| package authlink |
|
|
| import ( |
| "context" |
| "database/sql" |
| "encoding/json" |
| "errors" |
| "net/url" |
| "time" |
|
|
| "github.com/golang-jwt/jwt/v5" |
| "github.com/google/uuid" |
| "github.com/target/goalert/config" |
| "github.com/target/goalert/gadb" |
| "github.com/target/goalert/keyring" |
| "github.com/target/goalert/permission" |
| "github.com/target/goalert/util" |
| "github.com/target/goalert/util/sqlutil" |
| "github.com/target/goalert/validation" |
| "github.com/target/goalert/validation/validate" |
| ) |
|
|
| type Store struct { |
| db *sql.DB |
|
|
| k keyring.Keyring |
| } |
|
|
| type Metadata struct { |
| UserDetails string |
| AlertID int `json:",omitempty"` |
| AlertAction string `json:",omitempty"` |
| } |
|
|
| func (m Metadata) Validate() error { |
| return validate.Many( |
| validate.ASCII("UserDetails", m.UserDetails, 1, 255), |
| validate.OneOf("AlertAction", m.AlertAction, "", "ResultAcknowledge", "ResultResolve"), |
| ) |
| } |
|
|
| func NewStore(ctx context.Context, db *sql.DB, k keyring.Keyring) (*Store, error) { |
| p := &util.Prepare{ |
| DB: db, |
| Ctx: ctx, |
| } |
|
|
| return &Store{ |
| db: db, |
| k: k, |
| }, p.Err |
| } |
|
|
| func (s *Store) FindLinkMetadata(ctx context.Context, token string) (*Metadata, error) { |
| err := permission.LimitCheckAny(ctx, permission.User) |
| if err != nil { |
| return nil, err |
| } |
|
|
| tokID, err := s.tokenID(ctx, token) |
| if err != nil { |
| |
| return nil, nil |
| } |
|
|
| data, err := gadb.New(s.db).AuthLinkMetadata(ctx, uuid.MustParse(tokID)) |
| if errors.Is(err, sql.ErrNoRows) { |
| return nil, nil |
| } |
| if err != nil { |
| return nil, err |
| } |
|
|
| var meta Metadata |
| err = json.Unmarshal(data, &meta) |
| if err != nil { |
| return nil, err |
| } |
|
|
| return &meta, nil |
| } |
|
|
| func (s *Store) tokenID(ctx context.Context, token string) (string, error) { |
| var c jwt.RegisteredClaims |
| _, err := s.k.VerifyJWT(token, &c, "goalert", "auth-link") |
| if err != nil { |
| return "", validation.WrapError(err) |
| } |
|
|
| err = validate.UUID("ID", c.ID) |
| if err != nil { |
| return "", err |
| } |
|
|
| return c.ID, nil |
| } |
|
|
| func (s *Store) LinkAccount(ctx context.Context, token string) error { |
| err := permission.LimitCheckAny(ctx, permission.User) |
| if err != nil { |
| return err |
| } |
|
|
| tokID, err := s.tokenID(ctx, token) |
| if err != nil { |
| return err |
| } |
|
|
| tx, err := s.db.BeginTx(ctx, nil) |
| if err != nil { |
| return err |
| } |
| defer sqlutil.Rollback(ctx, "authlink: link auth subject", tx) |
|
|
| row, err := gadb.New(tx).AuthLinkUseReq(ctx, uuid.MustParse(tokID)) |
| if errors.Is(err, sql.ErrNoRows) { |
| return validation.NewGenericError("invalid link token") |
| } |
| if err != nil { |
| return err |
| } |
|
|
| err = gadb.New(tx).AuthLinkAddAuthSubject(ctx, gadb.AuthLinkAddAuthSubjectParams{ |
| ProviderID: row.ProviderID, |
| SubjectID: row.SubjectID, |
| UserID: uuid.MustParse(permission.UserID(ctx)), |
| }) |
| if err != nil { |
| return err |
| } |
|
|
| return tx.Commit() |
| } |
|
|
| func (s *Store) AuthLinkURL(ctx context.Context, providerID, subjectID string, meta Metadata) (string, error) { |
| err := permission.LimitCheckAny(ctx, permission.System) |
| if err != nil { |
| return "", err |
| } |
| err = validate.Many( |
| validate.SubjectID("ProviderID", providerID), |
| validate.SubjectID("SubjectID", subjectID), |
| meta.Validate(), |
| ) |
| if err != nil { |
| return "", err |
| } |
|
|
| id := uuid.New() |
| now := time.Now() |
| expires := now.Add(5 * time.Minute) |
|
|
| var c jwt.RegisteredClaims |
| c.ID = id.String() |
| c.Audience = jwt.ClaimStrings{"auth-link"} |
| c.Issuer = "goalert" |
| c.NotBefore = jwt.NewNumericDate(now.Add(-2 * time.Minute)) |
| c.ExpiresAt = jwt.NewNumericDate(expires) |
| c.IssuedAt = jwt.NewNumericDate(now) |
|
|
| token, err := s.k.SignJWT(c) |
| if err != nil { |
| return "", err |
| } |
|
|
| data, err := json.Marshal(meta) |
| if err != nil { |
| return "", err |
| } |
| err = gadb.New(s.db).AuthLinkAddReq(ctx, gadb.AuthLinkAddReqParams{ |
| ID: id, |
| ProviderID: providerID, |
| SubjectID: subjectID, |
| ExpiresAt: expires, |
| Metadata: data, |
| }) |
| if err != nil { |
| return "", err |
| } |
|
|
| cfg := config.FromContext(ctx) |
| p := make(url.Values) |
| p.Set("authLinkToken", token) |
| return cfg.CallbackURL("/profile", p), nil |
| } |
|
|