id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
list
docstring
stringlengths
6
2.61k
docstring_tokens
list
sha
stringlengths
40
40
url
stringlengths
85
252
150,700
fabric8-services/fabric8-auth
wit/service/wit_service.go
CreateUser
func (s *witServiceImpl) CreateUser(ctx context.Context, identity *account.Identity, identityID string) error { createUserPayload := &witservice.CreateUserAsServiceAccountUsersPayload{ Data: &witservice.CreateUserData{ Attributes: &witservice.CreateIdentityDataAttributes{ Bio: &identity.User.Bio, Company: &identity.User.Company, Email: identity.User.Email, FullName: &identity.User.FullName, ImageURL: &identity.User.ImageURL, URL: &identity.User.URL, Username: identity.Username, UserID: identity.User.ID.String(), ProviderType: identity.ProviderType, }, Type: "identities", }, } remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return err } remoteCreateUserAPIPath := witservice.CreateUserAsServiceAccountUsersPath(identityID) res, err := remoteWITService.CreateUserAsServiceAccountUsers(goasupport.ForwardContextRequestID(ctx), remoteCreateUserAPIPath, createUserPayload) if err != nil { return err } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks if res.StatusCode != http.StatusOK { log.Error(ctx, map[string]interface{}{ "identity_id": identityID, "username": identity.Username, "response_status": res.Status, "response_body": bodyString, }, "unable to create user in WIT") return errors.Errorf("unable to create user in WIT. Response status: %s. Response body: %s", res.Status, bodyString) } return nil }
go
func (s *witServiceImpl) CreateUser(ctx context.Context, identity *account.Identity, identityID string) error { createUserPayload := &witservice.CreateUserAsServiceAccountUsersPayload{ Data: &witservice.CreateUserData{ Attributes: &witservice.CreateIdentityDataAttributes{ Bio: &identity.User.Bio, Company: &identity.User.Company, Email: identity.User.Email, FullName: &identity.User.FullName, ImageURL: &identity.User.ImageURL, URL: &identity.User.URL, Username: identity.Username, UserID: identity.User.ID.String(), ProviderType: identity.ProviderType, }, Type: "identities", }, } remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return err } remoteCreateUserAPIPath := witservice.CreateUserAsServiceAccountUsersPath(identityID) res, err := remoteWITService.CreateUserAsServiceAccountUsers(goasupport.ForwardContextRequestID(ctx), remoteCreateUserAPIPath, createUserPayload) if err != nil { return err } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks if res.StatusCode != http.StatusOK { log.Error(ctx, map[string]interface{}{ "identity_id": identityID, "username": identity.Username, "response_status": res.Status, "response_body": bodyString, }, "unable to create user in WIT") return errors.Errorf("unable to create user in WIT. Response status: %s. Response body: %s", res.Status, bodyString) } return nil }
[ "func", "(", "s", "*", "witServiceImpl", ")", "CreateUser", "(", "ctx", "context", ".", "Context", ",", "identity", "*", "account", ".", "Identity", ",", "identityID", "string", ")", "error", "{", "createUserPayload", ":=", "&", "witservice", ".", "CreateUse...
// CreateUser creates a new user in WIT
[ "CreateUser", "creates", "a", "new", "user", "in", "WIT" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L83-L123
150,701
fabric8-services/fabric8-auth
wit/service/wit_service.go
DeleteUser
func (s *witServiceImpl) DeleteUser(ctx context.Context, username string) error { log.Info(ctx, map[string]interface{}{"username": username}, "deleting user on WIT service") // this endpoint is restricted to the `auth` Service Account remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return err } deleteUserAPIPath := witservice.DeleteUsersPath(username) res, err := remoteWITService.DeleteUsers(goasupport.ForwardContextRequestID(ctx), deleteUserAPIPath) if err != nil { return err } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks if res.StatusCode != http.StatusOK { log.Error(ctx, map[string]interface{}{ "username": username, "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in WIT") return errors.Errorf("unable to delete user in WIT. Response status: %s. Response body: %s", res.Status, bodyString) } return nil }
go
func (s *witServiceImpl) DeleteUser(ctx context.Context, username string) error { log.Info(ctx, map[string]interface{}{"username": username}, "deleting user on WIT service") // this endpoint is restricted to the `auth` Service Account remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return err } deleteUserAPIPath := witservice.DeleteUsersPath(username) res, err := remoteWITService.DeleteUsers(goasupport.ForwardContextRequestID(ctx), deleteUserAPIPath) if err != nil { return err } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks if res.StatusCode != http.StatusOK { log.Error(ctx, map[string]interface{}{ "username": username, "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in WIT") return errors.Errorf("unable to delete user in WIT. Response status: %s. Response body: %s", res.Status, bodyString) } return nil }
[ "func", "(", "s", "*", "witServiceImpl", ")", "DeleteUser", "(", "ctx", "context", ".", "Context", ",", "username", "string", ")", "error", "{", "log", ".", "Info", "(", "ctx", ",", "map", "[", "string", "]", "interface", "{", "}", "{", "\"", "\"", ...
// DeleteUser deletes a user in WIT
[ "DeleteUser", "deletes", "a", "user", "in", "WIT" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L126-L149
150,702
fabric8-services/fabric8-auth
wit/service/wit_service.go
GetSpace
func (s *witServiceImpl) GetSpace(ctx context.Context, spaceID string) (space *wit.Space, e error) { remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return nil, err } spaceIDUUID, err := uuid.FromString(spaceID) if err != nil { return nil, err } res, err := remoteWITService.ShowSpace(ctx, witservice.ShowSpacePath(spaceIDUUID), nil, nil) if err != nil { return nil, err } defer rest.CloseResponse(res) if res.StatusCode != http.StatusOK { bodyString := rest.ReadBody(res.Body) log.Error(ctx, map[string]interface{}{ "spaceId": spaceID, "response_status": res.Status, "response_body": bodyString, }, "unable to get space from WIT") return nil, errors.Errorf("unable to get space from WIT. Response status: %s. Response body: %s", res.Status, bodyString) } spaceSingle, err := remoteWITService.DecodeSpaceSingle(res) if err != nil { return nil, err } return &wit.Space{ ID: *spaceSingle.Data.ID, Name: *spaceSingle.Data.Attributes.Name, Description: *spaceSingle.Data.Attributes.Description, OwnerID: *spaceSingle.Data.Relationships.OwnedBy.Data.ID}, nil }
go
func (s *witServiceImpl) GetSpace(ctx context.Context, spaceID string) (space *wit.Space, e error) { remoteWITService, err := s.createClientWithContextSigner(ctx) if err != nil { return nil, err } spaceIDUUID, err := uuid.FromString(spaceID) if err != nil { return nil, err } res, err := remoteWITService.ShowSpace(ctx, witservice.ShowSpacePath(spaceIDUUID), nil, nil) if err != nil { return nil, err } defer rest.CloseResponse(res) if res.StatusCode != http.StatusOK { bodyString := rest.ReadBody(res.Body) log.Error(ctx, map[string]interface{}{ "spaceId": spaceID, "response_status": res.Status, "response_body": bodyString, }, "unable to get space from WIT") return nil, errors.Errorf("unable to get space from WIT. Response status: %s. Response body: %s", res.Status, bodyString) } spaceSingle, err := remoteWITService.DecodeSpaceSingle(res) if err != nil { return nil, err } return &wit.Space{ ID: *spaceSingle.Data.ID, Name: *spaceSingle.Data.Attributes.Name, Description: *spaceSingle.Data.Attributes.Description, OwnerID: *spaceSingle.Data.Relationships.OwnedBy.Data.ID}, nil }
[ "func", "(", "s", "*", "witServiceImpl", ")", "GetSpace", "(", "ctx", "context", ".", "Context", ",", "spaceID", "string", ")", "(", "space", "*", "wit", ".", "Space", ",", "e", "error", ")", "{", "remoteWITService", ",", "err", ":=", "s", ".", "crea...
// GetSpace talks to the WIT service to retrieve a space record for the specified spaceID, then returns space
[ "GetSpace", "talks", "to", "the", "WIT", "service", "to", "retrieve", "a", "space", "record", "for", "the", "specified", "spaceID", "then", "returns", "space" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/wit/service/wit_service.go#L152-L189
150,703
fabric8-services/fabric8-auth
che/service/che_service.go
NewCheService
func NewCheService(context servicecontext.ServiceContext, config Configuration) service.CheService { return &cheServiceImpl{ BaseService: base.NewBaseService(context), config: config, } }
go
func NewCheService(context servicecontext.ServiceContext, config Configuration) service.CheService { return &cheServiceImpl{ BaseService: base.NewBaseService(context), config: config, } }
[ "func", "NewCheService", "(", "context", "servicecontext", ".", "ServiceContext", ",", "config", "Configuration", ")", "service", ".", "CheService", "{", "return", "&", "cheServiceImpl", "{", "BaseService", ":", "base", ".", "NewBaseService", "(", "context", ")", ...
// NewCheService creates a new Che service.
[ "NewCheService", "creates", "a", "new", "Che", "service", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/che/service/che_service.go#L34-L39
150,704
fabric8-services/fabric8-auth
che/service/che_service.go
DeleteUser
func (s *cheServiceImpl) DeleteUser(ctx context.Context, identity repository.Identity) error { log.Info(ctx, map[string]interface{}{"identity_id": identity.ID.String()}, "deleting user on Che service") // this endpoint is restricted to the `auth` Service Account deleteUserAPIURL := fmt.Sprintf("%s/api/user/%s", s.config.GetCheServiceURL(), identity.ID.String()) req, err := http.NewRequest("DELETE", deleteUserAPIURL, nil) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } tokenManager, err := manager.DefaultManager(s.config) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } token, err := tokenManager.GenerateTransientUserAccessTokenForIdentity(ctx, identity) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } _, err = s.Services().TokenService().RegisterToken(ctx, identity.ID, *token, token2.TOKEN_TYPE_ACCESS, nil) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", *token)) res, err := http.DefaultClient.Do(req) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks switch res.StatusCode { case http.StatusNoContent: // OK return nil case http.StatusNotFound: // May happen if the user has been already deleted from Che // Log the error but return OK log.Warn(ctx, map[string]interface{}{ "identity_id": identity.ID.String(), "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in Che which is OK if user already deleted from Che") return nil } log.Error(ctx, map[string]interface{}{ "identity_id": identity.ID.String(), "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in Che") return errors.NewInternalErrorFromString(ctx, fmt.Sprintf("unable to delete user '%s' in Che", identity.ID.String())) }
go
func (s *cheServiceImpl) DeleteUser(ctx context.Context, identity repository.Identity) error { log.Info(ctx, map[string]interface{}{"identity_id": identity.ID.String()}, "deleting user on Che service") // this endpoint is restricted to the `auth` Service Account deleteUserAPIURL := fmt.Sprintf("%s/api/user/%s", s.config.GetCheServiceURL(), identity.ID.String()) req, err := http.NewRequest("DELETE", deleteUserAPIURL, nil) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } tokenManager, err := manager.DefaultManager(s.config) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } token, err := tokenManager.GenerateTransientUserAccessTokenForIdentity(ctx, identity) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } _, err = s.Services().TokenService().RegisterToken(ctx, identity.ID, *token, token2.TOKEN_TYPE_ACCESS, nil) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", *token)) res, err := http.DefaultClient.Do(req) if err != nil { return errs.Wrapf(err, "unable to delete user '%s' in Che", identity.ID.String()) } defer rest.CloseResponse(res) bodyString := rest.ReadBody(res.Body) // To prevent FDs leaks switch res.StatusCode { case http.StatusNoContent: // OK return nil case http.StatusNotFound: // May happen if the user has been already deleted from Che // Log the error but return OK log.Warn(ctx, map[string]interface{}{ "identity_id": identity.ID.String(), "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in Che which is OK if user already deleted from Che") return nil } log.Error(ctx, map[string]interface{}{ "identity_id": identity.ID.String(), "response_status": res.Status, "response_body": bodyString, }, "unable to delete user in Che") return errors.NewInternalErrorFromString(ctx, fmt.Sprintf("unable to delete user '%s' in Che", identity.ID.String())) }
[ "func", "(", "s", "*", "cheServiceImpl", ")", "DeleteUser", "(", "ctx", "context", ".", "Context", ",", "identity", "repository", ".", "Identity", ")", "error", "{", "log", ".", "Info", "(", "ctx", ",", "map", "[", "string", "]", "interface", "{", "}",...
// DeleteUser deletes a user in Che
[ "DeleteUser", "deletes", "a", "user", "in", "Che" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/che/service/che_service.go#L42-L96
150,705
fabric8-services/fabric8-auth
authorization/permission/service/permission_service.go
NewPermissionService
func NewPermissionService(context servicecontext.ServiceContext) service.PermissionService { return &permissionServiceImpl{base.NewBaseService(context)} }
go
func NewPermissionService(context servicecontext.ServiceContext) service.PermissionService { return &permissionServiceImpl{base.NewBaseService(context)} }
[ "func", "NewPermissionService", "(", "context", "servicecontext", ".", "ServiceContext", ")", "service", ".", "PermissionService", "{", "return", "&", "permissionServiceImpl", "{", "base", ".", "NewBaseService", "(", "context", ")", "}", "\n", "}" ]
// NewPermissionModelService creates a new service.
[ "NewPermissionModelService", "creates", "a", "new", "service", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/permission/service/permission_service.go#L21-L23
150,706
fabric8-services/fabric8-auth
authorization/permission/service/permission_service.go
RequireScope
func (s *permissionServiceImpl) RequireScope(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) error { result, err := s.HasScope(ctx, identityID, resourceID, scopeName) if err != nil { return errors.NewInternalError(ctx, err) } if !result { return errors.NewForbiddenError(fmt.Sprintf("identity with ID %s does not have required scope %s for resource %s", identityID.String(), scopeName, resourceID)) } return nil }
go
func (s *permissionServiceImpl) RequireScope(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) error { result, err := s.HasScope(ctx, identityID, resourceID, scopeName) if err != nil { return errors.NewInternalError(ctx, err) } if !result { return errors.NewForbiddenError(fmt.Sprintf("identity with ID %s does not have required scope %s for resource %s", identityID.String(), scopeName, resourceID)) } return nil }
[ "func", "(", "s", "*", "permissionServiceImpl", ")", "RequireScope", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ",", "resourceID", "string", ",", "scopeName", "string", ")", "error", "{", "result", ",", "err", ":=", "s",...
// RequireScope is the same as HasScope, except instead of returning a boolean value it will just return an error if the // identity does not have the specified scope for the resource
[ "RequireScope", "is", "the", "same", "as", "HasScope", "except", "instead", "of", "returning", "a", "boolean", "value", "it", "will", "just", "return", "an", "error", "if", "the", "identity", "does", "not", "have", "the", "specified", "scope", "for", "the", ...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/permission/service/permission_service.go#L44-L55
150,707
fabric8-services/fabric8-auth
authorization/team/service/team_service.go
NewTeamService
func NewTeamService(context servicecontext.ServiceContext) service.TeamService { return &teamServiceImpl{base.NewBaseService(context)} }
go
func NewTeamService(context servicecontext.ServiceContext) service.TeamService { return &teamServiceImpl{base.NewBaseService(context)} }
[ "func", "NewTeamService", "(", "context", "servicecontext", ".", "ServiceContext", ")", "service", ".", "TeamService", "{", "return", "&", "teamServiceImpl", "{", "base", ".", "NewBaseService", "(", "context", ")", "}", "\n", "}" ]
// NewTeamService creates a new service.
[ "NewTeamService", "creates", "a", "new", "service", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L26-L28
150,708
fabric8-services/fabric8-auth
authorization/team/service/team_service.go
ListTeamsInSpace
func (s *teamServiceImpl) ListTeamsInSpace(ctx context.Context, identityID uuid.UUID, spaceID string) ([]account.Identity, error) { // Confirm that the specified spaceID is valid space, err := s.Repositories().ResourceRepository().Load(ctx, spaceID) if err != nil { return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "error loading space from repository") } // Confirm that the resource is actually a space if space.ResourceType.Name != authorization.ResourceTypeSpace { return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "invalid space ID specified - resource is not a space") } // Create the permission service permService := s.Services().PermissionService() // Confirm the user has the necessary privileges to list the teams in this space err = permService.RequireScope(ctx, identityID, spaceID, authorization.ViewTeamsInSpaceScope) if err != nil { return nil, err } // Lookup the team resource type resourceType, err := s.Repositories().ResourceTypeRepository().Lookup(ctx, authorization.IdentityResourceTypeTeam) if err != nil { return nil, err } // Find team identities that have the space as their parent identities, err := s.Repositories().Identities().FindIdentitiesByResourceTypeWithParentResource(ctx, resourceType.ResourceTypeID, spaceID) if err != nil { return nil, err } return identities, nil }
go
func (s *teamServiceImpl) ListTeamsInSpace(ctx context.Context, identityID uuid.UUID, spaceID string) ([]account.Identity, error) { // Confirm that the specified spaceID is valid space, err := s.Repositories().ResourceRepository().Load(ctx, spaceID) if err != nil { return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "error loading space from repository") } // Confirm that the resource is actually a space if space.ResourceType.Name != authorization.ResourceTypeSpace { return nil, errors.NewBadParameterErrorFromString("spaceID", spaceID, "invalid space ID specified - resource is not a space") } // Create the permission service permService := s.Services().PermissionService() // Confirm the user has the necessary privileges to list the teams in this space err = permService.RequireScope(ctx, identityID, spaceID, authorization.ViewTeamsInSpaceScope) if err != nil { return nil, err } // Lookup the team resource type resourceType, err := s.Repositories().ResourceTypeRepository().Lookup(ctx, authorization.IdentityResourceTypeTeam) if err != nil { return nil, err } // Find team identities that have the space as their parent identities, err := s.Repositories().Identities().FindIdentitiesByResourceTypeWithParentResource(ctx, resourceType.ResourceTypeID, spaceID) if err != nil { return nil, err } return identities, nil }
[ "func", "(", "s", "*", "teamServiceImpl", ")", "ListTeamsInSpace", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ",", "spaceID", "string", ")", "(", "[", "]", "account", ".", "Identity", ",", "error", ")", "{", "// Confir...
// Returns an array of all team identities within a space
[ "Returns", "an", "array", "of", "all", "team", "identities", "within", "a", "space" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L120-L154
150,709
fabric8-services/fabric8-auth
authorization/team/service/team_service.go
ListTeamsForIdentity
func (s *teamServiceImpl) ListTeamsForIdentity(ctx context.Context, identityID uuid.UUID) ([]authorization.IdentityAssociation, error) { resourceType := authorization.IdentityResourceTypeTeam // first find the identity's memberships memberships, err := s.Repositories().Identities().FindIdentityMemberships(ctx, identityID, &resourceType) if err != nil { return nil, err } // then find the identity's roles roles, err := s.Repositories().IdentityRoleRepository().FindIdentityRolesForIdentity(ctx, identityID, &resourceType) if err != nil { return nil, err } return authorization.MergeAssociations(memberships, roles), nil }
go
func (s *teamServiceImpl) ListTeamsForIdentity(ctx context.Context, identityID uuid.UUID) ([]authorization.IdentityAssociation, error) { resourceType := authorization.IdentityResourceTypeTeam // first find the identity's memberships memberships, err := s.Repositories().Identities().FindIdentityMemberships(ctx, identityID, &resourceType) if err != nil { return nil, err } // then find the identity's roles roles, err := s.Repositories().IdentityRoleRepository().FindIdentityRolesForIdentity(ctx, identityID, &resourceType) if err != nil { return nil, err } return authorization.MergeAssociations(memberships, roles), nil }
[ "func", "(", "s", "*", "teamServiceImpl", ")", "ListTeamsForIdentity", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ")", "(", "[", "]", "authorization", ".", "IdentityAssociation", ",", "error", ")", "{", "resourceType", ":=...
// Returns an array of all teams in which the specified identity is a member or is assigned a role
[ "Returns", "an", "array", "of", "all", "teams", "in", "which", "the", "specified", "identity", "is", "a", "member", "or", "is", "assigned", "a", "role" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/team/service/team_service.go#L157-L175
150,710
fabric8-services/fabric8-auth
authorization/token/repository/external_provider_token.go
DeleteByIdentityID
func (m *GormExternalTokenRepository) DeleteByIdentityID(ctx context.Context, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "deleteByIdentityID"}, time.Now()) result := m.db.Where("identity_id = ?", identityID).Delete(ExternalToken{IdentityID: identityID}) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "identity_id": identityID, "err": result.Error, }, "unable to delete external tokens for a given identity") return errs.WithStack(result.Error) } log.Debug(ctx, map[string]interface{}{ "identity_id": identityID, }, "external tokens deleted!") return nil }
go
func (m *GormExternalTokenRepository) DeleteByIdentityID(ctx context.Context, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "deleteByIdentityID"}, time.Now()) result := m.db.Where("identity_id = ?", identityID).Delete(ExternalToken{IdentityID: identityID}) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "identity_id": identityID, "err": result.Error, }, "unable to delete external tokens for a given identity") return errs.WithStack(result.Error) } log.Debug(ctx, map[string]interface{}{ "identity_id": identityID, }, "external tokens deleted!") return nil }
[ "func", "(", "m", "*", "GormExternalTokenRepository", ")", "DeleteByIdentityID", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ")", "error", "{", "defer", "goa", ".", "MeasureSince", "(", "[", "]", "string", "{", "\"", "\""...
// DeleteByIdentityID removes all records associated with a given identity ID
[ "DeleteByIdentityID", "removes", "all", "records", "associated", "with", "a", "given", "identity", "ID" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L168-L182
150,711
fabric8-services/fabric8-auth
authorization/token/repository/external_provider_token.go
LoadByProviderIDAndIdentityID
func (m *GormExternalTokenRepository) LoadByProviderIDAndIdentityID(ctx context.Context, providerID uuid.UUID, identityID uuid.UUID) ([]ExternalToken, error) { defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "LoadByProviderIDAndIdentityID"}, time.Now()) var externalProviderTokens []ExternalToken externalProviderTokens, err := m.Query(ExternalTokenFilterByIdentityID(identityID), ExternalTokenFilterByProviderID(providerID), ExternalTokenWithIdentity()) if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return externalProviderTokens, nil }
go
func (m *GormExternalTokenRepository) LoadByProviderIDAndIdentityID(ctx context.Context, providerID uuid.UUID, identityID uuid.UUID) ([]ExternalToken, error) { defer goa.MeasureSince([]string{"goa", "db", "ExternalToken", "LoadByProviderIDAndIdentityID"}, time.Now()) var externalProviderTokens []ExternalToken externalProviderTokens, err := m.Query(ExternalTokenFilterByIdentityID(identityID), ExternalTokenFilterByProviderID(providerID), ExternalTokenWithIdentity()) if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return externalProviderTokens, nil }
[ "func", "(", "m", "*", "GormExternalTokenRepository", ")", "LoadByProviderIDAndIdentityID", "(", "ctx", "context", ".", "Context", ",", "providerID", "uuid", ".", "UUID", ",", "identityID", "uuid", ".", "UUID", ")", "(", "[", "]", "ExternalToken", ",", "error"...
// LoadByProviderIDAndIdentityID loads tokens by IdentityID and ProviderID
[ "LoadByProviderIDAndIdentityID", "loads", "tokens", "by", "IdentityID", "and", "ProviderID" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L201-L209
150,712
fabric8-services/fabric8-auth
authorization/token/repository/external_provider_token.go
ExternalTokenFilterByIdentityID
func ExternalTokenFilterByIdentityID(identityID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("identity_id = ?", identityID) } }
go
func ExternalTokenFilterByIdentityID(identityID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("identity_id = ?", identityID) } }
[ "func", "ExternalTokenFilterByIdentityID", "(", "identityID", "uuid", ".", "UUID", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "...
// ExternalTokenFilterByIdentityID is a gorm filter for a Belongs To relationship.
[ "ExternalTokenFilterByIdentityID", "is", "a", "gorm", "filter", "for", "a", "Belongs", "To", "relationship", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L212-L216
150,713
fabric8-services/fabric8-auth
authorization/token/repository/external_provider_token.go
ExternalTokenFilterByProviderID
func ExternalTokenFilterByProviderID(providerID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("provider_id = ?", providerID) } }
go
func ExternalTokenFilterByProviderID(providerID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("provider_id = ?", providerID) } }
[ "func", "ExternalTokenFilterByProviderID", "(", "providerID", "uuid", ".", "UUID", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "...
// ExternalTokenFilterByProviderID is a gorm filter by 'external_provider_type'
[ "ExternalTokenFilterByProviderID", "is", "a", "gorm", "filter", "by", "external_provider_type" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L219-L223
150,714
fabric8-services/fabric8-auth
authorization/token/repository/external_provider_token.go
ExternalTokenWithIdentity
func ExternalTokenWithIdentity() func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Preload("Identity") } }
go
func ExternalTokenWithIdentity() func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Preload("Identity") } }
[ "func", "ExternalTokenWithIdentity", "(", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "db", ".", "Preload", "("...
// ExternalTokenWithIdentity is a gorm filter for preloading the identity relationship.
[ "ExternalTokenWithIdentity", "is", "a", "gorm", "filter", "for", "preloading", "the", "identity", "relationship", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/repository/external_provider_token.go#L226-L230
150,715
fabric8-services/fabric8-auth
controller/token.go
NewTokenController
func NewTokenController(service *goa.Service, app application.Application, tokenManager manager.TokenManager, configuration TokenControllerConfiguration) *TokenController { return &TokenController{ Controller: service.NewController("token"), TokenManager: tokenManager, Configuration: configuration, app: app, } }
go
func NewTokenController(service *goa.Service, app application.Application, tokenManager manager.TokenManager, configuration TokenControllerConfiguration) *TokenController { return &TokenController{ Controller: service.NewController("token"), TokenManager: tokenManager, Configuration: configuration, app: app, } }
[ "func", "NewTokenController", "(", "service", "*", "goa", ".", "Service", ",", "app", "application", ".", "Application", ",", "tokenManager", "manager", ".", "TokenManager", ",", "configuration", "TokenControllerConfiguration", ")", "*", "TokenController", "{", "ret...
// NewTokenController creates a token controller.
[ "NewTokenController", "creates", "a", "token", "controller", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L46-L54
150,716
fabric8-services/fabric8-auth
controller/token.go
Keys
func (c *TokenController) Keys(ctx *app.KeysTokenContext) error { var publicKeys token.JSONKeys if ctx.Format != nil && *ctx.Format == "pem" { publicKeys = c.TokenManager.PemKeys() } else { publicKeys = c.TokenManager.JSONWebKeys() } return ctx.OK(&app.PublicKeys{Keys: publicKeys.Keys}) }
go
func (c *TokenController) Keys(ctx *app.KeysTokenContext) error { var publicKeys token.JSONKeys if ctx.Format != nil && *ctx.Format == "pem" { publicKeys = c.TokenManager.PemKeys() } else { publicKeys = c.TokenManager.JSONWebKeys() } return ctx.OK(&app.PublicKeys{Keys: publicKeys.Keys}) }
[ "func", "(", "c", "*", "TokenController", ")", "Keys", "(", "ctx", "*", "app", ".", "KeysTokenContext", ")", "error", "{", "var", "publicKeys", "token", ".", "JSONKeys", "\n", "if", "ctx", ".", "Format", "!=", "nil", "&&", "*", "ctx", ".", "Format", ...
// Keys returns public keys which should be used to verify tokens
[ "Keys", "returns", "public", "keys", "which", "should", "be", "used", "to", "verify", "tokens" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L57-L66
150,717
fabric8-services/fabric8-auth
controller/token.go
Refresh
func (c *TokenController) Refresh(ctx *app.RefreshTokenContext) error { // retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here) accessToken := goajwt.ContextJWT(ctx) refreshToken := ctx.Payload.RefreshToken if refreshToken == nil { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("refresh_token", nil).Expected("not nil")) } var t *manager.TokenSet var err error if accessToken != nil { t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, accessToken.Raw) } else { t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, "") } if err != nil { c.TokenManager.AddLoginRequiredHeaderToUnauthorizedError(err, ctx.ResponseData) return jsonapi.JSONErrorResponse(ctx, err) } ctx.ResponseData.Header().Set("Cache-Control", "no-cache") return ctx.OK(convertToken(*t)) }
go
func (c *TokenController) Refresh(ctx *app.RefreshTokenContext) error { // retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here) accessToken := goajwt.ContextJWT(ctx) refreshToken := ctx.Payload.RefreshToken if refreshToken == nil { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("refresh_token", nil).Expected("not nil")) } var t *manager.TokenSet var err error if accessToken != nil { t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, accessToken.Raw) } else { t, err = c.app.TokenService().ExchangeRefreshToken(ctx, *refreshToken, "") } if err != nil { c.TokenManager.AddLoginRequiredHeaderToUnauthorizedError(err, ctx.ResponseData) return jsonapi.JSONErrorResponse(ctx, err) } ctx.ResponseData.Header().Set("Cache-Control", "no-cache") return ctx.OK(convertToken(*t)) }
[ "func", "(", "c", "*", "TokenController", ")", "Refresh", "(", "ctx", "*", "app", ".", "RefreshTokenContext", ")", "error", "{", "// retrieve the access token if it exists (otherwise, a jwtrequest.ErrNoTokenInRequest is returned, but it can be ignored here)", "accessToken", ":=",...
// Refresh obtains a new access token using the refresh token.
[ "Refresh", "obtains", "a", "new", "access", "token", "using", "the", "refresh", "token", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L69-L89
150,718
fabric8-services/fabric8-auth
controller/token.go
Retrieve
func (c *TokenController) Retrieve(ctx *app.RetrieveTokenContext) error { appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull) if errorResponse != nil { ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate") ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse) } if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "failed to retrieve token") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(appToken) }
go
func (c *TokenController) Retrieve(ctx *app.RetrieveTokenContext) error { appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull) if errorResponse != nil { ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate") ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse) } if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "failed to retrieve token") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(appToken) }
[ "func", "(", "c", "*", "TokenController", ")", "Retrieve", "(", "ctx", "*", "app", ".", "RetrieveTokenContext", ")", "error", "{", "appToken", ",", "errorResponse", ",", "err", ":=", "c", ".", "app", ".", "TokenService", "(", ")", ".", "RetrieveExternalTok...
// Retrieve fetches the stored external provider token.
[ "Retrieve", "fetches", "the", "stored", "external", "provider", "token", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L103-L116
150,719
fabric8-services/fabric8-auth
controller/token.go
Status
func (c *TokenController) Status(ctx *app.StatusTokenContext) error { appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull) if errorResponse != nil { ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate") ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse) } if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "failed to check token status") return jsonapi.JSONErrorResponse(ctx, err) } tokenStatus := &app.ExternalTokenStatus{ Username: appToken.Username, ProviderAPIURL: appToken.ProviderAPIURL, } return ctx.OK(tokenStatus) }
go
func (c *TokenController) Status(ctx *app.StatusTokenContext) error { appToken, errorResponse, err := c.app.TokenService().RetrieveExternalToken(ctx, ctx.For, ctx.RequestData, ctx.ForcePull) if errorResponse != nil { ctx.ResponseData.Header().Add("Access-Control-Expose-Headers", "WWW-Authenticate") ctx.ResponseData.Header().Set("WWW-Authenticate", *errorResponse) } if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "failed to check token status") return jsonapi.JSONErrorResponse(ctx, err) } tokenStatus := &app.ExternalTokenStatus{ Username: appToken.Username, ProviderAPIURL: appToken.ProviderAPIURL, } return ctx.OK(tokenStatus) }
[ "func", "(", "c", "*", "TokenController", ")", "Status", "(", "ctx", "*", "app", ".", "StatusTokenContext", ")", "error", "{", "appToken", ",", "errorResponse", ",", "err", ":=", "c", ".", "app", ".", "TokenService", "(", ")", ".", "RetrieveExternalToken",...
// Status checks if the stored external provider token is available.
[ "Status", "checks", "if", "the", "stored", "external", "provider", "token", "is", "available", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L119-L137
150,720
fabric8-services/fabric8-auth
controller/token.go
Delete
func (c *TokenController) Delete(ctx *app.DeleteTokenContext) error { currentIdentity, err := manager.ContextIdentity(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } if ctx.For == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL")) } err = c.app.TokenService().DeleteExternalToken(ctx, *currentIdentity, rest.AbsoluteURL(ctx.RequestData, "", nil), ctx.For) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK([]byte{}) }
go
func (c *TokenController) Delete(ctx *app.DeleteTokenContext) error { currentIdentity, err := manager.ContextIdentity(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } if ctx.For == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL")) } err = c.app.TokenService().DeleteExternalToken(ctx, *currentIdentity, rest.AbsoluteURL(ctx.RequestData, "", nil), ctx.For) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK([]byte{}) }
[ "func", "(", "c", "*", "TokenController", ")", "Delete", "(", "ctx", "*", "app", ".", "DeleteTokenContext", ")", "error", "{", "currentIdentity", ",", "err", ":=", "manager", ".", "ContextIdentity", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", ...
// Delete deletes the stored external provider token.
[ "Delete", "deletes", "the", "stored", "external", "provider", "token", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L140-L155
150,721
fabric8-services/fabric8-auth
controller/token.go
Link
func (c *TokenController) Link(ctx *app.LinkTokenContext) error { if ctx.For == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL")) } currentIdentity, err := c.app.UserService().ContextIdentityIfExists(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } var redirectURL string if ctx.Redirect == nil { redirectURL = ctx.RequestData.Header.Get("Referer") if redirectURL == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("redirect", "empty").Expected("redirect param or Referer header should be specified")) } } else { redirectURL = *ctx.Redirect } redirectLocation, err := c.app.LinkService().ProviderLocation(ctx, ctx.RequestData, currentIdentity.String(), ctx.For, redirectURL) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } locationPayload := &app.RedirectLocation{RedirectLocation: redirectLocation} return ctx.OK(locationPayload) }
go
func (c *TokenController) Link(ctx *app.LinkTokenContext) error { if ctx.For == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("for", "").Expected("git or OpenShift resource URL")) } currentIdentity, err := c.app.UserService().ContextIdentityIfExists(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } var redirectURL string if ctx.Redirect == nil { redirectURL = ctx.RequestData.Header.Get("Referer") if redirectURL == "" { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("redirect", "empty").Expected("redirect param or Referer header should be specified")) } } else { redirectURL = *ctx.Redirect } redirectLocation, err := c.app.LinkService().ProviderLocation(ctx, ctx.RequestData, currentIdentity.String(), ctx.For, redirectURL) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } locationPayload := &app.RedirectLocation{RedirectLocation: redirectLocation} return ctx.OK(locationPayload) }
[ "func", "(", "c", "*", "TokenController", ")", "Link", "(", "ctx", "*", "app", ".", "LinkTokenContext", ")", "error", "{", "if", "ctx", ".", "For", "==", "\"", "\"", "{", "return", "jsonapi", ".", "JSONErrorResponse", "(", "ctx", ",", "errors", ".", ...
// Link links the user account to an external resource provider such as GitHub
[ "Link", "links", "the", "user", "account", "to", "an", "external", "resource", "provider", "such", "as", "GitHub" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L307-L333
150,722
fabric8-services/fabric8-auth
controller/token.go
LinkCallback
func (c *TokenController) LinkCallback(ctx *app.LinkCallbackTokenContext) error { redirectLocation, err := c.app.LinkService().Callback(ctx, ctx.RequestData, ctx.State, ctx.Code) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } ctx.ResponseData.Header().Set("Location", redirectLocation) return ctx.TemporaryRedirect() }
go
func (c *TokenController) LinkCallback(ctx *app.LinkCallbackTokenContext) error { redirectLocation, err := c.app.LinkService().Callback(ctx, ctx.RequestData, ctx.State, ctx.Code) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } ctx.ResponseData.Header().Set("Location", redirectLocation) return ctx.TemporaryRedirect() }
[ "func", "(", "c", "*", "TokenController", ")", "LinkCallback", "(", "ctx", "*", "app", ".", "LinkCallbackTokenContext", ")", "error", "{", "redirectLocation", ",", "err", ":=", "c", ".", "app", ".", "LinkService", "(", ")", ".", "Callback", "(", "ctx", "...
// LinkCallback is called by an external oauth2 resource provider such as GitHub as part of user's account linking flow
[ "LinkCallback", "is", "called", "by", "an", "external", "oauth2", "resource", "provider", "such", "as", "GitHub", "as", "part", "of", "user", "s", "account", "linking", "flow" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/token.go#L336-L343
150,723
fabric8-services/fabric8-auth
authentication/provider/factory/linking_provider_factory.go
NewLinkingProviderFactory
func NewLinkingProviderFactory(context servicecontext.ServiceContext, config provider.LinkingProviderConfiguration) service.LinkingProviderFactory { factory := &linkingProviderFactoryImpl{ BaseService: base.NewBaseService(context), config: config, } return factory }
go
func NewLinkingProviderFactory(context servicecontext.ServiceContext, config provider.LinkingProviderConfiguration) service.LinkingProviderFactory { factory := &linkingProviderFactoryImpl{ BaseService: base.NewBaseService(context), config: config, } return factory }
[ "func", "NewLinkingProviderFactory", "(", "context", "servicecontext", ".", "ServiceContext", ",", "config", "provider", ".", "LinkingProviderConfiguration", ")", "service", ".", "LinkingProviderFactory", "{", "factory", ":=", "&", "linkingProviderFactoryImpl", "{", "Base...
// NewLinkingProviderFactory returns the default Linking provider factory.
[ "NewLinkingProviderFactory", "returns", "the", "default", "Linking", "provider", "factory", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/factory/linking_provider_factory.go#L20-L26
150,724
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
LoadWithUser
func (m *GormIdentityRepository) LoadWithUser(ctx context.Context, id uuid.UUID) (*Identity, error) { identities, err := m.Query(IdentityFilterByID(id), IdentityWithUser()) if err != nil { return nil, err } if len(identities) == 0 { return nil, errs.WithStack(errors.NewNotFoundError("identity", id.String())) } if identities[0].User.ID == uuid.Nil { return nil, errs.WithStack(errors.NewNotFoundError("user for identity", id.String())) } return &identities[0], nil }
go
func (m *GormIdentityRepository) LoadWithUser(ctx context.Context, id uuid.UUID) (*Identity, error) { identities, err := m.Query(IdentityFilterByID(id), IdentityWithUser()) if err != nil { return nil, err } if len(identities) == 0 { return nil, errs.WithStack(errors.NewNotFoundError("identity", id.String())) } if identities[0].User.ID == uuid.Nil { return nil, errs.WithStack(errors.NewNotFoundError("user for identity", id.String())) } return &identities[0], nil }
[ "func", "(", "m", "*", "GormIdentityRepository", ")", "LoadWithUser", "(", "ctx", "context", ".", "Context", ",", "id", "uuid", ".", "UUID", ")", "(", "*", "Identity", ",", "error", ")", "{", "identities", ",", "err", ":=", "m", ".", "Query", "(", "I...
// LoadWithUser loads an identity and the associated User // Returns NotFoundError if either identity or user is not found
[ "LoadWithUser", "loads", "an", "identity", "and", "the", "associated", "User", "Returns", "NotFoundError", "if", "either", "identity", "or", "user", "is", "not", "found" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L184-L196
150,725
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
Delete
func (m *GormIdentityRepository) Delete(ctx context.Context, id uuid.UUID, funcs ...func(*gorm.DB) *gorm.DB) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "delete"}, time.Now()) obj := Identity{ID: id} result := m.db.Scopes(funcs...).Delete(obj) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "identity_id": id, "err": result.Error, }, "unable to delete the identity") return errs.WithStack(result.Error) } if result.RowsAffected == 0 { return errors.NewNotFoundError("identity", id.String()) } log.Debug(ctx, map[string]interface{}{ "identity_id": id, }, "Identity deleted!") return nil }
go
func (m *GormIdentityRepository) Delete(ctx context.Context, id uuid.UUID, funcs ...func(*gorm.DB) *gorm.DB) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "delete"}, time.Now()) obj := Identity{ID: id} result := m.db.Scopes(funcs...).Delete(obj) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "identity_id": id, "err": result.Error, }, "unable to delete the identity") return errs.WithStack(result.Error) } if result.RowsAffected == 0 { return errors.NewNotFoundError("identity", id.String()) } log.Debug(ctx, map[string]interface{}{ "identity_id": id, }, "Identity deleted!") return nil }
[ "func", "(", "m", "*", "GormIdentityRepository", ")", "Delete", "(", "ctx", "context", ".", "Context", ",", "id", "uuid", ".", "UUID", ",", "funcs", "...", "func", "(", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", ")", "error", "{", "defer"...
// Delete removes a single record. argument funcs can be used to add conditions dynamically to current database connection
[ "Delete", "removes", "a", "single", "record", ".", "argument", "funcs", "can", "be", "used", "to", "add", "conditions", "dynamically", "to", "current", "database", "connection" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L269-L291
150,726
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
IdentityFilterByUsername
func IdentityFilterByUsername(username string) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("username = ?", username).Limit(1) } }
go
func IdentityFilterByUsername(username string) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("username = ?", username).Limit(1) } }
[ "func", "IdentityFilterByUsername", "(", "username", "string", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "db", ...
// IdentityFilterByUsername is a gorm filter by 'username'
[ "IdentityFilterByUsername", "is", "a", "gorm", "filter", "by", "username" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L347-L351
150,727
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
FindIdentitiesByResourceTypeWithParentResource
func (m *GormIdentityRepository) FindIdentitiesByResourceTypeWithParentResource(ctx context.Context, resourceTypeID uuid.UUID, parentResourceID string) ([]Identity, error) { defer goa.MeasureSince([]string{"goa", "db", "identity", "FindIdentitiesByResourceTypeWithParentResource"}, time.Now()) var identities []Identity err := m.db.Table(m.TableName()).Preload("IdentityResource"). Joins("JOIN resource r ON r.resource_id = identities.identity_resource_id AND r.resource_type_id = ? AND r.parent_resource_id = ?", resourceTypeID, parentResourceID). Find(&identities).Error if err != nil { return nil, err } return identities, nil }
go
func (m *GormIdentityRepository) FindIdentitiesByResourceTypeWithParentResource(ctx context.Context, resourceTypeID uuid.UUID, parentResourceID string) ([]Identity, error) { defer goa.MeasureSince([]string{"goa", "db", "identity", "FindIdentitiesByResourceTypeWithParentResource"}, time.Now()) var identities []Identity err := m.db.Table(m.TableName()).Preload("IdentityResource"). Joins("JOIN resource r ON r.resource_id = identities.identity_resource_id AND r.resource_type_id = ? AND r.parent_resource_id = ?", resourceTypeID, parentResourceID). Find(&identities).Error if err != nil { return nil, err } return identities, nil }
[ "func", "(", "m", "*", "GormIdentityRepository", ")", "FindIdentitiesByResourceTypeWithParentResource", "(", "ctx", "context", ".", "Context", ",", "resourceTypeID", "uuid", ".", "UUID", ",", "parentResourceID", "string", ")", "(", "[", "]", "Identity", ",", "erro...
// FindIdentitiesWithParentResource returns an array of Identity objects for which their corresponding resource is a child of the specified parent resource
[ "FindIdentitiesWithParentResource", "returns", "an", "array", "of", "Identity", "objects", "for", "which", "their", "corresponding", "resource", "is", "a", "child", "of", "the", "specified", "parent", "resource" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L581-L595
150,728
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
RemoveMember
func (m *GormIdentityRepository) RemoveMember(ctx context.Context, memberOf uuid.UUID, memberID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "RemoveMember"}, time.Now()) membership := &Membership{ MemberOf: memberOf, MemberID: memberID, } err := m.db.Delete(membership).Error if err != nil { log.Error(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, "err": err, }, "unable to remove the membership") return errs.WithStack(err) } err = m.FlagPrivilegeCacheStaleForMembershipChange(ctx, memberID, memberOf) if err != nil { log.Error(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, "err": err, }, "unable to remove the membership - error notifying privilege cache") return errs.WithStack(err) } log.Info(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, }, "Membership removed!") return nil }
go
func (m *GormIdentityRepository) RemoveMember(ctx context.Context, memberOf uuid.UUID, memberID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "RemoveMember"}, time.Now()) membership := &Membership{ MemberOf: memberOf, MemberID: memberID, } err := m.db.Delete(membership).Error if err != nil { log.Error(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, "err": err, }, "unable to remove the membership") return errs.WithStack(err) } err = m.FlagPrivilegeCacheStaleForMembershipChange(ctx, memberID, memberOf) if err != nil { log.Error(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, "err": err, }, "unable to remove the membership - error notifying privilege cache") return errs.WithStack(err) } log.Info(ctx, map[string]interface{}{ "member_of": memberOf, "member_id": memberID, }, "Membership removed!") return nil }
[ "func", "(", "m", "*", "GormIdentityRepository", ")", "RemoveMember", "(", "ctx", "context", ".", "Context", ",", "memberOf", "uuid", ".", "UUID", ",", "memberID", "uuid", ".", "UUID", ")", "error", "{", "defer", "goa", ".", "MeasureSince", "(", "[", "]"...
// RemoveMember removes an existing membership with the specified memberOf and memberID values
[ "RemoveMember", "removes", "an", "existing", "membership", "with", "the", "specified", "memberOf", "and", "memberID", "values" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L654-L688
150,729
fabric8-services/fabric8-auth
authentication/account/repository/identity.go
TouchLastActive
func (m *GormIdentityRepository) TouchLastActive(ctx context.Context, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "TouchLastActive"}, time.Now()) err := m.db.Exec("UPDATE identities SET last_active = ?, deactivation_notification = NULL, deactivation_scheduled = NULL WHERE id = ?", time.Now(), identityID).Error if err != nil { log.Error(ctx, map[string]interface{}{ "id": identityID, "err": err, }, "unable to update last active time") return errs.WithStack(err) } return nil }
go
func (m *GormIdentityRepository) TouchLastActive(ctx context.Context, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity", "TouchLastActive"}, time.Now()) err := m.db.Exec("UPDATE identities SET last_active = ?, deactivation_notification = NULL, deactivation_scheduled = NULL WHERE id = ?", time.Now(), identityID).Error if err != nil { log.Error(ctx, map[string]interface{}{ "id": identityID, "err": err, }, "unable to update last active time") return errs.WithStack(err) } return nil }
[ "func", "(", "m", "*", "GormIdentityRepository", ")", "TouchLastActive", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ")", "error", "{", "defer", "goa", ".", "MeasureSince", "(", "[", "]", "string", "{", "\"", "\"", ",",...
// TouchLastActive is intended to be a lightweight method that updates the last active column for a specified identity // to the current timestamp. Also, it resets the `deactivation_notification` timestamp so we can send another deactivation // notification to the user if she is once again inactive in the future.
[ "TouchLastActive", "is", "intended", "to", "be", "a", "lightweight", "method", "that", "updates", "the", "last", "active", "column", "for", "a", "specified", "identity", "to", "the", "current", "timestamp", ".", "Also", "it", "resets", "the", "deactivation_notif...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/identity.go#L895-L908
150,730
fabric8-services/fabric8-auth
notification/service/notification.go
NewNotificationService
func NewNotificationService(context servicecontext.ServiceContext, config notification.Configuration) service.NotificationService { return &notificationServiceImpl{ BaseService: base.NewBaseService(context), config: config, } }
go
func NewNotificationService(context servicecontext.ServiceContext, config notification.Configuration) service.NotificationService { return &notificationServiceImpl{ BaseService: base.NewBaseService(context), config: config, } }
[ "func", "NewNotificationService", "(", "context", "servicecontext", ".", "ServiceContext", ",", "config", "notification", ".", "Configuration", ")", "service", ".", "NotificationService", "{", "return", "&", "notificationServiceImpl", "{", "BaseService", ":", "base", ...
// NewNotificationService creates a new service.
[ "NewNotificationService", "creates", "a", "new", "service", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/service/notification.go#L31-L36
150,731
fabric8-services/fabric8-auth
authorization/space/service/space_service.go
NewSpaceService
func NewSpaceService(context servicecontext.ServiceContext) service.SpaceService { return &spaceService{base.NewBaseService(context)} }
go
func NewSpaceService(context servicecontext.ServiceContext) service.SpaceService { return &spaceService{base.NewBaseService(context)} }
[ "func", "NewSpaceService", "(", "context", "servicecontext", ".", "ServiceContext", ")", "service", ".", "SpaceService", "{", "return", "&", "spaceService", "{", "base", ".", "NewBaseService", "(", "context", ")", "}", "\n", "}" ]
// NewSpaceService creates a new space service.
[ "NewSpaceService", "creates", "a", "new", "space", "service", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/space/service/space_service.go#L21-L23
150,732
fabric8-services/fabric8-auth
gormapplication/application.go
BeginTransaction
func (g *GormDB) BeginTransaction() (transaction.Transaction, error) { tx := g.db.Begin() if tx.Error != nil { return nil, tx.Error } if len(g.txIsoLevel) != 0 { tx := tx.Exec(fmt.Sprintf("set transaction isolation level %s", g.txIsoLevel)) if tx.Error != nil { return nil, tx.Error } return &GormTransaction{GormBase{tx}}, nil } return &GormTransaction{GormBase{tx}}, nil }
go
func (g *GormDB) BeginTransaction() (transaction.Transaction, error) { tx := g.db.Begin() if tx.Error != nil { return nil, tx.Error } if len(g.txIsoLevel) != 0 { tx := tx.Exec(fmt.Sprintf("set transaction isolation level %s", g.txIsoLevel)) if tx.Error != nil { return nil, tx.Error } return &GormTransaction{GormBase{tx}}, nil } return &GormTransaction{GormBase{tx}}, nil }
[ "func", "(", "g", "*", "GormDB", ")", "BeginTransaction", "(", ")", "(", "transaction", ".", "Transaction", ",", "error", ")", "{", "tx", ":=", "g", ".", "db", ".", "Begin", "(", ")", "\n", "if", "tx", ".", "Error", "!=", "nil", "{", "return", "n...
// BeginTransaction initiates a new transaction
[ "BeginTransaction", "initiates", "a", "new", "transaction" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/gormapplication/application.go#L276-L289
150,733
fabric8-services/fabric8-auth
authentication/provider/oauth2.go
UserProfilePayload
func (provider *DefaultIdentityProvider) UserProfilePayload(ctx context.Context, token oauth2.Token) ([]byte, error) { req, err := http.NewRequest("GET", provider.ProfileURL, nil) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to create http request") return nil, err } req.Header.Add("Authorization", "Bearer "+token.AccessToken) res, err := http.DefaultClient.Do(req) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to get user profile") return nil, err } defer rest.CloseResponse(res) body, err := ioutil.ReadAll(res.Body) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to read user profile payload") return body, err } if res.StatusCode < 200 || res.StatusCode > 299 { log.Error(ctx, map[string]interface{}{ "status": res.Status, "response_body": string(body), "profile_url": provider.ProfileURL, }, "unable to get user profile") return nil, errors.NewInternalErrorFromString(ctx, "unable to get user profile") } return body, nil }
go
func (provider *DefaultIdentityProvider) UserProfilePayload(ctx context.Context, token oauth2.Token) ([]byte, error) { req, err := http.NewRequest("GET", provider.ProfileURL, nil) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to create http request") return nil, err } req.Header.Add("Authorization", "Bearer "+token.AccessToken) res, err := http.DefaultClient.Do(req) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to get user profile") return nil, err } defer rest.CloseResponse(res) body, err := ioutil.ReadAll(res.Body) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err.Error(), "profile_url": provider.ProfileURL, }, "unable to read user profile payload") return body, err } if res.StatusCode < 200 || res.StatusCode > 299 { log.Error(ctx, map[string]interface{}{ "status": res.Status, "response_body": string(body), "profile_url": provider.ProfileURL, }, "unable to get user profile") return nil, errors.NewInternalErrorFromString(ctx, "unable to get user profile") } return body, nil }
[ "func", "(", "provider", "*", "DefaultIdentityProvider", ")", "UserProfilePayload", "(", "ctx", "context", ".", "Context", ",", "token", "oauth2", ".", "Token", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "req", ",", "err", ":=", "http", ".", "...
// UserProfilePayload fetches user profile payload from Identity Provider. It is used by the Profile function to do // the actual work of talking to the identity provider
[ "UserProfilePayload", "fetches", "user", "profile", "payload", "from", "Identity", "Provider", ".", "It", "is", "used", "by", "the", "Profile", "function", "to", "do", "the", "actual", "work", "of", "talking", "to", "the", "identity", "provider" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/oauth2.go#L156-L192
150,734
fabric8-services/fabric8-auth
goasupport/forward_signer.go
Sign
func (f JWTSigner) Sign(request *http.Request) error { request.Header.Set("Authorization", "Bearer "+f.Token) return nil }
go
func (f JWTSigner) Sign(request *http.Request) error { request.Header.Set("Authorization", "Bearer "+f.Token) return nil }
[ "func", "(", "f", "JWTSigner", ")", "Sign", "(", "request", "*", "http", ".", "Request", ")", "error", "{", "request", ".", "Header", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", "+", "f", ".", "Token", ")", "\n", "return", "nil", "\n", "}" ]
// Sign sets the Auth header
[ "Sign", "sets", "the", "Auth", "header" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/goasupport/forward_signer.go#L17-L20
150,735
fabric8-services/fabric8-auth
goasupport/forward_signer.go
NewForwardSigner
func NewForwardSigner(ctx context.Context) goaclient.Signer { return &JWTSigner{Token: goajwt.ContextJWT(ctx).Raw} }
go
func NewForwardSigner(ctx context.Context) goaclient.Signer { return &JWTSigner{Token: goajwt.ContextJWT(ctx).Raw} }
[ "func", "NewForwardSigner", "(", "ctx", "context", ".", "Context", ")", "goaclient", ".", "Signer", "{", "return", "&", "JWTSigner", "{", "Token", ":", "goajwt", ".", "ContextJWT", "(", "ctx", ")", ".", "Raw", "}", "\n", "}" ]
// NewForwardSigner returns a new signer which uses the token from the context // If the caller context is used then the token from this context will be extracted and forwarded to the target Request
[ "NewForwardSigner", "returns", "a", "new", "signer", "which", "uses", "the", "token", "from", "the", "context", "If", "the", "caller", "context", "is", "used", "then", "the", "token", "from", "this", "context", "will", "be", "extracted", "and", "forwarded", ...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/goasupport/forward_signer.go#L24-L26
150,736
fabric8-services/fabric8-auth
application/repository/base/exister.go
exists
func exists(ctx context.Context, db *gorm.DB, tableName, idColumnName, id string, softDeletable bool) (bool, error) { var exists bool var query string if softDeletable { query = fmt.Sprintf(` SELECT EXISTS ( SELECT 1 FROM %[1]s WHERE %[2]s=$1 AND deleted_at IS NULL )`, tableName, idColumnName) } else { query = fmt.Sprintf(` SELECT EXISTS ( SELECT 1 FROM %[1]s WHERE %[2]s=$1 )`, tableName, idColumnName) } err := db.CommonDB().QueryRow(query, id).Scan(&exists) if err == nil && !exists { return exists, errors.NewNotFoundError(tableName, id) } if err != nil { return false, errors.NewInternalError(ctx, errs.Wrapf(err, "unable to verify if %s exists", tableName)) } return exists, nil }
go
func exists(ctx context.Context, db *gorm.DB, tableName, idColumnName, id string, softDeletable bool) (bool, error) { var exists bool var query string if softDeletable { query = fmt.Sprintf(` SELECT EXISTS ( SELECT 1 FROM %[1]s WHERE %[2]s=$1 AND deleted_at IS NULL )`, tableName, idColumnName) } else { query = fmt.Sprintf(` SELECT EXISTS ( SELECT 1 FROM %[1]s WHERE %[2]s=$1 )`, tableName, idColumnName) } err := db.CommonDB().QueryRow(query, id).Scan(&exists) if err == nil && !exists { return exists, errors.NewNotFoundError(tableName, id) } if err != nil { return false, errors.NewInternalError(ctx, errs.Wrapf(err, "unable to verify if %s exists", tableName)) } return exists, nil }
[ "func", "exists", "(", "ctx", "context", ".", "Context", ",", "db", "*", "gorm", ".", "DB", ",", "tableName", ",", "idColumnName", ",", "id", "string", ",", "softDeletable", "bool", ")", "(", "bool", ",", "error", ")", "{", "var", "exists", "bool", "...
// exists returns true if a soft or hard deletable item exists in the database table with a given ID
[ "exists", "returns", "true", "if", "a", "soft", "or", "hard", "deletable", "item", "exists", "in", "the", "database", "table", "with", "a", "given", "ID" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L21-L48
150,737
fabric8-services/fabric8-auth
application/repository/base/exister.go
CheckExists
func CheckExists(ctx context.Context, db *gorm.DB, tableName string, id string) error { _, err := exists(ctx, db, tableName, "id", id, true) return err }
go
func CheckExists(ctx context.Context, db *gorm.DB, tableName string, id string) error { _, err := exists(ctx, db, tableName, "id", id, true) return err }
[ "func", "CheckExists", "(", "ctx", "context", ".", "Context", ",", "db", "*", "gorm", ".", "DB", ",", "tableName", "string", ",", "id", "string", ")", "error", "{", "_", ",", "err", ":=", "exists", "(", "ctx", ",", "db", ",", "tableName", ",", "\""...
// CheckExists does the same as Exists for a soft deletable item but only returns the error value; thereby // being a handy convenience function.
[ "CheckExists", "does", "the", "same", "as", "Exists", "for", "a", "soft", "deletable", "item", "but", "only", "returns", "the", "error", "value", ";", "thereby", "being", "a", "handy", "convenience", "function", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L52-L55
150,738
fabric8-services/fabric8-auth
application/repository/base/exister.go
CheckHardDeletableExists
func CheckHardDeletableExists(ctx context.Context, db *gorm.DB, tableName string, id string) error { _, err := exists(ctx, db, tableName, "id", id, false) return err }
go
func CheckHardDeletableExists(ctx context.Context, db *gorm.DB, tableName string, id string) error { _, err := exists(ctx, db, tableName, "id", id, false) return err }
[ "func", "CheckHardDeletableExists", "(", "ctx", "context", ".", "Context", ",", "db", "*", "gorm", ".", "DB", ",", "tableName", "string", ",", "id", "string", ")", "error", "{", "_", ",", "err", ":=", "exists", "(", "ctx", ",", "db", ",", "tableName", ...
// CheckExists does the same as Exists for a hard deletable item but only returns the error value; thereby // being a handy convenience function.
[ "CheckExists", "does", "the", "same", "as", "Exists", "for", "a", "hard", "deletable", "item", "but", "only", "returns", "the", "error", "value", ";", "thereby", "being", "a", "handy", "convenience", "function", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/application/repository/base/exister.go#L66-L69
150,739
fabric8-services/fabric8-auth
controller/user.go
ListResources
func (c *UserController) ListResources(ctx *app.ListResourcesUserContext) error { // retrieve the user's identity ID from the token identityID, err := c.tokenManager.Locate(ctx) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "Bad Token") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("bad or missing token")) } resourceType := ctx.Type if resourceType != authorization.ResourceTypeSpace { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterErrorFromString("type", ctx.Type, "invalid or unsupported type of resource.")) } resourceIDs, err := c.app.ResourceService().FindWithRoleByResourceTypeAndIdentity(ctx, resourceType, identityID) log.Info(ctx, map[string]interface{}{"matching_resources": len(resourceIDs), "identity_id": identityID.String()}, "retrieved resources with a role for the current user") if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(convertToUserResources(ctx.RequestData, resourceType, resourceIDs)) }
go
func (c *UserController) ListResources(ctx *app.ListResourcesUserContext) error { // retrieve the user's identity ID from the token identityID, err := c.tokenManager.Locate(ctx) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "Bad Token") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("bad or missing token")) } resourceType := ctx.Type if resourceType != authorization.ResourceTypeSpace { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterErrorFromString("type", ctx.Type, "invalid or unsupported type of resource.")) } resourceIDs, err := c.app.ResourceService().FindWithRoleByResourceTypeAndIdentity(ctx, resourceType, identityID) log.Info(ctx, map[string]interface{}{"matching_resources": len(resourceIDs), "identity_id": identityID.String()}, "retrieved resources with a role for the current user") if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(convertToUserResources(ctx.RequestData, resourceType, resourceIDs)) }
[ "func", "(", "c", "*", "UserController", ")", "ListResources", "(", "ctx", "*", "app", ".", "ListResourcesUserContext", ")", "error", "{", "// retrieve the user's identity ID from the token", "identityID", ",", "err", ":=", "c", ".", "tokenManager", ".", "Locate", ...
// ListResources returns a list of resources in which the current user has a role
[ "ListResources", "returns", "a", "list", "of", "resources", "in", "which", "the", "current", "user", "has", "a", "role" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/user.go#L77-L97
150,740
fabric8-services/fabric8-auth
controller/user.go
convertToUserResources
func convertToUserResources(request *goa.RequestData, resourceType string, resourceIDs []string) *app.UserResourcesList { data := make([]*app.UserResourceData, 0) for _, resourceID := range resourceIDs { resourceHref := rest.AbsoluteURL(request, app.ResourceHref(resourceID), nil) data = append(data, &app.UserResourceData{ ID: resourceID, Type: "resources", Links: &app.GenericLinks{ Related: &resourceHref, }, }) } return &app.UserResourcesList{ Data: data, } }
go
func convertToUserResources(request *goa.RequestData, resourceType string, resourceIDs []string) *app.UserResourcesList { data := make([]*app.UserResourceData, 0) for _, resourceID := range resourceIDs { resourceHref := rest.AbsoluteURL(request, app.ResourceHref(resourceID), nil) data = append(data, &app.UserResourceData{ ID: resourceID, Type: "resources", Links: &app.GenericLinks{ Related: &resourceHref, }, }) } return &app.UserResourcesList{ Data: data, } }
[ "func", "convertToUserResources", "(", "request", "*", "goa", ".", "RequestData", ",", "resourceType", "string", ",", "resourceIDs", "[", "]", "string", ")", "*", "app", ".", "UserResourcesList", "{", "data", ":=", "make", "(", "[", "]", "*", "app", ".", ...
// convertToUserResources converts a list of resources to which the user has a role
[ "convertToUserResources", "converts", "a", "list", "of", "resources", "to", "which", "the", "user", "has", "a", "role" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/user.go#L100-L115
150,741
fabric8-services/fabric8-auth
worker/repository/worker_lock_repository.go
AcquireLock
func (r *lockRepositoryImpl) AcquireLock(ctx context.Context, owner, name string, opts ...pglock.ClientOption) (*pglock.Lock, error) { log.Info(ctx, map[string]interface{}{ "lock": name, "owner": owner, }, "acquiring lock...") // obtain a lock to prevent other pods to perform this task var clnOpts []pglock.ClientOption if opts != nil { // Useful for testing clnOpts = opts } else { // Use default clnOpts = []pglock.ClientOption{ pglock.WithCustomTable("worker_lock"), pglock.WithLeaseDuration(30 * time.Second), pglock.WithHeartbeatFrequency(10 * time.Second), pglock.WithLogger(log.Logger()), } } if owner != "" { // use a specific owner name, otherwise it will be a random value (default behaviour) clnOpts = append(clnOpts, pglock.WithOwner(owner)) } c, err := pglock.New(r.db, clnOpts...) if err != nil { return nil, errs.Wrap(err, "cannot create worker lock client") } l, err := c.Acquire(name) // will wait until it succeeds if err != nil { // Try to get the name of the owner who holds the lock if any var holdByOwner string existingLock, nerr := c.Get(name) if nerr != nil { log.Error(ctx, map[string]interface{}{ "err": nerr, "lock": name, "owner": owner, }, "cannot obtain the existing lock when trying to acquire a new one") } else { holdByOwner = existingLock.Owner() } return nil, errs.Wrapf(err, "cannot acquire worker lock '%s' which is currently hold by '%s'", name, holdByOwner) } log.Info(ctx, map[string]interface{}{ "lock": name, "owner": owner, }, "acquired lock") return l, nil }
go
func (r *lockRepositoryImpl) AcquireLock(ctx context.Context, owner, name string, opts ...pglock.ClientOption) (*pglock.Lock, error) { log.Info(ctx, map[string]interface{}{ "lock": name, "owner": owner, }, "acquiring lock...") // obtain a lock to prevent other pods to perform this task var clnOpts []pglock.ClientOption if opts != nil { // Useful for testing clnOpts = opts } else { // Use default clnOpts = []pglock.ClientOption{ pglock.WithCustomTable("worker_lock"), pglock.WithLeaseDuration(30 * time.Second), pglock.WithHeartbeatFrequency(10 * time.Second), pglock.WithLogger(log.Logger()), } } if owner != "" { // use a specific owner name, otherwise it will be a random value (default behaviour) clnOpts = append(clnOpts, pglock.WithOwner(owner)) } c, err := pglock.New(r.db, clnOpts...) if err != nil { return nil, errs.Wrap(err, "cannot create worker lock client") } l, err := c.Acquire(name) // will wait until it succeeds if err != nil { // Try to get the name of the owner who holds the lock if any var holdByOwner string existingLock, nerr := c.Get(name) if nerr != nil { log.Error(ctx, map[string]interface{}{ "err": nerr, "lock": name, "owner": owner, }, "cannot obtain the existing lock when trying to acquire a new one") } else { holdByOwner = existingLock.Owner() } return nil, errs.Wrapf(err, "cannot acquire worker lock '%s' which is currently hold by '%s'", name, holdByOwner) } log.Info(ctx, map[string]interface{}{ "lock": name, "owner": owner, }, "acquired lock") return l, nil }
[ "func", "(", "r", "*", "lockRepositoryImpl", ")", "AcquireLock", "(", "ctx", "context", ".", "Context", ",", "owner", ",", "name", "string", ",", "opts", "...", "pglock", ".", "ClientOption", ")", "(", "*", "pglock", ".", "Lock", ",", "error", ")", "{"...
// AcquireLock acquires a lock with the given name for the given owner // Returns an error if the lock could not be obtained
[ "AcquireLock", "acquires", "a", "lock", "with", "the", "given", "name", "for", "the", "given", "owner", "Returns", "an", "error", "if", "the", "lock", "could", "not", "be", "obtained" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/worker/repository/worker_lock_repository.go#L33-L81
150,742
fabric8-services/fabric8-auth
worker/repository/worker_lock_repository.go
GetLock
func (r *lockRepositoryImpl) GetLock(ctx context.Context, name string) (*pglock.Lock, error) { log.Debug(ctx, map[string]interface{}{ "lock": name, }, "obtaining existing lock...") opts := []pglock.ClientOption{ pglock.WithCustomTable("worker_lock"), pglock.WithLogger(log.Logger()), } c, err := pglock.New(r.db, opts...) if err != nil { return nil, errs.Wrap(err, "cannot create worker lock client") } l, err := c.Get(name) if err != nil { return nil, errs.Wrapf(err, "cannot obtain the lock '%s'", name) } log.Debug(ctx, map[string]interface{}{ "lock": name, }, "obtained existing lock") return l, nil }
go
func (r *lockRepositoryImpl) GetLock(ctx context.Context, name string) (*pglock.Lock, error) { log.Debug(ctx, map[string]interface{}{ "lock": name, }, "obtaining existing lock...") opts := []pglock.ClientOption{ pglock.WithCustomTable("worker_lock"), pglock.WithLogger(log.Logger()), } c, err := pglock.New(r.db, opts...) if err != nil { return nil, errs.Wrap(err, "cannot create worker lock client") } l, err := c.Get(name) if err != nil { return nil, errs.Wrapf(err, "cannot obtain the lock '%s'", name) } log.Debug(ctx, map[string]interface{}{ "lock": name, }, "obtained existing lock") return l, nil }
[ "func", "(", "r", "*", "lockRepositoryImpl", ")", "GetLock", "(", "ctx", "context", ".", "Context", ",", "name", "string", ")", "(", "*", "pglock", ".", "Lock", ",", "error", ")", "{", "log", ".", "Debug", "(", "ctx", ",", "map", "[", "string", "]"...
// GetLock returns the lock object from the given name in the table without holding // it first.
[ "GetLock", "returns", "the", "lock", "object", "from", "the", "given", "name", "in", "the", "table", "without", "holding", "it", "first", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/worker/repository/worker_lock_repository.go#L85-L105
150,743
fabric8-services/fabric8-auth
authorization/invitation/service/invitation_service.go
processTeamInviteNotifications
func (s *invitationServiceImpl) processTeamInviteNotifications(ctx context.Context, team *account.Identity, inviterName string, notifications []invitationNotification) error { teamName := team.IdentityResource.Name var spaceName string res, err := s.Repositories().ResourceRepository().Load(ctx, team.IdentityResourceID.String) if err != nil { return err } // Every team *should* have a parent space, but we'll put this check here just in case if res.ParentResourceID != nil { sp, err := s.Services().WITService().GetSpace(ctx, *res.ParentResourceID) if err != nil { return errs.Wrap(err, "error while retrieving space from WIT") } spaceName = sp.Name } var messages []notification.Message for _, n := range notifications { acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String())) messages = append(messages, notification.NewTeamInvitationEmail(n.invitation.Identity.ID.String(), teamName, inviterName, spaceName, acceptURL)) } _, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages) return e }
go
func (s *invitationServiceImpl) processTeamInviteNotifications(ctx context.Context, team *account.Identity, inviterName string, notifications []invitationNotification) error { teamName := team.IdentityResource.Name var spaceName string res, err := s.Repositories().ResourceRepository().Load(ctx, team.IdentityResourceID.String) if err != nil { return err } // Every team *should* have a parent space, but we'll put this check here just in case if res.ParentResourceID != nil { sp, err := s.Services().WITService().GetSpace(ctx, *res.ParentResourceID) if err != nil { return errs.Wrap(err, "error while retrieving space from WIT") } spaceName = sp.Name } var messages []notification.Message for _, n := range notifications { acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String())) messages = append(messages, notification.NewTeamInvitationEmail(n.invitation.Identity.ID.String(), teamName, inviterName, spaceName, acceptURL)) } _, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages) return e }
[ "func", "(", "s", "*", "invitationServiceImpl", ")", "processTeamInviteNotifications", "(", "ctx", "context", ".", "Context", ",", "team", "*", "account", ".", "Identity", ",", "inviterName", "string", ",", "notifications", "[", "]", "invitationNotification", ")",...
// processTeamInviteNotifications sends an e-mail notification to a user.
[ "processTeamInviteNotifications", "sends", "an", "e", "-", "mail", "notification", "to", "a", "user", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L247-L280
150,744
fabric8-services/fabric8-auth
authorization/invitation/service/invitation_service.go
processSpaceInviteNotifications
func (s *invitationServiceImpl) processSpaceInviteNotifications(ctx context.Context, space *resource.Resource, inviterName string, notifications []invitationNotification) error { sp, err := s.Services().WITService().GetSpace(ctx, space.ResourceID) if err != nil { return err } spaceName := sp.Name var messages []notification.Message for _, n := range notifications { acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String())) messages = append(messages, notification.NewSpaceInvitationEmail(n.invitation.Identity.ID.String(), spaceName, inviterName, strings.Join(n.roles, ","), acceptURL)) } _, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages) return e }
go
func (s *invitationServiceImpl) processSpaceInviteNotifications(ctx context.Context, space *resource.Resource, inviterName string, notifications []invitationNotification) error { sp, err := s.Services().WITService().GetSpace(ctx, space.ResourceID) if err != nil { return err } spaceName := sp.Name var messages []notification.Message for _, n := range notifications { acceptURL := fmt.Sprintf("%s%s", s.config.GetAuthServiceURL(), client.AcceptInviteInvitationPath(n.invitation.AcceptCode.String())) messages = append(messages, notification.NewSpaceInvitationEmail(n.invitation.Identity.ID.String(), spaceName, inviterName, strings.Join(n.roles, ","), acceptURL)) } _, e := s.Services().NotificationService().SendMessagesAsync(ctx, messages) return e }
[ "func", "(", "s", "*", "invitationServiceImpl", ")", "processSpaceInviteNotifications", "(", "ctx", "context", ".", "Context", ",", "space", "*", "resource", ".", "Resource", ",", "inviterName", "string", ",", "notifications", "[", "]", "invitationNotification", "...
// processSpaceInviteNotifications sends an e-mail notification to a user.
[ "processSpaceInviteNotifications", "sends", "an", "e", "-", "mail", "notification", "to", "a", "user", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L283-L304
150,745
fabric8-services/fabric8-auth
authorization/invitation/service/invitation_service.go
Rescind
func (s *invitationServiceImpl) Rescind(ctx context.Context, rescindingUserID, invitationID uuid.UUID) error { // Locate the invitation inv, err := s.Repositories().InvitationRepository().Load(ctx, invitationID) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for invitation", invitationID.String())) } // Create the permission service permService := s.Services().PermissionService() if inv.InviteTo != nil { // Lookup identity with InviteTo ID inviteToIdentity, err := s.Repositories().Identities().Load(ctx, *inv.InviteTo) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for organization, team or security group", inv.InviteTo.String())) } if !inviteToIdentity.IdentityResourceID.Valid { return errors.NewNotFoundErrorFromString(fmt.Sprintf("specified identity '%s' has no resource", inv.InviteTo.String())) } identityResource, err := s.Repositories().ResourceRepository().Load(ctx, inviteToIdentity.IdentityResourceID.String) if err != nil { return errors.NewInternalError(ctx, err) } // Confirm that the rescinding user has the necessary scope to manage members for the organization, team or security group err = permService.RequireScope(ctx, rescindingUserID, inviteToIdentity.IdentityResourceID.String, authorization.ScopeForManagingRolesInResourceType(identityResource.ResourceType.Name)) if err != nil { return err } } else if inv.ResourceID != nil { // Lookup a resource with the ResourceID value inviteToResource, err := s.Repositories().ResourceRepository().Load(ctx, *inv.ResourceID) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for resource", *inv.ResourceID)) } // Confirm that the rescinding user has the manage members scope for the resource err = permService.RequireScope(ctx, rescindingUserID, inviteToResource.ResourceID, authorization.ScopeForManagingRolesInResourceType(inviteToResource.ResourceType.Name)) if err != nil { return err } } err = s.ExecuteInTransaction(func() error { // Delete the invitation return s.Repositories().InvitationRepository().Delete(ctx, invitationID) }) return err }
go
func (s *invitationServiceImpl) Rescind(ctx context.Context, rescindingUserID, invitationID uuid.UUID) error { // Locate the invitation inv, err := s.Repositories().InvitationRepository().Load(ctx, invitationID) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for invitation", invitationID.String())) } // Create the permission service permService := s.Services().PermissionService() if inv.InviteTo != nil { // Lookup identity with InviteTo ID inviteToIdentity, err := s.Repositories().Identities().Load(ctx, *inv.InviteTo) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for organization, team or security group", inv.InviteTo.String())) } if !inviteToIdentity.IdentityResourceID.Valid { return errors.NewNotFoundErrorFromString(fmt.Sprintf("specified identity '%s' has no resource", inv.InviteTo.String())) } identityResource, err := s.Repositories().ResourceRepository().Load(ctx, inviteToIdentity.IdentityResourceID.String) if err != nil { return errors.NewInternalError(ctx, err) } // Confirm that the rescinding user has the necessary scope to manage members for the organization, team or security group err = permService.RequireScope(ctx, rescindingUserID, inviteToIdentity.IdentityResourceID.String, authorization.ScopeForManagingRolesInResourceType(identityResource.ResourceType.Name)) if err != nil { return err } } else if inv.ResourceID != nil { // Lookup a resource with the ResourceID value inviteToResource, err := s.Repositories().ResourceRepository().Load(ctx, *inv.ResourceID) if err != nil { return errors.NewNotFoundErrorFromString(fmt.Sprintf("invalid identifier '%s' provided for resource", *inv.ResourceID)) } // Confirm that the rescinding user has the manage members scope for the resource err = permService.RequireScope(ctx, rescindingUserID, inviteToResource.ResourceID, authorization.ScopeForManagingRolesInResourceType(inviteToResource.ResourceType.Name)) if err != nil { return err } } err = s.ExecuteInTransaction(func() error { // Delete the invitation return s.Repositories().InvitationRepository().Delete(ctx, invitationID) }) return err }
[ "func", "(", "s", "*", "invitationServiceImpl", ")", "Rescind", "(", "ctx", "context", ".", "Context", ",", "rescindingUserID", ",", "invitationID", "uuid", ".", "UUID", ")", "error", "{", "// Locate the invitation", "inv", ",", "err", ":=", "s", ".", "Repos...
// Rescind revokes an invitation request
[ "Rescind", "revokes", "an", "invitation", "request" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/invitation/service/invitation_service.go#L307-L357
150,746
fabric8-services/fabric8-auth
gormsupport/lifecycle_hard_delete.go
Equal
func (lc LifecycleHardDelete) Equal(u convert.Equaler) bool { other, ok := u.(LifecycleHardDelete) return ok && lc.CreatedAt.Equal(other.CreatedAt) && lc.UpdatedAt.Equal(other.UpdatedAt) }
go
func (lc LifecycleHardDelete) Equal(u convert.Equaler) bool { other, ok := u.(LifecycleHardDelete) return ok && lc.CreatedAt.Equal(other.CreatedAt) && lc.UpdatedAt.Equal(other.UpdatedAt) }
[ "func", "(", "lc", "LifecycleHardDelete", ")", "Equal", "(", "u", "convert", ".", "Equaler", ")", "bool", "{", "other", ",", "ok", ":=", "u", ".", "(", "LifecycleHardDelete", ")", "\n", "return", "ok", "&&", "lc", ".", "CreatedAt", ".", "Equal", "(", ...
// Equal returns true if two LifecycleHardDelete objects are equal; otherwise false is returned.
[ "Equal", "returns", "true", "if", "two", "LifecycleHardDelete", "objects", "are", "equal", ";", "otherwise", "false", "is", "returned", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/gormsupport/lifecycle_hard_delete.go#L26-L29
150,747
fabric8-services/fabric8-auth
authentication/account/repository/verification_code.go
LoadByCode
func (m *GormVerificationCodeRepository) LoadByCode(ctx context.Context, code string) ([]VerificationCode, error) { return m.Query(VerificationCodeWithUser(), VerificationCodeFilterByCode(code)) // maybe load with user? }
go
func (m *GormVerificationCodeRepository) LoadByCode(ctx context.Context, code string) ([]VerificationCode, error) { return m.Query(VerificationCodeWithUser(), VerificationCodeFilterByCode(code)) // maybe load with user? }
[ "func", "(", "m", "*", "GormVerificationCodeRepository", ")", "LoadByCode", "(", "ctx", "context", ".", "Context", ",", "code", "string", ")", "(", "[", "]", "VerificationCode", ",", "error", ")", "{", "return", "m", ".", "Query", "(", "VerificationCodeWithU...
// LoadByCode loads result by filtering with respect to the verificate code.
[ "LoadByCode", "loads", "result", "by", "filtering", "with", "respect", "to", "the", "verificate", "code", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L78-L80
150,748
fabric8-services/fabric8-auth
authentication/account/repository/verification_code.go
VerificationCodeFilterByUserID
func VerificationCodeFilterByUserID(userID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("user_id = ?", userID) } }
go
func VerificationCodeFilterByUserID(userID uuid.UUID) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("user_id = ?", userID) } }
[ "func", "VerificationCodeFilterByUserID", "(", "userID", "uuid", ".", "UUID", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", ...
// VerificationCodeFilterByUserID is a gorm filter for a Belongs To relationship.
[ "VerificationCodeFilterByUserID", "is", "a", "gorm", "filter", "for", "a", "Belongs", "To", "relationship", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L170-L174
150,749
fabric8-services/fabric8-auth
authentication/account/repository/verification_code.go
VerificationCodeFilterByCode
func VerificationCodeFilterByCode(code string) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("code = ?", code) } }
go
func VerificationCodeFilterByCode(code string) func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Where("code = ?", code) } }
[ "func", "VerificationCodeFilterByCode", "(", "code", "string", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "db", ...
// VerificationCodeFilterByCode is a gorm filter for a Belongs To relationship.
[ "VerificationCodeFilterByCode", "is", "a", "gorm", "filter", "for", "a", "Belongs", "To", "relationship", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L177-L181
150,750
fabric8-services/fabric8-auth
authentication/account/repository/verification_code.go
VerificationCodeWithUser
func VerificationCodeWithUser() func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Preload("User") } }
go
func VerificationCodeWithUser() func(db *gorm.DB) *gorm.DB { return func(db *gorm.DB) *gorm.DB { return db.Preload("User") } }
[ "func", "VerificationCodeWithUser", "(", ")", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "func", "(", "db", "*", "gorm", ".", "DB", ")", "*", "gorm", ".", "DB", "{", "return", "db", ".", "Preload", "(",...
// VerificationCodeWithUser is a gorm filter for preloading the user relationship.
[ "VerificationCodeWithUser", "is", "a", "gorm", "filter", "for", "preloading", "the", "user", "relationship", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/account/repository/verification_code.go#L184-L188
150,751
fabric8-services/fabric8-auth
notification/notification.go
NewUserEmailUpdated
func NewUserEmailUpdated(identityID string, custom map[string]interface{}) Message { return Message{ MessageID: uuid.NewV4(), MessageType: "user.email.update", TargetID: identityID, UserID: &identityID, // in future if service accounts are allowed to update, this will be handy. Custom: custom, } }
go
func NewUserEmailUpdated(identityID string, custom map[string]interface{}) Message { return Message{ MessageID: uuid.NewV4(), MessageType: "user.email.update", TargetID: identityID, UserID: &identityID, // in future if service accounts are allowed to update, this will be handy. Custom: custom, } }
[ "func", "NewUserEmailUpdated", "(", "identityID", "string", ",", "custom", "map", "[", "string", "]", "interface", "{", "}", ")", "Message", "{", "return", "Message", "{", "MessageID", ":", "uuid", ".", "NewV4", "(", ")", ",", "MessageType", ":", "\"", "...
// NewUserEmailUpdated is a helper constructor which returns a Message with contents of the notification // that would be sent out.
[ "NewUserEmailUpdated", "is", "a", "helper", "constructor", "which", "returns", "a", "Message", "with", "contents", "of", "the", "notification", "that", "would", "be", "sent", "out", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/notification.go#L29-L37
150,752
fabric8-services/fabric8-auth
notification/notification.go
NewUserDeactivationEmail
func NewUserDeactivationEmail(identityID, email, deactivationDate string) Message { return Message{ MessageID: uuid.NewV4(), MessageType: "user.deactivation", TargetID: identityID, UserID: &identityID, Custom: map[string]interface{}{ "userEmail": email, "expiryDate": deactivationDate, }, } }
go
func NewUserDeactivationEmail(identityID, email, deactivationDate string) Message { return Message{ MessageID: uuid.NewV4(), MessageType: "user.deactivation", TargetID: identityID, UserID: &identityID, Custom: map[string]interface{}{ "userEmail": email, "expiryDate": deactivationDate, }, } }
[ "func", "NewUserDeactivationEmail", "(", "identityID", ",", "email", ",", "deactivationDate", "string", ")", "Message", "{", "return", "Message", "{", "MessageID", ":", "uuid", ".", "NewV4", "(", ")", ",", "MessageType", ":", "\"", "\"", ",", "TargetID", ":"...
// NewUserDeactivationEmail is a helper constructor which returns a message to inform the user that her // account will be deactivated soon
[ "NewUserDeactivationEmail", "is", "a", "helper", "constructor", "which", "returns", "a", "message", "to", "inform", "the", "user", "that", "her", "account", "will", "be", "deactivated", "soon" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/notification/notification.go#L87-L98
150,753
fabric8-services/fabric8-auth
authorization/role/service/role_management_service.go
ListByResourceAndRoleName
func (s *roleManagementServiceImpl) ListByResourceAndRoleName(ctx context.Context, currentIdentity uuid.UUID, resourceID string, roleName string) ([]rolerepo.IdentityRole, error) { err := s.requireViewRolesScope(ctx, currentIdentity, resourceID) if err != nil { return nil, err } return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName, false) }
go
func (s *roleManagementServiceImpl) ListByResourceAndRoleName(ctx context.Context, currentIdentity uuid.UUID, resourceID string, roleName string) ([]rolerepo.IdentityRole, error) { err := s.requireViewRolesScope(ctx, currentIdentity, resourceID) if err != nil { return nil, err } return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName, false) }
[ "func", "(", "s", "*", "roleManagementServiceImpl", ")", "ListByResourceAndRoleName", "(", "ctx", "context", ".", "Context", ",", "currentIdentity", "uuid", ".", "UUID", ",", "resourceID", "string", ",", "roleName", "string", ")", "(", "[", "]", "rolerepo", "....
// ListByResourceAndRoleName lists specific roles for the resource if the current user has permissions to view the roles
[ "ListByResourceAndRoleName", "lists", "specific", "roles", "for", "the", "resource", "if", "the", "current", "user", "has", "permissions", "to", "view", "the", "roles" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L30-L37
150,754
fabric8-services/fabric8-auth
authorization/role/service/role_management_service.go
ListByResource
func (s *roleManagementServiceImpl) ListByResource(ctx context.Context, currentIdentity uuid.UUID, resourceID string) ([]rolerepo.IdentityRole, error) { err := s.requireViewRolesScope(ctx, currentIdentity, resourceID) if err != nil { return nil, err } return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResource(ctx, resourceID, false) }
go
func (s *roleManagementServiceImpl) ListByResource(ctx context.Context, currentIdentity uuid.UUID, resourceID string) ([]rolerepo.IdentityRole, error) { err := s.requireViewRolesScope(ctx, currentIdentity, resourceID) if err != nil { return nil, err } return s.Repositories().IdentityRoleRepository().FindIdentityRolesByResource(ctx, resourceID, false) }
[ "func", "(", "s", "*", "roleManagementServiceImpl", ")", "ListByResource", "(", "ctx", "context", ".", "Context", ",", "currentIdentity", "uuid", ".", "UUID", ",", "resourceID", "string", ")", "(", "[", "]", "rolerepo", ".", "IdentityRole", ",", "error", ")"...
// ListByResource lists all identity roles for the resource if the current user has permissions to view the roles
[ "ListByResource", "lists", "all", "identity", "roles", "for", "the", "resource", "if", "the", "current", "user", "has", "permissions", "to", "view", "the", "roles" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L40-L47
150,755
fabric8-services/fabric8-auth
authorization/role/service/role_management_service.go
ListAvailableRolesByResourceType
func (s *roleManagementServiceImpl) ListAvailableRolesByResourceType(ctx context.Context, resourceType string) ([]role.RoleDescriptor, error) { return s.Repositories().RoleRepository().FindRolesByResourceType(ctx, resourceType) }
go
func (s *roleManagementServiceImpl) ListAvailableRolesByResourceType(ctx context.Context, resourceType string) ([]role.RoleDescriptor, error) { return s.Repositories().RoleRepository().FindRolesByResourceType(ctx, resourceType) }
[ "func", "(", "s", "*", "roleManagementServiceImpl", ")", "ListAvailableRolesByResourceType", "(", "ctx", "context", ".", "Context", ",", "resourceType", "string", ")", "(", "[", "]", "role", ".", "RoleDescriptor", ",", "error", ")", "{", "return", "s", ".", ...
// ListAvailableRolesByResourceType lists role assignments of a specific resource.
[ "ListAvailableRolesByResourceType", "lists", "role", "assignments", "of", "a", "specific", "resource", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/service/role_management_service.go#L61-L63
150,756
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
DefaultManager
func DefaultManager(config TokenManagerConfiguration) (TokenManager, error) { defaultOnce.Do(func() { defaultManager, defaultErr = NewTokenManager(config) }) return defaultManager, defaultErr }
go
func DefaultManager(config TokenManagerConfiguration) (TokenManager, error) { defaultOnce.Do(func() { defaultManager, defaultErr = NewTokenManager(config) }) return defaultManager, defaultErr }
[ "func", "DefaultManager", "(", "config", "TokenManagerConfiguration", ")", "(", "TokenManager", ",", "error", ")", "{", "defaultOnce", ".", "Do", "(", "func", "(", ")", "{", "defaultManager", ",", "defaultErr", "=", "NewTokenManager", "(", "config", ")", "\n",...
// DefaultManager creates the default manager if it has not created yet. // This function must be called in main to make sure the default manager is created during service startup. // It will try to create the default manager only once even if called multiple times.
[ "DefaultManager", "creates", "the", "default", "manager", "if", "it", "has", "not", "created", "yet", ".", "This", "function", "must", "be", "called", "in", "main", "to", "make", "sure", "the", "default", "manager", "is", "created", "during", "service", "sta...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L46-L51
150,757
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ReadTokenSetFromJson
func ReadTokenSetFromJson(ctx context.Context, jsonString string) (*TokenSet, error) { var token TokenSet err := json.Unmarshal([]byte(jsonString), &token) if err != nil { return nil, errors.Wrapf(err, "error when unmarshal json with access token %s ", jsonString) } return &token, nil }
go
func ReadTokenSetFromJson(ctx context.Context, jsonString string) (*TokenSet, error) { var token TokenSet err := json.Unmarshal([]byte(jsonString), &token) if err != nil { return nil, errors.Wrapf(err, "error when unmarshal json with access token %s ", jsonString) } return &token, nil }
[ "func", "ReadTokenSetFromJson", "(", "ctx", "context", ".", "Context", ",", "jsonString", "string", ")", "(", "*", "TokenSet", ",", "error", ")", "{", "var", "token", "TokenSet", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "[", "]", "byte", "(", ...
// ReadTokenSetFromJson parses json with a token set
[ "ReadTokenSetFromJson", "parses", "json", "with", "a", "token", "set" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L107-L114
150,758
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ReadTokenManagerFromContext
func ReadTokenManagerFromContext(ctx context.Context) (TokenManager, error) { tm := ctx.Value(contextTokenManagerKey) if tm == nil { log.Error(ctx, map[string]interface{}{ "token": tm, }, "missing token manager") return nil, errors.New("missing token manager") } return tm.(*tokenManager), nil }
go
func ReadTokenManagerFromContext(ctx context.Context) (TokenManager, error) { tm := ctx.Value(contextTokenManagerKey) if tm == nil { log.Error(ctx, map[string]interface{}{ "token": tm, }, "missing token manager") return nil, errors.New("missing token manager") } return tm.(*tokenManager), nil }
[ "func", "ReadTokenManagerFromContext", "(", "ctx", "context", ".", "Context", ")", "(", "TokenManager", ",", "error", ")", "{", "tm", ":=", "ctx", ".", "Value", "(", "contextTokenManagerKey", ")", "\n", "if", "tm", "==", "nil", "{", "log", ".", "Error", ...
// ReadTokenManagerFromContext extracts the token manager from the context and returns it
[ "ReadTokenManagerFromContext", "extracts", "the", "token", "manager", "from", "the", "context", "and", "returns", "it" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L154-L164
150,759
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
NewTokenManager
func NewTokenManager(config TokenManagerConfiguration) (TokenManager, error) { tm := &tokenManager{ publicKeysMap: map[string]*rsa.PublicKey{}, } tm.config = config // Load the user account private key and add it to the manager. // Extract the public key from it and add it to the map of public keys. var err error key, kid := config.GetUserAccountPrivateKey() deprecatedKey, deprecatedKid := config.GetDeprecatedUserAccountPrivateKey() tm.userAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load user account private keys") return nil, err } // Load the service account private key and add it to the manager. // Extract the public key from it and add it to the map of public keys. key, kid = config.GetServiceAccountPrivateKey() deprecatedKey, deprecatedKid = config.GetDeprecatedServiceAccountPrivateKey() tm.serviceAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load service account private keys") return nil, err } // Load Keycloak public key if run in dev mode. devMode, key, kid := config.GetDevModePublicKey() if devMode { rsaKey, err := jwt.ParseRSAPublicKeyFromPEM(key) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load dev mode public key") return nil, err } tm.publicKeysMap[kid] = rsaKey tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: rsaKey}) log.Info(nil, map[string]interface{}{"kid": kid}, "dev mode public key added") } // Convert public keys to JWK format jsonWebKeys, err := tm.toJSONWebKeys(tm.publicKeys) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to JSON Web Keys") return nil, errors.New("unable to convert public keys to JSON Web Keys") } tm.jsonWebKeys = jsonWebKeys // Convert public keys to PEM format jsonKeys, err := tm.toPemKeys(tm.publicKeys) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to PEM Keys") return nil, errors.New("unable to convert public keys to PEM Keys") } tm.pemKeys = jsonKeys tm.initServiceAccountToken() return tm, nil }
go
func NewTokenManager(config TokenManagerConfiguration) (TokenManager, error) { tm := &tokenManager{ publicKeysMap: map[string]*rsa.PublicKey{}, } tm.config = config // Load the user account private key and add it to the manager. // Extract the public key from it and add it to the map of public keys. var err error key, kid := config.GetUserAccountPrivateKey() deprecatedKey, deprecatedKid := config.GetDeprecatedUserAccountPrivateKey() tm.userAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load user account private keys") return nil, err } // Load the service account private key and add it to the manager. // Extract the public key from it and add it to the map of public keys. key, kid = config.GetServiceAccountPrivateKey() deprecatedKey, deprecatedKid = config.GetDeprecatedServiceAccountPrivateKey() tm.serviceAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load service account private keys") return nil, err } // Load Keycloak public key if run in dev mode. devMode, key, kid := config.GetDevModePublicKey() if devMode { rsaKey, err := jwt.ParseRSAPublicKeyFromPEM(key) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to load dev mode public key") return nil, err } tm.publicKeysMap[kid] = rsaKey tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: rsaKey}) log.Info(nil, map[string]interface{}{"kid": kid}, "dev mode public key added") } // Convert public keys to JWK format jsonWebKeys, err := tm.toJSONWebKeys(tm.publicKeys) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to JSON Web Keys") return nil, errors.New("unable to convert public keys to JSON Web Keys") } tm.jsonWebKeys = jsonWebKeys // Convert public keys to PEM format jsonKeys, err := tm.toPemKeys(tm.publicKeys) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to convert public keys to PEM Keys") return nil, errors.New("unable to convert public keys to PEM Keys") } tm.pemKeys = jsonKeys tm.initServiceAccountToken() return tm, nil }
[ "func", "NewTokenManager", "(", "config", "TokenManagerConfiguration", ")", "(", "TokenManager", ",", "error", ")", "{", "tm", ":=", "&", "tokenManager", "{", "publicKeysMap", ":", "map", "[", "string", "]", "*", "rsa", ".", "PublicKey", "{", "}", ",", "}"...
// NewTokenManager returns a new token Manager for handling tokens
[ "NewTokenManager", "returns", "a", "new", "token", "Manager", "for", "handling", "tokens" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L221-L279
150,760
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
SignRPTToken
func (mgm *tokenManager) SignRPTToken(ctx context.Context, rptToken *jwt.Token) (string, error) { return rptToken.SignedString(mgm.userAccountPrivateKey.Key) }
go
func (mgm *tokenManager) SignRPTToken(ctx context.Context, rptToken *jwt.Token) (string, error) { return rptToken.SignedString(mgm.userAccountPrivateKey.Key) }
[ "func", "(", "mgm", "*", "tokenManager", ")", "SignRPTToken", "(", "ctx", "context", ".", "Context", ",", "rptToken", "*", "jwt", ".", "Token", ")", "(", "string", ",", "error", ")", "{", "return", "rptToken", ".", "SignedString", "(", "mgm", ".", "use...
// SignRPTToken generates a signature for the specified rpt token and returns it
[ "SignRPTToken", "generates", "a", "signature", "for", "the", "specified", "rpt", "token", "and", "returns", "it" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L389-L391
150,761
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
GenerateUnsignedUserAccessTokenForIdentity
func (m *tokenManager) GenerateUnsignedUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() claims["exp"] = iat + m.config.GetAccessTokenExpiresIn() claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = "Bearer" claims["auth_time"] = iat // TODO should use the time when user actually logged-in the last time. Will need to get this time from the RHD token claims["approved"] = !identity.User.Banned claims["sub"] = identity.ID.String() claims["email_verified"] = identity.User.EmailVerified claims["name"] = identity.User.FullName claims["preferred_username"] = identity.Username firstName, lastName := account.SplitFullName(identity.User.FullName) claims["given_name"] = firstName claims["family_name"] = lastName claims["email"] = identity.User.Email claims["company"] = identity.User.Company claims["allowed-origins"] = []string{ authOpenshiftIO, openshiftIO, } claims["session_state"] = uuid.NewV4().String() return token, nil }
go
func (m *tokenManager) GenerateUnsignedUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() claims["exp"] = iat + m.config.GetAccessTokenExpiresIn() claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = "Bearer" claims["auth_time"] = iat // TODO should use the time when user actually logged-in the last time. Will need to get this time from the RHD token claims["approved"] = !identity.User.Banned claims["sub"] = identity.ID.String() claims["email_verified"] = identity.User.EmailVerified claims["name"] = identity.User.FullName claims["preferred_username"] = identity.Username firstName, lastName := account.SplitFullName(identity.User.FullName) claims["given_name"] = firstName claims["family_name"] = lastName claims["email"] = identity.User.Email claims["company"] = identity.User.Company claims["allowed-origins"] = []string{ authOpenshiftIO, openshiftIO, } claims["session_state"] = uuid.NewV4().String() return token, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "GenerateUnsignedUserAccessTokenForIdentity", "(", "ctx", "context", ".", "Context", ",", "identity", "repository", ".", "Identity", ")", "(", "*", "jwt", ".", "Token", ",", "error", ")", "{", "token", ":=", "jwt",...
// GenerateUnsignedUserAccessTokenForIdentity generates an unsigned OAuth2 user access token for the given identity
[ "GenerateUnsignedUserAccessTokenForIdentity", "generates", "an", "unsigned", "OAuth2", "user", "access", "token", "for", "the", "given", "identity" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L476-L516
150,762
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
GenerateTransientUserAccessTokenForIdentity
func (m *tokenManager) GenerateTransientUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*string, error) { token, err := m.GenerateUnsignedUserAccessTokenForIdentity(ctx, identity) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) iat := time.Now().Unix() claims["exp"] = iat + m.config.GetTransientTokenExpiresIn() claims["transient"] = "true" accessToken, err := token.SignedString(m.userAccountPrivateKey.Key) if err != nil { return nil, errors.WithStack(err) } return &accessToken, nil }
go
func (m *tokenManager) GenerateTransientUserAccessTokenForIdentity(ctx context.Context, identity repository.Identity) (*string, error) { token, err := m.GenerateUnsignedUserAccessTokenForIdentity(ctx, identity) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) iat := time.Now().Unix() claims["exp"] = iat + m.config.GetTransientTokenExpiresIn() claims["transient"] = "true" accessToken, err := token.SignedString(m.userAccountPrivateKey.Key) if err != nil { return nil, errors.WithStack(err) } return &accessToken, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "GenerateTransientUserAccessTokenForIdentity", "(", "ctx", "context", ".", "Context", ",", "identity", "repository", ".", "Identity", ")", "(", "*", "string", ",", "error", ")", "{", "token", ",", "err", ":=", "m",...
// GenerateTransientUserAccessTokenForIdentity generates a transient user access token, an extremely short-lived token
[ "GenerateTransientUserAccessTokenForIdentity", "generates", "a", "transient", "user", "access", "token", "an", "extremely", "short", "-", "lived", "token" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L519-L536
150,763
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
GenerateUnsignedUserAccessTokenForAPIClient
func (m *tokenManager) GenerateUnsignedUserAccessTokenForAPIClient(ctx context.Context, providerAccessToken string) (*jwt.Token, error) { kcClaims, err := m.ParseToken(ctx, providerAccessToken) if err != nil { return nil, errors.WithStack(err) } return m.GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx, kcClaims) }
go
func (m *tokenManager) GenerateUnsignedUserAccessTokenForAPIClient(ctx context.Context, providerAccessToken string) (*jwt.Token, error) { kcClaims, err := m.ParseToken(ctx, providerAccessToken) if err != nil { return nil, errors.WithStack(err) } return m.GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx, kcClaims) }
[ "func", "(", "m", "*", "tokenManager", ")", "GenerateUnsignedUserAccessTokenForAPIClient", "(", "ctx", "context", ".", "Context", ",", "providerAccessToken", "string", ")", "(", "*", "jwt", ".", "Token", ",", "error", ")", "{", "kcClaims", ",", "err", ":=", ...
// GenerateUnsignedUserAccessTokenForAPIClient generates an unsigned OAuth2 user access token for the api_client based on the Keycloak token
[ "GenerateUnsignedUserAccessTokenForAPIClient", "generates", "an", "unsigned", "OAuth2", "user", "access", "token", "for", "the", "api_client", "based", "on", "the", "Keycloak", "token" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L822-L829
150,764
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
GenerateUnsignedUserAccessTokenFromClaimsForAPIClient
func (m *tokenManager) GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx context.Context, tokenClaims *TokenClaims) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, errors.WithStack(err) } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() claims["exp"] = iat + m.config.GetAccessTokenExpiresIn() claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = "Bearer" claims["auth_time"] = iat claims["typ"] = "Bearer" claims["approved"] = tokenClaims.Approved claims["sub"] = tokenClaims.Subject claims["email_verified"] = tokenClaims.EmailVerified claims["name"] = tokenClaims.Name claims["preferred_username"] = tokenClaims.Username claims["given_name"] = tokenClaims.GivenName claims["family_name"] = tokenClaims.FamilyName claims["email"] = tokenClaims.Email claims["allowed-origins"] = []string{ authOpenshiftIO, openshiftIO, } claims["azp"] = tokenClaims.Audience claims["session_state"] = tokenClaims.SessionState claims["acr"] = "0" realmAccess := make(map[string]interface{}) realmAccess["roles"] = []string{"uma_authorization"} claims["realm_access"] = realmAccess resourceAccess := make(map[string]interface{}) broker := make(map[string]interface{}) broker["roles"] = []string{"read-token"} resourceAccess["broker"] = broker account := make(map[string]interface{}) account["roles"] = []string{"manage-account", "manage-account-links", "view-profile"} resourceAccess["account"] = account claims["resource_access"] = resourceAccess return token, nil }
go
func (m *tokenManager) GenerateUnsignedUserAccessTokenFromClaimsForAPIClient(ctx context.Context, tokenClaims *TokenClaims) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, errors.WithStack(err) } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() claims["exp"] = iat + m.config.GetAccessTokenExpiresIn() claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = "Bearer" claims["auth_time"] = iat claims["typ"] = "Bearer" claims["approved"] = tokenClaims.Approved claims["sub"] = tokenClaims.Subject claims["email_verified"] = tokenClaims.EmailVerified claims["name"] = tokenClaims.Name claims["preferred_username"] = tokenClaims.Username claims["given_name"] = tokenClaims.GivenName claims["family_name"] = tokenClaims.FamilyName claims["email"] = tokenClaims.Email claims["allowed-origins"] = []string{ authOpenshiftIO, openshiftIO, } claims["azp"] = tokenClaims.Audience claims["session_state"] = tokenClaims.SessionState claims["acr"] = "0" realmAccess := make(map[string]interface{}) realmAccess["roles"] = []string{"uma_authorization"} claims["realm_access"] = realmAccess resourceAccess := make(map[string]interface{}) broker := make(map[string]interface{}) broker["roles"] = []string{"read-token"} resourceAccess["broker"] = broker account := make(map[string]interface{}) account["roles"] = []string{"manage-account", "manage-account-links", "view-profile"} resourceAccess["account"] = account claims["resource_access"] = resourceAccess return token, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "GenerateUnsignedUserAccessTokenFromClaimsForAPIClient", "(", "ctx", "context", ".", "Context", ",", "tokenClaims", "*", "TokenClaims", ")", "(", "*", "jwt", ".", "Token", ",", "error", ")", "{", "token", ":=", "jwt"...
// GenerateUnsignedUserAccessTokenFromClaimsForAPIClient generates a new token based on the specified claims for api_client
[ "GenerateUnsignedUserAccessTokenFromClaimsForAPIClient", "generates", "a", "new", "token", "based", "on", "the", "specified", "claims", "for", "api_client" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L832-L894
150,765
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
GenerateUnsignedUserRefreshTokenForAPIClient
func (m *tokenManager) GenerateUnsignedUserRefreshTokenForAPIClient(ctx context.Context, accessToken string) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID tokenClaims, err := m.ParseToken(ctx, accessToken) if err != nil { return nil, errors.WithStack(err) } req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, errors.WithStack(err) } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() exp := iat + m.config.GetRefreshTokenExpiresIn() typ := "Refresh" claims["exp"] = exp claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = typ claims["auth_time"] = 0 // populate claims for user details in refresh token for api_client claims["sub"] = tokenClaims.Subject claims["email_verified"] = tokenClaims.EmailVerified claims["name"] = tokenClaims.Name claims["preferred_username"] = tokenClaims.Username claims["given_name"] = tokenClaims.GivenName claims["family_name"] = tokenClaims.FamilyName claims["email"] = tokenClaims.Email // ToDo - Do we need azp claim? claims["azp"] = tokenClaims.Audience claims["session_state"] = tokenClaims.SessionState return token, nil }
go
func (m *tokenManager) GenerateUnsignedUserRefreshTokenForAPIClient(ctx context.Context, accessToken string) (*jwt.Token, error) { token := jwt.New(jwt.SigningMethodRS256) token.Header["kid"] = m.userAccountPrivateKey.KeyID tokenClaims, err := m.ParseToken(ctx, accessToken) if err != nil { return nil, errors.WithStack(err) } req := goa.ContextRequest(ctx) if req == nil { return nil, errors.New("missing request in context") } authOpenshiftIO := rest.AbsoluteURL(req, "", m.config) openshiftIO, err := rest.ReplaceDomainPrefixInAbsoluteURL(req, "", "", m.config) if err != nil { return nil, errors.WithStack(err) } claims := token.Claims.(jwt.MapClaims) claims["jti"] = uuid.NewV4().String() iat := time.Now().Unix() exp := iat + m.config.GetRefreshTokenExpiresIn() typ := "Refresh" claims["exp"] = exp claims["nbf"] = 0 claims["iat"] = iat claims["iss"] = authOpenshiftIO claims["aud"] = openshiftIO claims["typ"] = typ claims["auth_time"] = 0 // populate claims for user details in refresh token for api_client claims["sub"] = tokenClaims.Subject claims["email_verified"] = tokenClaims.EmailVerified claims["name"] = tokenClaims.Name claims["preferred_username"] = tokenClaims.Username claims["given_name"] = tokenClaims.GivenName claims["family_name"] = tokenClaims.FamilyName claims["email"] = tokenClaims.Email // ToDo - Do we need azp claim? claims["azp"] = tokenClaims.Audience claims["session_state"] = tokenClaims.SessionState return token, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "GenerateUnsignedUserRefreshTokenForAPIClient", "(", "ctx", "context", ".", "Context", ",", "accessToken", "string", ")", "(", "*", "jwt", ".", "Token", ",", "error", ")", "{", "token", ":=", "jwt", ".", "New", "...
// GenerateUnsignedUserRefreshToken generates an unsigned OAuth2 user refresh token for the given identity based on the Keycloak token
[ "GenerateUnsignedUserRefreshToken", "generates", "an", "unsigned", "OAuth2", "user", "refresh", "token", "for", "the", "given", "identity", "based", "on", "the", "Keycloak", "token" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L897-L944
150,766
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
Parse
func (m *tokenManager) Parse(ctx context.Context, tokenString string) (*jwt.Token, error) { keyFunc := m.KeyFunction(ctx) jwtToken, err := jwt.Parse(tokenString, keyFunc) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "unable to parse token") return nil, autherrors.NewUnauthorizedError(err.Error()) } return jwtToken, nil }
go
func (m *tokenManager) Parse(ctx context.Context, tokenString string) (*jwt.Token, error) { keyFunc := m.KeyFunction(ctx) jwtToken, err := jwt.Parse(tokenString, keyFunc) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "unable to parse token") return nil, autherrors.NewUnauthorizedError(err.Error()) } return jwtToken, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "Parse", "(", "ctx", "context", ".", "Context", ",", "tokenString", "string", ")", "(", "*", "jwt", ".", "Token", ",", "error", ")", "{", "keyFunc", ":=", "m", ".", "KeyFunction", "(", "ctx", ")", "\n", "...
// Parse parses the specified token string and returns a JWT token
[ "Parse", "parses", "the", "specified", "token", "string", "and", "returns", "a", "JWT", "token" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L996-L1006
150,767
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ParseToken
func (m *tokenManager) ParseToken(ctx context.Context, tokenString string) (*TokenClaims, error) { token, err := jwt.ParseWithClaims(tokenString, &TokenClaims{}, m.KeyFunction(ctx)) if err != nil { return nil, err } claims := token.Claims.(*TokenClaims) if token.Valid { return claims, nil } return nil, errors.WithStack(errors.New("token is not valid")) }
go
func (m *tokenManager) ParseToken(ctx context.Context, tokenString string) (*TokenClaims, error) { token, err := jwt.ParseWithClaims(tokenString, &TokenClaims{}, m.KeyFunction(ctx)) if err != nil { return nil, err } claims := token.Claims.(*TokenClaims) if token.Valid { return claims, nil } return nil, errors.WithStack(errors.New("token is not valid")) }
[ "func", "(", "m", "*", "tokenManager", ")", "ParseToken", "(", "ctx", "context", ".", "Context", ",", "tokenString", "string", ")", "(", "*", "TokenClaims", ",", "error", ")", "{", "token", ",", "err", ":=", "jwt", ".", "ParseWithClaims", "(", "tokenStri...
// ParseToken parses the specified token string and returns its claims
[ "ParseToken", "parses", "the", "specified", "token", "string", "and", "returns", "its", "claims" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1009-L1019
150,768
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ParseTokenWithMapClaims
func (m *tokenManager) ParseTokenWithMapClaims(ctx context.Context, tokenString string) (jwt.MapClaims, error) { token, err := jwt.Parse(tokenString, m.KeyFunction(ctx)) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) if token.Valid { return claims, nil } return nil, errors.WithStack(errors.New("token is not valid")) }
go
func (m *tokenManager) ParseTokenWithMapClaims(ctx context.Context, tokenString string) (jwt.MapClaims, error) { token, err := jwt.Parse(tokenString, m.KeyFunction(ctx)) if err != nil { return nil, err } claims := token.Claims.(jwt.MapClaims) if token.Valid { return claims, nil } return nil, errors.WithStack(errors.New("token is not valid")) }
[ "func", "(", "m", "*", "tokenManager", ")", "ParseTokenWithMapClaims", "(", "ctx", "context", ".", "Context", ",", "tokenString", "string", ")", "(", "jwt", ".", "MapClaims", ",", "error", ")", "{", "token", ",", "err", ":=", "jwt", ".", "Parse", "(", ...
// ParseTokenWithMapClaims parses token claims
[ "ParseTokenWithMapClaims", "parses", "token", "claims" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1022-L1032
150,769
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
PublicKeys
func (m *tokenManager) PublicKeys() []*rsa.PublicKey { keys := make([]*rsa.PublicKey, 0, len(m.publicKeysMap)) for _, key := range m.publicKeys { keys = append(keys, key.Key) } return keys }
go
func (m *tokenManager) PublicKeys() []*rsa.PublicKey { keys := make([]*rsa.PublicKey, 0, len(m.publicKeysMap)) for _, key := range m.publicKeys { keys = append(keys, key.Key) } return keys }
[ "func", "(", "m", "*", "tokenManager", ")", "PublicKeys", "(", ")", "[", "]", "*", "rsa", ".", "PublicKey", "{", "keys", ":=", "make", "(", "[", "]", "*", "rsa", ".", "PublicKey", ",", "0", ",", "len", "(", "m", ".", "publicKeysMap", ")", ")", ...
// PublicKeys returns all the public keys
[ "PublicKeys", "returns", "all", "the", "public", "keys" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1045-L1051
150,770
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ConvertToken
func (m *tokenManager) ConvertToken(oauthToken oauth2.Token) (*TokenSet, error) { tokenSet := &TokenSet{ AccessToken: &oauthToken.AccessToken, RefreshToken: &oauthToken.RefreshToken, TokenType: &oauthToken.TokenType, } var err error tokenSet.ExpiresIn, err = m.extraInt(oauthToken, "expires_in") if err != nil { return nil, err } tokenSet.RefreshExpiresIn, err = m.extraInt(oauthToken, "refresh_expires_in") if err != nil { return nil, err } tokenSet.NotBeforePolicy, err = m.extraInt(oauthToken, "not_before_policy") if err != nil { return nil, err } return tokenSet, nil }
go
func (m *tokenManager) ConvertToken(oauthToken oauth2.Token) (*TokenSet, error) { tokenSet := &TokenSet{ AccessToken: &oauthToken.AccessToken, RefreshToken: &oauthToken.RefreshToken, TokenType: &oauthToken.TokenType, } var err error tokenSet.ExpiresIn, err = m.extraInt(oauthToken, "expires_in") if err != nil { return nil, err } tokenSet.RefreshExpiresIn, err = m.extraInt(oauthToken, "refresh_expires_in") if err != nil { return nil, err } tokenSet.NotBeforePolicy, err = m.extraInt(oauthToken, "not_before_policy") if err != nil { return nil, err } return tokenSet, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "ConvertToken", "(", "oauthToken", "oauth2", ".", "Token", ")", "(", "*", "TokenSet", ",", "error", ")", "{", "tokenSet", ":=", "&", "TokenSet", "{", "AccessToken", ":", "&", "oauthToken", ".", "AccessToken", "...
// ConvertToken converts the oauth2.Token to a token set
[ "ConvertToken", "converts", "the", "oauth2", ".", "Token", "to", "a", "token", "set" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1054-L1077
150,771
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
ConvertTokenSet
func (m *tokenManager) ConvertTokenSet(tokenSet TokenSet) *oauth2.Token { var accessToken, refreshToken, tokenType string extra := make(map[string]interface{}) if tokenSet.AccessToken != nil { accessToken = *tokenSet.AccessToken } if tokenSet.RefreshToken != nil { refreshToken = *tokenSet.RefreshToken } if tokenSet.TokenType != nil { tokenType = *tokenSet.TokenType } var expire time.Time if tokenSet.ExpiresIn != nil { expire = time.Now().Add(time.Duration(*tokenSet.ExpiresIn) * time.Second) extra["expires_in"] = *tokenSet.ExpiresIn } if tokenSet.RefreshExpiresIn != nil { extra["refresh_expires_in"] = *tokenSet.RefreshExpiresIn } if tokenSet.NotBeforePolicy != nil { extra["not_before_policy"] = *tokenSet.NotBeforePolicy } oauth2Token := &oauth2.Token{ AccessToken: accessToken, RefreshToken: refreshToken, TokenType: tokenType, Expiry: expire, } oauth2Token = oauth2Token.WithExtra(extra) return oauth2Token }
go
func (m *tokenManager) ConvertTokenSet(tokenSet TokenSet) *oauth2.Token { var accessToken, refreshToken, tokenType string extra := make(map[string]interface{}) if tokenSet.AccessToken != nil { accessToken = *tokenSet.AccessToken } if tokenSet.RefreshToken != nil { refreshToken = *tokenSet.RefreshToken } if tokenSet.TokenType != nil { tokenType = *tokenSet.TokenType } var expire time.Time if tokenSet.ExpiresIn != nil { expire = time.Now().Add(time.Duration(*tokenSet.ExpiresIn) * time.Second) extra["expires_in"] = *tokenSet.ExpiresIn } if tokenSet.RefreshExpiresIn != nil { extra["refresh_expires_in"] = *tokenSet.RefreshExpiresIn } if tokenSet.NotBeforePolicy != nil { extra["not_before_policy"] = *tokenSet.NotBeforePolicy } oauth2Token := &oauth2.Token{ AccessToken: accessToken, RefreshToken: refreshToken, TokenType: tokenType, Expiry: expire, } oauth2Token = oauth2Token.WithExtra(extra) return oauth2Token }
[ "func", "(", "m", "*", "tokenManager", ")", "ConvertTokenSet", "(", "tokenSet", "TokenSet", ")", "*", "oauth2", ".", "Token", "{", "var", "accessToken", ",", "refreshToken", ",", "tokenType", "string", "\n", "extra", ":=", "make", "(", "map", "[", "string"...
// ConvertTokenSet converts the token set to oauth2.Token
[ "ConvertTokenSet", "converts", "the", "token", "set", "to", "oauth2", ".", "Token" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1080-L1113
150,772
fabric8-services/fabric8-auth
authorization/token/manager/token_manager.go
loadPrivateKey
func (m *tokenManager) loadPrivateKey(tm *tokenManager, key []byte, kid string, deprecatedKey []byte, deprecatedKid string) (*token.PrivateKey, error) { if len(key) == 0 || kid == "" { log.Error(nil, map[string]interface{}{ "kid": kid, "key_length": len(key), }, "private key or its ID are not set up") return nil, errors.New("private key or its ID are not set up") } // Load the private key. Extract the public key from it rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(key) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to parse private key") return nil, err } privateKey := &token.PrivateKey{KeyID: kid, Key: rsaServiceAccountKey} pk := &rsaServiceAccountKey.PublicKey tm.publicKeysMap[kid] = pk tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: pk}) log.Info(nil, map[string]interface{}{"kid": kid}, "public key added") // Extract public key from the deprecated key if any and add it to the manager if len(deprecatedKey) == 0 || deprecatedKid == "" { log.Debug(nil, map[string]interface{}{ "kid": deprecatedKid, "key_length": len(deprecatedKey), }, "no deprecated private key found") } else { rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(deprecatedKey) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to parse deprecated private key") return nil, err } pk := &rsaServiceAccountKey.PublicKey tm.publicKeysMap[deprecatedKid] = pk tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: deprecatedKid, Key: pk}) log.Info(nil, map[string]interface{}{"kid": deprecatedKid}, "deprecated public key added") } return privateKey, nil }
go
func (m *tokenManager) loadPrivateKey(tm *tokenManager, key []byte, kid string, deprecatedKey []byte, deprecatedKid string) (*token.PrivateKey, error) { if len(key) == 0 || kid == "" { log.Error(nil, map[string]interface{}{ "kid": kid, "key_length": len(key), }, "private key or its ID are not set up") return nil, errors.New("private key or its ID are not set up") } // Load the private key. Extract the public key from it rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(key) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to parse private key") return nil, err } privateKey := &token.PrivateKey{KeyID: kid, Key: rsaServiceAccountKey} pk := &rsaServiceAccountKey.PublicKey tm.publicKeysMap[kid] = pk tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: pk}) log.Info(nil, map[string]interface{}{"kid": kid}, "public key added") // Extract public key from the deprecated key if any and add it to the manager if len(deprecatedKey) == 0 || deprecatedKid == "" { log.Debug(nil, map[string]interface{}{ "kid": deprecatedKid, "key_length": len(deprecatedKey), }, "no deprecated private key found") } else { rsaServiceAccountKey, err := jwt.ParseRSAPrivateKeyFromPEM(deprecatedKey) if err != nil { log.Error(nil, map[string]interface{}{"err": err}, "unable to parse deprecated private key") return nil, err } pk := &rsaServiceAccountKey.PublicKey tm.publicKeysMap[deprecatedKid] = pk tm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: deprecatedKid, Key: pk}) log.Info(nil, map[string]interface{}{"kid": deprecatedKid}, "deprecated public key added") } return privateKey, nil }
[ "func", "(", "m", "*", "tokenManager", ")", "loadPrivateKey", "(", "tm", "*", "tokenManager", ",", "key", "[", "]", "byte", ",", "kid", "string", ",", "deprecatedKey", "[", "]", "byte", ",", "deprecatedKid", "string", ")", "(", "*", "token", ".", "Priv...
// LoadPrivateKey loads a private key and a deprecated private key. // Extracts public keys from them and adds them to the manager // Returns the loaded private key.
[ "LoadPrivateKey", "loads", "a", "private", "key", "and", "a", "deprecated", "private", "key", ".", "Extracts", "public", "keys", "from", "them", "and", "adds", "them", "to", "the", "manager", "Returns", "the", "loaded", "private", "key", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/token/manager/token_manager.go#L1152-L1191
150,773
fabric8-services/fabric8-auth
cluster/factory/cluster_cache_factory.go
NewClusterCacheFactory
func NewClusterCacheFactory(context servicecontext.ServiceContext, config ClusterCacheFactoryConfiguration) service.ClusterCacheFactory { factory := &clusterCacheFactoryImpl{ BaseService: base.NewBaseService(context), config: config, } return factory }
go
func NewClusterCacheFactory(context servicecontext.ServiceContext, config ClusterCacheFactoryConfiguration) service.ClusterCacheFactory { factory := &clusterCacheFactoryImpl{ BaseService: base.NewBaseService(context), config: config, } return factory }
[ "func", "NewClusterCacheFactory", "(", "context", "servicecontext", ".", "ServiceContext", ",", "config", "ClusterCacheFactoryConfiguration", ")", "service", ".", "ClusterCacheFactory", "{", "factory", ":=", "&", "clusterCacheFactoryImpl", "{", "BaseService", ":", "base",...
// NewClusterCacheFactory returns the default cluster cache factory.
[ "NewClusterCacheFactory", "returns", "the", "default", "cluster", "cache", "factory", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/cluster/factory/cluster_cache_factory.go#L23-L29
150,774
fabric8-services/fabric8-auth
cluster/factory/cluster_cache_factory.go
NewClusterCache
func (f *clusterCacheFactoryImpl) NewClusterCache(ctx context.Context, options ...rest.HTTPClientOption) cluster.ClusterCache { return clusterservice.NewCache(f.config, options...) }
go
func (f *clusterCacheFactoryImpl) NewClusterCache(ctx context.Context, options ...rest.HTTPClientOption) cluster.ClusterCache { return clusterservice.NewCache(f.config, options...) }
[ "func", "(", "f", "*", "clusterCacheFactoryImpl", ")", "NewClusterCache", "(", "ctx", "context", ".", "Context", ",", "options", "...", "rest", ".", "HTTPClientOption", ")", "cluster", ".", "ClusterCache", "{", "return", "clusterservice", ".", "NewCache", "(", ...
// NewClusterCache creates a new cluster cache
[ "NewClusterCache", "creates", "a", "new", "cluster", "cache" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/cluster/factory/cluster_cache_factory.go#L37-L39
150,775
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
NewAuthenticationProviderService
func NewAuthenticationProviderService(ctx servicecontext.ServiceContext, config AuthenticationProviderServiceConfig) service.AuthenticationProviderService { return &authenticationProviderServiceImpl{ BaseService: base.NewBaseService(ctx), config: config, } }
go
func NewAuthenticationProviderService(ctx servicecontext.ServiceContext, config AuthenticationProviderServiceConfig) service.AuthenticationProviderService { return &authenticationProviderServiceImpl{ BaseService: base.NewBaseService(ctx), config: config, } }
[ "func", "NewAuthenticationProviderService", "(", "ctx", "servicecontext", ".", "ServiceContext", ",", "config", "AuthenticationProviderServiceConfig", ")", "service", ".", "AuthenticationProviderService", "{", "return", "&", "authenticationProviderServiceImpl", "{", "BaseServic...
// NewAuthenticationProviderService returns a new AuthenticationProviderService implementation
[ "NewAuthenticationProviderService", "returns", "a", "new", "AuthenticationProviderService", "implementation" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L53-L58
150,776
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
LoginCallback
func (s *authenticationProviderServiceImpl) LoginCallback(ctx context.Context, state string, code string, redirectURL string) (*string, error) { // After redirect from oauth provider log.Debug(ctx, map[string]interface{}{ "code": code, "state": state, }, "Redirected from oauth provider") referrerURL, _, err := s.reclaimReferrerAndResponseMode(ctx, state, code) if err != nil { return nil, err } providerToken, err := s.ExchangeCodeWithProvider(ctx, code, redirectURL) if err != nil { redirect := referrerURL.String() + "?error=" + url.QueryEscape(err.Error()) return &redirect, err } redirectTo, _, err := s.CreateOrUpdateIdentityAndUser(ctx, referrerURL, providerToken) if err != nil { return nil, err } if redirectTo != nil { return redirectTo, nil } redirect := referrerURL.String() return &redirect, nil }
go
func (s *authenticationProviderServiceImpl) LoginCallback(ctx context.Context, state string, code string, redirectURL string) (*string, error) { // After redirect from oauth provider log.Debug(ctx, map[string]interface{}{ "code": code, "state": state, }, "Redirected from oauth provider") referrerURL, _, err := s.reclaimReferrerAndResponseMode(ctx, state, code) if err != nil { return nil, err } providerToken, err := s.ExchangeCodeWithProvider(ctx, code, redirectURL) if err != nil { redirect := referrerURL.String() + "?error=" + url.QueryEscape(err.Error()) return &redirect, err } redirectTo, _, err := s.CreateOrUpdateIdentityAndUser(ctx, referrerURL, providerToken) if err != nil { return nil, err } if redirectTo != nil { return redirectTo, nil } redirect := referrerURL.String() return &redirect, nil }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "LoginCallback", "(", "ctx", "context", ".", "Context", ",", "state", "string", ",", "code", "string", ",", "redirectURL", "string", ")", "(", "*", "string", ",", "error", ")", "{", "// After r...
// LoginCallback is invoked after the client has visited the authentication provider and state and code values are returned. // These two parameters will be exchanged with the authentication provider for an access token, which will then be // returned to the client.
[ "LoginCallback", "is", "invoked", "after", "the", "client", "has", "visited", "the", "authentication", "provider", "and", "state", "and", "code", "values", "are", "returned", ".", "These", "two", "parameters", "will", "be", "exchanged", "with", "the", "authentic...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L121-L151
150,777
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
ExchangeCodeWithProvider
func (s *authenticationProviderServiceImpl) ExchangeCodeWithProvider(ctx context.Context, code string, redirectURL string) (*oauth2.Token, error) { // Exchange the code for an access token provider := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config) provider.SetRedirectURL(redirectURL) token, err := provider.Exchange(ctx, code) if err != nil { log.Error(ctx, map[string]interface{}{ "code": code, "err": err, "redirect_url": redirectURL, }, "oauth exchange operation failed") return nil, autherrors.NewUnauthorizedError(err.Error()) } log.Debug(ctx, map[string]interface{}{ "code": code, }, "exchanged code to access token") return token, nil }
go
func (s *authenticationProviderServiceImpl) ExchangeCodeWithProvider(ctx context.Context, code string, redirectURL string) (*oauth2.Token, error) { // Exchange the code for an access token provider := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config) provider.SetRedirectURL(redirectURL) token, err := provider.Exchange(ctx, code) if err != nil { log.Error(ctx, map[string]interface{}{ "code": code, "err": err, "redirect_url": redirectURL, }, "oauth exchange operation failed") return nil, autherrors.NewUnauthorizedError(err.Error()) } log.Debug(ctx, map[string]interface{}{ "code": code, }, "exchanged code to access token") return token, nil }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "ExchangeCodeWithProvider", "(", "ctx", "context", ".", "Context", ",", "code", "string", ",", "redirectURL", "string", ")", "(", "*", "oauth2", ".", "Token", ",", "error", ")", "{", "// Exchange...
// Exchange exchanges the given code for OAuth2 token with the Authentication provider
[ "Exchange", "exchanges", "the", "given", "code", "for", "OAuth2", "token", "with", "the", "Authentication", "provider" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L234-L254
150,778
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
UpdateIdentityUsingUserInfoEndPoint
func (s *authenticationProviderServiceImpl) UpdateIdentityUsingUserInfoEndPoint(ctx context.Context, accessToken string) (*account.Identity, error) { userProfile, err := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config).Profile(ctx, oauth2.Token{AccessToken: accessToken}) if err != nil { log.Error(ctx, map[string]interface{}{ "token": accessToken, "err": err, }, "unable to get user profile") return nil, errors.New("unable to get user profile " + err.Error()) } // Set the user profile's username in the context profileCtx := ctx.Value(provider.UserProfileContextKey) if pCtx, ok := profileCtx.(*provider.UserProfileContext); ok { pCtx.Username = &userProfile.Username } identity := &account.Identity{} identities, err := s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser()) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "unable to query for an identity by username") return nil, errs.Wrapf(err, "error during querying for an identity by ID") } if len(identities) == 0 { return nil, autherrors.NewUnauthorizedError(fmt.Sprintf("user '%s' is not approved", userProfile.Username)) } identity = &identities[0] // we had done a // s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser()) // so, identity.user should have been populated. if identity.User.ID == uuid.Nil { log.Error(ctx, map[string]interface{}{ "identity_id": identity.ID, }, "token identity is not linked to any user") return nil, errors.New("token identity is not linked to any user") } if !identity.RegistrationCompleted { err = fillUserFromUserInfo(*userProfile, identity) if err != nil { return nil, autherrors.NewInternalError(ctx, err) } identity.RegistrationCompleted = true err = s.ExecuteInTransaction(func() error { // Using the old-fashioned service err := s.Repositories().Identities().Save(ctx, identity) if err != nil { return err } err = s.Repositories().Users().Save(ctx, &identity.User) if err != nil { return err } return nil }) } return identity, err }
go
func (s *authenticationProviderServiceImpl) UpdateIdentityUsingUserInfoEndPoint(ctx context.Context, accessToken string) (*account.Identity, error) { userProfile, err := s.Factories().IdentityProviderFactory().NewIdentityProvider(ctx, s.config).Profile(ctx, oauth2.Token{AccessToken: accessToken}) if err != nil { log.Error(ctx, map[string]interface{}{ "token": accessToken, "err": err, }, "unable to get user profile") return nil, errors.New("unable to get user profile " + err.Error()) } // Set the user profile's username in the context profileCtx := ctx.Value(provider.UserProfileContextKey) if pCtx, ok := profileCtx.(*provider.UserProfileContext); ok { pCtx.Username = &userProfile.Username } identity := &account.Identity{} identities, err := s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser()) if err != nil { log.Error(ctx, map[string]interface{}{ "err": err, }, "unable to query for an identity by username") return nil, errs.Wrapf(err, "error during querying for an identity by ID") } if len(identities) == 0 { return nil, autherrors.NewUnauthorizedError(fmt.Sprintf("user '%s' is not approved", userProfile.Username)) } identity = &identities[0] // we had done a // s.Repositories().Identities().Query(account.IdentityFilterByUsername(userProfile.Username), account.IdentityWithUser()) // so, identity.user should have been populated. if identity.User.ID == uuid.Nil { log.Error(ctx, map[string]interface{}{ "identity_id": identity.ID, }, "token identity is not linked to any user") return nil, errors.New("token identity is not linked to any user") } if !identity.RegistrationCompleted { err = fillUserFromUserInfo(*userProfile, identity) if err != nil { return nil, autherrors.NewInternalError(ctx, err) } identity.RegistrationCompleted = true err = s.ExecuteInTransaction(func() error { // Using the old-fashioned service err := s.Repositories().Identities().Save(ctx, identity) if err != nil { return err } err = s.Repositories().Users().Save(ctx, &identity.User) if err != nil { return err } return nil }) } return identity, err }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "UpdateIdentityUsingUserInfoEndPoint", "(", "ctx", "context", ".", "Context", ",", "accessToken", "string", ")", "(", "*", "account", ".", "Identity", ",", "error", ")", "{", "userProfile", ",", "e...
// UpdateIdentityFromExistingIdentityInfo update identity if exists using profile information and returns updated identity.
[ "UpdateIdentityFromExistingIdentityInfo", "update", "identity", "if", "exists", "using", "profile", "information", "and", "returns", "updated", "identity", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L378-L441
150,779
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
SaveReferrer
func (s *authenticationProviderServiceImpl) SaveReferrer(ctx context.Context, state string, referrer string, responseMode *string, validReferrerURL string) error { matched, err := regexp.MatchString(validReferrerURL, referrer) if err != nil { log.Error(ctx, map[string]interface{}{ "referrer": referrer, "valid_referrer_url": validReferrerURL, "err": err, }, "Can't match referrer and whitelist regex") return err } if !matched { log.Error(ctx, map[string]interface{}{ "referrer": referrer, "valid_referrer_url": validReferrerURL, }, "Referrer not valid") return autherrors.NewBadParameterError("redirect", "not valid redirect URL") } // TODO The state reference table will be collecting dead states left from some failed login attempts. // We need to clean up the old states from time to time. ref := providerrepo.OauthStateReference{ State: state, Referrer: referrer, ResponseMode: responseMode, } err = s.ExecuteInTransaction(func() error { _, err := s.Repositories().OauthStates().Create(ctx, &ref) return err }) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "referrer": referrer, "response_mode": log.PointerToString(responseMode), "err": err, }, "unable to create oauth state reference") return err } return nil }
go
func (s *authenticationProviderServiceImpl) SaveReferrer(ctx context.Context, state string, referrer string, responseMode *string, validReferrerURL string) error { matched, err := regexp.MatchString(validReferrerURL, referrer) if err != nil { log.Error(ctx, map[string]interface{}{ "referrer": referrer, "valid_referrer_url": validReferrerURL, "err": err, }, "Can't match referrer and whitelist regex") return err } if !matched { log.Error(ctx, map[string]interface{}{ "referrer": referrer, "valid_referrer_url": validReferrerURL, }, "Referrer not valid") return autherrors.NewBadParameterError("redirect", "not valid redirect URL") } // TODO The state reference table will be collecting dead states left from some failed login attempts. // We need to clean up the old states from time to time. ref := providerrepo.OauthStateReference{ State: state, Referrer: referrer, ResponseMode: responseMode, } err = s.ExecuteInTransaction(func() error { _, err := s.Repositories().OauthStates().Create(ctx, &ref) return err }) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "referrer": referrer, "response_mode": log.PointerToString(responseMode), "err": err, }, "unable to create oauth state reference") return err } return nil }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "SaveReferrer", "(", "ctx", "context", ".", "Context", ",", "state", "string", ",", "referrer", "string", ",", "responseMode", "*", "string", ",", "validReferrerURL", "string", ")", "error", "{", ...
// SaveReferrer validates referrer and saves it in DB
[ "SaveReferrer", "validates", "referrer", "and", "saves", "it", "in", "DB" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L466-L508
150,780
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
LoadReferrerAndResponseMode
func (s *authenticationProviderServiceImpl) LoadReferrerAndResponseMode(ctx context.Context, state string) (string, *string, error) { var referrer string var responseMode *string err := s.ExecuteInTransaction(func() error { ref, err := s.Repositories().OauthStates().Load(ctx, state) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unable to load oauth state reference") return err } referrer = ref.Referrer responseMode = ref.ResponseMode err = s.Repositories().OauthStates().Delete(ctx, ref.ID) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unable to delete oauth state reference") return err } return nil }) if err != nil { return "", nil, err } return referrer, responseMode, nil }
go
func (s *authenticationProviderServiceImpl) LoadReferrerAndResponseMode(ctx context.Context, state string) (string, *string, error) { var referrer string var responseMode *string err := s.ExecuteInTransaction(func() error { ref, err := s.Repositories().OauthStates().Load(ctx, state) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unable to load oauth state reference") return err } referrer = ref.Referrer responseMode = ref.ResponseMode err = s.Repositories().OauthStates().Delete(ctx, ref.ID) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unable to delete oauth state reference") return err } return nil }) if err != nil { return "", nil, err } return referrer, responseMode, nil }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "LoadReferrerAndResponseMode", "(", "ctx", "context", ".", "Context", ",", "state", "string", ")", "(", "string", ",", "*", "string", ",", "error", ")", "{", "var", "referrer", "string", "\n", ...
// LoadReferrerAndResponseMode loads referrer and responseMode from DB
[ "LoadReferrerAndResponseMode", "loads", "referrer", "and", "responseMode", "from", "DB" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L511-L541
150,781
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
reclaimReferrerAndResponseMode
func (s *authenticationProviderServiceImpl) reclaimReferrerAndResponseMode(ctx context.Context, state string, code string) (*url.URL, *string, error) { knownReferrer, responseMode, err := s.LoadReferrerAndResponseMode(ctx, state) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unknown state") return nil, nil, autherrors.NewUnauthorizedError("unknown state: " + err.Error()) } referrerURL, err := url.Parse(knownReferrer) if err != nil { log.Error(ctx, map[string]interface{}{ "code": code, "state": state, "known_referrer": knownReferrer, "err": err, }, "failed to parse referrer") return nil, nil, autherrors.NewInternalError(ctx, err) } log.Debug(ctx, map[string]interface{}{ "code": code, "state": state, "known_referrer": knownReferrer, "response_mode": responseMode, }, "referrer found") return referrerURL, responseMode, nil }
go
func (s *authenticationProviderServiceImpl) reclaimReferrerAndResponseMode(ctx context.Context, state string, code string) (*url.URL, *string, error) { knownReferrer, responseMode, err := s.LoadReferrerAndResponseMode(ctx, state) if err != nil { log.Error(ctx, map[string]interface{}{ "state": state, "err": err, }, "unknown state") return nil, nil, autherrors.NewUnauthorizedError("unknown state: " + err.Error()) } referrerURL, err := url.Parse(knownReferrer) if err != nil { log.Error(ctx, map[string]interface{}{ "code": code, "state": state, "known_referrer": knownReferrer, "err": err, }, "failed to parse referrer") return nil, nil, autherrors.NewInternalError(ctx, err) } log.Debug(ctx, map[string]interface{}{ "code": code, "state": state, "known_referrer": knownReferrer, "response_mode": responseMode, }, "referrer found") return referrerURL, responseMode, nil }
[ "func", "(", "s", "*", "authenticationProviderServiceImpl", ")", "reclaimReferrerAndResponseMode", "(", "ctx", "context", ".", "Context", ",", "state", "string", ",", "code", "string", ")", "(", "*", "url", ".", "URL", ",", "*", "string", ",", "error", ")", ...
// reclaimReferrer reclaims referrerURL and verifies the state
[ "reclaimReferrer", "reclaims", "referrerURL", "and", "verifies", "the", "state" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L544-L572
150,782
fabric8-services/fabric8-auth
authentication/provider/service/authentication_provider_service.go
TokenToJSON
func TokenToJSON(ctx context.Context, outhToken *oauth2.Token) (string, error) { str := outhToken.Extra("expires_in") var expiresIn interface{} var refreshExpiresIn interface{} var err error expiresIn, err = manager.NumberToInt(str) if err != nil { log.Error(ctx, map[string]interface{}{ "expires_in": str, "err": err, }, "unable to parse expires_in claim") return "", errs.WithStack(err) } str = outhToken.Extra("refresh_expires_in") refreshExpiresIn, err = manager.NumberToInt(str) if err != nil { log.Error(ctx, map[string]interface{}{ "refresh_expires_in": str, "err": err, }, "unable to parse expires_in claim") return "", errs.WithStack(err) } tokenData := &app.TokenData{ AccessToken: &outhToken.AccessToken, RefreshToken: &outhToken.RefreshToken, TokenType: &outhToken.TokenType, ExpiresIn: &expiresIn, RefreshExpiresIn: &refreshExpiresIn, } b, err := json.Marshal(tokenData) if err != nil { return "", errs.WithStack(err) } return string(b), nil }
go
func TokenToJSON(ctx context.Context, outhToken *oauth2.Token) (string, error) { str := outhToken.Extra("expires_in") var expiresIn interface{} var refreshExpiresIn interface{} var err error expiresIn, err = manager.NumberToInt(str) if err != nil { log.Error(ctx, map[string]interface{}{ "expires_in": str, "err": err, }, "unable to parse expires_in claim") return "", errs.WithStack(err) } str = outhToken.Extra("refresh_expires_in") refreshExpiresIn, err = manager.NumberToInt(str) if err != nil { log.Error(ctx, map[string]interface{}{ "refresh_expires_in": str, "err": err, }, "unable to parse expires_in claim") return "", errs.WithStack(err) } tokenData := &app.TokenData{ AccessToken: &outhToken.AccessToken, RefreshToken: &outhToken.RefreshToken, TokenType: &outhToken.TokenType, ExpiresIn: &expiresIn, RefreshExpiresIn: &refreshExpiresIn, } b, err := json.Marshal(tokenData) if err != nil { return "", errs.WithStack(err) } return string(b), nil }
[ "func", "TokenToJSON", "(", "ctx", "context", ".", "Context", ",", "outhToken", "*", "oauth2", ".", "Token", ")", "(", "string", ",", "error", ")", "{", "str", ":=", "outhToken", ".", "Extra", "(", "\"", "\"", ")", "\n", "var", "expiresIn", "interface"...
// TokenToJSON marshals an oauth2 token to a json string
[ "TokenToJSON", "marshals", "an", "oauth2", "token", "to", "a", "json", "string" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/authentication_provider_service.go#L592-L627
150,783
fabric8-services/fabric8-auth
authorization/resource/repository/resource.go
NewResourceRepository
func NewResourceRepository(db *gorm.DB) ResourceRepository { return &GormResourceRepository{db: db, resourceTypeRepo: resourcetype.NewResourceTypeRepository(db)} }
go
func NewResourceRepository(db *gorm.DB) ResourceRepository { return &GormResourceRepository{db: db, resourceTypeRepo: resourcetype.NewResourceTypeRepository(db)} }
[ "func", "NewResourceRepository", "(", "db", "*", "gorm", ".", "DB", ")", "ResourceRepository", "{", "return", "&", "GormResourceRepository", "{", "db", ":", "db", ",", "resourceTypeRepo", ":", "resourcetype", ".", "NewResourceTypeRepository", "(", "db", ")", "}"...
// NewResourceRepository creates a new storage type.
[ "NewResourceRepository", "creates", "a", "new", "storage", "type", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/resource/repository/resource.go#L55-L57
150,784
fabric8-services/fabric8-auth
authorization/resource/repository/resource.go
LoadChildren
func (m *GormResourceRepository) LoadChildren(ctx context.Context, id string) ([]Resource, error) { defer goa.MeasureSince([]string{"goa", "db", "resource", "loadChildren"}, time.Now()) var rows []Resource err := m.db.Model(&Resource{}).Preload("ResourceType").Where("parent_resource_id = ?", id).Find(&rows).Error if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return rows, nil }
go
func (m *GormResourceRepository) LoadChildren(ctx context.Context, id string) ([]Resource, error) { defer goa.MeasureSince([]string{"goa", "db", "resource", "loadChildren"}, time.Now()) var rows []Resource err := m.db.Model(&Resource{}).Preload("ResourceType").Where("parent_resource_id = ?", id).Find(&rows).Error if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return rows, nil }
[ "func", "(", "m", "*", "GormResourceRepository", ")", "LoadChildren", "(", "ctx", "context", ".", "Context", ",", "id", "string", ")", "(", "[", "]", "Resource", ",", "error", ")", "{", "defer", "goa", ".", "MeasureSince", "(", "[", "]", "string", "{",...
// LoadChildren returns direct children resources of the given resource or an empty array if no children found
[ "LoadChildren", "returns", "direct", "children", "resources", "of", "the", "given", "resource", "or", "an", "empty", "array", "if", "no", "children", "found" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/resource/repository/resource.go#L92-L101
150,785
fabric8-services/fabric8-auth
controller/team.go
NewTeamController
func NewTeamController(service *goa.Service, app application.Application) *TeamController { return &TeamController{Controller: service.NewController("TeamController"), app: app} }
go
func NewTeamController(service *goa.Service, app application.Application) *TeamController { return &TeamController{Controller: service.NewController("TeamController"), app: app} }
[ "func", "NewTeamController", "(", "service", "*", "goa", ".", "Service", ",", "app", "application", ".", "Application", ")", "*", "TeamController", "{", "return", "&", "TeamController", "{", "Controller", ":", "service", ".", "NewController", "(", "\"", "\"", ...
// NewTeamController creates a team controller.
[ "NewTeamController", "creates", "a", "team", "controller", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/team.go#L23-L25
150,786
fabric8-services/fabric8-auth
controller/resource.go
NewResourceController
func NewResourceController(service *goa.Service, app application.Application) *ResourceController { return &ResourceController{Controller: service.NewController("ResourceController"), app: app} }
go
func NewResourceController(service *goa.Service, app application.Application) *ResourceController { return &ResourceController{Controller: service.NewController("ResourceController"), app: app} }
[ "func", "NewResourceController", "(", "service", "*", "goa", ".", "Service", ",", "app", "application", ".", "Application", ")", "*", "ResourceController", "{", "return", "&", "ResourceController", "{", "Controller", ":", "service", ".", "NewController", "(", "\...
// NewResourceController creates a resource controller.
[ "NewResourceController", "creates", "a", "resource", "controller", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L23-L25
150,787
fabric8-services/fabric8-auth
controller/resource.go
Show
func (c *ResourceController) Show(ctx *app.ShowResourceContext) error { if !token.IsServiceAccount(ctx) { log.Error(ctx, map[string]interface{}{}, "Unable to read resource. Not a service account") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account")) } svc := c.app.ResourceService() res, err := svc.Read(ctx, ctx.ResourceID) if err != nil { log.Error(ctx, map[string]interface{}{ "resource_id": ctx.ResourceID, }, "unable to read resource") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(res) }
go
func (c *ResourceController) Show(ctx *app.ShowResourceContext) error { if !token.IsServiceAccount(ctx) { log.Error(ctx, map[string]interface{}{}, "Unable to read resource. Not a service account") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account")) } svc := c.app.ResourceService() res, err := svc.Read(ctx, ctx.ResourceID) if err != nil { log.Error(ctx, map[string]interface{}{ "resource_id": ctx.ResourceID, }, "unable to read resource") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.OK(res) }
[ "func", "(", "c", "*", "ResourceController", ")", "Show", "(", "ctx", "*", "app", ".", "ShowResourceContext", ")", "error", "{", "if", "!", "token", ".", "IsServiceAccount", "(", "ctx", ")", "{", "log", ".", "Error", "(", "ctx", ",", "map", "[", "str...
// Show runs the "Show" action.
[ "Show", "runs", "the", "Show", "action", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L47-L64
150,788
fabric8-services/fabric8-auth
controller/resource.go
Register
func (c *ResourceController) Register(ctx *app.RegisterResourceContext) error { if !token.IsServiceAccount(ctx) { log.Error(ctx, map[string]interface{}{}, "Unable to register resource. Not a service account") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account")) } var managerIdentityID *uuid.UUID if ctx.Payload.IdentityID != nil { identityID, err := uuid.FromString(*ctx.Payload.IdentityID) if err != nil { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("identityID", "incorrect identity ID")) } managerIdentityID = &identityID } svc := c.app.ResourceService() res, err := svc.Register(ctx, ctx.Payload.Type, ctx.Payload.ResourceID, ctx.Payload.ParentResourceID, managerIdentityID) if err != nil { log.Error(ctx, map[string]interface{}{ "resource_type": ctx.Payload.Type, }, "unable to register resource") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.Created(&app.RegisterResourceResponse{ResourceID: &res.ResourceID}) }
go
func (c *ResourceController) Register(ctx *app.RegisterResourceContext) error { if !token.IsServiceAccount(ctx) { log.Error(ctx, map[string]interface{}{}, "Unable to register resource. Not a service account") return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("not a service account")) } var managerIdentityID *uuid.UUID if ctx.Payload.IdentityID != nil { identityID, err := uuid.FromString(*ctx.Payload.IdentityID) if err != nil { return jsonapi.JSONErrorResponse(ctx, errors.NewBadParameterError("identityID", "incorrect identity ID")) } managerIdentityID = &identityID } svc := c.app.ResourceService() res, err := svc.Register(ctx, ctx.Payload.Type, ctx.Payload.ResourceID, ctx.Payload.ParentResourceID, managerIdentityID) if err != nil { log.Error(ctx, map[string]interface{}{ "resource_type": ctx.Payload.Type, }, "unable to register resource") return jsonapi.JSONErrorResponse(ctx, err) } return ctx.Created(&app.RegisterResourceResponse{ResourceID: &res.ResourceID}) }
[ "func", "(", "c", "*", "ResourceController", ")", "Register", "(", "ctx", "*", "app", ".", "RegisterResourceContext", ")", "error", "{", "if", "!", "token", ".", "IsServiceAccount", "(", "ctx", ")", "{", "log", ".", "Error", "(", "ctx", ",", "map", "["...
// Register runs the register action.
[ "Register", "runs", "the", "register", "action", "." ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L67-L93
150,789
fabric8-services/fabric8-auth
controller/resource.go
Scopes
func (c *ResourceController) Scopes(ctx *app.ScopesResourceContext) error { // Load the identity from the context currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } // Check if the resource exists err = c.app.ResourceRepository().CheckExists(ctx, ctx.ResourceID) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } // Load the scopes pc, err := c.app.PrivilegeCacheService().CachedPrivileges(ctx, currentIdentity.ID, ctx.ResourceID) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } scopes := []*app.ResourceScopes{} for _, scope := range pc.ScopesAsArray() { scopes = append(scopes, &app.ResourceScopes{ ID: scope, Type: "user_resource_scope", }) } res := &app.ResourceScopesData{ Data: scopes, } return ctx.OK(res) }
go
func (c *ResourceController) Scopes(ctx *app.ScopesResourceContext) error { // Load the identity from the context currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } // Check if the resource exists err = c.app.ResourceRepository().CheckExists(ctx, ctx.ResourceID) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } // Load the scopes pc, err := c.app.PrivilegeCacheService().CachedPrivileges(ctx, currentIdentity.ID, ctx.ResourceID) if err != nil { return jsonapi.JSONErrorResponse(ctx, err) } scopes := []*app.ResourceScopes{} for _, scope := range pc.ScopesAsArray() { scopes = append(scopes, &app.ResourceScopes{ ID: scope, Type: "user_resource_scope", }) } res := &app.ResourceScopesData{ Data: scopes, } return ctx.OK(res) }
[ "func", "(", "c", "*", "ResourceController", ")", "Scopes", "(", "ctx", "*", "app", ".", "ScopesResourceContext", ")", "error", "{", "// Load the identity from the context", "currentIdentity", ",", "err", ":=", "c", ".", "app", ".", "UserService", "(", ")", "....
// Scopes runs the scopes action, which returns the available scopes for the specified resource
[ "Scopes", "runs", "the", "scopes", "action", "which", "returns", "the", "available", "scopes", "for", "the", "specified", "resource" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/controller/resource.go#L96-L129
150,790
fabric8-services/fabric8-auth
authentication/provider/service/user_profile_service.go
NewUserProfileService
func NewUserProfileService(context servicecontext.ServiceContext) service.UserProfileService { return &userProfileService{ client: http.DefaultClient, } }
go
func NewUserProfileService(context servicecontext.ServiceContext) service.UserProfileService { return &userProfileService{ client: http.DefaultClient, } }
[ "func", "NewUserProfileService", "(", "context", "servicecontext", ".", "ServiceContext", ")", "service", ".", "UserProfileService", "{", "return", "&", "userProfileService", "{", "client", ":", "http", ".", "DefaultClient", ",", "}", "\n", "}" ]
// NewUserProfileService creates a new UserProfileService
[ "NewUserProfileService", "creates", "a", "new", "UserProfileService" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/user_profile_service.go#L27-L31
150,791
fabric8-services/fabric8-auth
authentication/provider/service/user_profile_service.go
Get
func (s *userProfileService) Get(ctx context.Context, accessToken string, profileURL string) (*provider.OAuthUserProfileResponse, error) { userProfileResponse := provider.OAuthUserProfileResponse{} req, err := http.NewRequest("GET", profileURL, nil) if err != nil { return nil, errors.NewInternalError(ctx, err) } req.Header.Add("Authorization", "Bearer "+accessToken) req.Header.Add("Content-Type", "application/json") req.Header.Add("Accept", "application/json, text/plain, */*") resp, err := s.client.Do(req) if err != nil { log.Error(ctx, map[string]interface{}{ "user_profile_url": profileURL, "err": err, }, "Unable to fetch oauth user profile") return nil, errors.NewInternalError(ctx, err) } else if resp != nil { defer rest.CloseResponse(resp) } if resp.StatusCode != http.StatusOK { bodyString := rest.ReadBody(resp.Body) log.Error(ctx, map[string]interface{}{ "response_status": resp.Status, "response_body": bodyString, "user_profile_url": profileURL, }, "Unable to fetch oauth user profile") if resp.StatusCode == 400 { return nil, errors.NewUnauthorizedError(bodyString) } return nil, errors.NewInternalError(ctx, errs.Errorf("received a non-200 response %s while fetching oauth user profile %s", resp.Status, profileURL)) } err = json.NewDecoder(resp.Body).Decode(&userProfileResponse) return &userProfileResponse, err }
go
func (s *userProfileService) Get(ctx context.Context, accessToken string, profileURL string) (*provider.OAuthUserProfileResponse, error) { userProfileResponse := provider.OAuthUserProfileResponse{} req, err := http.NewRequest("GET", profileURL, nil) if err != nil { return nil, errors.NewInternalError(ctx, err) } req.Header.Add("Authorization", "Bearer "+accessToken) req.Header.Add("Content-Type", "application/json") req.Header.Add("Accept", "application/json, text/plain, */*") resp, err := s.client.Do(req) if err != nil { log.Error(ctx, map[string]interface{}{ "user_profile_url": profileURL, "err": err, }, "Unable to fetch oauth user profile") return nil, errors.NewInternalError(ctx, err) } else if resp != nil { defer rest.CloseResponse(resp) } if resp.StatusCode != http.StatusOK { bodyString := rest.ReadBody(resp.Body) log.Error(ctx, map[string]interface{}{ "response_status": resp.Status, "response_body": bodyString, "user_profile_url": profileURL, }, "Unable to fetch oauth user profile") if resp.StatusCode == 400 { return nil, errors.NewUnauthorizedError(bodyString) } return nil, errors.NewInternalError(ctx, errs.Errorf("received a non-200 response %s while fetching oauth user profile %s", resp.Status, profileURL)) } err = json.NewDecoder(resp.Body).Decode(&userProfileResponse) return &userProfileResponse, err }
[ "func", "(", "s", "*", "userProfileService", ")", "Get", "(", "ctx", "context", ".", "Context", ",", "accessToken", "string", ",", "profileURL", "string", ")", "(", "*", "provider", ".", "OAuthUserProfileResponse", ",", "error", ")", "{", "userProfileResponse"...
//Get gets the user profile information from Oauth provider
[ "Get", "gets", "the", "user", "profile", "information", "from", "Oauth", "provider" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authentication/provider/service/user_profile_service.go#L34-L73
150,792
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
List
func (m *GormIdentityRoleRepository) List(ctx context.Context) ([]IdentityRole, error) { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "list"}, time.Now()) var rows []IdentityRole err := m.db.Model(&resourcetype.ResourceType{}).Find(&rows).Error if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return rows, nil }
go
func (m *GormIdentityRoleRepository) List(ctx context.Context) ([]IdentityRole, error) { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "list"}, time.Now()) var rows []IdentityRole err := m.db.Model(&resourcetype.ResourceType{}).Find(&rows).Error if err != nil && err != gorm.ErrRecordNotFound { return nil, errs.WithStack(err) } return rows, nil }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "List", "(", "ctx", "context", ".", "Context", ")", "(", "[", "]", "IdentityRole", ",", "error", ")", "{", "defer", "goa", ".", "MeasureSince", "(", "[", "]", "string", "{", "\"", "\"", ",", "...
// List returns all identity roles
[ "List", "returns", "all", "identity", "roles" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L217-L226
150,793
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindPermissions
func (m *GormIdentityRoleRepository) FindPermissions(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) ([]IdentityRole, error) { var results []IdentityRole err := m.db.Table(m.TableName()).Where(`deleted_at IS NULL AND identity_id IN ( SELECT id FROM identities i WHERE id = ? /* IDENTITY_ID */ OR id IN ( WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? /* IDENTITY_ID */ UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id ) SELECT member_of FROM m ) ) AND resource_id IN ( WITH RECURSIVE m AS ( SELECT resource_id, parent_resource_id FROM resource WHERE deleted_at IS NULL AND resource_id = ? /* RESOURCE_ID */ UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m ) AND (role_id IN ( SELECT r.role_id FROM resource res, role r, role_scope rs, resource_type_scope rts WHERE res.resource_id = ? /* RESOURCE_ID */ AND res.deleted_at IS NULL AND res.resource_type_id = r.resource_type_id AND r.deleted_at IS NULL AND r.role_id = rs.role_id AND rs.scope_id = rts.resource_type_scope_id AND rs.deleted_at IS NULL AND rts.name = ? /* SCOPE */ AND rts.deleted_at IS NULL ) OR role_id IN ( SELECT DISTINCT rl.role_id FROM ( WITH RECURSIVE prm AS ( SELECT rm.from_role_id, rm.to_role_id FROM role_mapping rm, role r, role_scope rs, resource_type_scope rts WHERE rm.deleted_at IS NULL AND rm.to_role_id = r.role_id AND r.deleted_at IS NULL AND r.role_id = rs.role_id AND rs.deleted_at IS NULL AND rs.scope_id = rts.resource_type_scope_id AND rts.deleted_at IS NULL AND rts.name = ? /* SCOPE */ AND rm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in the ancestor hierarchy */ SELECT resource_id, parent_resource_id FROM resource WHERE resource_id = ? /* RESOURCE_ID */ AND deleted_at IS NULL UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m) UNION SELECT trm.from_role_id, trm.to_role_id FROM role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id WHERE trm.deleted_at IS NULL AND trm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in this role mapping's ancestor hierarchy */ SELECT resource_id, parent_resource_id FROM resource WHERE resource_id = trm.resource_id AND deleted_at IS NULL UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m) ) SELECT prm.from_role_id, prm.to_role_id FROM prm) AS mappings CROSS JOIN LATERAL ( VALUES (from_role_id), (to_role_id) ) AS rl (role_id)) )`, identityID, identityID, resourceID, resourceID, scopeName, scopeName, resourceID).Scan(&results).Error if err != nil { return nil, errs.WithStack(err) } return results, nil }
go
func (m *GormIdentityRoleRepository) FindPermissions(ctx context.Context, identityID uuid.UUID, resourceID string, scopeName string) ([]IdentityRole, error) { var results []IdentityRole err := m.db.Table(m.TableName()).Where(`deleted_at IS NULL AND identity_id IN ( SELECT id FROM identities i WHERE id = ? /* IDENTITY_ID */ OR id IN ( WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? /* IDENTITY_ID */ UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id ) SELECT member_of FROM m ) ) AND resource_id IN ( WITH RECURSIVE m AS ( SELECT resource_id, parent_resource_id FROM resource WHERE deleted_at IS NULL AND resource_id = ? /* RESOURCE_ID */ UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m ) AND (role_id IN ( SELECT r.role_id FROM resource res, role r, role_scope rs, resource_type_scope rts WHERE res.resource_id = ? /* RESOURCE_ID */ AND res.deleted_at IS NULL AND res.resource_type_id = r.resource_type_id AND r.deleted_at IS NULL AND r.role_id = rs.role_id AND rs.scope_id = rts.resource_type_scope_id AND rs.deleted_at IS NULL AND rts.name = ? /* SCOPE */ AND rts.deleted_at IS NULL ) OR role_id IN ( SELECT DISTINCT rl.role_id FROM ( WITH RECURSIVE prm AS ( SELECT rm.from_role_id, rm.to_role_id FROM role_mapping rm, role r, role_scope rs, resource_type_scope rts WHERE rm.deleted_at IS NULL AND rm.to_role_id = r.role_id AND r.deleted_at IS NULL AND r.role_id = rs.role_id AND rs.deleted_at IS NULL AND rs.scope_id = rts.resource_type_scope_id AND rts.deleted_at IS NULL AND rts.name = ? /* SCOPE */ AND rm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in the ancestor hierarchy */ SELECT resource_id, parent_resource_id FROM resource WHERE resource_id = ? /* RESOURCE_ID */ AND deleted_at IS NULL UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m) UNION SELECT trm.from_role_id, trm.to_role_id FROM role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id WHERE trm.deleted_at IS NULL AND trm.resource_id IN (WITH RECURSIVE m AS ( /* only resources that are in this role mapping's ancestor hierarchy */ SELECT resource_id, parent_resource_id FROM resource WHERE resource_id = trm.resource_id AND deleted_at IS NULL UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m) ) SELECT prm.from_role_id, prm.to_role_id FROM prm) AS mappings CROSS JOIN LATERAL ( VALUES (from_role_id), (to_role_id) ) AS rl (role_id)) )`, identityID, identityID, resourceID, resourceID, scopeName, scopeName, resourceID).Scan(&results).Error if err != nil { return nil, errs.WithStack(err) } return results, nil }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindPermissions", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ",", "resourceID", "string", ",", "scopeName", "string", ")", "(", "[", "]", "IdentityRole", ",", "err...
// FindPermissions returns an IdentityRole array containing entries that match the specified identity, resource and scope
[ "FindPermissions", "returns", "an", "IdentityRole", "array", "containing", "entries", "that", "match", "the", "specified", "identity", "resource", "and", "scope" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L229-L371
150,794
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindIdentityRolesForIdentity
func (m *GormIdentityRoleRepository) FindIdentityRolesForIdentity(ctx context.Context, identityID uuid.UUID, resourceType *string) ([]authorization.IdentityAssociation, error) { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "FindIdentityRolesForIdentity"}, time.Now()) associations := []authorization.IdentityAssociation{} // query for identities in which the user is a member q := m.db.Table(m.TableName()). Select("identity_role.resource_id AS ResourceID, r.name AS ResourceName, role.name AS RoleName, i.id AS IdentityID, r.parent_resource_id AS ParentResourceID"). Joins("JOIN resource r ON r.resource_id = identity_role.resource_id"). Joins("LEFT JOIN identities i ON r.resource_id = i.identity_resource_id"). Joins("LEFT JOIN resource pr ON r.parent_resource_id = pr.resource_id") // with the specified resourceType if resourceType != nil { q = q.Joins("JOIN resource_type rt ON r.resource_type_id = rt.resource_type_id AND rt.name = ?", resourceType) } q = q.Joins("JOIN role ON role.role_id = identity_role.role_id") rows, err := q.Where(`(identity_role.identity_id = ? OR identity_role.identity_id IN (WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id) SELECT member_of FROM m))`, identityID, identityID).Rows() if err != nil { return nil, err } defer rows.Close() for rows.Next() { var resourceID string var resourceName string var roleName string var identityID uuid.UUID var parentResourceID string rows.Scan(&resourceID, &resourceName, &roleName, &identityID, &parentResourceID) associations = authorization.AppendAssociation(associations, resourceID, &resourceName, &parentResourceID, &identityID, false, &roleName) } return associations, nil }
go
func (m *GormIdentityRoleRepository) FindIdentityRolesForIdentity(ctx context.Context, identityID uuid.UUID, resourceType *string) ([]authorization.IdentityAssociation, error) { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "FindIdentityRolesForIdentity"}, time.Now()) associations := []authorization.IdentityAssociation{} // query for identities in which the user is a member q := m.db.Table(m.TableName()). Select("identity_role.resource_id AS ResourceID, r.name AS ResourceName, role.name AS RoleName, i.id AS IdentityID, r.parent_resource_id AS ParentResourceID"). Joins("JOIN resource r ON r.resource_id = identity_role.resource_id"). Joins("LEFT JOIN identities i ON r.resource_id = i.identity_resource_id"). Joins("LEFT JOIN resource pr ON r.parent_resource_id = pr.resource_id") // with the specified resourceType if resourceType != nil { q = q.Joins("JOIN resource_type rt ON r.resource_type_id = rt.resource_type_id AND rt.name = ?", resourceType) } q = q.Joins("JOIN role ON role.role_id = identity_role.role_id") rows, err := q.Where(`(identity_role.identity_id = ? OR identity_role.identity_id IN (WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id) SELECT member_of FROM m))`, identityID, identityID).Rows() if err != nil { return nil, err } defer rows.Close() for rows.Next() { var resourceID string var resourceName string var roleName string var identityID uuid.UUID var parentResourceID string rows.Scan(&resourceID, &resourceName, &roleName, &identityID, &parentResourceID) associations = authorization.AppendAssociation(associations, resourceID, &resourceName, &parentResourceID, &identityID, false, &roleName) } return associations, nil }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindIdentityRolesForIdentity", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ",", "resourceType", "*", "string", ")", "(", "[", "]", "authorization", ".", "IdentityAssoci...
// FindIdentityRolesForIdentity returns an IdentityAssociations describing the roles which the specified Identity has, optionally for a specified resource type
[ "FindIdentityRolesForIdentity", "returns", "an", "IdentityAssociations", "describing", "the", "roles", "which", "the", "specified", "Identity", "has", "optionally", "for", "a", "specified", "resource", "type" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L374-L413
150,795
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindIdentityRolesByResourceAndRoleName
func (m *GormIdentityRoleRepository) FindIdentityRolesByResourceAndRoleName(ctx context.Context, resourceID string, roleName string, includeParenResources bool) ([]IdentityRole, error) { if includeParenResources { return m.findIdentityRolesByResourceAndRoleNameWithParents(ctx, resourceID, roleName) } return m.findIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName) }
go
func (m *GormIdentityRoleRepository) FindIdentityRolesByResourceAndRoleName(ctx context.Context, resourceID string, roleName string, includeParenResources bool) ([]IdentityRole, error) { if includeParenResources { return m.findIdentityRolesByResourceAndRoleNameWithParents(ctx, resourceID, roleName) } return m.findIdentityRolesByResourceAndRoleName(ctx, resourceID, roleName) }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindIdentityRolesByResourceAndRoleName", "(", "ctx", "context", ".", "Context", ",", "resourceID", "string", ",", "roleName", "string", ",", "includeParenResources", "bool", ")", "(", "[", "]", "IdentityRole...
// FindIdentityRolesByResourceAndRoleName returns an array of IdentityRole objects that match the specified resource and role name
[ "FindIdentityRolesByResourceAndRoleName", "returns", "an", "array", "of", "IdentityRole", "objects", "that", "match", "the", "specified", "resource", "and", "role", "name" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L416-L421
150,796
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindIdentityRolesByResource
func (m *GormIdentityRoleRepository) FindIdentityRolesByResource(ctx context.Context, resourceID string, includeParenResources bool) ([]IdentityRole, error) { if includeParenResources { return m.findIdentityRolesByResourceWithParents(ctx, resourceID) } return m.findIdentityRolesByResource(ctx, resourceID) }
go
func (m *GormIdentityRoleRepository) FindIdentityRolesByResource(ctx context.Context, resourceID string, includeParenResources bool) ([]IdentityRole, error) { if includeParenResources { return m.findIdentityRolesByResourceWithParents(ctx, resourceID) } return m.findIdentityRolesByResource(ctx, resourceID) }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindIdentityRolesByResource", "(", "ctx", "context", ".", "Context", ",", "resourceID", "string", ",", "includeParenResources", "bool", ")", "(", "[", "]", "IdentityRole", ",", "error", ")", "{", "if", ...
// FindIdentityRolesByResource returns an array of IdentityRole for the specified resource
[ "FindIdentityRolesByResource", "returns", "an", "array", "of", "IdentityRole", "for", "the", "specified", "resource" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L451-L456
150,797
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
DeleteForIdentityAndResource
func (m *GormIdentityRoleRepository) DeleteForIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "deleteForIdentityAndResource"}, time.Now()) result := m.db.Scopes(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)).Table(m.TableName()).Delete(nil) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "err": result.Error, "resource_id": resourceID, "identity_id": identityID, }, "unable to delete identity role") return errs.WithStack(result.Error) } if result.RowsAffected == 0 { return errors.NewNotFoundErrorFromString(fmt.Sprintf("identity_role with resource_id '%s' and identity_id '%s' not found", resourceID, identityID)) } return nil }
go
func (m *GormIdentityRoleRepository) DeleteForIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) error { defer goa.MeasureSince([]string{"goa", "db", "identity_role", "deleteForIdentityAndResource"}, time.Now()) result := m.db.Scopes(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)).Table(m.TableName()).Delete(nil) if result.Error != nil { log.Error(ctx, map[string]interface{}{ "err": result.Error, "resource_id": resourceID, "identity_id": identityID, }, "unable to delete identity role") return errs.WithStack(result.Error) } if result.RowsAffected == 0 { return errors.NewNotFoundErrorFromString(fmt.Sprintf("identity_role with resource_id '%s' and identity_id '%s' not found", resourceID, identityID)) } return nil }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "DeleteForIdentityAndResource", "(", "ctx", "context", ".", "Context", ",", "resourceID", "string", ",", "identityID", "uuid", ".", "UUID", ")", "error", "{", "defer", "goa", ".", "MeasureSince", "(", "...
// DeleteForIdentityAndResource deletes all IdentityRoles for the specified identity and resource // NotFoundError returned if no identity roles found to delete
[ "DeleteForIdentityAndResource", "deletes", "all", "IdentityRoles", "for", "the", "specified", "identity", "and", "resource", "NotFoundError", "returned", "if", "no", "identity", "roles", "found", "to", "delete" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L498-L513
150,798
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindIdentityRolesByIdentityAndResource
func (m *GormIdentityRoleRepository) FindIdentityRolesByIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) ([]IdentityRole, error) { return m.query(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)) }
go
func (m *GormIdentityRoleRepository) FindIdentityRolesByIdentityAndResource(ctx context.Context, resourceID string, identityID uuid.UUID) ([]IdentityRole, error) { return m.query(identityRoleFilterByIdentityID(identityID), identityRoleFilterByResource(resourceID)) }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindIdentityRolesByIdentityAndResource", "(", "ctx", "context", ".", "Context", ",", "resourceID", "string", ",", "identityID", "uuid", ".", "UUID", ")", "(", "[", "]", "IdentityRole", ",", "error", ")",...
// FindIdentityRolesByIdentityAndResource returns all identity roles by identity ID and resource ID
[ "FindIdentityRolesByIdentityAndResource", "returns", "all", "identity", "roles", "by", "identity", "ID", "and", "resource", "ID" ]
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L516-L518
150,799
fabric8-services/fabric8-auth
authorization/role/repository/identity_role.go
FindScopesByIdentityAndResource
func (m *GormIdentityRoleRepository) FindScopesByIdentityAndResource(ctx context.Context, identityID uuid.UUID, resourceID string) ([]string, error) { type Result struct { Scope string } var results []Result err := m.db.Raw(`WITH identity_resource_roles AS ( WITH identity_hierarchy AS ( WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? /* IDENTITY_ID */ UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id ) SELECT member_of AS identity_id FROM m UNION SELECT id FROM identities WHERE id = ? /* IDENTITY_ID */ ), resource_hierarchy AS ( WITH RECURSIVE m AS ( SELECT resource_id, parent_resource_id FROM resource WHERE deleted_at IS NULL AND resource_id = ? /* RESOURCE_ID */ UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m ), matching_roles AS ( SELECT r.role_id FROM role r, resource rs WHERE r.resource_type_id = rs.resource_type_id AND r.deleted_at IS NULL AND rs.deleted_at IS NULL AND rs.resource_id = ? /* RESOURCE_ID */ ), role_mappings AS ( SELECT DISTINCT frm.from_role_id, trm.to_role_id FROM role_mapping frm, role_mapping trm WHERE frm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND frm.deleted_at IS NULL AND trm.deleted_at IS NULL AND trm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND trm.to_role_id IN (SELECT role_id FROM matching_roles) AND frm.from_role_id != trm.to_role_id AND frm.from_role_id IN ( SELECT DISTINCT rl.role_id FROM ( WITH RECURSIVE prm AS ( SELECT rm.from_role_id, rm.to_role_id FROM role_mapping rm WHERE rm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND rm.deleted_at IS NULL AND to_role_id = trm.to_role_id UNION SELECT trm.from_role_id, trm.to_role_id FROM role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id WHERE trm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND trm.deleted_at IS NULL ) SELECT prm.from_role_id, prm.to_role_id FROM prm ) AS mappings CROSS JOIN LATERAL ( VALUES (from_role_id), (to_role_id) ) AS rl (role_id) ) ) SELECT rm.to_role_id AS role_id FROM identity_role ir, role_mappings rm WHERE ir.role_id = rm.from_role_id AND ir.deleted_at IS NULL AND ir.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND ir.identity_id IN (SELECT identity_id FROM identity_hierarchy) UNION SELECT ir2.role_id FROM identity_role ir2 WHERE ir2.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND ir2.deleted_at IS NULL AND ir2.identity_id IN (SELECT identity_id FROM identity_hierarchy) AND ir2.role_id IN (SELECT role_id FROM matching_roles) ) SELECT DISTINCT rts.name AS scope FROM identity_resource_roles irr LEFT JOIN role_scope rs ON irr.role_id = rs.role_id LEFT JOIN resource_type_scope rts ON rs.scope_id = rts.resource_type_scope_id`, identityID, identityID, resourceID, resourceID).Scan(&results).Error if err != nil { return nil, errs.WithStack(err) } var scopes []string for i := range results { scopes = append(scopes, results[i].Scope) } return scopes, nil }
go
func (m *GormIdentityRoleRepository) FindScopesByIdentityAndResource(ctx context.Context, identityID uuid.UUID, resourceID string) ([]string, error) { type Result struct { Scope string } var results []Result err := m.db.Raw(`WITH identity_resource_roles AS ( WITH identity_hierarchy AS ( WITH RECURSIVE m AS ( SELECT member_of FROM membership WHERE member_id = ? /* IDENTITY_ID */ UNION SELECT p.member_of FROM membership p INNER JOIN m ON m.member_of = p.member_id ) SELECT member_of AS identity_id FROM m UNION SELECT id FROM identities WHERE id = ? /* IDENTITY_ID */ ), resource_hierarchy AS ( WITH RECURSIVE m AS ( SELECT resource_id, parent_resource_id FROM resource WHERE deleted_at IS NULL AND resource_id = ? /* RESOURCE_ID */ UNION SELECT p.resource_id, p.parent_resource_id FROM resource p INNER JOIN m ON m.parent_resource_id = p.resource_id ) SELECT m.resource_id FROM m ), matching_roles AS ( SELECT r.role_id FROM role r, resource rs WHERE r.resource_type_id = rs.resource_type_id AND r.deleted_at IS NULL AND rs.deleted_at IS NULL AND rs.resource_id = ? /* RESOURCE_ID */ ), role_mappings AS ( SELECT DISTINCT frm.from_role_id, trm.to_role_id FROM role_mapping frm, role_mapping trm WHERE frm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND frm.deleted_at IS NULL AND trm.deleted_at IS NULL AND trm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND trm.to_role_id IN (SELECT role_id FROM matching_roles) AND frm.from_role_id != trm.to_role_id AND frm.from_role_id IN ( SELECT DISTINCT rl.role_id FROM ( WITH RECURSIVE prm AS ( SELECT rm.from_role_id, rm.to_role_id FROM role_mapping rm WHERE rm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND rm.deleted_at IS NULL AND to_role_id = trm.to_role_id UNION SELECT trm.from_role_id, trm.to_role_id FROM role_mapping trm INNER JOIN prm ON prm.from_role_id = trm.to_role_id WHERE trm.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND trm.deleted_at IS NULL ) SELECT prm.from_role_id, prm.to_role_id FROM prm ) AS mappings CROSS JOIN LATERAL ( VALUES (from_role_id), (to_role_id) ) AS rl (role_id) ) ) SELECT rm.to_role_id AS role_id FROM identity_role ir, role_mappings rm WHERE ir.role_id = rm.from_role_id AND ir.deleted_at IS NULL AND ir.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND ir.identity_id IN (SELECT identity_id FROM identity_hierarchy) UNION SELECT ir2.role_id FROM identity_role ir2 WHERE ir2.resource_id IN (SELECT resource_id FROM resource_hierarchy) AND ir2.deleted_at IS NULL AND ir2.identity_id IN (SELECT identity_id FROM identity_hierarchy) AND ir2.role_id IN (SELECT role_id FROM matching_roles) ) SELECT DISTINCT rts.name AS scope FROM identity_resource_roles irr LEFT JOIN role_scope rs ON irr.role_id = rs.role_id LEFT JOIN resource_type_scope rts ON rs.scope_id = rts.resource_type_scope_id`, identityID, identityID, resourceID, resourceID).Scan(&results).Error if err != nil { return nil, errs.WithStack(err) } var scopes []string for i := range results { scopes = append(scopes, results[i].Scope) } return scopes, nil }
[ "func", "(", "m", "*", "GormIdentityRoleRepository", ")", "FindScopesByIdentityAndResource", "(", "ctx", "context", ".", "Context", ",", "identityID", "uuid", ".", "UUID", ",", "resourceID", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "ty...
// FindScopesByIdentityAndResource returns all scopes for the specified identity and resource, both assigned directly and // also those indirectly inherited via memberships, resource hierarchy and role mappings.
[ "FindScopesByIdentityAndResource", "returns", "all", "scopes", "for", "the", "specified", "identity", "and", "resource", "both", "assigned", "directly", "and", "also", "those", "indirectly", "inherited", "via", "memberships", "resource", "hierarchy", "and", "role", "m...
2a60f45fcdf7456553025afca28e81115285cce6
https://github.com/fabric8-services/fabric8-auth/blob/2a60f45fcdf7456553025afca28e81115285cce6/authorization/role/repository/identity_role.go#L522-L670