mirror of
https://github.com/harness/drone.git
synced 2025-05-05 10:44:22 +08:00

This change is adding the concept of Paths. A repository and space always have a Primary Path which always is represents the ancestry to the root space. All access history / resource visibility / child listings / UI traversal / etc. is done via that path. Additionally, repos and spaces can have Alias Paths, which as the name states are aliases. via the primary path. They sole impact is that a space or repo can be reached via different paths from the UI / rest apis / git apis. This fulfills two major purposes: - Customers can rename or move projects and spaces without breaking any existing references from CI pipeliens / code bases / local repos / ... - Customer can create shorter aliases for important repos when in harness embeded mode! (acc/org/proj/repo can be shortened to acc/repo, or acc/repo' Apart from the path changes, this PR adds: Improved User facing errors Improved internal error handling and wrapping update / rename operation for repo and space path list / delete / create operation for repo and space
60 lines
1.3 KiB
Go
60 lines
1.3 KiB
Go
// Copyright 2021 Harness Inc. All rights reserved.
|
|
// Use of this source code is governed by the Polyform Free Trial License
|
|
// that can be found in the LICENSE.md file for this repository.
|
|
|
|
package token
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/harness/gitness/types"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/dgrijalva/jwt-go"
|
|
)
|
|
|
|
// Claims defines custom token claims.
|
|
type Claims struct {
|
|
Admin bool `json:"admin"`
|
|
|
|
jwt.StandardClaims
|
|
}
|
|
|
|
// Generate generates a token with no expiration.
|
|
func Generate(user *types.User, secret string) (string, error) {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
|
|
user.Admin,
|
|
jwt.StandardClaims{
|
|
Subject: fmt.Sprint(user.ID),
|
|
IssuedAt: time.Now().Unix(),
|
|
},
|
|
})
|
|
|
|
res, err := token.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "Failed to sign token")
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
// GenerateExp generates a token with an expiration date.
|
|
func GenerateExp(user *types.User, exp int64, secret string) (string, error) {
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, Claims{
|
|
user.Admin,
|
|
jwt.StandardClaims{
|
|
ExpiresAt: exp,
|
|
Subject: fmt.Sprint(user.ID),
|
|
IssuedAt: time.Now().Unix(),
|
|
},
|
|
})
|
|
|
|
res, err := token.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "Failed to sign token")
|
|
}
|
|
|
|
return res, nil
|
|
}
|