Skip to content
This repository has been archived by the owner on Apr 28, 2020. It is now read-only.

Allow client credentials in place of auth tokens for GraphQL endpoint #212

Open
jace opened this issue Aug 3, 2017 · 0 comments
Open

Allow client credentials in place of auth tokens for GraphQL endpoint #212

jace opened this issue Aug 3, 2017 · 0 comments

Comments

@jace
Copy link
Member

jace commented Aug 3, 2017

In #166, Lastuser introduced automatic scope for trusted clients (apps hosted on the same parent domain as Lastuser itself, or apps hosted by the same company, ie, HasGeek). That ticket discussed eliminating auth tokens entirely for trusted apps, but did not implement it.

We're now considering removing redundant data storage from client apps. They should no longer need to have User, Team and Profile tables, or at least, they may have these tables for the sake of referential integrity in the database, with a single UUID column that matches Lastuser's record.

In such a scenario, client apps will need to use GraphQL (as per hasgeek/coaster#100 item 4) to populate details from Lastuser. A client may ask for the same fields across many different users (SELECT column, … FROM "user" WHERE id IN (…)) in a single query, which presents a problem when OAuth requires a separate auth token per user, but accepts only one auth token per request.

Since Lastuser already knows which client is authorised to access which user's data, it could just accept client credentials for the GraphQL API and automatically look up auth tokens. This presents a few further issues:

  1. A join with the AuthToken table on every single query will slow down GraphQL.

  2. Since the scope on tokens is not database-parseable (it's an unindexed string that's split along spaces in app-level code), we can't check for valid token scope in the database (unless we risk using LIKE queries or a Postgres-only regex query). It has to be done in app code, either by preloading tokens for requested users, or by filtering after loading data.

  3. We can improve this by redefining scope to be database-parseable, for example by making it a set of independent flag columns for all known Lastuser-provided resources, but the join will still be necessary.

  4. We can add further trust to trusted clients by eliminating the token check entirely. As long as they have automatic scope (Automatic scope for apps #166) that matches the requested data, let them have the data. This breaks one assumption we've retained despite Automatic scope for apps #166 with auth tokens: they represent a fact of a client app being aware of an interested in a particular user. This may not be important if transaction logs can provide the same data.

  5. An untrusted app will still require the database join.

  6. A client app may have additional scope for a particular user than what it normally requests. This is possible in Flask-Lastuser by using the @lastuser.requires_scope decorator. In this case too, automatic scope may deny access while the specific auth token provides it. The token therefore needs to be consulted.

Finally, one other consideration: perhaps any query that presents a user id must also mandatorily provide the auth token (or just the auth token) so that the API doesn't have to special-case all situations where the token is required.

# for free to subscribe to this conversation on GitHub. Already have an account? #.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant