gitea源码

token.go 3.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. // Copyright 2023 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package token
  4. import (
  5. "context"
  6. crypto_hmac "crypto/hmac"
  7. "crypto/sha256"
  8. "encoding/base32"
  9. "fmt"
  10. "time"
  11. user_model "code.gitea.io/gitea/models/user"
  12. "code.gitea.io/gitea/modules/util"
  13. )
  14. // A token is a verifiable container describing an action.
  15. //
  16. // A token has a dynamic length depending on the contained data and has the following structure:
  17. // | Token Version | User ID | HMAC | Payload |
  18. //
  19. // The payload is verifiable by the generated HMAC using the user secret. It contains:
  20. // | Timestamp | Action/Handler Type | Action/Handler Data |
  21. const (
  22. tokenVersion1 byte = 1
  23. tokenLifetimeInYears int = 1
  24. )
  25. type HandlerType byte
  26. const (
  27. UnknownHandlerType HandlerType = iota
  28. ReplyHandlerType
  29. UnsubscribeHandlerType
  30. )
  31. var encodingWithoutPadding = base32.StdEncoding.WithPadding(base32.NoPadding)
  32. type ErrToken struct {
  33. context string
  34. }
  35. func (err *ErrToken) Error() string {
  36. return "invalid email token: " + err.context
  37. }
  38. func (err *ErrToken) Unwrap() error {
  39. return util.ErrInvalidArgument
  40. }
  41. // CreateToken creates a token for the action/user tuple
  42. func CreateToken(ht HandlerType, user *user_model.User, data []byte) (string, error) {
  43. payload, err := util.PackData(
  44. time.Now().AddDate(tokenLifetimeInYears, 0, 0).Unix(),
  45. ht,
  46. data,
  47. )
  48. if err != nil {
  49. return "", err
  50. }
  51. packagedData, err := util.PackData(
  52. user.ID,
  53. generateHmac([]byte(user.Rands), payload),
  54. payload,
  55. )
  56. if err != nil {
  57. return "", err
  58. }
  59. return encodingWithoutPadding.EncodeToString(append([]byte{tokenVersion1}, packagedData...)), nil
  60. }
  61. // ExtractToken extracts the action/user tuple from the token and verifies the content
  62. func ExtractToken(ctx context.Context, token string) (HandlerType, *user_model.User, []byte, error) {
  63. data, err := encodingWithoutPadding.DecodeString(token)
  64. if err != nil {
  65. return UnknownHandlerType, nil, nil, err
  66. }
  67. if len(data) < 1 {
  68. return UnknownHandlerType, nil, nil, &ErrToken{"no data"}
  69. }
  70. if data[0] != tokenVersion1 {
  71. return UnknownHandlerType, nil, nil, &ErrToken{fmt.Sprintf("unsupported token version: %v", data[0])}
  72. }
  73. var userID int64
  74. var hmac []byte
  75. var payload []byte
  76. if err := util.UnpackData(data[1:], &userID, &hmac, &payload); err != nil {
  77. return UnknownHandlerType, nil, nil, err
  78. }
  79. user, err := user_model.GetUserByID(ctx, userID)
  80. if err != nil {
  81. return UnknownHandlerType, nil, nil, err
  82. }
  83. if !crypto_hmac.Equal(hmac, generateHmac([]byte(user.Rands), payload)) {
  84. return UnknownHandlerType, nil, nil, &ErrToken{"verification failed"}
  85. }
  86. var expiresUnix int64
  87. var handlerType HandlerType
  88. var innerPayload []byte
  89. if err := util.UnpackData(payload, &expiresUnix, &handlerType, &innerPayload); err != nil {
  90. return UnknownHandlerType, nil, nil, err
  91. }
  92. if time.Unix(expiresUnix, 0).Before(time.Now()) {
  93. return UnknownHandlerType, nil, nil, &ErrToken{"token expired"}
  94. }
  95. return handlerType, user, innerPayload, nil
  96. }
  97. // generateHmac creates a trunkated HMAC for the given payload
  98. func generateHmac(secret, payload []byte) []byte {
  99. mac := crypto_hmac.New(sha256.New, secret)
  100. mac.Write(payload)
  101. hmac := mac.Sum(nil)
  102. return hmac[:10] // RFC2104 recommends not using less then 80 bits
  103. }