Commit Graph

33 Commits

Author SHA1 Message Date
Grant Limberg
b7952d7f39 no longer need direct import of serde here either 2022-01-31 12:13:30 -08:00
Grant Limberg
c380a4e4bd cleanup 2022-01-31 12:02:14 -08:00
Grant Limberg
9c487cbfb8 Remove jsonwebtoken package dependency
Replaced with rust-jwt.  `jsonwebtoken` relies on the ring package which explodes on non-x86/x64 architectures
2022-01-31 11:58:51 -08:00
Grant Limberg
d719137565 temp workaround for oidc auth dropping issue
Add a method to "kick" the refresh thread and re-post the tokens in the case where the thread is somehow still running & controller pushes out an AUTH_REQUIRED.  This situation happens in a corner case still under investigation where the controller pushes out many copies of the network config repeatedly
2022-01-20 09:44:56 -08:00
Grant Limberg
3d4d087f07 make some impl functions pub 2022-01-05 15:43:45 -08:00
Grant Limberg
953e62f103 Clean up some extraneous output in release mode 2022-01-05 11:55:47 -08:00
Grant Limberg
50b866c5cf clean up & pass along errors from ZeroIDC::new() method 2022-01-03 17:25:30 -08:00
Grant Limberg
cf411efd1d a little cleanup 2022-01-03 08:36:16 -08:00
Grant Limberg
057356a725 Just some comments 2021-12-16 22:07:17 -08:00
Grant Limberg
a69e91c541 Fix hash verification on refresh 2021-12-16 19:49:15 -08:00
Grant Limberg
8fccf3136c Enable validation of token hashes as part of the oidc process 2021-12-16 18:44:36 -08:00
Grant Limberg
2435ab70ab remove some extra verbose logging
... and baby you got a full flow goin on
2021-12-16 12:37:22 -08:00
Grant Limberg
2293b0703f Can get Central JSON bundle back to zerotier-one window 2021-12-16 11:37:58 -08:00
Grant Limberg
0ab5cce878 TIL: Its not as hard as I thought to make Rust deadlock 2021-12-15 14:37:06 -08:00
Grant Limberg
df9a7497b1 refactor out the separate AuthInfo struct
consolidated everything into the single IDC struct.  Should help keep from rotating the pkce token as often & causing issues with the login window flapping
2021-12-15 14:16:17 -08:00
Grant Limberg
b3fbbd3124 refresh tokens now working
Still investigating the best way to do a couple things, but we have something working
2021-12-07 16:29:50 -08:00
Grant Limberg
5095d73de3 moar better error handling 2021-12-03 16:32:27 -08:00
Grant Limberg
1192b1b422 refresh token run loop
Need central-side work to complete
2021-12-03 15:44:04 -08:00
Grant Limberg
43c528fdb6 Get expiry time out of access token & propagate 2021-12-03 11:32:29 -08:00
Grant Limberg
7a8c89be9d Post ID token to Central 2021-12-03 09:57:39 -08:00
Grant Limberg
4ce810b421 On our way to processing tokens 2021-12-01 16:57:18 -08:00
Grant Limberg
663a09b38d oidc stuff coming across the wire properly and generating a working login URL 2021-12-01 13:01:32 -08:00
Grant Limberg
73c186b111 add network_id extra param to auth flow 2021-12-01 09:27:30 -08:00
Grant Limberg
6393a4beec progress 2021-11-30 14:22:25 -08:00
Grant Limberg
5f548705dd lots more refactoring 2021-11-29 14:11:29 -08:00
Grant Limberg
4cadfd736f move ffi code into its own file 2021-11-02 15:55:26 -07:00
Grant Limberg
1c7a5439d5 expose AuthInfo struct to external code
also get the auth URL
2021-10-29 16:04:19 -07:00
Grant Limberg
ebc4c898ff pass in csrf token & nonce (generated externally) 2021-10-29 15:43:39 -07:00
Grant Limberg
56cf874d99 slow progress 2021-10-29 15:31:23 -07:00
Grant Limberg
31888f5ef8 provide issuer URL, client ID and local web port to constructor
also construct the oidc client
2021-10-29 09:43:14 -07:00
Grant Limberg
0069b1bac3 we can start & stop a thread. so that's nice. 2021-10-28 09:29:33 -07:00
Grant Limberg
c689c0bd8c integrate with mac build system and add skeleton 2021-10-27 17:09:01 -07:00
Grant Limberg
271dfc0d2b initial rust oidc lib 2021-10-27 16:11:06 -07:00