mirror of
https://github.com/pomerium/pomerium.git
synced 2025-05-10 07:37:33 +02:00
cryptutil: add SecureToken (#2681)
* cryptutil: add SecureToken * add parse
This commit is contained in:
parent
4e4a161521
commit
0f0a5dc7f0
2 changed files with 147 additions and 0 deletions
|
@ -1,6 +1,12 @@
|
|||
package cryptutil
|
||||
|
||||
import (
|
||||
"crypto/hmac"
|
||||
"crypto/sha256"
|
||||
"encoding/binary"
|
||||
"errors"
|
||||
"time"
|
||||
|
||||
"github.com/btcsuite/btcutil/base58"
|
||||
"github.com/google/uuid"
|
||||
)
|
||||
|
@ -66,3 +72,96 @@ func (tok SecretToken) String() string {
|
|||
copy(bs[TokenLength:], tok.Secret[:])
|
||||
return base58.Encode(bs)
|
||||
}
|
||||
|
||||
// errors related to the SecureToken
|
||||
var (
|
||||
ErrExpired = errors.New("expired")
|
||||
ErrInvalid = errors.New("invalid")
|
||||
)
|
||||
|
||||
const (
|
||||
// SecureTokenTimeLength is the length of the time part of the SecureToken.
|
||||
SecureTokenTimeLength = 8
|
||||
// SecureTokenHMACLength is the length of the HMAC part of the SecureToken.
|
||||
SecureTokenHMACLength = 32
|
||||
// SecureTokenLength is the byte length of a SecureToken.
|
||||
SecureTokenLength = TokenLength + SecureTokenTimeLength + SecureTokenHMACLength
|
||||
)
|
||||
|
||||
// A SecureToken is an HMAC'd Token with an expiration time.
|
||||
type SecureToken [SecureTokenLength]byte
|
||||
|
||||
// GenerateSecureToken generates a SecureToken from the given key, expiry and token.
|
||||
func GenerateSecureToken(key []byte, expiry time.Time, token Token) SecureToken {
|
||||
var secureToken SecureToken
|
||||
copy(secureToken[:], token[:])
|
||||
binary.BigEndian.PutUint64(secureToken[TokenLength:], uint64(expiry.UnixMilli()))
|
||||
h := secureToken.computeHMAC(key)
|
||||
copy(secureToken[TokenLength+SecureTokenTimeLength:], h[:])
|
||||
return secureToken
|
||||
}
|
||||
|
||||
// SecureTokenFromString parses a base58-encoded string into a SecureToken.
|
||||
func SecureTokenFromString(rawstr string) (secureToken SecureToken, ok bool) {
|
||||
result := base58.Decode(rawstr)
|
||||
if len(result) != SecureTokenLength {
|
||||
return secureToken, false
|
||||
}
|
||||
copy(secureToken[:], result[:SecureTokenLength])
|
||||
return secureToken, true
|
||||
}
|
||||
|
||||
// Bytes returns the secret token as bytes.
|
||||
func (secureToken SecureToken) Bytes() []byte {
|
||||
return secureToken[:]
|
||||
}
|
||||
|
||||
// Expiry returns the SecureToken expiration time.
|
||||
func (secureToken SecureToken) Expiry() time.Time {
|
||||
return time.UnixMilli(int64(binary.BigEndian.Uint64(secureToken[TokenLength:])))
|
||||
}
|
||||
|
||||
// HMAC returns the HMAC part of the SecureToken.
|
||||
func (secureToken SecureToken) HMAC() [SecureTokenHMACLength]byte {
|
||||
var result [SecureTokenHMACLength]byte
|
||||
copy(result[:], secureToken[TokenLength+SecureTokenTimeLength:])
|
||||
return result
|
||||
}
|
||||
|
||||
// String returns the SecureToken as a string.
|
||||
func (secureToken SecureToken) String() string {
|
||||
return base58.Encode(secureToken[:])
|
||||
}
|
||||
|
||||
// Token returns the Token part of the SecureToken.
|
||||
func (secureToken SecureToken) Token() Token {
|
||||
var result Token
|
||||
copy(result[:], secureToken[:])
|
||||
return result
|
||||
}
|
||||
|
||||
// Verify verifies that the SecureToken has a valid HMAC and hasn't expired.
|
||||
func (secureToken SecureToken) Verify(key []byte, now time.Time) error {
|
||||
if !secureToken.checkHMAC(key) {
|
||||
return ErrInvalid
|
||||
}
|
||||
|
||||
if secureToken.Expiry().Before(now) {
|
||||
return ErrExpired
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (secureToken SecureToken) checkHMAC(key []byte) bool {
|
||||
expectedHMAC := secureToken.computeHMAC(key)
|
||||
actualHMAC := secureToken.HMAC()
|
||||
return hmac.Equal(actualHMAC[:], expectedHMAC[:])
|
||||
}
|
||||
|
||||
func (secureToken SecureToken) computeHMAC(key []byte) (result [SecureTokenHMACLength]byte) {
|
||||
h := hmac.New(sha256.New, key)
|
||||
h.Write(secureToken[:TokenLength+SecureTokenTimeLength])
|
||||
copy(result[:], h.Sum(nil))
|
||||
return result
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue