drone/internal/token/token.go
Johannes Batzill fad6e18898 Introduce Controller for Repo, Space, User, and ServiceAccount (#25)
Preparing the support for harness specific API router + http handler, which allows us to have complete control over the rest api naming and functionality, without having to do complex path rewrites or request / reponse rewrites inline.
2022-10-03 18:56:49 -07:00

112 lines
2.8 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package token
import (
"context"
"fmt"
"time"
"github.com/harness/gitness/internal/store"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/enum"
)
const (
userTokenLifeTime time.Duration = 24 * time.Hour // 1 day.
oathTokenLifeTime time.Duration = 30 * time.Minute // 30 min.
)
func CreateUserSession(ctx context.Context, tokenStore store.TokenStore,
user *types.User, name string) (*types.Token, string, error) {
principal := types.PrincipalFromUser(user)
return Create(
ctx,
tokenStore,
enum.TokenTypeSession,
principal,
principal,
name,
userTokenLifeTime,
enum.AccessGrantAll,
)
}
func CreatePAT(ctx context.Context, tokenStore store.TokenStore,
createdBy *types.Principal, createdFor *types.User,
name string, lifetime time.Duration, grants enum.AccessGrant) (*types.Token, string, error) {
return Create(
ctx,
tokenStore,
enum.TokenTypePAT,
createdBy,
types.PrincipalFromUser(createdFor),
name,
lifetime,
grants,
)
}
func CreateSAT(ctx context.Context, tokenStore store.TokenStore,
createdBy *types.Principal, createdFor *types.ServiceAccount,
name string, lifetime time.Duration, grants enum.AccessGrant) (*types.Token, string, error) {
return Create(
ctx,
tokenStore,
enum.TokenTypeSAT,
createdBy,
types.PrincipalFromServiceAccount(createdFor),
name,
lifetime,
grants,
)
}
func CreateOAuth(ctx context.Context, tokenStore store.TokenStore,
createdBy *types.Principal, createdFor *types.User,
name string, grants enum.AccessGrant) (*types.Token, string, error) {
return Create(
ctx,
tokenStore,
enum.TokenTypeOAuth2,
createdBy,
types.PrincipalFromUser(createdFor),
name,
oathTokenLifeTime,
grants,
)
}
func Create(ctx context.Context, tokenStore store.TokenStore,
tokenType enum.TokenType, createdBy *types.Principal, createdFor *types.Principal,
name string, lifetime time.Duration, grants enum.AccessGrant) (*types.Token, string, error) {
issuedAt := time.Now()
expiresAt := issuedAt.Add(lifetime)
// create db entry first so we get the id.
token := types.Token{
Type: tokenType,
Name: name,
PrincipalID: createdFor.ID,
IssuedAt: issuedAt.UnixMilli(),
ExpiresAt: expiresAt.UnixMilli(),
Grants: grants,
CreatedBy: createdBy.ID,
}
err := tokenStore.Create(ctx, &token)
if err != nil {
return nil, "", fmt.Errorf("failed to store token in db: %w", err)
}
// create jwt token.
jwtToken, err := GenerateJWTForToken(&token, createdFor.Salt)
if err != nil {
return nil, "", fmt.Errorf("failed to create jwt token: %w", err)
}
return &token, jwtToken, nil
}