Update scope validator

This commit is contained in:
NipuniBhagya 2025-05-18 13:07:08 +05:30
parent 33671e6dd1
commit 5b1daaefc3
6 changed files with 52 additions and 51 deletions

View file

@ -92,11 +92,11 @@ func main() {
os.Exit(1) os.Exit(1)
} }
// 5. (Optional) Build the policy engine // 5. (Optional) Build the access controler
engine := &authz.DefaultPolicyEngine{} accessController := &authz.ScopeValidator{}
// 6. Build the main router // 6. Build the main router
mux := proxy.NewRouter(cfg, provider, engine) mux := proxy.NewRouter(cfg, provider, accessController)
listen_address := fmt.Sprintf(":%d", cfg.ListenPort) listen_address := fmt.Sprintf(":%d", cfg.ListenPort)

View file

@ -0,0 +1,19 @@
package authz
import "net/http"
type Decision int
const (
DecisionAllow Decision = iota
DecisionDeny
)
type AccessControlResult struct {
Decision Decision
Message string
}
type AccessControl interface {
ValidateAccess(r *http.Request, claims *TokenClaims, requiredScopes any) AccessControlResult
}

View file

@ -1,19 +0,0 @@
package authz
import "net/http"
type Decision int
const (
DecisionAllow Decision = iota
DecisionDeny
)
type PolicyResult struct {
Decision Decision
Message string
}
type PolicyEngine interface {
Evaluate(r *http.Request, claims *TokenClaims, requiredScopes any) PolicyResult
}

View file

@ -12,14 +12,14 @@ type TokenClaims struct {
Scopes []string Scopes []string
} }
type DefaultPolicyEngine struct{} type ScopeValidator struct{}
// Evaluate and checks the token claims against one or more required scopes. // Evaluate and checks the token claims against one or more required scopes.
func (d *DefaultPolicyEngine) Evaluate( func (d *ScopeValidator) ValidateAccess(
_ *http.Request, _ *http.Request,
claims *TokenClaims, claims *TokenClaims,
requiredScopes any, requiredScopes any,
) PolicyResult { ) AccessControlResult {
logger.Info("Required scopes: %v", requiredScopes) logger.Info("Required scopes: %v", requiredScopes)
@ -32,7 +32,7 @@ func (d *DefaultPolicyEngine) Evaluate(
} }
if strings.TrimSpace(scopeStr) == "" { if strings.TrimSpace(scopeStr) == "" {
return PolicyResult{DecisionAllow, ""} return AccessControlResult{DecisionAllow, ""}
} }
scopes := strings.FieldsFunc(scopeStr, func(r rune) bool { scopes := strings.FieldsFunc(scopeStr, func(r rune) bool {
@ -48,7 +48,7 @@ func (d *DefaultPolicyEngine) Evaluate(
logger.Info("Token scopes: %v", claims.Scopes) logger.Info("Token scopes: %v", claims.Scopes)
for _, tokenScope := range claims.Scopes { for _, tokenScope := range claims.Scopes {
if _, ok := required[tokenScope]; ok { if _, ok := required[tokenScope]; ok {
return PolicyResult{DecisionAllow, ""} return AccessControlResult{DecisionAllow, ""}
} }
} }
@ -56,7 +56,7 @@ func (d *DefaultPolicyEngine) Evaluate(
for s := range required { for s := range required {
list = append(list, s) list = append(list, s)
} }
return PolicyResult{ return AccessControlResult{
DecisionDeny, DecisionDeny,
fmt.Sprintf("missing required scope(s): %s", strings.Join(list, ", ")), fmt.Sprintf("missing required scope(s): %s", strings.Join(list, ", ")),
} }

View file

@ -18,7 +18,7 @@ import (
// NewRouter builds an http.ServeMux that routes // NewRouter builds an http.ServeMux that routes
// * /authorize, /token, /register, /.well-known to the provider or proxy // * /authorize, /token, /register, /.well-known to the provider or proxy
// * MCP paths to the MCP server, etc. // * MCP paths to the MCP server, etc.
func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.PolicyEngine) http.Handler { func NewRouter(cfg *config.Config, provider authz.Provider, accessController authz.AccessControl) http.Handler {
mux := http.NewServeMux() mux := http.NewServeMux()
modifiers := map[string]RequestModifier{ modifiers := map[string]RequestModifier{
@ -56,6 +56,14 @@ func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.P
defaultPaths = append(defaultPaths, "/.well-known/oauth-authorization-server") defaultPaths = append(defaultPaths, "/.well-known/oauth-authorization-server")
} }
defaultPaths = append(defaultPaths, "/authorize")
defaultPaths = append(defaultPaths, "/token")
defaultPaths = append(defaultPaths, "/register")
} else {
defaultPaths = []string{"/authorize", "/token", "/register", "/.well-known/oauth-authorization-server"}
}
}
mux.HandleFunc("/.well-known/oauth-protected-resource", func(w http.ResponseWriter, r *http.Request) { mux.HandleFunc("/.well-known/oauth-protected-resource", func(w http.ResponseWriter, r *http.Request) {
origin := r.Header.Get("Origin") origin := r.Header.Get("Origin")
allowed := getAllowedOrigin(origin, cfg) allowed := getAllowedOrigin(origin, cfg)
@ -70,14 +78,6 @@ func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.P
}) })
registeredPaths["/.well-known/oauth-protected-resource"] = true registeredPaths["/.well-known/oauth-protected-resource"] = true
defaultPaths = append(defaultPaths, "/authorize")
defaultPaths = append(defaultPaths, "/token")
defaultPaths = append(defaultPaths, "/register")
} else {
defaultPaths = []string{"/authorize", "/token", "/register", "/.well-known/oauth-authorization-server"}
}
}
// Remove duplicates from defaultPaths // Remove duplicates from defaultPaths
uniquePaths := make(map[string]bool) uniquePaths := make(map[string]bool)
cleanPaths := []string{} cleanPaths := []string{}
@ -91,7 +91,7 @@ func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.P
for _, path := range defaultPaths { for _, path := range defaultPaths {
if !registeredPaths[path] { if !registeredPaths[path] {
mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, policyEngine)) mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, accessController))
registeredPaths[path] = true registeredPaths[path] = true
} }
} }
@ -99,14 +99,14 @@ func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.P
// MCP paths // MCP paths
mcpPaths := cfg.GetMCPPaths() mcpPaths := cfg.GetMCPPaths()
for _, path := range mcpPaths { for _, path := range mcpPaths {
mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, policyEngine)) mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, accessController))
registeredPaths[path] = true registeredPaths[path] = true
} }
// Register paths from PathMapping that haven't been registered yet // Register paths from PathMapping that haven't been registered yet
for path := range cfg.PathMapping { for path := range cfg.PathMapping {
if !registeredPaths[path] { if !registeredPaths[path] {
mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, policyEngine)) mux.HandleFunc(path, buildProxyHandler(cfg, modifiers, accessController))
registeredPaths[path] = true registeredPaths[path] = true
} }
} }
@ -114,7 +114,7 @@ func NewRouter(cfg *config.Config, provider authz.Provider, policyEngine authz.P
return mux return mux
} }
func buildProxyHandler(cfg *config.Config, modifiers map[string]RequestModifier, policyEngine authz.PolicyEngine) http.HandlerFunc { func buildProxyHandler(cfg *config.Config, modifiers map[string]RequestModifier, accessController authz.AccessControl) http.HandlerFunc {
// Parse the base URLs up front // Parse the base URLs up front
authBase, err := url.Parse(cfg.AuthServerBaseURL) authBase, err := url.Parse(cfg.AuthServerBaseURL)
if err != nil { if err != nil {
@ -175,7 +175,7 @@ func buildProxyHandler(cfg *config.Config, modifiers map[string]RequestModifier,
} }
isSSE = true isSSE = true
} else { } else {
if err := authorizeMCP(w, r, isLatestSpec, cfg, policyEngine); err != nil { if err := authorizeMCP(w, r, isLatestSpec, cfg, accessController); err != nil {
http.Error(w, err.Error(), http.StatusForbidden) http.Error(w, err.Error(), http.StatusForbidden)
return return
} }
@ -300,7 +300,7 @@ func authorizeSSE(w http.ResponseWriter, r *http.Request, isLatestSpec bool, res
} }
// Handles both v1 (just signature) and v2 (aud + scope) flows // Handles both v1 (just signature) and v2 (aud + scope) flows
func authorizeMCP(w http.ResponseWriter, r *http.Request, isLatestSpec bool, cfg *config.Config, policyEngine authz.PolicyEngine) error { func authorizeMCP(w http.ResponseWriter, r *http.Request, isLatestSpec bool, cfg *config.Config, accessController authz.AccessControl) error {
authzHeader := r.Header.Get("Authorization") authzHeader := r.Header.Get("Authorization")
if !strings.HasPrefix(authzHeader, "Bearer ") { if !strings.HasPrefix(authzHeader, "Bearer ") {
if isLatestSpec { if isLatestSpec {
@ -340,7 +340,7 @@ func authorizeMCP(w http.ResponseWriter, r *http.Request, isLatestSpec bool, cfg
if len(requiredScopes) == 0 { if len(requiredScopes) == 0 {
return nil return nil
} }
pr := policyEngine.Evaluate(r, claims, requiredScopes) pr := accessController.ValidateAccess(r, claims, requiredScopes)
if pr.Decision == authz.DecisionDeny { if pr.Decision == authz.DecisionDeny {
http.Error(w, "Forbidden: "+pr.Message, http.StatusForbidden) http.Error(w, "Forbidden: "+pr.Message, http.StatusForbidden)
return fmt.Errorf("forbidden — %s", pr.Message) return fmt.Errorf("forbidden — %s", pr.Message)

View file

@ -19,7 +19,8 @@ func ParseVersionDate(version string) (time.Time, error) {
// This function returns the version string, using the cutover date if empty // This function returns the version string, using the cutover date if empty
func GetVersionWithDefault(version string) string { func GetVersionWithDefault(version string) string {
if version == "" { if version == "" {
return constants.SpecCutoverDate.Format("2006-01-02") defaultTime, _ := time.Parse(constants.TimeLayout, "2025-05-15")
return defaultTime.Format(constants.TimeLayout)
} }
return version return version
} }