auth

Paddy 2015-07-15 Parent:581c60f8dd23

178:0a2c3d677161 Go to Latest

auth/token_postgres.go

Update to use a generic event emitter. Rather can creating a purpose-built event emitter for each and every event we need to emit (I'm looking at you, login verification event) which is _downright silly_, we're now using a generic event publisher that's based on saying "HEY A MODEL UPDATED". This means we need to change all our setup code in authd to use events.NewNSQPublisher or events.NewStdoutPublisher instead of our homegrown solutions. Which also means updating our config to take an events.Publisher instead of our LoginVerificationNotifier (blergh). Our Context also now uses an events.Publisher instead of a LoginVerificationNotifier. Party all around! We also replaced our SendLoginVerification helper method on Context with a SendModelEvent helper method on Context, which is just a light wrapper around events.PublishModelEvent. Of course, all this means we need to update our email_verification listener to listen to the correct channel (based on the model we want updates about) and filter down to a Created action or our new custom action for "the customer wants their verification resent", which I'm OK making a special case and not generic, because c'mon. But we had a subtle change to all our constants, some of which are unofficial constants now. I'm unsure how I feel about this. We also updated our email_verification listener so that we're unmarshalling to a custom loginEvent, which is just an events.Event that overwrites the Data property to be an auth.Login instance. This is to make sure we don't need to wrangle a map[string]interface{}, which is no fun. I'm also OK with special-casing like this, because it's 1) a tiny amount of code, 2) properly utilising composition, and 3) the only way I can think of to cleanly accomplish what I want. I also added a note about GetLogin's deficient handling of logins, namely that it doesn't recognise admins and return Verification codes to them, which would be a useful property for internal tools to take advantage of. Ah well. I updated the Profile and Login implementations so they're now event.Model instances, mainly by just exporting some strings from them through getters that will let us automatically build an Event from them. This lets us use the PublishModelEvent helper. I updated our CreateProfileHandler to properly mangle the login Verification property, and to fire off the ActionCreated events for the new Login and the new Profile. I updated our GetLoginHandler and UpdateLoginHandler to properly mangle the loginVerification property. God that's annoying. :-/ You'll note I didn't start publishing the events.ActionUpdated or events.ActionDeleted events for Profiles or Logins yet, and didn't bother publishing any events for literally any other type. That's because I'm a lazy piece of crap and will end up publishing them when I absolutely have to. Part of that is because if a channel isn't created/being read for a topic, the messages will just stack up in NSQ, and I don't want that. But mostly I'm lazy. Finally, I got to delete the entire profile_verification.go file, because we're no longer special-casing that. Hooray!

History
1 package auth
3 import (
4 "code.secondbit.org/uuid.hg"
6 "github.com/lib/pq"
7 "github.com/secondbit/pan"
8 )
10 func (t Token) GetSQLTableName() string {
11 return "tokens"
12 }
14 func (p *postgres) getTokenSQL(token string, refresh bool) *pan.Query {
15 var t Token
16 fields, _ := pan.GetFields(t)
17 query := pan.New(pan.POSTGRES, "SELECT "+pan.QueryList(fields)+" FROM "+pan.GetTableName(t))
18 query.IncludeWhere()
19 if !refresh {
20 query.Include(pan.GetUnquotedColumn(t, "AccessToken")+" = ?", token)
21 } else {
22 query.Include(pan.GetUnquotedColumn(t, "RefreshToken")+" = ?", token)
23 }
24 return query.FlushExpressions(" ")
25 }
27 func (p *postgres) getToken(token string, refresh bool) (Token, error) {
28 query := p.getTokenSQL(token, refresh)
29 rows, err := p.db.Query(query.String(), query.Args...)
30 if err != nil {
31 return Token{}, err
32 }
33 var t Token
34 var found bool
35 for rows.Next() {
36 err := pan.Unmarshal(rows, &t)
37 if err != nil {
38 return t, err
39 }
40 found = true
41 }
42 if err = rows.Err(); err != nil {
43 return t, err
44 }
45 if !found {
46 return t, ErrTokenNotFound
47 }
48 return t, nil
49 }
51 func (p *postgres) saveTokenSQL(token Token) *pan.Query {
52 fields, values := pan.GetFields(token)
53 query := pan.New(pan.POSTGRES, "INSERT INTO "+pan.GetTableName(token))
54 query.Include("(" + pan.QueryList(fields) + ")")
55 query.Include("VALUES")
56 query.Include("("+pan.VariableList(len(values))+")", values...)
57 return query.FlushExpressions(" ")
58 }
60 func (p *postgres) saveToken(token Token) error {
61 query := p.saveTokenSQL(token)
62 _, err := p.db.Exec(query.String(), query.Args...)
63 if e, ok := err.(*pq.Error); ok && e.Constraint == "tokens_pkey" {
64 err = ErrTokenAlreadyExists
65 }
66 if err != nil || len(token.Scopes) < 1 {
67 return err
68 }
69 return err
70 }
72 func (p *postgres) revokeTokenSQL(token string) *pan.Query {
73 var t Token
74 query := pan.New(pan.POSTGRES, "UPDATE "+pan.GetTableName(t)+" SET ")
75 query.Include(pan.GetUnquotedColumn(t, "Revoked")+" = ?", true)
76 query.IncludeWhere()
77 query.Include(pan.GetUnquotedColumn(t, "RefreshToken")+" = ?", token)
78 return query.FlushExpressions(" ")
79 }
81 func (p *postgres) revokeToken(token string) error {
82 query := p.revokeTokenSQL(token)
83 res, err := p.db.Exec(query.String(), query.Args...)
84 if err != nil {
85 return err
86 }
87 rows, err := res.RowsAffected()
88 if err != nil {
89 return err
90 }
91 if rows == 0 {
92 return ErrTokenNotFound
93 }
94 return nil
95 }
97 func (p *postgres) revokeTokensByProfileIDSQL(profileID uuid.ID) *pan.Query {
98 var t Token
99 query := pan.New(pan.POSTGRES, "UPDATE "+pan.GetTableName(t)+" SET ")
100 query.Include(pan.GetUnquotedColumn(t, "Revoked")+" = ?", true)
101 query.IncludeWhere()
102 query.Include(pan.GetUnquotedColumn(t, "ProfileID")+" = ?", profileID)
103 return query.FlushExpressions(" ")
104 }
106 func (p *postgres) revokeTokensByProfileID(profileID uuid.ID) error {
107 query := p.revokeTokensByProfileIDSQL(profileID)
108 res, err := p.db.Exec(query.String(), query.Args...)
109 if err != nil {
110 return err
111 }
112 rows, err := res.RowsAffected()
113 if err != nil {
114 return err
115 }
116 if rows == 0 {
117 return ErrProfileNotFound
118 }
119 return nil
120 }
122 func (p *postgres) revokeTokensByClientIDSQL(clientID uuid.ID) *pan.Query {
123 var t Token
124 query := pan.New(pan.POSTGRES, "UPDATE "+pan.GetTableName(t)+" SET ")
125 query.Include(pan.GetUnquotedColumn(t, "Revoked")+" = ?", true)
126 query.IncludeWhere()
127 query.Include(pan.GetUnquotedColumn(t, "ClientID")+" = ?", clientID)
128 return query.FlushExpressions(" ")
129 }
131 func (p *postgres) revokeTokensByClientID(clientID uuid.ID) error {
132 query := p.revokeTokensByClientIDSQL(clientID)
133 res, err := p.db.Exec(query.String(), query.Args...)
134 if err != nil {
135 return err
136 }
137 rows, err := res.RowsAffected()
138 if err != nil {
139 return err
140 }
141 if rows == 0 {
142 return ErrClientNotFound
143 }
144 return nil
145 }
147 func (p *postgres) getTokensByProfileIDSQL(profileID uuid.ID, num, offset int) *pan.Query {
148 var token Token
149 fields, _ := pan.GetFields(token)
150 query := pan.New(pan.POSTGRES, "SELECT "+pan.QueryList(fields)+" FROM "+pan.GetTableName(token))
151 query.IncludeWhere()
152 query.Include(pan.GetUnquotedColumn(token, "ProfileID")+" = ?", profileID)
153 query.IncludeLimit(int64(num))
154 query.IncludeOffset(int64(offset))
155 return query.FlushExpressions(" ")
156 }
158 func (p *postgres) getTokensByProfileID(profileID uuid.ID, num, offset int) ([]Token, error) {
159 query := p.getTokensByProfileIDSQL(profileID, num, offset)
160 rows, err := p.db.Query(query.String(), query.Args...)
161 if err != nil {
162 return []Token{}, err
163 }
164 var tokens []Token
165 var tokenIDs []string
166 for rows.Next() {
167 var token Token
168 err = pan.Unmarshal(rows, &token)
169 if err != nil {
170 return tokens, err
171 }
172 tokens = append(tokens, token)
173 tokenIDs = append(tokenIDs, token.AccessToken)
174 }
175 if err = rows.Err(); err != nil {
176 return tokens, err
177 }
178 return tokens, nil
179 }