mirror of
https://github.com/pomerium/pomerium.git
synced 2025-05-24 06:27:17 +02:00
45 lines
1.3 KiB
Go
45 lines
1.3 KiB
Go
package mcp
|
|
|
|
import (
|
|
"crypto/cipher"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/pomerium/pomerium/internal/oauth21"
|
|
"github.com/pomerium/pomerium/pkg/grpc/session"
|
|
)
|
|
|
|
func CheckPKCE(
|
|
codeChallengeMethod string,
|
|
codeChallenge string,
|
|
codeVerifier string,
|
|
) error {
|
|
if codeChallengeMethod == "" || codeChallengeMethod == "plain" {
|
|
if !oauth21.VerifyPKCEPlain(codeVerifier, codeChallenge) {
|
|
return fmt.Errorf("plain: code verifier does not match code challenge")
|
|
}
|
|
} else if codeChallengeMethod == "S256" {
|
|
if !oauth21.VerifyPKCES256(codeVerifier, codeChallenge) {
|
|
return fmt.Errorf("S256: code verifier does not match code challenge")
|
|
}
|
|
} else {
|
|
return fmt.Errorf("unsupported code challenge method: %s", codeChallengeMethod)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateAuthorizationCode creates an access token based on the session
|
|
func CreateAccessToken(src *session.Session, cipher cipher.AEAD) (string, error) {
|
|
return CreateCode(CodeTypeAccess, src.Id, src.ExpiresAt.AsTime(), "", cipher)
|
|
}
|
|
|
|
// DecryptAuthorizationCode decrypts the authorization code and returns the underlying session ID
|
|
func DecryptAccessToken(accessToken string, cipher cipher.AEAD) (string, error) {
|
|
code, err := DecryptCode(CodeTypeAccess, accessToken, cipher, "", time.Now())
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return code.Id, nil
|
|
}
|