pomerium/internal/mcp/token.go
2025-04-29 12:13:18 -04:00

43 lines
1.2 KiB
Go

package mcp
import (
"fmt"
"time"
"github.com/pomerium/pomerium/internal/oauth21"
)
func CheckPKCE(
codeChallengeMethod string,
codeChallenge string,
codeVerifier string,
) error {
if codeChallengeMethod == "" || codeChallengeMethod == "plain" {
if !oauth21.VerifyPKCEPlain(codeVerifier, codeChallenge) {
return fmt.Errorf("plain: code verifier does not match code challenge")
}
} else if codeChallengeMethod == "S256" {
if !oauth21.VerifyPKCES256(codeVerifier, codeChallenge) {
return fmt.Errorf("S256: code verifier does not match code challenge")
}
} else {
return fmt.Errorf("unsupported code challenge method: %s", codeChallengeMethod)
}
return nil
}
// CreateAuthorizationCode creates an access token based on the session
func (srv *Handler) CreateAccessTokenForSession(id string, expiresAt time.Time) (string, error) {
return CreateCode(CodeTypeAccess, id, expiresAt, "", srv.cipher)
}
// DecryptAuthorizationCode decrypts the authorization code and returns the underlying session ID
func (srv *Handler) GetSessionIDFromAccessToken(accessToken string) (string, error) {
code, err := DecryptCode(CodeTypeAccess, accessToken, srv.cipher, "", time.Now())
if err != nil {
return "", err
}
return code.Id, nil
}