memos/store/idp.go

302 lines
6.9 KiB
Go
Raw Normal View History

package store
import (
"context"
"database/sql"
"encoding/json"
"fmt"
"strings"
)
type IdentityProviderType string
const (
IdentityProviderOAuth2 IdentityProviderType = "OAUTH2"
)
type IdentityProviderConfig struct {
OAuth2Config *IdentityProviderOAuth2Config
}
type IdentityProviderOAuth2Config struct {
ClientID string `json:"clientId"`
ClientSecret string `json:"clientSecret"`
AuthURL string `json:"authUrl"`
TokenURL string `json:"tokenUrl"`
UserInfoURL string `json:"userInfoUrl"`
Scopes []string `json:"scopes"`
FieldMapping *FieldMapping `json:"fieldMapping"`
}
type FieldMapping struct {
Identifier string `json:"identifier"`
DisplayName string `json:"displayName"`
Email string `json:"email"`
}
2023-06-26 23:46:01 +08:00
type IdentityProvider struct {
ID int
Name string
Type IdentityProviderType
IdentifierFilter string
Config *IdentityProviderConfig
}
2023-06-26 23:46:01 +08:00
type FindIdentityProvider struct {
ID *int
}
2023-06-26 23:46:01 +08:00
type UpdateIdentityProvider struct {
ID int
Type IdentityProviderType
Name *string
IdentifierFilter *string
Config *IdentityProviderConfig
}
2023-06-26 23:46:01 +08:00
type DeleteIdentityProvider struct {
ID int
}
2023-06-26 23:46:01 +08:00
func (s *Store) CreateIdentityProvider(ctx context.Context, create *IdentityProvider) (*IdentityProvider, error) {
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
defer tx.Rollback()
var configBytes []byte
if create.Type == IdentityProviderOAuth2 {
configBytes, err = json.Marshal(create.Config.OAuth2Config)
if err != nil {
return nil, err
}
} else {
return nil, fmt.Errorf("unsupported idp type %s", string(create.Type))
}
2023-06-26 23:46:01 +08:00
query := `
INSERT INTO idp (
name,
type,
identifier_filter,
config
)
VALUES (?, ?, ?, ?)
RETURNING id
`
if err := tx.QueryRowContext(
ctx,
query,
create.Name,
create.Type,
create.IdentifierFilter,
string(configBytes),
).Scan(
&create.ID,
); err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
2023-06-26 23:46:01 +08:00
if err := tx.Commit(); err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
2023-06-26 23:46:01 +08:00
identityProvider := create
s.idpCache.Store(identityProvider.ID, identityProvider)
return identityProvider, nil
}
2023-06-26 23:46:01 +08:00
func (s *Store) ListIdentityProviders(ctx context.Context, find *FindIdentityProvider) ([]*IdentityProvider, error) {
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
defer tx.Rollback()
list, err := listIdentityProviders(ctx, tx, find)
if err != nil {
return nil, err
}
for _, item := range list {
s.idpCache.Store(item.ID, item)
}
return list, nil
}
2023-06-26 23:46:01 +08:00
func (s *Store) GetIdentityProvider(ctx context.Context, find *FindIdentityProvider) (*IdentityProvider, error) {
if find.ID != nil {
if cache, ok := s.idpCache.Load(*find.ID); ok {
2023-06-26 23:46:01 +08:00
return cache.(*IdentityProvider), nil
}
}
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
defer tx.Rollback()
list, err := listIdentityProviders(ctx, tx, find)
if err != nil {
return nil, err
}
if len(list) == 0 {
2023-06-26 23:46:01 +08:00
return nil, nil
}
2023-06-26 23:46:01 +08:00
identityProvider := list[0]
s.idpCache.Store(identityProvider.ID, identityProvider)
return identityProvider, nil
}
2023-06-26 23:46:01 +08:00
func (s *Store) UpdateIdentityProvider(ctx context.Context, update *UpdateIdentityProvider) (*IdentityProvider, error) {
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
defer tx.Rollback()
set, args := []string{}, []any{}
if v := update.Name; v != nil {
set, args = append(set, "name = ?"), append(args, *v)
}
if v := update.IdentifierFilter; v != nil {
set, args = append(set, "identifier_filter = ?"), append(args, *v)
}
if v := update.Config; v != nil {
var configBytes []byte
if update.Type == IdentityProviderOAuth2 {
configBytes, err = json.Marshal(update.Config.OAuth2Config)
if err != nil {
return nil, err
}
} else {
return nil, fmt.Errorf("unsupported idp type %s", string(update.Type))
}
set, args = append(set, "config = ?"), append(args, string(configBytes))
}
args = append(args, update.ID)
query := `
UPDATE idp
SET ` + strings.Join(set, ", ") + `
WHERE id = ?
RETURNING id, name, type, identifier_filter, config
`
2023-06-26 23:46:01 +08:00
var identityProvider IdentityProvider
var identityProviderConfig string
if err := tx.QueryRowContext(ctx, query, args...).Scan(
2023-06-26 23:46:01 +08:00
&identityProvider.ID,
&identityProvider.Name,
&identityProvider.Type,
&identityProvider.IdentifierFilter,
&identityProviderConfig,
); err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
2023-06-26 23:46:01 +08:00
if identityProvider.Type == IdentityProviderOAuth2 {
oauth2Config := &IdentityProviderOAuth2Config{}
if err := json.Unmarshal([]byte(identityProviderConfig), oauth2Config); err != nil {
return nil, err
}
2023-06-26 23:46:01 +08:00
identityProvider.Config = &IdentityProviderConfig{
OAuth2Config: oauth2Config,
}
} else {
2023-06-26 23:46:01 +08:00
return nil, fmt.Errorf("unsupported idp type %s", string(identityProvider.Type))
}
2023-06-26 23:46:01 +08:00
if err := tx.Commit(); err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
2023-06-26 23:46:01 +08:00
s.idpCache.Store(identityProvider.ID, identityProvider)
return &identityProvider, nil
}
2023-06-26 23:46:01 +08:00
func (s *Store) DeleteIdentityProvider(ctx context.Context, delete *DeleteIdentityProvider) error {
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
2023-06-26 23:46:01 +08:00
return err
}
defer tx.Rollback()
where, args := []string{"id = ?"}, []any{delete.ID}
stmt := `DELETE FROM idp WHERE ` + strings.Join(where, " AND ")
result, err := tx.ExecContext(ctx, stmt, args...)
if err != nil {
2023-06-26 23:46:01 +08:00
return err
}
2023-06-26 23:46:01 +08:00
if _, err = result.RowsAffected(); err != nil {
return err
}
2023-06-26 23:46:01 +08:00
if err := tx.Commit(); err != nil {
return err
}
2023-06-26 23:46:01 +08:00
s.idpCache.Delete(delete.ID)
return nil
}
2023-06-26 23:46:01 +08:00
func listIdentityProviders(ctx context.Context, tx *sql.Tx, find *FindIdentityProvider) ([]*IdentityProvider, error) {
where, args := []string{"TRUE"}, []any{}
if v := find.ID; v != nil {
where, args = append(where, fmt.Sprintf("id = $%d", len(args)+1)), append(args, *v)
}
rows, err := tx.QueryContext(ctx, `
SELECT
id,
name,
type,
identifier_filter,
config
FROM idp
WHERE `+strings.Join(where, " AND ")+` ORDER BY id ASC`,
args...,
)
if err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
defer rows.Close()
2023-06-26 23:46:01 +08:00
var identityProviders []*IdentityProvider
for rows.Next() {
2023-06-26 23:46:01 +08:00
var identityProvider IdentityProvider
var identityProviderConfig string
if err := rows.Scan(
2023-06-26 23:46:01 +08:00
&identityProvider.ID,
&identityProvider.Name,
&identityProvider.Type,
&identityProvider.IdentifierFilter,
&identityProviderConfig,
); err != nil {
2023-06-26 23:46:01 +08:00
return nil, err
}
2023-06-26 23:46:01 +08:00
if identityProvider.Type == IdentityProviderOAuth2 {
oauth2Config := &IdentityProviderOAuth2Config{}
if err := json.Unmarshal([]byte(identityProviderConfig), oauth2Config); err != nil {
return nil, err
}
2023-06-26 23:46:01 +08:00
identityProvider.Config = &IdentityProviderConfig{
OAuth2Config: oauth2Config,
}
} else {
2023-06-26 23:46:01 +08:00
return nil, fmt.Errorf("unsupported idp type %s", string(identityProvider.Type))
}
2023-06-26 23:46:01 +08:00
identityProviders = append(identityProviders, &identityProvider)
}
if err := rows.Err(); err != nil {
return nil, err
}
2023-06-26 23:46:01 +08:00
return identityProviders, nil
}