重复授权给门卫提供错误422(资源所有者凭证流)

时间:2015-07-02 19:45:45

标签: ruby-on-rails oauth doorkeeper

我是Rails和webdev的新手。尝试使用Rails + Devise + Doorkeeper为移动应用程序实现简单的API(如https://github.com/doorkeeper-gem/doorkeeper-provider-app中所示)。

如果用户已经收到令牌,则面临用户无法发出授权请求(POST / oauth / token)的问题。即:

curl -F grant_type=password -F username=1@tothetrip.com -F password=12345678 -X POST http://api.to_the_trip.dev/oauth/token

第一次接收:

{"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjp7ImlkIjoyLCJlbWFpbCI6IjFAdG90aGV0cmlwLmNvbSJ9fQ.dYai6nH_KYb9YbDltqwFuzCO3i0igR_gw2T7u_TeVcI","token_type":"bearer","expires_in":7200,"created_at":1435864812}

Token转到oauth_access_tokens表(JWT不需要什么,但不是问题)。

如果我重复此请求,我将收到422错误和rails'页面,如

    ActiveRecord::RecordInvalid in Doorkeeper::TokensController#create
Validation failed: Token has already been taken

activerecord (4.2.3) lib/active_record/validations.rb:79:in `raise_record_invalid'
activerecord (4.2.3) lib/active_record/validations.rb:43:in `save!'
activerecord (4.2.3) lib/active_record/attribute_methods/dirty.rb:29:in `save!'
activerecord (4.2.3) lib/active_record/transactions.rb:291:in `block in save!'
activerecord (4.2.3) lib/active_record/transactions.rb:351:in `block in with_transaction_returning_status'
activerecord (4.2.3) lib/active_record/connection_adapters/abstract/database_statements.rb:213:in `block in transaction'
activerecord (4.2.3) lib/active_record/connection_adapters/abstract/transaction.rb:184:in `within_new_transaction'
activerecord (4.2.3) lib/active_record/connection_adapters/abstract/database_statements.rb:213:in `transaction'
activerecord (4.2.3) lib/active_record/transactions.rb:220:in `transaction'
activerecord (4.2.3) lib/active_record/transactions.rb:348:in `with_transaction_returning_status'
activerecord (4.2.3) lib/active_record/transactions.rb:291:in `save!'
activerecord (4.2.3) lib/active_record/persistence.rb:51:in `create!'
doorkeeper (2.2.1) lib/doorkeeper/models/access_token_mixin.rb:76:in `find_or_create_for'
doorkeeper (2.2.1) lib/doorkeeper/oauth/request_concern.rb:33:in `find_or_create_access_token'
doorkeeper (2.2.1) lib/doorkeeper/oauth/password_access_token_request.rb:30:in `before_successful_response'
doorkeeper (2.2.1) lib/doorkeeper/oauth/request_concern.rb:7:in `authorize'
doorkeeper (2.2.1) lib/doorkeeper/request/password.rb:19:in `authorize'
doorkeeper (2.2.1) app/controllers/doorkeeper/tokens_controller.rb:42:in `authorize_response'
doorkeeper (2.2.1) app/controllers/doorkeeper/tokens_controller.rb:4:in `create'

即使我使用POST / oauth / revoke撤销令牌,除了撤销oauth_access_tokens中的时间戳之外,一切都会相同。这很奇怪。

我稍微调查一下,在门卫gem中找到一段代码(access_token_mixin.rb):

def find_or_create_for(application, resource_owner_id, scopes, expires_in, use_refresh_token)
        if Doorkeeper.configuration.reuse_access_token
          access_token = matching_token_for(application, resource_owner_id, scopes)
          if access_token && !access_token.expired?
            return access_token
          end
        end
        create!(
          application_id:    application.try(:id),
          resource_owner_id: resource_owner_id,
          scopes:            scopes.to_s,
          expires_in:        expires_in,
          use_refresh_token: use_refresh_token
        )
      end

所以,错误在于创造!方法,它说我们试图添加重复(在stacktrace中)。如果我在Doorkeeper.configure中设置了reuse_access_token,那就没关系。但是我会在每次授权后收到相同的令牌,这是非常不安全的,据我所知。是的,如果我从oauth_access_tokens手动删除令牌,那么我将能够进行身份验证。

那有什么不对?

我的门卫配置:

Doorkeeper.configure do
  # Change the ORM that doorkeeper will use.
  # Currently supported options are :active_record, :mongoid2, :mongoid3,
  # :mongoid4, :mongo_mapper
  orm :active_record

  resource_owner_authenticator do
    current_user || env['warden'].authenticate!(:scope => :user)
  end

  resource_owner_from_credentials do |routes|
    request.params[:user] = {:email => request.params[:username], :password => request.params[:password]}
    request.env["devise.allow_params_authentication"] = true
    user = request.env['warden'].authenticate!(:scope => :user)
    env['warden'].logout
    user
  end

  access_token_generator "Doorkeeper::JWT"
end

Doorkeeper.configuration.token_grant_types << "password"

Doorkeeper::JWT.configure do
#JWT config
end

路线:

require 'api_constraints'

Rails.application.routes.draw do
  use_doorkeeper
  devise_for :users
  namespace :api, defaults: {format: :json}, constraints: { subdomain: 'api' }, path: '/' do
    scope module: :v1, constraints: ApiConstraints.new(version: 1, default: true) do
      resources :users, :only => [:show, :create, :update]

      get '/me' => "credentials#me"
    end
  end
end

2 个答案:

答案 0 :(得分:7)

好吧,如果你想找到答案,那就提出一个问题。

问题在于Doorkeeper :: JWT令牌的默认实现。它在有效负载中没有任何随机性,因此对于每个用户的身份验证始终是相同的。所以我补充道:

Doorkeeper::JWT.configure do
  token_payload do |opts|
    user = User.find(opts[:resource_owner_id])
    {
      iss: "myapp",  #this
      iat: DateTime.current.utc.to_i,   #this
      rnd: SecureRandom.hex,   #and this

      user: {
        id: user.id,
        email: user.email
      }
    }
  end

  secret_key "key"

  encryption_method :hs256
end

它运作正常。

答案 1 :(得分:6)

我没有足够的声誉对所选答案发表评论,因此我将添加另一个答案来提出改进建议。

不是创建受名称冲突影响的rnd声明,而是使用jti保留声明,因为它旨在为JWT提供唯一标识符。我还建议使用UUID而不是Hex来表示jti值。

Doorkeeper::JWT.configure do
  token_payload do |opts|
    user = User.find(opts[:resource_owner_id])
    {
      iss: "myapp",
      iat: DateTime.current.utc.to_i,
      jti: SecureRandom.uuid,

      user: {
        id: user.id,
        email: user.email
      }
    }
  end

  secret_key "key"

  encryption_method :hs256
end

You can read more about JWT reserved claims here.