Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
C
canifa_note
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Vũ Hoàng Anh
canifa_note
Commits
a538b978
Unverified
Commit
a538b978
authored
Feb 17, 2023
by
boojack
Committed by
GitHub
Feb 17, 2023
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
feat: introduce idp table (#1105)
* feat: introduce idp table * chore: update
parent
c6e525b0
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
274 additions
and
0 deletions
+274
-0
LATEST__SCHEMA.sql
store/db/migration/dev/LATEST__SCHEMA.sql
+9
-0
idp.go
store/idp.go
+265
-0
No files found.
store/db/migration/dev/LATEST__SCHEMA.sql
View file @
a538b978
...
@@ -115,3 +115,12 @@ CREATE TABLE storage (
...
@@ -115,3 +115,12 @@ CREATE TABLE storage (
bucket
TEXT
NOT
NULL
DEFAULT
''
,
bucket
TEXT
NOT
NULL
DEFAULT
''
,
url_prefix
TEXT
NOT
NULL
DEFAULT
''
url_prefix
TEXT
NOT
NULL
DEFAULT
''
);
);
-- idp
CREATE
TABLE
idp
(
id
INTEGER
PRIMARY
KEY
AUTOINCREMENT
,
name
TEXT
NOT
NULL
DEFAULT
''
,
type
TEXT
NOT
NULL
,
identifier_filter
TEXT
NOT
NULL
DEFAULT
''
,
config
TEXT
NOT
NULL
DEFAULT
'{}'
);
\ No newline at end of file
store/idp.go
0 → 100644
View file @
a538b978
package
store
import
(
"context"
"database/sql"
"encoding/json"
"fmt"
"strings"
"github.com/usememos/memos/common"
)
type
IdentityProvideType
string
const
(
IdentityProviderOAuth2
IdentityProvideType
=
"OAUTH2"
)
type
IdentityProviderConfig
interface
{}
type
IdentityProviderOAuth2Config
struct
{
ClientID
string
`json:"clientId"`
ClientSecret
string
`json:"clientSecret"`
AuthURL
string
`json:"authUrl"`
TokenURL
string
`json:"tokenUrl"`
UserInfoURL
string
`json:"userInfoUrl"`
Scopes
[]
string
`json:"scopes"`
FieldMapping
*
FieldMapping
`json:"fieldMapping"`
}
type
FieldMapping
struct
{
Identifier
string
DisplayName
string
Email
string
}
type
IdentityProviderMessage
struct
{
ID
int
Name
string
Type
IdentityProvideType
IdentifierFilter
string
Config
*
IdentityProviderConfig
}
type
FindIdentityProviderMessage
struct
{
ID
*
int
}
type
UpdateIdentityProviderMessage
struct
{
ID
int
Type
IdentityProvideType
Name
*
string
IdentifierFilter
*
string
Config
*
IdentityProviderConfig
}
type
DeleteIdentityProviderMessage
struct
{
ID
int
}
func
(
s
*
Store
)
CreateIdentityProvider
(
ctx
context
.
Context
,
create
*
IdentityProviderMessage
)
(
*
IdentityProviderMessage
,
error
)
{
tx
,
err
:=
s
.
db
.
BeginTx
(
ctx
,
nil
)
if
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
defer
tx
.
Rollback
()
var
configBytes
[]
byte
if
create
.
Type
==
IdentityProviderOAuth2
{
configBytes
,
err
=
json
.
Marshal
(
any
(
create
.
Config
)
.
(
*
IdentityProviderOAuth2Config
))
if
err
!=
nil
{
return
nil
,
err
}
}
else
{
return
nil
,
fmt
.
Errorf
(
"unsupported idp type %s"
,
string
(
create
.
Type
))
}
query
:=
`
INSERT INTO idp (
name,
type,
identifier_filter,
config
)
VALUES (?, ?, ?, ?)
RETURNING id
`
if
err
:=
tx
.
QueryRowContext
(
ctx
,
query
,
create
.
Name
,
create
.
Type
,
create
.
IdentifierFilter
,
string
(
configBytes
),
)
.
Scan
(
&
create
.
ID
,
);
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
if
err
:=
tx
.
Commit
();
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
return
create
,
nil
}
func
(
s
*
Store
)
ListIdentityProviders
(
ctx
context
.
Context
,
find
*
FindIdentityProviderMessage
)
([]
*
IdentityProviderMessage
,
error
)
{
tx
,
err
:=
s
.
db
.
BeginTx
(
ctx
,
nil
)
if
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
defer
tx
.
Rollback
()
list
,
err
:=
listIdentityProviders
(
ctx
,
tx
,
find
)
if
err
!=
nil
{
return
nil
,
err
}
return
list
,
nil
}
func
(
s
*
Store
)
GetIdentityProvider
(
ctx
context
.
Context
,
find
*
FindIdentityProviderMessage
)
(
*
IdentityProviderMessage
,
error
)
{
tx
,
err
:=
s
.
db
.
BeginTx
(
ctx
,
nil
)
if
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
defer
tx
.
Rollback
()
list
,
err
:=
listIdentityProviders
(
ctx
,
tx
,
find
)
if
err
!=
nil
{
return
nil
,
err
}
if
len
(
list
)
==
0
{
return
nil
,
&
common
.
Error
{
Code
:
common
.
NotFound
,
Err
:
fmt
.
Errorf
(
"not found"
)}
}
return
list
[
0
],
nil
}
func
(
s
*
Store
)
UpdateIdentityProvider
(
ctx
context
.
Context
,
update
*
UpdateIdentityProviderMessage
)
(
*
IdentityProviderMessage
,
error
)
{
tx
,
err
:=
s
.
db
.
BeginTx
(
ctx
,
nil
)
if
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
defer
tx
.
Rollback
()
set
,
args
:=
[]
string
{},
[]
interface
{}{}
if
v
:=
update
.
Name
;
v
!=
nil
{
set
,
args
=
append
(
set
,
"name = ?"
),
append
(
args
,
*
v
)
}
if
v
:=
update
.
IdentifierFilter
;
v
!=
nil
{
set
,
args
=
append
(
set
,
"identifier_filter = ?"
),
append
(
args
,
*
v
)
}
if
v
:=
update
.
Config
;
v
!=
nil
{
var
configBytes
[]
byte
if
update
.
Type
==
IdentityProviderOAuth2
{
configBytes
,
err
=
json
.
Marshal
(
any
(
update
.
Config
)
.
(
*
IdentityProviderOAuth2Config
))
if
err
!=
nil
{
return
nil
,
err
}
}
else
{
return
nil
,
fmt
.
Errorf
(
"unsupported idp type %s"
,
string
(
update
.
Type
))
}
set
,
args
=
append
(
set
,
"config = ?"
),
append
(
args
,
string
(
configBytes
))
}
args
=
append
(
args
,
update
.
ID
)
query
:=
`
UPDATE idp
SET `
+
strings
.
Join
(
set
,
", "
)
+
`
WHERE id = ?
RETURNING id, name, type, identifier_filter, config
`
var
identityProviderMessage
IdentityProviderMessage
var
identityProviderConfig
string
if
err
:=
tx
.
QueryRowContext
(
ctx
,
query
,
args
...
)
.
Scan
(
&
identityProviderMessage
.
ID
,
&
identityProviderMessage
.
Name
,
&
identityProviderMessage
.
Type
,
&
identityProviderMessage
.
IdentifierFilter
,
&
identityProviderConfig
,
);
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
if
identityProviderMessage
.
Type
==
IdentityProviderOAuth2
{
if
err
:=
json
.
Unmarshal
([]
byte
(
identityProviderConfig
),
any
(
identityProviderMessage
.
Config
)
.
(
*
IdentityProviderOAuth2Config
));
err
!=
nil
{
return
nil
,
err
}
}
else
{
return
nil
,
fmt
.
Errorf
(
"unsupported idp type %s"
,
string
(
identityProviderMessage
.
Type
))
}
return
&
identityProviderMessage
,
nil
}
func
(
s
*
Store
)
DeleteIdentityProvider
(
ctx
context
.
Context
,
delete
*
DeleteIdentityProviderMessage
)
error
{
tx
,
err
:=
s
.
db
.
BeginTx
(
ctx
,
nil
)
if
err
!=
nil
{
return
FormatError
(
err
)
}
defer
tx
.
Rollback
()
where
,
args
:=
[]
string
{
"id = ?"
},
[]
interface
{}{
delete
.
ID
}
stmt
:=
`DELETE FROM idp WHERE `
+
strings
.
Join
(
where
,
" AND "
)
result
,
err
:=
tx
.
ExecContext
(
ctx
,
stmt
,
args
...
)
if
err
!=
nil
{
return
FormatError
(
err
)
}
rows
,
err
:=
result
.
RowsAffected
()
if
err
!=
nil
{
return
err
}
if
rows
==
0
{
return
&
common
.
Error
{
Code
:
common
.
NotFound
,
Err
:
fmt
.
Errorf
(
"idp not found"
)}
}
return
nil
}
func
listIdentityProviders
(
ctx
context
.
Context
,
tx
*
sql
.
Tx
,
find
*
FindIdentityProviderMessage
)
([]
*
IdentityProviderMessage
,
error
)
{
where
,
args
:=
[]
string
{
"TRUE"
},
[]
interface
{}{}
if
v
:=
find
.
ID
;
v
!=
nil
{
where
,
args
=
append
(
where
,
fmt
.
Sprintf
(
"id = $%d"
,
len
(
args
)
+
1
)),
append
(
args
,
*
v
)
}
rows
,
err
:=
tx
.
QueryContext
(
ctx
,
`
SELECT
id,
name,
type,
identifier_filter,
config
FROM idp
WHERE `
+
strings
.
Join
(
where
,
" AND "
)
+
` ORDER BY id ASC`
,
args
...
,
)
if
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
defer
rows
.
Close
()
var
identityProviderMessages
[]
*
IdentityProviderMessage
for
rows
.
Next
()
{
var
identityProviderMessage
IdentityProviderMessage
var
identityProviderConfig
string
if
err
:=
rows
.
Scan
(
&
identityProviderMessage
.
ID
,
&
identityProviderMessage
.
Name
,
&
identityProviderMessage
.
Type
,
&
identityProviderMessage
.
IdentifierFilter
,
&
identityProviderConfig
,
);
err
!=
nil
{
return
nil
,
FormatError
(
err
)
}
if
identityProviderMessage
.
Type
==
IdentityProviderOAuth2
{
if
err
:=
json
.
Unmarshal
([]
byte
(
identityProviderConfig
),
any
(
identityProviderMessage
.
Config
)
.
(
*
IdentityProviderOAuth2Config
));
err
!=
nil
{
return
nil
,
err
}
}
else
{
return
nil
,
fmt
.
Errorf
(
"unsupported idp type %s"
,
string
(
identityProviderMessage
.
Type
))
}
identityProviderMessages
=
append
(
identityProviderMessages
,
&
identityProviderMessage
)
}
return
identityProviderMessages
,
nil
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment