The op callback is invoked when the op is destroyed via |
165 | * rd_kafka_op_destroy() or rd_kafka_event_destroy(), so |
166 | * make sure we don't refresh upon destruction since |
167 | * the op has already been handled by this point. |
168 | */ |
169 | if (rko->rko_err != RD_KAFKA_RESP_ERR__DESTROY && |
170 | rk->rk_conf.sasl.oauthbearer_token_refresh_cb) |
171 | rk->rk_conf.sasl.oauthbearer_token_refresh_cb( |
172 | rk, rk->rk_conf.sasl.oauthbearer_config, |
173 | rk->rk_conf.opaque); |
174 | return RD_KAFKA_OP_RES_HANDLED; |
175 | } |
176 | |
177 | /** |
178 | * @brief Enqueue a token refresh. |
179 | * @locks rwlock_wrlock(&handle->lock) MUST be held |
180 | */ |
181 | static void rd_kafka_oauthbearer_enqueue_token_refresh ( |
182 | rd_kafka_sasl_oauthbearer_handle_t *handle) { |
183 | rd_kafka_op_t *rko; |
184 | |
185 | rko = rd_kafka_op_new_cb(handle->rk, RD_KAFKA_OP_OAUTHBEARER_REFRESH, |
186 | rd_kafka_oauthbearer_refresh_op); |
187 | rd_kafka_op_set_prio(rko, RD_KAFKA_PRIO_FLASH); |
188 | handle->wts_enqueued_refresh = rd_uclock(); |
189 | rd_kafka_q_enq(handle->rk->rk_rep, rko); |
190 | } |
191 | |
192 | /** |
193 | * @brief Enqueue a token refresh if necessary. |
194 | * |
195 | * The method rd_kafka_oauthbearer_enqueue_token_refresh() is invoked |
196 | * if necessary; the required lock is acquired and released. This method |
197 | * returns immediately when SASL/OAUTHBEARER is not in use by the client. |
198 | */ |
199 | static void |
200 | rd_kafka_oauthbearer_enqueue_token_refresh_if_necessary ( |
201 | rd_kafka_sasl_oauthbearer_handle_t *handle) { |
202 | rd_ts_t now_wallclock; |
203 | |
204 | now_wallclock = rd_uclock(); |
205 | |
206 | rwlock_wrlock(&handle->lock); |
207 | if (handle->wts_refresh_after < now_wallclock && |
208 | handle->wts_enqueued_refresh <= handle->wts_refresh_after) |
209 | /* Refresh required and not yet scheduled; refresh it */ |
210 | rd_kafka_oauthbearer_enqueue_token_refresh(handle); |
211 | rwlock_wrunlock(&handle->lock); |
212 | } |
213 | |
214 | /** |
215 | * @returns \c rd_true if SASL/OAUTHBEARER is the configured authentication |
216 | * mechanism and a token is available, otherwise \c rd_false. |
217 | * |
218 | * @locks none |
219 | * @locality any |
220 | */ |
221 | static rd_bool_t |
222 | rd_kafka_oauthbearer_has_token (rd_kafka_sasl_oauthbearer_handle_t *handle) { |
223 | rd_bool_t retval_has_token; |
224 | |
225 | rwlock_rdlock(&handle->lock); |
226 | retval_has_token = handle->token_value != NULL; |
227 | rwlock_rdunlock(&handle->lock); |
228 | |
229 | return retval_has_token; |
230 | } |
231 | |
232 | /** |
233 | * @brief Verify that the provided \p key is valid. |
234 | * @returns 0 on success or -1 if \p key is invalid. |
235 | */ |
236 | static int check_oauthbearer_extension_key (const char *key, |
237 | char *errstr, size_t errstr_size) { |
238 | const char *c; |
239 | |
240 | if (!strcmp(key, "auth" )) { |
241 | rd_snprintf(errstr, errstr_size, |
242 | "Cannot explicitly set the reserved `auth` " |
243 | "SASL/OAUTHBEARER extension key" ); |
244 | return -1; |
245 | } |
246 | |
247 | /* |
248 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
249 | * key = 1*(ALPHA) |
250 | * |
251 | * https://tools.ietf.org/html/rfc5234#appendix-B.1 |
252 | * ALPHA = %x41-5A / %x61-7A ; A-Z / a-z |
253 | */ |
254 | if (!*key) { |
255 | rd_snprintf(errstr, errstr_size, |
256 | "SASL/OAUTHBEARER extension keys " |
257 | "must not be empty" ); |
258 | return -1; |
259 | } |
260 | |
261 | for (c = key ; *c ; c++) { |
262 | if (!(*c >= 'A' && *c <= 'Z') && !(*c >= 'a' && *c <= 'z')) { |
263 | rd_snprintf(errstr, errstr_size, |
264 | "SASL/OAUTHBEARER extension keys must " |
265 | "only consist of A-Z or " |
266 | "a-z characters: %s (%c)" , |
267 | key, *c); |
268 | return -1; |
269 | } |
270 | } |
271 | |
272 | return 0; |
273 | } |
274 | |
275 | /** |
276 | * @brief Verify that the provided \p value is valid. |
277 | * @returns 0 on success or -1 if \p value is invalid. |
278 | */ |
279 | static int |
280 | check_oauthbearer_extension_value (const char *value, |
281 | char *errstr, size_t errstr_size) { |
282 | const char *c; |
283 | |
284 | /* |
285 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
286 | * value = *(VCHAR / SP / HTAB / CR / LF ) |
287 | * |
288 | * https://tools.ietf.org/html/rfc5234#appendix-B.1 |
289 | * VCHAR = %x21-7E ; visible (printing) characters |
290 | * SP = %x20 ; space |
291 | * HTAB = %x09 ; horizontal tab |
292 | * CR = %x0D ; carriage return |
293 | * LF = %x0A ; linefeed |
294 | */ |
295 | for (c = value ; *c ; c++) { |
296 | if (!(*c >= '\x21' && *c <= '\x7E') && *c != '\x20' |
297 | && *c != '\x09' && *c != '\x0D' && *c != '\x0A') { |
298 | rd_snprintf(errstr, errstr_size, |
299 | "SASL/OAUTHBEARER extension values must " |
300 | "only consist of space, horizontal tab, " |
301 | "CR, LF, and " |
302 | "visible characters (%%x21-7E): %s (%c)" , |
303 | value, *c); |
304 | return -1; |
305 | } |
306 | } |
307 | |
308 | return 0; |
309 | } |
310 | |
311 | /** |
312 | * @brief Set SASL/OAUTHBEARER token and metadata |
313 | * |
314 | * @param rk Client instance. |
315 | * @param token_value the mandatory token value to set, often (but not |
316 | * necessarily) a JWS compact serialization as per |
317 | * https://tools.ietf.org/html/rfc7515#section-3.1. |
318 | * Use rd_kafka_sasl_oauthbearer_token_free() to free members if |
319 | * return value is not -1. |
320 | * @param md_lifetime_ms when the token expires, in terms of the number of |
321 | * milliseconds since the epoch. See https://currentmillis.com/. |
322 | * @param md_principal_name the mandatory Kafka principal name associated |
323 | * with the token. |
324 | * @param extensions optional SASL extensions key-value array with |
325 | * \p extensions_size elements (number of keys * 2), where [i] is the key and |
326 | * [i+1] is the key's value, to be communicated to the broker |
327 | * as additional key-value pairs during the initial client response as per |
328 | * https://tools.ietf.org/html/rfc7628#section-3.1. |
329 | * @param extension_size the number of SASL extension keys plus values, |
330 | * which should be a non-negative multiple of 2. |
331 | * |
332 | * The SASL/OAUTHBEARER token refresh callback or event handler should cause |
333 | * this method to be invoked upon success, via |
334 | * rd_kafka_oauthbearer_set_token(). The extension keys must not include the |
335 | * reserved key "`auth`", and all extension keys and values must conform to the |
336 | * required format as per https://tools.ietf.org/html/rfc7628#section-3.1: |
337 | * |
338 | * key = 1*(ALPHA) |
339 | * value = *(VCHAR / SP / HTAB / CR / LF ) |
340 | * |
341 | * @returns \c RD_KAFKA_RESP_ERR_NO_ERROR on success, otherwise errstr set and: |
342 | * \c RD_KAFKA_RESP_ERR__INVALID_ARG if any of the arguments are |
343 | * invalid; |
344 | * \c RD_KAFKA_RESP_ERR__STATE if SASL/OAUTHBEARER is not configured as |
345 | * the client's authentication mechanism. |
346 | * |
347 | * @sa rd_kafka_oauthbearer_set_token_failure0 |
348 | */ |
349 | rd_kafka_resp_err_t |
350 | rd_kafka_oauthbearer_set_token0 (rd_kafka_t *rk, |
351 | const char *token_value, |
352 | int64_t md_lifetime_ms, |
353 | const char *md_principal_name, |
354 | const char **extensions, |
355 | size_t extension_size, |
356 | char *errstr, size_t errstr_size) { |
357 | rd_kafka_sasl_oauthbearer_handle_t *handle = rk->rk_sasl.handle; |
358 | size_t i; |
359 | rd_ts_t now_wallclock; |
360 | rd_ts_t wts_md_lifetime = md_lifetime_ms * 1000; |
361 | |
362 | /* Check if SASL/OAUTHBEARER is the configured auth mechanism */ |
363 | if (rk->rk_conf.sasl.provider != &rd_kafka_sasl_oauthbearer_provider || |
364 | !handle) { |
365 | rd_snprintf(errstr, errstr_size, "SASL/OAUTHBEARER is not the " |
366 | "configured authentication mechanism" ); |
367 | return RD_KAFKA_RESP_ERR__STATE; |
368 | } |
369 | |
370 | /* Check if there is an odd number of extension keys + values */ |
371 | if (extension_size & 1) { |
372 | rd_snprintf(errstr, errstr_size, "Incorrect extension size " |
373 | "(must be a non-negative multiple of 2): %" PRIusz, |
374 | extension_size); |
375 | return RD_KAFKA_RESP_ERR__INVALID_ARG; |
376 | } |
377 | |
378 | /* Check args for correct format/value */ |
379 | now_wallclock = rd_uclock(); |
380 | if (wts_md_lifetime <= now_wallclock) { |
381 | rd_snprintf(errstr, errstr_size, |
382 | "Must supply an unexpired token: " |
383 | "now=%" PRId64"ms, exp=%" PRId64"ms" , |
384 | now_wallclock/1000, wts_md_lifetime/1000); |
385 | return RD_KAFKA_RESP_ERR__INVALID_ARG; |
386 | } |
387 | |
388 | if (check_oauthbearer_extension_value(token_value, errstr, |
389 | errstr_size) == -1) |
390 | return RD_KAFKA_RESP_ERR__INVALID_ARG; |
391 | |
392 | for (i = 0; i + 1 < extension_size; i += 2) { |
393 | if (check_oauthbearer_extension_key(extensions[i], errstr, |
394 | errstr_size) == -1 || |
395 | check_oauthbearer_extension_value(extensions[i + 1], |
396 | errstr, |
397 | errstr_size) == -1) |
398 | return RD_KAFKA_RESP_ERR__INVALID_ARG; |
399 | } |
400 | |
401 | rwlock_wrlock(&handle->lock); |
402 | |
403 | RD_IF_FREE(handle->md_principal_name, rd_free); |
404 | handle->md_principal_name = rd_strdup(md_principal_name); |
405 | |
406 | RD_IF_FREE(handle->token_value, rd_free); |
407 | handle->token_value = rd_strdup(token_value); |
408 | |
409 | handle->wts_md_lifetime = wts_md_lifetime; |
410 | |
411 | /* Schedule a refresh 80% through its remaining lifetime */ |
412 | handle->wts_refresh_after = |
413 | (rd_ts_t)(now_wallclock + 0.8 * |
414 | (wts_md_lifetime - now_wallclock)); |
415 | |
416 | rd_list_clear(&handle->extensions); |
417 | for (i = 0; i + 1 < extension_size; i += 2) |
418 | rd_list_add(&handle->extensions, |
419 | rd_strtup_new(extensions[i], extensions[i + 1])); |
420 | |
421 | RD_IF_FREE(handle->errstr, rd_free); |
422 | handle->errstr = NULL; |
423 | |
424 | rwlock_wrunlock(&handle->lock); |
425 | |
426 | rd_kafka_dbg(rk, SECURITY, "BRKMAIN" , |
427 | "Waking up waiting broker threads after " |
428 | "setting OAUTHBEARER token" ); |
429 | rd_kafka_all_brokers_wakeup(rk, RD_KAFKA_BROKER_STATE_TRY_CONNECT); |
430 | |
431 | return RD_KAFKA_RESP_ERR_NO_ERROR; |
432 | } |
433 | |
434 | /** |
435 | * @brief SASL/OAUTHBEARER token refresh failure indicator. |
436 | * |
437 | * @param rk Client instance. |
438 | * @param errstr mandatory human readable error reason for failing to acquire |
439 | * a token. |
440 | * |
441 | * The SASL/OAUTHBEARER token refresh callback or event handler should cause |
442 | * this method to be invoked upon failure, via |
443 | * rd_kafka_oauthbearer_set_token_failure(). |
444 | * |
445 | * @returns \c RD_KAFKA_RESP_ERR_NO_ERROR on success, otherwise |
446 | * \c RD_KAFKA_RESP_ERR__STATE if SASL/OAUTHBEARER is enabled but is |
447 | * not configured to be the client's authentication mechanism, |
448 | * \c RD_KAFKA_RESP_ERR__INVALID_ARG if no error string is supplied. |
449 | |
450 | * @sa rd_kafka_oauthbearer_set_token0 |
451 | */ |
452 | rd_kafka_resp_err_t |
453 | rd_kafka_oauthbearer_set_token_failure0 (rd_kafka_t *rk, const char *errstr) { |
454 | rd_kafka_sasl_oauthbearer_handle_t *handle = rk->rk_sasl.handle; |
455 | rd_bool_t error_changed; |
456 | |
457 | /* Check if SASL/OAUTHBEARER is the configured auth mechanism */ |
458 | if (rk->rk_conf.sasl.provider != &rd_kafka_sasl_oauthbearer_provider || |
459 | !handle) |
460 | return RD_KAFKA_RESP_ERR__STATE; |
461 | |
462 | if (!errstr || !*errstr) |
463 | return RD_KAFKA_RESP_ERR__INVALID_ARG; |
464 | |
465 | rwlock_wrlock(&handle->lock); |
466 | error_changed = !handle->errstr || |
467 | strcmp(handle->errstr, errstr); |
468 | RD_IF_FREE(handle->errstr, rd_free); |
469 | handle->errstr = rd_strdup(errstr); |
470 | /* Leave any existing token because it may have some life left, |
471 | * schedule a refresh for 10 seconds later. */ |
472 | handle->wts_refresh_after = rd_uclock() + (10*1000*1000); |
473 | rwlock_wrunlock(&handle->lock); |
474 | |
475 | /* Trigger an ERR__AUTHENTICATION error if the error changed. */ |
476 | if (error_changed) |
477 | rd_kafka_op_err(rk, RD_KAFKA_RESP_ERR__AUTHENTICATION, |
478 | "Failed to acquire SASL OAUTHBEARER token: %s" , |
479 | errstr); |
480 | |
481 | return RD_KAFKA_RESP_ERR_NO_ERROR; |
482 | } |
483 | |
484 | /** |
485 | * @brief Parse a config value from the string pointed to by \p loc and starting |
486 | * with the given \p prefix and ending with the given \p value_end_char, storing |
487 | * the newly-allocated memory result in the string pointed to by \p value. |
488 | * @returns -1 if string pointed to by \p value is non-empty (\p errstr set, no |
489 | * memory allocated), else 0 (caller must free allocated memory). |
490 | */ |
491 | static int |
492 | parse_ujws_config_value_for_prefix (char **loc, |
493 | const char *prefix, |
494 | const char value_end_char, |
495 | char **value, |
496 | char *errstr, size_t errstr_size) { |
497 | if (*value) { |
498 | rd_snprintf(errstr, errstr_size, |
499 | "Invalid sasl.oauthbearer.config: " |
500 | "multiple '%s' entries" , |
501 | prefix); |
502 | return -1; |
503 | } |
504 | |
505 | *loc += strlen(prefix); |
506 | *value = *loc; |
507 | while (**loc != '\0' && **loc != value_end_char) |
508 | ++*loc; |
509 | |
510 | if (**loc == value_end_char) { |
511 | /* End the string and skip the character */ |
512 | **loc = '\0'; |
513 | ++*loc; |
514 | } |
515 | |
516 | /* return new allocated memory */ |
517 | *value = rd_strdup(*value); |
518 | |
519 | return 0; |
520 | } |
521 | |
522 | /* |
523 | * @brief Parse Unsecured JWS config, allocates strings that must be freed |
524 | * @param cfg the config to parse (typically from `sasl.oauthbearer.config`) |
525 | * @param parsed holds the parsed output; it must be all zeros to start. |
526 | * @returns -1 on failure (\p errstr set), else 0. |
527 | */ |
528 | static int |
529 | parse_ujws_config (const char *cfg, |
530 | struct rd_kafka_sasl_oauthbearer_parsed_ujws *parsed, |
531 | char *errstr, size_t errstr_size) { |
532 | /* |
533 | * Extensions: |
534 | * |
535 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
536 | * key = 1*(ALPHA) |
537 | * value = *(VCHAR / SP / HTAB / CR / LF ) |
538 | * |
539 | * https://tools.ietf.org/html/rfc5234#appendix-B.1 |
540 | * ALPHA = %x41-5A / %x61-7A ; A-Z / a-z |
541 | * VCHAR = %x21-7E ; visible (printing) characters |
542 | * SP = %x20 ; space |
543 | * HTAB = %x09 ; horizontal tab |
544 | * CR = %x0D ; carriage return |
545 | * LF = %x0A ; linefeed |
546 | */ |
547 | |
548 | static const char *prefix_principal_claim_name = "principalClaimName=" ; |
549 | static const char *prefix_principal = "principal=" ; |
550 | static const char *prefix_scope_claim_name = "scopeClaimName=" ; |
551 | static const char *prefix_scope = "scope=" ; |
552 | static const char *prefix_life_seconds = "lifeSeconds=" ; |
553 | static const char *prefix_extension = "extension_" ; |
554 | |
555 | char *cfg_copy = rd_strdup(cfg); |
556 | char *loc = cfg_copy; |
557 | int r = 0; |
558 | |
559 | while (*loc != '\0' && !r) { |
560 | if (*loc == ' ') |
561 | ++loc; |
562 | else if (!strncmp(prefix_principal_claim_name, loc, |
563 | strlen(prefix_principal_claim_name))) { |
564 | r = parse_ujws_config_value_for_prefix( |
565 | &loc, |
566 | prefix_principal_claim_name, ' ', |
567 | &parsed->principal_claim_name, |
568 | errstr, errstr_size); |
569 | |
570 | if (!r && !*parsed->principal_claim_name) { |
571 | rd_snprintf(errstr, errstr_size, |
572 | "Invalid sasl.oauthbearer.config: " |
573 | "empty '%s'" , |
574 | prefix_principal_claim_name); |
575 | r = -1; |
576 | } |
577 | |
578 | } else if (!strncmp(prefix_principal, loc, |
579 | strlen(prefix_principal))) { |
580 | r = parse_ujws_config_value_for_prefix( |
581 | &loc, |
582 | prefix_principal, ' ', &parsed->principal, |
583 | errstr, errstr_size); |
584 | |
585 | if (!r && !*parsed->principal) { |
586 | rd_snprintf(errstr, errstr_size, |
587 | "Invalid sasl.oauthbearer.config: " |
588 | "empty '%s'" , |
589 | prefix_principal); |
590 | r = -1; |
591 | } |
592 | |
593 | } else if (!strncmp(prefix_scope_claim_name, loc, |
594 | strlen(prefix_scope_claim_name))) { |
595 | r = parse_ujws_config_value_for_prefix( |
596 | &loc, |
597 | prefix_scope_claim_name, ' ', |
598 | &parsed->scope_claim_name, |
599 | errstr, errstr_size); |
600 | |
601 | if (!r && !*parsed->scope_claim_name) { |
602 | rd_snprintf(errstr, errstr_size, |
603 | "Invalid sasl.oauthbearer.config: " |
604 | "empty '%s'" , |
605 | prefix_scope_claim_name); |
606 | r = -1; |
607 | } |
608 | |
609 | } else if (!strncmp(prefix_scope, loc, strlen(prefix_scope))) { |
610 | r = parse_ujws_config_value_for_prefix( |
611 | &loc, |
612 | prefix_scope, ' ', &parsed->scope_csv_text, |
613 | errstr, errstr_size); |
614 | |
615 | if (!r && !*parsed->scope_csv_text) { |
616 | rd_snprintf(errstr, errstr_size, |
617 | "Invalid sasl.oauthbearer.config: " |
618 | "empty '%s'" , |
619 | prefix_scope); |
620 | r = -1; |
621 | } |
622 | |
623 | } else if (!strncmp(prefix_life_seconds, loc, |
624 | strlen(prefix_life_seconds))) { |
625 | char *life_seconds_text = NULL; |
626 | |
627 | r = parse_ujws_config_value_for_prefix( |
628 | &loc, |
629 | prefix_life_seconds, ' ', &life_seconds_text, |
630 | errstr, errstr_size); |
631 | |
632 | if (!r && !*life_seconds_text) { |
633 | rd_snprintf(errstr, errstr_size, |
634 | "Invalid " |
635 | "sasl.oauthbearer.config: " |
636 | "empty '%s'" , |
637 | prefix_life_seconds); |
638 | r = -1; |
639 | } else if (!r) { |
640 | long long life_seconds_long; |
641 | char *end_ptr; |
642 | life_seconds_long = strtoll( |
643 | life_seconds_text, &end_ptr, 10); |
644 | if (*end_ptr != '\0') { |
645 | rd_snprintf(errstr, errstr_size, |
646 | "Invalid " |
647 | "sasl.oauthbearer.config: " |
648 | "non-integral '%s': %s" , |
649 | prefix_life_seconds, |
650 | life_seconds_text); |
651 | r = -1; |
652 | } else if (life_seconds_long <= 0 || |
653 | life_seconds_long > INT_MAX) { |
654 | rd_snprintf(errstr, errstr_size, |
655 | "Invalid " |
656 | "sasl.oauthbearer.config: " |
657 | "value out of range of " |
658 | "positive int '%s': %s" , |
659 | prefix_life_seconds, |
660 | life_seconds_text); |
661 | r = -1; |
662 | } else { |
663 | parsed->life_seconds = |
664 | (int)life_seconds_long; |
665 | } |
666 | } |
667 | |
668 | RD_IF_FREE(life_seconds_text, rd_free); |
669 | |
670 | } else if (!strncmp(prefix_extension, loc, |
671 | strlen(prefix_extension))) { |
672 | char *extension_key = NULL; |
673 | |
674 | r = parse_ujws_config_value_for_prefix( |
675 | &loc, |
676 | prefix_extension, '=', &extension_key, errstr, |
677 | errstr_size); |
678 | |
679 | if (!r && !*extension_key) { |
680 | rd_snprintf(errstr, errstr_size, |
681 | "Invalid " |
682 | "sasl.oauthbearer.config: " |
683 | "empty '%s' key" , |
684 | prefix_extension); |
685 | r = -1; |
686 | } else if (!r) { |
687 | char *extension_value = NULL; |
688 | r = parse_ujws_config_value_for_prefix( |
689 | &loc, "" , ' ', &extension_value, |
690 | errstr, errstr_size); |
691 | if (!r) { |
692 | rd_list_add(&parsed->extensions, |
693 | rd_strtup_new( |
694 | extension_key, |
695 | extension_value)); |
696 | rd_free(extension_value); |
697 | } |
698 | } |
699 | |
700 | RD_IF_FREE(extension_key, rd_free); |
701 | |
702 | } else { |
703 | rd_snprintf(errstr, errstr_size, |
704 | "Unrecognized sasl.oauthbearer.config " |
705 | "beginning at: %s" , |
706 | loc); |
707 | r = -1; |
708 | } |
709 | } |
710 | |
711 | rd_free(cfg_copy); |
712 | |
713 | return r; |
714 | } |
715 | |
716 | /** |
717 | * @brief Create unsecured JWS compact serialization |
718 | * from the given information. |
719 | * @returns allocated memory that the caller must free. |
720 | */ |
721 | static char *create_jws_compact_serialization ( |
722 | const struct rd_kafka_sasl_oauthbearer_parsed_ujws *parsed, |
723 | rd_ts_t now_wallclock) { |
724 | static const char * = |
725 | "eyJhbGciOiJub25lIn0" ; // {"alg":"none"} |
726 | int scope_json_length = 0; |
727 | int max_json_length; |
728 | double now_wallclock_seconds; |
729 | char *scope_json; |
730 | char *scope_curr; |
731 | int i; |
732 | char *claims_json; |
733 | char *jws_claims; |
734 | size_t encode_len; |
735 | char *jws_last_char; |
736 | char *jws_maybe_non_url_char; |
737 | char *retval_jws; |
738 | size_t retval_size; |
739 | rd_list_t scope; |
740 | |
741 | rd_list_init(&scope, 0, rd_free); |
742 | if (parsed->scope_csv_text) { |
743 | /* Convert from csv to rd_list_t and |
744 | * calculate json length. */ |
745 | char *start = parsed->scope_csv_text; |
746 | char *curr = start; |
747 | |
748 | while (*curr != '\0') { |
749 | /* Ignore empty elements (e.g. ",,") */ |
750 | while (*curr != '\0' && *curr == ',') { |
751 | ++curr; |
752 | ++start; |
753 | } |
754 | |
755 | while (*curr != '\0' && *curr != ',') |
756 | ++curr; |
757 | |
758 | if (curr == start) |
759 | continue; |
760 | |
761 | if (*curr == ',') { |
762 | *curr = '\0'; |
763 | ++curr; |
764 | } |
765 | |
766 | if (!rd_list_find(&scope, start, (void *)strcmp)) |
767 | rd_list_add(&scope, |
768 | rd_strdup(start)); |
769 | |
770 | if (scope_json_length == 0) { |
771 | scope_json_length = 2 + // ," |
772 | (int)strlen(parsed->scope_claim_name) + |
773 | 4 + // ":[" |
774 | (int)strlen(start) + |
775 | 1 + // " |
776 | 1; // ] |
777 | } else { |
778 | scope_json_length += 2; // ," |
779 | scope_json_length += (int)strlen(start); |
780 | scope_json_length += 1; // " |
781 | } |
782 | |
783 | start = curr; |
784 | } |
785 | } |
786 | |
787 | now_wallclock_seconds = now_wallclock / 1000000.0; |
788 | |
789 | /* Generate json */ |
790 | max_json_length = 2 + // {" |
791 | (int)strlen(parsed->principal_claim_name) + |
792 | 3 + // ":" |
793 | (int)strlen(parsed->principal) + |
794 | 8 + // ","iat": |
795 | 14 + // iat NumericDate (e.g. 1549251467.546) |
796 | 7 + // ,"exp": |
797 | 14 + // exp NumericDate (e.g. 1549252067.546) |
798 | scope_json_length + |
799 | 1; // } |
800 | |
801 | /* Generate scope portion of json */ |
802 | scope_json = rd_malloc(scope_json_length + 1); |
803 | *scope_json = '\0'; |
804 | scope_curr = scope_json; |
805 | |
806 | for (i = 0; i < rd_list_cnt(&scope); i++) { |
807 | if (i == 0) |
808 | scope_curr += rd_snprintf(scope_curr, |
809 | (size_t)(scope_json |
810 | + scope_json_length |
811 | + 1 - scope_curr), |
812 | ",\"%s\":[\"" , |
813 | parsed->scope_claim_name); |
814 | else |
815 | scope_curr += sprintf(scope_curr, "%s" , ",\"" ); |
816 | scope_curr += sprintf(scope_curr, "%s\"" , |
817 | (const char *)rd_list_elem(&scope, i)); |
818 | if (i == rd_list_cnt(&scope) - 1) |
819 | scope_curr += sprintf(scope_curr, "%s" , "]" ); |
820 | } |
821 | |
822 | claims_json = rd_malloc(max_json_length + 1); |
823 | rd_snprintf(claims_json, max_json_length + 1, |
824 | "{\"%s\":\"%s\",\"iat\":%.3f,\"exp\":%.3f%s}" , |
825 | parsed->principal_claim_name, |
826 | parsed->principal, |
827 | now_wallclock_seconds, |
828 | now_wallclock_seconds + parsed->life_seconds, |
829 | scope_json); |
830 | rd_free(scope_json); |
831 | |
832 | /* Convert to base64URL format, first to base64, then to base64URL */ |
833 | retval_size = strlen(jose_header_encoded) + 1 + |
834 | (((max_json_length + 2) / 3) * 4) + 1 + 1; |
835 | retval_jws = rd_malloc(retval_size); |
836 | rd_snprintf(retval_jws, retval_size, "%s." , jose_header_encoded); |
837 | jws_claims = retval_jws + strlen(retval_jws); |
838 | encode_len = EVP_EncodeBlock((uint8_t *)jws_claims, |
839 | (uint8_t *)claims_json, |
840 | (int)strlen(claims_json)); |
841 | rd_free(claims_json); |
842 | jws_last_char = jws_claims + encode_len - 1; |
843 | |
844 | /* Convert from padded base64 to unpadded base64URL |
845 | * and eliminate any padding. */ |
846 | while (jws_last_char >= jws_claims && *jws_last_char == '=') |
847 | --jws_last_char; |
848 | *(++jws_last_char) = '.'; |
849 | *(jws_last_char + 1) = '\0'; |
850 | |
851 | /* Convert the 2 differing encode characters */ |
852 | for (jws_maybe_non_url_char = retval_jws; |
853 | *jws_maybe_non_url_char; jws_maybe_non_url_char++) |
854 | if (*jws_maybe_non_url_char == '+') |
855 | *jws_maybe_non_url_char = '-'; |
856 | else if (*jws_maybe_non_url_char == '/') |
857 | *jws_maybe_non_url_char = '_'; |
858 | |
859 | rd_list_destroy(&scope); |
860 | |
861 | return retval_jws; |
862 | } |
863 | |
864 | /** |
865 | * @brief Same as rd_kafka_oauthbearer_unsecured_token() except it takes |
866 | * additional explicit arguments and return a status code along with |
867 | * the token to set in order to facilitate unit testing. |
868 | * @param token output defining the token to set |
869 | * @param cfg the config to parse (typically from `sasl.oauthbearer.config`) |
870 | * @param now_wallclock_ms the valued to be used for the `iat` claim |
871 | * (and by implication, the `exp` claim) |
872 | * @returns -1 on failure (\p errstr set), else 0. |
873 | */ |
874 | static int |
875 | rd_kafka_oauthbearer_unsecured_token0 ( |
876 | struct rd_kafka_sasl_oauthbearer_token *token, |
877 | const char *cfg, |
878 | int64_t now_wallclock_ms, |
879 | char *errstr, size_t errstr_size) { |
880 | struct rd_kafka_sasl_oauthbearer_parsed_ujws parsed = |
881 | RD_ZERO_INIT; |
882 | int r; |
883 | int i; |
884 | |
885 | if (!cfg || !*cfg) { |
886 | rd_snprintf(errstr, errstr_size, |
887 | "Invalid sasl.oauthbearer.config: " |
888 | "must not be empty" ); |
889 | return -1; |
890 | } |
891 | |
892 | memset(token, 0, sizeof(*token)); |
893 | |
894 | rd_list_init(&parsed.extensions, 0, |
895 | (void (*)(void *))rd_strtup_destroy); |
896 | |
897 | if (!(r = parse_ujws_config(cfg, &parsed, errstr, errstr_size))) { |
898 | /* Make sure we have required and valid info */ |
899 | if (!parsed.principal_claim_name) |
900 | parsed.principal_claim_name = rd_strdup("sub" ); |
901 | if (!parsed.scope_claim_name) |
902 | parsed.scope_claim_name = rd_strdup("scope" ); |
903 | if (!parsed.life_seconds) |
904 | parsed.life_seconds = 3600; |
905 | if (!parsed.principal) { |
906 | rd_snprintf(errstr, errstr_size, |
907 | "Invalid sasl.oauthbearer.config: " |
908 | "no principal=<value>" ); |
909 | r = -1; |
910 | } else if (strchr(parsed.principal, '"')) { |
911 | rd_snprintf(errstr, errstr_size, |
912 | "Invalid sasl.oauthbearer.config: " |
913 | "'\"' cannot appear in principal: %s" , |
914 | parsed.principal); |
915 | r = -1; |
916 | } else if (strchr(parsed.principal_claim_name, '"')) { |
917 | rd_snprintf(errstr, errstr_size, |
918 | "Invalid sasl.oauthbearer.config: " |
919 | "'\"' cannot appear in " |
920 | "principalClaimName: %s" , |
921 | parsed.principal_claim_name); |
922 | r = -1; |
923 | } else if (strchr(parsed.scope_claim_name, '"')) { |
924 | rd_snprintf(errstr, errstr_size, |
925 | "Invalid sasl.oauthbearer.config: " |
926 | "'\"' cannot appear in scopeClaimName: %s" , |
927 | parsed.scope_claim_name); |
928 | r = -1; |
929 | } else if (parsed.scope_csv_text && |
930 | strchr(parsed.scope_csv_text, '"')) { |
931 | rd_snprintf(errstr, errstr_size, |
932 | "Invalid sasl.oauthbearer.config: " |
933 | "'\"' cannot appear in scope: %s" , |
934 | parsed.scope_csv_text); |
935 | r = -1; |
936 | } else { |
937 | char **extensionv; |
938 | int extension_pair_count; |
939 | char *jws = create_jws_compact_serialization( |
940 | &parsed, now_wallclock_ms * 1000); |
941 | |
942 | extension_pair_count = rd_list_cnt(&parsed.extensions); |
943 | extensionv = rd_malloc(sizeof(*extensionv) * 2 * |
944 | extension_pair_count); |
945 | for (i = 0; i < extension_pair_count; ++i) { |
946 | rd_strtup_t *strtup = (rd_strtup_t *) |
947 | rd_list_elem(&parsed.extensions, i); |
948 | extensionv[2*i] = rd_strdup(strtup->name); |
949 | extensionv[2*i+1] = rd_strdup(strtup->value); |
950 | } |
951 | token->token_value = jws; |
952 | token->md_lifetime_ms = now_wallclock_ms + |
953 | parsed.life_seconds * 1000; |
954 | token->md_principal_name = rd_strdup(parsed.principal); |
955 | token->extensions = extensionv; |
956 | token->extension_size = 2 * extension_pair_count; |
957 | } |
958 | } |
959 | RD_IF_FREE(parsed.principal_claim_name, rd_free); |
960 | RD_IF_FREE(parsed.principal, rd_free); |
961 | RD_IF_FREE(parsed.scope_claim_name, rd_free); |
962 | RD_IF_FREE(parsed.scope_csv_text, rd_free); |
963 | rd_list_destroy(&parsed.extensions); |
964 | |
965 | if (r == -1) |
966 | rd_kafka_sasl_oauthbearer_token_free(token); |
967 | |
968 | return r; |
969 | } |
970 | |
971 | /** |
972 | * @brief Default SASL/OAUTHBEARER token refresh callback that generates an |
973 | * unsecured JWS as per https://tools.ietf.org/html/rfc7515#appendix-A.5. |
974 | * |
975 | * This method interprets `sasl.oauthbearer.config` as space-separated |
976 | * name=value pairs with valid names including principalClaimName, |
977 | * principal, scopeClaimName, scope, and lifeSeconds. The default |
978 | * value for principalClaimName is "sub". The principal must be specified. |
979 | * The default value for scopeClaimName is "scope", and the default value |
980 | * for lifeSeconds is 3600. The scope value is CSV format with the |
981 | * default value being no/empty scope. For example: |
982 | * "principalClaimName=azp principal=admin scopeClaimName=roles |
983 | * scope=role1,role2 lifeSeconds=600". |
984 | * |
985 | * SASL extensions can be communicated to the broker via |
986 | * extension_<extensionname>=value. For example: |
987 | * "principal=admin extension_traceId=123". Extension names and values |
988 | * must comnform to the required syntax as per |
989 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
990 | * |
991 | * All values -- whether extensions, claim names, or scope elements -- must not |
992 | * include a quote (") character. The parsing rules also imply that names |
993 | * and values cannot include a space character, and scope elements cannot |
994 | * include a comma (,) character. |
995 | * |
996 | * The existence of any kind of parsing problem -- an unrecognized name, |
997 | * a quote character in a value, an empty value, etc. -- raises the |
998 | * \c RD_KAFKA_RESP_ERR__AUTHENTICATION event. |
999 | * |
1000 | * Unsecured tokens are not to be used in production -- they are only good for |
1001 | * testing and development purposess -- so while the inflexibility of the |
1002 | * parsing rules is acknowledged, it is assumed that this is not problematic. |
1003 | */ |
1004 | void |
1005 | rd_kafka_oauthbearer_unsecured_token (rd_kafka_t *rk, |
1006 | const char *oauthbearer_config, |
1007 | void *opaque) { |
1008 | char errstr[512]; |
1009 | struct rd_kafka_sasl_oauthbearer_token token = RD_ZERO_INIT; |
1010 | |
1011 | rd_kafka_dbg(rk, SECURITY, "OAUTHBEARER" , "Creating unsecured token" ); |
1012 | |
1013 | if (rd_kafka_oauthbearer_unsecured_token0( |
1014 | &token, oauthbearer_config, |
1015 | rd_uclock() / 1000, errstr, sizeof(errstr)) == -1 || |
1016 | rd_kafka_oauthbearer_set_token( |
1017 | rk, token.token_value, |
1018 | token.md_lifetime_ms, token.md_principal_name, |
1019 | (const char **)token.extensions, token.extension_size, |
1020 | errstr, sizeof(errstr)) == -1) { |
1021 | rd_kafka_oauthbearer_set_token_failure(rk, errstr); |
1022 | } |
1023 | |
1024 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1025 | } |
1026 | |
1027 | /** |
1028 | * @brief Close and free authentication state |
1029 | */ |
1030 | static void rd_kafka_sasl_oauthbearer_close (rd_kafka_transport_t *rktrans) { |
1031 | struct rd_kafka_sasl_oauthbearer_state *state = |
1032 | rktrans->rktrans_sasl.state; |
1033 | |
1034 | if (!state) |
1035 | return; |
1036 | |
1037 | RD_IF_FREE(state->server_error_msg, rd_free); |
1038 | rd_free(state->token_value); |
1039 | rd_free(state->md_principal_name); |
1040 | rd_list_destroy(&state->extensions); |
1041 | rd_free(state); |
1042 | } |
1043 | |
1044 | |
1045 | |
1046 | /** |
1047 | * @brief Build client-first-message |
1048 | */ |
1049 | static void |
1050 | rd_kafka_sasl_oauthbearer_build_client_first_message ( |
1051 | rd_kafka_transport_t *rktrans, |
1052 | rd_chariov_t *out) { |
1053 | struct rd_kafka_sasl_oauthbearer_state *state = |
1054 | rktrans->rktrans_sasl.state; |
1055 | |
1056 | /* |
1057 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
1058 | * kvsep = %x01 |
1059 | * key = 1*(ALPHA) |
1060 | * value = *(VCHAR / SP / HTAB / CR / LF ) |
1061 | * kvpair = key "=" value kvsep |
1062 | * ;;gs2-header = See RFC 5801 |
1063 | * client-resp = (gs2-header kvsep *kvpair kvsep) / kvsep |
1064 | */ |
1065 | |
1066 | static const char * = "n,," ; |
1067 | static const char *kvsep = "\x01" ; |
1068 | const int kvsep_size = (int)strlen(kvsep); |
1069 | int extension_size = 0; |
1070 | int i; |
1071 | char *buf; |
1072 | int size_written; |
1073 | unsigned long r; |
1074 | |
1075 | for (i = 0 ; i < rd_list_cnt(&state->extensions) ; i++) { |
1076 | rd_strtup_t *extension = rd_list_elem(&state->extensions, i); |
1077 | // kvpair = key "=" value kvsep |
1078 | extension_size += (int)strlen(extension->name) + 1 // "=" |
1079 | + (int)strlen(extension->value) + kvsep_size; |
1080 | } |
1081 | |
1082 | // client-resp = (gs2-header kvsep *kvpair kvsep) / kvsep |
1083 | out->size = strlen(gs2_header) + kvsep_size |
1084 | + strlen("auth=Bearer " ) + strlen(state->token_value) |
1085 | + kvsep_size + extension_size + kvsep_size; |
1086 | out->ptr = rd_malloc(out->size+1); |
1087 | |
1088 | buf = out->ptr; |
1089 | size_written = 0; |
1090 | r = rd_snprintf(buf, out->size+1 - size_written, |
1091 | "%s%sauth=Bearer %s%s" , |
1092 | gs2_header, kvsep, state->token_value, |
1093 | kvsep); |
1094 | rd_assert(r < out->size+1 - size_written); |
1095 | size_written += r; |
1096 | buf = out->ptr + size_written; |
1097 | |
1098 | for (i = 0 ; i < rd_list_cnt(&state->extensions) ; i++) { |
1099 | rd_strtup_t *extension = rd_list_elem(&state->extensions, i); |
1100 | r = rd_snprintf(buf, out->size+1 - size_written, |
1101 | "%s=%s%s" , |
1102 | extension->name, extension->value, kvsep); |
1103 | rd_assert(r < out->size+1 - size_written); |
1104 | size_written += r; |
1105 | buf = out->ptr + size_written; |
1106 | } |
1107 | |
1108 | r = rd_snprintf(buf, out->size+1 - size_written, "%s" , kvsep); |
1109 | rd_assert(r < out->size+1 - size_written); |
1110 | |
1111 | rd_rkb_dbg(rktrans->rktrans_rkb, SECURITY, "OAUTHBEARER" , |
1112 | "Built client first message" ); |
1113 | } |
1114 | |
1115 | |
1116 | |
1117 | /** |
1118 | * @brief SASL OAUTHBEARER client state machine |
1119 | * @returns -1 on failure (\p errstr set), else 0. |
1120 | */ |
1121 | static int rd_kafka_sasl_oauthbearer_fsm (rd_kafka_transport_t *rktrans, |
1122 | const rd_chariov_t *in, |
1123 | char *errstr, size_t errstr_size) { |
1124 | static const char *state_names[] = { |
1125 | "client-first-message" , |
1126 | "server-first-message" , |
1127 | "server-failure-message" , |
1128 | }; |
1129 | struct rd_kafka_sasl_oauthbearer_state *state = |
1130 | rktrans->rktrans_sasl.state; |
1131 | rd_chariov_t out = RD_ZERO_INIT; |
1132 | int r = -1; |
1133 | |
1134 | rd_rkb_dbg(rktrans->rktrans_rkb, SECURITY, "OAUTHBEARER" , |
1135 | "SASL OAUTHBEARER client in state %s" , |
1136 | state_names[state->state]); |
1137 | |
1138 | switch (state->state) |
1139 | { |
1140 | case RD_KAFKA_SASL_OAUTHB_STATE_SEND_CLIENT_FIRST_MESSAGE: |
1141 | rd_dassert(!in); /* Not expecting any server-input */ |
1142 | |
1143 | rd_kafka_sasl_oauthbearer_build_client_first_message(rktrans, |
1144 | &out); |
1145 | state->state = |
1146 | RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_FIRST_MSG; |
1147 | break; |
1148 | |
1149 | |
1150 | case RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_FIRST_MSG: |
1151 | if (!in->size || !*in->ptr) { |
1152 | /* Success */ |
1153 | rd_rkb_dbg(rktrans->rktrans_rkb, |
1154 | SECURITY | RD_KAFKA_DBG_BROKER, |
1155 | "OAUTHBEARER" , |
1156 | "SASL OAUTHBEARER authentication " |
1157 | "successful (principal=%s)" , |
1158 | state->md_principal_name); |
1159 | rd_kafka_sasl_auth_done(rktrans); |
1160 | r = 0; |
1161 | break; |
1162 | } |
1163 | |
1164 | /* Failure; save error message for later */ |
1165 | state->server_error_msg = rd_strndup(in->ptr, in->size); |
1166 | |
1167 | /* |
1168 | * https://tools.ietf.org/html/rfc7628#section-3.1 |
1169 | * kvsep = %x01 |
1170 | * client-resp = (gs2-header kvsep *kvpair kvsep) / kvsep |
1171 | * |
1172 | * Send final kvsep (CTRL-A) character |
1173 | */ |
1174 | out.size = 1; |
1175 | out.ptr = rd_malloc(out.size + 1); |
1176 | rd_snprintf(out.ptr, out.size+1, "\x01" ); |
1177 | state->state = |
1178 | RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_MSG_AFTER_FAIL; |
1179 | r = 0; // Will fail later in next state after sending response |
1180 | break; |
1181 | |
1182 | case RD_KAFKA_SASL_OAUTHB_STATE_RECV_SERVER_MSG_AFTER_FAIL: |
1183 | /* Failure as previosuly communicated by server first message */ |
1184 | rd_snprintf(errstr, errstr_size, |
1185 | "SASL OAUTHBEARER authentication failed " |
1186 | "(principal=%s): %s" , |
1187 | state->md_principal_name, |
1188 | state->server_error_msg); |
1189 | rd_rkb_dbg(rktrans->rktrans_rkb, SECURITY|RD_KAFKA_DBG_BROKER, |
1190 | "OAUTHBEARER" , "%s" , errstr); |
1191 | r = -1; |
1192 | break; |
1193 | } |
1194 | |
1195 | if (out.ptr) { |
1196 | r = rd_kafka_sasl_send(rktrans, out.ptr, (int)out.size, |
1197 | errstr, errstr_size); |
1198 | rd_free(out.ptr); |
1199 | } |
1200 | |
1201 | return r; |
1202 | } |
1203 | |
1204 | |
1205 | /** |
1206 | * @brief Handle received frame from broker. |
1207 | */ |
1208 | static int rd_kafka_sasl_oauthbearer_recv (rd_kafka_transport_t *rktrans, |
1209 | const void *buf, size_t size, |
1210 | char *errstr, size_t errstr_size) { |
1211 | const rd_chariov_t in = { .ptr = (char *)buf, .size = size }; |
1212 | return rd_kafka_sasl_oauthbearer_fsm(rktrans, &in, |
1213 | errstr, errstr_size); |
1214 | } |
1215 | |
1216 | |
1217 | /** |
1218 | * @brief Initialize and start SASL OAUTHBEARER (builtin) authentication. |
1219 | * |
1220 | * Returns 0 on successful init and -1 on error. |
1221 | * |
1222 | * @locality broker thread |
1223 | */ |
1224 | static int |
1225 | rd_kafka_sasl_oauthbearer_client_new (rd_kafka_transport_t *rktrans, |
1226 | const char *hostname, |
1227 | char *errstr, size_t errstr_size) { |
1228 | rd_kafka_sasl_oauthbearer_handle_t *handle = |
1229 | rktrans->rktrans_rkb->rkb_rk->rk_sasl.handle; |
1230 | struct rd_kafka_sasl_oauthbearer_state *state; |
1231 | |
1232 | state = rd_calloc(1, sizeof(*state)); |
1233 | state->state = RD_KAFKA_SASL_OAUTHB_STATE_SEND_CLIENT_FIRST_MESSAGE; |
1234 | |
1235 | /* |
1236 | * Save off the state structure now, before any possibility of |
1237 | * returning, so that we will always free up the allocated memory in |
1238 | * rd_kafka_sasl_oauthbearer_close(). |
1239 | */ |
1240 | rktrans->rktrans_sasl.state = state; |
1241 | |
1242 | /* |
1243 | * Make sure we have a consistent view of the token and extensions |
1244 | * throughout the authentication process -- even if it is refreshed |
1245 | * midway through this particular authentication. |
1246 | */ |
1247 | rwlock_rdlock(&handle->lock); |
1248 | if (!handle->token_value) { |
1249 | rd_snprintf(errstr, errstr_size, |
1250 | "OAUTHBEARER cannot log in because there " |
1251 | "is no token available; last error: %s" , |
1252 | handle->errstr ? |
1253 | handle->errstr : "(not available)" ); |
1254 | rwlock_rdunlock(&handle->lock); |
1255 | return -1; |
1256 | } |
1257 | |
1258 | state->token_value = rd_strdup(handle->token_value); |
1259 | state->md_principal_name = rd_strdup(handle->md_principal_name); |
1260 | rd_list_copy_to(&state->extensions, &handle->extensions, |
1261 | rd_strtup_list_copy, NULL); |
1262 | |
1263 | rwlock_rdunlock(&handle->lock); |
1264 | |
1265 | /* Kick off the FSM */ |
1266 | return rd_kafka_sasl_oauthbearer_fsm(rktrans, NULL, |
1267 | errstr, errstr_size); |
1268 | } |
1269 | |
1270 | |
1271 | /** |
1272 | * @brief Token refresh timer callback. |
1273 | * |
1274 | * @locality rdkafka main thread |
1275 | */ |
1276 | static void |
1277 | rd_kafka_sasl_oauthbearer_token_refresh_tmr_cb (rd_kafka_timers_t *rkts, |
1278 | void *arg) { |
1279 | rd_kafka_t *rk = arg; |
1280 | rd_kafka_sasl_oauthbearer_handle_t *handle = rk->rk_sasl.handle; |
1281 | |
1282 | /* Enqueue a token refresh if necessary */ |
1283 | rd_kafka_oauthbearer_enqueue_token_refresh_if_necessary(handle); |
1284 | } |
1285 | |
1286 | |
1287 | /** |
1288 | * @brief Per-client-instance initializer |
1289 | */ |
1290 | static int rd_kafka_sasl_oauthbearer_init (rd_kafka_t *rk, |
1291 | char *errstr, size_t errstr_size) { |
1292 | rd_kafka_sasl_oauthbearer_handle_t *handle; |
1293 | |
1294 | handle = rd_calloc(1, sizeof(*handle)); |
1295 | rk->rk_sasl.handle = handle; |
1296 | |
1297 | rwlock_init(&handle->lock); |
1298 | |
1299 | handle->rk = rk; |
1300 | |
1301 | rd_list_init(&handle->extensions, 0, |
1302 | (void (*)(void *))rd_strtup_destroy); |
1303 | |
1304 | rd_kafka_timer_start(&rk->rk_timers, &handle->token_refresh_tmr, |
1305 | 1 * 1000 * 1000, |
1306 | rd_kafka_sasl_oauthbearer_token_refresh_tmr_cb, |
1307 | rk); |
1308 | |
1309 | /* Automatically refresh the token if using the builtin |
1310 | * unsecure JWS token refresher, to avoid an initial connection |
1311 | * stall as we wait for the application to call poll(). |
1312 | * Otherwise enqueue a refresh callback for the application. */ |
1313 | if (rk->rk_conf.sasl.oauthbearer_token_refresh_cb == |
1314 | rd_kafka_oauthbearer_unsecured_token) |
1315 | rk->rk_conf.sasl.oauthbearer_token_refresh_cb( |
1316 | rk, rk->rk_conf.sasl.oauthbearer_config, |
1317 | rk->rk_conf.opaque); |
1318 | else |
1319 | rd_kafka_oauthbearer_enqueue_token_refresh(handle); |
1320 | |
1321 | return 0; |
1322 | } |
1323 | |
1324 | |
1325 | /** |
1326 | * @brief Per-client-instance destructor |
1327 | */ |
1328 | static void rd_kafka_sasl_oauthbearer_term (rd_kafka_t *rk) { |
1329 | rd_kafka_sasl_oauthbearer_handle_t *handle = rk->rk_sasl.handle; |
1330 | |
1331 | if (!handle) |
1332 | return; |
1333 | |
1334 | rk->rk_sasl.handle = NULL; |
1335 | |
1336 | rd_kafka_timer_stop(&rk->rk_timers, &handle->token_refresh_tmr, 1); |
1337 | |
1338 | RD_IF_FREE(handle->md_principal_name, rd_free); |
1339 | RD_IF_FREE(handle->token_value, rd_free); |
1340 | rd_list_destroy(&handle->extensions); |
1341 | RD_IF_FREE(handle->errstr, rd_free); |
1342 | |
1343 | rwlock_destroy(&handle->lock); |
1344 | |
1345 | rd_free(handle); |
1346 | |
1347 | } |
1348 | |
1349 | |
1350 | /** |
1351 | * @brief SASL/OAUTHBEARER is unable to connect unless a valid |
1352 | * token is available, and a valid token CANNOT be |
1353 | * available unless/until an initial token retrieval |
1354 | * succeeds, so wait for this precondition if necessary. |
1355 | */ |
1356 | static rd_bool_t rd_kafka_sasl_oauthbearer_ready (rd_kafka_t *rk) { |
1357 | rd_kafka_sasl_oauthbearer_handle_t *handle = rk->rk_sasl.handle; |
1358 | |
1359 | if (!handle) |
1360 | return rd_false; |
1361 | |
1362 | return rd_kafka_oauthbearer_has_token(handle); |
1363 | } |
1364 | |
1365 | |
1366 | /** |
1367 | * @brief Validate OAUTHBEARER config, which is a no-op |
1368 | * (we rely on initial token retrieval) |
1369 | */ |
1370 | static int rd_kafka_sasl_oauthbearer_conf_validate (rd_kafka_t *rk, |
1371 | char *errstr, |
1372 | size_t errstr_size) { |
1373 | /* |
1374 | * We must rely on the initial token retrieval as a proxy |
1375 | * for configuration validation because the configuration is |
1376 | * implementation-dependent, and it is not necessarily the case |
1377 | * that the config reflects the default unsecured JWS config |
1378 | * that we know how to parse. |
1379 | */ |
1380 | return 0; |
1381 | } |
1382 | |
1383 | |
1384 | |
1385 | |
1386 | const struct rd_kafka_sasl_provider rd_kafka_sasl_oauthbearer_provider = { |
1387 | .name = "OAUTHBEARER (builtin)" , |
1388 | .init = rd_kafka_sasl_oauthbearer_init, |
1389 | .term = rd_kafka_sasl_oauthbearer_term, |
1390 | .ready = rd_kafka_sasl_oauthbearer_ready, |
1391 | .client_new = rd_kafka_sasl_oauthbearer_client_new, |
1392 | .recv = rd_kafka_sasl_oauthbearer_recv, |
1393 | .close = rd_kafka_sasl_oauthbearer_close, |
1394 | .conf_validate = rd_kafka_sasl_oauthbearer_conf_validate, |
1395 | }; |
1396 | |
1397 | |
1398 | |
1399 | /** |
1400 | * @name Unit tests |
1401 | * |
1402 | * |
1403 | */ |
1404 | |
1405 | /** |
1406 | * @brief `sasl.oauthbearer.config` test: |
1407 | * should generate correct default values. |
1408 | */ |
1409 | static int do_unittest_config_defaults (void) { |
1410 | static const char *sasl_oauthbearer_config = "principal=fubar " |
1411 | "scopeClaimName=whatever" ; |
1412 | // default scope is empty, default lifetime is 3600 seconds |
1413 | // {"alg":"none"} |
1414 | // . |
1415 | // {"sub":"fubar","iat":1.000,"exp":3601.000} |
1416 | // |
1417 | static const char *expected_token_value = "eyJhbGciOiJub25lIn0" |
1418 | "." |
1419 | "eyJzdWIiOiJmdWJhciIsImlhdCI6MS4wMDAsImV4cCI6MzYwMS4wMDB9" |
1420 | "." ; |
1421 | rd_ts_t now_wallclock_ms = 1000; |
1422 | char errstr[512]; |
1423 | struct rd_kafka_sasl_oauthbearer_token token; |
1424 | int r; |
1425 | |
1426 | r = rd_kafka_oauthbearer_unsecured_token0( |
1427 | &token, |
1428 | sasl_oauthbearer_config, now_wallclock_ms, |
1429 | errstr, sizeof(errstr)); |
1430 | if (r == -1) |
1431 | RD_UT_FAIL("Failed to create a token: %s: %s" , |
1432 | sasl_oauthbearer_config, errstr); |
1433 | |
1434 | RD_UT_ASSERT(token.md_lifetime_ms == |
1435 | now_wallclock_ms + 3600 * 1000, |
1436 | "Invalid md_lifetime_ms %" PRId64, token.md_lifetime_ms); |
1437 | RD_UT_ASSERT(!strcmp(token.md_principal_name, "fubar" ), |
1438 | "Invalid md_principal_name %s" , token.md_principal_name); |
1439 | RD_UT_ASSERT(!strcmp(token.token_value, expected_token_value), |
1440 | "Invalid token_value %s, expected %s" , |
1441 | token.token_value, expected_token_value); |
1442 | |
1443 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1444 | |
1445 | RD_UT_PASS(); |
1446 | } |
1447 | |
1448 | /** |
1449 | * @brief `sasl.oauthbearer.config` test: |
1450 | * should generate correct token for explicit scope and lifeSeconds values. |
1451 | */ |
1452 | static int do_unittest_config_explicit_scope_and_life (void) { |
1453 | static const char *sasl_oauthbearer_config = "principal=fubar " |
1454 | "scope=role1,role2 lifeSeconds=60" ; |
1455 | // {"alg":"none"} |
1456 | // . |
1457 | // {"sub":"fubar","iat":1.000,"exp":61.000,"scope":["role1","role2"]} |
1458 | // |
1459 | static const char *expected_token_value = "eyJhbGciOiJub25lIn0" |
1460 | "." |
1461 | "eyJzdWIiOiJmdWJhciIsImlhdCI6MS4wMDAsImV4cCI6NjEuMDAwLCJzY29wZ" |
1462 | "SI6WyJyb2xlMSIsInJvbGUyIl19" |
1463 | "." ; |
1464 | rd_ts_t now_wallclock_ms = 1000; |
1465 | char errstr[512]; |
1466 | struct rd_kafka_sasl_oauthbearer_token token; |
1467 | int r; |
1468 | |
1469 | r = rd_kafka_oauthbearer_unsecured_token0( |
1470 | &token, |
1471 | sasl_oauthbearer_config, now_wallclock_ms, |
1472 | errstr, sizeof(errstr)); |
1473 | if (r == -1) |
1474 | RD_UT_FAIL("Failed to create a token: %s: %s" , |
1475 | sasl_oauthbearer_config, errstr); |
1476 | |
1477 | RD_UT_ASSERT(token.md_lifetime_ms == now_wallclock_ms + 60 * 1000, |
1478 | "Invalid md_lifetime_ms %" PRId64, token.md_lifetime_ms); |
1479 | RD_UT_ASSERT(!strcmp(token.md_principal_name, "fubar" ), |
1480 | "Invalid md_principal_name %s" , token.md_principal_name); |
1481 | RD_UT_ASSERT(!strcmp(token.token_value, expected_token_value), |
1482 | "Invalid token_value %s, expected %s" , |
1483 | token.token_value, expected_token_value); |
1484 | |
1485 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1486 | |
1487 | RD_UT_PASS(); |
1488 | } |
1489 | |
1490 | /** |
1491 | * @brief `sasl.oauthbearer.config` test: |
1492 | * should generate correct token when all values are provided explicitly. |
1493 | */ |
1494 | static int do_unittest_config_all_explicit_values (void) { |
1495 | static const char *sasl_oauthbearer_config = "principal=fubar " |
1496 | "principalClaimName=azp scope=role1,role2 " |
1497 | "scopeClaimName=roles lifeSeconds=60" ; |
1498 | // {"alg":"none"} |
1499 | // . |
1500 | // {"azp":"fubar","iat":1.000,"exp":61.000,"roles":["role1","role2"]} |
1501 | // |
1502 | static const char *expected_token_value = "eyJhbGciOiJub25lIn0" |
1503 | "." |
1504 | "eyJhenAiOiJmdWJhciIsImlhdCI6MS4wMDAsImV4cCI6NjEuMDAwLCJyb2xlc" |
1505 | "yI6WyJyb2xlMSIsInJvbGUyIl19" |
1506 | "." ; |
1507 | rd_ts_t now_wallclock_ms = 1000; |
1508 | char errstr[512]; |
1509 | struct rd_kafka_sasl_oauthbearer_token token; |
1510 | int r; |
1511 | |
1512 | r = rd_kafka_oauthbearer_unsecured_token0( |
1513 | &token, |
1514 | sasl_oauthbearer_config, now_wallclock_ms, |
1515 | errstr, sizeof(errstr)); |
1516 | if (r == -1) |
1517 | RD_UT_FAIL("Failed to create a token: %s: %s" , |
1518 | sasl_oauthbearer_config, errstr); |
1519 | |
1520 | RD_UT_ASSERT(token.md_lifetime_ms == now_wallclock_ms + 60 * 1000, |
1521 | "Invalid md_lifetime_ms %" PRId64, token.md_lifetime_ms); |
1522 | RD_UT_ASSERT(!strcmp(token.md_principal_name, "fubar" ), |
1523 | "Invalid md_principal_name %s" , token.md_principal_name); |
1524 | RD_UT_ASSERT(!strcmp(token.token_value, expected_token_value), |
1525 | "Invalid token_value %s, expected %s" , |
1526 | token.token_value, expected_token_value); |
1527 | |
1528 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1529 | |
1530 | RD_UT_PASS(); |
1531 | } |
1532 | |
1533 | /** |
1534 | * @brief `sasl.oauthbearer.config` test: |
1535 | * should fail when no principal specified. |
1536 | */ |
1537 | static int do_unittest_config_no_principal_should_fail (void) { |
1538 | static const char *expected_msg = "Invalid sasl.oauthbearer.config: " |
1539 | "no principal=<value>" ; |
1540 | static const char *sasl_oauthbearer_config = |
1541 | "extension_notaprincipal=hi" ; |
1542 | rd_ts_t now_wallclock_ms = 1000; |
1543 | char errstr[512]; |
1544 | struct rd_kafka_sasl_oauthbearer_token token = RD_ZERO_INIT; |
1545 | int r; |
1546 | |
1547 | r = rd_kafka_oauthbearer_unsecured_token0( |
1548 | &token, |
1549 | sasl_oauthbearer_config, now_wallclock_ms, |
1550 | errstr, sizeof(errstr)); |
1551 | if (r != -1) |
1552 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1553 | |
1554 | RD_UT_ASSERT(r == -1, "Did not fail despite missing principal" ); |
1555 | |
1556 | RD_UT_ASSERT(!strcmp(errstr, expected_msg), |
1557 | "Incorrect error message when no principal: " |
1558 | "expected=%s received=%s" , expected_msg, errstr); |
1559 | RD_UT_PASS(); |
1560 | } |
1561 | |
1562 | /** |
1563 | * @brief `sasl.oauthbearer.config` test: |
1564 | * should fail when no sasl.oauthbearer.config is specified. |
1565 | */ |
1566 | static int do_unittest_config_empty_should_fail (void) { |
1567 | static const char *expected_msg = "Invalid sasl.oauthbearer.config: " |
1568 | "must not be empty" ; |
1569 | static const char *sasl_oauthbearer_config = "" ; |
1570 | rd_ts_t now_wallclock_ms = 1000; |
1571 | char errstr[512]; |
1572 | struct rd_kafka_sasl_oauthbearer_token token = RD_ZERO_INIT; |
1573 | int r; |
1574 | |
1575 | r = rd_kafka_oauthbearer_unsecured_token0( |
1576 | &token, |
1577 | sasl_oauthbearer_config, now_wallclock_ms, |
1578 | errstr, sizeof(errstr)); |
1579 | if (r != -1) |
1580 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1581 | |
1582 | RD_UT_ASSERT(r == -1, "Did not fail despite empty config" ); |
1583 | |
1584 | RD_UT_ASSERT(!strcmp(errstr, expected_msg), |
1585 | "Incorrect error message with empty config: " |
1586 | "expected=%s received=%s" , expected_msg, errstr); |
1587 | RD_UT_PASS(); |
1588 | } |
1589 | |
1590 | /** |
1591 | * @brief `sasl.oauthbearer.config` test: |
1592 | * should fail when something unrecognized is specified. |
1593 | */ |
1594 | static int do_unittest_config_unrecognized_should_fail(void) { |
1595 | static const char *expected_msg = "Unrecognized " |
1596 | "sasl.oauthbearer.config beginning at: unrecognized" ; |
1597 | static const char *sasl_oauthbearer_config = |
1598 | "principal=fubar unrecognized" ; |
1599 | rd_ts_t now_wallclock_ms = 1000; |
1600 | char errstr[512]; |
1601 | struct rd_kafka_sasl_oauthbearer_token token; |
1602 | int r; |
1603 | |
1604 | r = rd_kafka_oauthbearer_unsecured_token0( |
1605 | &token, |
1606 | sasl_oauthbearer_config, now_wallclock_ms, |
1607 | errstr, sizeof(errstr)); |
1608 | if (r != -1) |
1609 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1610 | |
1611 | RD_UT_ASSERT(r == -1, "Did not fail with something unrecognized" ); |
1612 | |
1613 | RD_UT_ASSERT(!strcmp(errstr, expected_msg), |
1614 | "Incorrect error message with something unrecognized: " |
1615 | "expected=%s received=%s" , expected_msg, errstr); |
1616 | RD_UT_PASS(); |
1617 | } |
1618 | |
1619 | /** |
1620 | * @brief `sasl.oauthbearer.config` test: |
1621 | * should fail when empty values are specified. |
1622 | */ |
1623 | static int do_unittest_config_empty_value_should_fail(void) { |
1624 | static const char *sasl_oauthbearer_configs[] = { |
1625 | "principal=" , |
1626 | "principal=fubar principalClaimName=" , |
1627 | "principal=fubar scope=" , |
1628 | "principal=fubar scopeClaimName=" , |
1629 | "principal=fubar lifeSeconds=" |
1630 | }; |
1631 | static const char *expected_prefix = |
1632 | "Invalid sasl.oauthbearer.config: empty" ; |
1633 | size_t i; |
1634 | rd_ts_t now_wallclock_ms = 1000; |
1635 | char errstr[512]; |
1636 | int r; |
1637 | |
1638 | for (i = 0; |
1639 | i < sizeof(sasl_oauthbearer_configs) / sizeof(const char *); |
1640 | i++) { |
1641 | struct rd_kafka_sasl_oauthbearer_token token; |
1642 | r = rd_kafka_oauthbearer_unsecured_token0( |
1643 | &token, |
1644 | sasl_oauthbearer_configs[i], now_wallclock_ms, |
1645 | errstr, sizeof(errstr)); |
1646 | if (r != -1) |
1647 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1648 | |
1649 | RD_UT_ASSERT(r == -1, "Did not fail with an empty value: %s" , |
1650 | sasl_oauthbearer_configs[i]); |
1651 | |
1652 | RD_UT_ASSERT(!strncmp(expected_prefix, |
1653 | errstr, strlen(expected_prefix)), |
1654 | "Incorrect error message prefix when empty " |
1655 | "(%s): expected=%s received=%s" , |
1656 | sasl_oauthbearer_configs[i], expected_prefix, |
1657 | errstr); |
1658 | } |
1659 | RD_UT_PASS(); |
1660 | } |
1661 | |
1662 | /** |
1663 | * @brief `sasl.oauthbearer.config` test: |
1664 | * should fail when value with embedded quote is specified. |
1665 | */ |
1666 | static int do_unittest_config_value_with_quote_should_fail(void) { |
1667 | static const char *sasl_oauthbearer_configs[] = { |
1668 | "principal=\"fu" , |
1669 | "principal=fubar principalClaimName=\"bar" , |
1670 | "principal=fubar scope=\"a,b,c" , |
1671 | "principal=fubar scopeClaimName=\"baz" |
1672 | }; |
1673 | static const char *expected_prefix = "Invalid " |
1674 | "sasl.oauthbearer.config: '\"' cannot appear in " ; |
1675 | size_t i; |
1676 | rd_ts_t now_wallclock_ms = 1000; |
1677 | char errstr[512]; |
1678 | int r; |
1679 | |
1680 | for (i = 0; |
1681 | i < sizeof(sasl_oauthbearer_configs) / sizeof(const char *); |
1682 | i++) { |
1683 | struct rd_kafka_sasl_oauthbearer_token token; |
1684 | r = rd_kafka_oauthbearer_unsecured_token0( |
1685 | &token, |
1686 | sasl_oauthbearer_configs[i], now_wallclock_ms, |
1687 | errstr, sizeof(errstr)); |
1688 | if (r != -1) |
1689 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1690 | |
1691 | RD_UT_ASSERT(r == -1, "Did not fail with embedded quote: %s" , |
1692 | sasl_oauthbearer_configs[i]); |
1693 | |
1694 | RD_UT_ASSERT(!strncmp(expected_prefix, |
1695 | errstr, strlen(expected_prefix)), |
1696 | "Incorrect error message prefix with " |
1697 | "embedded quote (%s): expected=%s received=%s" , |
1698 | sasl_oauthbearer_configs[i], expected_prefix, |
1699 | errstr); |
1700 | } |
1701 | RD_UT_PASS(); |
1702 | } |
1703 | |
1704 | /** |
1705 | * @brief `sasl.oauthbearer.config` test: |
1706 | * should generate correct extensions. |
1707 | */ |
1708 | static int do_unittest_config_extensions(void) { |
1709 | static const char *sasl_oauthbearer_config = "principal=fubar " |
1710 | "extension_a=b extension_yz=yzval" ; |
1711 | rd_ts_t now_wallclock_ms = 1000; |
1712 | char errstr[512]; |
1713 | struct rd_kafka_sasl_oauthbearer_token token; |
1714 | int r; |
1715 | |
1716 | r = rd_kafka_oauthbearer_unsecured_token0( |
1717 | &token, |
1718 | sasl_oauthbearer_config, now_wallclock_ms, |
1719 | errstr, sizeof(errstr)); |
1720 | |
1721 | if (r == -1) |
1722 | RD_UT_FAIL("Failed to create a token: %s: %s" , |
1723 | sasl_oauthbearer_config, errstr); |
1724 | |
1725 | RD_UT_ASSERT(token.extension_size == 4, |
1726 | "Incorrect extensions: expected 4, received %" PRIusz, |
1727 | token.extension_size); |
1728 | |
1729 | RD_UT_ASSERT(!strcmp(token.extensions[0], "a" ) && |
1730 | !strcmp(token.extensions[1], "b" ) && |
1731 | !strcmp(token.extensions[2], "yz" ) && |
1732 | !strcmp(token.extensions[3], "yzval" ), |
1733 | "Incorrect extensions: expected a=b and " |
1734 | "yz=yzval but received %s=%s and %s=%s" , |
1735 | token.extensions[0], token.extensions[1], |
1736 | token.extensions[2], token.extensions[3]); |
1737 | |
1738 | rd_kafka_sasl_oauthbearer_token_free(&token); |
1739 | |
1740 | RD_UT_PASS(); |
1741 | } |
1742 | |
1743 | /** |
1744 | * @brief make sure illegal extensions keys are rejected |
1745 | */ |
1746 | static int do_unittest_illegal_extension_keys_should_fail(void) { |
1747 | static const char *illegal_keys[] = { |
1748 | "" , |
1749 | "auth" , |
1750 | "a1" , |
1751 | " a" |
1752 | }; |
1753 | size_t i; |
1754 | char errstr[512]; |
1755 | int r; |
1756 | |
1757 | for (i = 0; i < sizeof(illegal_keys) / sizeof(const char *); i++) { |
1758 | r = check_oauthbearer_extension_key(illegal_keys[i], |
1759 | errstr, sizeof(errstr)); |
1760 | RD_UT_ASSERT(r == -1, |
1761 | "Did not recognize illegal extension key: %s" , |
1762 | illegal_keys[i]); |
1763 | } |
1764 | RD_UT_PASS(); |
1765 | } |
1766 | |
1767 | /** |
1768 | * @brief make sure illegal extensions keys are rejected |
1769 | */ |
1770 | static int do_unittest_odd_extension_size_should_fail(void) { |
1771 | static const char *expected_errstr = "Incorrect extension size " |
1772 | "(must be a non-negative multiple of 2): 1" ; |
1773 | char errstr[512]; |
1774 | rd_kafka_resp_err_t err; |
1775 | rd_kafka_t rk = RD_ZERO_INIT; |
1776 | rd_kafka_sasl_oauthbearer_handle_t handle = RD_ZERO_INIT; |
1777 | |
1778 | rk.rk_conf.sasl.provider = &rd_kafka_sasl_oauthbearer_provider; |
1779 | rk.rk_sasl.handle = &handle; |
1780 | |
1781 | rwlock_init(&handle.lock); |
1782 | |
1783 | err = rd_kafka_oauthbearer_set_token0(&rk, "abcd" , 1000, "fubar" , |
1784 | NULL, 1, errstr, sizeof(errstr)); |
1785 | |
1786 | rwlock_destroy(&handle.lock); |
1787 | |
1788 | RD_UT_ASSERT(err, "Did not recognize illegal extension size" ); |
1789 | RD_UT_ASSERT(!strcmp(errstr, expected_errstr), |
1790 | "Incorrect error message for illegal " |
1791 | "extension size: expected=%s; received=%s" , |
1792 | expected_errstr, errstr); |
1793 | RD_UT_ASSERT(err == RD_KAFKA_RESP_ERR__INVALID_ARG, |
1794 | "Expected ErrInvalidArg, not %s" , rd_kafka_err2name(err)); |
1795 | |
1796 | RD_UT_PASS(); |
1797 | } |
1798 | |
1799 | int unittest_sasl_oauthbearer (void) { |
1800 | int fails = 0; |
1801 | |
1802 | fails += do_unittest_config_no_principal_should_fail(); |
1803 | fails += do_unittest_config_empty_should_fail(); |
1804 | fails += do_unittest_config_empty_value_should_fail(); |
1805 | fails += do_unittest_config_value_with_quote_should_fail(); |
1806 | fails += do_unittest_config_unrecognized_should_fail(); |
1807 | fails += do_unittest_config_defaults(); |
1808 | fails += do_unittest_config_explicit_scope_and_life(); |
1809 | fails += do_unittest_config_all_explicit_values(); |
1810 | fails += do_unittest_config_extensions(); |
1811 | fails += do_unittest_illegal_extension_keys_should_fail(); |
1812 | fails += do_unittest_odd_extension_size_should_fail(); |
1813 | |
1814 | return fails; |
1815 | } |
1816 | |