You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
95 lines
2.5 KiB
95 lines
2.5 KiB
// Copyright (c) 2022 Proton Technologies AG |
|
// |
|
// This file is part of ProtonMail Bridge.Bridge. |
|
// |
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify |
|
// it under the terms of the GNU General Public License as published by |
|
// the Free Software Foundation, either version 3 of the License, or |
|
// (at your option) any later version. |
|
// |
|
// ProtonMail Bridge is distributed in the hope that it will be useful, |
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
// GNU General Public License for more details. |
|
// |
|
// You should have received a copy of the GNU General Public License |
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>. |
|
|
|
package fakeapi |
|
|
|
import ( |
|
"bytes" |
|
"errors" |
|
|
|
"github.com/ProtonMail/proton-bridge/pkg/pmapi" |
|
) |
|
|
|
type fakeSession struct { |
|
username string |
|
uid, acc, ref string |
|
hasFullScope bool |
|
} |
|
|
|
var errWrongNameOrPassword = errors.New("Incorrect login credentials. Please try again") //nolint[stylecheck] |
|
|
|
func (ctl *Controller) checkAccessToken(uid, acc string) bool { |
|
session, ok := ctl.sessionsByUID[uid] |
|
if !ok { |
|
return false |
|
} |
|
|
|
return session.uid == uid && session.acc == acc |
|
} |
|
|
|
func (ctl *Controller) checkScope(uid string) bool { |
|
session, ok := ctl.sessionsByUID[uid] |
|
if !ok { |
|
return false |
|
} |
|
|
|
return session.hasFullScope |
|
} |
|
|
|
func (ctl *Controller) createSessionIfAuthorized(username string, password []byte) (*fakeSession, error) { |
|
user, ok := ctl.usersByUsername[username] |
|
if !ok || !bytes.Equal(user.password, password) { |
|
return nil, errWrongNameOrPassword |
|
} |
|
|
|
return ctl.createSession(username, !user.has2FA), nil |
|
} |
|
|
|
func (ctl *Controller) createSession(username string, hasFullScope bool) *fakeSession { |
|
session := &fakeSession{ |
|
username: username, |
|
uid: ctl.tokenGenerator.next("uid"), |
|
acc: ctl.tokenGenerator.next("acc"), |
|
ref: ctl.tokenGenerator.next("ref"), |
|
hasFullScope: hasFullScope, |
|
} |
|
|
|
ctl.sessionsByUID[session.uid] = session |
|
return session |
|
} |
|
|
|
func (ctl *Controller) refreshSessionIfAuthorized(uid, ref string) (*fakeSession, error) { |
|
session, ok := ctl.sessionsByUID[uid] |
|
if !ok { |
|
return nil, pmapi.ErrUnauthorized |
|
} |
|
|
|
if ref != session.ref { |
|
return nil, pmapi.ErrUnauthorized |
|
} |
|
|
|
session.ref = ctl.tokenGenerator.next("ref") |
|
session.acc = ctl.tokenGenerator.next("acc") |
|
|
|
ctl.sessionsByUID[session.uid] = session |
|
|
|
return session, nil |
|
} |
|
|
|
func (ctl *Controller) deleteSession(uid string) { |
|
delete(ctl.sessionsByUID, uid) |
|
}
|
|
|