summaryrefslogtreecommitdiffstats
path: root/models
diff options
context:
space:
mode:
authorGusted <williamzijl7@hotmail.com>2022-02-04 18:03:15 +0100
committerGitHub <noreply@github.com>2022-02-04 18:03:15 +0100
commitaa23f477b7f66273f7e9551282230386b7de2d8a (patch)
tree4f53bf59f35b023af6e485fb590dc554f4bc0d8d /models
parent88939a5663bbb4547f45421a846ec4420283d996 (diff)
downloadgitea-aa23f477b7f66273f7e9551282230386b7de2d8a.tar.gz
gitea-aa23f477b7f66273f7e9551282230386b7de2d8a.zip
Use `CryptoRandomBytes` instead of `CryptoRandomString` (#18439)
- Switch to use `CryptoRandomBytes` instead of `CryptoRandomString`, OAuth's secrets are copied pasted and don't need to avoid dubious characters etc. - `CryptoRandomBytes` gives ![2^256 = 1.15 * 10^77](https://render.githubusercontent.com/render/math?math=2^256%20=%201.15%20\cdot%2010^77) `CryptoRandomString` gives ![62^44 = 7.33 * 10^78](https://render.githubusercontent.com/render/math?math=62^44%20=%207.33%20\cdot%2010^78) possible states. - Add a prefix, such that code scanners can easily grep these in source code. - 32 Bytes + prefix
Diffstat (limited to 'models')
-rw-r--r--models/auth/oauth2.go22
1 files changed, 18 insertions, 4 deletions
diff --git a/models/auth/oauth2.go b/models/auth/oauth2.go
index e7030fce28..2341e08620 100644
--- a/models/auth/oauth2.go
+++ b/models/auth/oauth2.go
@@ -6,13 +6,13 @@ package auth
import (
"crypto/sha256"
+ "encoding/base32"
"encoding/base64"
"fmt"
"net/url"
"strings"
"code.gitea.io/gitea/models/db"
- "code.gitea.io/gitea/modules/secret"
"code.gitea.io/gitea/modules/timeutil"
"code.gitea.io/gitea/modules/util"
@@ -57,12 +57,22 @@ func (app *OAuth2Application) ContainsRedirectURI(redirectURI string) bool {
return util.IsStringInSlice(redirectURI, app.RedirectURIs, true)
}
+// Base32 characters, but lowercased.
+const lowerBase32Chars = "abcdefghijklmnopqrstuvwxyz234567"
+
+// base32 encoder that uses lowered characters without padding.
+var base32Lower = base32.NewEncoding(lowerBase32Chars).WithPadding(base32.NoPadding)
+
// GenerateClientSecret will generate the client secret and returns the plaintext and saves the hash at the database
func (app *OAuth2Application) GenerateClientSecret() (string, error) {
- clientSecret, err := secret.New()
+ rBytes, err := util.CryptoRandomBytes(32)
if err != nil {
return "", err
}
+ // Add a prefix to the base32, this is in order to make it easier
+ // for code scanners to grab sensitive tokens.
+ clientSecret := "gto_" + base32Lower.EncodeToString(rBytes)
+
hashedSecret, err := bcrypt.GenerateFromPassword([]byte(clientSecret), bcrypt.DefaultCost)
if err != nil {
return "", err
@@ -394,10 +404,14 @@ func (grant *OAuth2Grant) GenerateNewAuthorizationCode(redirectURI, codeChalleng
}
func (grant *OAuth2Grant) generateNewAuthorizationCode(e db.Engine, redirectURI, codeChallenge, codeChallengeMethod string) (code *OAuth2AuthorizationCode, err error) {
- var codeSecret string
- if codeSecret, err = secret.New(); err != nil {
+ rBytes, err := util.CryptoRandomBytes(32)
+ if err != nil {
return &OAuth2AuthorizationCode{}, err
}
+ // Add a prefix to the base32, this is in order to make it easier
+ // for code scanners to grab sensitive tokens.
+ codeSecret := "gta_" + base32Lower.EncodeToString(rBytes)
+
code = &OAuth2AuthorizationCode{
Grant: grant,
GrantID: grant.ID,