refactor(oidc): Remove support for OIDC RP-Initiated logout

Token revocation was split out from MSC2964 to MSC4254, and RP-Initiated
logout is now mentioned only as an alternative.

Signed-off-by: Kévin Commaille <zecakeh@tedomum.fr>
This commit is contained in:
Kévin Commaille
2025-02-17 11:20:03 +01:00
committed by Damir Jelić
parent 25d39997a4
commit d4b92de8e4
5 changed files with 9 additions and 159 deletions

View File

@@ -800,10 +800,8 @@ impl Client {
Ok(Arc::new(session_verification_controller))
}
/// Log out the current user. This method returns an optional URL that
/// should be presented to the user to complete logout (in the case of
/// Session having been authenticated using OIDC).
pub async fn logout(&self) -> Result<Option<String>, ClientError> {
/// Log the current user out.
pub async fn logout(&self) -> Result<(), ClientError> {
let Some(auth_api) = self.inner.auth_api() else {
return Err(anyhow!("Missing authentication API").into());
};
@@ -812,19 +810,13 @@ impl Client {
AuthApi::Matrix(a) => {
tracing::info!("Logging out via the homeserver.");
a.logout().await?;
Ok(None)
Ok(())
}
AuthApi::Oidc(api) => {
tracing::info!("Logging out via OIDC.");
let end_session_builder = api.logout().await?;
if let Some(builder) = end_session_builder {
let url = builder.build()?.url;
return Ok(Some(url.to_string()));
}
Ok(None)
api.logout().await?;
Ok(())
}
_ => Err(anyhow!("Unknown authentication API").into()),
}

View File

@@ -609,11 +609,7 @@ mod tests {
// Restore the session.
oidc.restore_session(tests::mock_session(tokens.clone())).await?;
let end_session_builder = oidc.logout().await?;
// No end session builder because our test impl doesn't provide an end session
// endpoint.
assert!(end_session_builder.is_none());
oidc.logout().await?;
// Both the access token and the refresh tokens have been invalidated.
{

View File

@@ -1,112 +0,0 @@
// Copyright 2023 Kévin Commaille
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
use language_tags::LanguageTag;
use mas_oidc_client::{
error::TokenRevokeError,
requests::rp_initiated_logout::{build_end_session_url, LogoutData},
};
use tracing::instrument;
use url::Url;
use super::{Oidc, OidcError};
use crate::Result;
/// Builder type used to configure optional settings for constructing an
/// [RP-Initiated Logout] URL with an OpenID Connect provider.
///
/// Created with [`Oidc::logout()`]. Finalized with [`Self::build()`].
///
/// [RP-Initiated Logout]: https://openid.net/specs/openid-connect-rpinitiated-1_0.html
#[allow(missing_debug_implementations)]
pub struct OidcEndSessionUrlBuilder {
oidc: Oidc,
end_session_endpoint: Url,
client_id: String,
post_logout_redirect_uri: Option<Url>,
ui_locales: Option<Vec<LanguageTag>>,
}
impl OidcEndSessionUrlBuilder {
pub(super) fn new(oidc: Oidc, end_session_endpoint: Url, client_id: String) -> Self {
Self {
oidc,
end_session_endpoint,
client_id,
post_logout_redirect_uri: None,
ui_locales: None,
}
}
/// Set the URI where the user will be redirected after logging out.
///
/// Must be one of the `post_logout_redirect_uris` registered in the client
/// metadata.
pub fn post_logout_redirect_uri(mut self, redirect_uri: Url) -> Self {
self.post_logout_redirect_uri = Some(redirect_uri);
self
}
/// Set the preferred locales of the user.
///
/// Must be ordered from the preferred locale to the least preferred locale.
pub fn ui_locales(mut self, ui_locales: Vec<LanguageTag>) -> Self {
self.ui_locales = Some(ui_locales);
self
}
/// Get the URL that should be presented to log out from the OIDC provider's
/// interface.
///
/// If a `post_logout_redirect_uri` was provided, the user will be
/// redirected to it after logging out with a `state` query parameter that
/// is the same as the one in the `OidcEndSessionData`.
#[instrument(target = "matrix_sdk::client", skip_all)]
pub fn build(self) -> Result<OidcEndSessionData, OidcError> {
let Self { oidc, end_session_endpoint, client_id, post_logout_redirect_uri, ui_locales } =
self;
// We only need one of those.
let (id_token_hint, logout_hint) = if let Some(id_token) = oidc.latest_id_token() {
(Some(id_token.into_string()), None)
} else {
let logout_hint = oidc.client.user_id().map(|user_id| format!("mxid:{user_id}"));
(None, logout_hint)
};
let logout_data = LogoutData {
id_token_hint,
logout_hint,
client_id: Some(client_id),
post_logout_redirect_uri,
ui_locales,
};
let (url, state) =
build_end_session_url(end_session_endpoint, logout_data, &mut super::rng()?)
.map_err(TokenRevokeError::from)?;
Ok(OidcEndSessionData { url, state })
}
}
/// Data for the user to log out from their account in the issuer's interface.
#[derive(Debug, Clone)]
pub struct OidcEndSessionData {
/// The URL that should be presented.
pub url: Url,
/// A unique identifier for the request, if the user is to be redirected to
/// the client after logging out.
pub state: Option<String>,
}

View File

@@ -183,7 +183,6 @@ mod auth_code_builder;
mod backend;
mod cross_process;
mod data_serde;
mod end_session_builder;
#[cfg(all(feature = "e2e-encryption", not(target_arch = "wasm32")))]
pub mod qrcode;
pub mod registrations;
@@ -193,7 +192,6 @@ mod tests;
pub use self::{
auth_code_builder::{OidcAuthCodeUrlBuilder, OidcAuthorizationData},
cross_process::CrossProcessRefreshLockError,
end_session_builder::{OidcEndSessionData, OidcEndSessionUrlBuilder},
};
use self::{
backend::{server::OidcServer, OidcBackend},
@@ -1469,13 +1467,7 @@ impl Oidc {
}
/// Log out from the currently authenticated session.
///
/// On success, if the provider supports [RP-Initiated Logout], an
/// [`OidcEndSessionUrlBuilder`] will be provided to build the URL allowing
/// the user to log out from their account in the provider's interface.
///
/// [RP-Initiated Logout]: https://openid.net/specs/openid-connect-rpinitiated-1_0.html
pub async fn logout(&self) -> Result<Option<OidcEndSessionUrlBuilder>, OidcError> {
pub async fn logout(&self) -> Result<(), OidcError> {
let provider_metadata = self.provider_metadata().await?;
let client_credentials = self.data().ok_or(OidcError::NotAuthenticated)?.credentials();
@@ -1506,20 +1498,11 @@ impl Oidc {
.await?;
}
let end_session_builder =
provider_metadata.end_session_endpoint.clone().map(|end_session_endpoint| {
OidcEndSessionUrlBuilder::new(
self.clone(),
end_session_endpoint,
client_credentials.client_id().to_owned(),
)
});
if let Some(manager) = self.ctx().cross_process_token_refresh_manager.get() {
manager.on_logout().await?;
}
Ok(end_session_builder)
Ok(())
}
}

View File

@@ -610,22 +610,13 @@ impl OidcCli {
/// Log out from this session.
async fn logout(&self) -> anyhow::Result<()> {
// Log out via OIDC.
let url_builder = self.client.oidc().logout().await?;
self.client.oidc().logout().await?;
// Delete the stored session and database.
let data_dir = self.session_file.parent().expect("The file has a parent directory");
fs::remove_dir_all(data_dir).await?;
println!("\nLogged out successfully");
if let Some(url_builder) = url_builder {
let data = url_builder.build()?;
println!(
"\nTo log out from your account in the provider's interface, visit: {}",
data.url
);
}
println!("\nExiting…");
Ok(())