Make client use our auth(n/z) scheme.
Our auth(n/z) scheme can be loosely defined as "encrypted tokens that nginx
transforms into headers" and "scopes for bypassing ACL". Our Go client, which is
what we'll be using to have services communicate with each other, follows this
paradigm now by auto-injecting the headers we'll need to identify ourselves.
This will work behind our firewall, but will be useless for the rest of the
world, which will need to go through the nginx bastion that can strip the
headers and replace them with the headers appropriate to the token attached to
the request.
This did involve setting a static client ID as the client for our
email_verification listener. Ideally, this would cause Client registration
(using that ID) when the listener starts up, ignoring ErrClientAlreadyExists. I
don't want to have to write the code that will allow us to bypass the Client ACL
properly right now, though, so we're just going to have to remember to manually
create that Client. Or not. I don't think it will do any harm (outside the OAuth
flow) to be using a Client ID that doesn't actually point to a Client. I just
think it'd be good for record-keeping purposes.
9 ErrNoScopeStore = errors.New("scopeStore not set in Context")
10 ErrScopeNotFound = errors.New("scope not found")
11 ErrScopeAlreadyExists = errors.New("scope already exists")
14 // Scope represents a limit on the access that a grant provides.
21 func (s *Scope) ApplyChange(change ScopeChange) {
22 if change.Name != nil {
25 if change.Description != nil {
26 s.Description = *change.Description
32 func (s Scopes) Len() int {
36 func (s Scopes) Swap(i, j int) {
37 s[i], s[j] = s[j], s[i]
40 func (s Scopes) Less(i, j int) bool {
41 return s[i].ID < s[j].ID
44 func (s Scopes) Strings() []string {
45 res := make([]string, len(s))
46 for pos, scope := range s {
52 func stringsToScopes(s []string) Scopes {
53 res := make(Scopes, len(s))
54 for pos, scope := range s {
55 res[pos] = Scope{ID: scope}
60 // ScopeChange represents a change to a Scope.
61 type ScopeChange struct {
66 func (s ScopeChange) Empty() bool {
67 return s.Name == nil && s.Description == nil
70 type scopeStore interface {
71 createScopes(scopes []Scope) error
72 getScopes(ids []string) ([]Scope, error)
73 updateScope(id string, change ScopeChange) error
74 removeScopes(ids []string) error
75 listScopes() ([]Scope, error)
78 func (m *memstore) createScopes(scopes []Scope) error {
80 defer m.scopeLock.Unlock()
82 for _, scope := range scopes {
83 if _, ok := m.scopes[scope.ID]; ok {
84 return ErrScopeAlreadyExists
87 for _, scope := range scopes {
88 m.scopes[scope.ID] = scope
93 func (m *memstore) getScopes(ids []string) ([]Scope, error) {
95 defer m.scopeLock.RUnlock()
98 for _, id := range ids {
99 scope, ok := m.scopes[id]
103 scopes = append(scopes, scope)
105 sorted := Scopes(scopes)
111 func (m *memstore) updateScope(id string, change ScopeChange) error {
113 defer m.scopeLock.Unlock()
115 scope, ok := m.scopes[id]
117 return ErrScopeNotFound
119 scope.ApplyChange(change)
124 func (m *memstore) removeScopes(ids []string) error {
126 defer m.scopeLock.Unlock()
128 for _, id := range ids {
129 if _, ok := m.scopes[id]; !ok {
130 return ErrScopeNotFound
133 for _, id := range ids {
139 func (m *memstore) listScopes() ([]Scope, error) {
141 defer m.scopeLock.RUnlock()
144 for _, scope := range m.scopes {
145 scopes = append(scopes, scope)
147 sorted := Scopes(scopes)