generated from resonatecoop/id-server-template
-
Notifications
You must be signed in to change notification settings - Fork 1
/
authenticate.go
114 lines (94 loc) · 2.78 KB
/
authenticate.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
package oauth
import (
"context"
"errors"
"time"
"github.com/google/uuid"
"github.com/resonatecoop/id/session"
"github.com/resonatecoop/id/util"
"github.com/resonatecoop/user-api/model"
)
var (
// ErrAccessTokenNotFound ...
ErrAccessTokenNotFound = errors.New("Access token not found")
// ErrAccessTokenExpired ...
ErrAccessTokenExpired = errors.New("Access token expired")
)
// Authenticate checks the access token is valid
func (s *Service) Authenticate(token string) (*model.AccessToken, error) {
// Fetch the access token from the database
ctx := context.Background()
accessToken := new(model.AccessToken)
err := s.db.NewSelect().
Model(accessToken).
Where("token = ?", token).
Limit(1).
Scan(ctx)
// Not found
if err != nil {
return nil, ErrAccessTokenNotFound
}
// Check the access token hasn't expired
if time.Now().UTC().After(accessToken.ExpiresAt) {
return nil, ErrAccessTokenExpired
}
// Extend refresh token expiration database
increasedExpiresAt := time.Now().Add(
time.Duration(s.cnf.Oauth.RefreshTokenLifetime) * time.Second,
)
//var res sql.Result
// err = GetOrCreateRefreshToken
if util.IsValidUUID(accessToken.UserID.String()) && accessToken.UserID != uuid.Nil {
_, err = s.db.NewUpdate().
Model(new(model.RefreshToken)).
Set("expires_at = ?", increasedExpiresAt).
Set("updated_at = ?", time.Now().UTC()).
Where("client_id = ?", accessToken.ClientID.String()).
Where("user_id = ?", accessToken.UserID.String()).
Exec(ctx)
} else {
_, err = s.db.NewUpdate().
Model(new(model.RefreshToken)).
Set("expires_at = ?", increasedExpiresAt).
Set("updated_at = ?", time.Now().UTC()).
Where("client_id = ?", accessToken.ClientID.String()).
Where("user_id = uuid_nil()").
Exec(ctx)
}
if err != nil {
return nil, err
}
return accessToken, nil
}
// ClearUserTokens deletes the user's access and refresh tokens associated with this client id
func (s *Service) ClearUserTokens(userSession *session.UserSession) {
// Clear all refresh tokens with user_id and client_id
ctx := context.Background()
refreshToken := new(model.RefreshToken)
err := s.db.NewSelect().
Model(refreshToken).
Where("token = ?", userSession.RefreshToken).
Limit(1).
Scan(ctx)
// Found
if err == nil {
_, err = s.db.NewDelete().
Model(refreshToken).
Where("client_id = ? AND user_id = ?", refreshToken.ClientID, refreshToken.UserID).
Exec(ctx)
}
// Clear all access tokens with user_id and client_id
accessToken := new(model.AccessToken)
err = s.db.NewSelect().
Model(accessToken).
Where("token = ?", userSession.AccessToken).
Limit(1).
Scan(ctx)
// Found
if err == nil {
_, err = s.db.NewDelete().
Model(accessToken).
Where("client_id = ? AND user_id = ?", accessToken.ClientID, accessToken.UserID).
Exec(ctx)
}
}