Devendra174's picture
Upload folder using huggingface_hub
1e92f2d verified
package authlink
import (
"context"
"database/sql"
"encoding/json"
"errors"
"net/url"
"time"
"github.com/golang-jwt/jwt/v5"
"github.com/google/uuid"
"github.com/target/goalert/config"
"github.com/target/goalert/gadb"
"github.com/target/goalert/keyring"
"github.com/target/goalert/permission"
"github.com/target/goalert/util"
"github.com/target/goalert/util/sqlutil"
"github.com/target/goalert/validation"
"github.com/target/goalert/validation/validate"
)
type Store struct {
db *sql.DB
k keyring.Keyring
}
type Metadata struct {
UserDetails string
AlertID int `json:",omitempty"`
AlertAction string `json:",omitempty"`
}
func (m Metadata) Validate() error {
return validate.Many(
validate.ASCII("UserDetails", m.UserDetails, 1, 255),
validate.OneOf("AlertAction", m.AlertAction, "", "ResultAcknowledge", "ResultResolve"),
)
}
func NewStore(ctx context.Context, db *sql.DB, k keyring.Keyring) (*Store, error) {
p := &util.Prepare{
DB: db,
Ctx: ctx,
}
return &Store{
db: db,
k: k,
}, p.Err
}
func (s *Store) FindLinkMetadata(ctx context.Context, token string) (*Metadata, error) {
err := permission.LimitCheckAny(ctx, permission.User)
if err != nil {
return nil, err
}
tokID, err := s.tokenID(ctx, token)
if err != nil {
// don't return anything, treat it as not found
return nil, nil
}
data, err := gadb.New(s.db).AuthLinkMetadata(ctx, uuid.MustParse(tokID))
if errors.Is(err, sql.ErrNoRows) {
return nil, nil
}
if err != nil {
return nil, err
}
var meta Metadata
err = json.Unmarshal(data, &meta)
if err != nil {
return nil, err
}
return &meta, nil
}
func (s *Store) tokenID(ctx context.Context, token string) (string, error) {
var c jwt.RegisteredClaims
_, err := s.k.VerifyJWT(token, &c, "goalert", "auth-link")
if err != nil {
return "", validation.WrapError(err)
}
err = validate.UUID("ID", c.ID)
if err != nil {
return "", err
}
return c.ID, nil
}
func (s *Store) LinkAccount(ctx context.Context, token string) error {
err := permission.LimitCheckAny(ctx, permission.User)
if err != nil {
return err
}
tokID, err := s.tokenID(ctx, token)
if err != nil {
return err
}
tx, err := s.db.BeginTx(ctx, nil)
if err != nil {
return err
}
defer sqlutil.Rollback(ctx, "authlink: link auth subject", tx)
row, err := gadb.New(tx).AuthLinkUseReq(ctx, uuid.MustParse(tokID))
if errors.Is(err, sql.ErrNoRows) {
return validation.NewGenericError("invalid link token")
}
if err != nil {
return err
}
err = gadb.New(tx).AuthLinkAddAuthSubject(ctx, gadb.AuthLinkAddAuthSubjectParams{
ProviderID: row.ProviderID,
SubjectID: row.SubjectID,
UserID: uuid.MustParse(permission.UserID(ctx)),
})
if err != nil {
return err
}
return tx.Commit()
}
func (s *Store) AuthLinkURL(ctx context.Context, providerID, subjectID string, meta Metadata) (string, error) {
err := permission.LimitCheckAny(ctx, permission.System)
if err != nil {
return "", err
}
err = validate.Many(
validate.SubjectID("ProviderID", providerID),
validate.SubjectID("SubjectID", subjectID),
meta.Validate(),
)
if err != nil {
return "", err
}
id := uuid.New()
now := time.Now()
expires := now.Add(5 * time.Minute)
var c jwt.RegisteredClaims
c.ID = id.String()
c.Audience = jwt.ClaimStrings{"auth-link"}
c.Issuer = "goalert"
c.NotBefore = jwt.NewNumericDate(now.Add(-2 * time.Minute))
c.ExpiresAt = jwt.NewNumericDate(expires)
c.IssuedAt = jwt.NewNumericDate(now)
token, err := s.k.SignJWT(c)
if err != nil {
return "", err
}
data, err := json.Marshal(meta)
if err != nil {
return "", err
}
err = gadb.New(s.db).AuthLinkAddReq(ctx, gadb.AuthLinkAddReqParams{
ID: id,
ProviderID: providerID,
SubjectID: subjectID,
ExpiresAt: expires,
Metadata: data,
})
if err != nil {
return "", err
}
cfg := config.FromContext(ctx)
p := make(url.Values)
p.Set("authLinkToken", token)
return cfg.CallbackURL("/profile", p), nil
}