mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 11:04:25 +00:00
114 lines
3.6 KiB
Go
114 lines
3.6 KiB
Go
|
package query
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"github.com/zitadel/zitadel/internal/domain"
|
||
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
||
|
"github.com/zitadel/zitadel/internal/eventstore"
|
||
|
"github.com/zitadel/zitadel/internal/repository/oidcsession"
|
||
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
||
|
)
|
||
|
|
||
|
type OIDCSessionAccessTokenReadModel struct {
|
||
|
eventstore.WriteModel
|
||
|
|
||
|
UserID string
|
||
|
SessionID string
|
||
|
ClientID string
|
||
|
Audience []string
|
||
|
Scope []string
|
||
|
AuthMethods []domain.UserAuthMethodType
|
||
|
AuthTime time.Time
|
||
|
State domain.OIDCSessionState
|
||
|
AccessTokenID string
|
||
|
AccessTokenCreation time.Time
|
||
|
AccessTokenExpiration time.Time
|
||
|
}
|
||
|
|
||
|
func newOIDCSessionAccessTokenWriteModel(id string) *OIDCSessionAccessTokenReadModel {
|
||
|
return &OIDCSessionAccessTokenReadModel{
|
||
|
WriteModel: eventstore.WriteModel{
|
||
|
AggregateID: id,
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func (wm *OIDCSessionAccessTokenReadModel) Reduce() error {
|
||
|
for _, event := range wm.Events {
|
||
|
switch e := event.(type) {
|
||
|
case *oidcsession.AddedEvent:
|
||
|
wm.reduceAdded(e)
|
||
|
case *oidcsession.AccessTokenAddedEvent:
|
||
|
wm.reduceAccessTokenAdded(e)
|
||
|
}
|
||
|
}
|
||
|
return wm.WriteModel.Reduce()
|
||
|
}
|
||
|
|
||
|
func (wm *OIDCSessionAccessTokenReadModel) Query() *eventstore.SearchQueryBuilder {
|
||
|
return eventstore.NewSearchQueryBuilder(eventstore.ColumnsEvent).
|
||
|
AllowTimeTravel().
|
||
|
AddQuery().
|
||
|
AggregateTypes(oidcsession.AggregateType).
|
||
|
AggregateIDs(wm.AggregateID).
|
||
|
EventTypes(
|
||
|
oidcsession.AddedType,
|
||
|
oidcsession.AccessTokenAddedType,
|
||
|
).
|
||
|
Builder()
|
||
|
}
|
||
|
|
||
|
func (wm *OIDCSessionAccessTokenReadModel) reduceAdded(e *oidcsession.AddedEvent) {
|
||
|
wm.UserID = e.UserID
|
||
|
wm.SessionID = e.SessionID
|
||
|
wm.ClientID = e.ClientID
|
||
|
wm.Audience = e.Audience
|
||
|
wm.Scope = e.Scope
|
||
|
wm.AuthMethods = e.AuthMethods
|
||
|
wm.AuthTime = e.AuthTime
|
||
|
wm.State = domain.OIDCSessionStateActive
|
||
|
}
|
||
|
|
||
|
func (wm *OIDCSessionAccessTokenReadModel) reduceAccessTokenAdded(e *oidcsession.AccessTokenAddedEvent) {
|
||
|
wm.AccessTokenID = e.ID
|
||
|
wm.AccessTokenCreation = e.CreationDate()
|
||
|
wm.AccessTokenExpiration = e.CreationDate().Add(e.Lifetime)
|
||
|
}
|
||
|
|
||
|
// ActiveAccessTokenByToken will check if the token is active by retrieving the OIDCSession events from the eventstore.
|
||
|
// refreshed or expired tokens will return an error
|
||
|
func (q *Queries) ActiveAccessTokenByToken(ctx context.Context, token string) (model *OIDCSessionAccessTokenReadModel, err error) {
|
||
|
ctx, span := tracing.NewSpan(ctx)
|
||
|
defer func() { span.EndWithError(err) }()
|
||
|
|
||
|
split := strings.Split(token, "-")
|
||
|
if len(split) != 2 {
|
||
|
return nil, caos_errs.ThrowPermissionDenied(nil, "QUERY-SAhtk", "Errors.OIDCSession.Token.Invalid")
|
||
|
}
|
||
|
model, err = q.accessTokenByOIDCSessionAndTokenID(ctx, split[0], split[1])
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
if !model.AccessTokenExpiration.After(time.Now()) {
|
||
|
return nil, caos_errs.ThrowPermissionDenied(nil, "QUERY-SAF3rf", "Errors.OIDCSession.Token.Expired")
|
||
|
}
|
||
|
return
|
||
|
}
|
||
|
|
||
|
func (q *Queries) accessTokenByOIDCSessionAndTokenID(ctx context.Context, oidcSessionID, tokenID string) (model *OIDCSessionAccessTokenReadModel, err error) {
|
||
|
ctx, span := tracing.NewSpan(ctx)
|
||
|
defer func() { span.EndWithError(err) }()
|
||
|
|
||
|
model = newOIDCSessionAccessTokenWriteModel(oidcSessionID)
|
||
|
if err = q.eventstore.FilterToQueryReducer(ctx, model); err != nil {
|
||
|
return nil, caos_errs.ThrowPermissionDenied(err, "QUERY-ASfe2", "Errors.OIDCSession.Token.Invalid")
|
||
|
}
|
||
|
if model.AccessTokenID != tokenID {
|
||
|
return nil, caos_errs.ThrowPermissionDenied(nil, "QUERY-M2u9w", "Errors.OIDCSession.Token.Invalid")
|
||
|
}
|
||
|
return model, nil
|
||
|
}
|