package eventstore import ( "context" "encoding/base64" "fmt" "strings" "time" "github.com/zitadel/logging" "github.com/zitadel/oidc/v2/pkg/oidc" "github.com/zitadel/oidc/v2/pkg/op" "gopkg.in/square/go-jose.v2" "github.com/zitadel/zitadel/internal/api/authz" http_util "github.com/zitadel/zitadel/internal/api/http" "github.com/zitadel/zitadel/internal/authz/repository/eventsourcing/view" "github.com/zitadel/zitadel/internal/command" "github.com/zitadel/zitadel/internal/crypto" "github.com/zitadel/zitadel/internal/domain" caos_errs "github.com/zitadel/zitadel/internal/errors" v1 "github.com/zitadel/zitadel/internal/eventstore/v1" "github.com/zitadel/zitadel/internal/eventstore/v1/models" "github.com/zitadel/zitadel/internal/query" "github.com/zitadel/zitadel/internal/telemetry/tracing" usr_model "github.com/zitadel/zitadel/internal/user/model" usr_view "github.com/zitadel/zitadel/internal/user/repository/view" "github.com/zitadel/zitadel/internal/user/repository/view/model" ) type TokenVerifierRepo struct { TokenVerificationKey crypto.EncryptionAlgorithm Eventstore v1.Eventstore View *view.View Query *query.Queries ExternalSecure bool } func (repo *TokenVerifierRepo) Health() error { return repo.View.Health() } func (repo *TokenVerifierRepo) tokenByID(ctx context.Context, tokenID, userID string) (_ *usr_model.TokenView, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() instanceID := authz.GetInstance(ctx).InstanceID() token, viewErr := repo.View.TokenByIDs(tokenID, userID, instanceID) if viewErr != nil && !caos_errs.IsNotFound(viewErr) { return nil, viewErr } if caos_errs.IsNotFound(viewErr) { sequence, err := repo.View.GetLatestTokenSequence(ctx, instanceID) logging.WithFields("instanceID", instanceID, "userID", userID, "tokenID", tokenID). OnError(err). Errorf("could not get current sequence for token check") token = new(model.TokenView) token.ID = tokenID token.UserID = userID if sequence != nil { token.Sequence = sequence.CurrentSequence } } events, esErr := repo.getUserEvents(ctx, userID, instanceID, token.Sequence, token.GetRelevantEventTypes()) if caos_errs.IsNotFound(viewErr) && len(events) == 0 { return nil, caos_errs.ThrowNotFound(nil, "EVENT-4T90g", "Errors.Token.NotFound") } if esErr != nil { logging.WithError(viewErr).WithField("traceID", tracing.TraceIDFromCtx(ctx)).Debug("error retrieving new events") return model.TokenViewToModel(token), nil } viewToken := *token for _, event := range events { err := token.AppendEventIfMyToken(event) if err != nil { return model.TokenViewToModel(&viewToken), nil } } if !token.Expiration.After(time.Now().UTC()) || token.Deactivated { return nil, caos_errs.ThrowNotFound(nil, "EVENT-5Bm9s", "Errors.Token.NotFound") } return model.TokenViewToModel(token), nil } func (repo *TokenVerifierRepo) VerifyAccessToken(ctx context.Context, tokenString, verifierClientID, projectID string) (userID string, agentID string, clientID, prefLang, resourceOwner string, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() tokenID, subject, ok := repo.getTokenIDAndSubject(ctx, tokenString) if !ok { return "", "", "", "", "", caos_errs.ThrowUnauthenticated(nil, "APP-Reb32", "invalid token") } if strings.HasPrefix(tokenID, command.IDPrefixV2) { userID, clientID, resourceOwner, err = repo.verifyAccessTokenV2(ctx, tokenID, verifierClientID, projectID) return } if sessionID, ok := strings.CutPrefix(tokenID, authz.SessionTokenPrefix); ok { userID, clientID, resourceOwner, err = repo.verifySessionToken(ctx, sessionID, tokenString) return } return repo.verifyAccessTokenV1(ctx, tokenID, subject, verifierClientID, projectID) } func (repo *TokenVerifierRepo) verifyAccessTokenV1(ctx context.Context, tokenID, subject, verifierClientID, projectID string) (userID string, agentID string, clientID, prefLang, resourceOwner string, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() _, tokenSpan := tracing.NewNamedSpan(ctx, "token") token, err := repo.tokenByID(ctx, tokenID, subject) tokenSpan.EndWithError(err) if err != nil { return "", "", "", "", "", caos_errs.ThrowUnauthenticated(err, "APP-BxUSiL", "invalid token") } if !token.Expiration.After(time.Now().UTC()) { return "", "", "", "", "", caos_errs.ThrowUnauthenticated(err, "APP-k9KS0", "invalid token") } if token.IsPAT { return token.UserID, "", "", "", token.ResourceOwner, nil } if err = verifyAudience(token.Audience, verifierClientID, projectID); err != nil { return "", "", "", "", "", err } return token.UserID, token.UserAgentID, token.ApplicationID, token.PreferredLanguage, token.ResourceOwner, nil } func (repo *TokenVerifierRepo) verifyAccessTokenV2(ctx context.Context, token, verifierClientID, projectID string) (userID, clientID, resourceOwner string, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() activeToken, err := repo.Query.ActiveAccessTokenByToken(ctx, token) if err != nil { return "", "", "", err } if err = verifyAudience(activeToken.Audience, verifierClientID, projectID); err != nil { return "", "", "", err } if err = repo.checkAuthentication(ctx, activeToken.AuthMethods, activeToken.UserID); err != nil { return "", "", "", err } return activeToken.UserID, activeToken.ClientID, activeToken.ResourceOwner, nil } func (repo *TokenVerifierRepo) verifySessionToken(ctx context.Context, sessionID, token string) (userID, clientID, resourceOwner string, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() session, err := repo.Query.SessionByID(ctx, true, sessionID, token) if err != nil { return "", "", "", err } if err = repo.checkAuthentication(ctx, authMethodsFromSession(session), session.UserFactor.UserID); err != nil { return "", "", "", err } return session.UserFactor.UserID, "", session.UserFactor.ResourceOwner, nil } // checkAuthentication ensures the session or token was authenticated (at least a single [domain.UserAuthMethodType]). // It will also check if there was a multi factor authentication, if either MFA is forced by the login policy or if the user has set up any func (repo *TokenVerifierRepo) checkAuthentication(ctx context.Context, authMethods []domain.UserAuthMethodType, userID string) error { if len(authMethods) == 0 { return caos_errs.ThrowPermissionDenied(nil, "AUTHZ-Kl3p0", "authentication required") } if domain.HasMFA(authMethods) { return nil } availableAuthMethods, forceMFA, forceMFALocalOnly, err := repo.Query.ListUserAuthMethodTypesRequired(setCallerCtx(ctx, userID), userID, false) if err != nil { return err } if domain.RequiresMFA(forceMFA, forceMFALocalOnly, hasIDPAuthentication(authMethods)) || domain.HasMFA(availableAuthMethods) { return caos_errs.ThrowPermissionDenied(nil, "AUTHZ-Kl3p0", "mfa required") } return nil } func hasIDPAuthentication(authMethods []domain.UserAuthMethodType) bool { for _, method := range authMethods { if method == domain.UserAuthMethodTypeIDP { return true } } return false } func authMethodsFromSession(session *query.Session) []domain.UserAuthMethodType { types := make([]domain.UserAuthMethodType, 0, domain.UserAuthMethodTypeIDP) if !session.PasswordFactor.PasswordCheckedAt.IsZero() { types = append(types, domain.UserAuthMethodTypePassword) } if !session.WebAuthNFactor.WebAuthNCheckedAt.IsZero() { if session.WebAuthNFactor.UserVerified { types = append(types, domain.UserAuthMethodTypePasswordless) } else { types = append(types, domain.UserAuthMethodTypeU2F) } } if !session.IntentFactor.IntentCheckedAt.IsZero() { types = append(types, domain.UserAuthMethodTypeIDP) } if !session.TOTPFactor.TOTPCheckedAt.IsZero() { types = append(types, domain.UserAuthMethodTypeTOTP) } if !session.OTPSMSFactor.OTPCheckedAt.IsZero() { types = append(types, domain.UserAuthMethodTypeOTPSMS) } if !session.OTPEmailFactor.OTPCheckedAt.IsZero() { types = append(types, domain.UserAuthMethodTypeOTPEmail) } return types } func setCallerCtx(ctx context.Context, userID string) context.Context { ctxData := authz.GetCtxData(ctx) ctxData.UserID = userID return authz.SetCtxData(ctx, ctxData) } func (repo *TokenVerifierRepo) ProjectIDAndOriginsByClientID(ctx context.Context, clientID string) (projectID string, origins []string, err error) { app, err := repo.View.ApplicationByOIDCClientID(ctx, clientID) if err != nil { return "", nil, err } return app.ProjectID, app.OIDCConfig.AllowedOrigins, nil } func (repo *TokenVerifierRepo) VerifierClientID(ctx context.Context, appName string) (clientID, projectID string, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() app, err := repo.View.ApplicationByProjecIDAndAppName(ctx, authz.GetInstance(ctx).ProjectID(), appName) if err != nil { return "", "", err } if app.OIDCConfig != nil { clientID = app.OIDCConfig.ClientID } else if app.APIConfig != nil { clientID = app.APIConfig.ClientID } return clientID, app.ProjectID, nil } func (repo *TokenVerifierRepo) getUserEvents(ctx context.Context, userID, instanceID string, sequence uint64, eventTypes []models.EventType) (_ []*models.Event, err error) { ctx, span := tracing.NewSpan(ctx) defer func() { span.EndWithError(err) }() query, err := usr_view.UserByIDQuery(userID, instanceID, sequence, eventTypes) if err != nil { return nil, err } return repo.Eventstore.FilterEvents(ctx, query) } // getTokenIDAndSubject returns the TokenID and Subject of both opaque tokens and JWTs func (repo *TokenVerifierRepo) getTokenIDAndSubject(ctx context.Context, accessToken string) (tokenID string, subject string, valid bool) { // accessToken can be either opaque or JWT // let's try opaque first: tokenIDSubject, err := repo.decryptAccessToken(accessToken) if err != nil { // if decryption did not work, it might be a JWT accessTokenClaims, err := op.VerifyAccessToken[*oidc.AccessTokenClaims](ctx, accessToken, repo.jwtTokenVerifier(ctx)) if err != nil { return "", "", false } return accessTokenClaims.JWTID, accessTokenClaims.Subject, true } splitToken := strings.Split(tokenIDSubject, ":") if len(splitToken) != 2 { return "", "", false } return splitToken[0], splitToken[1], true } func (repo *TokenVerifierRepo) jwtTokenVerifier(ctx context.Context) op.AccessTokenVerifier { keySet := &openIDKeySet{repo.Query} issuer := http_util.BuildOrigin(authz.GetInstance(ctx).RequestedHost(), repo.ExternalSecure) return op.NewAccessTokenVerifier(issuer, keySet) } func (repo *TokenVerifierRepo) decryptAccessToken(token string) (string, error) { tokenData, err := base64.RawURLEncoding.DecodeString(token) if err != nil { return "", caos_errs.ThrowUnauthenticated(nil, "APP-ASdgg", "invalid token") } tokenIDSubject, err := repo.TokenVerificationKey.DecryptString(tokenData, repo.TokenVerificationKey.EncryptionKeyID()) if err != nil { return "", caos_errs.ThrowUnauthenticated(nil, "APP-8EF0zZ", "invalid token") } return tokenIDSubject, nil } func verifyAudience(audience []string, verifierClientID, projectID string) error { for _, aud := range audience { if verifierClientID == aud || projectID == aud { return nil } } return caos_errs.ThrowUnauthenticated(nil, "APP-Zxfako", "invalid audience") } type openIDKeySet struct { *query.Queries } // VerifySignature implements the oidc.KeySet interface // providing an implementation for the keys retrieved directly from Queries func (o *openIDKeySet) VerifySignature(ctx context.Context, jws *jose.JSONWebSignature) ([]byte, error) { keySet, err := o.Queries.ActivePublicKeys(ctx, time.Now()) if err != nil { return nil, fmt.Errorf("error fetching keys: %w", err) } keyID, alg := oidc.GetKeyIDAndAlg(jws) key, err := oidc.FindMatchingKey(keyID, oidc.KeyUseSignature, alg, jsonWebKeys(keySet.Keys)...) if err != nil { return nil, fmt.Errorf("invalid signature: %w", err) } return jws.Verify(&key) } func jsonWebKeys(keys []query.PublicKey) []jose.JSONWebKey { webKeys := make([]jose.JSONWebKey, len(keys)) for i, key := range keys { webKeys[i] = jose.JSONWebKey{ KeyID: key.ID(), Algorithm: key.Algorithm(), Use: key.Use().String(), Key: key.Key(), } } return webKeys }