forked from go-pkgz/auth
/
infoMappers.go
122 lines (98 loc) · 2.82 KB
/
infoMappers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
package provider
import (
"context"
"encoding/json"
"io"
"net/http"
"github.com/efureev/sauth/token"
)
type Oauth2Mappers struct {
mappers []Oauth2Mapper
ctx context.Context
client *http.Client
l func(format string, args ...interface{})
}
func newMappers(client *http.Client, l func(format string, args ...interface{})) *Oauth2Mappers {
return &Oauth2Mappers{
mappers: []Oauth2Mapper{},
client: client,
ctx: context.Background(),
l: l,
}
}
func (mm *Oauth2Mappers) adds(maps ...Oauth2Mapper) *Oauth2Mappers {
for _, m := range maps {
mm.add(m)
}
return mm
}
func (mm *Oauth2Mappers) add(mapper Oauth2Mapper) *Oauth2Mappers {
mm.mappers = append(mm.mappers, mapper)
return mm
}
func (mm *Oauth2Mappers) get() error {
for _, m := range mm.mappers {
var err error
if mm.ctx, err = m.get(mm.ctx, mm.client, mm.l); err != nil {
return err
}
}
return nil
}
type Oauth2Mapper struct {
infoURL string
mapFn func(context.Context, *token.UserData, interface{}, []byte) token.User
result interface{}
hasResult bool
}
func (m *Oauth2Mapper) handleRequest(client *http.Client, l func(format string, args ...interface{})) ([]byte, error) {
info, err := client.Get(m.infoURL)
if err != nil {
return nil, CodeError{http.StatusServiceUnavailable, "failed to get client info", err}
}
defer func() {
if e := info.Body.Close(); e != nil {
l("[WARN] failed to close response body, %s", e)
}
}()
data, err := io.ReadAll(info.Body)
if err != nil {
return nil, CodeError{http.StatusInternalServerError, "failed to read user info", err}
}
if e := json.Unmarshal(data, &m.result); e != nil {
return nil, CodeError{http.StatusInternalServerError, "failed to unmarshal user info", err}
}
m.hasResult = true
l("[DEBUG] got raw info from [%s] %+v", m.infoURL, m.result)
return data, nil
}
func (m Oauth2Mapper) get(ctx context.Context, client *http.Client, l func(format string, args ...interface{})) (context.Context, error) {
var responseBytes []byte = nil
if !m.hasResult {
var err error
responseBytes, err = m.handleRequest(client, l)
if err != nil {
return nil, err
}
}
return applyMapperToRawUserData(ctx, m, responseBytes), nil
}
func applyMapperToRawUserData(ctx context.Context, m Oauth2Mapper, responseBytes []byte) context.Context {
ud, err := token.GetUserDataFromCtx(ctx)
ud.SetRaw(m.infoURL, m.result)
if err != nil {
ctx = token.SetUserDataToCtx(ctx, ud)
}
user := m.mapFn(ctx, &ud, m.result, responseBytes)
ud.User = user
ud.CreateEmailCollection().Add(ud.User.Email, true)
return token.SetUserDataToCtx(ctx, ud)
}
func NewOauth2Mapper(url string, fn func(context.Context, *token.UserData, interface{}, []byte) token.User, t interface{}) Oauth2Mapper {
return Oauth2Mapper{
infoURL: url,
mapFn: fn,
result: t,
hasResult: false,
}
}