123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790 |
- /*! @file OIDAuthorizationService.m
- @brief AppAuth iOS SDK
- @copyright
- Copyright 2015 Google Inc. All Rights Reserved.
- @copydetails
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- #import "OIDAuthorizationService.h"
- #import "OIDAuthorizationRequest.h"
- #import "OIDAuthorizationResponse.h"
- #import "OIDDefines.h"
- #import "OIDEndSessionRequest.h"
- #import "OIDEndSessionResponse.h"
- #import "OIDErrorUtilities.h"
- #import "OIDExternalUserAgent.h"
- #import "OIDExternalUserAgentSession.h"
- #import "OIDIDToken.h"
- #import "OIDRegistrationRequest.h"
- #import "OIDRegistrationResponse.h"
- #import "OIDServiceConfiguration.h"
- #import "OIDServiceDiscovery.h"
- #import "OIDTokenRequest.h"
- #import "OIDTokenResponse.h"
- #import "OIDURLQueryComponent.h"
- #import "OIDURLSessionProvider.h"
- /*! @brief Path appended to an OpenID Connect issuer for discovery
- @see https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
- */
- static NSString *const kOpenIDConfigurationWellKnownPath = @".well-known/openid-configuration";
- /*! @brief Max allowable iat (Issued At) time skew
- @see https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
- */
- static int const kOIDAuthorizationSessionIATMaxSkew = 600;
- NS_ASSUME_NONNULL_BEGIN
- @interface OIDAuthorizationSession : NSObject<OIDExternalUserAgentSession>
- - (instancetype)init NS_UNAVAILABLE;
- - (instancetype)initWithRequest:(OIDAuthorizationRequest *)request
- NS_DESIGNATED_INITIALIZER;
- @end
- @implementation OIDAuthorizationSession {
- OIDAuthorizationRequest *_request;
- id<OIDExternalUserAgent> _externalUserAgent;
- OIDAuthorizationCallback _pendingauthorizationFlowCallback;
- }
- - (instancetype)initWithRequest:(OIDAuthorizationRequest *)request {
- self = [super init];
- if (self) {
- _request = [request copy];
- }
- return self;
- }
- - (void)presentAuthorizationWithExternalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
- callback:(OIDAuthorizationCallback)authorizationFlowCallback {
- _externalUserAgent = externalUserAgent;
- _pendingauthorizationFlowCallback = authorizationFlowCallback;
- BOOL authorizationFlowStarted =
- [_externalUserAgent presentExternalUserAgentRequest:_request session:self];
- if (!authorizationFlowStarted) {
- NSError *safariError = [OIDErrorUtilities errorWithCode:OIDErrorCodeSafariOpenError
- underlyingError:nil
- description:@"Unable to open Safari."];
- [self didFinishWithResponse:nil error:safariError];
- }
- }
- - (void)cancel {
- [self cancelWithCompletion:nil];
- }
- - (void)cancelWithCompletion:(nullable void (^)(void))completion {
- [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
- NSError *error = [OIDErrorUtilities errorWithCode:OIDErrorCodeUserCanceledAuthorizationFlow
- underlyingError:nil
- description:@"Authorization flow was cancelled."];
- [self didFinishWithResponse:nil error:error];
- if (completion) completion();
- }];
- }
- /*! @brief Does the redirection URL equal another URL down to the path component?
- @param URL The first redirect URI to compare.
- @param redirectionURL The second redirect URI to compare.
- @return YES if the URLs match down to the path level (query params are ignored).
- */
- + (BOOL)URL:(NSURL *)URL matchesRedirectionURL:(NSURL *)redirectionURL {
- NSURL *standardizedURL = [URL standardizedURL];
- NSURL *standardizedRedirectURL = [redirectionURL standardizedURL];
- return [standardizedURL.scheme caseInsensitiveCompare:standardizedRedirectURL.scheme] == NSOrderedSame
- && OIDIsEqualIncludingNil(standardizedURL.user, standardizedRedirectURL.user)
- && OIDIsEqualIncludingNil(standardizedURL.password, standardizedRedirectURL.password)
- && OIDIsEqualIncludingNil(standardizedURL.host, standardizedRedirectURL.host)
- && OIDIsEqualIncludingNil(standardizedURL.port, standardizedRedirectURL.port)
- && OIDIsEqualIncludingNil(standardizedURL.path, standardizedRedirectURL.path);
- }
- - (BOOL)shouldHandleURL:(NSURL *)URL {
- return [[self class] URL:URL matchesRedirectionURL:_request.redirectURL];
- }
- - (BOOL)resumeExternalUserAgentFlowWithURL:(NSURL *)URL {
- // rejects URLs that don't match redirect (these may be completely unrelated to the authorization)
- if (![self shouldHandleURL:URL]) {
- return NO;
- }
-
- AppAuthRequestTrace(@"Authorization Response: %@", URL);
-
- // checks for an invalid state
- if (!_pendingauthorizationFlowCallback) {
- [NSException raise:OIDOAuthExceptionInvalidAuthorizationFlow
- format:@"%@", OIDOAuthExceptionInvalidAuthorizationFlow, nil];
- }
- OIDURLQueryComponent *query = [[OIDURLQueryComponent alloc] initWithURL:URL];
- NSError *error;
- OIDAuthorizationResponse *response = nil;
- // checks for an OAuth error response as per RFC6749 Section 4.1.2.1
- if (query.dictionaryValue[OIDOAuthErrorFieldError]) {
- error = [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthAuthorizationErrorDomain
- OAuthResponse:query.dictionaryValue
- underlyingError:nil];
- }
- // no error, should be a valid OAuth 2.0 response
- if (!error) {
- response = [[OIDAuthorizationResponse alloc] initWithRequest:_request
- parameters:query.dictionaryValue];
-
- // verifies that the state in the response matches the state in the request, or both are nil
- if (!OIDIsEqualIncludingNil(_request.state, response.state)) {
- NSMutableDictionary *userInfo = [query.dictionaryValue mutableCopy];
- userInfo[NSLocalizedDescriptionKey] =
- [NSString stringWithFormat:@"State mismatch, expecting %@ but got %@ in authorization "
- "response %@",
- _request.state,
- response.state,
- response];
- response = nil;
- error = [NSError errorWithDomain:OIDOAuthAuthorizationErrorDomain
- code:OIDErrorCodeOAuthAuthorizationClientError
- userInfo:userInfo];
- }
- }
- [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
- [self didFinishWithResponse:response error:error];
- }];
- return YES;
- }
- - (void)failExternalUserAgentFlowWithError:(NSError *)error {
- [self didFinishWithResponse:nil error:error];
- }
- /*! @brief Invokes the pending callback and performs cleanup.
- @param response The authorization response, if any to return to the callback.
- @param error The error, if any, to return to the callback.
- */
- - (void)didFinishWithResponse:(nullable OIDAuthorizationResponse *)response
- error:(nullable NSError *)error {
- OIDAuthorizationCallback callback = _pendingauthorizationFlowCallback;
- _pendingauthorizationFlowCallback = nil;
- _externalUserAgent = nil;
- if (callback) {
- callback(response, error);
- }
- }
- @end
- @interface OIDEndSessionImplementation : NSObject<OIDExternalUserAgentSession> {
- // private variables
- OIDEndSessionRequest *_request;
- id<OIDExternalUserAgent> _externalUserAgent;
- OIDEndSessionCallback _pendingEndSessionCallback;
- }
- - (instancetype)init NS_UNAVAILABLE;
- - (instancetype)initWithRequest:(OIDEndSessionRequest *)request
- NS_DESIGNATED_INITIALIZER;
- @end
- @implementation OIDEndSessionImplementation
- - (instancetype)initWithRequest:(OIDEndSessionRequest *)request {
- self = [super init];
- if (self) {
- _request = [request copy];
- }
- return self;
- }
- - (void)presentAuthorizationWithExternalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
- callback:(OIDEndSessionCallback)authorizationFlowCallback {
- _externalUserAgent = externalUserAgent;
- _pendingEndSessionCallback = authorizationFlowCallback;
- BOOL authorizationFlowStarted =
- [_externalUserAgent presentExternalUserAgentRequest:_request session:self];
- if (!authorizationFlowStarted) {
- NSError *safariError = [OIDErrorUtilities errorWithCode:OIDErrorCodeSafariOpenError
- underlyingError:nil
- description:@"Unable to open Safari."];
- [self didFinishWithResponse:nil error:safariError];
- }
- }
- - (void)cancel {
- [self cancelWithCompletion:nil];
- }
- - (void)cancelWithCompletion:(nullable void (^)(void))completion {
- [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
- NSError *error = [OIDErrorUtilities
- errorWithCode:OIDErrorCodeUserCanceledAuthorizationFlow
- underlyingError:nil
- description:nil];
- [self didFinishWithResponse:nil error:error];
- if (completion) completion();
- }];
- }
- - (BOOL)shouldHandleURL:(NSURL *)URL {
- // The logic of when to handle the URL is the same as for authorization requests: should match
- // down to the path component.
- return [[OIDAuthorizationSession class] URL:URL
- matchesRedirectionURL:_request.postLogoutRedirectURL];
- }
- - (BOOL)resumeExternalUserAgentFlowWithURL:(NSURL *)URL {
- // rejects URLs that don't match redirect (these may be completely unrelated to the authorization)
- if (![self shouldHandleURL:URL]) {
- return NO;
- }
- // checks for an invalid state
- if (!_pendingEndSessionCallback) {
- [NSException raise:OIDOAuthExceptionInvalidAuthorizationFlow
- format:@"%@", OIDOAuthExceptionInvalidAuthorizationFlow, nil];
- }
-
-
- NSError *error;
- OIDEndSessionResponse *response = nil;
- OIDURLQueryComponent *query = [[OIDURLQueryComponent alloc] initWithURL:URL];
- response = [[OIDEndSessionResponse alloc] initWithRequest:_request
- parameters:query.dictionaryValue];
-
- // verifies that the state in the response matches the state in the request, or both are nil
- if (!OIDIsEqualIncludingNil(_request.state, response.state)) {
- NSMutableDictionary *userInfo = [query.dictionaryValue mutableCopy];
- userInfo[NSLocalizedDescriptionKey] =
- [NSString stringWithFormat:@"State mismatch, expecting %@ but got %@ in authorization "
- "response %@",
- _request.state,
- response.state,
- response];
- response = nil;
- error = [NSError errorWithDomain:OIDOAuthAuthorizationErrorDomain
- code:OIDErrorCodeOAuthAuthorizationClientError
- userInfo:userInfo];
- }
-
- [_externalUserAgent dismissExternalUserAgentAnimated:YES completion:^{
- [self didFinishWithResponse:response error:error];
- }];
-
- return YES;
- }
- - (void)failExternalUserAgentFlowWithError:(NSError *)error {
- [self didFinishWithResponse:nil error:error];
- }
- /*! @brief Invokes the pending callback and performs cleanup.
- @param response The authorization response, if any to return to the callback.
- @param error The error, if any, to return to the callback.
- */
- - (void)didFinishWithResponse:(nullable OIDEndSessionResponse *)response
- error:(nullable NSError *)error {
- OIDEndSessionCallback callback = _pendingEndSessionCallback;
- _pendingEndSessionCallback = nil;
- _externalUserAgent = nil;
- if (callback) {
- callback(response, error);
- }
- }
- @end
- @implementation OIDAuthorizationService
- + (void)discoverServiceConfigurationForIssuer:(NSURL *)issuerURL
- completion:(OIDDiscoveryCallback)completion {
- NSURL *fullDiscoveryURL =
- [issuerURL URLByAppendingPathComponent:kOpenIDConfigurationWellKnownPath];
- [[self class] discoverServiceConfigurationForDiscoveryURL:fullDiscoveryURL
- completion:completion];
- }
- + (void)discoverServiceConfigurationForDiscoveryURL:(NSURL *)discoveryURL
- completion:(OIDDiscoveryCallback)completion {
- NSURLSession *session = [OIDURLSessionProvider session];
- NSURLSessionDataTask *task =
- [session dataTaskWithURL:discoveryURL
- completionHandler:^(NSData *data, NSURLResponse *response, NSError *error) {
- // If we got any sort of error, just report it.
- if (error || !data) {
- NSString *errorDescription =
- [NSString stringWithFormat:@"Connection error fetching discovery document '%@': %@.",
- discoveryURL,
- error.localizedDescription];
- error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
- underlyingError:error
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, error);
- });
- return;
- }
- NSHTTPURLResponse *urlResponse = (NSHTTPURLResponse *)response;
- // Check for non-200 status codes.
- // https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse
- if (urlResponse.statusCode != 200) {
- NSError *URLResponseError = [OIDErrorUtilities HTTPErrorWithHTTPResponse:urlResponse
- data:data];
- NSString *errorDescription =
- [NSString stringWithFormat:@"Non-200 HTTP response (%d) fetching discovery document "
- "'%@'.",
- (int)urlResponse.statusCode,
- discoveryURL];
- error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
- underlyingError:URLResponseError
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, error);
- });
- return;
- }
- // Construct an OIDServiceDiscovery with the received JSON.
- OIDServiceDiscovery *discovery =
- [[OIDServiceDiscovery alloc] initWithJSONData:data error:&error];
- if (error || !discovery) {
- NSString *errorDescription =
- [NSString stringWithFormat:@"JSON error parsing document at '%@': %@",
- discoveryURL,
- error.localizedDescription];
- error = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
- underlyingError:error
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, error);
- });
- return;
- }
- // Create our service configuration with the discovery document and return it.
- OIDServiceConfiguration *configuration =
- [[OIDServiceConfiguration alloc] initWithDiscoveryDocument:discovery];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(configuration, nil);
- });
- }];
- [task resume];
- }
- #pragma mark - Authorization Endpoint
- + (id<OIDExternalUserAgentSession>) presentAuthorizationRequest:(OIDAuthorizationRequest *)request
- externalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
- callback:(OIDAuthorizationCallback)callback {
-
- AppAuthRequestTrace(@"Authorization Request: %@", request);
-
- OIDAuthorizationSession *flowSession = [[OIDAuthorizationSession alloc] initWithRequest:request];
- [flowSession presentAuthorizationWithExternalUserAgent:externalUserAgent callback:callback];
- return flowSession;
- }
- + (id<OIDExternalUserAgentSession>)
- presentEndSessionRequest:(OIDEndSessionRequest *)request
- externalUserAgent:(id<OIDExternalUserAgent>)externalUserAgent
- callback:(OIDEndSessionCallback)callback {
- OIDEndSessionImplementation *flowSession =
- [[OIDEndSessionImplementation alloc] initWithRequest:request];
- [flowSession presentAuthorizationWithExternalUserAgent:externalUserAgent callback:callback];
- return flowSession;
- }
- #pragma mark - Token Endpoint
- + (void)performTokenRequest:(OIDTokenRequest *)request callback:(OIDTokenCallback)callback {
- [[self class] performTokenRequest:request
- originalAuthorizationResponse:nil
- callback:callback];
- }
- + (void)performTokenRequest:(OIDTokenRequest *)request
- originalAuthorizationResponse:(OIDAuthorizationResponse *_Nullable)authorizationResponse
- callback:(OIDTokenCallback)callback {
- NSURLRequest *URLRequest = [request URLRequest];
-
- AppAuthRequestTrace(@"Token Request: %@\nHeaders:%@\nHTTPBody: %@",
- URLRequest.URL,
- URLRequest.allHTTPHeaderFields,
- [[NSString alloc] initWithData:URLRequest.HTTPBody
- encoding:NSUTF8StringEncoding]);
- NSURLSession *session = [OIDURLSessionProvider session];
- [[session dataTaskWithRequest:URLRequest
- completionHandler:^(NSData *_Nullable data,
- NSURLResponse *_Nullable response,
- NSError *_Nullable error) {
- if (error) {
- // A network error or server error occurred.
- NSString *errorDescription =
- [NSString stringWithFormat:@"Connection error making token request to '%@': %@.",
- URLRequest.URL,
- error.localizedDescription];
- NSError *returnedError =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
- underlyingError:error
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, returnedError);
- });
- return;
- }
- NSHTTPURLResponse *HTTPURLResponse = (NSHTTPURLResponse *)response;
- NSInteger statusCode = HTTPURLResponse.statusCode;
- AppAuthRequestTrace(@"Token Response: HTTP Status %d\nHTTPBody: %@",
- (int)statusCode,
- [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding]);
- if (statusCode != 200) {
- // A server error occurred.
- NSError *serverError =
- [OIDErrorUtilities HTTPErrorWithHTTPResponse:HTTPURLResponse data:data];
- // HTTP 4xx may indicate an RFC6749 Section 5.2 error response, attempts to parse as such.
- if (statusCode >= 400 && statusCode < 500) {
- NSError *jsonDeserializationError;
- NSDictionary<NSString *, NSObject<NSCopying> *> *json =
- [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
- // If the HTTP 4xx response parses as JSON and has an 'error' key, it's an OAuth error.
- // These errors are special as they indicate a problem with the authorization grant.
- if (json[OIDOAuthErrorFieldError]) {
- NSError *oauthError =
- [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthTokenErrorDomain
- OAuthResponse:json
- underlyingError:serverError];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, oauthError);
- });
- return;
- }
- }
- // Status code indicates this is an error, but not an RFC6749 Section 5.2 error.
- NSString *errorDescription =
- [NSString stringWithFormat:@"Non-200 HTTP response (%d) making token request to '%@'.",
- (int)statusCode,
- URLRequest.URL];
- NSError *returnedError =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeServerError
- underlyingError:serverError
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, returnedError);
- });
- return;
- }
- NSError *jsonDeserializationError;
- NSDictionary<NSString *, NSObject<NSCopying> *> *json =
- [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
- if (jsonDeserializationError) {
- // A problem occurred deserializing the response/JSON.
- NSString *errorDescription =
- [NSString stringWithFormat:@"JSON error parsing token response: %@",
- jsonDeserializationError.localizedDescription];
- NSError *returnedError =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONDeserializationError
- underlyingError:jsonDeserializationError
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, returnedError);
- });
- return;
- }
- OIDTokenResponse *tokenResponse =
- [[OIDTokenResponse alloc] initWithRequest:request parameters:json];
- if (!tokenResponse) {
- // A problem occurred constructing the token response from the JSON.
- NSError *returnedError =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeTokenResponseConstructionError
- underlyingError:jsonDeserializationError
- description:@"Token response invalid."];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, returnedError);
- });
- return;
- }
- // If an ID Token is included in the response, validates the ID Token following the rules
- // in OpenID Connect Core Section 3.1.3.7 for features that AppAuth directly supports
- // (which excludes rules #1, #4, #5, #7, #8, #12, and #13). Regarding rule #6, ID Tokens
- // received by this class are received via direct communication between the Client and the Token
- // Endpoint, thus we are exercising the option to rely only on the TLS validation. AppAuth
- // has a zero dependencies policy, and verifying the JWT signature would add a dependency.
- // Users of the library are welcome to perform the JWT signature verification themselves should
- // they wish.
- if (tokenResponse.idToken) {
- OIDIDToken *idToken = [[OIDIDToken alloc] initWithIDTokenString:tokenResponse.idToken];
- if (!idToken) {
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenParsingError
- underlyingError:nil
- description:@"ID Token parsing failed"];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
-
- // OpenID Connect Core Section 3.1.3.7. rule #1
- // Not supported: AppAuth does not support JWT encryption.
- // OpenID Connect Core Section 3.1.3.7. rule #2
- // Validates that the issuer in the ID Token matches that of the discovery document.
- NSURL *issuer = tokenResponse.request.configuration.issuer;
- if (issuer && ![idToken.issuer isEqual:issuer]) {
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
- underlyingError:nil
- description:@"Issuer mismatch"];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
- // OpenID Connect Core Section 3.1.3.7. rule #3 & Section 2 azp Claim
- // Validates that the aud (audience) Claim contains the client ID, or that the azp
- // (authorized party) Claim matches the client ID.
- NSString *clientID = tokenResponse.request.clientID;
- if (![idToken.audience containsObject:clientID] &&
- ![idToken.claims[@"azp"] isEqualToString:clientID]) {
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
- underlyingError:nil
- description:@"Audience mismatch"];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
-
- // OpenID Connect Core Section 3.1.3.7. rules #4 & #5
- // Not supported.
- // OpenID Connect Core Section 3.1.3.7. rule #6
- // As noted above, AppAuth only supports the code flow which results in direct communication
- // of the ID Token from the Token Endpoint to the Client, and we are exercising the option to
- // use TSL server validation instead of checking the token signature. Users may additionally
- // check the token signature should they wish.
- // OpenID Connect Core Section 3.1.3.7. rules #7 & #8
- // Not applicable. See rule #6.
- // OpenID Connect Core Section 3.1.3.7. rule #9
- // Validates that the current time is before the expiry time.
- NSTimeInterval expiresAtDifference = [idToken.expiresAt timeIntervalSinceNow];
- if (expiresAtDifference < 0) {
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
- underlyingError:nil
- description:@"ID Token expired"];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
-
- // OpenID Connect Core Section 3.1.3.7. rule #10
- // Validates that the issued at time is not more than +/- 10 minutes on the current time.
- NSTimeInterval issuedAtDifference = [idToken.issuedAt timeIntervalSinceNow];
- if (fabs(issuedAtDifference) > kOIDAuthorizationSessionIATMaxSkew) {
- NSString *message =
- [NSString stringWithFormat:@"Issued at time is more than %d seconds before or after "
- "the current time",
- kOIDAuthorizationSessionIATMaxSkew];
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
- underlyingError:nil
- description:message];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
- // Only relevant for the authorization_code response type
- if ([tokenResponse.request.grantType isEqual:OIDGrantTypeAuthorizationCode]) {
- // OpenID Connect Core Section 3.1.3.7. rule #11
- // Validates the nonce.
- NSString *nonce = authorizationResponse.request.nonce;
- if (nonce && ![idToken.nonce isEqual:nonce]) {
- NSError *invalidIDToken =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeIDTokenFailedValidationError
- underlyingError:nil
- description:@"Nonce mismatch"];
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(nil, invalidIDToken);
- });
- return;
- }
- }
-
- // OpenID Connect Core Section 3.1.3.7. rules #12
- // ACR is not directly supported by AppAuth.
- // OpenID Connect Core Section 3.1.3.7. rules #12
- // max_age is not directly supported by AppAuth.
- }
- // Success
- dispatch_async(dispatch_get_main_queue(), ^{
- callback(tokenResponse, nil);
- });
- }] resume];
- }
- #pragma mark - Registration Endpoint
- + (void)performRegistrationRequest:(OIDRegistrationRequest *)request
- completion:(OIDRegistrationCompletion)completion {
- NSURLRequest *URLRequest = [request URLRequest];
- if (!URLRequest) {
- // A problem occurred deserializing the response/JSON.
- NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONSerializationError
- underlyingError:nil
- description:@"The registration request could not "
- "be serialized as JSON."];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, returnedError);
- });
- return;
- }
- NSURLSession *session = [OIDURLSessionProvider session];
- [[session dataTaskWithRequest:URLRequest
- completionHandler:^(NSData *_Nullable data,
- NSURLResponse *_Nullable response,
- NSError *_Nullable error) {
- if (error) {
- // A network error or server error occurred.
- NSString *errorDescription =
- [NSString stringWithFormat:@"Connection error making registration request to '%@': %@.",
- URLRequest.URL,
- error.localizedDescription];
- NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeNetworkError
- underlyingError:error
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, returnedError);
- });
- return;
- }
- NSHTTPURLResponse *HTTPURLResponse = (NSHTTPURLResponse *) response;
- if (HTTPURLResponse.statusCode != 201 && HTTPURLResponse.statusCode != 200) {
- // A server error occurred.
- NSError *serverError = [OIDErrorUtilities HTTPErrorWithHTTPResponse:HTTPURLResponse
- data:data];
- // HTTP 400 may indicate an OpenID Connect Dynamic Client Registration 1.0 Section 3.3 error
- // response, checks for that
- if (HTTPURLResponse.statusCode == 400) {
- NSError *jsonDeserializationError;
- NSDictionary<NSString *, NSObject <NSCopying> *> *json =
- [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
- // if the HTTP 400 response parses as JSON and has an 'error' key, it's an OAuth error
- // these errors are special as they indicate a problem with the authorization grant
- if (json[OIDOAuthErrorFieldError]) {
- NSError *oauthError =
- [OIDErrorUtilities OAuthErrorWithDomain:OIDOAuthRegistrationErrorDomain
- OAuthResponse:json
- underlyingError:serverError];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, oauthError);
- });
- return;
- }
- }
- // not an OAuth error, just a generic server error
- NSString *errorDescription =
- [NSString stringWithFormat:@"Non-200/201 HTTP response (%d) making registration request "
- "to '%@'.",
- (int)HTTPURLResponse.statusCode,
- URLRequest.URL];
- NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeServerError
- underlyingError:serverError
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, returnedError);
- });
- return;
- }
- NSError *jsonDeserializationError;
- NSDictionary<NSString *, NSObject <NSCopying> *> *json =
- [NSJSONSerialization JSONObjectWithData:data options:0 error:&jsonDeserializationError];
- if (jsonDeserializationError) {
- // A problem occurred deserializing the response/JSON.
- NSString *errorDescription =
- [NSString stringWithFormat:@"JSON error parsing registration response: %@",
- jsonDeserializationError.localizedDescription];
- NSError *returnedError = [OIDErrorUtilities errorWithCode:OIDErrorCodeJSONDeserializationError
- underlyingError:jsonDeserializationError
- description:errorDescription];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, returnedError);
- });
- return;
- }
- OIDRegistrationResponse *registrationResponse =
- [[OIDRegistrationResponse alloc] initWithRequest:request
- parameters:json];
- if (!registrationResponse) {
- // A problem occurred constructing the registration response from the JSON.
- NSError *returnedError =
- [OIDErrorUtilities errorWithCode:OIDErrorCodeRegistrationResponseConstructionError
- underlyingError:nil
- description:@"Registration response invalid."];
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(nil, returnedError);
- });
- return;
- }
- // Success
- dispatch_async(dispatch_get_main_queue(), ^{
- completion(registrationResponse, nil);
- });
- }] resume];
- }
- @end
- NS_ASSUME_NONNULL_END
|