0
0
Fork 0
mirror of https://github.com/BookStackApp/BookStack.git synced 2025-04-25 04:51:35 +00:00
BookStackApp_BookStack/app
Luke T. Shumaker c76d12d1de Oidc: Properly query the UserInfo Endpoint
BooksStack's OIDC Client requests the 'profile' and 'email' scope values
in order to have access to the 'name', 'email', and other claims.  It
looks for these claims in the ID Token that is returned along with the
Access Token.

However, the OIDC-core specification section 5.4 [1] only requires that
the Provider include those claims in the ID Token *if* an Access Token is
not also issued.  If an Access Token is issued, the Provider can leave out
those claims from the ID Token, and the Client is supposed to obtain them
by submitting the Access Token to the UserInfo Endpoint.

So I suppose it's just good luck that the OIDC Providers that BookStack
has been tested with just so happen to also stick those claims in the ID
Token even though they don't have to.  But others (in particular:
https://login.infomaniak.com) don't do so, and require fetching the
UserInfo Endpoint.)

A workaround is currently possible by having the user write a theme with a
ThemeEvents::OIDC_ID_TOKEN_PRE_VALIDATE hook that fetches the UserInfo
Endpoint.  This workaround isn't great, for a few reasons:
 1. Asking the user to implement core parts of the OIDC protocol is silly.
 2. The user either needs to re-fetch the .well-known/openid-configuration
    file to discover the endpoint (adding yet another round-trip to each
    login) or hard-code the endpoint, which is fragile.
 3. The hook doesn't receive the HTTP client configuration.

So, have BookStack's OidcService fetch the UserInfo Endpoint and inject
those claims into the ID Token, if a UserInfo Endpoint is defined.
Two points about this:
 - Injecting them into the ID Token's claims is the most obvious approach
   given the current code structure; though I'm not sure it is the best
   approach, perhaps it should instead fetch the user info in
   processAuthorizationResponse() and pass that as an argument to
   processAccessTokenCallback() which would then need a bit of
   restructuring.  But this made sense because it's also how the
   ThemeEvents::OIDC_ID_TOKEN_PRE_VALIDATE hook works.
 - OIDC *requires* that a UserInfo Endpoint exists, so why bother with
   that "if a UserInfo Endpoint is defined" bit?  Simply out of an
   abundance of caution that there's an existing BookStack user that is
   relying on it not fetching the UserInfo Endpoint in order to work with
   a non-compliant OIDC Provider.

[1]: https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims
2023-12-15 14:11:48 -07:00
..
Access Oidc: Properly query the UserInfo Endpoint 2023-12-15 14:11:48 -07:00
Activity PHPStan: Fixed larastan loading and address some level2 issues 2023-12-10 14:58:05 +00:00
Api User Account: Ensured page titles for pages and api tokens 2023-10-19 15:24:48 +01:00
App Auth: Refactored OIDC RP-logout PR code, Extracted logout 2023-12-06 13:49:53 +00:00
Config Oidc: Properly query the UserInfo Endpoint 2023-12-15 14:11:48 -07:00
Console Avatar Commend: Simplified and updated during review 2023-09-19 15:53:01 +01:00
Entities Page Templates: Changed template field name, added API support 2023-12-12 12:14:00 +00:00
Exceptions PHPStan: Fixed larastan loading and address some level2 issues 2023-12-10 14:58:05 +00:00
Facades Played around with a new app structure 2023-05-17 17:56:55 +01:00
Http URL Handling: Removed referrer-based redirect handling 2023-12-10 12:37:21 +00:00
Permissions PHPStan: Fixed larastan loading and address some level2 issues 2023-12-10 14:58:05 +00:00
References PHPStan: Fixed larastan loading and address some level2 issues 2023-12-10 14:58:05 +00:00
Search Default templates: Added page picker and working forms 2023-12-11 15:58:27 +00:00
Settings Guest control: Cleaned methods involved in fetching/handling 2023-09-16 13:18:35 +01:00
Theming PHPStan: Fixed larastan loading and address some level2 issues 2023-12-10 14:58:05 +00:00
Translation Langs: Updated translators and locale list pre v23.10 2023-10-30 11:41:36 +00:00
Uploads Images: Forced intervention loading via specific method 2023-11-19 16:34:29 +00:00
Users Users API: Fixed sending invite when using form requests 2023-12-13 15:13:54 +00:00
Util Includes: Switched page to new system 2023-11-27 19:54:47 +00:00