mirror of
https://github.com/gitpod-io/gitpod.git
synced 2025-12-08 17:36:30 +00:00
* [experiment] Add "Sign in with SSO" to Login Reusing existing parts: * `/complete-auth` page of Dashbaord to forward results of authN flows running in a modal * Adding preliminary UI to the Login view: Org-slug and simple button. * [gitpod-db] get team/org by slug * [gitpod-db] fix OIDCClientConfig.OrganizationID field's type * [oidc] consider returnTo URL * [oidc] consider orgSlug param from start request * [oidc] fix oauth2 clientId propagation * [oidc] fix a flaky test * [onboarding] skip for organizational accounts * Move SSO Login UI into it's own component * adjust validation a bit, add useCallbacks * adding GetOIDCClientConfigByOrgSlug * add table name * removing commented out code --------- Co-authored-by: Brad Harris <bmharris@gmail.com>
192 lines
5.8 KiB
Go
192 lines
5.8 KiB
Go
// Copyright (c) 2022 Gitpod GmbH. All rights reserved.
|
|
// Licensed under the GNU Affero General Public License (AGPL).
|
|
// See License.AGPL.txt in the project root for license information.
|
|
|
|
package db
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"gorm.io/gorm"
|
|
)
|
|
|
|
type OIDCClientConfig struct {
|
|
ID uuid.UUID `gorm:"primary_key;column:id;type:char;size:36;" json:"id"`
|
|
|
|
OrganizationID uuid.UUID `gorm:"column:organizationId;type:char;size:36;" json:"organizationId"`
|
|
|
|
Issuer string `gorm:"column:issuer;type:char;size:255;" json:"issuer"`
|
|
|
|
Data EncryptedJSON[OIDCSpec] `gorm:"column:data;type:text;size:65535" json:"data"`
|
|
|
|
LastModified time.Time `gorm:"column:_lastModified;type:timestamp;default:CURRENT_TIMESTAMP(6);" json:"_lastModified"`
|
|
// deleted is reserved for use by periodic deleter.
|
|
_ bool `gorm:"column:deleted;type:tinyint;default:0;" json:"deleted"`
|
|
}
|
|
|
|
func (c *OIDCClientConfig) TableName() string {
|
|
return "d_b_oidc_client_config"
|
|
}
|
|
|
|
// It feels wrong to have to define re-define all of these fields.
|
|
// However, I could not find a Go library which would include json annotations on the structs to guarantee the fields
|
|
// will remain consistent over time (and resilient to rename). If we find one, we can change this.
|
|
type OIDCSpec struct {
|
|
// ClientID is the application's ID.
|
|
ClientID string `json:"clientId"`
|
|
|
|
// ClientSecret is the application's secret.
|
|
ClientSecret string `json:"clientSecret"`
|
|
|
|
// RedirectURL is the URL to redirect users going through
|
|
// the OAuth flow, after the resource owner's URLs.
|
|
RedirectURL string `json:"redirectUrl"`
|
|
|
|
// Scope specifies optional requested permissions.
|
|
Scopes []string `json:"scopes"`
|
|
}
|
|
|
|
func CreateOIDCCLientConfig(ctx context.Context, conn *gorm.DB, cfg OIDCClientConfig) (OIDCClientConfig, error) {
|
|
if cfg.ID == uuid.Nil {
|
|
return OIDCClientConfig{}, errors.New("id must be set")
|
|
}
|
|
|
|
if cfg.Issuer == "" {
|
|
return OIDCClientConfig{}, errors.New("issuer must be set")
|
|
}
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Create(&cfg)
|
|
if tx.Error != nil {
|
|
return OIDCClientConfig{}, fmt.Errorf("failed to create oidc client config: %w", tx.Error)
|
|
}
|
|
|
|
return cfg, nil
|
|
}
|
|
|
|
func GetOIDCClientConfig(ctx context.Context, conn *gorm.DB, id uuid.UUID) (OIDCClientConfig, error) {
|
|
var config OIDCClientConfig
|
|
|
|
if id == uuid.Nil {
|
|
return OIDCClientConfig{}, fmt.Errorf("OIDC Client Config ID is a required argument")
|
|
}
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Where("id = ?", id).
|
|
Where("deleted = ?", 0).
|
|
First(&config)
|
|
if tx.Error != nil {
|
|
if errors.Is(tx.Error, gorm.ErrRecordNotFound) {
|
|
return OIDCClientConfig{}, fmt.Errorf("OIDC Client Config with ID %s does not exist: %w", id.String(), ErrorNotFound)
|
|
}
|
|
return OIDCClientConfig{}, fmt.Errorf("Failed to retrieve OIDC client config: %v", tx.Error)
|
|
}
|
|
|
|
return config, nil
|
|
}
|
|
|
|
func GetOIDCClientConfigForOrganization(ctx context.Context, conn *gorm.DB, id, organizationID uuid.UUID) (OIDCClientConfig, error) {
|
|
var config OIDCClientConfig
|
|
|
|
if id == uuid.Nil {
|
|
return OIDCClientConfig{}, fmt.Errorf("OIDC Client Config ID is a required argument")
|
|
}
|
|
|
|
if organizationID == uuid.Nil {
|
|
return OIDCClientConfig{}, fmt.Errorf("organization id is a required argument")
|
|
}
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Where("id = ?", id).
|
|
Where("organizationId = ?", organizationID).
|
|
Where("deleted = ?", 0).
|
|
First(&config)
|
|
if tx.Error != nil {
|
|
if errors.Is(tx.Error, gorm.ErrRecordNotFound) {
|
|
return OIDCClientConfig{}, fmt.Errorf("OIDC Client Config with ID %s for Organization ID %s does not exist: %w", id.String(), organizationID.String(), ErrorNotFound)
|
|
}
|
|
|
|
return OIDCClientConfig{}, fmt.Errorf("Failed to retrieve OIDC client config %s for Organization ID %s: %v", id.String(), organizationID.String(), tx.Error)
|
|
}
|
|
|
|
return config, nil
|
|
}
|
|
|
|
func ListOIDCClientConfigsForOrganization(ctx context.Context, conn *gorm.DB, organizationID uuid.UUID) ([]OIDCClientConfig, error) {
|
|
if organizationID == uuid.Nil {
|
|
return nil, errors.New("organization ID is a required argument")
|
|
}
|
|
|
|
var results []OIDCClientConfig
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Where("organizationId = ?", organizationID.String()).
|
|
Where("deleted = ?", 0).
|
|
Order("id").
|
|
Find(&results)
|
|
if tx.Error != nil {
|
|
return nil, fmt.Errorf("failed to list oidc client configs for organization %s: %w", organizationID.String(), tx.Error)
|
|
}
|
|
|
|
return results, nil
|
|
}
|
|
|
|
func DeleteOIDCClientConfig(ctx context.Context, conn *gorm.DB, id, organizationID uuid.UUID) error {
|
|
if id == uuid.Nil {
|
|
return fmt.Errorf("id is a required argument")
|
|
}
|
|
|
|
if organizationID == uuid.Nil {
|
|
return fmt.Errorf("organization id is a required argument")
|
|
}
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Table((&OIDCClientConfig{}).TableName()).
|
|
Where("id = ?", id).
|
|
Where("organizationId = ?", organizationID).
|
|
Where("deleted = ?", 0).
|
|
Update("deleted", 1)
|
|
|
|
if tx.Error != nil {
|
|
return fmt.Errorf("failed to delete oidc client config (ID: %s): %v", id.String(), tx.Error)
|
|
}
|
|
|
|
if tx.RowsAffected == 0 {
|
|
return fmt.Errorf("oidc client config ID: %s for organization ID: %s does not exist: %w", id.String(), organizationID.String(), ErrorNotFound)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func GetOIDCClientConfigByOrgSlug(ctx context.Context, conn *gorm.DB, slug string) (OIDCClientConfig, error) {
|
|
var config OIDCClientConfig
|
|
|
|
if slug == "" {
|
|
return OIDCClientConfig{}, fmt.Errorf("slug is a required argument")
|
|
}
|
|
|
|
tx := conn.
|
|
WithContext(ctx).
|
|
Table((&OIDCClientConfig{}).TableName()).
|
|
// TODO: is there a better way to reference table names here and below?
|
|
Joins("JOIN d_b_team team ON team.id = d_b_oidc_client_config.organizationId").
|
|
Where("team.slug = ?", slug).
|
|
Where("d_b_oidc_client_config.deleted = ?", 0).
|
|
First(&config)
|
|
|
|
if tx.Error != nil {
|
|
return OIDCClientConfig{}, fmt.Errorf("failed to get oidc client config by org slug (slug: %s): %v", slug, tx.Error)
|
|
}
|
|
|
|
return config, nil
|
|
}
|