-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: revoke token chain by consent challenge ID #3932
base: master
Are you sure you want to change the base?
Conversation
af20e3f
to
fa2728b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the consent challenge id set correctly during the get consent flow? Meaning it won't change after we accept the consent challenge? I believe that was the issue when I looked at it. Maybe an e2e test could bring assurance
Check out this test: https://github.com/ory/hydra/pull/3932/files#diff-6d883efffdabd9715dc9872121018df30a5843c81e25dc6c4af2c3edc13fb21cR1194 |
I've now expanded this test to be more explicit about what does and does not get revoked, and directly test the customer use case (store the challenge ID inside the token). |
065a0c6
to
31ccc45
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
31ccc45
to
069671c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't see a blocker, but let's clarify and in case follow up on these minor comments.
return | ||
} | ||
if consentChallengeID != "" && client != "" { | ||
h.r.Writer().WriteError(w, r, errorsx.WithStack(fosite.ErrInvalidRequest.WithHint(`Query parameter 'client' and 'consent_challenge_id' cannot be set at the same time.`))) | ||
return | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think one combination missing here is when consentChallenge
and allClients
are set, then we'll run into the allClients
case but with an empty subject. Not sure what exactly the function does in that case, but please double check and add this validation as a follow-up. Consider checking for valid combinations instead of invalid ones and using a switch statement.
@@ -1192,6 +1204,79 @@ func TestAuthCodeWithDefaultStrategy(t *testing.T) { | |||
t.Run("strategy=jwt", run("jwt")) | |||
}) | |||
|
|||
t.Run("case=can revoke token chains with ID obtained from consent requests", func(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It would be good to test a real "chain", i.e. len(chain) > 1
here. Especially since we have the graceful refresh, we can get forks in the chain and I'd expect to have all branches revoked as well, right?
@@ -306,10 +311,6 @@ func (p *Persister) VerifyAndInvalidateConsentRequest(ctx context.Context, verif | |||
return nil, errorsx.WithStack(fosite.ErrInvalidRequest.WithDebug(err.Error())) | |||
} | |||
|
|||
// We set the consent challenge ID to a new UUID that we can use as a foreign key in the database | |||
// without encoding the whole flow. | |||
f.ConsentChallengeID = sqlxx.NullString(uuid.Must(uuid.NewV4()).String()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why exactly do we not update this anymore? I also see it removed in some tests.
This change adds the ability to revoke token chains by "consent challenge ID".
"Consent sessions"
Each time the user goes through a
GET /oauth2/auth?response_type=code&...
auth code flow, we persist a new "consent session" to the database.This is independent of whether the user has previously logged in and/or granted consent, or whether the user was actively asked to grant consent by the consent app. A successful journey through the auth code flow results in a new "consent session".
This consent session is uniquely identified by its "consent challenge ID". This ID is obtained from the
GET /admin/oauth2/auth/requests/consent?consent_challenge=...
API. Note that it is not the same as theconsent_challenge=...
query parameter!Any access and refresh tokens obtained from a token exchange following that particular user journey are bound to that consent session.
We call the totality of all refresh+access tokens derived from a particular consent session a "token chain".
Token revocation
Revoking an access token (AT) is simple: send the AT to
/oauth2/revoke
and it is revoked. If this AT was birthed from a refresh token (RT), the RT that birthed it is not revoked.Revoking a refresh token (RT) also revokes assocated access tokens.
What if I want to revoke a complete token chain given only an access token?
Revocation by consent challenge ID
During an authorization code flow, save the consent challenge ID into the access token session data:
Response:
Accept the consent request:
To revoke the token chain associated with this consent challenge ID, use
PR notes
The persistence code and much of the test code are pretty bad. We test implementation not behavior. There are wrong abstractions.
I have deleted
sdk_test.go
because honestly I can't see the point of that whole file.