auth

Paddy 2014-11-03 Parent:e45bfa2abc00 Child:d43c3fbf00f3

66:55d5107e8805 Go to Latest

auth/memstore.go

Bugfixes and tests for getting grants. Add tests for the grant confirmation part of the request to get a grant code. When the request is denied, the redirect should have an access_denied error. When the request is approved, the redirect should contain a code. Fix numerous bugs in which the redirect URL didn't contain the parameters we thought it would. Basically, anything that still used req.URL.Query().Set() instead of copying the query, modifying it, and setting req.URL.RawQuery. Fix a bug in which the redirectURL wasn't being properly set. Basically, when we moved the redirectURI processing to the top of the file (c29c7df35905 for those who forgot), we didn't update the reference to it lower in the file, where redirectURI was being updated and we expected that to be reflected in the processing. The HTTP handler for getting grant codes is now completely tested except for returning internal errors, which requires a new test harness be built to provoke internal errors on demand. At this point, however, I'd like to continue on implementing endpoints.

History
paddy@28 1 package auth
paddy@28 2
paddy@31 3 import (
paddy@31 4 "sync"
paddy@31 5
paddy@45 6 "code.secondbit.org/uuid"
paddy@31 7 )
paddy@28 8
paddy@57 9 type memstore struct {
paddy@28 10 tokens map[string]Token
paddy@28 11 refreshTokenLookup map[string]string
paddy@28 12 profileTokenLookup map[string][]string
paddy@28 13 tokenLock sync.RWMutex
paddy@29 14
paddy@29 15 grants map[string]Grant
paddy@29 16 grantLock sync.RWMutex
paddy@31 17
paddy@31 18 clients map[string]Client
paddy@31 19 profileClientLookup map[string][]uuid.ID
paddy@31 20 clientLock sync.RWMutex
paddy@38 21
paddy@41 22 endpoints map[string][]Endpoint
paddy@41 23 endpointLock sync.RWMutex
paddy@41 24
paddy@38 25 profiles map[string]Profile
paddy@38 26 profileLock sync.RWMutex
paddy@44 27
paddy@44 28 logins map[string]Login
paddy@44 29 profileLoginLookup map[string][]string
paddy@44 30 loginLock sync.RWMutex
paddy@28 31 }
paddy@28 32
paddy@57 33 // NewMemstore returns an in-memory version of our datastores,
paddy@57 34 // which is handy for tests. Though the implementation is concurrency-safe,
paddy@57 35 // if makes no attempt to persist the data, and therefore it is inadvisable
paddy@57 36 // to use it in a production setting.
paddy@57 37 func NewMemstore() *memstore {
paddy@57 38 return &memstore{
paddy@31 39 tokens: map[string]Token{},
paddy@31 40 refreshTokenLookup: map[string]string{},
paddy@31 41 profileTokenLookup: map[string][]string{},
paddy@31 42 grants: map[string]Grant{},
paddy@31 43 clients: map[string]Client{},
paddy@31 44 profileClientLookup: map[string][]uuid.ID{},
paddy@41 45 endpoints: map[string][]Endpoint{},
paddy@38 46 profiles: map[string]Profile{},
paddy@44 47 logins: map[string]Login{},
paddy@44 48 profileLoginLookup: map[string][]string{},
paddy@28 49 }
paddy@28 50 }
paddy@28 51
paddy@57 52 func (m *memstore) lookupTokenByRefresh(token string) (string, error) {
paddy@28 53 m.tokenLock.RLock()
paddy@28 54 defer m.tokenLock.RUnlock()
paddy@28 55 t, ok := m.refreshTokenLookup[token]
paddy@28 56 if !ok {
paddy@28 57 return "", ErrTokenNotFound
paddy@28 58 }
paddy@28 59 return t, nil
paddy@28 60 }
paddy@28 61
paddy@57 62 func (m *memstore) lookupTokensByProfileID(id string) ([]string, error) {
paddy@28 63 m.tokenLock.RLock()
paddy@28 64 defer m.tokenLock.RUnlock()
paddy@28 65 return m.profileTokenLookup[id], nil
paddy@28 66 }
paddy@31 67
paddy@57 68 func (m *memstore) lookupClientsByProfileID(id string) []uuid.ID {
paddy@31 69 m.clientLock.RLock()
paddy@31 70 defer m.clientLock.RUnlock()
paddy@33 71 c, ok := m.profileClientLookup[id]
paddy@33 72 if !ok {
paddy@33 73 return []uuid.ID{}
paddy@33 74 }
paddy@33 75 return c
paddy@31 76 }