2023-09-28 17:09:52 +03:00
|
|
|
package mysql
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
|
|
|
"github.com/usememos/memos/store"
|
|
|
|
)
|
|
|
|
|
2023-10-05 18:11:29 +03:00
|
|
|
func (d *DB) CreateIdentityProvider(ctx context.Context, create *store.IdentityProvider) (*store.IdentityProvider, error) {
|
2023-09-28 17:09:52 +03:00
|
|
|
var configBytes []byte
|
|
|
|
if create.Type == store.IdentityProviderOAuth2Type {
|
|
|
|
bytes, err := json.Marshal(create.Config.OAuth2Config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
configBytes = bytes
|
|
|
|
} else {
|
|
|
|
return nil, errors.Errorf("unsupported idp type %s", string(create.Type))
|
|
|
|
}
|
|
|
|
|
|
|
|
stmt := `
|
|
|
|
INSERT INTO idp (
|
|
|
|
name,
|
|
|
|
type,
|
|
|
|
identifier_filter,
|
|
|
|
config
|
|
|
|
)
|
|
|
|
VALUES (?, ?, ?, ?)
|
|
|
|
`
|
|
|
|
result, err := d.db.ExecContext(
|
|
|
|
ctx,
|
|
|
|
stmt,
|
|
|
|
create.Name,
|
|
|
|
create.Type,
|
|
|
|
create.IdentifierFilter,
|
|
|
|
string(configBytes),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
id, err := result.LastInsertId()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
create.ID = int32(id)
|
|
|
|
return create, nil
|
|
|
|
}
|
|
|
|
|
2023-10-05 18:11:29 +03:00
|
|
|
func (d *DB) ListIdentityProviders(ctx context.Context, find *store.FindIdentityProvider) ([]*store.IdentityProvider, error) {
|
2023-09-28 17:09:52 +03:00
|
|
|
where, args := []string{"1 = 1"}, []any{}
|
|
|
|
if v := find.ID; v != nil {
|
2023-09-29 04:15:54 +03:00
|
|
|
where, args = append(where, "id = ?"), append(args, *v)
|
2023-09-28 17:09:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
rows, err := d.db.QueryContext(ctx, `
|
|
|
|
SELECT
|
|
|
|
id,
|
|
|
|
name,
|
|
|
|
type,
|
|
|
|
identifier_filter,
|
|
|
|
config
|
|
|
|
FROM idp
|
|
|
|
WHERE `+strings.Join(where, " AND ")+` ORDER BY id ASC`,
|
|
|
|
args...,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer rows.Close()
|
|
|
|
|
|
|
|
var identityProviders []*store.IdentityProvider
|
|
|
|
for rows.Next() {
|
|
|
|
var identityProvider store.IdentityProvider
|
|
|
|
var identityProviderConfig string
|
|
|
|
if err := rows.Scan(
|
|
|
|
&identityProvider.ID,
|
|
|
|
&identityProvider.Name,
|
|
|
|
&identityProvider.Type,
|
|
|
|
&identityProvider.IdentifierFilter,
|
|
|
|
&identityProviderConfig,
|
|
|
|
); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if identityProvider.Type == store.IdentityProviderOAuth2Type {
|
|
|
|
oauth2Config := &store.IdentityProviderOAuth2Config{}
|
|
|
|
if err := json.Unmarshal([]byte(identityProviderConfig), oauth2Config); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
identityProvider.Config = &store.IdentityProviderConfig{
|
|
|
|
OAuth2Config: oauth2Config,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return nil, errors.Errorf("unsupported idp type %s", string(identityProvider.Type))
|
|
|
|
}
|
|
|
|
identityProviders = append(identityProviders, &identityProvider)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return identityProviders, nil
|
|
|
|
}
|
|
|
|
|
2023-10-05 18:11:29 +03:00
|
|
|
func (d *DB) GetIdentityProvider(ctx context.Context, find *store.FindIdentityProvider) (*store.IdentityProvider, error) {
|
2023-09-28 17:09:52 +03:00
|
|
|
list, err := d.ListIdentityProviders(ctx, find)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(list) == 0 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
identityProvider := list[0]
|
|
|
|
return identityProvider, nil
|
|
|
|
}
|
|
|
|
|
2023-10-05 18:11:29 +03:00
|
|
|
func (d *DB) UpdateIdentityProvider(ctx context.Context, update *store.UpdateIdentityProvider) (*store.IdentityProvider, error) {
|
2023-09-28 17:09:52 +03:00
|
|
|
set, args := []string{}, []any{}
|
|
|
|
if v := update.Name; v != nil {
|
|
|
|
set, args = append(set, "name = ?"), append(args, *v)
|
|
|
|
}
|
|
|
|
if v := update.IdentifierFilter; v != nil {
|
|
|
|
set, args = append(set, "identifier_filter = ?"), append(args, *v)
|
|
|
|
}
|
|
|
|
if v := update.Config; v != nil {
|
|
|
|
var configBytes []byte
|
|
|
|
if update.Type == store.IdentityProviderOAuth2Type {
|
|
|
|
bytes, err := json.Marshal(update.Config.OAuth2Config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
configBytes = bytes
|
|
|
|
} else {
|
|
|
|
return nil, errors.Errorf("unsupported idp type %s", string(update.Type))
|
|
|
|
}
|
|
|
|
set, args = append(set, "config = ?"), append(args, string(configBytes))
|
|
|
|
}
|
|
|
|
args = append(args, update.ID)
|
|
|
|
|
|
|
|
stmt := `
|
|
|
|
UPDATE idp
|
|
|
|
SET ` + strings.Join(set, ", ") + `
|
|
|
|
WHERE id = ?
|
|
|
|
`
|
|
|
|
_, err := d.db.ExecContext(ctx, stmt, args...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-09-29 04:15:54 +03:00
|
|
|
identityProvider, err := d.GetIdentityProvider(ctx, &store.FindIdentityProvider{
|
|
|
|
ID: &update.ID,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2023-09-28 17:09:52 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
2023-09-29 04:15:54 +03:00
|
|
|
if identityProvider == nil {
|
|
|
|
return nil, errors.Errorf("idp %d not found", update.ID)
|
2023-09-28 17:09:52 +03:00
|
|
|
}
|
2023-09-29 04:15:54 +03:00
|
|
|
return identityProvider, nil
|
2023-09-28 17:09:52 +03:00
|
|
|
}
|
|
|
|
|
2023-10-05 18:11:29 +03:00
|
|
|
func (d *DB) DeleteIdentityProvider(ctx context.Context, delete *store.DeleteIdentityProvider) error {
|
2023-09-28 17:09:52 +03:00
|
|
|
where, args := []string{"id = ?"}, []any{delete.ID}
|
|
|
|
stmt := `DELETE FROM idp WHERE ` + strings.Join(where, " AND ")
|
|
|
|
result, err := d.db.ExecContext(ctx, stmt, args...)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if _, err = result.RowsAffected(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|