89 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			89 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Go
		
	
	
	
package validation
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"net/http"
 | 
						|
	"os"
 | 
						|
	"sort"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/apis/options"
 | 
						|
	"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/encryption"
 | 
						|
)
 | 
						|
 | 
						|
func validateCookie(o options.Cookie) []string {
 | 
						|
	msgs := validateCookieSecret(o.Secret, o.SecretFile)
 | 
						|
 | 
						|
	if o.Expire != time.Duration(0) && o.Refresh >= o.Expire {
 | 
						|
		msgs = append(msgs, fmt.Sprintf(
 | 
						|
			"cookie_refresh (%q) must be less than cookie_expire (%q)",
 | 
						|
			o.Refresh.String(),
 | 
						|
			o.Expire.String()))
 | 
						|
	}
 | 
						|
 | 
						|
	switch o.SameSite {
 | 
						|
	case "", "none", "lax", "strict":
 | 
						|
	default:
 | 
						|
		msgs = append(msgs, fmt.Sprintf("cookie_samesite (%q) must be one of ['', 'lax', 'strict', 'none']", o.SameSite))
 | 
						|
	}
 | 
						|
 | 
						|
	// Sort cookie domains by length, so that we try longer (and more specific) domains first
 | 
						|
	sort.Slice(o.Domains, func(i, j int) bool {
 | 
						|
		return len(o.Domains[i]) > len(o.Domains[j])
 | 
						|
	})
 | 
						|
 | 
						|
	msgs = append(msgs, validateCookieName(o.Name)...)
 | 
						|
	return msgs
 | 
						|
}
 | 
						|
 | 
						|
func validateCookieName(name string) []string {
 | 
						|
	msgs := []string{}
 | 
						|
 | 
						|
	cookie := &http.Cookie{Name: name}
 | 
						|
	if cookie.String() == "" {
 | 
						|
		msgs = append(msgs, fmt.Sprintf("invalid cookie name: %q", name))
 | 
						|
	}
 | 
						|
 | 
						|
	if len(name) > 256 {
 | 
						|
		msgs = append(msgs, fmt.Sprintf("cookie name should be under 256 characters: cookie name is %d characters", len(name)))
 | 
						|
	}
 | 
						|
	return msgs
 | 
						|
}
 | 
						|
 | 
						|
func validateCookieSecret(secret string, secretFile string) []string {
 | 
						|
	if secret == "" && secretFile == "" {
 | 
						|
		return []string{"missing setting: cookie-secret or cookie-secret-file"}
 | 
						|
	}
 | 
						|
	if secret == "" && secretFile != "" {
 | 
						|
		fileData, err := os.ReadFile(secretFile)
 | 
						|
		if err != nil {
 | 
						|
			return []string{"could not read cookie secret file: " + secretFile}
 | 
						|
		}
 | 
						|
		// Validate the file content as a secret
 | 
						|
		secretBytes := encryption.SecretBytes(string(fileData))
 | 
						|
		switch len(secretBytes) {
 | 
						|
		case 16, 24, 32:
 | 
						|
			// Valid secret size found
 | 
						|
			return []string{}
 | 
						|
		}
 | 
						|
		// Invalid secret size found, return a message
 | 
						|
		return []string{fmt.Sprintf(
 | 
						|
			"cookie_secret from file must be 16, 24, or 32 bytes to create an AES cipher, but is %d bytes",
 | 
						|
			len(secretBytes)),
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	secretBytes := encryption.SecretBytes(secret)
 | 
						|
	// Check if the secret is a valid length
 | 
						|
	switch len(secretBytes) {
 | 
						|
	case 16, 24, 32:
 | 
						|
		// Valid secret size found
 | 
						|
		return []string{}
 | 
						|
	}
 | 
						|
	// Invalid secret size found, return a message
 | 
						|
	return []string{fmt.Sprintf(
 | 
						|
		"cookie_secret must be 16, 24, or 32 bytes to create an AES cipher, but is %d bytes",
 | 
						|
		len(secretBytes)),
 | 
						|
	}
 | 
						|
}
 |