package usecase import ( "context" "errors" "fmt" "github.com/lestrrat-go/jwx/jwa" "github.com/lestrrat-go/jwx/jwt" "source.toby3d.me/website/indieauth/internal/domain" "source.toby3d.me/website/indieauth/internal/session" "source.toby3d.me/website/indieauth/internal/token" ) type tokenUseCase struct { sessions session.Repository tokens token.Repository config *domain.Config } func NewTokenUseCase(tokens token.Repository, sessions session.Repository, config *domain.Config) token.UseCase { jwt.RegisterCustomField("email", new(domain.Email)) jwt.RegisterCustomField("photo", new(domain.URL)) jwt.RegisterCustomField("scope", make(domain.Scopes, 0)) jwt.RegisterCustomField("url", new(domain.URL)) return &tokenUseCase{ config: config, sessions: sessions, tokens: tokens, } } func (useCase *tokenUseCase) Exchange(ctx context.Context, opts token.ExchangeOptions) (*domain.Token, *domain.Profile, error) { session, err := useCase.sessions.GetAndDelete(ctx, opts.Code) if err != nil { return nil, nil, fmt.Errorf("cannot get session from store: %w", err) } if opts.ClientID.String() != session.ClientID.String() { return nil, nil, token.ErrMismatchClientID } if opts.RedirectURI.String() != session.RedirectURI.String() { return nil, nil, token.ErrMismatchRedirectURI } if session.CodeChallenge != "" && session.CodeChallengeMethod != domain.CodeChallengeMethodUndefined && !session.CodeChallengeMethod.Validate(session.CodeChallenge, opts.CodeVerifier) { return nil, nil, token.ErrMismatchPKCE } // NOTE(toby3d): If the authorization code was issued with no scope, the // token endpoint MUST NOT issue an access token, as empty scopes are // invalid (RFC 6749 section 3.3). if session.Scope.IsEmpty() { return nil, nil, token.ErrEmptyScope } if !session.Scope.Has(domain.ScopeProfile) { session.Profile = nil } else if !session.Scope.Has(domain.ScopeEmail) { session.Profile.Email = nil } tkn, err := domain.NewToken(domain.NewTokenOptions{ Expiration: useCase.config.JWT.Expiry, Issuer: session.ClientID, Subject: session.Me, Scope: session.Scope, Secret: []byte(useCase.config.JWT.Secret), Profile: session.Profile, Algorithm: useCase.config.JWT.Algorithm, NonceLength: useCase.config.JWT.NonceLength, }) if err != nil { return nil, nil, fmt.Errorf("cannot generate a new access token: %w", err) } return tkn, session.Profile, nil } func (useCase *tokenUseCase) Verify(ctx context.Context, accessToken string) (*domain.Token, error) { find, err := useCase.tokens.Get(ctx, accessToken) if err != nil && !errors.Is(err, token.ErrNotExist) { return nil, fmt.Errorf("cannot check token in store: %w", err) } if find != nil { return nil, token.ErrRevoke } tkn, err := jwt.ParseString(accessToken, jwt.WithVerify(jwa.SignatureAlgorithm(useCase.config.JWT.Algorithm), []byte(useCase.config.JWT.Secret))) if err != nil { return nil, fmt.Errorf("cannot parse JWT token: %w", err) } if err = jwt.Validate(tkn); err != nil { return nil, fmt.Errorf("cannot validate JWT token: %w", err) } result := &domain.Token{ CreatedAt: tkn.IssuedAt(), Expiry: tkn.Expiration(), ClientID: nil, Me: nil, Profile: nil, Scope: nil, AccessToken: accessToken, RefreshToken: "", // TODO(toby3d) } result.ClientID, _ = domain.ParseClientID(tkn.Issuer()) result.Me, _ = domain.ParseMe(tkn.Subject()) if scope, ok := tkn.Get("scope"); ok { result.Scope, _ = scope.(domain.Scopes) } if !result.Scope.Has(domain.ScopeProfile) { return result, nil } result.Profile = domain.NewProfile() if name, ok := tkn.Get("name"); ok { if n, ok := name.(string); ok { result.Profile.Name = append(result.Profile.Name, n) } } if url, ok := tkn.Get("url"); ok { if u, ok := url.(*domain.URL); ok { result.Profile.URL = append(result.Profile.URL, u) } } if photo, ok := tkn.Get("photo"); ok { if p, ok := photo.(*domain.URL); ok { result.Profile.Photo = append(result.Profile.Photo, p) } } if !result.Scope.Has(domain.ScopeEmail) { return result, nil } if email, ok := tkn.Get("email"); ok { if e, ok := email.(*domain.Email); ok { result.Profile.Email = append(result.Profile.Email, e) } } return result, nil } func (useCase *tokenUseCase) Revoke(ctx context.Context, accessToken string) error { tkn, err := useCase.Verify(ctx, accessToken) if err != nil { return fmt.Errorf("cannot verify token: %w", err) } if err = useCase.tokens.Create(ctx, tkn); err != nil { return fmt.Errorf("cannot save token in database: %w", err) } return nil }