id int32 0 167k | repo stringlengths 5 54 | path stringlengths 4 155 | func_name stringlengths 1 118 | original_string stringlengths 52 85.5k | language stringclasses 1
value | code stringlengths 52 85.5k | code_tokens list | docstring stringlengths 6 2.61k | docstring_tokens list | sha stringlengths 40 40 | url stringlengths 85 252 |
|---|---|---|---|---|---|---|---|---|---|---|---|
150,700 | fabric8-services/fabric8-auth | wit/service/wit_service.go | CreateUser | func (s *witServiceImpl) CreateUser(ctx context.Context, identity *account.Identity, identityID string) error {
createUserPayload := &witservice.CreateUserAsServiceAccountUsersPayload{
Data: &witservice.CreateUserData{
Attributes: &witservice.CreateIdentityDataAttributes{
Bio: &identity.User.Bio,
Company: &identity.User.Company,
Email: identity.User.Email,
FullName: &identity.User.FullName,
ImageURL: &identity.User.ImageURL,
URL: &identity.User.URL,
Username: identity.Username,
UserID: identity.User.ID.String(),
ProviderType: identity.ProviderType,
},
Type: "identities",
},
}
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return err
}
remoteCreateUserAPIPath := witservice.CreateUserAsServiceAccountUsersPath(identityID)
res, err := remoteWITService.CreateUserAsServiceAccountUsers(goasupport.ForwardContextRequestID(ctx), remoteCreateUserAPIPath, createUserPayload)
if err != nil {
return err
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
if res.StatusCode != http.StatusOK {
log.Error(ctx, map[string]interface{}{
"identity_id": identityID,
"username": identity.Username,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to create user in WIT")
return errors.Errorf("unable to create user in WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
return nil
} | go | func (s *witServiceImpl) CreateUser(ctx context.Context, identity *account.Identity, identityID string) error {
createUserPayload := &witservice.CreateUserAsServiceAccountUsersPayload{
Data: &witservice.CreateUserData{
Attributes: &witservice.CreateIdentityDataAttributes{
Bio: &identity.User.Bio,
Company: &identity.User.Company,
Email: identity.User.Email,
FullName: &identity.User.FullName,
ImageURL: &identity.User.ImageURL,
URL: &identity.User.URL,
Username: identity.Username,
UserID: identity.User.ID.String(),
ProviderType: identity.ProviderType,
},
Type: "identities",
},
}
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return err
}
remoteCreateUserAPIPath := witservice.CreateUserAsServiceAccountUsersPath(identityID)
res, err := remoteWITService.CreateUserAsServiceAccountUsers(goasupport.ForwardContextRequestID(ctx), remoteCreateUserAPIPath, createUserPayload)
if err != nil {
return err
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
if res.StatusCode != http.StatusOK {
log.Error(ctx, map[string]interface{}{
"identity_id": identityID,
"username": identity.Username,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to create user in WIT")
return errors.Errorf("unable to create user in WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
return nil
} | [
"func",
"(",
"s",
"*",
"witServiceImpl",
")",
"CreateUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"identity",
"*",
"account",
".",
"Identity",
",",
"identityID",
"string",
")",
"error",
"{",
"createUserPayload",
":=",
"&",
"witservice",
".",
"CreateUse... | // CreateUser creates a new user in WIT | [
"CreateUser",
"creates",
"a",
"new",
"user",
"in",
"WIT"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L83-L123 |
150,701 | fabric8-services/fabric8-auth | wit/service/wit_service.go | DeleteUser | func (s *witServiceImpl) DeleteUser(ctx context.Context, username string) error {
log.Info(ctx, map[string]interface{}{"username": username}, "deleting user on WIT service")
// this endpoint is restricted to the `auth` Service Account
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return err
}
deleteUserAPIPath := witservice.DeleteUsersPath(username)
res, err := remoteWITService.DeleteUsers(goasupport.ForwardContextRequestID(ctx), deleteUserAPIPath)
if err != nil {
return err
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
if res.StatusCode != http.StatusOK {
log.Error(ctx, map[string]interface{}{
"username": username,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in WIT")
return errors.Errorf("unable to delete user in WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
return nil
} | go | func (s *witServiceImpl) DeleteUser(ctx context.Context, username string) error {
log.Info(ctx, map[string]interface{}{"username": username}, "deleting user on WIT service")
// this endpoint is restricted to the `auth` Service Account
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return err
}
deleteUserAPIPath := witservice.DeleteUsersPath(username)
res, err := remoteWITService.DeleteUsers(goasupport.ForwardContextRequestID(ctx), deleteUserAPIPath)
if err != nil {
return err
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
if res.StatusCode != http.StatusOK {
log.Error(ctx, map[string]interface{}{
"username": username,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in WIT")
return errors.Errorf("unable to delete user in WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
return nil
} | [
"func",
"(",
"s",
"*",
"witServiceImpl",
")",
"DeleteUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"username",
"string",
")",
"error",
"{",
"log",
".",
"Info",
"(",
"ctx",
",",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"{",
"\"",
"\"",
... | // DeleteUser deletes a user in WIT | [
"DeleteUser",
"deletes",
"a",
"user",
"in",
"WIT"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L126-L149 |
150,702 | fabric8-services/fabric8-auth | wit/service/wit_service.go | GetSpace | func (s *witServiceImpl) GetSpace(ctx context.Context, spaceID string) (space *wit.Space, e error) {
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return nil, err
}
spaceIDUUID, err := uuid.FromString(spaceID)
if err != nil {
return nil, err
}
res, err := remoteWITService.ShowSpace(ctx, witservice.ShowSpacePath(spaceIDUUID), nil, nil)
if err != nil {
return nil, err
}
defer rest.CloseResponse(res)
if res.StatusCode != http.StatusOK {
bodyString := rest.ReadBody(res.Body)
log.Error(ctx, map[string]interface{}{
"spaceId": spaceID,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to get space from WIT")
return nil, errors.Errorf("unable to get space from WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
spaceSingle, err := remoteWITService.DecodeSpaceSingle(res)
if err != nil {
return nil, err
}
return &wit.Space{
ID: *spaceSingle.Data.ID,
Name: *spaceSingle.Data.Attributes.Name,
Description: *spaceSingle.Data.Attributes.Description,
OwnerID: *spaceSingle.Data.Relationships.OwnedBy.Data.ID}, nil
} | go | func (s *witServiceImpl) GetSpace(ctx context.Context, spaceID string) (space *wit.Space, e error) {
remoteWITService, err := s.createClientWithContextSigner(ctx)
if err != nil {
return nil, err
}
spaceIDUUID, err := uuid.FromString(spaceID)
if err != nil {
return nil, err
}
res, err := remoteWITService.ShowSpace(ctx, witservice.ShowSpacePath(spaceIDUUID), nil, nil)
if err != nil {
return nil, err
}
defer rest.CloseResponse(res)
if res.StatusCode != http.StatusOK {
bodyString := rest.ReadBody(res.Body)
log.Error(ctx, map[string]interface{}{
"spaceId": spaceID,
"response_status": res.Status,
"response_body": bodyString,
}, "unable to get space from WIT")
return nil, errors.Errorf("unable to get space from WIT. Response status: %s. Response body: %s", res.Status, bodyString)
}
spaceSingle, err := remoteWITService.DecodeSpaceSingle(res)
if err != nil {
return nil, err
}
return &wit.Space{
ID: *spaceSingle.Data.ID,
Name: *spaceSingle.Data.Attributes.Name,
Description: *spaceSingle.Data.Attributes.Description,
OwnerID: *spaceSingle.Data.Relationships.OwnedBy.Data.ID}, nil
} | [
"func",
"(",
"s",
"*",
"witServiceImpl",
")",
"GetSpace",
"(",
"ctx",
"context",
".",
"Context",
",",
"spaceID",
"string",
")",
"(",
"space",
"*",
"wit",
".",
"Space",
",",
"e",
"error",
")",
"{",
"remoteWITService",
",",
"err",
":=",
"s",
".",
"crea... | // GetSpace talks to the WIT service to retrieve a space record for the specified spaceID, then returns space | [
"GetSpace",
"talks",
"to",
"the",
"WIT",
"service",
"to",
"retrieve",
"a",
"space",
"record",
"for",
"the",
"specified",
"spaceID",
"then",
"returns",
"space"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L152-L189 |
150,703 | fabric8-services/fabric8-auth | che/service/che_service.go | NewCheService | func NewCheService(context servicecontext.ServiceContext, config Configuration) service.CheService {
return &cheServiceImpl{
BaseService: base.NewBaseService(context),
config: config,
}
} | go | func NewCheService(context servicecontext.ServiceContext, config Configuration) service.CheService {
return &cheServiceImpl{
BaseService: base.NewBaseService(context),
config: config,
}
} | [
"func",
"NewCheService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
",",
"config",
"Configuration",
")",
"service",
".",
"CheService",
"{",
"return",
"&",
"cheServiceImpl",
"{",
"BaseService",
":",
"base",
".",
"NewBaseService",
"(",
"context",
")",
... | // NewCheService creates a new Che service. | [
"NewCheService",
"creates",
"a",
"new",
"Che",
"service",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/che/service/che_service.go#L34-L39 |
150,704 | fabric8-services/fabric8-auth | che/service/che_service.go | DeleteUser | func (s *cheServiceImpl) DeleteUser(ctx context.Context, identity repository.Identity) error {
log.Info(ctx, map[string]interface{}{"identity_id": identity.ID.String()}, "deleting user on Che service")
// this endpoint is restricted to the `auth` Service Account
deleteUserAPIURL := fmt.Sprintf("%s/api/user/%s", s.config.GetCheServiceURL(), identity.ID.String())
req, err := http.NewRequest("DELETE", deleteUserAPIURL, nil)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
tokenManager, err := manager.DefaultManager(s.config)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
token, err := tokenManager.GenerateTransientUserAccessTokenForIdentity(ctx, identity)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
_, err = s.Services().TokenService().RegisterToken(ctx, identity.ID, *token, token2.TOKEN_TYPE_ACCESS, nil)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", *token))
res, err := http.DefaultClient.Do(req)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
switch res.StatusCode {
case http.StatusNoContent:
// OK
return nil
case http.StatusNotFound:
// May happen if the user has been already deleted from Che
// Log the error but return OK
log.Warn(ctx, map[string]interface{}{
"identity_id": identity.ID.String(),
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in Che which is OK if user already deleted from Che")
return nil
}
log.Error(ctx, map[string]interface{}{
"identity_id": identity.ID.String(),
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in Che")
return errors.NewInternalErrorFromString(ctx, fmt.Sprintf("unable to delete user '%s' in Che", identity.ID.String()))
} | go | func (s *cheServiceImpl) DeleteUser(ctx context.Context, identity repository.Identity) error {
log.Info(ctx, map[string]interface{}{"identity_id": identity.ID.String()}, "deleting user on Che service")
// this endpoint is restricted to the `auth` Service Account
deleteUserAPIURL := fmt.Sprintf("%s/api/user/%s", s.config.GetCheServiceURL(), identity.ID.String())
req, err := http.NewRequest("DELETE", deleteUserAPIURL, nil)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
tokenManager, err := manager.DefaultManager(s.config)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
token, err := tokenManager.GenerateTransientUserAccessTokenForIdentity(ctx, identity)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
_, err = s.Services().TokenService().RegisterToken(ctx, identity.ID, *token, token2.TOKEN_TYPE_ACCESS, nil)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", *token))
res, err := http.DefaultClient.Do(req)
if err != nil {
return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String())
}
defer rest.CloseResponse(res)
bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks
switch res.StatusCode {
case http.StatusNoContent:
// OK
return nil
case http.StatusNotFound:
// May happen if the user has been already deleted from Che
// Log the error but return OK
log.Warn(ctx, map[string]interface{}{
"identity_id": identity.ID.String(),
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in Che which is OK if user already deleted from Che")
return nil
}
log.Error(ctx, map[string]interface{}{
"identity_id": identity.ID.String(),
"response_status": res.Status,
"response_body": bodyString,
}, "unable to delete user in Che")
return errors.NewInternalErrorFromString(ctx, fmt.Sprintf("unable to delete user '%s' in Che", identity.ID.String()))
} | [
"func",
"(",
"s",
"*",
"cheServiceImpl",
")",
"DeleteUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"identity",
"repository",
".",
"Identity",
")",
"error",
"{",
"log",
".",
"Info",
"(",
"ctx",
",",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",... | // DeleteUser deletes a user in Che | [
"DeleteUser",
"deletes",
"a",
"user",
"in",
"Che"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/che/service/che_service.go#L42-L96 |
150,705 | fabric8-services/fabric8-auth | authorization/permission/service/permission_service.go | NewPermissionService | func NewPermissionService(context servicecontext.ServiceContext) service.PermissionService {
return &permissionServiceImpl{base.NewBaseService(context)}
} | go | func NewPermissionService(context servicecontext.ServiceContext) service.PermissionService {
return &permissionServiceImpl{base.NewBaseService(context)}
} | [
"func",
"NewPermissionService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
")",
"service",
".",
"PermissionService",
"{",
"return",
"&",
"permissionServiceImpl",
"{",
"base",
".",
"NewBaseService",
"(",
"context",
")",
"}",
"\n",
"}"
] | // NewPermissionModelService creates a new service. | [
"NewPermissionModelService",
"creates",
"a",
"new",
"service",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/permission/service/permission_service.go#L21-L23 |
150,706 | fabric8-services/fabric8-auth | authorization/permission/service/permission_service.go | RequireScope | func (s *permissionServiceImpl) RequireScope(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) error {
result, err := s.HasScope(ctx, identityID, resourceID, scopeName)
if err != nil {
return errors.NewInternalError(ctx, err)
}
if !result {
return errors.NewForbiddenError(fmt.Sprintf("identity with ID %s does not have required scope %s for resource %s", identityID.String(), scopeName, resourceID))
}
return nil
} | go | func (s *permissionServiceImpl) RequireScope(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) error {
result, err := s.HasScope(ctx, identityID, resourceID, scopeName)
if err != nil {
return errors.NewInternalError(ctx, err)
}
if !result {
return errors.NewForbiddenError(fmt.Sprintf("identity with ID %s does not have required scope %s for resource %s", identityID.String(), scopeName, resourceID))
}
return nil
} | [
"func",
"(",
"s",
"*",
"permissionServiceImpl",
")",
"RequireScope",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
",",
"resourceID",
"string",
",",
"scopeName",
"string",
")",
"error",
"{",
"result",
",",
"err",
":=",
"s",... | // RequireScope is the same as HasScope, except instead of returning a boolean value it will just return an error if the
// identity does not have the specified scope for the resource | [
"RequireScope",
"is",
"the",
"same",
"as",
"HasScope",
"except",
"instead",
"of",
"returning",
"a",
"boolean",
"value",
"it",
"will",
"just",
"return",
"an",
"error",
"if",
"the",
"identity",
"does",
"not",
"have",
"the",
"specified",
"scope",
"for",
"the",
... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/permission/service/permission_service.go#L44-L55 |
150,707 | fabric8-services/fabric8-auth | authorization/team/service/team_service.go | NewTeamService | func NewTeamService(context servicecontext.ServiceContext) service.TeamService {
return &teamServiceImpl{base.NewBaseService(context)}
} | go | func NewTeamService(context servicecontext.ServiceContext) service.TeamService {
return &teamServiceImpl{base.NewBaseService(context)}
} | [
"func",
"NewTeamService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
")",
"service",
".",
"TeamService",
"{",
"return",
"&",
"teamServiceImpl",
"{",
"base",
".",
"NewBaseService",
"(",
"context",
")",
"}",
"\n",
"}"
] | // NewTeamService creates a new service. | [
"NewTeamService",
"creates",
"a",
"new",
"service",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L26-L28 |
150,708 | fabric8-services/fabric8-auth | authorization/team/service/team_service.go | ListTeamsInSpace | func (s *teamServiceImpl) ListTeamsInSpace(ctx context.Context, identityID uuid.UUID, spaceID string) ([]account.Identity, error) {
// Confirm that the specified spaceID is valid
space, err := s.Repositories().ResourceRepository().Load(ctx, spaceID)
if err != nil {
return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "error loading space from repository")
}
// Confirm that the resource is actually a space
if space.ResourceType.Name != authorization.ResourceTypeSpace {
return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "invalid space ID specified - resource is not a space")
}
// Create the permission service
permService := s.Services().PermissionService()
// Confirm the user has the necessary privileges to list the teams in this space
err = permService.RequireScope(ctx, identityID, spaceID, authorization.ViewTeamsInSpaceScope)
if err != nil {
return nil, err
}
// Lookup the team resource type
resourceType, err := s.Repositories().ResourceTypeRepository().Lookup(ctx, authorization.IdentityResourceTypeTeam)
if err != nil {
return nil, err
}
// Find team identities that have the space as their parent
identities, err := s.Repositories().Identities().FindIdentitiesByResourceTypeWithParentResource(ctx, resourceType.ResourceTypeID, spaceID)
if err != nil {
return nil, err
}
return identities, nil
} | go | func (s *teamServiceImpl) ListTeamsInSpace(ctx context.Context, identityID uuid.UUID, spaceID string) ([]account.Identity, error) {
// Confirm that the specified spaceID is valid
space, err := s.Repositories().ResourceRepository().Load(ctx, spaceID)
if err != nil {
return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "error loading space from repository")
}
// Confirm that the resource is actually a space
if space.ResourceType.Name != authorization.ResourceTypeSpace {
return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "invalid space ID specified - resource is not a space")
}
// Create the permission service
permService := s.Services().PermissionService()
// Confirm the user has the necessary privileges to list the teams in this space
err = permService.RequireScope(ctx, identityID, spaceID, authorization.ViewTeamsInSpaceScope)
if err != nil {
return nil, err
}
// Lookup the team resource type
resourceType, err := s.Repositories().ResourceTypeRepository().Lookup(ctx, authorization.IdentityResourceTypeTeam)
if err != nil {
return nil, err
}
// Find team identities that have the space as their parent
identities, err := s.Repositories().Identities().FindIdentitiesByResourceTypeWithParentResource(ctx, resourceType.ResourceTypeID, spaceID)
if err != nil {
return nil, err
}
return identities, nil
} | [
"func",
"(",
"s",
"*",
"teamServiceImpl",
")",
"ListTeamsInSpace",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
",",
"spaceID",
"string",
")",
"(",
"[",
"]",
"account",
".",
"Identity",
",",
"error",
")",
"{",
"// Confir... | // Returns an array of all team identities within a space | [
"Returns",
"an",
"array",
"of",
"all",
"team",
"identities",
"within",
"a",
"space"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L120-L154 |
150,709 | fabric8-services/fabric8-auth | authorization/team/service/team_service.go | ListTeamsForIdentity | func (s *teamServiceImpl) ListTeamsForIdentity(ctx context.Context, identityID uuid.UUID) ([]authorization.IdentityAssociation, error) {
resourceType := authorization.IdentityResourceTypeTeam
// first find the identity's memberships
memberships, err := s.Repositories().Identities().FindIdentityMemberships(ctx, identityID, &resourceType)
if err != nil {
return nil, err
}
// then find the identity's roles
roles, err := s.Repositories().IdentityRoleRepository().FindIdentityRolesForIdentity(ctx, identityID, &resourceType)
if err != nil {
return nil, err
}
return authorization.MergeAssociations(memberships, roles), nil
} | go | func (s *teamServiceImpl) ListTeamsForIdentity(ctx context.Context, identityID uuid.UUID) ([]authorization.IdentityAssociation, error) {
resourceType := authorization.IdentityResourceTypeTeam
// first find the identity's memberships
memberships, err := s.Repositories().Identities().FindIdentityMemberships(ctx, identityID, &resourceType)
if err != nil {
return nil, err
}
// then find the identity's roles
roles, err := s.Repositories().IdentityRoleRepository().FindIdentityRolesForIdentity(ctx, identityID, &resourceType)
if err != nil {
return nil, err
}
return authorization.MergeAssociations(memberships, roles), nil
} | [
"func",
"(",
"s",
"*",
"teamServiceImpl",
")",
"ListTeamsForIdentity",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"(",
"[",
"]",
"authorization",
".",
"IdentityAssociation",
",",
"error",
")",
"{",
"resourceType",
":=... | // Returns an array of all teams in which the specified identity is a member or is assigned a role | [
"Returns",
"an",
"array",
"of",
"all",
"teams",
"in",
"which",
"the",
"specified",
"identity",
"is",
"a",
"member",
"or",
"is",
"assigned",
"a",
"role"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L157-L175 |
150,710 | fabric8-services/fabric8-auth | authorization/token/repository/external_provider_token.go | DeleteByIdentityID | func (m *GormExternalTokenRepository) DeleteByIdentityID(ctx context.Context, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "deleteByIdentityID"}, time.Now())
result := m.db.Where("identity_id = ?", identityID).Delete(ExternalToken{IdentityID: identityID})
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"identity_id": identityID,
"err": result.Error,
}, "unable to delete external tokens for a given identity")
return errs.WithStack(result.Error)
}
log.Debug(ctx, map[string]interface{}{
"identity_id": identityID,
}, "external tokens deleted!")
return nil
} | go | func (m *GormExternalTokenRepository) DeleteByIdentityID(ctx context.Context, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "deleteByIdentityID"}, time.Now())
result := m.db.Where("identity_id = ?", identityID).Delete(ExternalToken{IdentityID: identityID})
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"identity_id": identityID,
"err": result.Error,
}, "unable to delete external tokens for a given identity")
return errs.WithStack(result.Error)
}
log.Debug(ctx, map[string]interface{}{
"identity_id": identityID,
}, "external tokens deleted!")
return nil
} | [
"func",
"(",
"m",
"*",
"GormExternalTokenRepository",
")",
"DeleteByIdentityID",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"error",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"[",
"]",
"string",
"{",
"\"",
"\""... | // DeleteByIdentityID removes all records associated with a given identity ID | [
"DeleteByIdentityID",
"removes",
"all",
"records",
"associated",
"with",
"a",
"given",
"identity",
"ID"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L168-L182 |
150,711 | fabric8-services/fabric8-auth | authorization/token/repository/external_provider_token.go | LoadByProviderIDAndIdentityID | func (m *GormExternalTokenRepository) LoadByProviderIDAndIdentityID(ctx context.Context, providerID uuid.UUID, identityID uuid.UUID) ([]ExternalToken, error) {
defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "LoadByProviderIDAndIdentityID"}, time.Now())
var externalProviderTokens []ExternalToken
externalProviderTokens, err := m.Query(ExternalTokenFilterByIdentityID(identityID), ExternalTokenFilterByProviderID(providerID), ExternalTokenWithIdentity())
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return externalProviderTokens, nil
} | go | func (m *GormExternalTokenRepository) LoadByProviderIDAndIdentityID(ctx context.Context, providerID uuid.UUID, identityID uuid.UUID) ([]ExternalToken, error) {
defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "LoadByProviderIDAndIdentityID"}, time.Now())
var externalProviderTokens []ExternalToken
externalProviderTokens, err := m.Query(ExternalTokenFilterByIdentityID(identityID), ExternalTokenFilterByProviderID(providerID), ExternalTokenWithIdentity())
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return externalProviderTokens, nil
} | [
"func",
"(",
"m",
"*",
"GormExternalTokenRepository",
")",
"LoadByProviderIDAndIdentityID",
"(",
"ctx",
"context",
".",
"Context",
",",
"providerID",
"uuid",
".",
"UUID",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"(",
"[",
"]",
"ExternalToken",
",",
"error"... | // LoadByProviderIDAndIdentityID loads tokens by IdentityID and ProviderID | [
"LoadByProviderIDAndIdentityID",
"loads",
"tokens",
"by",
"IdentityID",
"and",
"ProviderID"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L201-L209 |
150,712 | fabric8-services/fabric8-auth | authorization/token/repository/external_provider_token.go | ExternalTokenFilterByIdentityID | func ExternalTokenFilterByIdentityID(identityID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("identity_id = ?", identityID)
}
} | go | func ExternalTokenFilterByIdentityID(identityID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("identity_id = ?", identityID)
}
} | [
"func",
"ExternalTokenFilterByIdentityID",
"(",
"identityID",
"uuid",
".",
"UUID",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"... | // ExternalTokenFilterByIdentityID is a gorm filter for a Belongs To relationship. | [
"ExternalTokenFilterByIdentityID",
"is",
"a",
"gorm",
"filter",
"for",
"a",
"Belongs",
"To",
"relationship",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L212-L216 |
150,713 | fabric8-services/fabric8-auth | authorization/token/repository/external_provider_token.go | ExternalTokenFilterByProviderID | func ExternalTokenFilterByProviderID(providerID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("provider_id = ?", providerID)
}
} | go | func ExternalTokenFilterByProviderID(providerID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("provider_id = ?", providerID)
}
} | [
"func",
"ExternalTokenFilterByProviderID",
"(",
"providerID",
"uuid",
".",
"UUID",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"... | // ExternalTokenFilterByProviderID is a gorm filter by 'external_provider_type' | [
"ExternalTokenFilterByProviderID",
"is",
"a",
"gorm",
"filter",
"by",
"external_provider_type"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L219-L223 |
150,714 | fabric8-services/fabric8-auth | authorization/token/repository/external_provider_token.go | ExternalTokenWithIdentity | func ExternalTokenWithIdentity() func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Preload("Identity")
}
} | go | func ExternalTokenWithIdentity() func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Preload("Identity")
}
} | [
"func",
"ExternalTokenWithIdentity",
"(",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"db",
".",
"Preload",
"("... | // ExternalTokenWithIdentity is a gorm filter for preloading the identity relationship. | [
"ExternalTokenWithIdentity",
"is",
"a",
"gorm",
"filter",
"for",
"preloading",
"the",
"identity",
"relationship",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L226-L230 |
150,715 | fabric8-services/fabric8-auth | controller/token.go | NewTokenController | func NewTokenController(service *goa.Service, app application.Application, tokenManager manager.TokenManager,
configuration TokenControllerConfiguration) *TokenController {
return &TokenController{
Controller: service.NewController("token"),
TokenManager: tokenManager,
Configuration: configuration,
app: app,
}
} | go | func NewTokenController(service *goa.Service, app application.Application, tokenManager manager.TokenManager,
configuration TokenControllerConfiguration) *TokenController {
return &TokenController{
Controller: service.NewController("token"),
TokenManager: tokenManager,
Configuration: configuration,
app: app,
}
} | [
"func",
"NewTokenController",
"(",
"service",
"*",
"goa",
".",
"Service",
",",
"app",
"application",
".",
"Application",
",",
"tokenManager",
"manager",
".",
"TokenManager",
",",
"configuration",
"TokenControllerConfiguration",
")",
"*",
"TokenController",
"{",
"ret... | // NewTokenController creates a token controller. | [
"NewTokenController",
"creates",
"a",
"token",
"controller",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L46-L54 |
150,716 | fabric8-services/fabric8-auth | controller/token.go | Keys | func (c *TokenController) Keys(ctx *app.KeysTokenContext) error {
var publicKeys token.JSONKeys
if ctx.Format != nil && *ctx.Format == "pem" {
publicKeys = c.TokenManager.PemKeys()
} else {
publicKeys = c.TokenManager.JSONWebKeys()
}
return ctx.OK(&app.PublicKeys{Keys: publicKeys.Keys})
} | go | func (c *TokenController) Keys(ctx *app.KeysTokenContext) error {
var publicKeys token.JSONKeys
if ctx.Format != nil && *ctx.Format == "pem" {
publicKeys = c.TokenManager.PemKeys()
} else {
publicKeys = c.TokenManager.JSONWebKeys()
}
return ctx.OK(&app.PublicKeys{Keys: publicKeys.Keys})
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Keys",
"(",
"ctx",
"*",
"app",
".",
"KeysTokenContext",
")",
"error",
"{",
"var",
"publicKeys",
"token",
".",
"JSONKeys",
"\n",
"if",
"ctx",
".",
"Format",
"!=",
"nil",
"&&",
"*",
"ctx",
".",
"Format",
... | // Keys returns public keys which should be used to verify tokens | [
"Keys",
"returns",
"public",
"keys",
"which",
"should",
"be",
"used",
"to",
"verify",
"tokens"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L57-L66 |
150,717 | fabric8-services/fabric8-auth | controller/token.go | Refresh | func (c *TokenController) Refresh(ctx *app.RefreshTokenContext) error {
// retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here)
accessToken := goajwt.ContextJWT(ctx)
refreshToken := ctx.Payload.RefreshToken
if refreshToken == nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("refresh_token", nil).Expected("not nil"))
}
var t *manager.TokenSet
var err error
if accessToken != nil {
t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, accessToken.Raw)
} else {
t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, "")
}
if err != nil {
c.TokenManager.AddLoginRequiredHeaderToUnauthorizedError(err, ctx.ResponseData)
return jsonapi.JSONErrorResponse(ctx, err)
}
ctx.ResponseData.Header().Set("Cache-Control", "no-cache")
return ctx.OK(convertToken(*t))
} | go | func (c *TokenController) Refresh(ctx *app.RefreshTokenContext) error {
// retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here)
accessToken := goajwt.ContextJWT(ctx)
refreshToken := ctx.Payload.RefreshToken
if refreshToken == nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("refresh_token", nil).Expected("not nil"))
}
var t *manager.TokenSet
var err error
if accessToken != nil {
t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, accessToken.Raw)
} else {
t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, "")
}
if err != nil {
c.TokenManager.AddLoginRequiredHeaderToUnauthorizedError(err, ctx.ResponseData)
return jsonapi.JSONErrorResponse(ctx, err)
}
ctx.ResponseData.Header().Set("Cache-Control", "no-cache")
return ctx.OK(convertToken(*t))
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Refresh",
"(",
"ctx",
"*",
"app",
".",
"RefreshTokenContext",
")",
"error",
"{",
"// retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here)",
"accessToken",
":=",... | // Refresh obtains a new access token using the refresh token. | [
"Refresh",
"obtains",
"a",
"new",
"access",
"token",
"using",
"the",
"refresh",
"token",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L69-L89 |
150,718 | fabric8-services/fabric8-auth | controller/token.go | Retrieve | func (c *TokenController) Retrieve(ctx *app.RetrieveTokenContext) error {
appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull)
if errorResponse != nil {
ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate")
ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse)
}
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "failed to retrieve token")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(appToken)
} | go | func (c *TokenController) Retrieve(ctx *app.RetrieveTokenContext) error {
appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull)
if errorResponse != nil {
ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate")
ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse)
}
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "failed to retrieve token")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(appToken)
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Retrieve",
"(",
"ctx",
"*",
"app",
".",
"RetrieveTokenContext",
")",
"error",
"{",
"appToken",
",",
"errorResponse",
",",
"err",
":=",
"c",
".",
"app",
".",
"TokenService",
"(",
")",
".",
"RetrieveExternalTok... | // Retrieve fetches the stored external provider token. | [
"Retrieve",
"fetches",
"the",
"stored",
"external",
"provider",
"token",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L103-L116 |
150,719 | fabric8-services/fabric8-auth | controller/token.go | Status | func (c *TokenController) Status(ctx *app.StatusTokenContext) error {
appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull)
if errorResponse != nil {
ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate")
ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse)
}
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "failed to check token status")
return jsonapi.JSONErrorResponse(ctx, err)
}
tokenStatus := &app.ExternalTokenStatus{
Username: appToken.Username,
ProviderAPIURL: appToken.ProviderAPIURL,
}
return ctx.OK(tokenStatus)
} | go | func (c *TokenController) Status(ctx *app.StatusTokenContext) error {
appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull)
if errorResponse != nil {
ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate")
ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse)
}
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "failed to check token status")
return jsonapi.JSONErrorResponse(ctx, err)
}
tokenStatus := &app.ExternalTokenStatus{
Username: appToken.Username,
ProviderAPIURL: appToken.ProviderAPIURL,
}
return ctx.OK(tokenStatus)
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Status",
"(",
"ctx",
"*",
"app",
".",
"StatusTokenContext",
")",
"error",
"{",
"appToken",
",",
"errorResponse",
",",
"err",
":=",
"c",
".",
"app",
".",
"TokenService",
"(",
")",
".",
"RetrieveExternalToken",... | // Status checks if the stored external provider token is available. | [
"Status",
"checks",
"if",
"the",
"stored",
"external",
"provider",
"token",
"is",
"available",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L119-L137 |
150,720 | fabric8-services/fabric8-auth | controller/token.go | Delete | func (c *TokenController) Delete(ctx *app.DeleteTokenContext) error {
currentIdentity, err := manager.ContextIdentity(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
if ctx.For == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL"))
}
err = c.app.TokenService().DeleteExternalToken(ctx, *currentIdentity, rest.AbsoluteURL(ctx.RequestData, "", nil), ctx.For)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK([]byte{})
} | go | func (c *TokenController) Delete(ctx *app.DeleteTokenContext) error {
currentIdentity, err := manager.ContextIdentity(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
if ctx.For == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL"))
}
err = c.app.TokenService().DeleteExternalToken(ctx, *currentIdentity, rest.AbsoluteURL(ctx.RequestData, "", nil), ctx.For)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK([]byte{})
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Delete",
"(",
"ctx",
"*",
"app",
".",
"DeleteTokenContext",
")",
"error",
"{",
"currentIdentity",
",",
"err",
":=",
"manager",
".",
"ContextIdentity",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
... | // Delete deletes the stored external provider token. | [
"Delete",
"deletes",
"the",
"stored",
"external",
"provider",
"token",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L140-L155 |
150,721 | fabric8-services/fabric8-auth | controller/token.go | Link | func (c *TokenController) Link(ctx *app.LinkTokenContext) error {
if ctx.For == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL"))
}
currentIdentity, err := c.app.UserService().ContextIdentityIfExists(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
var redirectURL string
if ctx.Redirect == nil {
redirectURL = ctx.RequestData.Header.Get("Referer")
if redirectURL == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("redirect", "empty").Expected("redirect param or Referer header should be specified"))
}
} else {
redirectURL = *ctx.Redirect
}
redirectLocation, err := c.app.LinkService().ProviderLocation(ctx, ctx.RequestData, currentIdentity.String(), ctx.For, redirectURL)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
locationPayload := &app.RedirectLocation{RedirectLocation: redirectLocation}
return ctx.OK(locationPayload)
} | go | func (c *TokenController) Link(ctx *app.LinkTokenContext) error {
if ctx.For == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL"))
}
currentIdentity, err := c.app.UserService().ContextIdentityIfExists(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
var redirectURL string
if ctx.Redirect == nil {
redirectURL = ctx.RequestData.Header.Get("Referer")
if redirectURL == "" {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("redirect", "empty").Expected("redirect param or Referer header should be specified"))
}
} else {
redirectURL = *ctx.Redirect
}
redirectLocation, err := c.app.LinkService().ProviderLocation(ctx, ctx.RequestData, currentIdentity.String(), ctx.For, redirectURL)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
locationPayload := &app.RedirectLocation{RedirectLocation: redirectLocation}
return ctx.OK(locationPayload)
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"Link",
"(",
"ctx",
"*",
"app",
".",
"LinkTokenContext",
")",
"error",
"{",
"if",
"ctx",
".",
"For",
"==",
"\"",
"\"",
"{",
"return",
"jsonapi",
".",
"JSONErrorResponse",
"(",
"ctx",
",",
"errors",
".",
... | // Link links the user account to an external resource provider such as GitHub | [
"Link",
"links",
"the",
"user",
"account",
"to",
"an",
"external",
"resource",
"provider",
"such",
"as",
"GitHub"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L307-L333 |
150,722 | fabric8-services/fabric8-auth | controller/token.go | LinkCallback | func (c *TokenController) LinkCallback(ctx *app.LinkCallbackTokenContext) error {
redirectLocation, err := c.app.LinkService().Callback(ctx, ctx.RequestData, ctx.State, ctx.Code)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
ctx.ResponseData.Header().Set("Location", redirectLocation)
return ctx.TemporaryRedirect()
} | go | func (c *TokenController) LinkCallback(ctx *app.LinkCallbackTokenContext) error {
redirectLocation, err := c.app.LinkService().Callback(ctx, ctx.RequestData, ctx.State, ctx.Code)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
ctx.ResponseData.Header().Set("Location", redirectLocation)
return ctx.TemporaryRedirect()
} | [
"func",
"(",
"c",
"*",
"TokenController",
")",
"LinkCallback",
"(",
"ctx",
"*",
"app",
".",
"LinkCallbackTokenContext",
")",
"error",
"{",
"redirectLocation",
",",
"err",
":=",
"c",
".",
"app",
".",
"LinkService",
"(",
")",
".",
"Callback",
"(",
"ctx",
"... | // LinkCallback is called by an external oauth2 resource provider such as GitHub as part of user's account linking flow | [
"LinkCallback",
"is",
"called",
"by",
"an",
"external",
"oauth2",
"resource",
"provider",
"such",
"as",
"GitHub",
"as",
"part",
"of",
"user",
"s",
"account",
"linking",
"flow"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L336-L343 |
150,723 | fabric8-services/fabric8-auth | authentication/provider/factory/linking_provider_factory.go | NewLinkingProviderFactory | func NewLinkingProviderFactory(context servicecontext.ServiceContext, config provider.LinkingProviderConfiguration) service.LinkingProviderFactory {
factory := &linkingProviderFactoryImpl{
BaseService: base.NewBaseService(context),
config: config,
}
return factory
} | go | func NewLinkingProviderFactory(context servicecontext.ServiceContext, config provider.LinkingProviderConfiguration) service.LinkingProviderFactory {
factory := &linkingProviderFactoryImpl{
BaseService: base.NewBaseService(context),
config: config,
}
return factory
} | [
"func",
"NewLinkingProviderFactory",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
",",
"config",
"provider",
".",
"LinkingProviderConfiguration",
")",
"service",
".",
"LinkingProviderFactory",
"{",
"factory",
":=",
"&",
"linkingProviderFactoryImpl",
"{",
"Base... | // NewLinkingProviderFactory returns the default Linking provider factory. | [
"NewLinkingProviderFactory",
"returns",
"the",
"default",
"Linking",
"provider",
"factory",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/factory/linking_provider_factory.go#L20-L26 |
150,724 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | LoadWithUser | func (m *GormIdentityRepository) LoadWithUser(ctx context.Context, id uuid.UUID) (*Identity, error) {
identities, err := m.Query(IdentityFilterByID(id), IdentityWithUser())
if err != nil {
return nil, err
}
if len(identities) == 0 {
return nil, errs.WithStack(errors.NewNotFoundError("identity", id.String()))
}
if identities[0].User.ID == uuid.Nil {
return nil, errs.WithStack(errors.NewNotFoundError("user for identity", id.String()))
}
return &identities[0], nil
} | go | func (m *GormIdentityRepository) LoadWithUser(ctx context.Context, id uuid.UUID) (*Identity, error) {
identities, err := m.Query(IdentityFilterByID(id), IdentityWithUser())
if err != nil {
return nil, err
}
if len(identities) == 0 {
return nil, errs.WithStack(errors.NewNotFoundError("identity", id.String()))
}
if identities[0].User.ID == uuid.Nil {
return nil, errs.WithStack(errors.NewNotFoundError("user for identity", id.String()))
}
return &identities[0], nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRepository",
")",
"LoadWithUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"uuid",
".",
"UUID",
")",
"(",
"*",
"Identity",
",",
"error",
")",
"{",
"identities",
",",
"err",
":=",
"m",
".",
"Query",
"(",
"I... | // LoadWithUser loads an identity and the associated User
// Returns NotFoundError if either identity or user is not found | [
"LoadWithUser",
"loads",
"an",
"identity",
"and",
"the",
"associated",
"User",
"Returns",
"NotFoundError",
"if",
"either",
"identity",
"or",
"user",
"is",
"not",
"found"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L184-L196 |
150,725 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | Delete | func (m *GormIdentityRepository) Delete(ctx context.Context, id uuid.UUID, funcs ...func(*gorm.DB) *gorm.DB) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "delete"}, time.Now())
obj := Identity{ID: id}
result := m.db.Scopes(funcs...).Delete(obj)
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"identity_id": id,
"err": result.Error,
}, "unable to delete the identity")
return errs.WithStack(result.Error)
}
if result.RowsAffected == 0 {
return errors.NewNotFoundError("identity", id.String())
}
log.Debug(ctx, map[string]interface{}{
"identity_id": id,
}, "Identity deleted!")
return nil
} | go | func (m *GormIdentityRepository) Delete(ctx context.Context, id uuid.UUID, funcs ...func(*gorm.DB) *gorm.DB) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "delete"}, time.Now())
obj := Identity{ID: id}
result := m.db.Scopes(funcs...).Delete(obj)
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"identity_id": id,
"err": result.Error,
}, "unable to delete the identity")
return errs.WithStack(result.Error)
}
if result.RowsAffected == 0 {
return errors.NewNotFoundError("identity", id.String())
}
log.Debug(ctx, map[string]interface{}{
"identity_id": id,
}, "Identity deleted!")
return nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRepository",
")",
"Delete",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"uuid",
".",
"UUID",
",",
"funcs",
"...",
"func",
"(",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
")",
"error",
"{",
"defer"... | // Delete removes a single record. argument funcs can be used to add conditions dynamically to current database connection | [
"Delete",
"removes",
"a",
"single",
"record",
".",
"argument",
"funcs",
"can",
"be",
"used",
"to",
"add",
"conditions",
"dynamically",
"to",
"current",
"database",
"connection"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L269-L291 |
150,726 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | IdentityFilterByUsername | func IdentityFilterByUsername(username string) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("username = ?", username).Limit(1)
}
} | go | func IdentityFilterByUsername(username string) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("username = ?", username).Limit(1)
}
} | [
"func",
"IdentityFilterByUsername",
"(",
"username",
"string",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"db",
... | // IdentityFilterByUsername is a gorm filter by 'username' | [
"IdentityFilterByUsername",
"is",
"a",
"gorm",
"filter",
"by",
"username"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L347-L351 |
150,727 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | FindIdentitiesByResourceTypeWithParentResource | func (m *GormIdentityRepository) FindIdentitiesByResourceTypeWithParentResource(ctx context.Context, resourceTypeID uuid.UUID, parentResourceID string) ([]Identity, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity", "FindIdentitiesByResourceTypeWithParentResource"}, time.Now())
var identities []Identity
err := m.db.Table(m.TableName()).Preload("IdentityResource").
Joins("JOIN resource r ON r.resource_id = identities.identity_resource_id AND r.resource_type_id = ? AND r.parent_resource_id = ?", resourceTypeID, parentResourceID).
Find(&identities).Error
if err != nil {
return nil, err
}
return identities, nil
} | go | func (m *GormIdentityRepository) FindIdentitiesByResourceTypeWithParentResource(ctx context.Context, resourceTypeID uuid.UUID, parentResourceID string) ([]Identity, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity", "FindIdentitiesByResourceTypeWithParentResource"}, time.Now())
var identities []Identity
err := m.db.Table(m.TableName()).Preload("IdentityResource").
Joins("JOIN resource r ON r.resource_id = identities.identity_resource_id AND r.resource_type_id = ? AND r.parent_resource_id = ?", resourceTypeID, parentResourceID).
Find(&identities).Error
if err != nil {
return nil, err
}
return identities, nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRepository",
")",
"FindIdentitiesByResourceTypeWithParentResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceTypeID",
"uuid",
".",
"UUID",
",",
"parentResourceID",
"string",
")",
"(",
"[",
"]",
"Identity",
",",
"erro... | // FindIdentitiesWithParentResource returns an array of Identity objects for which their corresponding resource is a child of the specified parent resource | [
"FindIdentitiesWithParentResource",
"returns",
"an",
"array",
"of",
"Identity",
"objects",
"for",
"which",
"their",
"corresponding",
"resource",
"is",
"a",
"child",
"of",
"the",
"specified",
"parent",
"resource"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L581-L595 |
150,728 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | RemoveMember | func (m *GormIdentityRepository) RemoveMember(ctx context.Context, memberOf uuid.UUID, memberID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "RemoveMember"}, time.Now())
membership := &Membership{
MemberOf: memberOf,
MemberID: memberID,
}
err := m.db.Delete(membership).Error
if err != nil {
log.Error(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
"err": err,
}, "unable to remove the membership")
return errs.WithStack(err)
}
err = m.FlagPrivilegeCacheStaleForMembershipChange(ctx, memberID, memberOf)
if err != nil {
log.Error(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
"err": err,
}, "unable to remove the membership - error notifying privilege cache")
return errs.WithStack(err)
}
log.Info(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
}, "Membership removed!")
return nil
} | go | func (m *GormIdentityRepository) RemoveMember(ctx context.Context, memberOf uuid.UUID, memberID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "RemoveMember"}, time.Now())
membership := &Membership{
MemberOf: memberOf,
MemberID: memberID,
}
err := m.db.Delete(membership).Error
if err != nil {
log.Error(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
"err": err,
}, "unable to remove the membership")
return errs.WithStack(err)
}
err = m.FlagPrivilegeCacheStaleForMembershipChange(ctx, memberID, memberOf)
if err != nil {
log.Error(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
"err": err,
}, "unable to remove the membership - error notifying privilege cache")
return errs.WithStack(err)
}
log.Info(ctx, map[string]interface{}{
"member_of": memberOf,
"member_id": memberID,
}, "Membership removed!")
return nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRepository",
")",
"RemoveMember",
"(",
"ctx",
"context",
".",
"Context",
",",
"memberOf",
"uuid",
".",
"UUID",
",",
"memberID",
"uuid",
".",
"UUID",
")",
"error",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"[",
"]"... | // RemoveMember removes an existing membership with the specified memberOf and memberID values | [
"RemoveMember",
"removes",
"an",
"existing",
"membership",
"with",
"the",
"specified",
"memberOf",
"and",
"memberID",
"values"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L654-L688 |
150,729 | fabric8-services/fabric8-auth | authentication/account/repository/identity.go | TouchLastActive | func (m *GormIdentityRepository) TouchLastActive(ctx context.Context, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "TouchLastActive"}, time.Now())
err := m.db.Exec("UPDATE identities SET last_active = ?, deactivation_notification = NULL, deactivation_scheduled = NULL WHERE id = ?", time.Now(), identityID).Error
if err != nil {
log.Error(ctx, map[string]interface{}{
"id": identityID,
"err": err,
}, "unable to update last active time")
return errs.WithStack(err)
}
return nil
} | go | func (m *GormIdentityRepository) TouchLastActive(ctx context.Context, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity", "TouchLastActive"}, time.Now())
err := m.db.Exec("UPDATE identities SET last_active = ?, deactivation_notification = NULL, deactivation_scheduled = NULL WHERE id = ?", time.Now(), identityID).Error
if err != nil {
log.Error(ctx, map[string]interface{}{
"id": identityID,
"err": err,
}, "unable to update last active time")
return errs.WithStack(err)
}
return nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRepository",
")",
"TouchLastActive",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"error",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",... | // TouchLastActive is intended to be a lightweight method that updates the last active column for a specified identity
// to the current timestamp. Also, it resets the `deactivation_notification` timestamp so we can send another deactivation
// notification to the user if she is once again inactive in the future. | [
"TouchLastActive",
"is",
"intended",
"to",
"be",
"a",
"lightweight",
"method",
"that",
"updates",
"the",
"last",
"active",
"column",
"for",
"a",
"specified",
"identity",
"to",
"the",
"current",
"timestamp",
".",
"Also",
"it",
"resets",
"the",
"deactivation_notif... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L895-L908 |
150,730 | fabric8-services/fabric8-auth | notification/service/notification.go | NewNotificationService | func NewNotificationService(context servicecontext.ServiceContext, config notification.Configuration) service.NotificationService {
return ¬ificationServiceImpl{
BaseService: base.NewBaseService(context),
config: config,
}
} | go | func NewNotificationService(context servicecontext.ServiceContext, config notification.Configuration) service.NotificationService {
return ¬ificationServiceImpl{
BaseService: base.NewBaseService(context),
config: config,
}
} | [
"func",
"NewNotificationService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
",",
"config",
"notification",
".",
"Configuration",
")",
"service",
".",
"NotificationService",
"{",
"return",
"&",
"notificationServiceImpl",
"{",
"BaseService",
":",
"base",
... | // NewNotificationService creates a new service. | [
"NewNotificationService",
"creates",
"a",
"new",
"service",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/service/notification.go#L31-L36 |
150,731 | fabric8-services/fabric8-auth | authorization/space/service/space_service.go | NewSpaceService | func NewSpaceService(context servicecontext.ServiceContext) service.SpaceService {
return &spaceService{base.NewBaseService(context)}
} | go | func NewSpaceService(context servicecontext.ServiceContext) service.SpaceService {
return &spaceService{base.NewBaseService(context)}
} | [
"func",
"NewSpaceService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
")",
"service",
".",
"SpaceService",
"{",
"return",
"&",
"spaceService",
"{",
"base",
".",
"NewBaseService",
"(",
"context",
")",
"}",
"\n",
"}"
] | // NewSpaceService creates a new space service. | [
"NewSpaceService",
"creates",
"a",
"new",
"space",
"service",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/space/service/space_service.go#L21-L23 |
150,732 | fabric8-services/fabric8-auth | gormapplication/application.go | BeginTransaction | func (g *GormDB) BeginTransaction() (transaction.Transaction, error) {
tx := g.db.Begin()
if tx.Error != nil {
return nil, tx.Error
}
if len(g.txIsoLevel) != 0 {
tx := tx.Exec(fmt.Sprintf("set transaction isolation level %s", g.txIsoLevel))
if tx.Error != nil {
return nil, tx.Error
}
return &GormTransaction{GormBase{tx}}, nil
}
return &GormTransaction{GormBase{tx}}, nil
} | go | func (g *GormDB) BeginTransaction() (transaction.Transaction, error) {
tx := g.db.Begin()
if tx.Error != nil {
return nil, tx.Error
}
if len(g.txIsoLevel) != 0 {
tx := tx.Exec(fmt.Sprintf("set transaction isolation level %s", g.txIsoLevel))
if tx.Error != nil {
return nil, tx.Error
}
return &GormTransaction{GormBase{tx}}, nil
}
return &GormTransaction{GormBase{tx}}, nil
} | [
"func",
"(",
"g",
"*",
"GormDB",
")",
"BeginTransaction",
"(",
")",
"(",
"transaction",
".",
"Transaction",
",",
"error",
")",
"{",
"tx",
":=",
"g",
".",
"db",
".",
"Begin",
"(",
")",
"\n",
"if",
"tx",
".",
"Error",
"!=",
"nil",
"{",
"return",
"n... | // BeginTransaction initiates a new transaction | [
"BeginTransaction",
"initiates",
"a",
"new",
"transaction"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/gormapplication/application.go#L276-L289 |
150,733 | fabric8-services/fabric8-auth | authentication/provider/oauth2.go | UserProfilePayload | func (provider *DefaultIdentityProvider) UserProfilePayload(ctx context.Context, token oauth2.Token) ([]byte, error) {
req, err := http.NewRequest("GET", provider.ProfileURL, nil)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to create http request")
return nil, err
}
req.Header.Add("Authorization", "Bearer "+token.AccessToken)
res, err := http.DefaultClient.Do(req)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to get user profile")
return nil, err
}
defer rest.CloseResponse(res)
body, err := ioutil.ReadAll(res.Body)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to read user profile payload")
return body, err
}
if res.StatusCode < 200 || res.StatusCode > 299 {
log.Error(ctx, map[string]interface{}{
"status": res.Status,
"response_body": string(body),
"profile_url": provider.ProfileURL,
}, "unable to get user profile")
return nil, errors.NewInternalErrorFromString(ctx, "unable to get user profile")
}
return body, nil
} | go | func (provider *DefaultIdentityProvider) UserProfilePayload(ctx context.Context, token oauth2.Token) ([]byte, error) {
req, err := http.NewRequest("GET", provider.ProfileURL, nil)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to create http request")
return nil, err
}
req.Header.Add("Authorization", "Bearer "+token.AccessToken)
res, err := http.DefaultClient.Do(req)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to get user profile")
return nil, err
}
defer rest.CloseResponse(res)
body, err := ioutil.ReadAll(res.Body)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err.Error(),
"profile_url": provider.ProfileURL,
}, "unable to read user profile payload")
return body, err
}
if res.StatusCode < 200 || res.StatusCode > 299 {
log.Error(ctx, map[string]interface{}{
"status": res.Status,
"response_body": string(body),
"profile_url": provider.ProfileURL,
}, "unable to get user profile")
return nil, errors.NewInternalErrorFromString(ctx, "unable to get user profile")
}
return body, nil
} | [
"func",
"(",
"provider",
"*",
"DefaultIdentityProvider",
")",
"UserProfilePayload",
"(",
"ctx",
"context",
".",
"Context",
",",
"token",
"oauth2",
".",
"Token",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"req",
",",
"err",
":=",
"http",
".",
"... | // UserProfilePayload fetches user profile payload from Identity Provider. It is used by the Profile function to do
// the actual work of talking to the identity provider | [
"UserProfilePayload",
"fetches",
"user",
"profile",
"payload",
"from",
"Identity",
"Provider",
".",
"It",
"is",
"used",
"by",
"the",
"Profile",
"function",
"to",
"do",
"the",
"actual",
"work",
"of",
"talking",
"to",
"the",
"identity",
"provider"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/oauth2.go#L156-L192 |
150,734 | fabric8-services/fabric8-auth | goasupport/forward_signer.go | Sign | func (f JWTSigner) Sign(request *http.Request) error {
request.Header.Set("Authorization", "Bearer "+f.Token)
return nil
} | go | func (f JWTSigner) Sign(request *http.Request) error {
request.Header.Set("Authorization", "Bearer "+f.Token)
return nil
} | [
"func",
"(",
"f",
"JWTSigner",
")",
"Sign",
"(",
"request",
"*",
"http",
".",
"Request",
")",
"error",
"{",
"request",
".",
"Header",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"f",
".",
"Token",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // Sign sets the Auth header | [
"Sign",
"sets",
"the",
"Auth",
"header"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/goasupport/forward_signer.go#L17-L20 |
150,735 | fabric8-services/fabric8-auth | goasupport/forward_signer.go | NewForwardSigner | func NewForwardSigner(ctx context.Context) goaclient.Signer {
return &JWTSigner{Token: goajwt.ContextJWT(ctx).Raw}
} | go | func NewForwardSigner(ctx context.Context) goaclient.Signer {
return &JWTSigner{Token: goajwt.ContextJWT(ctx).Raw}
} | [
"func",
"NewForwardSigner",
"(",
"ctx",
"context",
".",
"Context",
")",
"goaclient",
".",
"Signer",
"{",
"return",
"&",
"JWTSigner",
"{",
"Token",
":",
"goajwt",
".",
"ContextJWT",
"(",
"ctx",
")",
".",
"Raw",
"}",
"\n",
"}"
] | // NewForwardSigner returns a new signer which uses the token from the context
// If the caller context is used then the token from this context will be extracted and forwarded to the target Request | [
"NewForwardSigner",
"returns",
"a",
"new",
"signer",
"which",
"uses",
"the",
"token",
"from",
"the",
"context",
"If",
"the",
"caller",
"context",
"is",
"used",
"then",
"the",
"token",
"from",
"this",
"context",
"will",
"be",
"extracted",
"and",
"forwarded",
... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/goasupport/forward_signer.go#L24-L26 |
150,736 | fabric8-services/fabric8-auth | application/repository/base/exister.go | exists | func exists(ctx context.Context, db *gorm.DB, tableName, idColumnName, id string, softDeletable bool) (bool, error) {
var exists bool
var query string
if softDeletable {
query = fmt.Sprintf(`
SELECT EXISTS (
SELECT 1 FROM %[1]s
WHERE
%[2]s=$1
AND deleted_at IS NULL
)`, tableName, idColumnName)
} else {
query = fmt.Sprintf(`
SELECT EXISTS (
SELECT 1 FROM %[1]s
WHERE
%[2]s=$1
)`, tableName, idColumnName)
}
err := db.CommonDB().QueryRow(query, id).Scan(&exists)
if err == nil && !exists {
return exists, errors.NewNotFoundError(tableName, id)
}
if err != nil {
return false, errors.NewInternalError(ctx, errs.Wrapf(err, "unable to verify if %s exists", tableName))
}
return exists, nil
} | go | func exists(ctx context.Context, db *gorm.DB, tableName, idColumnName, id string, softDeletable bool) (bool, error) {
var exists bool
var query string
if softDeletable {
query = fmt.Sprintf(`
SELECT EXISTS (
SELECT 1 FROM %[1]s
WHERE
%[2]s=$1
AND deleted_at IS NULL
)`, tableName, idColumnName)
} else {
query = fmt.Sprintf(`
SELECT EXISTS (
SELECT 1 FROM %[1]s
WHERE
%[2]s=$1
)`, tableName, idColumnName)
}
err := db.CommonDB().QueryRow(query, id).Scan(&exists)
if err == nil && !exists {
return exists, errors.NewNotFoundError(tableName, id)
}
if err != nil {
return false, errors.NewInternalError(ctx, errs.Wrapf(err, "unable to verify if %s exists", tableName))
}
return exists, nil
} | [
"func",
"exists",
"(",
"ctx",
"context",
".",
"Context",
",",
"db",
"*",
"gorm",
".",
"DB",
",",
"tableName",
",",
"idColumnName",
",",
"id",
"string",
",",
"softDeletable",
"bool",
")",
"(",
"bool",
",",
"error",
")",
"{",
"var",
"exists",
"bool",
"... | // exists returns true if a soft or hard deletable item exists in the database table with a given ID | [
"exists",
"returns",
"true",
"if",
"a",
"soft",
"or",
"hard",
"deletable",
"item",
"exists",
"in",
"the",
"database",
"table",
"with",
"a",
"given",
"ID"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L21-L48 |
150,737 | fabric8-services/fabric8-auth | application/repository/base/exister.go | CheckExists | func CheckExists(ctx context.Context, db *gorm.DB, tableName string, id string) error {
_, err := exists(ctx, db, tableName, "id", id, true)
return err
} | go | func CheckExists(ctx context.Context, db *gorm.DB, tableName string, id string) error {
_, err := exists(ctx, db, tableName, "id", id, true)
return err
} | [
"func",
"CheckExists",
"(",
"ctx",
"context",
".",
"Context",
",",
"db",
"*",
"gorm",
".",
"DB",
",",
"tableName",
"string",
",",
"id",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"exists",
"(",
"ctx",
",",
"db",
",",
"tableName",
",",
"\""... | // CheckExists does the same as Exists for a soft deletable item but only returns the error value; thereby
// being a handy convenience function. | [
"CheckExists",
"does",
"the",
"same",
"as",
"Exists",
"for",
"a",
"soft",
"deletable",
"item",
"but",
"only",
"returns",
"the",
"error",
"value",
";",
"thereby",
"being",
"a",
"handy",
"convenience",
"function",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L52-L55 |
150,738 | fabric8-services/fabric8-auth | application/repository/base/exister.go | CheckHardDeletableExists | func CheckHardDeletableExists(ctx context.Context, db *gorm.DB, tableName string, id string) error {
_, err := exists(ctx, db, tableName, "id", id, false)
return err
} | go | func CheckHardDeletableExists(ctx context.Context, db *gorm.DB, tableName string, id string) error {
_, err := exists(ctx, db, tableName, "id", id, false)
return err
} | [
"func",
"CheckHardDeletableExists",
"(",
"ctx",
"context",
".",
"Context",
",",
"db",
"*",
"gorm",
".",
"DB",
",",
"tableName",
"string",
",",
"id",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"exists",
"(",
"ctx",
",",
"db",
",",
"tableName",
... | // CheckExists does the same as Exists for a hard deletable item but only returns the error value; thereby
// being a handy convenience function. | [
"CheckExists",
"does",
"the",
"same",
"as",
"Exists",
"for",
"a",
"hard",
"deletable",
"item",
"but",
"only",
"returns",
"the",
"error",
"value",
";",
"thereby",
"being",
"a",
"handy",
"convenience",
"function",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L66-L69 |
150,739 | fabric8-services/fabric8-auth | controller/user.go | ListResources | func (c *UserController) ListResources(ctx *app.ListResourcesUserContext) error {
// retrieve the user's identity ID from the token
identityID, err := c.tokenManager.Locate(ctx)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "Bad Token")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("bad or missing token"))
}
resourceType := ctx.Type
if resourceType != authorization.ResourceTypeSpace {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterErrorFromString("type", ctx.Type, "invalid or unsupported type of resource."))
}
resourceIDs, err := c.app.ResourceService().FindWithRoleByResourceTypeAndIdentity(ctx, resourceType, identityID)
log.Info(ctx, map[string]interface{}{"matching_resources": len(resourceIDs), "identity_id": identityID.String()}, "retrieved resources with a role for the current user")
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(convertToUserResources(ctx.RequestData, resourceType, resourceIDs))
} | go | func (c *UserController) ListResources(ctx *app.ListResourcesUserContext) error {
// retrieve the user's identity ID from the token
identityID, err := c.tokenManager.Locate(ctx)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "Bad Token")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("bad or missing token"))
}
resourceType := ctx.Type
if resourceType != authorization.ResourceTypeSpace {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterErrorFromString("type", ctx.Type, "invalid or unsupported type of resource."))
}
resourceIDs, err := c.app.ResourceService().FindWithRoleByResourceTypeAndIdentity(ctx, resourceType, identityID)
log.Info(ctx, map[string]interface{}{"matching_resources": len(resourceIDs), "identity_id": identityID.String()}, "retrieved resources with a role for the current user")
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(convertToUserResources(ctx.RequestData, resourceType, resourceIDs))
} | [
"func",
"(",
"c",
"*",
"UserController",
")",
"ListResources",
"(",
"ctx",
"*",
"app",
".",
"ListResourcesUserContext",
")",
"error",
"{",
"// retrieve the user's identity ID from the token",
"identityID",
",",
"err",
":=",
"c",
".",
"tokenManager",
".",
"Locate",
... | // ListResources returns a list of resources in which the current user has a role | [
"ListResources",
"returns",
"a",
"list",
"of",
"resources",
"in",
"which",
"the",
"current",
"user",
"has",
"a",
"role"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/user.go#L77-L97 |
150,740 | fabric8-services/fabric8-auth | controller/user.go | convertToUserResources | func convertToUserResources(request *goa.RequestData, resourceType string, resourceIDs []string) *app.UserResourcesList {
data := make([]*app.UserResourceData, 0)
for _, resourceID := range resourceIDs {
resourceHref := rest.AbsoluteURL(request, app.ResourceHref(resourceID), nil)
data = append(data, &app.UserResourceData{
ID: resourceID,
Type: "resources",
Links: &app.GenericLinks{
Related: &resourceHref,
},
})
}
return &app.UserResourcesList{
Data: data,
}
} | go | func convertToUserResources(request *goa.RequestData, resourceType string, resourceIDs []string) *app.UserResourcesList {
data := make([]*app.UserResourceData, 0)
for _, resourceID := range resourceIDs {
resourceHref := rest.AbsoluteURL(request, app.ResourceHref(resourceID), nil)
data = append(data, &app.UserResourceData{
ID: resourceID,
Type: "resources",
Links: &app.GenericLinks{
Related: &resourceHref,
},
})
}
return &app.UserResourcesList{
Data: data,
}
} | [
"func",
"convertToUserResources",
"(",
"request",
"*",
"goa",
".",
"RequestData",
",",
"resourceType",
"string",
",",
"resourceIDs",
"[",
"]",
"string",
")",
"*",
"app",
".",
"UserResourcesList",
"{",
"data",
":=",
"make",
"(",
"[",
"]",
"*",
"app",
".",
... | // convertToUserResources converts a list of resources to which the user has a role | [
"convertToUserResources",
"converts",
"a",
"list",
"of",
"resources",
"to",
"which",
"the",
"user",
"has",
"a",
"role"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/user.go#L100-L115 |
150,741 | fabric8-services/fabric8-auth | worker/repository/worker_lock_repository.go | AcquireLock | func (r *lockRepositoryImpl) AcquireLock(ctx context.Context, owner, name string, opts ...pglock.ClientOption) (*pglock.Lock, error) {
log.Info(ctx, map[string]interface{}{
"lock": name,
"owner": owner,
}, "acquiring lock...")
// obtain a lock to prevent other pods to perform this task
var clnOpts []pglock.ClientOption
if opts != nil {
// Useful for testing
clnOpts = opts
} else {
// Use default
clnOpts = []pglock.ClientOption{
pglock.WithCustomTable("worker_lock"),
pglock.WithLeaseDuration(30 * time.Second),
pglock.WithHeartbeatFrequency(10 * time.Second),
pglock.WithLogger(log.Logger()),
}
}
if owner != "" {
// use a specific owner name, otherwise it will be a random value (default behaviour)
clnOpts = append(clnOpts, pglock.WithOwner(owner))
}
c, err := pglock.New(r.db, clnOpts...)
if err != nil {
return nil, errs.Wrap(err, "cannot create worker lock client")
}
l, err := c.Acquire(name) // will wait until it succeeds
if err != nil {
// Try to get the name of the owner who holds the lock if any
var holdByOwner string
existingLock, nerr := c.Get(name)
if nerr != nil {
log.Error(ctx, map[string]interface{}{
"err": nerr,
"lock": name,
"owner": owner,
}, "cannot obtain the existing lock when trying to acquire a new one")
} else {
holdByOwner = existingLock.Owner()
}
return nil, errs.Wrapf(err, "cannot acquire worker lock '%s' which is currently hold by '%s'", name, holdByOwner)
}
log.Info(ctx, map[string]interface{}{
"lock": name,
"owner": owner,
}, "acquired lock")
return l, nil
} | go | func (r *lockRepositoryImpl) AcquireLock(ctx context.Context, owner, name string, opts ...pglock.ClientOption) (*pglock.Lock, error) {
log.Info(ctx, map[string]interface{}{
"lock": name,
"owner": owner,
}, "acquiring lock...")
// obtain a lock to prevent other pods to perform this task
var clnOpts []pglock.ClientOption
if opts != nil {
// Useful for testing
clnOpts = opts
} else {
// Use default
clnOpts = []pglock.ClientOption{
pglock.WithCustomTable("worker_lock"),
pglock.WithLeaseDuration(30 * time.Second),
pglock.WithHeartbeatFrequency(10 * time.Second),
pglock.WithLogger(log.Logger()),
}
}
if owner != "" {
// use a specific owner name, otherwise it will be a random value (default behaviour)
clnOpts = append(clnOpts, pglock.WithOwner(owner))
}
c, err := pglock.New(r.db, clnOpts...)
if err != nil {
return nil, errs.Wrap(err, "cannot create worker lock client")
}
l, err := c.Acquire(name) // will wait until it succeeds
if err != nil {
// Try to get the name of the owner who holds the lock if any
var holdByOwner string
existingLock, nerr := c.Get(name)
if nerr != nil {
log.Error(ctx, map[string]interface{}{
"err": nerr,
"lock": name,
"owner": owner,
}, "cannot obtain the existing lock when trying to acquire a new one")
} else {
holdByOwner = existingLock.Owner()
}
return nil, errs.Wrapf(err, "cannot acquire worker lock '%s' which is currently hold by '%s'", name, holdByOwner)
}
log.Info(ctx, map[string]interface{}{
"lock": name,
"owner": owner,
}, "acquired lock")
return l, nil
} | [
"func",
"(",
"r",
"*",
"lockRepositoryImpl",
")",
"AcquireLock",
"(",
"ctx",
"context",
".",
"Context",
",",
"owner",
",",
"name",
"string",
",",
"opts",
"...",
"pglock",
".",
"ClientOption",
")",
"(",
"*",
"pglock",
".",
"Lock",
",",
"error",
")",
"{"... | // AcquireLock acquires a lock with the given name for the given owner
// Returns an error if the lock could not be obtained | [
"AcquireLock",
"acquires",
"a",
"lock",
"with",
"the",
"given",
"name",
"for",
"the",
"given",
"owner",
"Returns",
"an",
"error",
"if",
"the",
"lock",
"could",
"not",
"be",
"obtained"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/worker/repository/worker_lock_repository.go#L33-L81 |
150,742 | fabric8-services/fabric8-auth | worker/repository/worker_lock_repository.go | GetLock | func (r *lockRepositoryImpl) GetLock(ctx context.Context, name string) (*pglock.Lock, error) {
log.Debug(ctx, map[string]interface{}{
"lock": name,
}, "obtaining existing lock...")
opts := []pglock.ClientOption{
pglock.WithCustomTable("worker_lock"),
pglock.WithLogger(log.Logger()),
}
c, err := pglock.New(r.db, opts...)
if err != nil {
return nil, errs.Wrap(err, "cannot create worker lock client")
}
l, err := c.Get(name)
if err != nil {
return nil, errs.Wrapf(err, "cannot obtain the lock '%s'", name)
}
log.Debug(ctx, map[string]interface{}{
"lock": name,
}, "obtained existing lock")
return l, nil
} | go | func (r *lockRepositoryImpl) GetLock(ctx context.Context, name string) (*pglock.Lock, error) {
log.Debug(ctx, map[string]interface{}{
"lock": name,
}, "obtaining existing lock...")
opts := []pglock.ClientOption{
pglock.WithCustomTable("worker_lock"),
pglock.WithLogger(log.Logger()),
}
c, err := pglock.New(r.db, opts...)
if err != nil {
return nil, errs.Wrap(err, "cannot create worker lock client")
}
l, err := c.Get(name)
if err != nil {
return nil, errs.Wrapf(err, "cannot obtain the lock '%s'", name)
}
log.Debug(ctx, map[string]interface{}{
"lock": name,
}, "obtained existing lock")
return l, nil
} | [
"func",
"(",
"r",
"*",
"lockRepositoryImpl",
")",
"GetLock",
"(",
"ctx",
"context",
".",
"Context",
",",
"name",
"string",
")",
"(",
"*",
"pglock",
".",
"Lock",
",",
"error",
")",
"{",
"log",
".",
"Debug",
"(",
"ctx",
",",
"map",
"[",
"string",
"]"... | // GetLock returns the lock object from the given name in the table without holding
// it first. | [
"GetLock",
"returns",
"the",
"lock",
"object",
"from",
"the",
"given",
"name",
"in",
"the",
"table",
"without",
"holding",
"it",
"first",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/worker/repository/worker_lock_repository.go#L85-L105 |
150,743 | fabric8-services/fabric8-auth | authorization/invitation/service/invitation_service.go | processTeamInviteNotifications | func (s *invitationServiceImpl) processTeamInviteNotifications(ctx context.Context, team *account.Identity, inviterName string,
notifications []invitationNotification) error {
teamName := team.IdentityResource.Name
var spaceName string
res, err := s.Repositories().ResourceRepository().Load(ctx, team.IdentityResourceID.String)
if err != nil {
return err
}
// Every team *should* have a parent space, but we'll put this check here just in case
if res.ParentResourceID != nil {
sp, err := s.Services().WITService().GetSpace(ctx, *res.ParentResourceID)
if err != nil {
return errs.Wrap(err, "error while retrieving space from WIT")
}
spaceName = sp.Name
}
var messages []notification.Message
for _, n := range notifications {
acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String()))
messages = append(messages, notification.NewTeamInvitationEmail(n.invitation.Identity.ID.String(),
teamName,
inviterName,
spaceName,
acceptURL))
}
_, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages)
return e
} | go | func (s *invitationServiceImpl) processTeamInviteNotifications(ctx context.Context, team *account.Identity, inviterName string,
notifications []invitationNotification) error {
teamName := team.IdentityResource.Name
var spaceName string
res, err := s.Repositories().ResourceRepository().Load(ctx, team.IdentityResourceID.String)
if err != nil {
return err
}
// Every team *should* have a parent space, but we'll put this check here just in case
if res.ParentResourceID != nil {
sp, err := s.Services().WITService().GetSpace(ctx, *res.ParentResourceID)
if err != nil {
return errs.Wrap(err, "error while retrieving space from WIT")
}
spaceName = sp.Name
}
var messages []notification.Message
for _, n := range notifications {
acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String()))
messages = append(messages, notification.NewTeamInvitationEmail(n.invitation.Identity.ID.String(),
teamName,
inviterName,
spaceName,
acceptURL))
}
_, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages)
return e
} | [
"func",
"(",
"s",
"*",
"invitationServiceImpl",
")",
"processTeamInviteNotifications",
"(",
"ctx",
"context",
".",
"Context",
",",
"team",
"*",
"account",
".",
"Identity",
",",
"inviterName",
"string",
",",
"notifications",
"[",
"]",
"invitationNotification",
")",... | // processTeamInviteNotifications sends an e-mail notification to a user. | [
"processTeamInviteNotifications",
"sends",
"an",
"e",
"-",
"mail",
"notification",
"to",
"a",
"user",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L247-L280 |
150,744 | fabric8-services/fabric8-auth | authorization/invitation/service/invitation_service.go | processSpaceInviteNotifications | func (s *invitationServiceImpl) processSpaceInviteNotifications(ctx context.Context, space *resource.Resource,
inviterName string, notifications []invitationNotification) error {
sp, err := s.Services().WITService().GetSpace(ctx, space.ResourceID)
if err != nil {
return err
}
spaceName := sp.Name
var messages []notification.Message
for _, n := range notifications {
acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String()))
messages = append(messages, notification.NewSpaceInvitationEmail(n.invitation.Identity.ID.String(),
spaceName,
inviterName,
strings.Join(n.roles, ","),
acceptURL))
}
_, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages)
return e
} | go | func (s *invitationServiceImpl) processSpaceInviteNotifications(ctx context.Context, space *resource.Resource,
inviterName string, notifications []invitationNotification) error {
sp, err := s.Services().WITService().GetSpace(ctx, space.ResourceID)
if err != nil {
return err
}
spaceName := sp.Name
var messages []notification.Message
for _, n := range notifications {
acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String()))
messages = append(messages, notification.NewSpaceInvitationEmail(n.invitation.Identity.ID.String(),
spaceName,
inviterName,
strings.Join(n.roles, ","),
acceptURL))
}
_, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages)
return e
} | [
"func",
"(",
"s",
"*",
"invitationServiceImpl",
")",
"processSpaceInviteNotifications",
"(",
"ctx",
"context",
".",
"Context",
",",
"space",
"*",
"resource",
".",
"Resource",
",",
"inviterName",
"string",
",",
"notifications",
"[",
"]",
"invitationNotification",
"... | // processSpaceInviteNotifications sends an e-mail notification to a user. | [
"processSpaceInviteNotifications",
"sends",
"an",
"e",
"-",
"mail",
"notification",
"to",
"a",
"user",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L283-L304 |
150,745 | fabric8-services/fabric8-auth | authorization/invitation/service/invitation_service.go | Rescind | func (s *invitationServiceImpl) Rescind(ctx context.Context, rescindingUserID, invitationID uuid.UUID) error {
// Locate the invitation
inv, err := s.Repositories().InvitationRepository().Load(ctx, invitationID)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for invitation", invitationID.String()))
}
// Create the permission service
permService := s.Services().PermissionService()
if inv.InviteTo != nil {
// Lookup identity with InviteTo ID
inviteToIdentity, err := s.Repositories().Identities().Load(ctx, *inv.InviteTo)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for organization, team or security group", inv.InviteTo.String()))
}
if !inviteToIdentity.IdentityResourceID.Valid {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("specified identity '%s' has no resource", inv.InviteTo.String()))
}
identityResource, err := s.Repositories().ResourceRepository().Load(ctx, inviteToIdentity.IdentityResourceID.String)
if err != nil {
return errors.NewInternalError(ctx, err)
}
// Confirm that the rescinding user has the necessary scope to manage members for the organization, team or security group
err = permService.RequireScope(ctx, rescindingUserID, inviteToIdentity.IdentityResourceID.String, authorization.ScopeForManagingRolesInResourceType(identityResource.ResourceType.Name))
if err != nil {
return err
}
} else if inv.ResourceID != nil {
// Lookup a resource with the ResourceID value
inviteToResource, err := s.Repositories().ResourceRepository().Load(ctx, *inv.ResourceID)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for resource", *inv.ResourceID))
}
// Confirm that the rescinding user has the manage members scope for the resource
err = permService.RequireScope(ctx, rescindingUserID, inviteToResource.ResourceID, authorization.ScopeForManagingRolesInResourceType(inviteToResource.ResourceType.Name))
if err != nil {
return err
}
}
err = s.ExecuteInTransaction(func() error {
// Delete the invitation
return s.Repositories().InvitationRepository().Delete(ctx, invitationID)
})
return err
} | go | func (s *invitationServiceImpl) Rescind(ctx context.Context, rescindingUserID, invitationID uuid.UUID) error {
// Locate the invitation
inv, err := s.Repositories().InvitationRepository().Load(ctx, invitationID)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for invitation", invitationID.String()))
}
// Create the permission service
permService := s.Services().PermissionService()
if inv.InviteTo != nil {
// Lookup identity with InviteTo ID
inviteToIdentity, err := s.Repositories().Identities().Load(ctx, *inv.InviteTo)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for organization, team or security group", inv.InviteTo.String()))
}
if !inviteToIdentity.IdentityResourceID.Valid {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("specified identity '%s' has no resource", inv.InviteTo.String()))
}
identityResource, err := s.Repositories().ResourceRepository().Load(ctx, inviteToIdentity.IdentityResourceID.String)
if err != nil {
return errors.NewInternalError(ctx, err)
}
// Confirm that the rescinding user has the necessary scope to manage members for the organization, team or security group
err = permService.RequireScope(ctx, rescindingUserID, inviteToIdentity.IdentityResourceID.String, authorization.ScopeForManagingRolesInResourceType(identityResource.ResourceType.Name))
if err != nil {
return err
}
} else if inv.ResourceID != nil {
// Lookup a resource with the ResourceID value
inviteToResource, err := s.Repositories().ResourceRepository().Load(ctx, *inv.ResourceID)
if err != nil {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for resource", *inv.ResourceID))
}
// Confirm that the rescinding user has the manage members scope for the resource
err = permService.RequireScope(ctx, rescindingUserID, inviteToResource.ResourceID, authorization.ScopeForManagingRolesInResourceType(inviteToResource.ResourceType.Name))
if err != nil {
return err
}
}
err = s.ExecuteInTransaction(func() error {
// Delete the invitation
return s.Repositories().InvitationRepository().Delete(ctx, invitationID)
})
return err
} | [
"func",
"(",
"s",
"*",
"invitationServiceImpl",
")",
"Rescind",
"(",
"ctx",
"context",
".",
"Context",
",",
"rescindingUserID",
",",
"invitationID",
"uuid",
".",
"UUID",
")",
"error",
"{",
"// Locate the invitation",
"inv",
",",
"err",
":=",
"s",
".",
"Repos... | // Rescind revokes an invitation request | [
"Rescind",
"revokes",
"an",
"invitation",
"request"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L307-L357 |
150,746 | fabric8-services/fabric8-auth | gormsupport/lifecycle_hard_delete.go | Equal | func (lc LifecycleHardDelete) Equal(u convert.Equaler) bool {
other, ok := u.(LifecycleHardDelete)
return ok && lc.CreatedAt.Equal(other.CreatedAt) && lc.UpdatedAt.Equal(other.UpdatedAt)
} | go | func (lc LifecycleHardDelete) Equal(u convert.Equaler) bool {
other, ok := u.(LifecycleHardDelete)
return ok && lc.CreatedAt.Equal(other.CreatedAt) && lc.UpdatedAt.Equal(other.UpdatedAt)
} | [
"func",
"(",
"lc",
"LifecycleHardDelete",
")",
"Equal",
"(",
"u",
"convert",
".",
"Equaler",
")",
"bool",
"{",
"other",
",",
"ok",
":=",
"u",
".",
"(",
"LifecycleHardDelete",
")",
"\n",
"return",
"ok",
"&&",
"lc",
".",
"CreatedAt",
".",
"Equal",
"(",
... | // Equal returns true if two LifecycleHardDelete objects are equal; otherwise false is returned. | [
"Equal",
"returns",
"true",
"if",
"two",
"LifecycleHardDelete",
"objects",
"are",
"equal",
";",
"otherwise",
"false",
"is",
"returned",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/gormsupport/lifecycle_hard_delete.go#L26-L29 |
150,747 | fabric8-services/fabric8-auth | authentication/account/repository/verification_code.go | LoadByCode | func (m *GormVerificationCodeRepository) LoadByCode(ctx context.Context, code string) ([]VerificationCode, error) {
return m.Query(VerificationCodeWithUser(), VerificationCodeFilterByCode(code)) // maybe load with user?
} | go | func (m *GormVerificationCodeRepository) LoadByCode(ctx context.Context, code string) ([]VerificationCode, error) {
return m.Query(VerificationCodeWithUser(), VerificationCodeFilterByCode(code)) // maybe load with user?
} | [
"func",
"(",
"m",
"*",
"GormVerificationCodeRepository",
")",
"LoadByCode",
"(",
"ctx",
"context",
".",
"Context",
",",
"code",
"string",
")",
"(",
"[",
"]",
"VerificationCode",
",",
"error",
")",
"{",
"return",
"m",
".",
"Query",
"(",
"VerificationCodeWithU... | // LoadByCode loads result by filtering with respect to the verificate code. | [
"LoadByCode",
"loads",
"result",
"by",
"filtering",
"with",
"respect",
"to",
"the",
"verificate",
"code",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L78-L80 |
150,748 | fabric8-services/fabric8-auth | authentication/account/repository/verification_code.go | VerificationCodeFilterByUserID | func VerificationCodeFilterByUserID(userID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("user_id = ?", userID)
}
} | go | func VerificationCodeFilterByUserID(userID uuid.UUID) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("user_id = ?", userID)
}
} | [
"func",
"VerificationCodeFilterByUserID",
"(",
"userID",
"uuid",
".",
"UUID",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
... | // VerificationCodeFilterByUserID is a gorm filter for a Belongs To relationship. | [
"VerificationCodeFilterByUserID",
"is",
"a",
"gorm",
"filter",
"for",
"a",
"Belongs",
"To",
"relationship",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L170-L174 |
150,749 | fabric8-services/fabric8-auth | authentication/account/repository/verification_code.go | VerificationCodeFilterByCode | func VerificationCodeFilterByCode(code string) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("code = ?", code)
}
} | go | func VerificationCodeFilterByCode(code string) func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Where("code = ?", code)
}
} | [
"func",
"VerificationCodeFilterByCode",
"(",
"code",
"string",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"db",
... | // VerificationCodeFilterByCode is a gorm filter for a Belongs To relationship. | [
"VerificationCodeFilterByCode",
"is",
"a",
"gorm",
"filter",
"for",
"a",
"Belongs",
"To",
"relationship",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L177-L181 |
150,750 | fabric8-services/fabric8-auth | authentication/account/repository/verification_code.go | VerificationCodeWithUser | func VerificationCodeWithUser() func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Preload("User")
}
} | go | func VerificationCodeWithUser() func(db *gorm.DB) *gorm.DB {
return func(db *gorm.DB) *gorm.DB {
return db.Preload("User")
}
} | [
"func",
"VerificationCodeWithUser",
"(",
")",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"func",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"*",
"gorm",
".",
"DB",
"{",
"return",
"db",
".",
"Preload",
"(",... | // VerificationCodeWithUser is a gorm filter for preloading the user relationship. | [
"VerificationCodeWithUser",
"is",
"a",
"gorm",
"filter",
"for",
"preloading",
"the",
"user",
"relationship",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L184-L188 |
150,751 | fabric8-services/fabric8-auth | notification/notification.go | NewUserEmailUpdated | func NewUserEmailUpdated(identityID string, custom map[string]interface{}) Message {
return Message{
MessageID: uuid.NewV4(),
MessageType: "user.email.update",
TargetID: identityID,
UserID: &identityID, // in future if service accounts are allowed to update, this will be handy.
Custom: custom,
}
} | go | func NewUserEmailUpdated(identityID string, custom map[string]interface{}) Message {
return Message{
MessageID: uuid.NewV4(),
MessageType: "user.email.update",
TargetID: identityID,
UserID: &identityID, // in future if service accounts are allowed to update, this will be handy.
Custom: custom,
}
} | [
"func",
"NewUserEmailUpdated",
"(",
"identityID",
"string",
",",
"custom",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"Message",
"{",
"return",
"Message",
"{",
"MessageID",
":",
"uuid",
".",
"NewV4",
"(",
")",
",",
"MessageType",
":",
"\"",
"... | // NewUserEmailUpdated is a helper constructor which returns a Message with contents of the notification
// that would be sent out. | [
"NewUserEmailUpdated",
"is",
"a",
"helper",
"constructor",
"which",
"returns",
"a",
"Message",
"with",
"contents",
"of",
"the",
"notification",
"that",
"would",
"be",
"sent",
"out",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/notification.go#L29-L37 |
150,752 | fabric8-services/fabric8-auth | notification/notification.go | NewUserDeactivationEmail | func NewUserDeactivationEmail(identityID, email, deactivationDate string) Message {
return Message{
MessageID: uuid.NewV4(),
MessageType: "user.deactivation",
TargetID: identityID,
UserID: &identityID,
Custom: map[string]interface{}{
"userEmail": email,
"expiryDate": deactivationDate,
},
}
} | go | func NewUserDeactivationEmail(identityID, email, deactivationDate string) Message {
return Message{
MessageID: uuid.NewV4(),
MessageType: "user.deactivation",
TargetID: identityID,
UserID: &identityID,
Custom: map[string]interface{}{
"userEmail": email,
"expiryDate": deactivationDate,
},
}
} | [
"func",
"NewUserDeactivationEmail",
"(",
"identityID",
",",
"email",
",",
"deactivationDate",
"string",
")",
"Message",
"{",
"return",
"Message",
"{",
"MessageID",
":",
"uuid",
".",
"NewV4",
"(",
")",
",",
"MessageType",
":",
"\"",
"\"",
",",
"TargetID",
":"... | // NewUserDeactivationEmail is a helper constructor which returns a message to inform the user that her
// account will be deactivated soon | [
"NewUserDeactivationEmail",
"is",
"a",
"helper",
"constructor",
"which",
"returns",
"a",
"message",
"to",
"inform",
"the",
"user",
"that",
"her",
"account",
"will",
"be",
"deactivated",
"soon"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/notification.go#L87-L98 |
150,753 | fabric8-services/fabric8-auth | authorization/role/service/role_management_service.go | ListByResourceAndRoleName | func (s *roleManagementServiceImpl) ListByResourceAndRoleName(ctx context.Context, currentIdentity uuid.UUID, resourceID string, roleName string) ([]rolerepo.IdentityRole, error) {
err := s.requireViewRolesScope(ctx, currentIdentity, resourceID)
if err != nil {
return nil, err
}
return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName, false)
} | go | func (s *roleManagementServiceImpl) ListByResourceAndRoleName(ctx context.Context, currentIdentity uuid.UUID, resourceID string, roleName string) ([]rolerepo.IdentityRole, error) {
err := s.requireViewRolesScope(ctx, currentIdentity, resourceID)
if err != nil {
return nil, err
}
return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName, false)
} | [
"func",
"(",
"s",
"*",
"roleManagementServiceImpl",
")",
"ListByResourceAndRoleName",
"(",
"ctx",
"context",
".",
"Context",
",",
"currentIdentity",
"uuid",
".",
"UUID",
",",
"resourceID",
"string",
",",
"roleName",
"string",
")",
"(",
"[",
"]",
"rolerepo",
".... | // ListByResourceAndRoleName lists specific roles for the resource if the current user has permissions to view the roles | [
"ListByResourceAndRoleName",
"lists",
"specific",
"roles",
"for",
"the",
"resource",
"if",
"the",
"current",
"user",
"has",
"permissions",
"to",
"view",
"the",
"roles"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L30-L37 |
150,754 | fabric8-services/fabric8-auth | authorization/role/service/role_management_service.go | ListByResource | func (s *roleManagementServiceImpl) ListByResource(ctx context.Context, currentIdentity uuid.UUID, resourceID string) ([]rolerepo.IdentityRole, error) {
err := s.requireViewRolesScope(ctx, currentIdentity, resourceID)
if err != nil {
return nil, err
}
return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResource(ctx, resourceID, false)
} | go | func (s *roleManagementServiceImpl) ListByResource(ctx context.Context, currentIdentity uuid.UUID, resourceID string) ([]rolerepo.IdentityRole, error) {
err := s.requireViewRolesScope(ctx, currentIdentity, resourceID)
if err != nil {
return nil, err
}
return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResource(ctx, resourceID, false)
} | [
"func",
"(",
"s",
"*",
"roleManagementServiceImpl",
")",
"ListByResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"currentIdentity",
"uuid",
".",
"UUID",
",",
"resourceID",
"string",
")",
"(",
"[",
"]",
"rolerepo",
".",
"IdentityRole",
",",
"error",
")"... | // ListByResource lists all identity roles for the resource if the current user has permissions to view the roles | [
"ListByResource",
"lists",
"all",
"identity",
"roles",
"for",
"the",
"resource",
"if",
"the",
"current",
"user",
"has",
"permissions",
"to",
"view",
"the",
"roles"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L40-L47 |
150,755 | fabric8-services/fabric8-auth | authorization/role/service/role_management_service.go | ListAvailableRolesByResourceType | func (s *roleManagementServiceImpl) ListAvailableRolesByResourceType(ctx context.Context, resourceType string) ([]role.RoleDescriptor, error) {
return s.Repositories().RoleRepository().FindRolesByResourceType(ctx, resourceType)
} | go | func (s *roleManagementServiceImpl) ListAvailableRolesByResourceType(ctx context.Context, resourceType string) ([]role.RoleDescriptor, error) {
return s.Repositories().RoleRepository().FindRolesByResourceType(ctx, resourceType)
} | [
"func",
"(",
"s",
"*",
"roleManagementServiceImpl",
")",
"ListAvailableRolesByResourceType",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceType",
"string",
")",
"(",
"[",
"]",
"role",
".",
"RoleDescriptor",
",",
"error",
")",
"{",
"return",
"s",
".",
... | // ListAvailableRolesByResourceType lists role assignments of a specific resource. | [
"ListAvailableRolesByResourceType",
"lists",
"role",
"assignments",
"of",
"a",
"specific",
"resource",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L61-L63 |
150,756 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | DefaultManager | func DefaultManager(config TokenManagerConfiguration) (TokenManager, error) {
defaultOnce.Do(func() {
defaultManager, defaultErr = NewTokenManager(config)
})
return defaultManager, defaultErr
} | go | func DefaultManager(config TokenManagerConfiguration) (TokenManager, error) {
defaultOnce.Do(func() {
defaultManager, defaultErr = NewTokenManager(config)
})
return defaultManager, defaultErr
} | [
"func",
"DefaultManager",
"(",
"config",
"TokenManagerConfiguration",
")",
"(",
"TokenManager",
",",
"error",
")",
"{",
"defaultOnce",
".",
"Do",
"(",
"func",
"(",
")",
"{",
"defaultManager",
",",
"defaultErr",
"=",
"NewTokenManager",
"(",
"config",
")",
"\n",... | // DefaultManager creates the default manager if it has not created yet.
// This function must be called in main to make sure the default manager is created during service startup.
// It will try to create the default manager only once even if called multiple times. | [
"DefaultManager",
"creates",
"the",
"default",
"manager",
"if",
"it",
"has",
"not",
"created",
"yet",
".",
"This",
"function",
"must",
"be",
"called",
"in",
"main",
"to",
"make",
"sure",
"the",
"default",
"manager",
"is",
"created",
"during",
"service",
"sta... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L46-L51 |
150,757 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ReadTokenSetFromJson | func ReadTokenSetFromJson(ctx context.Context, jsonString string) (*TokenSet, error) {
var token TokenSet
err := json.Unmarshal([]byte(jsonString), &token)
if err != nil {
return nil, errors.Wrapf(err, "error when unmarshal json with access token %s ", jsonString)
}
return &token, nil
} | go | func ReadTokenSetFromJson(ctx context.Context, jsonString string) (*TokenSet, error) {
var token TokenSet
err := json.Unmarshal([]byte(jsonString), &token)
if err != nil {
return nil, errors.Wrapf(err, "error when unmarshal json with access token %s ", jsonString)
}
return &token, nil
} | [
"func",
"ReadTokenSetFromJson",
"(",
"ctx",
"context",
".",
"Context",
",",
"jsonString",
"string",
")",
"(",
"*",
"TokenSet",
",",
"error",
")",
"{",
"var",
"token",
"TokenSet",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"[",
"]",
"byte",
"(",
... | // ReadTokenSetFromJson parses json with a token set | [
"ReadTokenSetFromJson",
"parses",
"json",
"with",
"a",
"token",
"set"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L107-L114 |
150,758 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ReadTokenManagerFromContext | func ReadTokenManagerFromContext(ctx context.Context) (TokenManager, error) {
tm := ctx.Value(contextTokenManagerKey)
if tm == nil {
log.Error(ctx, map[string]interface{}{
"token": tm,
}, "missing token manager")
return nil, errors.New("missing token manager")
}
return tm.(*tokenManager), nil
} | go | func ReadTokenManagerFromContext(ctx context.Context) (TokenManager, error) {
tm := ctx.Value(contextTokenManagerKey)
if tm == nil {
log.Error(ctx, map[string]interface{}{
"token": tm,
}, "missing token manager")
return nil, errors.New("missing token manager")
}
return tm.(*tokenManager), nil
} | [
"func",
"ReadTokenManagerFromContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"TokenManager",
",",
"error",
")",
"{",
"tm",
":=",
"ctx",
".",
"Value",
"(",
"contextTokenManagerKey",
")",
"\n",
"if",
"tm",
"==",
"nil",
"{",
"log",
".",
"Error",
... | // ReadTokenManagerFromContext extracts the token manager from the context and returns it | [
"ReadTokenManagerFromContext",
"extracts",
"the",
"token",
"manager",
"from",
"the",
"context",
"and",
"returns",
"it"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L154-L164 |
150,759 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | NewTokenManager | func NewTokenManager(config TokenManagerConfiguration) (TokenManager, error) {
tm := &tokenManager{
publicKeysMap: map[string]*rsa.PublicKey{},
}
tm.config = config
// Load the user account private key and add it to the manager.
// Extract the public key from it and add it to the map of public keys.
var err error
key, kid := config.GetUserAccountPrivateKey()
deprecatedKey, deprecatedKid := config.GetDeprecatedUserAccountPrivateKey()
tm.userAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load user account private keys")
return nil, err
}
// Load the service account private key and add it to the manager.
// Extract the public key from it and add it to the map of public keys.
key, kid = config.GetServiceAccountPrivateKey()
deprecatedKey, deprecatedKid = config.GetDeprecatedServiceAccountPrivateKey()
tm.serviceAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load service account private keys")
return nil, err
}
// Load Keycloak public key if run in dev mode.
devMode, key, kid := config.GetDevModePublicKey()
if devMode {
rsaKey, err := jwt.ParseRSAPublicKeyFromPEM(key)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load dev mode public key")
return nil, err
}
tm.publicKeysMap[kid] = rsaKey
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: rsaKey})
log.Info(nil, map[string]interface{}{"kid": kid}, "dev mode public key added")
}
// Convert public keys to JWK format
jsonWebKeys, err := tm.toJSONWebKeys(tm.publicKeys)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to JSON Web Keys")
return nil, errors.New("unable to convert public keys to JSON Web Keys")
}
tm.jsonWebKeys = jsonWebKeys
// Convert public keys to PEM format
jsonKeys, err := tm.toPemKeys(tm.publicKeys)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to PEM Keys")
return nil, errors.New("unable to convert public keys to PEM Keys")
}
tm.pemKeys = jsonKeys
tm.initServiceAccountToken()
return tm, nil
} | go | func NewTokenManager(config TokenManagerConfiguration) (TokenManager, error) {
tm := &tokenManager{
publicKeysMap: map[string]*rsa.PublicKey{},
}
tm.config = config
// Load the user account private key and add it to the manager.
// Extract the public key from it and add it to the map of public keys.
var err error
key, kid := config.GetUserAccountPrivateKey()
deprecatedKey, deprecatedKid := config.GetDeprecatedUserAccountPrivateKey()
tm.userAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load user account private keys")
return nil, err
}
// Load the service account private key and add it to the manager.
// Extract the public key from it and add it to the map of public keys.
key, kid = config.GetServiceAccountPrivateKey()
deprecatedKey, deprecatedKid = config.GetDeprecatedServiceAccountPrivateKey()
tm.serviceAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load service account private keys")
return nil, err
}
// Load Keycloak public key if run in dev mode.
devMode, key, kid := config.GetDevModePublicKey()
if devMode {
rsaKey, err := jwt.ParseRSAPublicKeyFromPEM(key)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to load dev mode public key")
return nil, err
}
tm.publicKeysMap[kid] = rsaKey
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: rsaKey})
log.Info(nil, map[string]interface{}{"kid": kid}, "dev mode public key added")
}
// Convert public keys to JWK format
jsonWebKeys, err := tm.toJSONWebKeys(tm.publicKeys)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to JSON Web Keys")
return nil, errors.New("unable to convert public keys to JSON Web Keys")
}
tm.jsonWebKeys = jsonWebKeys
// Convert public keys to PEM format
jsonKeys, err := tm.toPemKeys(tm.publicKeys)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to PEM Keys")
return nil, errors.New("unable to convert public keys to PEM Keys")
}
tm.pemKeys = jsonKeys
tm.initServiceAccountToken()
return tm, nil
} | [
"func",
"NewTokenManager",
"(",
"config",
"TokenManagerConfiguration",
")",
"(",
"TokenManager",
",",
"error",
")",
"{",
"tm",
":=",
"&",
"tokenManager",
"{",
"publicKeysMap",
":",
"map",
"[",
"string",
"]",
"*",
"rsa",
".",
"PublicKey",
"{",
"}",
",",
"}"... | // NewTokenManager returns a new token Manager for handling tokens | [
"NewTokenManager",
"returns",
"a",
"new",
"token",
"Manager",
"for",
"handling",
"tokens"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L221-L279 |
150,760 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | SignRPTToken | func (mgm *tokenManager) SignRPTToken(ctx context.Context, rptToken *jwt.Token) (string, error) {
return rptToken.SignedString(mgm.userAccountPrivateKey.Key)
} | go | func (mgm *tokenManager) SignRPTToken(ctx context.Context, rptToken *jwt.Token) (string, error) {
return rptToken.SignedString(mgm.userAccountPrivateKey.Key)
} | [
"func",
"(",
"mgm",
"*",
"tokenManager",
")",
"SignRPTToken",
"(",
"ctx",
"context",
".",
"Context",
",",
"rptToken",
"*",
"jwt",
".",
"Token",
")",
"(",
"string",
",",
"error",
")",
"{",
"return",
"rptToken",
".",
"SignedString",
"(",
"mgm",
".",
"use... | // SignRPTToken generates a signature for the specified rpt token and returns it | [
"SignRPTToken",
"generates",
"a",
"signature",
"for",
"the",
"specified",
"rpt",
"token",
"and",
"returns",
"it"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L389-L391 |
150,761 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | GenerateUnsignedUserAccessTokenForIdentity | func (m *tokenManager) GenerateUnsignedUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetAccessTokenExpiresIn()
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = "Bearer"
claims["auth_time"] = iat // TODO should use the time when user actually logged-in the last time. Will need to get this time from the RHD token
claims["approved"] = !identity.User.Banned
claims["sub"] = identity.ID.String()
claims["email_verified"] = identity.User.EmailVerified
claims["name"] = identity.User.FullName
claims["preferred_username"] = identity.Username
firstName, lastName := account.SplitFullName(identity.User.FullName)
claims["given_name"] = firstName
claims["family_name"] = lastName
claims["email"] = identity.User.Email
claims["company"] = identity.User.Company
claims["allowed-origins"] = []string{
authOpenshiftIO,
openshiftIO,
}
claims["session_state"] = uuid.NewV4().String()
return token, nil
} | go | func (m *tokenManager) GenerateUnsignedUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetAccessTokenExpiresIn()
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = "Bearer"
claims["auth_time"] = iat // TODO should use the time when user actually logged-in the last time. Will need to get this time from the RHD token
claims["approved"] = !identity.User.Banned
claims["sub"] = identity.ID.String()
claims["email_verified"] = identity.User.EmailVerified
claims["name"] = identity.User.FullName
claims["preferred_username"] = identity.Username
firstName, lastName := account.SplitFullName(identity.User.FullName)
claims["given_name"] = firstName
claims["family_name"] = lastName
claims["email"] = identity.User.Email
claims["company"] = identity.User.Company
claims["allowed-origins"] = []string{
authOpenshiftIO,
openshiftIO,
}
claims["session_state"] = uuid.NewV4().String()
return token, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"GenerateUnsignedUserAccessTokenForIdentity",
"(",
"ctx",
"context",
".",
"Context",
",",
"identity",
"repository",
".",
"Identity",
")",
"(",
"*",
"jwt",
".",
"Token",
",",
"error",
")",
"{",
"token",
":=",
"jwt",... | // GenerateUnsignedUserAccessTokenForIdentity generates an unsigned OAuth2 user access token for the given identity | [
"GenerateUnsignedUserAccessTokenForIdentity",
"generates",
"an",
"unsigned",
"OAuth2",
"user",
"access",
"token",
"for",
"the",
"given",
"identity"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L476-L516 |
150,762 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | GenerateTransientUserAccessTokenForIdentity | func (m *tokenManager) GenerateTransientUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*string, error) {
token, err := m.GenerateUnsignedUserAccessTokenForIdentity(ctx, identity)
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetTransientTokenExpiresIn()
claims["transient"] = "true"
accessToken, err := token.SignedString(m.userAccountPrivateKey.Key)
if err != nil {
return nil, errors.WithStack(err)
}
return &accessToken, nil
} | go | func (m *tokenManager) GenerateTransientUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*string, error) {
token, err := m.GenerateUnsignedUserAccessTokenForIdentity(ctx, identity)
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetTransientTokenExpiresIn()
claims["transient"] = "true"
accessToken, err := token.SignedString(m.userAccountPrivateKey.Key)
if err != nil {
return nil, errors.WithStack(err)
}
return &accessToken, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"GenerateTransientUserAccessTokenForIdentity",
"(",
"ctx",
"context",
".",
"Context",
",",
"identity",
"repository",
".",
"Identity",
")",
"(",
"*",
"string",
",",
"error",
")",
"{",
"token",
",",
"err",
":=",
"m",... | // GenerateTransientUserAccessTokenForIdentity generates a transient user access token, an extremely short-lived token | [
"GenerateTransientUserAccessTokenForIdentity",
"generates",
"a",
"transient",
"user",
"access",
"token",
"an",
"extremely",
"short",
"-",
"lived",
"token"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L519-L536 |
150,763 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | GenerateUnsignedUserAccessTokenForAPIClient | func (m *tokenManager) GenerateUnsignedUserAccessTokenForAPIClient(ctx context.Context, providerAccessToken string) (*jwt.Token, error) {
kcClaims, err := m.ParseToken(ctx, providerAccessToken)
if err != nil {
return nil, errors.WithStack(err)
}
return m.GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx, kcClaims)
} | go | func (m *tokenManager) GenerateUnsignedUserAccessTokenForAPIClient(ctx context.Context, providerAccessToken string) (*jwt.Token, error) {
kcClaims, err := m.ParseToken(ctx, providerAccessToken)
if err != nil {
return nil, errors.WithStack(err)
}
return m.GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx, kcClaims)
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"GenerateUnsignedUserAccessTokenForAPIClient",
"(",
"ctx",
"context",
".",
"Context",
",",
"providerAccessToken",
"string",
")",
"(",
"*",
"jwt",
".",
"Token",
",",
"error",
")",
"{",
"kcClaims",
",",
"err",
":=",
... | // GenerateUnsignedUserAccessTokenForAPIClient generates an unsigned OAuth2 user access token for the api_client based on the Keycloak token | [
"GenerateUnsignedUserAccessTokenForAPIClient",
"generates",
"an",
"unsigned",
"OAuth2",
"user",
"access",
"token",
"for",
"the",
"api_client",
"based",
"on",
"the",
"Keycloak",
"token"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L822-L829 |
150,764 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | GenerateUnsignedUserAccessTokenFromClaimsForAPIClient | func (m *tokenManager) GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx context.Context, tokenClaims *TokenClaims) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, errors.WithStack(err)
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetAccessTokenExpiresIn()
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = "Bearer"
claims["auth_time"] = iat
claims["typ"] = "Bearer"
claims["approved"] = tokenClaims.Approved
claims["sub"] = tokenClaims.Subject
claims["email_verified"] = tokenClaims.EmailVerified
claims["name"] = tokenClaims.Name
claims["preferred_username"] = tokenClaims.Username
claims["given_name"] = tokenClaims.GivenName
claims["family_name"] = tokenClaims.FamilyName
claims["email"] = tokenClaims.Email
claims["allowed-origins"] = []string{
authOpenshiftIO,
openshiftIO,
}
claims["azp"] = tokenClaims.Audience
claims["session_state"] = tokenClaims.SessionState
claims["acr"] = "0"
realmAccess := make(map[string]interface{})
realmAccess["roles"] = []string{"uma_authorization"}
claims["realm_access"] = realmAccess
resourceAccess := make(map[string]interface{})
broker := make(map[string]interface{})
broker["roles"] = []string{"read-token"}
resourceAccess["broker"] = broker
account := make(map[string]interface{})
account["roles"] = []string{"manage-account", "manage-account-links", "view-profile"}
resourceAccess["account"] = account
claims["resource_access"] = resourceAccess
return token, nil
} | go | func (m *tokenManager) GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx context.Context, tokenClaims *TokenClaims) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, errors.WithStack(err)
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
claims["exp"] = iat + m.config.GetAccessTokenExpiresIn()
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = "Bearer"
claims["auth_time"] = iat
claims["typ"] = "Bearer"
claims["approved"] = tokenClaims.Approved
claims["sub"] = tokenClaims.Subject
claims["email_verified"] = tokenClaims.EmailVerified
claims["name"] = tokenClaims.Name
claims["preferred_username"] = tokenClaims.Username
claims["given_name"] = tokenClaims.GivenName
claims["family_name"] = tokenClaims.FamilyName
claims["email"] = tokenClaims.Email
claims["allowed-origins"] = []string{
authOpenshiftIO,
openshiftIO,
}
claims["azp"] = tokenClaims.Audience
claims["session_state"] = tokenClaims.SessionState
claims["acr"] = "0"
realmAccess := make(map[string]interface{})
realmAccess["roles"] = []string{"uma_authorization"}
claims["realm_access"] = realmAccess
resourceAccess := make(map[string]interface{})
broker := make(map[string]interface{})
broker["roles"] = []string{"read-token"}
resourceAccess["broker"] = broker
account := make(map[string]interface{})
account["roles"] = []string{"manage-account", "manage-account-links", "view-profile"}
resourceAccess["account"] = account
claims["resource_access"] = resourceAccess
return token, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"GenerateUnsignedUserAccessTokenFromClaimsForAPIClient",
"(",
"ctx",
"context",
".",
"Context",
",",
"tokenClaims",
"*",
"TokenClaims",
")",
"(",
"*",
"jwt",
".",
"Token",
",",
"error",
")",
"{",
"token",
":=",
"jwt"... | // GenerateUnsignedUserAccessTokenFromClaimsForAPIClient generates a new token based on the specified claims for api_client | [
"GenerateUnsignedUserAccessTokenFromClaimsForAPIClient",
"generates",
"a",
"new",
"token",
"based",
"on",
"the",
"specified",
"claims",
"for",
"api_client"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L832-L894 |
150,765 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | GenerateUnsignedUserRefreshTokenForAPIClient | func (m *tokenManager) GenerateUnsignedUserRefreshTokenForAPIClient(ctx context.Context, accessToken string) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
tokenClaims, err := m.ParseToken(ctx, accessToken)
if err != nil {
return nil, errors.WithStack(err)
}
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, errors.WithStack(err)
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
exp := iat + m.config.GetRefreshTokenExpiresIn()
typ := "Refresh"
claims["exp"] = exp
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = typ
claims["auth_time"] = 0
// populate claims for user details in refresh token for api_client
claims["sub"] = tokenClaims.Subject
claims["email_verified"] = tokenClaims.EmailVerified
claims["name"] = tokenClaims.Name
claims["preferred_username"] = tokenClaims.Username
claims["given_name"] = tokenClaims.GivenName
claims["family_name"] = tokenClaims.FamilyName
claims["email"] = tokenClaims.Email
// ToDo - Do we need azp claim?
claims["azp"] = tokenClaims.Audience
claims["session_state"] = tokenClaims.SessionState
return token, nil
} | go | func (m *tokenManager) GenerateUnsignedUserRefreshTokenForAPIClient(ctx context.Context, accessToken string) (*jwt.Token, error) {
token := jwt.New(jwt.SigningMethodRS256)
token.Header["kid"] = m.userAccountPrivateKey.KeyID
tokenClaims, err := m.ParseToken(ctx, accessToken)
if err != nil {
return nil, errors.WithStack(err)
}
req := goa.ContextRequest(ctx)
if req == nil {
return nil, errors.New("missing request in context")
}
authOpenshiftIO := rest.AbsoluteURL(req, "", m.config)
openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config)
if err != nil {
return nil, errors.WithStack(err)
}
claims := token.Claims.(jwt.MapClaims)
claims["jti"] = uuid.NewV4().String()
iat := time.Now().Unix()
exp := iat + m.config.GetRefreshTokenExpiresIn()
typ := "Refresh"
claims["exp"] = exp
claims["nbf"] = 0
claims["iat"] = iat
claims["iss"] = authOpenshiftIO
claims["aud"] = openshiftIO
claims["typ"] = typ
claims["auth_time"] = 0
// populate claims for user details in refresh token for api_client
claims["sub"] = tokenClaims.Subject
claims["email_verified"] = tokenClaims.EmailVerified
claims["name"] = tokenClaims.Name
claims["preferred_username"] = tokenClaims.Username
claims["given_name"] = tokenClaims.GivenName
claims["family_name"] = tokenClaims.FamilyName
claims["email"] = tokenClaims.Email
// ToDo - Do we need azp claim?
claims["azp"] = tokenClaims.Audience
claims["session_state"] = tokenClaims.SessionState
return token, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"GenerateUnsignedUserRefreshTokenForAPIClient",
"(",
"ctx",
"context",
".",
"Context",
",",
"accessToken",
"string",
")",
"(",
"*",
"jwt",
".",
"Token",
",",
"error",
")",
"{",
"token",
":=",
"jwt",
".",
"New",
"... | // GenerateUnsignedUserRefreshToken generates an unsigned OAuth2 user refresh token for the given identity based on the Keycloak token | [
"GenerateUnsignedUserRefreshToken",
"generates",
"an",
"unsigned",
"OAuth2",
"user",
"refresh",
"token",
"for",
"the",
"given",
"identity",
"based",
"on",
"the",
"Keycloak",
"token"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L897-L944 |
150,766 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | Parse | func (m *tokenManager) Parse(ctx context.Context, tokenString string) (*jwt.Token, error) {
keyFunc := m.KeyFunction(ctx)
jwtToken, err := jwt.Parse(tokenString, keyFunc)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "unable to parse token")
return nil, autherrors.NewUnauthorizedError(err.Error())
}
return jwtToken, nil
} | go | func (m *tokenManager) Parse(ctx context.Context, tokenString string) (*jwt.Token, error) {
keyFunc := m.KeyFunction(ctx)
jwtToken, err := jwt.Parse(tokenString, keyFunc)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "unable to parse token")
return nil, autherrors.NewUnauthorizedError(err.Error())
}
return jwtToken, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"Parse",
"(",
"ctx",
"context",
".",
"Context",
",",
"tokenString",
"string",
")",
"(",
"*",
"jwt",
".",
"Token",
",",
"error",
")",
"{",
"keyFunc",
":=",
"m",
".",
"KeyFunction",
"(",
"ctx",
")",
"\n",
"... | // Parse parses the specified token string and returns a JWT token | [
"Parse",
"parses",
"the",
"specified",
"token",
"string",
"and",
"returns",
"a",
"JWT",
"token"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L996-L1006 |
150,767 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ParseToken | func (m *tokenManager) ParseToken(ctx context.Context, tokenString string) (*TokenClaims, error) {
token, err := jwt.ParseWithClaims(tokenString, &TokenClaims{}, m.KeyFunction(ctx))
if err != nil {
return nil, err
}
claims := token.Claims.(*TokenClaims)
if token.Valid {
return claims, nil
}
return nil, errors.WithStack(errors.New("token is not valid"))
} | go | func (m *tokenManager) ParseToken(ctx context.Context, tokenString string) (*TokenClaims, error) {
token, err := jwt.ParseWithClaims(tokenString, &TokenClaims{}, m.KeyFunction(ctx))
if err != nil {
return nil, err
}
claims := token.Claims.(*TokenClaims)
if token.Valid {
return claims, nil
}
return nil, errors.WithStack(errors.New("token is not valid"))
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"ParseToken",
"(",
"ctx",
"context",
".",
"Context",
",",
"tokenString",
"string",
")",
"(",
"*",
"TokenClaims",
",",
"error",
")",
"{",
"token",
",",
"err",
":=",
"jwt",
".",
"ParseWithClaims",
"(",
"tokenStri... | // ParseToken parses the specified token string and returns its claims | [
"ParseToken",
"parses",
"the",
"specified",
"token",
"string",
"and",
"returns",
"its",
"claims"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1009-L1019 |
150,768 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ParseTokenWithMapClaims | func (m *tokenManager) ParseTokenWithMapClaims(ctx context.Context, tokenString string) (jwt.MapClaims, error) {
token, err := jwt.Parse(tokenString, m.KeyFunction(ctx))
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
if token.Valid {
return claims, nil
}
return nil, errors.WithStack(errors.New("token is not valid"))
} | go | func (m *tokenManager) ParseTokenWithMapClaims(ctx context.Context, tokenString string) (jwt.MapClaims, error) {
token, err := jwt.Parse(tokenString, m.KeyFunction(ctx))
if err != nil {
return nil, err
}
claims := token.Claims.(jwt.MapClaims)
if token.Valid {
return claims, nil
}
return nil, errors.WithStack(errors.New("token is not valid"))
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"ParseTokenWithMapClaims",
"(",
"ctx",
"context",
".",
"Context",
",",
"tokenString",
"string",
")",
"(",
"jwt",
".",
"MapClaims",
",",
"error",
")",
"{",
"token",
",",
"err",
":=",
"jwt",
".",
"Parse",
"(",
... | // ParseTokenWithMapClaims parses token claims | [
"ParseTokenWithMapClaims",
"parses",
"token",
"claims"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1022-L1032 |
150,769 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | PublicKeys | func (m *tokenManager) PublicKeys() []*rsa.PublicKey {
keys := make([]*rsa.PublicKey, 0, len(m.publicKeysMap))
for _, key := range m.publicKeys {
keys = append(keys, key.Key)
}
return keys
} | go | func (m *tokenManager) PublicKeys() []*rsa.PublicKey {
keys := make([]*rsa.PublicKey, 0, len(m.publicKeysMap))
for _, key := range m.publicKeys {
keys = append(keys, key.Key)
}
return keys
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"PublicKeys",
"(",
")",
"[",
"]",
"*",
"rsa",
".",
"PublicKey",
"{",
"keys",
":=",
"make",
"(",
"[",
"]",
"*",
"rsa",
".",
"PublicKey",
",",
"0",
",",
"len",
"(",
"m",
".",
"publicKeysMap",
")",
")",
... | // PublicKeys returns all the public keys | [
"PublicKeys",
"returns",
"all",
"the",
"public",
"keys"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1045-L1051 |
150,770 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ConvertToken | func (m *tokenManager) ConvertToken(oauthToken oauth2.Token) (*TokenSet, error) {
tokenSet := &TokenSet{
AccessToken: &oauthToken.AccessToken,
RefreshToken: &oauthToken.RefreshToken,
TokenType: &oauthToken.TokenType,
}
var err error
tokenSet.ExpiresIn, err = m.extraInt(oauthToken, "expires_in")
if err != nil {
return nil, err
}
tokenSet.RefreshExpiresIn, err = m.extraInt(oauthToken, "refresh_expires_in")
if err != nil {
return nil, err
}
tokenSet.NotBeforePolicy, err = m.extraInt(oauthToken, "not_before_policy")
if err != nil {
return nil, err
}
return tokenSet, nil
} | go | func (m *tokenManager) ConvertToken(oauthToken oauth2.Token) (*TokenSet, error) {
tokenSet := &TokenSet{
AccessToken: &oauthToken.AccessToken,
RefreshToken: &oauthToken.RefreshToken,
TokenType: &oauthToken.TokenType,
}
var err error
tokenSet.ExpiresIn, err = m.extraInt(oauthToken, "expires_in")
if err != nil {
return nil, err
}
tokenSet.RefreshExpiresIn, err = m.extraInt(oauthToken, "refresh_expires_in")
if err != nil {
return nil, err
}
tokenSet.NotBeforePolicy, err = m.extraInt(oauthToken, "not_before_policy")
if err != nil {
return nil, err
}
return tokenSet, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"ConvertToken",
"(",
"oauthToken",
"oauth2",
".",
"Token",
")",
"(",
"*",
"TokenSet",
",",
"error",
")",
"{",
"tokenSet",
":=",
"&",
"TokenSet",
"{",
"AccessToken",
":",
"&",
"oauthToken",
".",
"AccessToken",
"... | // ConvertToken converts the oauth2.Token to a token set | [
"ConvertToken",
"converts",
"the",
"oauth2",
".",
"Token",
"to",
"a",
"token",
"set"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1054-L1077 |
150,771 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | ConvertTokenSet | func (m *tokenManager) ConvertTokenSet(tokenSet TokenSet) *oauth2.Token {
var accessToken, refreshToken, tokenType string
extra := make(map[string]interface{})
if tokenSet.AccessToken != nil {
accessToken = *tokenSet.AccessToken
}
if tokenSet.RefreshToken != nil {
refreshToken = *tokenSet.RefreshToken
}
if tokenSet.TokenType != nil {
tokenType = *tokenSet.TokenType
}
var expire time.Time
if tokenSet.ExpiresIn != nil {
expire = time.Now().Add(time.Duration(*tokenSet.ExpiresIn) * time.Second)
extra["expires_in"] = *tokenSet.ExpiresIn
}
if tokenSet.RefreshExpiresIn != nil {
extra["refresh_expires_in"] = *tokenSet.RefreshExpiresIn
}
if tokenSet.NotBeforePolicy != nil {
extra["not_before_policy"] = *tokenSet.NotBeforePolicy
}
oauth2Token := &oauth2.Token{
AccessToken: accessToken,
RefreshToken: refreshToken,
TokenType: tokenType,
Expiry: expire,
}
oauth2Token = oauth2Token.WithExtra(extra)
return oauth2Token
} | go | func (m *tokenManager) ConvertTokenSet(tokenSet TokenSet) *oauth2.Token {
var accessToken, refreshToken, tokenType string
extra := make(map[string]interface{})
if tokenSet.AccessToken != nil {
accessToken = *tokenSet.AccessToken
}
if tokenSet.RefreshToken != nil {
refreshToken = *tokenSet.RefreshToken
}
if tokenSet.TokenType != nil {
tokenType = *tokenSet.TokenType
}
var expire time.Time
if tokenSet.ExpiresIn != nil {
expire = time.Now().Add(time.Duration(*tokenSet.ExpiresIn) * time.Second)
extra["expires_in"] = *tokenSet.ExpiresIn
}
if tokenSet.RefreshExpiresIn != nil {
extra["refresh_expires_in"] = *tokenSet.RefreshExpiresIn
}
if tokenSet.NotBeforePolicy != nil {
extra["not_before_policy"] = *tokenSet.NotBeforePolicy
}
oauth2Token := &oauth2.Token{
AccessToken: accessToken,
RefreshToken: refreshToken,
TokenType: tokenType,
Expiry: expire,
}
oauth2Token = oauth2Token.WithExtra(extra)
return oauth2Token
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"ConvertTokenSet",
"(",
"tokenSet",
"TokenSet",
")",
"*",
"oauth2",
".",
"Token",
"{",
"var",
"accessToken",
",",
"refreshToken",
",",
"tokenType",
"string",
"\n",
"extra",
":=",
"make",
"(",
"map",
"[",
"string"... | // ConvertTokenSet converts the token set to oauth2.Token | [
"ConvertTokenSet",
"converts",
"the",
"token",
"set",
"to",
"oauth2",
".",
"Token"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1080-L1113 |
150,772 | fabric8-services/fabric8-auth | authorization/token/manager/token_manager.go | loadPrivateKey | func (m *tokenManager) loadPrivateKey(tm *tokenManager, key []byte, kid string, deprecatedKey []byte, deprecatedKid string) (*token.PrivateKey, error) {
if len(key) == 0 || kid == "" {
log.Error(nil, map[string]interface{}{
"kid": kid,
"key_length": len(key),
}, "private key or its ID are not set up")
return nil, errors.New("private key or its ID are not set up")
}
// Load the private key. Extract the public key from it
rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(key)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to parse private key")
return nil, err
}
privateKey := &token.PrivateKey{KeyID: kid, Key: rsaServiceAccountKey}
pk := &rsaServiceAccountKey.PublicKey
tm.publicKeysMap[kid] = pk
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: pk})
log.Info(nil, map[string]interface{}{"kid": kid}, "public key added")
// Extract public key from the deprecated key if any and add it to the manager
if len(deprecatedKey) == 0 || deprecatedKid == "" {
log.Debug(nil, map[string]interface{}{
"kid": deprecatedKid,
"key_length": len(deprecatedKey),
}, "no deprecated private key found")
} else {
rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(deprecatedKey)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to parse deprecated private key")
return nil, err
}
pk := &rsaServiceAccountKey.PublicKey
tm.publicKeysMap[deprecatedKid] = pk
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: deprecatedKid, Key: pk})
log.Info(nil, map[string]interface{}{"kid": deprecatedKid}, "deprecated public key added")
}
return privateKey, nil
} | go | func (m *tokenManager) loadPrivateKey(tm *tokenManager, key []byte, kid string, deprecatedKey []byte, deprecatedKid string) (*token.PrivateKey, error) {
if len(key) == 0 || kid == "" {
log.Error(nil, map[string]interface{}{
"kid": kid,
"key_length": len(key),
}, "private key or its ID are not set up")
return nil, errors.New("private key or its ID are not set up")
}
// Load the private key. Extract the public key from it
rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(key)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to parse private key")
return nil, err
}
privateKey := &token.PrivateKey{KeyID: kid, Key: rsaServiceAccountKey}
pk := &rsaServiceAccountKey.PublicKey
tm.publicKeysMap[kid] = pk
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: pk})
log.Info(nil, map[string]interface{}{"kid": kid}, "public key added")
// Extract public key from the deprecated key if any and add it to the manager
if len(deprecatedKey) == 0 || deprecatedKid == "" {
log.Debug(nil, map[string]interface{}{
"kid": deprecatedKid,
"key_length": len(deprecatedKey),
}, "no deprecated private key found")
} else {
rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(deprecatedKey)
if err != nil {
log.Error(nil, map[string]interface{}{"err": err}, "unable to parse deprecated private key")
return nil, err
}
pk := &rsaServiceAccountKey.PublicKey
tm.publicKeysMap[deprecatedKid] = pk
tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: deprecatedKid, Key: pk})
log.Info(nil, map[string]interface{}{"kid": deprecatedKid}, "deprecated public key added")
}
return privateKey, nil
} | [
"func",
"(",
"m",
"*",
"tokenManager",
")",
"loadPrivateKey",
"(",
"tm",
"*",
"tokenManager",
",",
"key",
"[",
"]",
"byte",
",",
"kid",
"string",
",",
"deprecatedKey",
"[",
"]",
"byte",
",",
"deprecatedKid",
"string",
")",
"(",
"*",
"token",
".",
"Priv... | // LoadPrivateKey loads a private key and a deprecated private key.
// Extracts public keys from them and adds them to the manager
// Returns the loaded private key. | [
"LoadPrivateKey",
"loads",
"a",
"private",
"key",
"and",
"a",
"deprecated",
"private",
"key",
".",
"Extracts",
"public",
"keys",
"from",
"them",
"and",
"adds",
"them",
"to",
"the",
"manager",
"Returns",
"the",
"loaded",
"private",
"key",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1152-L1191 |
150,773 | fabric8-services/fabric8-auth | cluster/factory/cluster_cache_factory.go | NewClusterCacheFactory | func NewClusterCacheFactory(context servicecontext.ServiceContext, config ClusterCacheFactoryConfiguration) service.ClusterCacheFactory {
factory := &clusterCacheFactoryImpl{
BaseService: base.NewBaseService(context),
config: config,
}
return factory
} | go | func NewClusterCacheFactory(context servicecontext.ServiceContext, config ClusterCacheFactoryConfiguration) service.ClusterCacheFactory {
factory := &clusterCacheFactoryImpl{
BaseService: base.NewBaseService(context),
config: config,
}
return factory
} | [
"func",
"NewClusterCacheFactory",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
",",
"config",
"ClusterCacheFactoryConfiguration",
")",
"service",
".",
"ClusterCacheFactory",
"{",
"factory",
":=",
"&",
"clusterCacheFactoryImpl",
"{",
"BaseService",
":",
"base",... | // NewClusterCacheFactory returns the default cluster cache factory. | [
"NewClusterCacheFactory",
"returns",
"the",
"default",
"cluster",
"cache",
"factory",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/cluster/factory/cluster_cache_factory.go#L23-L29 |
150,774 | fabric8-services/fabric8-auth | cluster/factory/cluster_cache_factory.go | NewClusterCache | func (f *clusterCacheFactoryImpl) NewClusterCache(ctx context.Context, options ...rest.HTTPClientOption) cluster.ClusterCache {
return clusterservice.NewCache(f.config, options...)
} | go | func (f *clusterCacheFactoryImpl) NewClusterCache(ctx context.Context, options ...rest.HTTPClientOption) cluster.ClusterCache {
return clusterservice.NewCache(f.config, options...)
} | [
"func",
"(",
"f",
"*",
"clusterCacheFactoryImpl",
")",
"NewClusterCache",
"(",
"ctx",
"context",
".",
"Context",
",",
"options",
"...",
"rest",
".",
"HTTPClientOption",
")",
"cluster",
".",
"ClusterCache",
"{",
"return",
"clusterservice",
".",
"NewCache",
"(",
... | // NewClusterCache creates a new cluster cache | [
"NewClusterCache",
"creates",
"a",
"new",
"cluster",
"cache"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/cluster/factory/cluster_cache_factory.go#L37-L39 |
150,775 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | NewAuthenticationProviderService | func NewAuthenticationProviderService(ctx servicecontext.ServiceContext, config AuthenticationProviderServiceConfig) service.AuthenticationProviderService {
return &authenticationProviderServiceImpl{
BaseService: base.NewBaseService(ctx),
config: config,
}
} | go | func NewAuthenticationProviderService(ctx servicecontext.ServiceContext, config AuthenticationProviderServiceConfig) service.AuthenticationProviderService {
return &authenticationProviderServiceImpl{
BaseService: base.NewBaseService(ctx),
config: config,
}
} | [
"func",
"NewAuthenticationProviderService",
"(",
"ctx",
"servicecontext",
".",
"ServiceContext",
",",
"config",
"AuthenticationProviderServiceConfig",
")",
"service",
".",
"AuthenticationProviderService",
"{",
"return",
"&",
"authenticationProviderServiceImpl",
"{",
"BaseServic... | // NewAuthenticationProviderService returns a new AuthenticationProviderService implementation | [
"NewAuthenticationProviderService",
"returns",
"a",
"new",
"AuthenticationProviderService",
"implementation"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L53-L58 |
150,776 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | LoginCallback | func (s *authenticationProviderServiceImpl) LoginCallback(ctx context.Context, state string, code string, redirectURL string) (*string, error) {
// After redirect from oauth provider
log.Debug(ctx, map[string]interface{}{
"code": code,
"state": state,
}, "Redirected from oauth provider")
referrerURL, _, err := s.reclaimReferrerAndResponseMode(ctx, state, code)
if err != nil {
return nil, err
}
providerToken, err := s.ExchangeCodeWithProvider(ctx, code, redirectURL)
if err != nil {
redirect := referrerURL.String() + "?error=" + url.QueryEscape(err.Error())
return &redirect, err
}
redirectTo, _, err := s.CreateOrUpdateIdentityAndUser(ctx, referrerURL, providerToken)
if err != nil {
return nil, err
}
if redirectTo != nil {
return redirectTo, nil
}
redirect := referrerURL.String()
return &redirect, nil
} | go | func (s *authenticationProviderServiceImpl) LoginCallback(ctx context.Context, state string, code string, redirectURL string) (*string, error) {
// After redirect from oauth provider
log.Debug(ctx, map[string]interface{}{
"code": code,
"state": state,
}, "Redirected from oauth provider")
referrerURL, _, err := s.reclaimReferrerAndResponseMode(ctx, state, code)
if err != nil {
return nil, err
}
providerToken, err := s.ExchangeCodeWithProvider(ctx, code, redirectURL)
if err != nil {
redirect := referrerURL.String() + "?error=" + url.QueryEscape(err.Error())
return &redirect, err
}
redirectTo, _, err := s.CreateOrUpdateIdentityAndUser(ctx, referrerURL, providerToken)
if err != nil {
return nil, err
}
if redirectTo != nil {
return redirectTo, nil
}
redirect := referrerURL.String()
return &redirect, nil
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"LoginCallback",
"(",
"ctx",
"context",
".",
"Context",
",",
"state",
"string",
",",
"code",
"string",
",",
"redirectURL",
"string",
")",
"(",
"*",
"string",
",",
"error",
")",
"{",
"// After r... | // LoginCallback is invoked after the client has visited the authentication provider and state and code values are returned.
// These two parameters will be exchanged with the authentication provider for an access token, which will then be
// returned to the client. | [
"LoginCallback",
"is",
"invoked",
"after",
"the",
"client",
"has",
"visited",
"the",
"authentication",
"provider",
"and",
"state",
"and",
"code",
"values",
"are",
"returned",
".",
"These",
"two",
"parameters",
"will",
"be",
"exchanged",
"with",
"the",
"authentic... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L121-L151 |
150,777 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | ExchangeCodeWithProvider | func (s *authenticationProviderServiceImpl) ExchangeCodeWithProvider(ctx context.Context, code string, redirectURL string) (*oauth2.Token, error) {
// Exchange the code for an access token
provider := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config)
provider.SetRedirectURL(redirectURL)
token, err := provider.Exchange(ctx, code)
if err != nil {
log.Error(ctx, map[string]interface{}{
"code": code,
"err": err,
"redirect_url": redirectURL,
}, "oauth exchange operation failed")
return nil, autherrors.NewUnauthorizedError(err.Error())
}
log.Debug(ctx, map[string]interface{}{
"code": code,
}, "exchanged code to access token")
return token, nil
} | go | func (s *authenticationProviderServiceImpl) ExchangeCodeWithProvider(ctx context.Context, code string, redirectURL string) (*oauth2.Token, error) {
// Exchange the code for an access token
provider := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config)
provider.SetRedirectURL(redirectURL)
token, err := provider.Exchange(ctx, code)
if err != nil {
log.Error(ctx, map[string]interface{}{
"code": code,
"err": err,
"redirect_url": redirectURL,
}, "oauth exchange operation failed")
return nil, autherrors.NewUnauthorizedError(err.Error())
}
log.Debug(ctx, map[string]interface{}{
"code": code,
}, "exchanged code to access token")
return token, nil
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"ExchangeCodeWithProvider",
"(",
"ctx",
"context",
".",
"Context",
",",
"code",
"string",
",",
"redirectURL",
"string",
")",
"(",
"*",
"oauth2",
".",
"Token",
",",
"error",
")",
"{",
"// Exchange... | // Exchange exchanges the given code for OAuth2 token with the Authentication provider | [
"Exchange",
"exchanges",
"the",
"given",
"code",
"for",
"OAuth2",
"token",
"with",
"the",
"Authentication",
"provider"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L234-L254 |
150,778 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | UpdateIdentityUsingUserInfoEndPoint | func (s *authenticationProviderServiceImpl) UpdateIdentityUsingUserInfoEndPoint(ctx context.Context, accessToken string) (*account.Identity, error) {
userProfile, err := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config).Profile(ctx, oauth2.Token{AccessToken: accessToken})
if err != nil {
log.Error(ctx, map[string]interface{}{
"token": accessToken,
"err": err,
}, "unable to get user profile")
return nil, errors.New("unable to get user profile " + err.Error())
}
// Set the user profile's username in the context
profileCtx := ctx.Value(provider.UserProfileContextKey)
if pCtx, ok := profileCtx.(*provider.UserProfileContext); ok {
pCtx.Username = &userProfile.Username
}
identity := &account.Identity{}
identities, err := s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser())
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "unable to query for an identity by username")
return nil, errs.Wrapf(err, "error during querying for an identity by ID")
}
if len(identities) == 0 {
return nil, autherrors.NewUnauthorizedError(fmt.Sprintf("user '%s' is not approved", userProfile.Username))
}
identity = &identities[0]
// we had done a
// s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser())
// so, identity.user should have been populated.
if identity.User.ID == uuid.Nil {
log.Error(ctx, map[string]interface{}{
"identity_id": identity.ID,
}, "token identity is not linked to any user")
return nil, errors.New("token identity is not linked to any user")
}
if !identity.RegistrationCompleted {
err = fillUserFromUserInfo(*userProfile, identity)
if err != nil {
return nil, autherrors.NewInternalError(ctx, err)
}
identity.RegistrationCompleted = true
err = s.ExecuteInTransaction(func() error {
// Using the old-fashioned service
err := s.Repositories().Identities().Save(ctx, identity)
if err != nil {
return err
}
err = s.Repositories().Users().Save(ctx, &identity.User)
if err != nil {
return err
}
return nil
})
}
return identity, err
} | go | func (s *authenticationProviderServiceImpl) UpdateIdentityUsingUserInfoEndPoint(ctx context.Context, accessToken string) (*account.Identity, error) {
userProfile, err := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config).Profile(ctx, oauth2.Token{AccessToken: accessToken})
if err != nil {
log.Error(ctx, map[string]interface{}{
"token": accessToken,
"err": err,
}, "unable to get user profile")
return nil, errors.New("unable to get user profile " + err.Error())
}
// Set the user profile's username in the context
profileCtx := ctx.Value(provider.UserProfileContextKey)
if pCtx, ok := profileCtx.(*provider.UserProfileContext); ok {
pCtx.Username = &userProfile.Username
}
identity := &account.Identity{}
identities, err := s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser())
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "unable to query for an identity by username")
return nil, errs.Wrapf(err, "error during querying for an identity by ID")
}
if len(identities) == 0 {
return nil, autherrors.NewUnauthorizedError(fmt.Sprintf("user '%s' is not approved", userProfile.Username))
}
identity = &identities[0]
// we had done a
// s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser())
// so, identity.user should have been populated.
if identity.User.ID == uuid.Nil {
log.Error(ctx, map[string]interface{}{
"identity_id": identity.ID,
}, "token identity is not linked to any user")
return nil, errors.New("token identity is not linked to any user")
}
if !identity.RegistrationCompleted {
err = fillUserFromUserInfo(*userProfile, identity)
if err != nil {
return nil, autherrors.NewInternalError(ctx, err)
}
identity.RegistrationCompleted = true
err = s.ExecuteInTransaction(func() error {
// Using the old-fashioned service
err := s.Repositories().Identities().Save(ctx, identity)
if err != nil {
return err
}
err = s.Repositories().Users().Save(ctx, &identity.User)
if err != nil {
return err
}
return nil
})
}
return identity, err
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"UpdateIdentityUsingUserInfoEndPoint",
"(",
"ctx",
"context",
".",
"Context",
",",
"accessToken",
"string",
")",
"(",
"*",
"account",
".",
"Identity",
",",
"error",
")",
"{",
"userProfile",
",",
"e... | // UpdateIdentityFromExistingIdentityInfo update identity if exists using profile information and returns updated identity. | [
"UpdateIdentityFromExistingIdentityInfo",
"update",
"identity",
"if",
"exists",
"using",
"profile",
"information",
"and",
"returns",
"updated",
"identity",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L378-L441 |
150,779 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | SaveReferrer | func (s *authenticationProviderServiceImpl) SaveReferrer(ctx context.Context, state string, referrer string,
responseMode *string, validReferrerURL string) error {
matched, err := regexp.MatchString(validReferrerURL, referrer)
if err != nil {
log.Error(ctx, map[string]interface{}{
"referrer": referrer,
"valid_referrer_url": validReferrerURL,
"err": err,
}, "Can't match referrer and whitelist regex")
return err
}
if !matched {
log.Error(ctx, map[string]interface{}{
"referrer": referrer,
"valid_referrer_url": validReferrerURL,
}, "Referrer not valid")
return autherrors.NewBadParameterError("redirect", "not valid redirect URL")
}
// TODO The state reference table will be collecting dead states left from some failed login attempts.
// We need to clean up the old states from time to time.
ref := providerrepo.OauthStateReference{
State: state,
Referrer: referrer,
ResponseMode: responseMode,
}
err = s.ExecuteInTransaction(func() error {
_, err := s.Repositories().OauthStates().Create(ctx, &ref)
return err
})
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"referrer": referrer,
"response_mode": log.PointerToString(responseMode),
"err": err,
}, "unable to create oauth state reference")
return err
}
return nil
} | go | func (s *authenticationProviderServiceImpl) SaveReferrer(ctx context.Context, state string, referrer string,
responseMode *string, validReferrerURL string) error {
matched, err := regexp.MatchString(validReferrerURL, referrer)
if err != nil {
log.Error(ctx, map[string]interface{}{
"referrer": referrer,
"valid_referrer_url": validReferrerURL,
"err": err,
}, "Can't match referrer and whitelist regex")
return err
}
if !matched {
log.Error(ctx, map[string]interface{}{
"referrer": referrer,
"valid_referrer_url": validReferrerURL,
}, "Referrer not valid")
return autherrors.NewBadParameterError("redirect", "not valid redirect URL")
}
// TODO The state reference table will be collecting dead states left from some failed login attempts.
// We need to clean up the old states from time to time.
ref := providerrepo.OauthStateReference{
State: state,
Referrer: referrer,
ResponseMode: responseMode,
}
err = s.ExecuteInTransaction(func() error {
_, err := s.Repositories().OauthStates().Create(ctx, &ref)
return err
})
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"referrer": referrer,
"response_mode": log.PointerToString(responseMode),
"err": err,
}, "unable to create oauth state reference")
return err
}
return nil
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"SaveReferrer",
"(",
"ctx",
"context",
".",
"Context",
",",
"state",
"string",
",",
"referrer",
"string",
",",
"responseMode",
"*",
"string",
",",
"validReferrerURL",
"string",
")",
"error",
"{",
... | // SaveReferrer validates referrer and saves it in DB | [
"SaveReferrer",
"validates",
"referrer",
"and",
"saves",
"it",
"in",
"DB"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L466-L508 |
150,780 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | LoadReferrerAndResponseMode | func (s *authenticationProviderServiceImpl) LoadReferrerAndResponseMode(ctx context.Context, state string) (string, *string, error) {
var referrer string
var responseMode *string
err := s.ExecuteInTransaction(func() error {
ref, err := s.Repositories().OauthStates().Load(ctx, state)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unable to load oauth state reference")
return err
}
referrer = ref.Referrer
responseMode = ref.ResponseMode
err = s.Repositories().OauthStates().Delete(ctx, ref.ID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unable to delete oauth state reference")
return err
}
return nil
})
if err != nil {
return "", nil, err
}
return referrer, responseMode, nil
} | go | func (s *authenticationProviderServiceImpl) LoadReferrerAndResponseMode(ctx context.Context, state string) (string, *string, error) {
var referrer string
var responseMode *string
err := s.ExecuteInTransaction(func() error {
ref, err := s.Repositories().OauthStates().Load(ctx, state)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unable to load oauth state reference")
return err
}
referrer = ref.Referrer
responseMode = ref.ResponseMode
err = s.Repositories().OauthStates().Delete(ctx, ref.ID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unable to delete oauth state reference")
return err
}
return nil
})
if err != nil {
return "", nil, err
}
return referrer, responseMode, nil
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"LoadReferrerAndResponseMode",
"(",
"ctx",
"context",
".",
"Context",
",",
"state",
"string",
")",
"(",
"string",
",",
"*",
"string",
",",
"error",
")",
"{",
"var",
"referrer",
"string",
"\n",
... | // LoadReferrerAndResponseMode loads referrer and responseMode from DB | [
"LoadReferrerAndResponseMode",
"loads",
"referrer",
"and",
"responseMode",
"from",
"DB"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L511-L541 |
150,781 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | reclaimReferrerAndResponseMode | func (s *authenticationProviderServiceImpl) reclaimReferrerAndResponseMode(ctx context.Context, state string, code string) (*url.URL, *string, error) {
knownReferrer, responseMode, err := s.LoadReferrerAndResponseMode(ctx, state)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unknown state")
return nil, nil, autherrors.NewUnauthorizedError("unknown state: " + err.Error())
}
referrerURL, err := url.Parse(knownReferrer)
if err != nil {
log.Error(ctx, map[string]interface{}{
"code": code,
"state": state,
"known_referrer": knownReferrer,
"err": err,
}, "failed to parse referrer")
return nil, nil, autherrors.NewInternalError(ctx, err)
}
log.Debug(ctx, map[string]interface{}{
"code": code,
"state": state,
"known_referrer": knownReferrer,
"response_mode": responseMode,
}, "referrer found")
return referrerURL, responseMode, nil
} | go | func (s *authenticationProviderServiceImpl) reclaimReferrerAndResponseMode(ctx context.Context, state string, code string) (*url.URL, *string, error) {
knownReferrer, responseMode, err := s.LoadReferrerAndResponseMode(ctx, state)
if err != nil {
log.Error(ctx, map[string]interface{}{
"state": state,
"err": err,
}, "unknown state")
return nil, nil, autherrors.NewUnauthorizedError("unknown state: " + err.Error())
}
referrerURL, err := url.Parse(knownReferrer)
if err != nil {
log.Error(ctx, map[string]interface{}{
"code": code,
"state": state,
"known_referrer": knownReferrer,
"err": err,
}, "failed to parse referrer")
return nil, nil, autherrors.NewInternalError(ctx, err)
}
log.Debug(ctx, map[string]interface{}{
"code": code,
"state": state,
"known_referrer": knownReferrer,
"response_mode": responseMode,
}, "referrer found")
return referrerURL, responseMode, nil
} | [
"func",
"(",
"s",
"*",
"authenticationProviderServiceImpl",
")",
"reclaimReferrerAndResponseMode",
"(",
"ctx",
"context",
".",
"Context",
",",
"state",
"string",
",",
"code",
"string",
")",
"(",
"*",
"url",
".",
"URL",
",",
"*",
"string",
",",
"error",
")",
... | // reclaimReferrer reclaims referrerURL and verifies the state | [
"reclaimReferrer",
"reclaims",
"referrerURL",
"and",
"verifies",
"the",
"state"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L544-L572 |
150,782 | fabric8-services/fabric8-auth | authentication/provider/service/authentication_provider_service.go | TokenToJSON | func TokenToJSON(ctx context.Context, outhToken *oauth2.Token) (string, error) {
str := outhToken.Extra("expires_in")
var expiresIn interface{}
var refreshExpiresIn interface{}
var err error
expiresIn, err = manager.NumberToInt(str)
if err != nil {
log.Error(ctx, map[string]interface{}{
"expires_in": str,
"err": err,
}, "unable to parse expires_in claim")
return "", errs.WithStack(err)
}
str = outhToken.Extra("refresh_expires_in")
refreshExpiresIn, err = manager.NumberToInt(str)
if err != nil {
log.Error(ctx, map[string]interface{}{
"refresh_expires_in": str,
"err": err,
}, "unable to parse expires_in claim")
return "", errs.WithStack(err)
}
tokenData := &app.TokenData{
AccessToken: &outhToken.AccessToken,
RefreshToken: &outhToken.RefreshToken,
TokenType: &outhToken.TokenType,
ExpiresIn: &expiresIn,
RefreshExpiresIn: &refreshExpiresIn,
}
b, err := json.Marshal(tokenData)
if err != nil {
return "", errs.WithStack(err)
}
return string(b), nil
} | go | func TokenToJSON(ctx context.Context, outhToken *oauth2.Token) (string, error) {
str := outhToken.Extra("expires_in")
var expiresIn interface{}
var refreshExpiresIn interface{}
var err error
expiresIn, err = manager.NumberToInt(str)
if err != nil {
log.Error(ctx, map[string]interface{}{
"expires_in": str,
"err": err,
}, "unable to parse expires_in claim")
return "", errs.WithStack(err)
}
str = outhToken.Extra("refresh_expires_in")
refreshExpiresIn, err = manager.NumberToInt(str)
if err != nil {
log.Error(ctx, map[string]interface{}{
"refresh_expires_in": str,
"err": err,
}, "unable to parse expires_in claim")
return "", errs.WithStack(err)
}
tokenData := &app.TokenData{
AccessToken: &outhToken.AccessToken,
RefreshToken: &outhToken.RefreshToken,
TokenType: &outhToken.TokenType,
ExpiresIn: &expiresIn,
RefreshExpiresIn: &refreshExpiresIn,
}
b, err := json.Marshal(tokenData)
if err != nil {
return "", errs.WithStack(err)
}
return string(b), nil
} | [
"func",
"TokenToJSON",
"(",
"ctx",
"context",
".",
"Context",
",",
"outhToken",
"*",
"oauth2",
".",
"Token",
")",
"(",
"string",
",",
"error",
")",
"{",
"str",
":=",
"outhToken",
".",
"Extra",
"(",
"\"",
"\"",
")",
"\n",
"var",
"expiresIn",
"interface"... | // TokenToJSON marshals an oauth2 token to a json string | [
"TokenToJSON",
"marshals",
"an",
"oauth2",
"token",
"to",
"a",
"json",
"string"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L592-L627 |
150,783 | fabric8-services/fabric8-auth | authorization/resource/repository/resource.go | NewResourceRepository | func NewResourceRepository(db *gorm.DB) ResourceRepository {
return &GormResourceRepository{db: db, resourceTypeRepo: resourcetype.NewResourceTypeRepository(db)}
} | go | func NewResourceRepository(db *gorm.DB) ResourceRepository {
return &GormResourceRepository{db: db, resourceTypeRepo: resourcetype.NewResourceTypeRepository(db)}
} | [
"func",
"NewResourceRepository",
"(",
"db",
"*",
"gorm",
".",
"DB",
")",
"ResourceRepository",
"{",
"return",
"&",
"GormResourceRepository",
"{",
"db",
":",
"db",
",",
"resourceTypeRepo",
":",
"resourcetype",
".",
"NewResourceTypeRepository",
"(",
"db",
")",
"}"... | // NewResourceRepository creates a new storage type. | [
"NewResourceRepository",
"creates",
"a",
"new",
"storage",
"type",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/resource/repository/resource.go#L55-L57 |
150,784 | fabric8-services/fabric8-auth | authorization/resource/repository/resource.go | LoadChildren | func (m *GormResourceRepository) LoadChildren(ctx context.Context, id string) ([]Resource, error) {
defer goa.MeasureSince([]string{"goa", "db", "resource", "loadChildren"}, time.Now())
var rows []Resource
err := m.db.Model(&Resource{}).Preload("ResourceType").Where("parent_resource_id = ?", id).Find(&rows).Error
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return rows, nil
} | go | func (m *GormResourceRepository) LoadChildren(ctx context.Context, id string) ([]Resource, error) {
defer goa.MeasureSince([]string{"goa", "db", "resource", "loadChildren"}, time.Now())
var rows []Resource
err := m.db.Model(&Resource{}).Preload("ResourceType").Where("parent_resource_id = ?", id).Find(&rows).Error
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return rows, nil
} | [
"func",
"(",
"m",
"*",
"GormResourceRepository",
")",
"LoadChildren",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"string",
")",
"(",
"[",
"]",
"Resource",
",",
"error",
")",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"[",
"]",
"string",
"{",... | // LoadChildren returns direct children resources of the given resource or an empty array if no children found | [
"LoadChildren",
"returns",
"direct",
"children",
"resources",
"of",
"the",
"given",
"resource",
"or",
"an",
"empty",
"array",
"if",
"no",
"children",
"found"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/resource/repository/resource.go#L92-L101 |
150,785 | fabric8-services/fabric8-auth | controller/team.go | NewTeamController | func NewTeamController(service *goa.Service, app application.Application) *TeamController {
return &TeamController{Controller: service.NewController("TeamController"), app: app}
} | go | func NewTeamController(service *goa.Service, app application.Application) *TeamController {
return &TeamController{Controller: service.NewController("TeamController"), app: app}
} | [
"func",
"NewTeamController",
"(",
"service",
"*",
"goa",
".",
"Service",
",",
"app",
"application",
".",
"Application",
")",
"*",
"TeamController",
"{",
"return",
"&",
"TeamController",
"{",
"Controller",
":",
"service",
".",
"NewController",
"(",
"\"",
"\"",
... | // NewTeamController creates a team controller. | [
"NewTeamController",
"creates",
"a",
"team",
"controller",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/team.go#L23-L25 |
150,786 | fabric8-services/fabric8-auth | controller/resource.go | NewResourceController | func NewResourceController(service *goa.Service, app application.Application) *ResourceController {
return &ResourceController{Controller: service.NewController("ResourceController"), app: app}
} | go | func NewResourceController(service *goa.Service, app application.Application) *ResourceController {
return &ResourceController{Controller: service.NewController("ResourceController"), app: app}
} | [
"func",
"NewResourceController",
"(",
"service",
"*",
"goa",
".",
"Service",
",",
"app",
"application",
".",
"Application",
")",
"*",
"ResourceController",
"{",
"return",
"&",
"ResourceController",
"{",
"Controller",
":",
"service",
".",
"NewController",
"(",
"\... | // NewResourceController creates a resource controller. | [
"NewResourceController",
"creates",
"a",
"resource",
"controller",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L23-L25 |
150,787 | fabric8-services/fabric8-auth | controller/resource.go | Show | func (c *ResourceController) Show(ctx *app.ShowResourceContext) error {
if !token.IsServiceAccount(ctx) {
log.Error(ctx, map[string]interface{}{}, "Unable to read resource. Not a service account")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account"))
}
svc := c.app.ResourceService()
res, err := svc.Read(ctx, ctx.ResourceID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"resource_id": ctx.ResourceID,
}, "unable to read resource")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(res)
} | go | func (c *ResourceController) Show(ctx *app.ShowResourceContext) error {
if !token.IsServiceAccount(ctx) {
log.Error(ctx, map[string]interface{}{}, "Unable to read resource. Not a service account")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account"))
}
svc := c.app.ResourceService()
res, err := svc.Read(ctx, ctx.ResourceID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"resource_id": ctx.ResourceID,
}, "unable to read resource")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(res)
} | [
"func",
"(",
"c",
"*",
"ResourceController",
")",
"Show",
"(",
"ctx",
"*",
"app",
".",
"ShowResourceContext",
")",
"error",
"{",
"if",
"!",
"token",
".",
"IsServiceAccount",
"(",
"ctx",
")",
"{",
"log",
".",
"Error",
"(",
"ctx",
",",
"map",
"[",
"str... | // Show runs the "Show" action. | [
"Show",
"runs",
"the",
"Show",
"action",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L47-L64 |
150,788 | fabric8-services/fabric8-auth | controller/resource.go | Register | func (c *ResourceController) Register(ctx *app.RegisterResourceContext) error {
if !token.IsServiceAccount(ctx) {
log.Error(ctx, map[string]interface{}{}, "Unable to register resource. Not a service account")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account"))
}
var managerIdentityID *uuid.UUID
if ctx.Payload.IdentityID != nil {
identityID, err := uuid.FromString(*ctx.Payload.IdentityID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("identityID", "incorrect identity ID"))
}
managerIdentityID = &identityID
}
svc := c.app.ResourceService()
res, err := svc.Register(ctx, ctx.Payload.Type, ctx.Payload.ResourceID, ctx.Payload.ParentResourceID, managerIdentityID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"resource_type": ctx.Payload.Type,
}, "unable to register resource")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.Created(&app.RegisterResourceResponse{ResourceID: &res.ResourceID})
} | go | func (c *ResourceController) Register(ctx *app.RegisterResourceContext) error {
if !token.IsServiceAccount(ctx) {
log.Error(ctx, map[string]interface{}{}, "Unable to register resource. Not a service account")
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account"))
}
var managerIdentityID *uuid.UUID
if ctx.Payload.IdentityID != nil {
identityID, err := uuid.FromString(*ctx.Payload.IdentityID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("identityID", "incorrect identity ID"))
}
managerIdentityID = &identityID
}
svc := c.app.ResourceService()
res, err := svc.Register(ctx, ctx.Payload.Type, ctx.Payload.ResourceID, ctx.Payload.ParentResourceID, managerIdentityID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"resource_type": ctx.Payload.Type,
}, "unable to register resource")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.Created(&app.RegisterResourceResponse{ResourceID: &res.ResourceID})
} | [
"func",
"(",
"c",
"*",
"ResourceController",
")",
"Register",
"(",
"ctx",
"*",
"app",
".",
"RegisterResourceContext",
")",
"error",
"{",
"if",
"!",
"token",
".",
"IsServiceAccount",
"(",
"ctx",
")",
"{",
"log",
".",
"Error",
"(",
"ctx",
",",
"map",
"["... | // Register runs the register action. | [
"Register",
"runs",
"the",
"register",
"action",
"."
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L67-L93 |
150,789 | fabric8-services/fabric8-auth | controller/resource.go | Scopes | func (c *ResourceController) Scopes(ctx *app.ScopesResourceContext) error {
// Load the identity from the context
currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
// Check if the resource exists
err = c.app.ResourceRepository().CheckExists(ctx, ctx.ResourceID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
// Load the scopes
pc, err := c.app.PrivilegeCacheService().CachedPrivileges(ctx, currentIdentity.ID, ctx.ResourceID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
scopes := []*app.ResourceScopes{}
for _, scope := range pc.ScopesAsArray() {
scopes = append(scopes, &app.ResourceScopes{
ID: scope,
Type: "user_resource_scope",
})
}
res := &app.ResourceScopesData{
Data: scopes,
}
return ctx.OK(res)
} | go | func (c *ResourceController) Scopes(ctx *app.ScopesResourceContext) error {
// Load the identity from the context
currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
// Check if the resource exists
err = c.app.ResourceRepository().CheckExists(ctx, ctx.ResourceID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
// Load the scopes
pc, err := c.app.PrivilegeCacheService().CachedPrivileges(ctx, currentIdentity.ID, ctx.ResourceID)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
scopes := []*app.ResourceScopes{}
for _, scope := range pc.ScopesAsArray() {
scopes = append(scopes, &app.ResourceScopes{
ID: scope,
Type: "user_resource_scope",
})
}
res := &app.ResourceScopesData{
Data: scopes,
}
return ctx.OK(res)
} | [
"func",
"(",
"c",
"*",
"ResourceController",
")",
"Scopes",
"(",
"ctx",
"*",
"app",
".",
"ScopesResourceContext",
")",
"error",
"{",
"// Load the identity from the context",
"currentIdentity",
",",
"err",
":=",
"c",
".",
"app",
".",
"UserService",
"(",
")",
".... | // Scopes runs the scopes action, which returns the available scopes for the specified resource | [
"Scopes",
"runs",
"the",
"scopes",
"action",
"which",
"returns",
"the",
"available",
"scopes",
"for",
"the",
"specified",
"resource"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L96-L129 |
150,790 | fabric8-services/fabric8-auth | authentication/provider/service/user_profile_service.go | NewUserProfileService | func NewUserProfileService(context servicecontext.ServiceContext) service.UserProfileService {
return &userProfileService{
client: http.DefaultClient,
}
} | go | func NewUserProfileService(context servicecontext.ServiceContext) service.UserProfileService {
return &userProfileService{
client: http.DefaultClient,
}
} | [
"func",
"NewUserProfileService",
"(",
"context",
"servicecontext",
".",
"ServiceContext",
")",
"service",
".",
"UserProfileService",
"{",
"return",
"&",
"userProfileService",
"{",
"client",
":",
"http",
".",
"DefaultClient",
",",
"}",
"\n",
"}"
] | // NewUserProfileService creates a new UserProfileService | [
"NewUserProfileService",
"creates",
"a",
"new",
"UserProfileService"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/user_profile_service.go#L27-L31 |
150,791 | fabric8-services/fabric8-auth | authentication/provider/service/user_profile_service.go | Get | func (s *userProfileService) Get(ctx context.Context, accessToken string, profileURL string) (*provider.OAuthUserProfileResponse, error) {
userProfileResponse := provider.OAuthUserProfileResponse{}
req, err := http.NewRequest("GET", profileURL, nil)
if err != nil {
return nil, errors.NewInternalError(ctx, err)
}
req.Header.Add("Authorization", "Bearer "+accessToken)
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Accept", "application/json, text/plain, */*")
resp, err := s.client.Do(req)
if err != nil {
log.Error(ctx, map[string]interface{}{
"user_profile_url": profileURL,
"err": err,
}, "Unable to fetch oauth user profile")
return nil, errors.NewInternalError(ctx, err)
} else if resp != nil {
defer rest.CloseResponse(resp)
}
if resp.StatusCode != http.StatusOK {
bodyString := rest.ReadBody(resp.Body)
log.Error(ctx, map[string]interface{}{
"response_status": resp.Status,
"response_body": bodyString,
"user_profile_url": profileURL,
}, "Unable to fetch oauth user profile")
if resp.StatusCode == 400 {
return nil, errors.NewUnauthorizedError(bodyString)
}
return nil, errors.NewInternalError(ctx, errs.Errorf("received a non-200 response %s while fetching oauth user profile %s", resp.Status, profileURL))
}
err = json.NewDecoder(resp.Body).Decode(&userProfileResponse)
return &userProfileResponse, err
} | go | func (s *userProfileService) Get(ctx context.Context, accessToken string, profileURL string) (*provider.OAuthUserProfileResponse, error) {
userProfileResponse := provider.OAuthUserProfileResponse{}
req, err := http.NewRequest("GET", profileURL, nil)
if err != nil {
return nil, errors.NewInternalError(ctx, err)
}
req.Header.Add("Authorization", "Bearer "+accessToken)
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Accept", "application/json, text/plain, */*")
resp, err := s.client.Do(req)
if err != nil {
log.Error(ctx, map[string]interface{}{
"user_profile_url": profileURL,
"err": err,
}, "Unable to fetch oauth user profile")
return nil, errors.NewInternalError(ctx, err)
} else if resp != nil {
defer rest.CloseResponse(resp)
}
if resp.StatusCode != http.StatusOK {
bodyString := rest.ReadBody(resp.Body)
log.Error(ctx, map[string]interface{}{
"response_status": resp.Status,
"response_body": bodyString,
"user_profile_url": profileURL,
}, "Unable to fetch oauth user profile")
if resp.StatusCode == 400 {
return nil, errors.NewUnauthorizedError(bodyString)
}
return nil, errors.NewInternalError(ctx, errs.Errorf("received a non-200 response %s while fetching oauth user profile %s", resp.Status, profileURL))
}
err = json.NewDecoder(resp.Body).Decode(&userProfileResponse)
return &userProfileResponse, err
} | [
"func",
"(",
"s",
"*",
"userProfileService",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"accessToken",
"string",
",",
"profileURL",
"string",
")",
"(",
"*",
"provider",
".",
"OAuthUserProfileResponse",
",",
"error",
")",
"{",
"userProfileResponse"... | //Get gets the user profile information from Oauth provider | [
"Get",
"gets",
"the",
"user",
"profile",
"information",
"from",
"Oauth",
"provider"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/user_profile_service.go#L34-L73 |
150,792 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | List | func (m *GormIdentityRoleRepository) List(ctx context.Context) ([]IdentityRole, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "list"}, time.Now())
var rows []IdentityRole
err := m.db.Model(&resourcetype.ResourceType{}).Find(&rows).Error
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return rows, nil
} | go | func (m *GormIdentityRoleRepository) List(ctx context.Context) ([]IdentityRole, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "list"}, time.Now())
var rows []IdentityRole
err := m.db.Model(&resourcetype.ResourceType{}).Find(&rows).Error
if err != nil && err != gorm.ErrRecordNotFound {
return nil, errs.WithStack(err)
}
return rows, nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"List",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"IdentityRole",
",",
"error",
")",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"... | // List returns all identity roles | [
"List",
"returns",
"all",
"identity",
"roles"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L217-L226 |
150,793 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindPermissions | func (m *GormIdentityRoleRepository) FindPermissions(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) ([]IdentityRole, error) {
var results []IdentityRole
err := m.db.Table(m.TableName()).Where(`deleted_at IS NULL AND identity_id IN (
SELECT
id
FROM
identities i
WHERE
id = ? /* IDENTITY_ID */
OR id IN (
WITH RECURSIVE m AS (
SELECT
member_of
FROM
membership
WHERE
member_id = ? /* IDENTITY_ID */
UNION SELECT
p.member_of
FROM
membership p INNER JOIN m ON m.member_of = p.member_id
)
SELECT member_of FROM m
)
)
AND resource_id IN (
WITH RECURSIVE m AS (
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
deleted_at IS NULL
AND resource_id = ? /* RESOURCE_ID */
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m
)
AND (role_id IN (
SELECT
r.role_id
FROM
resource res,
role r,
role_scope rs,
resource_type_scope rts
WHERE
res.resource_id = ? /* RESOURCE_ID */
AND res.deleted_at IS NULL
AND res.resource_type_id = r.resource_type_id
AND r.deleted_at IS NULL
AND r.role_id = rs.role_id
AND rs.scope_id = rts.resource_type_scope_id
AND rs.deleted_at IS NULL
AND rts.name = ? /* SCOPE */
AND rts.deleted_at IS NULL
) OR role_id IN (
SELECT DISTINCT
rl.role_id
FROM
(
WITH RECURSIVE prm AS (
SELECT
rm.from_role_id,
rm.to_role_id
FROM
role_mapping rm,
role r,
role_scope rs,
resource_type_scope rts
WHERE
rm.deleted_at IS NULL
AND rm.to_role_id = r.role_id
AND r.deleted_at IS NULL
AND r.role_id = rs.role_id
AND rs.deleted_at IS NULL
AND rs.scope_id = rts.resource_type_scope_id
AND rts.deleted_at IS NULL
AND rts.name = ? /* SCOPE */
AND rm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in the ancestor hierarchy */
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
resource_id = ? /* RESOURCE_ID */
AND deleted_at IS NULL
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m)
UNION SELECT
trm.from_role_id,
trm.to_role_id
FROM
role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id
WHERE
trm.deleted_at IS NULL
AND trm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in this role mapping's ancestor hierarchy */
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
resource_id = trm.resource_id
AND deleted_at IS NULL
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m)
)
SELECT
prm.from_role_id,
prm.to_role_id
FROM
prm) AS mappings
CROSS JOIN LATERAL (
VALUES (from_role_id), (to_role_id)
) AS rl (role_id))
)`, identityID, identityID, resourceID, resourceID, scopeName, scopeName, resourceID).Scan(&results).Error
if err != nil {
return nil, errs.WithStack(err)
}
return results, nil
} | go | func (m *GormIdentityRoleRepository) FindPermissions(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) ([]IdentityRole, error) {
var results []IdentityRole
err := m.db.Table(m.TableName()).Where(`deleted_at IS NULL AND identity_id IN (
SELECT
id
FROM
identities i
WHERE
id = ? /* IDENTITY_ID */
OR id IN (
WITH RECURSIVE m AS (
SELECT
member_of
FROM
membership
WHERE
member_id = ? /* IDENTITY_ID */
UNION SELECT
p.member_of
FROM
membership p INNER JOIN m ON m.member_of = p.member_id
)
SELECT member_of FROM m
)
)
AND resource_id IN (
WITH RECURSIVE m AS (
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
deleted_at IS NULL
AND resource_id = ? /* RESOURCE_ID */
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m
)
AND (role_id IN (
SELECT
r.role_id
FROM
resource res,
role r,
role_scope rs,
resource_type_scope rts
WHERE
res.resource_id = ? /* RESOURCE_ID */
AND res.deleted_at IS NULL
AND res.resource_type_id = r.resource_type_id
AND r.deleted_at IS NULL
AND r.role_id = rs.role_id
AND rs.scope_id = rts.resource_type_scope_id
AND rs.deleted_at IS NULL
AND rts.name = ? /* SCOPE */
AND rts.deleted_at IS NULL
) OR role_id IN (
SELECT DISTINCT
rl.role_id
FROM
(
WITH RECURSIVE prm AS (
SELECT
rm.from_role_id,
rm.to_role_id
FROM
role_mapping rm,
role r,
role_scope rs,
resource_type_scope rts
WHERE
rm.deleted_at IS NULL
AND rm.to_role_id = r.role_id
AND r.deleted_at IS NULL
AND r.role_id = rs.role_id
AND rs.deleted_at IS NULL
AND rs.scope_id = rts.resource_type_scope_id
AND rts.deleted_at IS NULL
AND rts.name = ? /* SCOPE */
AND rm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in the ancestor hierarchy */
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
resource_id = ? /* RESOURCE_ID */
AND deleted_at IS NULL
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m)
UNION SELECT
trm.from_role_id,
trm.to_role_id
FROM
role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id
WHERE
trm.deleted_at IS NULL
AND trm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in this role mapping's ancestor hierarchy */
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
resource_id = trm.resource_id
AND deleted_at IS NULL
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m)
)
SELECT
prm.from_role_id,
prm.to_role_id
FROM
prm) AS mappings
CROSS JOIN LATERAL (
VALUES (from_role_id), (to_role_id)
) AS rl (role_id))
)`, identityID, identityID, resourceID, resourceID, scopeName, scopeName, resourceID).Scan(&results).Error
if err != nil {
return nil, errs.WithStack(err)
}
return results, nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindPermissions",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
",",
"resourceID",
"string",
",",
"scopeName",
"string",
")",
"(",
"[",
"]",
"IdentityRole",
",",
"err... | // FindPermissions returns an IdentityRole array containing entries that match the specified identity, resource and scope | [
"FindPermissions",
"returns",
"an",
"IdentityRole",
"array",
"containing",
"entries",
"that",
"match",
"the",
"specified",
"identity",
"resource",
"and",
"scope"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L229-L371 |
150,794 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindIdentityRolesForIdentity | func (m *GormIdentityRoleRepository) FindIdentityRolesForIdentity(ctx context.Context, identityID uuid.UUID, resourceType *string) ([]authorization.IdentityAssociation, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "FindIdentityRolesForIdentity"}, time.Now())
associations := []authorization.IdentityAssociation{}
// query for identities in which the user is a member
q := m.db.Table(m.TableName()).
Select("identity_role.resource_id AS ResourceID, r.name AS ResourceName, role.name AS RoleName, i.id AS IdentityID, r.parent_resource_id AS ParentResourceID").
Joins("JOIN resource r ON r.resource_id = identity_role.resource_id").
Joins("LEFT JOIN identities i ON r.resource_id = i.identity_resource_id").
Joins("LEFT JOIN resource pr ON r.parent_resource_id = pr.resource_id")
// with the specified resourceType
if resourceType != nil {
q = q.Joins("JOIN resource_type rt ON r.resource_type_id = rt.resource_type_id AND rt.name = ?", resourceType)
}
q = q.Joins("JOIN role ON role.role_id = identity_role.role_id")
rows, err := q.Where(`(identity_role.identity_id = ? OR identity_role.identity_id IN (WITH RECURSIVE m AS (
SELECT member_of FROM membership WHERE member_id = ?
UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id)
SELECT member_of FROM m))`, identityID, identityID).Rows()
if err != nil {
return nil, err
}
defer rows.Close()
for rows.Next() {
var resourceID string
var resourceName string
var roleName string
var identityID uuid.UUID
var parentResourceID string
rows.Scan(&resourceID, &resourceName, &roleName, &identityID, &parentResourceID)
associations = authorization.AppendAssociation(associations, resourceID, &resourceName, &parentResourceID, &identityID, false, &roleName)
}
return associations, nil
} | go | func (m *GormIdentityRoleRepository) FindIdentityRolesForIdentity(ctx context.Context, identityID uuid.UUID, resourceType *string) ([]authorization.IdentityAssociation, error) {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "FindIdentityRolesForIdentity"}, time.Now())
associations := []authorization.IdentityAssociation{}
// query for identities in which the user is a member
q := m.db.Table(m.TableName()).
Select("identity_role.resource_id AS ResourceID, r.name AS ResourceName, role.name AS RoleName, i.id AS IdentityID, r.parent_resource_id AS ParentResourceID").
Joins("JOIN resource r ON r.resource_id = identity_role.resource_id").
Joins("LEFT JOIN identities i ON r.resource_id = i.identity_resource_id").
Joins("LEFT JOIN resource pr ON r.parent_resource_id = pr.resource_id")
// with the specified resourceType
if resourceType != nil {
q = q.Joins("JOIN resource_type rt ON r.resource_type_id = rt.resource_type_id AND rt.name = ?", resourceType)
}
q = q.Joins("JOIN role ON role.role_id = identity_role.role_id")
rows, err := q.Where(`(identity_role.identity_id = ? OR identity_role.identity_id IN (WITH RECURSIVE m AS (
SELECT member_of FROM membership WHERE member_id = ?
UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id)
SELECT member_of FROM m))`, identityID, identityID).Rows()
if err != nil {
return nil, err
}
defer rows.Close()
for rows.Next() {
var resourceID string
var resourceName string
var roleName string
var identityID uuid.UUID
var parentResourceID string
rows.Scan(&resourceID, &resourceName, &roleName, &identityID, &parentResourceID)
associations = authorization.AppendAssociation(associations, resourceID, &resourceName, &parentResourceID, &identityID, false, &roleName)
}
return associations, nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindIdentityRolesForIdentity",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
",",
"resourceType",
"*",
"string",
")",
"(",
"[",
"]",
"authorization",
".",
"IdentityAssoci... | // FindIdentityRolesForIdentity returns an IdentityAssociations describing the roles which the specified Identity has, optionally for a specified resource type | [
"FindIdentityRolesForIdentity",
"returns",
"an",
"IdentityAssociations",
"describing",
"the",
"roles",
"which",
"the",
"specified",
"Identity",
"has",
"optionally",
"for",
"a",
"specified",
"resource",
"type"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L374-L413 |
150,795 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindIdentityRolesByResourceAndRoleName | func (m *GormIdentityRoleRepository) FindIdentityRolesByResourceAndRoleName(ctx context.Context, resourceID string, roleName string, includeParenResources bool) ([]IdentityRole, error) {
if includeParenResources {
return m.findIdentityRolesByResourceAndRoleNameWithParents(ctx, resourceID, roleName)
}
return m.findIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName)
} | go | func (m *GormIdentityRoleRepository) FindIdentityRolesByResourceAndRoleName(ctx context.Context, resourceID string, roleName string, includeParenResources bool) ([]IdentityRole, error) {
if includeParenResources {
return m.findIdentityRolesByResourceAndRoleNameWithParents(ctx, resourceID, roleName)
}
return m.findIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName)
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindIdentityRolesByResourceAndRoleName",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceID",
"string",
",",
"roleName",
"string",
",",
"includeParenResources",
"bool",
")",
"(",
"[",
"]",
"IdentityRole... | // FindIdentityRolesByResourceAndRoleName returns an array of IdentityRole objects that match the specified resource and role name | [
"FindIdentityRolesByResourceAndRoleName",
"returns",
"an",
"array",
"of",
"IdentityRole",
"objects",
"that",
"match",
"the",
"specified",
"resource",
"and",
"role",
"name"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L416-L421 |
150,796 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindIdentityRolesByResource | func (m *GormIdentityRoleRepository) FindIdentityRolesByResource(ctx context.Context, resourceID string, includeParenResources bool) ([]IdentityRole, error) {
if includeParenResources {
return m.findIdentityRolesByResourceWithParents(ctx, resourceID)
}
return m.findIdentityRolesByResource(ctx, resourceID)
} | go | func (m *GormIdentityRoleRepository) FindIdentityRolesByResource(ctx context.Context, resourceID string, includeParenResources bool) ([]IdentityRole, error) {
if includeParenResources {
return m.findIdentityRolesByResourceWithParents(ctx, resourceID)
}
return m.findIdentityRolesByResource(ctx, resourceID)
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindIdentityRolesByResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceID",
"string",
",",
"includeParenResources",
"bool",
")",
"(",
"[",
"]",
"IdentityRole",
",",
"error",
")",
"{",
"if",
... | // FindIdentityRolesByResource returns an array of IdentityRole for the specified resource | [
"FindIdentityRolesByResource",
"returns",
"an",
"array",
"of",
"IdentityRole",
"for",
"the",
"specified",
"resource"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L451-L456 |
150,797 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | DeleteForIdentityAndResource | func (m *GormIdentityRoleRepository) DeleteForIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "deleteForIdentityAndResource"}, time.Now())
result := m.db.Scopes(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)).Table(m.TableName()).Delete(nil)
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"err": result.Error,
"resource_id": resourceID,
"identity_id": identityID,
}, "unable to delete identity role")
return errs.WithStack(result.Error)
}
if result.RowsAffected == 0 {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("identity_role with resource_id '%s' and identity_id '%s' not found", resourceID, identityID))
}
return nil
} | go | func (m *GormIdentityRoleRepository) DeleteForIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) error {
defer goa.MeasureSince([]string{"goa", "db", "identity_role", "deleteForIdentityAndResource"}, time.Now())
result := m.db.Scopes(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)).Table(m.TableName()).Delete(nil)
if result.Error != nil {
log.Error(ctx, map[string]interface{}{
"err": result.Error,
"resource_id": resourceID,
"identity_id": identityID,
}, "unable to delete identity role")
return errs.WithStack(result.Error)
}
if result.RowsAffected == 0 {
return errors.NewNotFoundErrorFromString(fmt.Sprintf("identity_role with resource_id '%s' and identity_id '%s' not found", resourceID, identityID))
}
return nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"DeleteForIdentityAndResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceID",
"string",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"error",
"{",
"defer",
"goa",
".",
"MeasureSince",
"(",
"... | // DeleteForIdentityAndResource deletes all IdentityRoles for the specified identity and resource
// NotFoundError returned if no identity roles found to delete | [
"DeleteForIdentityAndResource",
"deletes",
"all",
"IdentityRoles",
"for",
"the",
"specified",
"identity",
"and",
"resource",
"NotFoundError",
"returned",
"if",
"no",
"identity",
"roles",
"found",
"to",
"delete"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L498-L513 |
150,798 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindIdentityRolesByIdentityAndResource | func (m *GormIdentityRoleRepository) FindIdentityRolesByIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) ([]IdentityRole, error) {
return m.query(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID))
} | go | func (m *GormIdentityRoleRepository) FindIdentityRolesByIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) ([]IdentityRole, error) {
return m.query(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID))
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindIdentityRolesByIdentityAndResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"resourceID",
"string",
",",
"identityID",
"uuid",
".",
"UUID",
")",
"(",
"[",
"]",
"IdentityRole",
",",
"error",
")",... | // FindIdentityRolesByIdentityAndResource returns all identity roles by identity ID and resource ID | [
"FindIdentityRolesByIdentityAndResource",
"returns",
"all",
"identity",
"roles",
"by",
"identity",
"ID",
"and",
"resource",
"ID"
] | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L516-L518 |
150,799 | fabric8-services/fabric8-auth | authorization/role/repository/identity_role.go | FindScopesByIdentityAndResource | func (m *GormIdentityRoleRepository) FindScopesByIdentityAndResource(ctx context.Context, identityID uuid.UUID, resourceID string) ([]string, error) {
type Result struct {
Scope string
}
var results []Result
err := m.db.Raw(`WITH identity_resource_roles AS (
WITH identity_hierarchy AS (
WITH RECURSIVE m AS (
SELECT
member_of
FROM
membership
WHERE
member_id = ? /* IDENTITY_ID */
UNION SELECT
p.member_of
FROM
membership p INNER JOIN m ON m.member_of = p.member_id
)
SELECT
member_of AS identity_id
FROM
m
UNION SELECT
id
FROM
identities
WHERE
id = ? /* IDENTITY_ID */
),
resource_hierarchy AS (
WITH RECURSIVE m AS (
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
deleted_at IS NULL
AND resource_id = ? /* RESOURCE_ID */
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m
),
matching_roles AS (
SELECT
r.role_id
FROM
role r,
resource rs
WHERE
r.resource_type_id = rs.resource_type_id
AND r.deleted_at IS NULL
AND rs.deleted_at IS NULL
AND rs.resource_id = ? /* RESOURCE_ID */
),
role_mappings AS (
SELECT DISTINCT
frm.from_role_id,
trm.to_role_id
FROM
role_mapping frm,
role_mapping trm
WHERE
frm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND frm.deleted_at IS NULL
AND trm.deleted_at IS NULL
AND trm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND trm.to_role_id IN (SELECT role_id FROM matching_roles)
AND frm.from_role_id != trm.to_role_id
AND frm.from_role_id IN (
SELECT DISTINCT
rl.role_id
FROM (
WITH RECURSIVE prm AS (
SELECT
rm.from_role_id,
rm.to_role_id
FROM
role_mapping rm
WHERE
rm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND rm.deleted_at IS NULL
AND to_role_id = trm.to_role_id
UNION SELECT
trm.from_role_id,
trm.to_role_id
FROM
role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id
WHERE
trm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND trm.deleted_at IS NULL
)
SELECT
prm.from_role_id,
prm.to_role_id
FROM prm
) AS mappings
CROSS JOIN LATERAL (
VALUES (from_role_id), (to_role_id)
) AS rl (role_id)
)
)
SELECT
rm.to_role_id AS role_id
FROM
identity_role ir,
role_mappings rm
WHERE
ir.role_id = rm.from_role_id
AND ir.deleted_at IS NULL
AND ir.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND ir.identity_id IN (SELECT identity_id FROM identity_hierarchy)
UNION SELECT
ir2.role_id
FROM
identity_role ir2
WHERE
ir2.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND ir2.deleted_at IS NULL
AND ir2.identity_id IN (SELECT identity_id FROM identity_hierarchy)
AND ir2.role_id IN (SELECT role_id FROM matching_roles)
)
SELECT DISTINCT
rts.name AS scope
FROM
identity_resource_roles irr LEFT JOIN role_scope rs ON irr.role_id = rs.role_id
LEFT JOIN resource_type_scope rts ON rs.scope_id = rts.resource_type_scope_id`, identityID, identityID, resourceID, resourceID).Scan(&results).Error
if err != nil {
return nil, errs.WithStack(err)
}
var scopes []string
for i := range results {
scopes = append(scopes, results[i].Scope)
}
return scopes, nil
} | go | func (m *GormIdentityRoleRepository) FindScopesByIdentityAndResource(ctx context.Context, identityID uuid.UUID, resourceID string) ([]string, error) {
type Result struct {
Scope string
}
var results []Result
err := m.db.Raw(`WITH identity_resource_roles AS (
WITH identity_hierarchy AS (
WITH RECURSIVE m AS (
SELECT
member_of
FROM
membership
WHERE
member_id = ? /* IDENTITY_ID */
UNION SELECT
p.member_of
FROM
membership p INNER JOIN m ON m.member_of = p.member_id
)
SELECT
member_of AS identity_id
FROM
m
UNION SELECT
id
FROM
identities
WHERE
id = ? /* IDENTITY_ID */
),
resource_hierarchy AS (
WITH RECURSIVE m AS (
SELECT
resource_id, parent_resource_id
FROM
resource
WHERE
deleted_at IS NULL
AND resource_id = ? /* RESOURCE_ID */
UNION SELECT
p.resource_id, p.parent_resource_id
FROM
resource p INNER JOIN m ON m.parent_resource_id = p.resource_id
)
SELECT
m.resource_id
FROM
m
),
matching_roles AS (
SELECT
r.role_id
FROM
role r,
resource rs
WHERE
r.resource_type_id = rs.resource_type_id
AND r.deleted_at IS NULL
AND rs.deleted_at IS NULL
AND rs.resource_id = ? /* RESOURCE_ID */
),
role_mappings AS (
SELECT DISTINCT
frm.from_role_id,
trm.to_role_id
FROM
role_mapping frm,
role_mapping trm
WHERE
frm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND frm.deleted_at IS NULL
AND trm.deleted_at IS NULL
AND trm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND trm.to_role_id IN (SELECT role_id FROM matching_roles)
AND frm.from_role_id != trm.to_role_id
AND frm.from_role_id IN (
SELECT DISTINCT
rl.role_id
FROM (
WITH RECURSIVE prm AS (
SELECT
rm.from_role_id,
rm.to_role_id
FROM
role_mapping rm
WHERE
rm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND rm.deleted_at IS NULL
AND to_role_id = trm.to_role_id
UNION SELECT
trm.from_role_id,
trm.to_role_id
FROM
role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id
WHERE
trm.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND trm.deleted_at IS NULL
)
SELECT
prm.from_role_id,
prm.to_role_id
FROM prm
) AS mappings
CROSS JOIN LATERAL (
VALUES (from_role_id), (to_role_id)
) AS rl (role_id)
)
)
SELECT
rm.to_role_id AS role_id
FROM
identity_role ir,
role_mappings rm
WHERE
ir.role_id = rm.from_role_id
AND ir.deleted_at IS NULL
AND ir.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND ir.identity_id IN (SELECT identity_id FROM identity_hierarchy)
UNION SELECT
ir2.role_id
FROM
identity_role ir2
WHERE
ir2.resource_id IN (SELECT resource_id FROM resource_hierarchy)
AND ir2.deleted_at IS NULL
AND ir2.identity_id IN (SELECT identity_id FROM identity_hierarchy)
AND ir2.role_id IN (SELECT role_id FROM matching_roles)
)
SELECT DISTINCT
rts.name AS scope
FROM
identity_resource_roles irr LEFT JOIN role_scope rs ON irr.role_id = rs.role_id
LEFT JOIN resource_type_scope rts ON rs.scope_id = rts.resource_type_scope_id`, identityID, identityID, resourceID, resourceID).Scan(&results).Error
if err != nil {
return nil, errs.WithStack(err)
}
var scopes []string
for i := range results {
scopes = append(scopes, results[i].Scope)
}
return scopes, nil
} | [
"func",
"(",
"m",
"*",
"GormIdentityRoleRepository",
")",
"FindScopesByIdentityAndResource",
"(",
"ctx",
"context",
".",
"Context",
",",
"identityID",
"uuid",
".",
"UUID",
",",
"resourceID",
"string",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"ty... | // FindScopesByIdentityAndResource returns all scopes for the specified identity and resource, both assigned directly and
// also those indirectly inherited via memberships, resource hierarchy and role mappings. | [
"FindScopesByIdentityAndResource",
"returns",
"all",
"scopes",
"for",
"the",
"specified",
"identity",
"and",
"resource",
"both",
"assigned",
"directly",
"and",
"also",
"those",
"indirectly",
"inherited",
"via",
"memberships",
"resource",
"hierarchy",
"and",
"role",
"m... | 2a60f45fcdf7456553025afca28e81115285cce6 | https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L522-L670 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.