func (c *OpenIDConnectExplicitHandler) PopulateTokenEndpointResponse(ctx context.Context, req *http.Request, requester fosite.AccessRequester, responder fosite.AccessResponder) error { if !requester.GetGrantTypes().Exact("authorization_code") { return errors.Wrap(fosite.ErrUnknownRequest, "") } authorize, err := c.OpenIDConnectRequestStorage.GetOpenIDConnectSession(ctx, requester.GetRequestForm().Get("code"), requester) if errors.Cause(err) == ErrNoSessionFound { return errors.Wrap(fosite.ErrUnknownRequest, err.Error()) } else if err != nil { return errors.Wrap(fosite.ErrServerError, err.Error()) } if !authorize.GetGrantedScopes().Has("openid") { return errors.Wrap(fosite.ErrMisconfiguration, "The an openid connect session was found but the openid scope is missing in it") } if !requester.GetClient().GetGrantTypes().Has("authorization_code") { return errors.Wrap(fosite.ErrInvalidGrant, "The client is not allowed to use the authorization_code grant type") } if !requester.GetClient().GetResponseTypes().Has("id_token") { return errors.Wrap(fosite.ErrInvalidGrant, "The client is not allowed to use response type id_token") } return c.IssueExplicitIDToken(ctx, req, authorize, responder) }
// HandleTokenEndpointRequest implements https://tools.ietf.org/html/rfc6749#section-4.3.2 func (c *ResourceOwnerPasswordCredentialsGrantHandler) HandleTokenEndpointRequest(ctx context.Context, req *http.Request, request fosite.AccessRequester) error { // grant_type REQUIRED. // Value MUST be set to "password". if !request.GetGrantTypes().Exact("password") { return errors.Wrap(fosite.ErrUnknownRequest, "") } if !request.GetClient().GetGrantTypes().Has("password") { return errors.Wrap(fosite.ErrInvalidGrant, "The client is not allowed to use grant type password") } username := req.PostForm.Get("username") password := req.PostForm.Get("password") if username == "" || password == "" { return errors.Wrap(fosite.ErrInvalidRequest, "Username or password missing") } else if err := c.ResourceOwnerPasswordCredentialsGrantStorage.Authenticate(ctx, username, password); errors.Cause(err) == fosite.ErrNotFound { return errors.Wrap(fosite.ErrInvalidRequest, err.Error()) } else if err != nil { return errors.Wrap(fosite.ErrServerError, err.Error()) } client := request.GetClient() for _, scope := range request.GetRequestedScopes() { if !c.ScopeStrategy(client.GetScopes(), scope) { return errors.Wrap(fosite.ErrInvalidScope, fmt.Sprintf("The client is not allowed to request scope %s", scope)) } } // Credentials must not be passed around, potentially leaking to the database! delete(request.GetRequestForm(), "password") return nil }
// ValidateTokenEndpointRequest implements https://tools.ietf.org/html/rfc6749#section-4.3.2 func (c *ResourceOwnerPasswordCredentialsGrantHandler) ValidateTokenEndpointRequest(_ context.Context, req *http.Request, request fosite.AccessRequester) error { // grant_type REQUIRED. // Value MUST be set to "password". if request.GetGrantType() != "password" { return nil } username := req.PostForm.Get("username") password := req.PostForm.Get("password") if username == "" || password == "" { return errors.New(fosite.ErrInvalidRequest) } else if err := c.Store.DoCredentialsAuthenticate(username, password); err == pkg.ErrNotFound { return errors.New(fosite.ErrInvalidRequest) } else if err != nil { return errors.New(fosite.ErrServerError) } // Credentials must not be passed around, potentially leaking to the database! delete(request.GetRequestForm(), "password") request.SetGrantTypeHandled("password") return nil }