Files
Florian Schade 6840de574a enhancement: same site strict cookies (#8716)
To enhance the security of our application and prevent Cross-Site Request Forgery (CSRF) attacks, we have updated the
SameSite attribute of the build in Identity Provider (IDP) cookies to Strict.
2024-03-25 10:16:10 +01:00

203 lines
4.6 KiB
Go

/*
* Copyright 2017-2019 Kopano and its licensors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package identifier
import (
"encoding/base64"
"net/http"
"golang.org/x/crypto/blake2b"
)
const (
consentCookieNamePrefix = "__Secure-KKTC" // Kopano Konnect Temorary Consent
stateCookieNamePrefix = "__Secure-KKTS" // Kopano Konnect Temporary State
)
func (i *Identifier) setLogonCookie(rw http.ResponseWriter, value string) error {
cookie := http.Cookie{
Name: i.logonCookieName,
Value: value,
Path: i.pathPrefix + "/identifier/_/",
Secure: true,
HttpOnly: true,
SameSite: i.logonCookieSameSite,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) getLogonCookie(req *http.Request) (*http.Cookie, error) {
return req.Cookie(i.logonCookieName)
}
func (i *Identifier) removeLogonCookie(rw http.ResponseWriter) error {
cookie := http.Cookie{
Name: i.logonCookieName,
Path: i.pathPrefix + "/identifier/_/",
Secure: true,
HttpOnly: true,
SameSite: i.logonCookieSameSite,
Expires: farPastExpiryTime,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) setConsentCookie(rw http.ResponseWriter, cr *ConsentRequest, value string) error {
name, err := i.getConsentCookieName(cr)
if err != nil {
return err
}
cookie := http.Cookie{
Name: name,
Value: value,
MaxAge: 60,
Path: i.pathPrefix + "/identifier/_/",
Secure: true,
HttpOnly: true,
SameSite: i.consentCookieSameSite,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) getConsentCookie(req *http.Request, cr *ConsentRequest) (*http.Cookie, error) {
name, err := i.getConsentCookieName(cr)
if err != nil {
return nil, err
}
return req.Cookie(name)
}
func (i *Identifier) removeConsentCookie(rw http.ResponseWriter, req *http.Request, cr *ConsentRequest) error {
name, err := i.getConsentCookieName(cr)
if err != nil {
return nil
}
cookie := http.Cookie{
Name: name,
Path: i.pathPrefix + "/identifier/_/",
Secure: true,
HttpOnly: true,
SameSite: i.consentCookieSameSite,
Expires: farPastExpiryTime,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) getConsentCookieName(cr *ConsentRequest) (string, error) {
// Consent cookie names are based on parameters in the request.
hasher, err := blake2b.New256(nil)
if err != nil {
return "", err
}
hasher.Write([]byte(cr.State))
hasher.Write([]byte("h"))
hasher.Write([]byte(cr.ClientID))
hasher.Write([]byte("e"))
hasher.Write([]byte(cr.RawRedirectURI))
hasher.Write([]byte("l"))
hasher.Write([]byte(cr.Ref))
hasher.Write([]byte("o"))
hasher.Write([]byte(cr.Nonce))
name := base64.RawURLEncoding.EncodeToString(hasher.Sum(nil))
return consentCookieNamePrefix + "-" + name, nil
}
func (i *Identifier) setStateCookie(rw http.ResponseWriter, scope string, state string, value string) error {
name, err := i.getStateCookieName(state)
if err != nil {
return err
}
cookie := http.Cookie{
Name: name,
Value: value,
MaxAge: 600,
Path: i.pathPrefix + "/identifier/" + scope,
Secure: true,
HttpOnly: true,
SameSite: i.stateCookieSameSite,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) getStateCookie(req *http.Request, state string) (*http.Cookie, error) {
name, err := i.getStateCookieName(state)
if err != nil {
return nil, err
}
return req.Cookie(name)
}
func (i *Identifier) removeStateCookie(rw http.ResponseWriter, req *http.Request, scope string, state string) error {
name, err := i.getStateCookieName(state)
if err != nil {
return nil
}
cookie := http.Cookie{
Name: name,
Path: i.pathPrefix + "/identifier/" + scope,
Secure: true,
HttpOnly: true,
SameSite: i.stateCookieSameSite,
Expires: farPastExpiryTime,
}
http.SetCookie(rw, &cookie)
return nil
}
func (i *Identifier) getStateCookieName(state string) (string, error) {
// State cookie names are based on the state value.
hasher, err := blake2b.New256(nil)
if err != nil {
return "", err
}
hasher.Write([]byte(state))
name := base64.RawURLEncoding.EncodeToString(hasher.Sum(nil))
return stateCookieNamePrefix + "-" + name, nil
}