03ea72595d
* Initial Commit for OAuth API This builds and run and return the right error. Need to test it and then adding all users as possible client * Added mising dependency * just compile already... * Fixing template test * Imrpovements Moved db stuff in models Added some tests Added form in modpanel to add/update a client Added controllers for add/update of client * Added Forms + speed improvements Controller oauth client listing + html Controller oauth client delete + messages Messages on comment delete New ES config that disable ES if set to false. Improve load speed on local development Fix a load config bug Fix index admin & translation string sign_out broken by @ewhal * Sanitize empty strig in form array + css Multiple empty array of strings are sanitized for the oauth client create form Added some css for the form display * Upload and Create form works * Fix splitting response types * Removing required on secret when updating * fix travis error * Fix travis template test * Update dependency * Moved to jinzhu instead of azhao * randomizen secret on creation * Final touch on oath api improved display name fix grant form csrf fix login csrf on oauth * Fix gorm test * fix template test * Fixing deleted dependency issue * Make travis faster * Fix typo * Fix csrf for api calls * This shouldn't be exempt * Removing hard coded hash @ewhal Don't forget to replace the hash in tokens.go with another one * Added an example on how to use OAuth middleware * Renamed fosite utils to oauth2 utils
67 lignes
2,4 Kio
Go
67 lignes
2,4 Kio
Go
package oauth2
|
|
|
|
import (
|
|
"time"
|
|
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/ory/fosite"
|
|
enigma "github.com/ory/fosite/token/hmac"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type HMACSHAStrategy struct {
|
|
Enigma *enigma.HMACStrategy
|
|
AccessTokenLifespan time.Duration
|
|
AuthorizeCodeLifespan time.Duration
|
|
}
|
|
|
|
func (h HMACSHAStrategy) AccessTokenSignature(token string) string {
|
|
return h.Enigma.Signature(token)
|
|
}
|
|
func (h HMACSHAStrategy) RefreshTokenSignature(token string) string {
|
|
return h.Enigma.Signature(token)
|
|
}
|
|
func (h HMACSHAStrategy) AuthorizeCodeSignature(token string) string {
|
|
return h.Enigma.Signature(token)
|
|
}
|
|
|
|
func (h HMACSHAStrategy) GenerateAccessToken(_ context.Context, _ fosite.Requester) (token string, signature string, err error) {
|
|
return h.Enigma.Generate()
|
|
}
|
|
|
|
func (h HMACSHAStrategy) ValidateAccessToken(_ context.Context, r fosite.Requester, token string) (err error) {
|
|
var exp = r.GetSession().GetExpiresAt(fosite.AccessToken)
|
|
if exp.IsZero() && r.GetRequestedAt().Add(h.AccessTokenLifespan).Before(time.Now()) {
|
|
return errors.Wrap(fosite.ErrTokenExpired, fmt.Sprintf("Access token expired at %s", r.GetRequestedAt().Add(h.AccessTokenLifespan)))
|
|
}
|
|
if !exp.IsZero() && exp.Before(time.Now()) {
|
|
return errors.Wrap(fosite.ErrTokenExpired, fmt.Sprintf("Access token expired at %s", exp))
|
|
}
|
|
return h.Enigma.Validate(token)
|
|
}
|
|
|
|
func (h HMACSHAStrategy) GenerateRefreshToken(_ context.Context, _ fosite.Requester) (token string, signature string, err error) {
|
|
return h.Enigma.Generate()
|
|
}
|
|
|
|
func (h HMACSHAStrategy) ValidateRefreshToken(_ context.Context, _ fosite.Requester, token string) (err error) {
|
|
return h.Enigma.Validate(token)
|
|
}
|
|
|
|
func (h HMACSHAStrategy) GenerateAuthorizeCode(_ context.Context, _ fosite.Requester) (token string, signature string, err error) {
|
|
return h.Enigma.Generate()
|
|
}
|
|
|
|
func (h HMACSHAStrategy) ValidateAuthorizeCode(_ context.Context, r fosite.Requester, token string) (err error) {
|
|
var exp = r.GetSession().GetExpiresAt(fosite.AuthorizeCode)
|
|
if exp.IsZero() && r.GetRequestedAt().Add(h.AuthorizeCodeLifespan).Before(time.Now()) {
|
|
return errors.Wrap(fosite.ErrTokenExpired, fmt.Sprintf("Authorize code expired at %s", r.GetRequestedAt().Add(h.AuthorizeCodeLifespan)))
|
|
}
|
|
if !exp.IsZero() && exp.Before(time.Now()) {
|
|
return errors.Wrap(fosite.ErrTokenExpired, fmt.Sprintf("Authorize code expired at %s", exp))
|
|
}
|
|
|
|
return h.Enigma.Validate(token)
|
|
}
|