From f6189ced1b56eef792c9dc2df8c09c9b4bf054b6 Mon Sep 17 00:00:00 2001
From: Dominik George <dominik.george@teckids.org>
Date: Fri, 7 May 2021 15:10:30 +0200
Subject: [PATCH] Refactor OAuth utility code out into module

---
 src/lib.rs   |   1 +
 src/nss.rs   |  91 ++----------------------------------
 src/oauth.rs | 129 +++++++++++++++++++++++++++++++++++++++++++++++++++
 src/pam.rs   |  94 ++-----------------------------------
 4 files changed, 136 insertions(+), 179 deletions(-)
 create mode 100644 src/oauth.rs

diff --git a/src/lib.rs b/src/lib.rs
index 20d7cfe..c4eae87 100644
--- a/src/lib.rs
+++ b/src/lib.rs
@@ -3,6 +3,7 @@
 mod cache;
 mod logging;
 mod config;
+mod oauth;
 
 // Module and macro imports for the PAM component
 #[macro_use] extern crate pamsm;
diff --git a/src/nss.rs b/src/nss.rs
index ea6fdb7..8b147d2 100644
--- a/src/nss.rs
+++ b/src/nss.rs
@@ -15,24 +15,13 @@
 
 use crate::config::{
     get_config,
-    get_optional,
-    get_or_error
+    get_optional
 };
 use config::Config;
 
 use crate::logging::setup_log;
 
-use oauth2::{
-    AuthUrl,
-    ClientId,
-    ClientSecret,
-    RequestTokenError,
-    Scope,
-    TokenUrl
-};
-use oauth2::basic::BasicClient;
-use oauth2::reqwest;
-use oauth2::reqwest::http_client;
+use crate::oauth::get_access_token;
 
 use libnss::interop::Response;
 use libnss::passwd::{PasswdHooks, Passwd};
@@ -41,7 +30,7 @@ fn nss_hook_prepare() -> Config {
     let conf = get_config(None);
 
     let mut log_level = log::LevelFilter::Error;
-    if conf.get_bool("debug").unwrap_or_default() || conf.get_bool("nss.debug").unwrap_or_default() {
+    if get_optional(&conf, "nss.debug").unwrap_or_default() {
         log_level = log::LevelFilter::Debug;
     }
     setup_log(log_level);
@@ -49,80 +38,6 @@ fn nss_hook_prepare() -> Config {
     return conf;
 }
 
-fn get_bearer_token<T>(config: Config) -> Result<String, Response<T>> {
-    let client_id = ClientId::new(get_or_error(&config, "nss.client_id", Response::Unavail)?);
-    let client_secret = match get_optional(&config, "nss.client_secret") {
-        Some(v) => Some(ClientSecret::new(v)),
-        None => None,
-    };
-    let auth_url = match AuthUrl::new(get_or_error(&config, "nss.auth_url", Response::Unavail)?) {
-        Ok(u) => u,
-        _ => {
-            error!("Could not parse authorization URL");
-            return Err(Response::Unavail);
-        },
-    };
-    let token_url = match get_optional(&config, "nss.token_url") {
-        Some(v) => match TokenUrl::new(v) {
-            Ok(u) => Some(u),
-            Err(_) => {
-                error!("Could not parse token URL");
-                return Err(Response::Unavail);
-            }
-        },
-        None => None,
-    };
-    let scopes: Vec<&str> = get_or_error(&config, "nss.scopes", Response::Unavail)?;
-
-    let client = BasicClient::new(client_id, client_secret, auth_url, token_url);
-    let mut request = client.exchange_client_credentials();
-    for scope in scopes {
-        request = request.add_scope(Scope::new(scope.to_string()));
-    }
-    let result = request.request(http_client);
-
-    match result {
-            Ok(t) => Ok("".to_string()),
-            Err(e) => match e {
-                RequestTokenError::Request(re) => match re {
-                    reqwest::Error::Reqwest(ree) => {
-                        error!("Request error requesting token: {}", ree);
-                        return Err(Response::Unavail);
-                    },
-                    reqwest::Error::Http(he) => {
-                        error!("HTTP error requesting token: {}", he);
-                        return Err(Response::Unavail);
-                    },
-                    reqwest::Error::Io(ioe) => {
-                        error!("IO error requesting token: {}", ioe);
-                        return Err(Response::Unavail);
-                    },
-                    _ => {
-                        error!("Unknown error: {}", re);
-                        return Err(Response::Unavail);
-                    },
-                },
-                RequestTokenError::ServerResponse(t) => {
-                    error!("Authorization server returned error: {}", t);
-                    return Err(Response::Unavail);
-                },
-                RequestTokenError::Parse(pe, _) => {
-                    error!("Error parsing response: {}", pe);
-                    return Err(Response::Unavail);
-                },
-                _ => {
-                    error!("Unknown error: {}", e);
-                    return Err(Response::Unavail);
-                },
-            },
-        }
-}
-
-fn do_json_request<T>(config: Config, url: String) -> Result<String, Response<T>> {
-    let token = get_bearer_token(config)?;
-    Ok("".to_string())
-}
-
 struct OidcPasswd;
 
 impl PasswdHooks for OidcPasswd {
diff --git a/src/oauth.rs b/src/oauth.rs
new file mode 100644
index 0000000..392e72e
--- /dev/null
+++ b/src/oauth.rs
@@ -0,0 +1,129 @@
+/* Copyright 2021 Dominik George <dominik.george@teckids.org>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+use crate::config::{
+    get_or_error,
+    get_optional
+};
+
+use config::Config;
+
+use oauth2::{
+    AuthUrl,
+    ClientId,
+    ClientSecret,
+    RequestTokenError,
+    ResourceOwnerUsername,
+    ResourceOwnerPassword,
+    Scope,
+    TokenUrl
+};
+use oauth2::basic::{
+    BasicClient,
+    BasicTokenResponse
+};
+use oauth2::reqwest::http_client;
+
+fn full_key(prefix: &str, key: &str) -> String {
+    let parts = vec![prefix.to_string(), key.to_string()];
+    let full_key = parts.join(".");
+    return full_key;
+}
+
+fn get_client<E: Copy>(conf: Config, prefix: &str, error_value: E) -> Result<BasicClient, E> {
+    let client_id = ClientId::new(get_or_error(&conf, &full_key(prefix, "client_secret"), error_value)?);
+    let client_secret = match get_optional(&conf, &full_key(prefix, "client_secret")) {
+        Some(v) => Some(ClientSecret::new(v)),
+        None => None,
+    };
+    let auth_url = match AuthUrl::new(get_or_error(&conf, &full_key(prefix, "auth_url"), error_value)?) {
+        Ok(u) => u,
+        _ => {
+            error!("Could not parse authorization URL");
+            return Err(error_value);
+        },
+    };
+    let token_url = match get_optional(&conf, &full_key(prefix, "token_url")) {
+        Some(v) => match TokenUrl::new(v) {
+            Ok(u) => Some(u),
+            Err(_) => {
+                error!("Could not parse token URL");
+                return Err(error_value);
+            }
+        },
+        None => None,
+    };
+
+    let client = BasicClient::new(client_id, client_secret, auth_url, token_url);
+    return Ok(client);
+}
+
+pub fn get_access_token<E: Copy>(conf: Config, prefix: &str, error_value: E, unauth_value: E) -> Result<BasicTokenResponse, E> {
+    let scopes: Vec<&str> = get_or_error(&conf, &full_key(prefix, "scopes"), error_value)?;
+
+    let client = get_client(conf, prefix, error_value)?;
+    let mut request = client.exchange_client_credentials();
+    for scope in scopes {
+        request = request.add_scope(Scope::new(scope.to_string()));
+    }
+
+    let result = request.request(http_client);
+    match result {
+            Ok(t) => Ok(t),
+            Err(e) => match e {
+                RequestTokenError::ServerResponse(t) => {
+                    error!("Authorization server returned error: {}", t);
+                    return Err(unauth_value);
+                },
+                _ => {
+                    error!("Error fetchin access token: {}", e);
+                    return Err(error_value);
+                },
+            },
+        }
+}
+
+pub fn get_access_token_password<E: Copy>(conf: Config, prefix: &str, username: String, password: String, error_value: E, unauth_value: E) -> Result<String, E> {
+    let scopes: Vec<&str> = get_or_error(&conf, &full_key(prefix, "scopes"), error_value)?;
+
+    let res_username = ResourceOwnerUsername::new(username);
+    let res_password = ResourceOwnerPassword::new(password);
+
+    let client = get_client(conf, prefix, error_value)?;
+    let mut request = client.exchange_password(&res_username, &res_password);
+    for scope in scopes {
+        request = request.add_scope(Scope::new(scope.to_string()));
+    }
+
+    let result = request.request(http_client);
+    match result {
+            Ok(t) => Ok("".to_string()),
+            Err(e) => match e {
+                RequestTokenError::ServerResponse(t) => {
+                    error!("Authorization server returned error: {}", t);
+                    return Err(unauth_value);
+                },
+                _ => {
+                    error!("Error fetchin access token: {}", e);
+                    return Err(error_value);
+                },
+            },
+        }
+}
+
+fn do_json_request<E: Copy>(conf: Config, url: String, error_value: E, unauth_value: E) -> Result<String, E> {
+    let token = get_access_token(conf, "nss", error_value, unauth_value)?;
+    Ok("".to_string())
+}
diff --git a/src/pam.rs b/src/pam.rs
index 339739e..c455f03 100644
--- a/src/pam.rs
+++ b/src/pam.rs
@@ -17,103 +17,15 @@ use crate::config::{
     argv_to_config,
     get_config,
     get_optional,
-    get_or_error
 };
 use config::Config;
 
-use crate::logging::setup_log;
+use crate::oauth::get_access_token_password;
 
-use oauth2::{
-    AuthUrl,
-    ClientId,
-    ClientSecret,
-    RequestTokenError,
-    ResourceOwnerPassword,
-    ResourceOwnerUsername,
-    Scope,
-    TokenUrl
-};
-use oauth2::basic::{
-    BasicClient,
-    BasicTokenResponse
-};
-use oauth2::reqwest;
-use oauth2::reqwest::http_client;
+use crate::logging::setup_log;
 
 use pamsm::{PamServiceModule, Pam, PamFlag, PamError, PamLibExt};
 
-fn do_legacy_auth(username: String, password: String, config: Config) -> Result<BasicTokenResponse, PamError> {
-    let client_id = ClientId::new(get_or_error(&config, "pam.client_id", PamError::SERVICE_ERR)?);
-    let client_secret = match get_optional(&config, "pam.client_secret") {
-        Some(v) => Some(ClientSecret::new(v)),
-        None => None,
-    };
-    let auth_url = match AuthUrl::new(get_or_error(&config, "pam.auth_url", PamError::SERVICE_ERR)?) {
-        Ok(u) => u,
-        _ => {
-            error!("Could not parse authorization URL");
-            return Err(PamError::SERVICE_ERR);
-        },
-    };
-    let token_url = match get_optional(&config, "pam.token_url") {
-        Some(v) => match TokenUrl::new(v) {
-            Ok(u) => Some(u),
-            Err(_) => {
-                error!("Could not parse token URL");
-                return Err(PamError::SERVICE_ERR);
-            }
-        },
-        None => None,
-    };
-    let scopes: Vec<&str> = get_or_error(&config, "pam.scopes", PamError::SERVICE_ERR)?;
-
-    let res_username = ResourceOwnerUsername::new(username);
-    let res_password = ResourceOwnerPassword::new(password);
-
-    let client = BasicClient::new(client_id, client_secret, auth_url, token_url);
-    let mut request = client.exchange_password(&res_username, &res_password);
-    for scope in scopes {
-        request = request.add_scope(Scope::new(scope.to_string()));
-    }
-    let result = request.request(http_client);
-
-    match result {
-            Ok(t) => Ok(t),
-            Err(e) => match e {
-                RequestTokenError::Request(re) => match re {
-                    reqwest::Error::Reqwest(ree) => {
-                        error!("Request error requesting token: {}", ree);
-                        return Err(PamError::AUTHINFO_UNAVAIL);
-                    },
-                    reqwest::Error::Http(he) => {
-                        error!("HTTP error requesting token: {}", he);
-                        return Err(PamError::AUTHINFO_UNAVAIL);
-                    },
-                    reqwest::Error::Io(ioe) => {
-                        error!("IO error requesting token: {}", ioe);
-                        return Err(PamError::SYSTEM_ERR);
-                    },
-                    _ => {
-                        error!("Unknown error: {}", re);
-                        return Err(PamError::SERVICE_ERR);
-                    },
-                },
-                RequestTokenError::ServerResponse(t) => {
-                    error!("Authorization server returned error: {}", t);
-                    return Err(PamError::AUTH_ERR);
-                },
-                RequestTokenError::Parse(pe, _) => {
-                    error!("Error parsing response: {}", pe);
-                    return Err(PamError::SERVICE_ERR);
-                },
-                _ => {
-                    error!("Unknown error: {}", e);
-                    return Err(PamError::SERVICE_ERR);
-                },
-            },
-        }
-}
-
 fn pam_sm_prepare(argv: &Vec<String>) -> Config {
     let conf_args = argv_to_config(argv);
     let conf = get_config(Some(conf_args));
@@ -173,7 +85,7 @@ impl PamServiceModule for PamOidc {
             };
             debug!("Successfully got password");
 
-            match do_legacy_auth(username.to_string(), password.to_string(), conf) {
+            match get_access_token_password(conf, "pam", username.to_string(), password.to_string(), PamError::SERVICE_ERR, PamError::AUTH_ERR) {
                 Ok(_) => {
                     info!("Authenticated {} using Resource Owner Password Grant", username);
                     return PamError::SUCCESS;
-- 
GitLab