mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-18 05:47:32 +00:00
8203f2dad3
* start org * refactor(eventstore): filter in sql for querier * feat(eventstore): Aggregate precondition preconditions are checked right before insert. Insert is still transaction save * feat(eventstore): check preconditions in repository * test(eventstore): test precondition in models * test(eventstore): precondition-tests * start org * refactor(eventstore): filter in sql for querier * feat(eventstore): Aggregate precondition preconditions are checked right before insert. Insert is still transaction save * feat(admin): start implement org * feat(eventstore): check preconditions in repository * fix(eventstore): data as NULL if empty refactor(eventstore): naming in sequence methods * feat(admin): org command side * feat(management): start org-repo * feat(org): member * fix: replace ObjectRoot.ID with ObjectRoot.AggregateID * aggregateID * add remove,change member * refactor(org): namings * refactor(eventstore): querier as type * fix(precondition): rename validation from precondition to validation * test(eventstore): isErr func instead of wantErr bool * fix(tests): Data * fix(eventstore): correct check for existing events in push, simplify insert statement * fix(eventstore): aggregate id public * test(org): eventsourcing * test(org): eventstore * test(org): deactivate, reactivate, orgbyid * test(org): getMemberByIDs * tests * running tests * add config * add user repo to admin * thorw not found if no org found * iam setup * eventstore tests done * setup iam * lauft * iam eventstore * validate if user is already member of org * modules * delete unused file * iam member * add member validation test * iam member * return error if unable to validat member * generate org id once, set resourceowner of org * start iam repo * set resourceowner on unique aggregates * setup user const * better code * generate files * fix tests * Update internal/admin/repository/eventsourcing/repository.go Co-authored-by: Livio Amstutz <livio.a@gmail.com> * set ctx data Co-authored-by: adlerhurst <silvan.reusser@gmail.com> Co-authored-by: Livio Amstutz <livio.a@gmail.com>
89 lines
2.3 KiB
Go
89 lines
2.3 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
"github.com/caos/logging"
|
|
"github.com/caos/zitadel/internal/api"
|
|
grpc_util "github.com/caos/zitadel/internal/api/grpc"
|
|
"google.golang.org/grpc/metadata"
|
|
"strconv"
|
|
)
|
|
|
|
type key int
|
|
|
|
var (
|
|
permissionsKey key
|
|
dataKey key
|
|
)
|
|
|
|
type CtxData struct {
|
|
UserID string
|
|
OrgID string
|
|
ProjectID string
|
|
AgentID string
|
|
}
|
|
|
|
func (ctxData CtxData) IsZero() bool {
|
|
return ctxData.UserID == "" || ctxData.OrgID == ""
|
|
}
|
|
|
|
type Grants []*Grant
|
|
|
|
type Grant struct {
|
|
OrgID string
|
|
Roles []string
|
|
}
|
|
|
|
type TokenVerifier interface {
|
|
VerifyAccessToken(ctx context.Context, token string) (string, string, string, error)
|
|
ResolveGrants(ctx context.Context, sub, orgID string) ([]*Grant, error)
|
|
GetProjectIDByClientID(ctx context.Context, clientID string) (string, error)
|
|
}
|
|
|
|
func VerifyTokenAndWriteCtxData(ctx context.Context, token, orgID string, t TokenVerifier) (_ context.Context, err error) {
|
|
var userID, projectID, clientID, agentID string
|
|
//TODO: Remove as soon an authentification is implemented
|
|
if CheckInternal(ctx) {
|
|
userID = grpc_util.GetHeader(ctx, api.ZitadelUserID)
|
|
projectID = grpc_util.GetHeader(ctx, api.ZitadelClientID)
|
|
agentID = grpc_util.GetHeader(ctx, api.ZitadelAgentID)
|
|
} else {
|
|
userID, clientID, agentID, err = verifyAccessToken(ctx, token, t)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
projectID, err = t.GetProjectIDByClientID(ctx, clientID)
|
|
logging.LogWithFields("AUTH-GfAoV", "clientID", clientID).OnError(err).Warn("could not read projectid by clientid")
|
|
}
|
|
return context.WithValue(ctx, dataKey, CtxData{UserID: userID, OrgID: orgID, ProjectID: projectID, AgentID: agentID}), nil
|
|
}
|
|
|
|
func SetCtxData(ctx context.Context, ctxData CtxData) context.Context {
|
|
return context.WithValue(ctx, dataKey, ctxData)
|
|
}
|
|
|
|
func GetCtxData(ctx context.Context) CtxData {
|
|
ctxData, _ := ctx.Value(dataKey).(CtxData)
|
|
return ctxData
|
|
}
|
|
|
|
func GetPermissionsFromCtx(ctx context.Context) []string {
|
|
ctxPermission, _ := ctx.Value(permissionsKey).([]string)
|
|
return ctxPermission
|
|
}
|
|
|
|
//TODO: Remove as soon an authentification is implemented
|
|
func CheckInternal(ctx context.Context) bool {
|
|
md, ok := metadata.FromIncomingContext(ctx)
|
|
if !ok {
|
|
return false
|
|
}
|
|
v, ok := md[api.LoginKey]
|
|
if !ok {
|
|
return false
|
|
}
|
|
ok, _ = strconv.ParseBool(v[0])
|
|
return ok
|
|
}
|