129 lines
3.3 KiB
Go
129 lines
3.3 KiB
Go
package server
|
|
|
|
import (
|
|
proto "git.xeserv.us/xena/route/proto"
|
|
"github.com/Xe/ln"
|
|
"github.com/Xe/uuid"
|
|
"golang.org/x/net/context"
|
|
"golang.org/x/net/trace"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
// Token is the token server implementation for grpc use.
|
|
type Token struct {
|
|
*Server
|
|
}
|
|
|
|
// interface assertions
|
|
var (
|
|
_ proto.TokensServer = &Token{}
|
|
)
|
|
|
|
func (t *Token) Get(ctx context.Context, req *proto.GetTokenRequest) (*proto.Token, error) {
|
|
ctx, clitok, err := t.getAuth(ctx, "get single token", "token:get")
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "not authorized"})
|
|
}
|
|
|
|
tr, _ := trace.FromContext(ctx)
|
|
defer tr.Finish()
|
|
|
|
if req.Id == "" {
|
|
return nil, status.Errorf(codes.InvalidArgument, "must specify ID")
|
|
}
|
|
|
|
dbt, err := t.db.GetTokenID(ctx, req.Id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if dbt.Owner != clitok.Owner {
|
|
return nil, ErrNotAuthorized
|
|
}
|
|
|
|
return dbt.AsProto(), nil
|
|
}
|
|
|
|
func (t *Token) GetAll(ctx context.Context, req *proto.Nil) (*proto.TokenSet, error) {
|
|
ctx, clitok, err := t.getAuth(ctx, "get all tokens", "token:getall")
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "Token.GetAll_getAuth"})
|
|
}
|
|
|
|
tr, _ := trace.FromContext(ctx)
|
|
defer tr.Finish()
|
|
|
|
toks, err := t.db.GetTokensForOwner(ctx, clitok.Owner)
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "Token.GetAll_db.GetTokensForOwner"})
|
|
}
|
|
|
|
result := []*proto.Token{}
|
|
|
|
for _, tok := range toks {
|
|
result = append(result, tok.AsProto())
|
|
}
|
|
|
|
return &proto.TokenSet{
|
|
Tokens: result,
|
|
}, nil
|
|
}
|
|
|
|
func (t *Token) Put(ctx context.Context, tok *proto.Token) (*proto.Token, error) {
|
|
ctx, clitok, err := t.getAuth(ctx, "put new token", "token:put")
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "not authorized"})
|
|
}
|
|
|
|
tr, _ := trace.FromContext(ctx)
|
|
defer tr.Finish()
|
|
|
|
dbt, err := t.db.PutToken(ctx, uuid.New(), clitok.Owner, tok.Scopes)
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "put token into database", "scopes": tok.Scopes})
|
|
}
|
|
|
|
ln.Log(ctx, dbt, ln.Action("new token created"))
|
|
|
|
return dbt.AsProto(), nil
|
|
}
|
|
|
|
func (t *Token) Delete(ctx context.Context, tok *proto.Token) (*proto.Nil, error) {
|
|
ctx, clitok, err := t.getAuth(ctx, "delete single token", "token:delete")
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "not authorized"})
|
|
}
|
|
|
|
tr, _ := trace.FromContext(ctx)
|
|
defer tr.Finish()
|
|
|
|
err = t.db.DeleteToken(ctx, tok.Id)
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "delete token from database", "token_id": tok.Id})
|
|
}
|
|
|
|
ln.Log(ctx, clitok, ln.Action("token deleted"), ln.F{"token_id": tok.Id})
|
|
|
|
return &proto.Nil{}, nil
|
|
}
|
|
|
|
func (t *Token) Deactivate(ctx context.Context, tok *proto.Token) (*proto.Nil, error) {
|
|
ctx, clitok, err := t.getAuth(ctx, "deactivate single token", "token:deactivate")
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "not authorized"})
|
|
}
|
|
|
|
tr, _ := trace.FromContext(ctx)
|
|
defer tr.Finish()
|
|
|
|
err = t.db.DeactivateToken(ctx, tok.Id)
|
|
if err != nil {
|
|
return nil, handleError(ctx, clitok, err, ln.F{"action": "deactivate token in database", "token_id": tok.Id})
|
|
}
|
|
|
|
ln.Log(ctx, clitok, ln.Action("deactivated token"), ln.F{"token_id": tok.Id})
|
|
|
|
return &proto.Nil{}, nil
|
|
}
|