| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							|  |  |  |    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package oauth | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"errors" | 
					
						
							| 
									
										
										
										
											2021-03-17 16:01:31 +01:00
										 |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	"time" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/sirupsen/logrus" | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/oauth2/v4" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/oauth2/v4/models" | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | // tokenStore is an implementation of oauth2.TokenStore, which uses our db interface as a storage backend. | 
					
						
							|  |  |  | type tokenStore struct { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	oauth2.TokenStore | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 	db  db.DB | 
					
						
							|  |  |  | 	log *logrus.Logger | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | // newTokenStore returns a token store that satisfies the oauth2.TokenStore interface. | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | // | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | // In order to allow tokens to 'expire', it will also set off a goroutine that iterates through | 
					
						
							|  |  |  | // the tokens in the DB once per minute and deletes any that have expired. | 
					
						
							|  |  |  | func newTokenStore(ctx context.Context, db db.DB, log *logrus.Logger) oauth2.TokenStore { | 
					
						
							|  |  |  | 	pts := &tokenStore{ | 
					
						
							|  |  |  | 		db:  db, | 
					
						
							|  |  |  | 		log: log, | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// set the token store to clean out expired tokens once per minute, or return if we're done | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 	go func(ctx context.Context, pts *tokenStore, log *logrus.Logger) { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	cleanloop: | 
					
						
							|  |  |  | 		for { | 
					
						
							|  |  |  | 			select { | 
					
						
							|  |  |  | 			case <-ctx.Done(): | 
					
						
							|  |  |  | 				log.Info("breaking cleanloop") | 
					
						
							|  |  |  | 				break cleanloop | 
					
						
							|  |  |  | 			case <-time.After(1 * time.Minute): | 
					
						
							| 
									
										
										
										
											2021-05-09 14:28:43 +02:00
										 |  |  | 				log.Trace("sweeping out old oauth entries broom broom") | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 				if err := pts.sweep(); err != nil { | 
					
						
							|  |  |  | 					log.Errorf("error while sweeping oauth entries: %s", err) | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}(ctx, pts, log) | 
					
						
							|  |  |  | 	return pts | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // sweep clears out old tokens that have expired; it should be run on a loop about once per minute or so. | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) sweep() error { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	// select *all* tokens from the db | 
					
						
							|  |  |  | 	// todo: if this becomes expensive (ie., there are fucking LOADS of tokens) then figure out a better way. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	tokens := new([]*Token) | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 	if err := pts.db.GetAll(tokens); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// iterate through and remove expired tokens | 
					
						
							|  |  |  | 	now := time.Now() | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 	for _, pgt := range *tokens { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 		// The zero value of a time.Time is 00:00 january 1 1970, which will always be before now. So: | 
					
						
							|  |  |  | 		// we only want to check if a token expired before now if the expiry time is *not zero*; | 
					
						
							|  |  |  | 		// ie., if it's been explicity set. | 
					
						
							|  |  |  | 		if !pgt.CodeExpiresAt.IsZero() && pgt.CodeExpiresAt.Before(now) || !pgt.RefreshExpiresAt.IsZero() && pgt.RefreshExpiresAt.Before(now) || !pgt.AccessExpiresAt.IsZero() && pgt.AccessExpiresAt.Before(now) { | 
					
						
							| 
									
										
										
										
											2021-05-09 14:28:43 +02:00
										 |  |  | 			if err := pts.db.DeleteByID(pgt.ID, pgt); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 				return err | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Create creates and store the new token information. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // For the original implementation, see https://github.com/superseriousbusiness/oauth2/blob/master/store/token.go#L34 | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) Create(ctx context.Context, info oauth2.TokenInfo) error { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	t, ok := info.(*models.Token) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		return errors.New("info param was not a models.Token") | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	if err := pts.db.Put(TokenToPGToken(t)); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-17 16:01:31 +01:00
										 |  |  | 		return fmt.Errorf("error in tokenstore create: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // RemoveByCode deletes a token from the DB based on the Code field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) RemoveByCode(ctx context.Context, code string) error { | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	return pts.db.DeleteWhere([]db.Where{{Key: "code", Value: code}}, &Token{}) | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // RemoveByAccess deletes a token from the DB based on the Access field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) RemoveByAccess(ctx context.Context, access string) error { | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	return pts.db.DeleteWhere([]db.Where{{Key: "access", Value: access}}, &Token{}) | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // RemoveByRefresh deletes a token from the DB based on the Refresh field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) RemoveByRefresh(ctx context.Context, refresh string) error { | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	return pts.db.DeleteWhere([]db.Where{{Key: "refresh", Value: refresh}}, &Token{}) | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // GetByCode selects a token from the DB based on the Code field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) GetByCode(ctx context.Context, code string) (oauth2.TokenInfo, error) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	if code == "" { | 
					
						
							|  |  |  | 		return nil, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	pgt := &Token{ | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		Code: code, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	if err := pts.db.GetWhere([]db.Where{{Key: "code", Value: code}}, pgt); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	return TokenToOauthToken(pgt), nil | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // GetByAccess selects a token from the DB based on the Access field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) GetByAccess(ctx context.Context, access string) (oauth2.TokenInfo, error) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	if access == "" { | 
					
						
							|  |  |  | 		return nil, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	pgt := &Token{ | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		Access: access, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	if err := pts.db.GetWhere([]db.Where{{Key: "access", Value: access}}, pgt); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	return TokenToOauthToken(pgt), nil | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // GetByRefresh selects a token from the DB based on the Refresh field | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | func (pts *tokenStore) GetByRefresh(ctx context.Context, refresh string) (oauth2.TokenInfo, error) { | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	if refresh == "" { | 
					
						
							|  |  |  | 		return nil, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	pgt := &Token{ | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		Refresh: refresh, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	if err := pts.db.GetWhere([]db.Where{{Key: "refresh", Value: refresh}}, pgt); err != nil { | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 		return nil, err | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | 	return TokenToOauthToken(pgt), nil | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							|  |  |  | 	The following models are basically helpers for the postgres token store implementation, they should only be used internally. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // Token is a translation of the gotosocial token with the ExpiresIn fields replaced with ExpiresAt. | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | // | 
					
						
							| 
									
										
										
										
											2021-03-15 18:59:38 +01:00
										 |  |  | // Explanation for this: gotosocial assumes an in-memory or file database of some kind, where a time-to-live parameter (TTL) can be defined, | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | // and tokens with expired TTLs are automatically removed. Since Postgres doesn't have that feature, it's easier to set an expiry time and | 
					
						
							|  |  |  | // then periodically sweep out tokens when that time has passed. | 
					
						
							|  |  |  | // | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | // Note that this struct does *not* satisfy the token interface shown here: https://github.com/superseriousbusiness/oauth2/blob/master/model.go#L22 | 
					
						
							|  |  |  | // and implemented here: https://github.com/superseriousbusiness/oauth2/blob/master/models/token.go. | 
					
						
							|  |  |  | // As such, manual translation is always required between Token and the gotosocial *model.Token. The helper functions oauthTokenToPGToken | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | // and pgTokenToOauthToken can be used for that. | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | type Token struct { | 
					
						
							| 
									
										
										
										
											2021-03-22 22:26:54 +01:00
										 |  |  | 	ID                  string `pg:"type:uuid,default:gen_random_uuid(),pk,notnull"` | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	ClientID            string | 
					
						
							|  |  |  | 	UserID              string | 
					
						
							|  |  |  | 	RedirectURI         string | 
					
						
							|  |  |  | 	Scope               string | 
					
						
							| 
									
										
										
										
											2021-03-17 16:01:31 +01:00
										 |  |  | 	Code                string `pg:"default:'',pk"` | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	CodeChallenge       string | 
					
						
							|  |  |  | 	CodeChallengeMethod string | 
					
						
							|  |  |  | 	CodeCreateAt        time.Time `pg:"type:timestamp"` | 
					
						
							|  |  |  | 	CodeExpiresAt       time.Time `pg:"type:timestamp"` | 
					
						
							| 
									
										
										
										
											2021-03-17 16:01:31 +01:00
										 |  |  | 	Access              string    `pg:"default:'',pk"` | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	AccessCreateAt      time.Time `pg:"type:timestamp"` | 
					
						
							|  |  |  | 	AccessExpiresAt     time.Time `pg:"type:timestamp"` | 
					
						
							| 
									
										
										
										
											2021-03-17 16:01:31 +01:00
										 |  |  | 	Refresh             string    `pg:"default:'',pk"` | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	RefreshCreateAt     time.Time `pg:"type:timestamp"` | 
					
						
							|  |  |  | 	RefreshExpiresAt    time.Time `pg:"type:timestamp"` | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // TokenToPGToken is a lil util function that takes a gotosocial token and gives back a token for inserting into postgres | 
					
						
							|  |  |  | func TokenToPGToken(tkn *models.Token) *Token { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	now := time.Now() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// For the following, we want to make sure we're not adding a time.Now() to an *empty* ExpiresIn, otherwise that's | 
					
						
							|  |  |  | 	// going to cause all sorts of interesting problems. So check first to make sure that the ExpiresIn is not equal | 
					
						
							|  |  |  | 	// to the zero value of a time.Duration, which is 0s. If it *is* empty/nil, just leave the ExpiresAt at nil as well. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 	cea := time.Time{} | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	if tkn.CodeExpiresIn != 0*time.Second { | 
					
						
							|  |  |  | 		cea = now.Add(tkn.CodeExpiresIn) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 	aea := time.Time{} | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	if tkn.AccessExpiresIn != 0*time.Second { | 
					
						
							|  |  |  | 		aea = now.Add(tkn.AccessExpiresIn) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 	rea := time.Time{} | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	if tkn.RefreshExpiresIn != 0*time.Second { | 
					
						
							|  |  |  | 		rea = now.Add(tkn.RefreshExpiresIn) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	return &Token{ | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 		ClientID:            tkn.ClientID, | 
					
						
							|  |  |  | 		UserID:              tkn.UserID, | 
					
						
							|  |  |  | 		RedirectURI:         tkn.RedirectURI, | 
					
						
							|  |  |  | 		Scope:               tkn.Scope, | 
					
						
							|  |  |  | 		Code:                tkn.Code, | 
					
						
							|  |  |  | 		CodeChallenge:       tkn.CodeChallenge, | 
					
						
							|  |  |  | 		CodeChallengeMethod: tkn.CodeChallengeMethod, | 
					
						
							|  |  |  | 		CodeCreateAt:        tkn.CodeCreateAt, | 
					
						
							|  |  |  | 		CodeExpiresAt:       cea, | 
					
						
							|  |  |  | 		Access:              tkn.Access, | 
					
						
							|  |  |  | 		AccessCreateAt:      tkn.AccessCreateAt, | 
					
						
							|  |  |  | 		AccessExpiresAt:     aea, | 
					
						
							|  |  |  | 		Refresh:             tkn.Refresh, | 
					
						
							|  |  |  | 		RefreshCreateAt:     tkn.RefreshCreateAt, | 
					
						
							|  |  |  | 		RefreshExpiresAt:    rea, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // TokenToOauthToken is a lil util function that takes a postgres token and gives back a gotosocial token | 
					
						
							|  |  |  | func TokenToOauthToken(pgt *Token) *models.Token { | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	now := time.Now() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 	var codeExpiresIn time.Duration | 
					
						
							|  |  |  | 	if !pgt.CodeExpiresAt.IsZero() { | 
					
						
							|  |  |  | 		codeExpiresIn = pgt.CodeExpiresAt.Sub(now) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	var accessExpiresIn time.Duration | 
					
						
							|  |  |  | 	if !pgt.AccessExpiresAt.IsZero() { | 
					
						
							|  |  |  | 		accessExpiresIn = pgt.AccessExpiresAt.Sub(now) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	var refreshExpiresIn time.Duration | 
					
						
							|  |  |  | 	if !pgt.RefreshExpiresAt.IsZero() { | 
					
						
							|  |  |  | 		refreshExpiresIn = pgt.RefreshExpiresAt.Sub(now) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	return &models.Token{ | 
					
						
							|  |  |  | 		ClientID:            pgt.ClientID, | 
					
						
							|  |  |  | 		UserID:              pgt.UserID, | 
					
						
							|  |  |  | 		RedirectURI:         pgt.RedirectURI, | 
					
						
							|  |  |  | 		Scope:               pgt.Scope, | 
					
						
							|  |  |  | 		Code:                pgt.Code, | 
					
						
							|  |  |  | 		CodeChallenge:       pgt.CodeChallenge, | 
					
						
							|  |  |  | 		CodeChallengeMethod: pgt.CodeChallengeMethod, | 
					
						
							|  |  |  | 		CodeCreateAt:        pgt.CodeCreateAt, | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 		CodeExpiresIn:       codeExpiresIn, | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 		Access:              pgt.Access, | 
					
						
							|  |  |  | 		AccessCreateAt:      pgt.AccessCreateAt, | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 		AccessExpiresIn:     accessExpiresIn, | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 		Refresh:             pgt.Refresh, | 
					
						
							|  |  |  | 		RefreshCreateAt:     pgt.RefreshCreateAt, | 
					
						
							| 
									
										
										
										
											2021-05-10 16:29:05 +02:00
										 |  |  | 		RefreshExpiresIn:    refreshExpiresIn, | 
					
						
							| 
									
										
										
										
											2021-03-14 17:56:16 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | } |