drone/internal/token/token.go
Johannes Batzill 1115a5083b Add Paths support and error improvements (#11)
This change is adding the concept of Paths.
A repository and space always have a Primary Path which always is represents the ancestry to the root space.
All access history / resource visibility / child listings / UI traversal / etc. is done via that path.

Additionally, repos and spaces can have Alias Paths, which as the name states are aliases. via the primary path.
They sole impact is that a space or repo can be reached via different paths from the UI / rest apis / git apis.
This fulfills two major purposes:
- Customers can rename or move projects and spaces without breaking any existing references from CI pipeliens / code bases / local repos / ...
- Customer can create shorter aliases for important repos when in harness embeded mode! (acc/org/proj/repo can be shortened to acc/repo, or acc/repo'

Apart from the path changes, this PR adds:

Improved User facing errors
Improved internal error handling and wrapping
update / rename operation for repo and space
path list / delete / create operation for repo and space
2022-09-08 21:39:15 -07:00

60 lines
1.3 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package token
import (
"fmt"
"time"
"github.com/harness/gitness/types"
"github.com/pkg/errors"
"github.com/dgrijalva/jwt-go"
)
// Claims defines custom token claims.
type Claims struct {
Admin bool `json:"admin"`
jwt.StandardClaims
}
// Generate generates a token with no expiration.
func Generate(user *types.User, secret string) (string, error) {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
user.Admin,
jwt.StandardClaims{
Subject: fmt.Sprint(user.ID),
IssuedAt: time.Now().Unix(),
},
})
res, err := token.SignedString([]byte(secret))
if err != nil {
return "", errors.Wrap(err, "Failed to sign token")
}
return res, nil
}
// GenerateExp generates a token with an expiration date.
func GenerateExp(user *types.User, exp int64, secret string) (string, error) {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
user.Admin,
jwt.StandardClaims{
ExpiresAt: exp,
Subject: fmt.Sprint(user.ID),
IssuedAt: time.Now().Unix(),
},
})
res, err := token.SignedString([]byte(secret))
if err != nil {
return "", errors.Wrap(err, "Failed to sign token")
}
return res, nil
}