This patch proposes behavioral changes. In particular, referring systems will need to provide client ids under all circumstances.
94 lines
3.1 KiB
Go
94 lines
3.1 KiB
Go
package user
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
"time"
|
|
|
|
"github.com/jonboulle/clockwork"
|
|
|
|
"github.com/coreos/go-oidc/jose"
|
|
"github.com/coreos/go-oidc/key"
|
|
"github.com/coreos/go-oidc/oidc"
|
|
)
|
|
|
|
var (
|
|
clock = clockwork.NewRealClock()
|
|
)
|
|
|
|
// NewEmailVerification creates an object which can be sent to a user in serialized form to verify that they control an email address.
|
|
// The clientID is the ID of the registering user. The callback is where a user should land after verifying their email.
|
|
func NewEmailVerification(user User, clientID string, issuer url.URL, callback url.URL, expires time.Duration) EmailVerification {
|
|
claims := oidc.NewClaims(issuer.String(), user.ID, clientID, clock.Now(), clock.Now().Add(expires))
|
|
claims.Add(ClaimEmailVerificationCallback, callback.String())
|
|
claims.Add(ClaimEmailVerificationEmail, user.Email)
|
|
return EmailVerification{claims}
|
|
}
|
|
|
|
type EmailVerification struct {
|
|
Claims jose.Claims
|
|
}
|
|
|
|
// Assumes that parseAndVerifyTokenClaims has already been called on claims
|
|
func verifyEmailVerificationClaims(claims jose.Claims) (EmailVerification, error) {
|
|
email, ok, err := claims.StringClaim(ClaimEmailVerificationEmail)
|
|
if err != nil {
|
|
return EmailVerification{}, err
|
|
}
|
|
if !ok || email == "" {
|
|
return EmailVerification{}, fmt.Errorf("no %q claim", ClaimEmailVerificationEmail)
|
|
}
|
|
|
|
cb, ok, err := claims.StringClaim(ClaimEmailVerificationCallback)
|
|
if err != nil {
|
|
return EmailVerification{}, err
|
|
}
|
|
if !ok || cb == "" {
|
|
return EmailVerification{}, fmt.Errorf("no %q claim", ClaimEmailVerificationCallback)
|
|
}
|
|
if _, err := url.Parse(cb); err != nil {
|
|
return EmailVerification{}, fmt.Errorf("callback URL not parseable: %v", cb)
|
|
}
|
|
|
|
return EmailVerification{claims}, nil
|
|
}
|
|
|
|
// ParseAndVerifyEmailVerificationToken parses a string into a an EmailVerification, verifies the signature, and ensures that required claims are present.
|
|
// In addition to the usual claims required by the OIDC spec, "aud" and "sub" must be present as well as ClaimEmailVerificationCallback and ClaimEmailVerificationEmail.
|
|
func ParseAndVerifyEmailVerificationToken(token string, issuer url.URL, keys []key.PublicKey) (EmailVerification, error) {
|
|
tokenClaims, err := parseAndVerifyTokenClaims(token, issuer, keys)
|
|
if err != nil {
|
|
return EmailVerification{}, err
|
|
}
|
|
|
|
return verifyEmailVerificationClaims(tokenClaims.Claims)
|
|
}
|
|
|
|
func (e EmailVerification) UserID() string {
|
|
uid, ok, err := e.Claims.StringClaim("sub")
|
|
if !ok || err != nil {
|
|
panic("EmailVerification: no sub claim. This should be impossible.")
|
|
}
|
|
return uid
|
|
}
|
|
|
|
func (e EmailVerification) Email() string {
|
|
email, ok, err := e.Claims.StringClaim(ClaimEmailVerificationEmail)
|
|
if !ok || err != nil {
|
|
panic("EmailVerification: no email claim. This should be impossible.")
|
|
}
|
|
return email
|
|
}
|
|
|
|
func (e EmailVerification) Callback() *url.URL {
|
|
cb, ok, err := e.Claims.StringClaim(ClaimEmailVerificationCallback)
|
|
if !ok || err != nil {
|
|
panic("EmailVerification: no callback claim. This should be impossible.")
|
|
}
|
|
|
|
cbURL, err := url.Parse(cb)
|
|
if err != nil {
|
|
panic("EmailVerificaiton: can't parse callback. This should be impossible.")
|
|
}
|
|
return cbURL
|
|
}
|