2023-10-25 15:10:45 +00:00
|
|
|
package authz
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/base64"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
|
|
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
2023-12-08 14:30:55 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/zerrors"
|
2023-10-25 15:10:45 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
SessionTokenPrefix = "sess_"
|
|
|
|
SessionTokenFormat = SessionTokenPrefix + "%s:%s"
|
|
|
|
)
|
|
|
|
|
|
|
|
func SessionTokenVerifier(algorithm crypto.EncryptionAlgorithm) func(ctx context.Context, sessionToken, sessionID, tokenID string) (err error) {
|
|
|
|
return func(ctx context.Context, sessionToken, sessionID, tokenID string) (err error) {
|
|
|
|
decodedToken, err := base64.RawURLEncoding.DecodeString(sessionToken)
|
|
|
|
if err != nil {
|
2024-04-09 06:42:59 +00:00
|
|
|
return zerrors.ThrowInvalidArgument(err, "COMMAND-hi6Ph", "Errors.Session.Token.Invalid")
|
2023-10-25 15:10:45 +00:00
|
|
|
}
|
|
|
|
_, spanPasswordComparison := tracing.NewNamedSpan(ctx, "crypto.CompareHash")
|
|
|
|
token, err := algorithm.DecryptString(decodedToken, algorithm.EncryptionKeyID())
|
|
|
|
spanPasswordComparison.EndWithError(err)
|
|
|
|
if err != nil || token != fmt.Sprintf(SessionTokenFormat, sessionID, tokenID) {
|
2023-12-08 14:30:55 +00:00
|
|
|
return zerrors.ThrowPermissionDenied(err, "COMMAND-sGr42", "Errors.Session.Token.Invalid")
|
2023-10-25 15:10:45 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|