OIDAuthorizationService.m 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790
  1. /*! @file OIDAuthorizationService.m
  2. @brief AppAuth iOS SDK
  3. @copyright
  4. Copyright 2015 Google Inc. All Rights Reserved.
  5. @copydetails
  6. Licensed under the Apache License, Version 2.0 (the "License");
  7. you may not use this file except in compliance with the License.
  8. You may obtain a copy of the License at
  9. http://www.apache.org/licenses/LICENSE-2.0
  10. Unless required by applicable law or agreed to in writing, software
  11. distributed under the License is distributed on an "AS IS" BASIS,
  12. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. See the License for the specific language governing permissions and
  14. limitations under the License.
  15. */
  16. #import "OIDAuthorizationService.h"
  17. #import "OIDAuthorizationRequest.h"
  18. #import "OIDAuthorizationResponse.h"
  19. #import "OIDDefines.h"
  20. #import "OIDEndSessionRequest.h"
  21. #import "OIDEndSessionResponse.h"
  22. #import "OIDErrorUtilities.h"
  23. #import "OIDExternalUserAgent.h"
  24. #import "OIDExternalUserAgentSession.h"
  25. #import "OIDIDToken.h"
  26. #import "OIDRegistrationRequest.h"
  27. #import "OIDRegistrationResponse.h"
  28. #import "OIDServiceConfiguration.h"
  29. #import "OIDServiceDiscovery.h"
  30. #import "OIDTokenRequest.h"
  31. #import "OIDTokenResponse.h"
  32. #import "OIDURLQueryComponent.h"
  33. #import "OIDURLSessionProvider.h"
  34. /*! @brief Path appended to an OpenID Connect issuer for discovery
  35. @see https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
  36. */
  37. static NSString *const kOpenIDConfigurationWellKnownPath = @".well-known/openid-configuration";
  38. /*! @brief Max allowable iat (Issued At) time skew
  39. @see https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
  40. */
  41. static int const kOIDAuthorizationSessionIATMaxSkew = 600;
  42. NS_ASSUME_NONNULL_BEGIN
  43. @interface OIDAuthorizationSession : NSObject<OIDExternalUserAgentSession>
  44. - (instancetype)init NS_UNAVAILABLE;
  45. - (instancetype)initWithRequest:(OIDAuthorizationRequest *)request
  46. NS_DESIGNATED_INITIALIZER;
  47. @end
  48. @implementation OIDAuthorizationSession {
  49. OIDAuthorizationRequest *_request;
  50. id<OIDExternalUserAgent> _externalUserAgent;
  51. OIDAuthorizationCallback _pendingauthorizationFlowCallback;
  52. }
  53. - (instancetype)initWithRequest:(OIDAuthorizationRequest *)request {
  54. self = [super init];
  55. if (self) {
  56. _request = [request copy];
  57. }
  58. return self;
  59. }
  60. - (void)presentAuthorizationWithExternalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
  61. callback:(OIDAuthorizationCallback)authorizationFlowCallback {
  62. _externalUserAgent = externalUserAgent;
  63. _pendingauthorizationFlowCallback = authorizationFlowCallback;
  64. BOOL authorizationFlowStarted =
  65. [_externalUserAgent presentExternalUserAgentRequest:_request session:self];
  66. if (!authorizationFlowStarted) {
  67. NSError *safariError = [OIDErrorUtilities errorWithCode:OIDErrorCodeSafariOpenError
  68. underlyingError:nil
  69. description:@"Unable to open Safari."];
  70. [self didFinishWithResponse:nil error:safariError];
  71. }
  72. }
  73. - (void)cancel {
  74. [self cancelWithCompletion:nil];
  75. }
  76. - (void)cancelWithCompletion:(nullable void (^)(void))completion {
  77. [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
  78. NSError *error = [OIDErrorUtilities errorWithCode:OIDErrorCodeUserCanceledAuthorizationFlow
  79. underlyingError:nil
  80. description:@"Authorization flow was cancelled."];
  81. [self didFinishWithResponse:nil error:error];
  82. if (completion) completion();
  83. }];
  84. }
  85. /*! @brief Does the redirection URL equal another URL down to the path component?
  86. @param URL The first redirect URI to compare.
  87. @param redirectionURL The second redirect URI to compare.
  88. @return YES if the URLs match down to the path level (query params are ignored).
  89. */
  90. + (BOOL)URL:(NSURL *)URL matchesRedirectionURL:(NSURL *)redirectionURL {
  91. NSURL *standardizedURL = [URL standardizedURL];
  92. NSURL *standardizedRedirectURL = [redirectionURL standardizedURL];
  93. return [standardizedURL.scheme caseInsensitiveCompare:standardizedRedirectURL.scheme] == NSOrderedSame
  94. && OIDIsEqualIncludingNil(standardizedURL.user, standardizedRedirectURL.user)
  95. && OIDIsEqualIncludingNil(standardizedURL.password, standardizedRedirectURL.password)
  96. && OIDIsEqualIncludingNil(standardizedURL.host, standardizedRedirectURL.host)
  97. && OIDIsEqualIncludingNil(standardizedURL.port, standardizedRedirectURL.port)
  98. && OIDIsEqualIncludingNil(standardizedURL.path, standardizedRedirectURL.path);
  99. }
  100. - (BOOL)shouldHandleURL:(NSURL *)URL {
  101. return [[self class] URL:URL matchesRedirectionURL:_request.redirectURL];
  102. }
  103. - (BOOL)resumeExternalUserAgentFlowWithURL:(NSURL *)URL {
  104. // rejects URLs that don't match redirect (these may be completely unrelated to the authorization)
  105. if (![self shouldHandleURL:URL]) {
  106. return NO;
  107. }
  108. AppAuthRequestTrace(@"Authorization Response: %@", URL);
  109. // checks for an invalid state
  110. if (!_pendingauthorizationFlowCallback) {
  111. [NSException raise:OIDOAuthExceptionInvalidAuthorizationFlow
  112. format:@"%@", OIDOAuthExceptionInvalidAuthorizationFlow, nil];
  113. }
  114. OIDURLQueryComponent *query = [[OIDURLQueryComponent alloc] initWithURL:URL];
  115. NSError *error;
  116. OIDAuthorizationResponse *response = nil;
  117. // checks for an OAuth error response as per RFC6749 Section 4.1.2.1
  118. if (query.dictionaryValue[OIDOAuthErrorFieldError]) {
  119. error = [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthAuthorizationErrorDomain
  120. OAuthResponse:query.dictionaryValue
  121. underlyingError:nil];
  122. }
  123. // no error, should be a valid OAuth 2.0 response
  124. if (!error) {
  125. response = [[OIDAuthorizationResponse alloc] initWithRequest:_request
  126. parameters:query.dictionaryValue];
  127. // verifies that the state in the response matches the state in the request, or both are nil
  128. if (!OIDIsEqualIncludingNil(_request.state, response.state)) {
  129. NSMutableDictionary *userInfo = [query.dictionaryValue mutableCopy];
  130. userInfo[NSLocalizedDescriptionKey] =
  131. [NSString stringWithFormat:@"State mismatch, expecting %@ but got %@ in authorization "
  132. "response %@",
  133. _request.state,
  134. response.state,
  135. response];
  136. response = nil;
  137. error = [NSError errorWithDomain:OIDOAuthAuthorizationErrorDomain
  138. code:OIDErrorCodeOAuthAuthorizationClientError
  139. userInfo:userInfo];
  140. }
  141. }
  142. [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
  143. [self didFinishWithResponse:response error:error];
  144. }];
  145. return YES;
  146. }
  147. - (void)failExternalUserAgentFlowWithError:(NSError *)error {
  148. [self didFinishWithResponse:nil error:error];
  149. }
  150. /*! @brief Invokes the pending callback and performs cleanup.
  151. @param response The authorization response, if any to return to the callback.
  152. @param error The error, if any, to return to the callback.
  153. */
  154. - (void)didFinishWithResponse:(nullable OIDAuthorizationResponse *)response
  155. error:(nullable NSError *)error {
  156. OIDAuthorizationCallback callback = _pendingauthorizationFlowCallback;
  157. _pendingauthorizationFlowCallback = nil;
  158. _externalUserAgent = nil;
  159. if (callback) {
  160. callback(response, error);
  161. }
  162. }
  163. @end
  164. @interface OIDEndSessionImplementation : NSObject<OIDExternalUserAgentSession> {
  165. // private variables
  166. OIDEndSessionRequest *_request;
  167. id<OIDExternalUserAgent> _externalUserAgent;
  168. OIDEndSessionCallback _pendingEndSessionCallback;
  169. }
  170. - (instancetype)init NS_UNAVAILABLE;
  171. - (instancetype)initWithRequest:(OIDEndSessionRequest *)request
  172. NS_DESIGNATED_INITIALIZER;
  173. @end
  174. @implementation OIDEndSessionImplementation
  175. - (instancetype)initWithRequest:(OIDEndSessionRequest *)request {
  176. self = [super init];
  177. if (self) {
  178. _request = [request copy];
  179. }
  180. return self;
  181. }
  182. - (void)presentAuthorizationWithExternalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
  183. callback:(OIDEndSessionCallback)authorizationFlowCallback {
  184. _externalUserAgent = externalUserAgent;
  185. _pendingEndSessionCallback = authorizationFlowCallback;
  186. BOOL authorizationFlowStarted =
  187. [_externalUserAgent presentExternalUserAgentRequest:_request session:self];
  188. if (!authorizationFlowStarted) {
  189. NSError *safariError = [OIDErrorUtilities errorWithCode:OIDErrorCodeSafariOpenError
  190. underlyingError:nil
  191. description:@"Unable to open Safari."];
  192. [self didFinishWithResponse:nil error:safariError];
  193. }
  194. }
  195. - (void)cancel {
  196. [self cancelWithCompletion:nil];
  197. }
  198. - (void)cancelWithCompletion:(nullable void (^)(void))completion {
  199. [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
  200. NSError *error = [OIDErrorUtilities
  201. errorWithCode:OIDErrorCodeUserCanceledAuthorizationFlow
  202. underlyingError:nil
  203. description:nil];
  204. [self didFinishWithResponse:nil error:error];
  205. if (completion) completion();
  206. }];
  207. }
  208. - (BOOL)shouldHandleURL:(NSURL *)URL {
  209. // The logic of when to handle the URL is the same as for authorization requests: should match
  210. // down to the path component.
  211. return [[OIDAuthorizationSession class] URL:URL
  212. matchesRedirectionURL:_request.postLogoutRedirectURL];
  213. }
  214. - (BOOL)resumeExternalUserAgentFlowWithURL:(NSURL *)URL {
  215. // rejects URLs that don't match redirect (these may be completely unrelated to the authorization)
  216. if (![self shouldHandleURL:URL]) {
  217. return NO;
  218. }
  219. // checks for an invalid state
  220. if (!_pendingEndSessionCallback) {
  221. [NSException raise:OIDOAuthExceptionInvalidAuthorizationFlow
  222. format:@"%@", OIDOAuthExceptionInvalidAuthorizationFlow, nil];
  223. }
  224. NSError *error;
  225. OIDEndSessionResponse *response = nil;
  226. OIDURLQueryComponent *query = [[OIDURLQueryComponent alloc] initWithURL:URL];
  227. response = [[OIDEndSessionResponse alloc] initWithRequest:_request
  228. parameters:query.dictionaryValue];
  229. // verifies that the state in the response matches the state in the request, or both are nil
  230. if (!OIDIsEqualIncludingNil(_request.state, response.state)) {
  231. NSMutableDictionary *userInfo = [query.dictionaryValue mutableCopy];
  232. userInfo[NSLocalizedDescriptionKey] =
  233. [NSString stringWithFormat:@"State mismatch, expecting %@ but got %@ in authorization "
  234. "response %@",
  235. _request.state,
  236. response.state,
  237. response];
  238. response = nil;
  239. error = [NSError errorWithDomain:OIDOAuthAuthorizationErrorDomain
  240. code:OIDErrorCodeOAuthAuthorizationClientError
  241. userInfo:userInfo];
  242. }
  243. [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
  244. [self didFinishWithResponse:response error:error];
  245. }];
  246. return YES;
  247. }
  248. - (void)failExternalUserAgentFlowWithError:(NSError *)error {
  249. [self didFinishWithResponse:nil error:error];
  250. }
  251. /*! @brief Invokes the pending callback and performs cleanup.
  252. @param response The authorization response, if any to return to the callback.
  253. @param error The error, if any, to return to the callback.
  254. */
  255. - (void)didFinishWithResponse:(nullable OIDEndSessionResponse *)response
  256. error:(nullable NSError *)error {
  257. OIDEndSessionCallback callback = _pendingEndSessionCallback;
  258. _pendingEndSessionCallback = nil;
  259. _externalUserAgent = nil;
  260. if (callback) {
  261. callback(response, error);
  262. }
  263. }
  264. @end
  265. @implementation OIDAuthorizationService
  266. + (void)discoverServiceConfigurationForIssuer:(NSURL *)issuerURL
  267. completion:(OIDDiscoveryCallback)completion {
  268. NSURL *fullDiscoveryURL =
  269. [issuerURL URLByAppendingPathComponent:kOpenIDConfigurationWellKnownPath];
  270. [[self class] discoverServiceConfigurationForDiscoveryURL:fullDiscoveryURL
  271. completion:completion];
  272. }
  273. + (void)discoverServiceConfigurationForDiscoveryURL:(NSURL *)discoveryURL
  274. completion:(OIDDiscoveryCallback)completion {
  275. NSURLSession *session = [OIDURLSessionProvider session];
  276. NSURLSessionDataTask *task =
  277. [session dataTaskWithURL:discoveryURL
  278. completionHandler:^(NSData *data, NSURLResponse *response, NSError *error) {
  279. // If we got any sort of error, just report it.
  280. if (error || !data) {
  281. NSString *errorDescription =
  282. [NSString stringWithFormat:@"Connection error fetching discovery document '%@': %@.",
  283. discoveryURL,
  284. error.localizedDescription];
  285. error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
  286. underlyingError:error
  287. description:errorDescription];
  288. dispatch_async(dispatch_get_main_queue(), ^{
  289. completion(nil, error);
  290. });
  291. return;
  292. }
  293. NSHTTPURLResponse *urlResponse = (NSHTTPURLResponse *)response;
  294. // Check for non-200 status codes.
  295. // https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse
  296. if (urlResponse.statusCode != 200) {
  297. NSError *URLResponseError = [OIDErrorUtilities HTTPErrorWithHTTPResponse:urlResponse
  298. data:data];
  299. NSString *errorDescription =
  300. [NSString stringWithFormat:@"Non-200 HTTP response (%d) fetching discovery document "
  301. "'%@'.",
  302. (int)urlResponse.statusCode,
  303. discoveryURL];
  304. error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
  305. underlyingError:URLResponseError
  306. description:errorDescription];
  307. dispatch_async(dispatch_get_main_queue(), ^{
  308. completion(nil, error);
  309. });
  310. return;
  311. }
  312. // Construct an OIDServiceDiscovery with the received JSON.
  313. OIDServiceDiscovery *discovery =
  314. [[OIDServiceDiscovery alloc] initWithJSONData:data error:&error];
  315. if (error || !discovery) {
  316. NSString *errorDescription =
  317. [NSString stringWithFormat:@"JSON error parsing document at '%@': %@",
  318. discoveryURL,
  319. error.localizedDescription];
  320. error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
  321. underlyingError:error
  322. description:errorDescription];
  323. dispatch_async(dispatch_get_main_queue(), ^{
  324. completion(nil, error);
  325. });
  326. return;
  327. }
  328. // Create our service configuration with the discovery document and return it.
  329. OIDServiceConfiguration *configuration =
  330. [[OIDServiceConfiguration alloc] initWithDiscoveryDocument:discovery];
  331. dispatch_async(dispatch_get_main_queue(), ^{
  332. completion(configuration, nil);
  333. });
  334. }];
  335. [task resume];
  336. }
  337. #pragma mark - Authorization Endpoint
  338. + (id<OIDExternalUserAgentSession>) presentAuthorizationRequest:(OIDAuthorizationRequest *)request
  339. externalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
  340. callback:(OIDAuthorizationCallback)callback {
  341. AppAuthRequestTrace(@"Authorization Request: %@", request);
  342. OIDAuthorizationSession *flowSession = [[OIDAuthorizationSession alloc] initWithRequest:request];
  343. [flowSession presentAuthorizationWithExternalUserAgent:externalUserAgent callback:callback];
  344. return flowSession;
  345. }
  346. + (id<OIDExternalUserAgentSession>)
  347. presentEndSessionRequest:(OIDEndSessionRequest *)request
  348. externalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
  349. callback:(OIDEndSessionCallback)callback {
  350. OIDEndSessionImplementation *flowSession =
  351. [[OIDEndSessionImplementation alloc] initWithRequest:request];
  352. [flowSession presentAuthorizationWithExternalUserAgent:externalUserAgent callback:callback];
  353. return flowSession;
  354. }
  355. #pragma mark - Token Endpoint
  356. + (void)performTokenRequest:(OIDTokenRequest *)request callback:(OIDTokenCallback)callback {
  357. [[self class] performTokenRequest:request
  358. originalAuthorizationResponse:nil
  359. callback:callback];
  360. }
  361. + (void)performTokenRequest:(OIDTokenRequest *)request
  362. originalAuthorizationResponse:(OIDAuthorizationResponse *_Nullable)authorizationResponse
  363. callback:(OIDTokenCallback)callback {
  364. NSURLRequest *URLRequest = [request URLRequest];
  365. AppAuthRequestTrace(@"Token Request: %@\nHeaders:%@\nHTTPBody: %@",
  366. URLRequest.URL,
  367. URLRequest.allHTTPHeaderFields,
  368. [[NSString alloc] initWithData:URLRequest.HTTPBody
  369. encoding:NSUTF8StringEncoding]);
  370. NSURLSession *session = [OIDURLSessionProvider session];
  371. [[session dataTaskWithRequest:URLRequest
  372. completionHandler:^(NSData *_Nullable data,
  373. NSURLResponse *_Nullable response,
  374. NSError *_Nullable error) {
  375. if (error) {
  376. // A network error or server error occurred.
  377. NSString *errorDescription =
  378. [NSString stringWithFormat:@"Connection error making token request to '%@': %@.",
  379. URLRequest.URL,
  380. error.localizedDescription];
  381. NSError *returnedError =
  382. [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
  383. underlyingError:error
  384. description:errorDescription];
  385. dispatch_async(dispatch_get_main_queue(), ^{
  386. callback(nil, returnedError);
  387. });
  388. return;
  389. }
  390. NSHTTPURLResponse *HTTPURLResponse = (NSHTTPURLResponse *)response;
  391. NSInteger statusCode = HTTPURLResponse.statusCode;
  392. AppAuthRequestTrace(@"Token Response: HTTP Status %d\nHTTPBody: %@",
  393. (int)statusCode,
  394. [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding]);
  395. if (statusCode != 200) {
  396. // A server error occurred.
  397. NSError *serverError =
  398. [OIDErrorUtilities HTTPErrorWithHTTPResponse:HTTPURLResponse data:data];
  399. // HTTP 4xx may indicate an RFC6749 Section 5.2 error response, attempts to parse as such.
  400. if (statusCode >= 400 && statusCode < 500) {
  401. NSError *jsonDeserializationError;
  402. NSDictionary<NSString *, NSObject<NSCopying> *> *json =
  403. [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
  404. // If the HTTP 4xx response parses as JSON and has an 'error' key, it's an OAuth error.
  405. // These errors are special as they indicate a problem with the authorization grant.
  406. if (json[OIDOAuthErrorFieldError]) {
  407. NSError *oauthError =
  408. [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthTokenErrorDomain
  409. OAuthResponse:json
  410. underlyingError:serverError];
  411. dispatch_async(dispatch_get_main_queue(), ^{
  412. callback(nil, oauthError);
  413. });
  414. return;
  415. }
  416. }
  417. // Status code indicates this is an error, but not an RFC6749 Section 5.2 error.
  418. NSString *errorDescription =
  419. [NSString stringWithFormat:@"Non-200 HTTP response (%d) making token request to '%@'.",
  420. (int)statusCode,
  421. URLRequest.URL];
  422. NSError *returnedError =
  423. [OIDErrorUtilities errorWithCode:OIDErrorCodeServerError
  424. underlyingError:serverError
  425. description:errorDescription];
  426. dispatch_async(dispatch_get_main_queue(), ^{
  427. callback(nil, returnedError);
  428. });
  429. return;
  430. }
  431. NSError *jsonDeserializationError;
  432. NSDictionary<NSString *, NSObject<NSCopying> *> *json =
  433. [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
  434. if (jsonDeserializationError) {
  435. // A problem occurred deserializing the response/JSON.
  436. NSString *errorDescription =
  437. [NSString stringWithFormat:@"JSON error parsing token response: %@",
  438. jsonDeserializationError.localizedDescription];
  439. NSError *returnedError =
  440. [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONDeserializationError
  441. underlyingError:jsonDeserializationError
  442. description:errorDescription];
  443. dispatch_async(dispatch_get_main_queue(), ^{
  444. callback(nil, returnedError);
  445. });
  446. return;
  447. }
  448. OIDTokenResponse *tokenResponse =
  449. [[OIDTokenResponse alloc] initWithRequest:request parameters:json];
  450. if (!tokenResponse) {
  451. // A problem occurred constructing the token response from the JSON.
  452. NSError *returnedError =
  453. [OIDErrorUtilities errorWithCode:OIDErrorCodeTokenResponseConstructionError
  454. underlyingError:jsonDeserializationError
  455. description:@"Token response invalid."];
  456. dispatch_async(dispatch_get_main_queue(), ^{
  457. callback(nil, returnedError);
  458. });
  459. return;
  460. }
  461. // If an ID Token is included in the response, validates the ID Token following the rules
  462. // in OpenID Connect Core Section 3.1.3.7 for features that AppAuth directly supports
  463. // (which excludes rules #1, #4, #5, #7, #8, #12, and #13). Regarding rule #6, ID Tokens
  464. // received by this class are received via direct communication between the Client and the Token
  465. // Endpoint, thus we are exercising the option to rely only on the TLS validation. AppAuth
  466. // has a zero dependencies policy, and verifying the JWT signature would add a dependency.
  467. // Users of the library are welcome to perform the JWT signature verification themselves should
  468. // they wish.
  469. if (tokenResponse.idToken) {
  470. OIDIDToken *idToken = [[OIDIDToken alloc] initWithIDTokenString:tokenResponse.idToken];
  471. if (!idToken) {
  472. NSError *invalidIDToken =
  473. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenParsingError
  474. underlyingError:nil
  475. description:@"ID Token parsing failed"];
  476. dispatch_async(dispatch_get_main_queue(), ^{
  477. callback(nil, invalidIDToken);
  478. });
  479. return;
  480. }
  481. // OpenID Connect Core Section 3.1.3.7. rule #1
  482. // Not supported: AppAuth does not support JWT encryption.
  483. // OpenID Connect Core Section 3.1.3.7. rule #2
  484. // Validates that the issuer in the ID Token matches that of the discovery document.
  485. NSURL *issuer = tokenResponse.request.configuration.issuer;
  486. if (issuer && ![idToken.issuer isEqual:issuer]) {
  487. NSError *invalidIDToken =
  488. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
  489. underlyingError:nil
  490. description:@"Issuer mismatch"];
  491. dispatch_async(dispatch_get_main_queue(), ^{
  492. callback(nil, invalidIDToken);
  493. });
  494. return;
  495. }
  496. // OpenID Connect Core Section 3.1.3.7. rule #3 & Section 2 azp Claim
  497. // Validates that the aud (audience) Claim contains the client ID, or that the azp
  498. // (authorized party) Claim matches the client ID.
  499. NSString *clientID = tokenResponse.request.clientID;
  500. if (![idToken.audience containsObject:clientID] &&
  501. ![idToken.claims[@"azp"] isEqualToString:clientID]) {
  502. NSError *invalidIDToken =
  503. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
  504. underlyingError:nil
  505. description:@"Audience mismatch"];
  506. dispatch_async(dispatch_get_main_queue(), ^{
  507. callback(nil, invalidIDToken);
  508. });
  509. return;
  510. }
  511. // OpenID Connect Core Section 3.1.3.7. rules #4 & #5
  512. // Not supported.
  513. // OpenID Connect Core Section 3.1.3.7. rule #6
  514. // As noted above, AppAuth only supports the code flow which results in direct communication
  515. // of the ID Token from the Token Endpoint to the Client, and we are exercising the option to
  516. // use TSL server validation instead of checking the token signature. Users may additionally
  517. // check the token signature should they wish.
  518. // OpenID Connect Core Section 3.1.3.7. rules #7 & #8
  519. // Not applicable. See rule #6.
  520. // OpenID Connect Core Section 3.1.3.7. rule #9
  521. // Validates that the current time is before the expiry time.
  522. NSTimeInterval expiresAtDifference = [idToken.expiresAt timeIntervalSinceNow];
  523. if (expiresAtDifference < 0) {
  524. NSError *invalidIDToken =
  525. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
  526. underlyingError:nil
  527. description:@"ID Token expired"];
  528. dispatch_async(dispatch_get_main_queue(), ^{
  529. callback(nil, invalidIDToken);
  530. });
  531. return;
  532. }
  533. // OpenID Connect Core Section 3.1.3.7. rule #10
  534. // Validates that the issued at time is not more than +/- 10 minutes on the current time.
  535. NSTimeInterval issuedAtDifference = [idToken.issuedAt timeIntervalSinceNow];
  536. if (fabs(issuedAtDifference) > kOIDAuthorizationSessionIATMaxSkew) {
  537. NSString *message =
  538. [NSString stringWithFormat:@"Issued at time is more than %d seconds before or after "
  539. "the current time",
  540. kOIDAuthorizationSessionIATMaxSkew];
  541. NSError *invalidIDToken =
  542. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
  543. underlyingError:nil
  544. description:message];
  545. dispatch_async(dispatch_get_main_queue(), ^{
  546. callback(nil, invalidIDToken);
  547. });
  548. return;
  549. }
  550. // Only relevant for the authorization_code response type
  551. if ([tokenResponse.request.grantType isEqual:OIDGrantTypeAuthorizationCode]) {
  552. // OpenID Connect Core Section 3.1.3.7. rule #11
  553. // Validates the nonce.
  554. NSString *nonce = authorizationResponse.request.nonce;
  555. if (nonce && ![idToken.nonce isEqual:nonce]) {
  556. NSError *invalidIDToken =
  557. [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
  558. underlyingError:nil
  559. description:@"Nonce mismatch"];
  560. dispatch_async(dispatch_get_main_queue(), ^{
  561. callback(nil, invalidIDToken);
  562. });
  563. return;
  564. }
  565. }
  566. // OpenID Connect Core Section 3.1.3.7. rules #12
  567. // ACR is not directly supported by AppAuth.
  568. // OpenID Connect Core Section 3.1.3.7. rules #12
  569. // max_age is not directly supported by AppAuth.
  570. }
  571. // Success
  572. dispatch_async(dispatch_get_main_queue(), ^{
  573. callback(tokenResponse, nil);
  574. });
  575. }] resume];
  576. }
  577. #pragma mark - Registration Endpoint
  578. + (void)performRegistrationRequest:(OIDRegistrationRequest *)request
  579. completion:(OIDRegistrationCompletion)completion {
  580. NSURLRequest *URLRequest = [request URLRequest];
  581. if (!URLRequest) {
  582. // A problem occurred deserializing the response/JSON.
  583. NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONSerializationError
  584. underlyingError:nil
  585. description:@"The registration request could not "
  586. "be serialized as JSON."];
  587. dispatch_async(dispatch_get_main_queue(), ^{
  588. completion(nil, returnedError);
  589. });
  590. return;
  591. }
  592. NSURLSession *session = [OIDURLSessionProvider session];
  593. [[session dataTaskWithRequest:URLRequest
  594. completionHandler:^(NSData *_Nullable data,
  595. NSURLResponse *_Nullable response,
  596. NSError *_Nullable error) {
  597. if (error) {
  598. // A network error or server error occurred.
  599. NSString *errorDescription =
  600. [NSString stringWithFormat:@"Connection error making registration request to '%@': %@.",
  601. URLRequest.URL,
  602. error.localizedDescription];
  603. NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
  604. underlyingError:error
  605. description:errorDescription];
  606. dispatch_async(dispatch_get_main_queue(), ^{
  607. completion(nil, returnedError);
  608. });
  609. return;
  610. }
  611. NSHTTPURLResponse *HTTPURLResponse = (NSHTTPURLResponse *) response;
  612. if (HTTPURLResponse.statusCode != 201 && HTTPURLResponse.statusCode != 200) {
  613. // A server error occurred.
  614. NSError *serverError = [OIDErrorUtilities HTTPErrorWithHTTPResponse:HTTPURLResponse
  615. data:data];
  616. // HTTP 400 may indicate an OpenID Connect Dynamic Client Registration 1.0 Section 3.3 error
  617. // response, checks for that
  618. if (HTTPURLResponse.statusCode == 400) {
  619. NSError *jsonDeserializationError;
  620. NSDictionary<NSString *, NSObject <NSCopying> *> *json =
  621. [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
  622. // if the HTTP 400 response parses as JSON and has an 'error' key, it's an OAuth error
  623. // these errors are special as they indicate a problem with the authorization grant
  624. if (json[OIDOAuthErrorFieldError]) {
  625. NSError *oauthError =
  626. [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthRegistrationErrorDomain
  627. OAuthResponse:json
  628. underlyingError:serverError];
  629. dispatch_async(dispatch_get_main_queue(), ^{
  630. completion(nil, oauthError);
  631. });
  632. return;
  633. }
  634. }
  635. // not an OAuth error, just a generic server error
  636. NSString *errorDescription =
  637. [NSString stringWithFormat:@"Non-200/201 HTTP response (%d) making registration request "
  638. "to '%@'.",
  639. (int)HTTPURLResponse.statusCode,
  640. URLRequest.URL];
  641. NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeServerError
  642. underlyingError:serverError
  643. description:errorDescription];
  644. dispatch_async(dispatch_get_main_queue(), ^{
  645. completion(nil, returnedError);
  646. });
  647. return;
  648. }
  649. NSError *jsonDeserializationError;
  650. NSDictionary<NSString *, NSObject <NSCopying> *> *json =
  651. [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
  652. if (jsonDeserializationError) {
  653. // A problem occurred deserializing the response/JSON.
  654. NSString *errorDescription =
  655. [NSString stringWithFormat:@"JSON error parsing registration response: %@",
  656. jsonDeserializationError.localizedDescription];
  657. NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONDeserializationError
  658. underlyingError:jsonDeserializationError
  659. description:errorDescription];
  660. dispatch_async(dispatch_get_main_queue(), ^{
  661. completion(nil, returnedError);
  662. });
  663. return;
  664. }
  665. OIDRegistrationResponse *registrationResponse =
  666. [[OIDRegistrationResponse alloc] initWithRequest:request
  667. parameters:json];
  668. if (!registrationResponse) {
  669. // A problem occurred constructing the registration response from the JSON.
  670. NSError *returnedError =
  671. [OIDErrorUtilities errorWithCode:OIDErrorCodeRegistrationResponseConstructionError
  672. underlyingError:nil
  673. description:@"Registration response invalid."];
  674. dispatch_async(dispatch_get_main_queue(), ^{
  675. completion(nil, returnedError);
  676. });
  677. return;
  678. }
  679. // Success
  680. dispatch_async(dispatch_get_main_queue(), ^{
  681. completion(registrationResponse, nil);
  682. });
  683. }] resume];
  684. }
  685. @end
  686. NS_ASSUME_NONNULL_END