photoprism/pkg/rnd/auth.go
Michael Mayer 305e7bac68 OAuth2: Refactor "client add" and "client mod" CLI commands #808 #3943
Signed-off-by: Michael Mayer <michael@photoprism.app>
2024-01-29 13:54:50 +01:00

119 lines
2.7 KiB
Go

package rnd
import (
"crypto/rand"
"fmt"
"log"
"math/big"
"github.com/photoprism/photoprism/pkg/checksum"
)
const (
SessionIdLength = 64
AuthTokenLength = 48
AppPasswordLength = 27
AppPasswordSeparator = '-'
)
// AuthToken generates a random hexadecimal character token for authenticating client applications.
//
// Examples: 9fa8e562564dac91b96881040e98f6719212a1a364e0bb25
func AuthToken() string {
b := make([]byte, 24)
if _, err := rand.Read(b); err != nil {
log.Fatal(err)
}
return fmt.Sprintf("%x", b)
}
// IsAuthToken checks if the string represents a valid auth token.
func IsAuthToken(s string) bool {
if l := len(s); l == AuthTokenLength {
return IsHex(s)
}
return false
}
// AppPassword generates a random, human-friendly authentication token that can also be used as
// password replacement for client applications. It is separated by 3 dashes for better readability
// and has a total length of 27 characters.
//
// Example: OXiV72-wTtiL9-d04jO7-X7XP4p
func AppPassword() string {
m := big.NewInt(int64(len(CharsetBase62)))
b := make([]byte, 0, AppPasswordLength)
for i := 0; i < AppPasswordLength; i++ {
if (i+1)%7 == 0 {
b = append(b, AppPasswordSeparator)
} else if i == AppPasswordLength-1 {
b = append(b, checksum.Char(b))
return string(b)
} else if r, err := rand.Int(rand.Reader, m); err == nil {
b = append(b, CharsetBase62[r.Int64()])
}
}
return string(b)
}
// IsAppPassword checks if the string represents a valid app password.
func IsAppPassword(s string, verifyChecksum bool) bool {
// Verify token length.
if len(s) != AppPasswordLength {
return false
}
// Check characters.
sep := 0
for _, r := range s {
if r == AppPasswordSeparator {
sep++
} else if (r < '0' || r > '9') && (r < 'A' || r > 'Z') && (r < 'a' || r > 'z') {
return false
}
}
// Check number of separators.
if sep != AppPasswordLength/7 {
return false
} else if !verifyChecksum {
return true
}
// Verify token checksum.
return s[AppPasswordLength-1] == checksum.Char([]byte(s[:AppPasswordLength-1]))
}
// IsAuthAny checks if the string represents a valid auth token or app password.
func IsAuthAny(s string) bool {
// Check if string might be a regular auth token.
if IsAuthToken(s) {
return true
}
// Check if string might be a human-friendly app password.
if IsAppPassword(s, false) {
return true
}
return false
}
// SessionID returns the hashed session id string.
func SessionID(token string) string {
return Sha256([]byte(token))
}
// IsSessionID checks if the string represents a valid session id.
func IsSessionID(id string) bool {
if len(id) != SessionIdLength {
return false
}
return IsHex(id)
}