summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorFrédéric Mangano-Tarumi <fmang@mg0.fr>2020-07-28 16:33:41 +0200
committerLukas Fleischer <lfleischer@archlinux.org>2021-02-20 17:24:30 +0100
commitbe31675b6589e66c8b10a64b44591b594d2eb735 (patch)
tree57d0d3d78539db54913b006ccb0d5b5aac811dd8
parent5fb4fc12de1dc374395340724d192271d4aa31f6 (diff)
downloadaur-be31675b6589e66c8b10a64b44591b594d2eb735.tar.gz
aur-be31675b6589e66c8b10a64b44591b594d2eb735.tar.xz
Guard OAuth exceptions to provide better messages
Signed-off-by: Lukas Fleischer <lfleischer@archlinux.org>
-rw-r--r--aurweb/routers/sso.py16
1 files changed, 13 insertions, 3 deletions
diff --git a/aurweb/routers/sso.py b/aurweb/routers/sso.py
index 817adadb..2e4fbacc 100644
--- a/aurweb/routers/sso.py
+++ b/aurweb/routers/sso.py
@@ -5,7 +5,7 @@ from urllib.parse import urlencode
import fastapi
-from authlib.integrations.starlette_client import OAuth
+from authlib.integrations.starlette_client import OAuth, OAuthError
from fastapi import Depends, HTTPException
from fastapi.responses import RedirectResponse
from sqlalchemy.sql import select
@@ -95,8 +95,18 @@ async def authenticate(request: Request, conn=Depends(aurweb.db.connect)):
detail=_('The login form is currently disabled for your IP address, '
'probably due to sustained spam attacks. Sorry for the '
'inconvenience.'))
- token = await oauth.sso.authorize_access_token(request)
- user = await oauth.sso.parse_id_token(request, token)
+
+ try:
+ token = await oauth.sso.authorize_access_token(request)
+ user = await oauth.sso.parse_id_token(request, token)
+ except OAuthError:
+ # Here, most OAuth errors should be caused by forged or expired tokens.
+ # Let’s give attackers as little information as possible.
+ _ = get_translator_for_request(request)
+ raise HTTPException(
+ status_code=400,
+ detail=_('Bad OAuth token. Please retry logging in from the start.'))
+
sub = user.get("sub") # this is the SSO account ID in JWT terminology
if not sub:
_ = get_translator_for_request(request)