mirror of
https://github.com/matrix-org/dendrite.git
synced 2026-01-01 03:03:10 -06:00
Fixes for PR review.
This commit is contained in:
parent
a7d3584aa3
commit
531c805b18
|
|
@ -16,6 +16,8 @@ package auth
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
"net/http"
|
||||||
"reflect"
|
"reflect"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
@ -23,6 +25,7 @@ import (
|
||||||
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
||||||
"github.com/matrix-org/dendrite/setup/config"
|
"github.com/matrix-org/dendrite/setup/config"
|
||||||
uapi "github.com/matrix-org/dendrite/userapi/api"
|
uapi "github.com/matrix-org/dendrite/userapi/api"
|
||||||
|
"github.com/matrix-org/util"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestLoginFromJSONReader(t *testing.T) {
|
func TestLoginFromJSONReader(t *testing.T) {
|
||||||
|
|
@ -32,12 +35,10 @@ func TestLoginFromJSONReader(t *testing.T) {
|
||||||
Name string
|
Name string
|
||||||
Body string
|
Body string
|
||||||
|
|
||||||
WantErrCode string
|
|
||||||
WantUsername string
|
WantUsername string
|
||||||
WantDeviceID string
|
WantDeviceID string
|
||||||
WantDeletedTokens []string
|
WantDeletedTokens []string
|
||||||
}{
|
}{
|
||||||
{Name: "empty", WantErrCode: "M_BAD_JSON"},
|
|
||||||
{
|
{
|
||||||
Name: "passwordWorks",
|
Name: "passwordWorks",
|
||||||
Body: `{
|
Body: `{
|
||||||
|
|
@ -70,20 +71,11 @@ func TestLoginFromJSONReader(t *testing.T) {
|
||||||
ServerName: serverName,
|
ServerName: serverName,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
login, cleanup, errRes := LoginFromJSONReader(ctx, strings.NewReader(tst.Body), &accountDB, &userAPI, cfg)
|
login, cleanup, err := LoginFromJSONReader(ctx, strings.NewReader(tst.Body), &accountDB, &userAPI, cfg)
|
||||||
if tst.WantErrCode == "" {
|
if err != nil {
|
||||||
if errRes != nil {
|
t.Fatalf("LoginFromJSONReader failed: %+v", err)
|
||||||
t.Fatalf("LoginFromJSONReader failed: %+v", errRes)
|
|
||||||
}
|
|
||||||
cleanup(ctx, nil)
|
|
||||||
} else {
|
|
||||||
if errRes == nil {
|
|
||||||
t.Fatalf("LoginFromJSONReader err: got %+v, want code %q", errRes, tst.WantErrCode)
|
|
||||||
} else if merr, ok := errRes.JSON.(*jsonerror.MatrixError); ok && merr.ErrCode != tst.WantErrCode {
|
|
||||||
t.Fatalf("LoginFromJSONReader err: got %+v, want code %q", errRes, tst.WantErrCode)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
cleanup(ctx, &util.JSONResponse{Code: http.StatusOK})
|
||||||
|
|
||||||
if login.Username() != tst.WantUsername {
|
if login.Username() != tst.WantUsername {
|
||||||
t.Errorf("Username: got %q, want %q", login.Username(), tst.WantUsername)
|
t.Errorf("Username: got %q, want %q", login.Username(), tst.WantUsername)
|
||||||
|
|
@ -106,11 +98,78 @@ func TestLoginFromJSONReader(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestBadLoginFromJSONReader(t *testing.T) {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
tsts := []struct {
|
||||||
|
Name string
|
||||||
|
Body string
|
||||||
|
|
||||||
|
WantErrCode string
|
||||||
|
}{
|
||||||
|
{Name: "empty", WantErrCode: "M_BAD_JSON"},
|
||||||
|
{
|
||||||
|
Name: "badUnmarshal",
|
||||||
|
Body: `badsyntaxJSON`,
|
||||||
|
WantErrCode: "M_BAD_JSON",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "badPassword",
|
||||||
|
Body: `{
|
||||||
|
"type": "m.login.password",
|
||||||
|
"identifier": { "type": "m.id.user", "user": "alice" },
|
||||||
|
"password": "invalidpassword",
|
||||||
|
"device_id": "adevice"
|
||||||
|
}`,
|
||||||
|
WantErrCode: "M_FORBIDDEN",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "badToken",
|
||||||
|
Body: `{
|
||||||
|
"type": "m.login.token",
|
||||||
|
"token": "invalidtoken",
|
||||||
|
"device_id": "adevice"
|
||||||
|
}`,
|
||||||
|
WantErrCode: "M_FORBIDDEN",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "badType",
|
||||||
|
Body: `{
|
||||||
|
"type": "m.login.invalid",
|
||||||
|
"device_id": "adevice"
|
||||||
|
}`,
|
||||||
|
WantErrCode: "M_INVALID_ARGUMENT_VALUE",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tst := range tsts {
|
||||||
|
t.Run(tst.Name, func(t *testing.T) {
|
||||||
|
var accountDB fakeAccountDB
|
||||||
|
var userAPI fakeUserInternalAPI
|
||||||
|
cfg := &config.ClientAPI{
|
||||||
|
Matrix: &config.Global{
|
||||||
|
ServerName: serverName,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
_, cleanup, errRes := LoginFromJSONReader(ctx, strings.NewReader(tst.Body), &accountDB, &userAPI, cfg)
|
||||||
|
if errRes == nil {
|
||||||
|
cleanup(ctx, nil)
|
||||||
|
t.Fatalf("LoginFromJSONReader err: got %+v, want code %q", errRes, tst.WantErrCode)
|
||||||
|
} else if merr, ok := errRes.JSON.(*jsonerror.MatrixError); ok && merr.ErrCode != tst.WantErrCode {
|
||||||
|
t.Fatalf("LoginFromJSONReader err: got %+v, want code %q", errRes, tst.WantErrCode)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
type fakeAccountDB struct {
|
type fakeAccountDB struct {
|
||||||
AccountDatabase
|
AccountDatabase
|
||||||
}
|
}
|
||||||
|
|
||||||
func (*fakeAccountDB) GetAccountByPassword(ctx context.Context, localpart, password string) (*uapi.Account, error) {
|
func (*fakeAccountDB) GetAccountByPassword(ctx context.Context, localpart, password string) (*uapi.Account, error) {
|
||||||
|
if password == "invalidpassword" {
|
||||||
|
return nil, sql.ErrNoRows
|
||||||
|
}
|
||||||
|
|
||||||
return &uapi.Account{}, nil
|
return &uapi.Account{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -126,6 +185,10 @@ func (ua *fakeUserInternalAPI) PerformLoginTokenDeletion(ctx context.Context, re
|
||||||
}
|
}
|
||||||
|
|
||||||
func (*fakeUserInternalAPI) QueryLoginToken(ctx context.Context, req *uapi.QueryLoginTokenRequest, res *uapi.QueryLoginTokenResponse) error {
|
func (*fakeUserInternalAPI) QueryLoginToken(ctx context.Context, req *uapi.QueryLoginTokenRequest, res *uapi.QueryLoginTokenResponse) error {
|
||||||
|
if req.Token == "invalidtoken" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
res.Data = &uapi.LoginTokenData{UserID: "@auser:example.com"}
|
res.Data = &uapi.LoginTokenData{UserID: "@auser:example.com"}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -45,17 +45,6 @@ func (t *LoginTypeToken) LoginFromJSON(ctx context.Context, reqBytes []byte) (*L
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return t.login(ctx, &r)
|
|
||||||
}
|
|
||||||
|
|
||||||
// loginTokenRequest struct to hold the possible parameters from an HTTP request.
|
|
||||||
type loginTokenRequest struct {
|
|
||||||
Login
|
|
||||||
Token string `json:"token"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// login parses and validates the login token. It returns basic user information.
|
|
||||||
func (t *LoginTypeToken) login(ctx context.Context, r *loginTokenRequest) (*Login, LoginCleanupFunc, *util.JSONResponse) {
|
|
||||||
var res uapi.QueryLoginTokenResponse
|
var res uapi.QueryLoginTokenResponse
|
||||||
if err := t.UserAPI.QueryLoginToken(ctx, &uapi.QueryLoginTokenRequest{Token: r.Token}, &res); err != nil {
|
if err := t.UserAPI.QueryLoginToken(ctx, &uapi.QueryLoginTokenRequest{Token: r.Token}, &res); err != nil {
|
||||||
util.GetLogger(ctx).WithError(err).Error("UserAPI.QueryLoginToken failed")
|
util.GetLogger(ctx).WithError(err).Error("UserAPI.QueryLoginToken failed")
|
||||||
|
|
@ -73,7 +62,11 @@ func (t *LoginTypeToken) login(ctx context.Context, r *loginTokenRequest) (*Logi
|
||||||
r.Login.Identifier.User = res.Data.UserID
|
r.Login.Identifier.User = res.Data.UserID
|
||||||
|
|
||||||
cleanup := func(ctx context.Context, authRes *util.JSONResponse) {
|
cleanup := func(ctx context.Context, authRes *util.JSONResponse) {
|
||||||
if authRes == nil || authRes.Code == http.StatusOK {
|
if authRes == nil {
|
||||||
|
util.GetLogger(ctx).Error("No JSONResponse provided to LoginTokenType cleanup function")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if authRes.Code == http.StatusOK {
|
||||||
var res uapi.PerformLoginTokenDeletionResponse
|
var res uapi.PerformLoginTokenDeletionResponse
|
||||||
if err := t.UserAPI.PerformLoginTokenDeletion(ctx, &uapi.PerformLoginTokenDeletionRequest{Token: r.Token}, &res); err != nil {
|
if err := t.UserAPI.PerformLoginTokenDeletion(ctx, &uapi.PerformLoginTokenDeletionRequest{Token: r.Token}, &res); err != nil {
|
||||||
util.GetLogger(ctx).WithError(err).Error("UserAPI.PerformLoginTokenDeletion failed")
|
util.GetLogger(ctx).WithError(err).Error("UserAPI.PerformLoginTokenDeletion failed")
|
||||||
|
|
@ -82,3 +75,9 @@ func (t *LoginTypeToken) login(ctx context.Context, r *loginTokenRequest) (*Logi
|
||||||
}
|
}
|
||||||
return &r.Login, cleanup, nil
|
return &r.Login, cleanup, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// loginTokenRequest struct to hold the possible parameters from an HTTP request.
|
||||||
|
type loginTokenRequest struct {
|
||||||
|
Login
|
||||||
|
Token string `json:"token"`
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -22,7 +22,7 @@ import (
|
||||||
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
||||||
"github.com/matrix-org/dendrite/clientapi/userutil"
|
"github.com/matrix-org/dendrite/clientapi/userutil"
|
||||||
"github.com/matrix-org/dendrite/setup/config"
|
"github.com/matrix-org/dendrite/setup/config"
|
||||||
uapi "github.com/matrix-org/dendrite/userapi/api"
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
||||||
"github.com/matrix-org/dendrite/userapi/storage/accounts"
|
"github.com/matrix-org/dendrite/userapi/storage/accounts"
|
||||||
"github.com/matrix-org/gomatrixserverlib"
|
"github.com/matrix-org/gomatrixserverlib"
|
||||||
"github.com/matrix-org/util"
|
"github.com/matrix-org/util"
|
||||||
|
|
@ -54,7 +54,7 @@ func passwordLogin() flows {
|
||||||
|
|
||||||
// Login implements GET and POST /login
|
// Login implements GET and POST /login
|
||||||
func Login(
|
func Login(
|
||||||
req *http.Request, accountDB accounts.Database, userAPI uapi.UserInternalAPI,
|
req *http.Request, accountDB accounts.Database, userAPI userapi.UserInternalAPI,
|
||||||
cfg *config.ClientAPI,
|
cfg *config.ClientAPI,
|
||||||
) util.JSONResponse {
|
) util.JSONResponse {
|
||||||
if req.Method == http.MethodGet {
|
if req.Method == http.MethodGet {
|
||||||
|
|
@ -69,9 +69,9 @@ func Login(
|
||||||
return *authErr
|
return *authErr
|
||||||
}
|
}
|
||||||
// make a device/access token
|
// make a device/access token
|
||||||
authzErr := completeAuth(req.Context(), cfg.Matrix.ServerName, userAPI, login, req.RemoteAddr, req.UserAgent())
|
authErr2 := completeAuth(req.Context(), cfg.Matrix.ServerName, userAPI, login, req.RemoteAddr, req.UserAgent())
|
||||||
cleanup(req.Context(), &authzErr)
|
cleanup(req.Context(), &authErr2)
|
||||||
return authzErr
|
return authErr2
|
||||||
}
|
}
|
||||||
return util.JSONResponse{
|
return util.JSONResponse{
|
||||||
Code: http.StatusMethodNotAllowed,
|
Code: http.StatusMethodNotAllowed,
|
||||||
|
|
@ -80,7 +80,7 @@ func Login(
|
||||||
}
|
}
|
||||||
|
|
||||||
func completeAuth(
|
func completeAuth(
|
||||||
ctx context.Context, serverName gomatrixserverlib.ServerName, userAPI uapi.UserInternalAPI, login *auth.Login,
|
ctx context.Context, serverName gomatrixserverlib.ServerName, userAPI userapi.UserInternalAPI, login *auth.Login,
|
||||||
ipAddr, userAgent string,
|
ipAddr, userAgent string,
|
||||||
) util.JSONResponse {
|
) util.JSONResponse {
|
||||||
token, err := auth.GenerateAccessToken()
|
token, err := auth.GenerateAccessToken()
|
||||||
|
|
@ -95,8 +95,8 @@ func completeAuth(
|
||||||
return jsonerror.InternalServerError()
|
return jsonerror.InternalServerError()
|
||||||
}
|
}
|
||||||
|
|
||||||
var performRes uapi.PerformDeviceCreationResponse
|
var performRes userapi.PerformDeviceCreationResponse
|
||||||
err = userAPI.PerformDeviceCreation(ctx, &uapi.PerformDeviceCreationRequest{
|
err = userAPI.PerformDeviceCreation(ctx, &userapi.PerformDeviceCreationRequest{
|
||||||
DeviceDisplayName: login.InitialDisplayName,
|
DeviceDisplayName: login.InitialDisplayName,
|
||||||
DeviceID: login.DeviceID,
|
DeviceID: login.DeviceID,
|
||||||
AccessToken: token,
|
AccessToken: token,
|
||||||
|
|
|
||||||
|
|
@ -23,7 +23,8 @@ type LoginTokenInternalAPI interface {
|
||||||
// PerformLoginTokenCreation creates a new login token and associates it with the provided data.
|
// PerformLoginTokenCreation creates a new login token and associates it with the provided data.
|
||||||
PerformLoginTokenCreation(ctx context.Context, req *PerformLoginTokenCreationRequest, res *PerformLoginTokenCreationResponse) error
|
PerformLoginTokenCreation(ctx context.Context, req *PerformLoginTokenCreationRequest, res *PerformLoginTokenCreationResponse) error
|
||||||
|
|
||||||
// PerformLoginTokenDeletion ensures the token doesn't exist.
|
// PerformLoginTokenDeletion ensures the token doesn't exist. Success
|
||||||
|
// is returned even if the token didn't exist, or was already deleted.
|
||||||
PerformLoginTokenDeletion(ctx context.Context, req *PerformLoginTokenDeletionRequest, res *PerformLoginTokenDeletionResponse) error
|
PerformLoginTokenDeletion(ctx context.Context, req *PerformLoginTokenDeletionRequest, res *PerformLoginTokenDeletionResponse) error
|
||||||
|
|
||||||
// QueryLoginToken returns the data associated with a login token. If
|
// QueryLoginToken returns the data associated with a login token. If
|
||||||
|
|
|
||||||
|
|
@ -51,7 +51,7 @@ func (a *UserInternalAPI) PerformLoginTokenDeletion(ctx context.Context, req *ap
|
||||||
// QueryLoginToken returns the data associated with a login token. If
|
// QueryLoginToken returns the data associated with a login token. If
|
||||||
// the token is not valid, success is returned, but res.Data == nil.
|
// the token is not valid, success is returned, but res.Data == nil.
|
||||||
func (a *UserInternalAPI) QueryLoginToken(ctx context.Context, req *api.QueryLoginTokenRequest, res *api.QueryLoginTokenResponse) error {
|
func (a *UserInternalAPI) QueryLoginToken(ctx context.Context, req *api.QueryLoginTokenRequest, res *api.QueryLoginTokenResponse) error {
|
||||||
tokenData, err := a.DeviceDB.GetLoginTokenByToken(ctx, req.Token)
|
tokenData, err := a.DeviceDB.GetLoginTokenDataByToken(ctx, req.Token)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
res.Data = nil
|
res.Data = nil
|
||||||
if err == sql.ErrNoRows {
|
if err == sql.ErrNoRows {
|
||||||
|
|
@ -59,10 +59,13 @@ func (a *UserInternalAPI) QueryLoginToken(ctx context.Context, req *api.QueryLog
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
localpart, _, err := gomatrixserverlib.SplitID('@', tokenData.UserID)
|
localpart, domain, err := gomatrixserverlib.SplitID('@', tokenData.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
if domain != a.ServerName {
|
||||||
|
return fmt.Errorf("cannot return a login token for a remote user: got %s want %s", domain, a.ServerName)
|
||||||
|
}
|
||||||
if _, err := a.AccountDB.GetAccountByLocalpart(ctx, localpart); err != nil {
|
if _, err := a.AccountDB.GetAccountByLocalpart(ctx, localpart); err != nil {
|
||||||
res.Data = nil
|
res.Data = nil
|
||||||
if err == sql.ErrNoRows {
|
if err == sql.ErrNoRows {
|
||||||
|
|
|
||||||
|
|
@ -46,7 +46,7 @@ type Database interface {
|
||||||
// RemoveLoginToken removes the named token (and may clean up other expired tokens).
|
// RemoveLoginToken removes the named token (and may clean up other expired tokens).
|
||||||
RemoveLoginToken(ctx context.Context, token string) error
|
RemoveLoginToken(ctx context.Context, token string) error
|
||||||
|
|
||||||
// GetLoginTokenByToken returns the data associated with the given token.
|
// GetLoginTokenDataByToken returns the data associated with the given token.
|
||||||
// May return sql.ErrNoRows.
|
// May return sql.ErrNoRows.
|
||||||
GetLoginTokenByToken(ctx context.Context, token string) (*api.LoginTokenData, error)
|
GetLoginTokenDataByToken(ctx context.Context, token string) (*api.LoginTokenData, error)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -27,7 +27,7 @@ import (
|
||||||
type loginTokenStatements struct {
|
type loginTokenStatements struct {
|
||||||
insertStmt *sql.Stmt
|
insertStmt *sql.Stmt
|
||||||
deleteStmt *sql.Stmt
|
deleteStmt *sql.Stmt
|
||||||
selectStmt *sql.Stmt
|
selectByTokenStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
// execSchema ensures tables and indices exist.
|
// execSchema ensures tables and indices exist.
|
||||||
|
|
@ -54,7 +54,7 @@ func (s *loginTokenStatements) prepare(db *sql.DB) error {
|
||||||
return sqlutil.StatementList{
|
return sqlutil.StatementList{
|
||||||
{&s.insertStmt, "INSERT INTO login_tokens(token, token_expires_at, user_id) VALUES ($1, $2, $3)"},
|
{&s.insertStmt, "INSERT INTO login_tokens(token, token_expires_at, user_id) VALUES ($1, $2, $3)"},
|
||||||
{&s.deleteStmt, "DELETE FROM login_tokens WHERE token = $1 OR token_expires_at <= $2"},
|
{&s.deleteStmt, "DELETE FROM login_tokens WHERE token = $1 OR token_expires_at <= $2"},
|
||||||
{&s.selectStmt, "SELECT user_id FROM login_tokens WHERE token = $1 AND token_expires_at > $2"},
|
{&s.selectByTokenStmt, "SELECT user_id FROM login_tokens WHERE token = $1 AND token_expires_at > $2"},
|
||||||
}.Prepare(db)
|
}.Prepare(db)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -76,7 +76,7 @@ func (s *loginTokenStatements) deleteByToken(ctx context.Context, txn *sql.Tx, t
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if n, err := res.RowsAffected(); err == nil && n > 1 {
|
if n, err := res.RowsAffected(); err == nil && n > 1 {
|
||||||
util.GetLogger(ctx).WithField("num_deleted", n).Infof("Deleted %d login tokens (%d likely garbage collected)", n, n-1)
|
util.GetLogger(ctx).WithField("num_deleted", n).Infof("Deleted %d login tokens (%d likely additional expired token)", n, n-1)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
@ -84,7 +84,7 @@ func (s *loginTokenStatements) deleteByToken(ctx context.Context, txn *sql.Tx, t
|
||||||
// selectByToken returns the data associated with the given token. May return sql.ErrNoRows.
|
// selectByToken returns the data associated with the given token. May return sql.ErrNoRows.
|
||||||
func (s *loginTokenStatements) selectByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
func (s *loginTokenStatements) selectByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
||||||
var data api.LoginTokenData
|
var data api.LoginTokenData
|
||||||
err := s.selectStmt.QueryRowContext(ctx, token, time.Now().UTC()).Scan(&data.UserID)
|
err := s.selectByTokenStmt.QueryRowContext(ctx, token, time.Now().UTC()).Scan(&data.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -263,8 +263,8 @@ func (d *Database) RemoveLoginToken(ctx context.Context, token string) error {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetLoginTokenByToken returns the data associated with the given token.
|
// GetLoginTokenDataByToken returns the data associated with the given token.
|
||||||
// May return sql.ErrNoRows.
|
// May return sql.ErrNoRows.
|
||||||
func (d *Database) GetLoginTokenByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
func (d *Database) GetLoginTokenDataByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
||||||
return d.loginTokens.selectByToken(ctx, token)
|
return d.loginTokens.selectByToken(ctx, token)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -27,7 +27,7 @@ import (
|
||||||
type loginTokenStatements struct {
|
type loginTokenStatements struct {
|
||||||
insertStmt *sql.Stmt
|
insertStmt *sql.Stmt
|
||||||
deleteStmt *sql.Stmt
|
deleteStmt *sql.Stmt
|
||||||
selectStmt *sql.Stmt
|
selectByTokenStmt *sql.Stmt
|
||||||
}
|
}
|
||||||
|
|
||||||
// execSchema ensures tables and indices exist.
|
// execSchema ensures tables and indices exist.
|
||||||
|
|
@ -54,7 +54,7 @@ func (s *loginTokenStatements) prepare(db *sql.DB) error {
|
||||||
return sqlutil.StatementList{
|
return sqlutil.StatementList{
|
||||||
{&s.insertStmt, "INSERT INTO login_tokens(token, token_expires_at, user_id) VALUES ($1, $2, $3)"},
|
{&s.insertStmt, "INSERT INTO login_tokens(token, token_expires_at, user_id) VALUES ($1, $2, $3)"},
|
||||||
{&s.deleteStmt, "DELETE FROM login_tokens WHERE token = $1 OR token_expires_at <= $2"},
|
{&s.deleteStmt, "DELETE FROM login_tokens WHERE token = $1 OR token_expires_at <= $2"},
|
||||||
{&s.selectStmt, "SELECT user_id FROM login_tokens WHERE token = $1 AND token_expires_at > $2"},
|
{&s.selectByTokenStmt, "SELECT user_id FROM login_tokens WHERE token = $1 AND token_expires_at > $2"},
|
||||||
}.Prepare(db)
|
}.Prepare(db)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -76,7 +76,7 @@ func (s *loginTokenStatements) deleteByToken(ctx context.Context, txn *sql.Tx, t
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if n, err := res.RowsAffected(); err == nil && n > 1 {
|
if n, err := res.RowsAffected(); err == nil && n > 1 {
|
||||||
util.GetLogger(ctx).WithField("num_deleted", n).Infof("Deleted %d login tokens (%d likely garbage collected)", n, n-1)
|
util.GetLogger(ctx).WithField("num_deleted", n).Infof("Deleted %d login tokens (%d likely additional expired token)", n, n-1)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
@ -84,7 +84,7 @@ func (s *loginTokenStatements) deleteByToken(ctx context.Context, txn *sql.Tx, t
|
||||||
// selectByToken returns the data associated with the given token. May return sql.ErrNoRows.
|
// selectByToken returns the data associated with the given token. May return sql.ErrNoRows.
|
||||||
func (s *loginTokenStatements) selectByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
func (s *loginTokenStatements) selectByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
||||||
var data api.LoginTokenData
|
var data api.LoginTokenData
|
||||||
err := s.selectStmt.QueryRowContext(ctx, token, time.Now().UTC()).Scan(&data.UserID)
|
err := s.selectByTokenStmt.QueryRowContext(ctx, token, time.Now().UTC()).Scan(&data.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -264,8 +264,8 @@ func (d *Database) RemoveLoginToken(ctx context.Context, token string) error {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetLoginTokenByToken returns the data associated with the given token.
|
// GetLoginTokenDataByToken returns the data associated with the given token.
|
||||||
// May return sql.ErrNoRows.
|
// May return sql.ErrNoRows.
|
||||||
func (d *Database) GetLoginTokenByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
func (d *Database) GetLoginTokenDataByToken(ctx context.Context, token string) (*api.LoginTokenData, error) {
|
||||||
return d.loginTokens.selectByToken(ctx, token)
|
return d.loginTokens.selectByToken(ctx, token)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue