OIDAuthState.m 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570
  1. /*! @file OIDAuthState.m
  2. @brief AppAuth iOS SDK
  3. @copyright
  4. Copyright 2015 Google Inc. All Rights Reserved.
  5. @copydetails
  6. Licensed under the Apache License, Version 2.0 (the "License");
  7. you may not use this file except in compliance with the License.
  8. You may obtain a copy of the License at
  9. http://www.apache.org/licenses/LICENSE-2.0
  10. Unless required by applicable law or agreed to in writing, software
  11. distributed under the License is distributed on an "AS IS" BASIS,
  12. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. See the License for the specific language governing permissions and
  14. limitations under the License.
  15. */
  16. #import "OIDAuthState.h"
  17. #import "OIDAuthStateChangeDelegate.h"
  18. #import "OIDAuthStateErrorDelegate.h"
  19. #import "OIDAuthorizationRequest.h"
  20. #import "OIDAuthorizationResponse.h"
  21. #import "OIDAuthorizationService.h"
  22. #import "OIDDefines.h"
  23. #import "OIDError.h"
  24. #import "OIDErrorUtilities.h"
  25. #import "OIDRegistrationResponse.h"
  26. #import "OIDTokenRequest.h"
  27. #import "OIDTokenResponse.h"
  28. #import "OIDTokenUtilities.h"
  29. /*! @brief Key used to encode the @c refreshToken property for @c NSSecureCoding.
  30. */
  31. static NSString *const kRefreshTokenKey = @"refreshToken";
  32. /*! @brief Key used to encode the @c needsTokenRefresh property for @c NSSecureCoding.
  33. */
  34. static NSString *const kNeedsTokenRefreshKey = @"needsTokenRefresh";
  35. /*! @brief Key used to encode the @c scope property for @c NSSecureCoding.
  36. */
  37. static NSString *const kScopeKey = @"scope";
  38. /*! @brief Key used to encode the @c lastAuthorizationResponse property for @c NSSecureCoding.
  39. */
  40. static NSString *const kLastAuthorizationResponseKey = @"lastAuthorizationResponse";
  41. /*! @brief Key used to encode the @c lastTokenResponse property for @c NSSecureCoding.
  42. */
  43. static NSString *const kLastTokenResponseKey = @"lastTokenResponse";
  44. /*! @brief Key used to encode the @c lastOAuthError property for @c NSSecureCoding.
  45. */
  46. static NSString *const kAuthorizationErrorKey = @"authorizationError";
  47. /*! @brief The exception thrown when a developer tries to create a refresh request from an
  48. authorization request with no authorization code.
  49. */
  50. static NSString *const kRefreshTokenRequestException =
  51. @"Attempted to create a token refresh request from a token response with no refresh token.";
  52. /*! @brief Number of seconds the access token is refreshed before it actually expires.
  53. */
  54. static const NSUInteger kExpiryTimeTolerance = 60;
  55. /*! @brief Object to hold OIDAuthState pending actions.
  56. */
  57. @interface OIDAuthStatePendingAction : NSObject
  58. @property(nonatomic, readonly, nullable) OIDAuthStateAction action;
  59. @property(nonatomic, readonly, nullable) dispatch_queue_t dispatchQueue;
  60. @end
  61. @implementation OIDAuthStatePendingAction
  62. - (id)initWithAction:(OIDAuthStateAction)action andDispatchQueue:(dispatch_queue_t)dispatchQueue {
  63. self = [super init];
  64. if (self) {
  65. _action = action;
  66. _dispatchQueue = dispatchQueue;
  67. }
  68. return self;
  69. }
  70. @end
  71. @interface OIDAuthState ()
  72. /*! @brief The access token generated by the authorization server.
  73. @discussion Rather than using this property directly, you should call
  74. @c OIDAuthState.withFreshTokenPerformAction:.
  75. */
  76. @property(nonatomic, readonly, nullable) NSString *accessToken;
  77. /*! @brief The approximate expiration date & time of the access token.
  78. @discussion Rather than using this property directly, you should call
  79. @c OIDAuthState.withFreshTokenPerformAction:.
  80. */
  81. @property(nonatomic, readonly, nullable) NSDate *accessTokenExpirationDate;
  82. /*! @brief ID Token value associated with the authenticated session.
  83. @discussion Rather than using this property directly, you should call
  84. OIDAuthState.withFreshTokenPerformAction:.
  85. */
  86. @property(nonatomic, readonly, nullable) NSString *idToken;
  87. /*! @brief Private method, called when the internal state changes.
  88. */
  89. - (void)didChangeState;
  90. @end
  91. @implementation OIDAuthState {
  92. /*! @brief Array of pending actions (use @c _pendingActionsSyncObject to synchronize access).
  93. */
  94. NSMutableArray *_pendingActions;
  95. /*! @brief Object for synchronizing access to @c pendingActions.
  96. */
  97. id _pendingActionsSyncObject;
  98. /*! @brief If YES, tokens will be refreshed on the next API call regardless of expiry.
  99. */
  100. BOOL _needsTokenRefresh;
  101. }
  102. #pragma mark - Convenience initializers
  103. + (id<OIDExternalUserAgentSession>)
  104. authStateByPresentingAuthorizationRequest:(OIDAuthorizationRequest *)authorizationRequest
  105. externalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
  106. callback:(OIDAuthStateAuthorizationCallback)callback {
  107. // presents the authorization request
  108. id<OIDExternalUserAgentSession> authFlowSession = [OIDAuthorizationService
  109. presentAuthorizationRequest:authorizationRequest
  110. externalUserAgent:externalUserAgent
  111. callback:^(OIDAuthorizationResponse *_Nullable authorizationResponse,
  112. NSError *_Nullable authorizationError) {
  113. // inspects response and processes further if needed (e.g. authorization
  114. // code exchange)
  115. if (authorizationResponse) {
  116. if ([authorizationRequest.responseType
  117. isEqualToString:OIDResponseTypeCode]) {
  118. // if the request is for the code flow (NB. not hybrid), assumes the
  119. // code is intended for this client, and performs the authorization
  120. // code exchange
  121. OIDTokenRequest *tokenExchangeRequest =
  122. [authorizationResponse tokenExchangeRequest];
  123. [OIDAuthorizationService performTokenRequest:tokenExchangeRequest
  124. originalAuthorizationResponse:authorizationResponse
  125. callback:^(OIDTokenResponse *_Nullable tokenResponse,
  126. NSError *_Nullable tokenError) {
  127. OIDAuthState *authState;
  128. if (tokenResponse) {
  129. authState = [[OIDAuthState alloc]
  130. initWithAuthorizationResponse:
  131. authorizationResponse
  132. tokenResponse:tokenResponse];
  133. }
  134. callback(authState, tokenError);
  135. }];
  136. } else {
  137. // hybrid flow (code id_token). Two possible cases:
  138. // 1. The code is not for this client, ie. will be sent to a
  139. // webservice that performs the id token verification and token
  140. // exchange
  141. // 2. The code is for this client and, for security reasons, the
  142. // application developer must verify the id_token signature and
  143. // c_hash before calling the token endpoint
  144. OIDAuthState *authState = [[OIDAuthState alloc]
  145. initWithAuthorizationResponse:authorizationResponse];
  146. callback(authState, authorizationError);
  147. }
  148. } else {
  149. callback(nil, authorizationError);
  150. }
  151. }];
  152. return authFlowSession;
  153. }
  154. #pragma mark - Initializers
  155. - (nonnull instancetype)init
  156. OID_UNAVAILABLE_USE_INITIALIZER(@selector(initWithAuthorizationResponse:tokenResponse:))
  157. /*! @brief Creates an auth state from an authorization response.
  158. @param authorizationResponse The authorization response.
  159. */
  160. - (instancetype)initWithAuthorizationResponse:(OIDAuthorizationResponse *)authorizationResponse {
  161. return [self initWithAuthorizationResponse:authorizationResponse tokenResponse:nil];
  162. }
  163. /*! @brief Designated initializer.
  164. @param authorizationResponse The authorization response.
  165. @discussion Creates an auth state from an authorization response and token response.
  166. */
  167. - (instancetype)initWithAuthorizationResponse:(OIDAuthorizationResponse *)authorizationResponse
  168. tokenResponse:(nullable OIDTokenResponse *)tokenResponse {
  169. return [self initWithAuthorizationResponse:authorizationResponse
  170. tokenResponse:tokenResponse
  171. registrationResponse:nil];
  172. }
  173. /*! @brief Creates an auth state from an registration response.
  174. @param registrationResponse The registration response.
  175. */
  176. - (instancetype)initWithRegistrationResponse:(OIDRegistrationResponse *)registrationResponse {
  177. return [self initWithAuthorizationResponse:nil
  178. tokenResponse:nil
  179. registrationResponse:registrationResponse];
  180. }
  181. - (instancetype)initWithAuthorizationResponse:
  182. (nullable OIDAuthorizationResponse *)authorizationResponse
  183. tokenResponse:(nullable OIDTokenResponse *)tokenResponse
  184. registrationResponse:(nullable OIDRegistrationResponse *)registrationResponse {
  185. self = [super init];
  186. if (self) {
  187. _pendingActionsSyncObject = [[NSObject alloc] init];
  188. if (registrationResponse) {
  189. [self updateWithRegistrationResponse:registrationResponse];
  190. }
  191. if (authorizationResponse) {
  192. [self updateWithAuthorizationResponse:authorizationResponse error:nil];
  193. }
  194. if (tokenResponse) {
  195. [self updateWithTokenResponse:tokenResponse error:nil];
  196. }
  197. }
  198. return self;
  199. }
  200. #pragma mark - NSObject overrides
  201. - (NSString *)description {
  202. return [NSString stringWithFormat:@"<%@: %p, isAuthorized: %@, refreshToken: \"%@\", "
  203. "scope: \"%@\", accessToken: \"%@\", "
  204. "accessTokenExpirationDate: %@, idToken: \"%@\", "
  205. "lastAuthorizationResponse: %@, lastTokenResponse: %@, "
  206. "lastRegistrationResponse: %@, authorizationError: %@>",
  207. NSStringFromClass([self class]),
  208. (void *)self,
  209. (self.isAuthorized) ? @"YES" : @"NO",
  210. [OIDTokenUtilities redact:_refreshToken],
  211. _scope,
  212. [OIDTokenUtilities redact:self.accessToken],
  213. self.accessTokenExpirationDate,
  214. [OIDTokenUtilities redact:self.idToken],
  215. _lastAuthorizationResponse,
  216. _lastTokenResponse,
  217. _lastRegistrationResponse,
  218. _authorizationError];
  219. }
  220. #pragma mark - NSSecureCoding
  221. + (BOOL)supportsSecureCoding {
  222. return YES;
  223. }
  224. - (instancetype)initWithCoder:(NSCoder *)aDecoder {
  225. _lastAuthorizationResponse = [aDecoder decodeObjectOfClass:[OIDAuthorizationResponse class]
  226. forKey:kLastAuthorizationResponseKey];
  227. _lastTokenResponse = [aDecoder decodeObjectOfClass:[OIDTokenResponse class]
  228. forKey:kLastTokenResponseKey];
  229. self = [self initWithAuthorizationResponse:_lastAuthorizationResponse
  230. tokenResponse:_lastTokenResponse];
  231. if (self) {
  232. _authorizationError =
  233. [aDecoder decodeObjectOfClass:[NSError class] forKey:kAuthorizationErrorKey];
  234. _scope = [aDecoder decodeObjectOfClass:[NSString class] forKey:kScopeKey];
  235. _refreshToken = [aDecoder decodeObjectOfClass:[NSString class] forKey:kRefreshTokenKey];
  236. _needsTokenRefresh = [aDecoder decodeBoolForKey:kNeedsTokenRefreshKey];
  237. }
  238. return self;
  239. }
  240. - (void)encodeWithCoder:(NSCoder *)aCoder {
  241. [aCoder encodeObject:_lastAuthorizationResponse forKey:kLastAuthorizationResponseKey];
  242. [aCoder encodeObject:_lastTokenResponse forKey:kLastTokenResponseKey];
  243. if (_authorizationError) {
  244. NSError *codingSafeAuthorizationError = [NSError errorWithDomain:_authorizationError.domain
  245. code:_authorizationError.code
  246. userInfo:nil];
  247. [aCoder encodeObject:codingSafeAuthorizationError forKey:kAuthorizationErrorKey];
  248. }
  249. [aCoder encodeObject:_scope forKey:kScopeKey];
  250. [aCoder encodeObject:_refreshToken forKey:kRefreshTokenKey];
  251. [aCoder encodeBool:_needsTokenRefresh forKey:kNeedsTokenRefreshKey];
  252. }
  253. #pragma mark - Private convenience getters
  254. - (NSString *)accessToken {
  255. if (_authorizationError) {
  256. return nil;
  257. }
  258. return _lastTokenResponse ? _lastTokenResponse.accessToken
  259. : _lastAuthorizationResponse.accessToken;
  260. }
  261. - (NSString *)tokenType {
  262. if (_authorizationError) {
  263. return nil;
  264. }
  265. return _lastTokenResponse ? _lastTokenResponse.tokenType
  266. : _lastAuthorizationResponse.tokenType;
  267. }
  268. - (NSDate *)accessTokenExpirationDate {
  269. if (_authorizationError) {
  270. return nil;
  271. }
  272. return _lastTokenResponse ? _lastTokenResponse.accessTokenExpirationDate
  273. : _lastAuthorizationResponse.accessTokenExpirationDate;
  274. }
  275. - (NSString *)idToken {
  276. if (_authorizationError) {
  277. return nil;
  278. }
  279. return _lastTokenResponse ? _lastTokenResponse.idToken
  280. : _lastAuthorizationResponse.idToken;
  281. }
  282. #pragma mark - Getters
  283. - (BOOL)isAuthorized {
  284. return !self.authorizationError && (self.accessToken || self.idToken || self.refreshToken);
  285. }
  286. #pragma mark - Updating the state
  287. - (void)updateWithRegistrationResponse:(OIDRegistrationResponse *)registrationResponse {
  288. _lastRegistrationResponse = registrationResponse;
  289. _refreshToken = nil;
  290. _scope = nil;
  291. _lastAuthorizationResponse = nil;
  292. _lastTokenResponse = nil;
  293. _authorizationError = nil;
  294. [self didChangeState];
  295. }
  296. - (void)updateWithAuthorizationResponse:(nullable OIDAuthorizationResponse *)authorizationResponse
  297. error:(nullable NSError *)error {
  298. // If the error is an OAuth authorization error, updates the state. Other errors are ignored.
  299. if (error.domain == OIDOAuthAuthorizationErrorDomain) {
  300. [self updateWithAuthorizationError:error];
  301. return;
  302. }
  303. if (!authorizationResponse) {
  304. return;
  305. }
  306. _lastAuthorizationResponse = authorizationResponse;
  307. // clears the last token response and refresh token as these now relate to an old authorization
  308. // that is no longer relevant
  309. _lastTokenResponse = nil;
  310. _refreshToken = nil;
  311. _authorizationError = nil;
  312. // if the response's scope is nil, it means that it equals that of the request
  313. // see: https://tools.ietf.org/html/rfc6749#section-5.1
  314. _scope = (authorizationResponse.scope) ? authorizationResponse.scope
  315. : authorizationResponse.request.scope;
  316. [self didChangeState];
  317. }
  318. - (void)updateWithTokenResponse:(nullable OIDTokenResponse *)tokenResponse
  319. error:(nullable NSError *)error {
  320. if (_authorizationError) {
  321. // Calling updateWithTokenResponse while in an error state probably means the developer obtained
  322. // a new token and did the exchange without also calling updateWithAuthorizationResponse.
  323. // Attempts to handle gracefully, but warns the developer that this is unexpected.
  324. NSLog(@"OIDAuthState:updateWithTokenResponse should not be called in an error state [%@] call"
  325. "updateWithAuthorizationResponse with the result of the fresh authorization response"
  326. "first",
  327. _authorizationError);
  328. _authorizationError = nil;
  329. }
  330. // If the error is an OAuth authorization error, updates the state. Other errors are ignored.
  331. if (error.domain == OIDOAuthTokenErrorDomain) {
  332. [self updateWithAuthorizationError:error];
  333. return;
  334. }
  335. if (!tokenResponse) {
  336. return;
  337. }
  338. _lastTokenResponse = tokenResponse;
  339. // updates the scope and refresh token if they are present on the TokenResponse.
  340. // according to the spec, these may be changed by the server, including when refreshing the
  341. // access token. See: https://tools.ietf.org/html/rfc6749#section-5.1 and
  342. // https://tools.ietf.org/html/rfc6749#section-6
  343. if (tokenResponse.scope) {
  344. _scope = tokenResponse.scope;
  345. }
  346. if (tokenResponse.refreshToken) {
  347. _refreshToken = tokenResponse.refreshToken;
  348. }
  349. [self didChangeState];
  350. }
  351. - (void)updateWithAuthorizationError:(NSError *)oauthError {
  352. _authorizationError = oauthError;
  353. [self didChangeState];
  354. [_errorDelegate authState:self didEncounterAuthorizationError:oauthError];
  355. }
  356. #pragma mark - OAuth Requests
  357. - (OIDTokenRequest *)tokenRefreshRequest {
  358. return [self tokenRefreshRequestWithAdditionalParameters:nil];
  359. }
  360. - (OIDTokenRequest *)tokenRefreshRequestWithAdditionalParameters:
  361. (NSDictionary<NSString *, NSString *> *)additionalParameters {
  362. // TODO: Add unit test to confirm exception is thrown when expected
  363. if (!_refreshToken) {
  364. [OIDErrorUtilities raiseException:kRefreshTokenRequestException];
  365. }
  366. return [[OIDTokenRequest alloc]
  367. initWithConfiguration:_lastAuthorizationResponse.request.configuration
  368. grantType:OIDGrantTypeRefreshToken
  369. authorizationCode:nil
  370. redirectURL:nil
  371. clientID:_lastAuthorizationResponse.request.clientID
  372. clientSecret:_lastAuthorizationResponse.request.clientSecret
  373. scope:nil
  374. refreshToken:_refreshToken
  375. codeVerifier:nil
  376. additionalParameters:additionalParameters];
  377. }
  378. #pragma mark - Stateful Actions
  379. - (void)didChangeState {
  380. [_stateChangeDelegate didChangeState:self];
  381. }
  382. - (void)setNeedsTokenRefresh {
  383. _needsTokenRefresh = YES;
  384. }
  385. - (void)performActionWithFreshTokens:(OIDAuthStateAction)action {
  386. [self performActionWithFreshTokens:action additionalRefreshParameters:nil];
  387. }
  388. - (void)performActionWithFreshTokens:(OIDAuthStateAction)action
  389. additionalRefreshParameters:
  390. (nullable NSDictionary<NSString *, NSString *> *)additionalParameters {
  391. [self performActionWithFreshTokens:action
  392. additionalRefreshParameters:additionalParameters
  393. dispatchQueue:dispatch_get_main_queue()];
  394. }
  395. - (void)performActionWithFreshTokens:(OIDAuthStateAction)action
  396. additionalRefreshParameters:
  397. (nullable NSDictionary<NSString *, NSString *> *)additionalParameters
  398. dispatchQueue:(dispatch_queue_t)dispatchQueue {
  399. if ([self isTokenFresh]) {
  400. // access token is valid within tolerance levels, perform action
  401. dispatch_async(dispatchQueue, ^{
  402. action(self.accessToken, self.idToken, nil);
  403. });
  404. return;
  405. }
  406. if (!_refreshToken) {
  407. // no refresh token available and token has expired
  408. NSError *tokenRefreshError = [
  409. OIDErrorUtilities errorWithCode:OIDErrorCodeTokenRefreshError
  410. underlyingError:nil
  411. description:@"Unable to refresh expired token without a refresh token."];
  412. dispatch_async(dispatchQueue, ^{
  413. action(nil, nil, tokenRefreshError);
  414. });
  415. return;
  416. }
  417. // access token is expired, first refresh the token, then perform action
  418. NSAssert(_pendingActionsSyncObject, @"_pendingActionsSyncObject cannot be nil", @"");
  419. OIDAuthStatePendingAction* pendingAction =
  420. [[OIDAuthStatePendingAction alloc] initWithAction:action andDispatchQueue:dispatchQueue];
  421. @synchronized(_pendingActionsSyncObject) {
  422. // if a token is already in the process of being refreshed, adds to pending actions
  423. if (_pendingActions) {
  424. [_pendingActions addObject:pendingAction];
  425. return;
  426. }
  427. // creates a list of pending actions, starting with this one
  428. _pendingActions = [NSMutableArray arrayWithObject:pendingAction];
  429. }
  430. // refresh the tokens
  431. OIDTokenRequest *tokenRefreshRequest =
  432. [self tokenRefreshRequestWithAdditionalParameters:additionalParameters];
  433. [OIDAuthorizationService performTokenRequest:tokenRefreshRequest
  434. originalAuthorizationResponse:_lastAuthorizationResponse
  435. callback:^(OIDTokenResponse *_Nullable response,
  436. NSError *_Nullable error) {
  437. // update OIDAuthState based on response
  438. if (response) {
  439. self->_needsTokenRefresh = NO;
  440. [self updateWithTokenResponse:response error:nil];
  441. } else {
  442. if (error.domain == OIDOAuthTokenErrorDomain) {
  443. self->_needsTokenRefresh = NO;
  444. [self updateWithAuthorizationError:error];
  445. } else {
  446. if ([self->_errorDelegate respondsToSelector:
  447. @selector(authState:didEncounterTransientError:)]) {
  448. [self->_errorDelegate authState:self didEncounterTransientError:error];
  449. }
  450. }
  451. }
  452. // nil the pending queue and process everything that was queued up
  453. NSArray *actionsToProcess;
  454. @synchronized(self->_pendingActionsSyncObject) {
  455. actionsToProcess = self->_pendingActions;
  456. self->_pendingActions = nil;
  457. }
  458. for (OIDAuthStatePendingAction* actionToProcess in actionsToProcess) {
  459. dispatch_async(actionToProcess.dispatchQueue, ^{
  460. actionToProcess.action(self.accessToken, self.idToken, error);
  461. });
  462. }
  463. }];
  464. }
  465. #pragma mark -
  466. /*! @fn isTokenFresh
  467. @brief Determines whether a token refresh request must be made to refresh the tokens.
  468. */
  469. - (BOOL)isTokenFresh {
  470. if (_needsTokenRefresh) {
  471. // forced refresh
  472. return NO;
  473. }
  474. if (!self.accessTokenExpirationDate) {
  475. // if there is no expiration time but we have an access token, it is assumed to never expire
  476. return !!self.accessToken;
  477. }
  478. // has the token expired?
  479. BOOL tokenFresh = [self.accessTokenExpirationDate timeIntervalSinceNow] > kExpiryTimeTolerance;
  480. return tokenFresh;
  481. }
  482. @end