/
warden_strategy.go
63 lines (51 loc) · 1.69 KB
/
warden_strategy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
package warden
import (
"context"
"github.com/ory/fosite"
"github.com/ory/fosite/compose"
"github.com/ory/fosite/handler/oauth2"
"github.com/pkg/errors"
)
type TokenValidator struct {
oauth2.CoreStrategy
oauth2.CoreStorage
ScopeStrategy fosite.ScopeStrategy
}
func (c *TokenValidator) IntrospectToken(ctx context.Context, token string, tokenType fosite.TokenType, accessRequest fosite.AccessRequester, scopes []string) (err error) {
if err = c.introspectAccessToken(ctx, token, accessRequest, scopes); err == nil {
return nil
}
return err
}
func matchScopes(ss fosite.ScopeStrategy, granted, scopes []string) error {
for _, scope := range scopes {
if scope == "" {
continue
}
if !ss(granted, scope) {
return errors.Wrapf(fosite.ErrInvalidScope, "Scope %s was not granted", scope)
}
}
return nil
}
func (c *TokenValidator) introspectAccessToken(ctx context.Context, token string, accessRequest fosite.AccessRequester, scopes []string) error {
sig := c.CoreStrategy.AccessTokenSignature(token)
or, err := c.CoreStorage.GetAccessTokenSession(ctx, sig, accessRequest.GetSession())
if err != nil {
return errors.Wrap(fosite.ErrRequestUnauthorized, err.Error())
} else if err := c.CoreStrategy.ValidateAccessToken(ctx, or, token); err != nil {
return err
}
if err := matchScopes(c.ScopeStrategy, or.GetGrantedScopes(), scopes); err != nil {
return err
}
accessRequest.Merge(or)
return nil
}
func OAuth2TokenIntrospectionFactory(config *compose.Config, storage interface{}, strategy interface{}) interface{} {
return &TokenValidator{
CoreStrategy: strategy.(oauth2.CoreStrategy),
CoreStorage: storage.(oauth2.CoreStorage),
ScopeStrategy: fosite.HierarchicScopeStrategy,
}
}