2022-02-13 23:39:27 +08:00
|
|
|
// Copyright 2021 The Casdoor Authors. All Rights Reserved.
|
2021-03-13 23:47:35 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package object
|
|
|
|
|
|
|
|
import (
|
2022-01-21 09:29:19 +08:00
|
|
|
"crypto/sha256"
|
|
|
|
"encoding/base64"
|
2022-02-27 14:05:07 +08:00
|
|
|
"errors"
|
2021-12-04 00:39:14 +08:00
|
|
|
"fmt"
|
2021-03-14 18:18:03 +08:00
|
|
|
"strings"
|
2022-01-29 00:32:57 +08:00
|
|
|
"time"
|
2021-03-14 18:18:03 +08:00
|
|
|
|
2022-01-20 14:11:46 +08:00
|
|
|
"github.com/casdoor/casdoor/util"
|
2021-03-13 23:47:35 +08:00
|
|
|
"xorm.io/core"
|
|
|
|
)
|
|
|
|
|
2021-03-14 18:18:03 +08:00
|
|
|
type Code struct {
|
|
|
|
Message string `xorm:"varchar(100)" json:"message"`
|
|
|
|
Code string `xorm:"varchar(100)" json:"code"`
|
|
|
|
}
|
|
|
|
|
2021-03-13 23:47:35 +08:00
|
|
|
type Token struct {
|
|
|
|
Owner string `xorm:"varchar(100) notnull pk" json:"owner"`
|
|
|
|
Name string `xorm:"varchar(100) notnull pk" json:"name"`
|
|
|
|
CreatedTime string `xorm:"varchar(100)" json:"createdTime"`
|
|
|
|
|
2021-05-04 22:36:05 +08:00
|
|
|
Application string `xorm:"varchar(100)" json:"application"`
|
|
|
|
Organization string `xorm:"varchar(100)" json:"organization"`
|
|
|
|
User string `xorm:"varchar(100)" json:"user"`
|
2021-03-13 23:47:35 +08:00
|
|
|
|
2022-01-21 09:29:19 +08:00
|
|
|
Code string `xorm:"varchar(100)" json:"code"`
|
|
|
|
AccessToken string `xorm:"mediumtext" json:"accessToken"`
|
|
|
|
RefreshToken string `xorm:"mediumtext" json:"refreshToken"`
|
|
|
|
ExpiresIn int `json:"expiresIn"`
|
|
|
|
Scope string `xorm:"varchar(100)" json:"scope"`
|
|
|
|
TokenType string `xorm:"varchar(100)" json:"tokenType"`
|
|
|
|
CodeChallenge string `xorm:"varchar(100)" json:"codeChallenge"`
|
2022-01-29 00:32:57 +08:00
|
|
|
CodeIsUsed bool `json:"codeIsUsed"`
|
|
|
|
CodeExpireIn int64 `json:"codeExpireIn"`
|
2021-03-13 23:47:35 +08:00
|
|
|
}
|
|
|
|
|
2021-03-14 18:18:03 +08:00
|
|
|
type TokenWrapper struct {
|
2021-12-28 19:44:17 +08:00
|
|
|
AccessToken string `json:"access_token"`
|
|
|
|
IdToken string `json:"id_token"`
|
|
|
|
RefreshToken string `json:"refresh_token"`
|
|
|
|
TokenType string `json:"token_type"`
|
|
|
|
ExpiresIn int `json:"expires_in"`
|
|
|
|
Scope string `json:"scope"`
|
2021-03-14 18:18:03 +08:00
|
|
|
}
|
|
|
|
|
2021-12-25 10:55:10 +08:00
|
|
|
func GetTokenCount(owner, field, value string) int {
|
2022-01-26 19:36:36 +08:00
|
|
|
session := GetSession(owner, -1, -1, field, value, "", "")
|
2021-12-25 10:55:10 +08:00
|
|
|
count, err := session.Count(&Token{})
|
2021-11-06 11:32:22 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return int(count)
|
|
|
|
}
|
|
|
|
|
2021-03-13 23:47:35 +08:00
|
|
|
func GetTokens(owner string) []*Token {
|
|
|
|
tokens := []*Token{}
|
2021-05-02 10:30:12 +08:00
|
|
|
err := adapter.Engine.Desc("created_time").Find(&tokens, &Token{Owner: owner})
|
2021-03-13 23:47:35 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokens
|
|
|
|
}
|
|
|
|
|
2021-12-25 10:55:10 +08:00
|
|
|
func GetPaginationTokens(owner string, offset, limit int, field, value, sortField, sortOrder string) []*Token {
|
2021-11-06 11:32:22 +08:00
|
|
|
tokens := []*Token{}
|
2021-12-25 10:55:10 +08:00
|
|
|
session := GetSession(owner, offset, limit, field, value, sortField, sortOrder)
|
|
|
|
err := session.Find(&tokens)
|
2021-11-06 11:32:22 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokens
|
|
|
|
}
|
|
|
|
|
2021-03-13 23:47:35 +08:00
|
|
|
func getToken(owner string, name string) *Token {
|
2021-06-21 01:01:16 +08:00
|
|
|
if owner == "" || name == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-03-13 23:47:35 +08:00
|
|
|
token := Token{Owner: owner, Name: name}
|
2021-05-02 10:30:12 +08:00
|
|
|
existed, err := adapter.Engine.Get(&token)
|
2021-03-13 23:47:35 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if existed {
|
|
|
|
return &token
|
|
|
|
}
|
2021-11-06 11:32:22 +08:00
|
|
|
|
2021-09-04 22:20:47 +08:00
|
|
|
return nil
|
2021-03-13 23:47:35 +08:00
|
|
|
}
|
|
|
|
|
2021-03-14 18:18:03 +08:00
|
|
|
func getTokenByCode(code string) *Token {
|
2022-01-28 17:45:41 +08:00
|
|
|
token := Token{Code: code}
|
|
|
|
existed, err := adapter.Engine.Get(&token)
|
2021-03-14 18:18:03 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if existed {
|
|
|
|
return &token
|
|
|
|
}
|
2021-11-06 11:32:22 +08:00
|
|
|
|
2021-09-04 22:20:47 +08:00
|
|
|
return nil
|
2021-03-14 18:18:03 +08:00
|
|
|
}
|
|
|
|
|
2022-01-29 00:32:57 +08:00
|
|
|
func updateUsedByCode(token *Token) bool {
|
|
|
|
affected, err := adapter.Engine.Where("code=?", token.Code).Cols("code_is_used").Update(token)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return affected != 0
|
|
|
|
}
|
|
|
|
|
2021-03-13 23:47:35 +08:00
|
|
|
func GetToken(id string) *Token {
|
|
|
|
owner, name := util.GetOwnerAndNameFromId(id)
|
|
|
|
return getToken(owner, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
func UpdateToken(id string, token *Token) bool {
|
|
|
|
owner, name := util.GetOwnerAndNameFromId(id)
|
|
|
|
if getToken(owner, name) == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2021-05-02 10:30:12 +08:00
|
|
|
affected, err := adapter.Engine.ID(core.PK{owner, name}).AllCols().Update(token)
|
2021-03-13 23:47:35 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2021-03-28 00:48:34 +08:00
|
|
|
return affected != 0
|
2021-03-13 23:47:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func AddToken(token *Token) bool {
|
2021-05-02 10:30:12 +08:00
|
|
|
affected, err := adapter.Engine.Insert(token)
|
2021-03-13 23:47:35 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return affected != 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func DeleteToken(token *Token) bool {
|
2021-05-02 10:30:12 +08:00
|
|
|
affected, err := adapter.Engine.ID(core.PK{token.Owner, token.Name}).Delete(&Token{})
|
2021-03-13 23:47:35 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return affected != 0
|
|
|
|
}
|
2021-03-14 00:08:59 +08:00
|
|
|
|
2022-01-28 15:07:42 +08:00
|
|
|
func GetTokenByAccessToken(accessToken string) *Token {
|
|
|
|
//Check if the accessToken is in the database
|
2022-01-28 17:45:41 +08:00
|
|
|
token := Token{AccessToken: accessToken}
|
|
|
|
existed, err := adapter.Engine.Get(&token)
|
2022-01-28 15:07:42 +08:00
|
|
|
if err != nil || !existed {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return &token
|
|
|
|
}
|
|
|
|
|
2021-03-20 10:51:00 +08:00
|
|
|
func CheckOAuthLogin(clientId string, responseType string, redirectUri string, scope string, state string) (string, *Application) {
|
|
|
|
if responseType != "code" {
|
|
|
|
return "response_type should be \"code\"", nil
|
|
|
|
}
|
|
|
|
|
2021-06-06 17:27:03 +08:00
|
|
|
application := GetApplicationByClientId(clientId)
|
2021-03-20 10:51:00 +08:00
|
|
|
if application == nil {
|
2021-03-28 08:59:12 +08:00
|
|
|
return "Invalid client_id", nil
|
2021-03-20 10:51:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
validUri := false
|
|
|
|
for _, tmpUri := range application.RedirectUris {
|
|
|
|
if strings.Contains(redirectUri, tmpUri) {
|
|
|
|
validUri = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !validUri {
|
2021-12-04 00:39:14 +08:00
|
|
|
return fmt.Sprintf("Redirect URI: \"%s\" doesn't exist in the allowed Redirect URI list", redirectUri), application
|
2021-03-20 10:51:00 +08:00
|
|
|
}
|
|
|
|
|
2021-09-28 23:41:27 +08:00
|
|
|
// Mask application for /api/get-app-login
|
|
|
|
application.ClientSecret = ""
|
2021-03-20 10:51:00 +08:00
|
|
|
return "", application
|
|
|
|
}
|
|
|
|
|
2022-02-18 12:36:11 +08:00
|
|
|
func GetOAuthCode(userId string, clientId string, responseType string, redirectUri string, scope string, state string, nonce string, challenge string, host string) *Code {
|
2021-03-14 22:48:09 +08:00
|
|
|
user := GetUser(userId)
|
|
|
|
if user == nil {
|
|
|
|
return &Code{
|
2021-12-12 19:59:55 +08:00
|
|
|
Message: fmt.Sprintf("The user: %s doesn't exist", userId),
|
2021-03-14 22:48:09 +08:00
|
|
|
Code: "",
|
|
|
|
}
|
|
|
|
}
|
2021-12-28 19:44:17 +08:00
|
|
|
if user.IsForbidden {
|
|
|
|
return &Code{
|
|
|
|
Message: "error: the user is forbidden to sign in, please contact the administrator",
|
|
|
|
Code: "",
|
|
|
|
}
|
|
|
|
}
|
2021-03-14 22:48:09 +08:00
|
|
|
|
2021-03-20 13:05:34 +08:00
|
|
|
msg, application := CheckOAuthLogin(clientId, responseType, redirectUri, scope, state)
|
|
|
|
if msg != "" {
|
2021-03-14 18:18:03 +08:00
|
|
|
return &Code{
|
2021-03-20 13:05:34 +08:00
|
|
|
Message: msg,
|
2021-03-14 18:18:03 +08:00
|
|
|
Code: "",
|
|
|
|
}
|
2021-03-14 00:08:59 +08:00
|
|
|
}
|
|
|
|
|
2022-02-18 12:36:11 +08:00
|
|
|
accessToken, refreshToken, err := generateJwtToken(application, user, nonce, scope, host)
|
2021-03-14 22:48:09 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2022-01-26 11:56:01 +08:00
|
|
|
if challenge == "null" {
|
2022-01-21 09:29:19 +08:00
|
|
|
challenge = ""
|
|
|
|
}
|
|
|
|
|
2021-03-14 00:08:59 +08:00
|
|
|
token := &Token{
|
2022-01-21 09:29:19 +08:00
|
|
|
Owner: application.Owner,
|
|
|
|
Name: util.GenerateId(),
|
|
|
|
CreatedTime: util.GetCurrentTime(),
|
|
|
|
Application: application.Name,
|
|
|
|
Organization: user.Owner,
|
|
|
|
User: user.Name,
|
|
|
|
Code: util.GenerateClientId(),
|
|
|
|
AccessToken: accessToken,
|
|
|
|
RefreshToken: refreshToken,
|
|
|
|
ExpiresIn: application.ExpireInHours * 60,
|
|
|
|
Scope: scope,
|
|
|
|
TokenType: "Bearer",
|
|
|
|
CodeChallenge: challenge,
|
2022-01-29 00:32:57 +08:00
|
|
|
CodeIsUsed: false,
|
|
|
|
CodeExpireIn: time.Now().Add(time.Minute * 5).Unix(),
|
2021-03-14 00:08:59 +08:00
|
|
|
}
|
|
|
|
AddToken(token)
|
|
|
|
|
2021-03-14 18:18:03 +08:00
|
|
|
return &Code{
|
|
|
|
Message: "",
|
|
|
|
Code: token.Code,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-27 14:05:07 +08:00
|
|
|
func GetOAuthToken(grantType string, clientId string, clientSecret string, code string, verifier string, scope string, username string, password string, host string) *TokenWrapper {
|
2021-06-06 17:27:03 +08:00
|
|
|
application := GetApplicationByClientId(clientId)
|
2021-03-14 18:18:03 +08:00
|
|
|
if application == nil {
|
|
|
|
return &TokenWrapper{
|
2021-06-01 21:14:41 +08:00
|
|
|
AccessToken: "error: invalid client_id",
|
2021-03-14 18:18:03 +08:00
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-27 14:05:07 +08:00
|
|
|
//Check if grantType is allowed in the current application
|
|
|
|
if !isGrantTypeValid(grantType, application.GrantTypes) {
|
2021-03-14 18:18:03 +08:00
|
|
|
return &TokenWrapper{
|
2022-02-27 14:05:07 +08:00
|
|
|
AccessToken: fmt.Sprintf("error: grant_type: %s is not supported in this application", grantType),
|
2021-06-01 21:14:41 +08:00
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-27 14:05:07 +08:00
|
|
|
var token *Token
|
|
|
|
var err error
|
|
|
|
switch grantType {
|
|
|
|
case "authorization_code": // Authorization Code Grant
|
|
|
|
token, err = GetAuthorizationCodeToken(application, clientSecret, code, verifier)
|
|
|
|
case "password": // Resource Owner Password Credentials Grant
|
|
|
|
token, err = GetPasswordToken(application, username, password, scope, host)
|
|
|
|
case "client_credentials": // Client Credentials Grant
|
|
|
|
token, err = GetClientCredentialsToken(application, clientSecret, scope, host)
|
2022-01-29 00:32:57 +08:00
|
|
|
}
|
2022-02-08 20:52:20 +08:00
|
|
|
|
2022-02-27 14:05:07 +08:00
|
|
|
if err != nil {
|
2022-01-29 00:32:57 +08:00
|
|
|
return &TokenWrapper{
|
2022-02-27 14:05:07 +08:00
|
|
|
AccessToken: err.Error(),
|
2022-01-29 00:32:57 +08:00
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
|
|
|
}
|
|
|
|
}
|
2021-03-14 18:18:03 +08:00
|
|
|
|
2022-01-29 00:32:57 +08:00
|
|
|
token.CodeIsUsed = true
|
|
|
|
updateUsedByCode(token)
|
2021-03-14 18:18:03 +08:00
|
|
|
tokenWrapper := &TokenWrapper{
|
2021-12-28 19:44:17 +08:00
|
|
|
AccessToken: token.AccessToken,
|
|
|
|
IdToken: token.AccessToken,
|
|
|
|
RefreshToken: token.RefreshToken,
|
|
|
|
TokenType: token.TokenType,
|
|
|
|
ExpiresIn: token.ExpiresIn,
|
|
|
|
Scope: token.Scope,
|
2021-03-14 18:18:03 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return tokenWrapper
|
2021-03-14 00:08:59 +08:00
|
|
|
}
|
2021-12-18 18:49:38 +08:00
|
|
|
|
2022-02-18 12:36:11 +08:00
|
|
|
func RefreshToken(grantType string, refreshToken string, scope string, clientId string, clientSecret string, host string) *TokenWrapper {
|
2021-12-18 18:49:38 +08:00
|
|
|
// check parameters
|
|
|
|
if grantType != "refresh_token" {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: "error: grant_type should be \"refresh_token\"",
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
application := GetApplicationByClientId(clientId)
|
|
|
|
if application == nil {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: "error: invalid client_id",
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if application.ClientSecret != clientSecret {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: "error: invalid client_secret",
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// check whether the refresh token is valid, and has not expired.
|
|
|
|
token := Token{RefreshToken: refreshToken}
|
|
|
|
existed, err := adapter.Engine.Get(&token)
|
|
|
|
if err != nil || !existed {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: "error: invalid refresh_token",
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
|
|
|
}
|
2021-12-31 09:36:48 +08:00
|
|
|
|
|
|
|
cert := getCertByApplication(application)
|
2022-01-01 15:20:49 +08:00
|
|
|
_, err = ParseJwtToken(refreshToken, cert)
|
2021-12-18 18:49:38 +08:00
|
|
|
if err != nil {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: fmt.Sprintf("error: %s", err.Error()),
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// generate a new token
|
2022-01-01 15:20:49 +08:00
|
|
|
user := getUser(application.Organization, token.User)
|
2021-12-28 19:44:17 +08:00
|
|
|
if user.IsForbidden {
|
2022-01-01 15:20:49 +08:00
|
|
|
return &TokenWrapper{
|
|
|
|
AccessToken: "error: the user is forbidden to sign in, please contact the administrator",
|
|
|
|
TokenType: "",
|
|
|
|
ExpiresIn: 0,
|
|
|
|
Scope: "",
|
2021-12-28 19:44:17 +08:00
|
|
|
}
|
|
|
|
}
|
2022-02-18 12:36:11 +08:00
|
|
|
newAccessToken, newRefreshToken, err := generateJwtToken(application, user, "", scope, host)
|
2021-12-18 18:49:38 +08:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
newToken := &Token{
|
|
|
|
Owner: application.Owner,
|
|
|
|
Name: util.GenerateId(),
|
|
|
|
CreatedTime: util.GetCurrentTime(),
|
|
|
|
Application: application.Name,
|
|
|
|
Organization: user.Owner,
|
|
|
|
User: user.Name,
|
|
|
|
Code: util.GenerateClientId(),
|
|
|
|
AccessToken: newAccessToken,
|
|
|
|
RefreshToken: newRefreshToken,
|
|
|
|
ExpiresIn: application.ExpireInHours * 60,
|
|
|
|
Scope: scope,
|
|
|
|
TokenType: "Bearer",
|
|
|
|
}
|
|
|
|
AddToken(newToken)
|
|
|
|
|
2022-01-01 15:20:49 +08:00
|
|
|
tokenWrapper := &TokenWrapper{
|
|
|
|
AccessToken: token.AccessToken,
|
|
|
|
IdToken: token.AccessToken,
|
|
|
|
RefreshToken: token.RefreshToken,
|
|
|
|
TokenType: token.TokenType,
|
|
|
|
ExpiresIn: token.ExpiresIn,
|
|
|
|
Scope: token.Scope,
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
2022-01-01 15:20:49 +08:00
|
|
|
|
|
|
|
return tokenWrapper
|
2021-12-18 18:49:38 +08:00
|
|
|
}
|
2022-01-21 09:29:19 +08:00
|
|
|
|
|
|
|
// PkceChallenge: base64-URL-encoded SHA256 hash of verifier, per rfc 7636
|
|
|
|
func pkceChallenge(verifier string) string {
|
|
|
|
sum := sha256.Sum256([]byte(verifier))
|
|
|
|
challenge := base64.URLEncoding.WithPadding(base64.NoPadding).EncodeToString(sum[:])
|
|
|
|
return challenge
|
|
|
|
}
|
2022-02-27 14:05:07 +08:00
|
|
|
|
|
|
|
// Check if grantType is allowed in the current application
|
|
|
|
// authorization_code is allowed by default
|
|
|
|
func isGrantTypeValid(method string, grantTypes []string) bool {
|
|
|
|
if method == "authorization_code" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
for _, m := range grantTypes {
|
|
|
|
if m == method {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Authorization code flow
|
|
|
|
func GetAuthorizationCodeToken(application *Application, clientSecret string, code string, verifier string) (*Token, error) {
|
|
|
|
if code == "" {
|
|
|
|
return nil, errors.New("error: authorization code should not be empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
token := getTokenByCode(code)
|
|
|
|
if token == nil {
|
|
|
|
return nil, errors.New("error: invalid authorization code")
|
|
|
|
}
|
|
|
|
if token.CodeIsUsed {
|
|
|
|
// anti replay attacks
|
|
|
|
return nil, errors.New("error: authorization code has been used")
|
|
|
|
}
|
|
|
|
if application.ClientSecret != clientSecret {
|
|
|
|
return nil, errors.New("error: invalid client_secret")
|
|
|
|
}
|
|
|
|
|
|
|
|
if application.Name != token.Application {
|
|
|
|
return nil, errors.New("error: the token is for wrong application (client_id)")
|
|
|
|
}
|
|
|
|
|
|
|
|
if token.CodeChallenge != "" && pkceChallenge(verifier) != token.CodeChallenge {
|
|
|
|
return nil, errors.New("error: incorrect code_verifier")
|
|
|
|
}
|
|
|
|
|
|
|
|
if time.Now().Unix() > token.CodeExpireIn {
|
|
|
|
// code must be used within 5 minutes
|
|
|
|
return nil, errors.New("error: authorization code has expired")
|
|
|
|
}
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resource Owner Password Credentials flow
|
|
|
|
func GetPasswordToken(application *Application, username string, password string, scope string, host string) (*Token, error) {
|
|
|
|
user := getUser(application.Organization, username)
|
|
|
|
if user == nil {
|
|
|
|
return nil, errors.New("error: the user does not exist")
|
|
|
|
}
|
|
|
|
if user.Password != password {
|
|
|
|
return nil, errors.New("error: invalid username or password")
|
|
|
|
}
|
|
|
|
if user.IsForbidden {
|
|
|
|
return nil, errors.New("error: the user is forbidden to sign in, please contact the administrator")
|
|
|
|
}
|
|
|
|
accessToken, refreshToken, err := generateJwtToken(application, user, "", scope, host)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
token := &Token{
|
|
|
|
Owner: application.Owner,
|
|
|
|
Name: util.GenerateId(),
|
|
|
|
CreatedTime: util.GetCurrentTime(),
|
|
|
|
Application: application.Name,
|
|
|
|
Organization: user.Owner,
|
|
|
|
User: user.Name,
|
|
|
|
Code: util.GenerateClientId(),
|
|
|
|
AccessToken: accessToken,
|
|
|
|
RefreshToken: refreshToken,
|
|
|
|
ExpiresIn: application.ExpireInHours * 60,
|
|
|
|
Scope: scope,
|
|
|
|
TokenType: "Bearer",
|
|
|
|
CodeIsUsed: true,
|
|
|
|
}
|
|
|
|
AddToken(token)
|
|
|
|
return token, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Client Credentials flow
|
|
|
|
func GetClientCredentialsToken(application *Application, clientSecret string, scope string, host string) (*Token, error) {
|
|
|
|
if application.ClientSecret != clientSecret {
|
|
|
|
return nil, errors.New("error: invalid client_secret")
|
|
|
|
}
|
|
|
|
nullUser := &User{
|
|
|
|
Name: fmt.Sprintf("app/%s", application.Name),
|
|
|
|
}
|
|
|
|
accessToken, _, err := generateJwtToken(application, nullUser, "", scope, host)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
token := &Token{
|
|
|
|
Owner: application.Owner,
|
|
|
|
Name: util.GenerateId(),
|
|
|
|
CreatedTime: util.GetCurrentTime(),
|
|
|
|
Application: application.Name,
|
|
|
|
Organization: application.Organization,
|
|
|
|
User: nullUser.Name,
|
|
|
|
Code: util.GenerateClientId(),
|
|
|
|
AccessToken: accessToken,
|
|
|
|
ExpiresIn: application.ExpireInHours * 60,
|
|
|
|
Scope: scope,
|
|
|
|
TokenType: "Bearer",
|
|
|
|
CodeIsUsed: true,
|
|
|
|
}
|
|
|
|
AddToken(token)
|
|
|
|
return token, nil
|
|
|
|
}
|