Documentation
¶
Index ¶
- Constants
- Variables
- func AssembleOAuthProviders(settings []ProviderSetting) map[string]OAuthProviderConfig
- func AssembleSAMLProviders(settings []ProviderSetting) map[string]SAMLProviderConfig
- func ClearTokenCookies(c *gin.Context, opts CookieOptions)
- func ComputeS256Challenge(codeVerifier string) string
- func ExpectUserCreate(mock sqlmock.Sqlmock)
- func ExpectUserDelete(mock sqlmock.Sqlmock, userID string)
- func ExpectUserQuery(mock sqlmock.Sqlmock, email string, user *User)
- func ExpectUserUpdate(mock sqlmock.Sqlmock)
- func ExtractAccessTokenFromCookie(c *gin.Context) string
- func ExtractRefreshTokenFromCookie(c *gin.Context) string
- func GenerateCodeVerifier() (string, error)
- func GetDatabaseManager() *db.Managerdeprecated
- func InitAuth(router *gin.Engine) error
- func IntegrationExample()
- func MockEmptyUserRows(mock sqlmock.Sqlmock) *sqlmock.Rows
- func MockUserRow(mock sqlmock.Sqlmock, user User) *sqlmock.Rows
- func SetTokenCookies(c *gin.Context, tokenPair TokenPair, opts CookieOptions)
- func SetupMockDB(t *testing.T) (*sql.DB, sqlmock.Sqlmock)
- func SetupMockRedis(t *testing.T) (*redis.Client, *miniredis.Miniredis)
- func Shutdown(ctx context.Context) error
- func ValidateCodeChallenge(codeVerifier, codeChallenge, method string) error
- func ValidateCodeChallengeFormat(challenge string) error
- func ValidateCodeVerifierFormat(verifier string) error
- func ValidateOAuthProvider(p OAuthProviderConfig) []string
- func ValidateSAMLProvider(p SAMLProviderConfig) []string
- func ValidateTokenClaims(t *testing.T, claims *Claims, user User)
- type AdminChecker
- type AuthScenario
- type BaseProvider
- func (p *BaseProvider) ExchangeCode(ctx context.Context, code string) (*TokenResponse, error)
- func (p *BaseProvider) GetAuthorizationURL(state string) string
- func (p *BaseProvider) GetOAuth2Config() *oauth2.Config
- func (p *BaseProvider) GetUserInfo(ctx context.Context, accessToken string) (*UserInfo, error)
- func (p *BaseProvider) ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
- type Claims
- type ClaimsEnricher
- type ClientCredential
- type ClientCredentialCreateParams
- type ClientCredentialTestCase
- type Config
- func (c *Config) GetEnabledProviders() []OAuthProviderConfig
- func (c *Config) GetJWTDuration() time.Duration
- func (c *Config) GetProvider(providerID string) (OAuthProviderConfig, bool)
- func (c *Config) ToGormConfig() db.GormConfig
- func (c *Config) ToRedisConfig() db.RedisConfig
- func (c *Config) ValidateConfig() error
- type CookieOptions
- type DatabaseConfig
- type DefaultProviderRegistry
- func (r *DefaultProviderRegistry) GetEnabledOAuthProviders() map[string]OAuthProviderConfig
- func (r *DefaultProviderRegistry) GetEnabledSAMLProviders() map[string]SAMLProviderConfig
- func (r *DefaultProviderRegistry) GetOAuthProvider(id string) (OAuthProviderConfig, bool)
- func (r *DefaultProviderRegistry) GetSAMLProvider(id string) (SAMLProviderConfig, bool)
- func (r *DefaultProviderRegistry) InvalidateCache()
- type DeletionChallenge
- type DeletionResult
- type GenericOIDCProvider
- type GroupDeletionResult
- type Handlers
- func (h *Handlers) Authorize(c *gin.Context)
- func (h *Handlers) Callback(c *gin.Context)
- func (h *Handlers) Config() Config
- func (h *Handlers) Exchange(c *gin.Context)
- func (h *Handlers) GetJWKS(c *gin.Context)
- func (h *Handlers) GetOAuthAuthorizationServerMetadata(c *gin.Context)
- func (h *Handlers) GetOAuthProtectedResourceMetadata(c *gin.Context)
- func (h *Handlers) GetOpenIDConfiguration(c *gin.Context)
- func (h *Handlers) GetProviders(c *gin.Context)
- func (h *Handlers) GetSAMLMetadata(c *gin.Context, providerID string)
- func (h *Handlers) GetSAMLProviders(c *gin.Context)
- func (h *Handlers) InitiateSAMLLogin(c *gin.Context, providerID string, clientCallback *string)
- func (h *Handlers) IntrospectToken(c *gin.Context)
- func (h *Handlers) Logout(c *gin.Context)
- func (h *Handlers) Me(c *gin.Context)
- func (h *Handlers) MeLogout(c *gin.Context)
- func (h *Handlers) ProcessSAMLLogout(c *gin.Context, providerID string, samlRequest string)
- func (h *Handlers) ProcessSAMLResponse(c *gin.Context, providerID string, samlResponse string, relayState string)
- func (h *Handlers) Refresh(c *gin.Context)
- func (h *Handlers) RevokeToken(c *gin.Context)
- func (h *Handlers) Service() *Service
- func (h *Handlers) SetAdminChecker(checker AdminChecker)
- func (h *Handlers) SetCookieOptions(opts CookieOptions)
- func (h *Handlers) SetProviderRegistry(registry ProviderRegistry)
- func (h *Handlers) SetUserGroupsFetcher(fetcher UserGroupsFetcher)
- func (h *Handlers) Token(c *gin.Context)
- type IDTokenClaims
- type InMemoryStateStore
- func (s *InMemoryStateStore) Close()
- func (s *InMemoryStateStore) DeletePKCEChallenge(ctx context.Context, state string) error
- func (s *InMemoryStateStore) DeleteState(ctx context.Context, state string) error
- func (s *InMemoryStateStore) GetCallbackURL(ctx context.Context, state string) (string, error)
- func (s *InMemoryStateStore) GetPKCEChallenge(ctx context.Context, state string) (challenge, method string, err error)
- func (s *InMemoryStateStore) StoreCallbackURL(ctx context.Context, state, callbackURL string, ttl time.Duration) error
- func (s *InMemoryStateStore) StorePKCEChallenge(ctx context.Context, state, codeChallenge, challengeMethod string, ...) error
- func (s *InMemoryStateStore) StoreState(ctx context.Context, state, data string, ttl time.Duration) error
- func (s *InMemoryStateStore) ValidateState(ctx context.Context, state string) (string, error)
- type JWK
- type JWKSResponse
- type JWTConfig
- type JWTKeyManager
- type OAuthAuthorizationServerMetadata
- type OAuthConfig
- type OAuthProtectedResourceMetadata
- type OAuthProviderConfig
- type OpenIDConfiguration
- type Provider
- type ProviderInfo
- type ProviderRegistry
- type ProviderSetting
- type ProviderSettingsReader
- type RedisConfig
- type SAMLConfig
- type SAMLManager
- func (m *SAMLManager) EnsureProvider(id string, config SAMLProviderConfig) error
- func (m *SAMLManager) GetProvider(id string) (*saml.SAMLProvider, error)
- func (m *SAMLManager) InitializeProviders(config SAMLConfig, stateStore StateStore) error
- func (m *SAMLManager) IsProviderInitialized(id string) bool
- func (m *SAMLManager) ListProviders() []string
- func (m *SAMLManager) ProcessSAMLResponse(ctx context.Context, providerID string, samlResponse string, relayState string) (*User, *TokenPair, error)
- type SAMLProviderConfig
- type SAMLProviderInfo
- type Service
- func (s *Service) BlacklistToken(ctx context.Context, tokenString string) error
- func (s *Service) CacheUser(ctx context.Context, user User) error
- func (s *Service) CacheUserGroups(ctx context.Context, email, idp string, groups []string) error
- func (s *Service) ClearUserGroups(ctx context.Context, email string) error
- func (s *Service) CreateClientCredential(ctx context.Context, params ClientCredentialCreateParams) (*ClientCredential, error)
- func (s *Service) CreateUser(ctx context.Context, user User) (User, error)
- func (s *Service) DeactivateClientCredential(ctx context.Context, id uuid.UUID, ownerUUID uuid.UUID) error
- func (s *Service) DeleteClientCredential(ctx context.Context, id uuid.UUID, ownerUUID uuid.UUID) error
- func (s *Service) DeleteGroupAndData(ctx context.Context, internalUUID string) (*GroupDeletionResult, error)
- func (s *Service) DeleteUser(ctx context.Context, id string) error
- func (s *Service) DeleteUserAndData(ctx context.Context, userEmail string) (*DeletionResult, error)
- func (s *Service) DeleteUserByInternalUUID(ctx context.Context, internalUUID string) (*DeletionResult, error)
- func (s *Service) GenerateDeletionChallenge(ctx context.Context, userEmail string) (*DeletionChallenge, error)
- func (s *Service) GenerateTokens(ctx context.Context, user User) (TokenPair, error)
- func (s *Service) GenerateTokensWithUserInfo(ctx context.Context, user User, userInfo *UserInfo) (TokenPair, error)
- func (s *Service) GetCachedGroups(ctx context.Context, email string) (string, []string, error)
- func (s *Service) GetCachedUserByEmail(ctx context.Context, email string) (*User, error)
- func (s *Service) GetCachedUserByID(ctx context.Context, userID string) (*User, error)
- func (s *Service) GetCachedUserByProvider(ctx context.Context, provider, providerUserID string) (*User, error)
- func (s *Service) GetClientCredentialByClientID(ctx context.Context, clientID string) (*ClientCredential, error)
- func (s *Service) GetKeyManager() *JWTKeyManager
- func (s *Service) GetPrimaryProviderID(ctx context.Context, userID string) (string, error)
- func (s *Service) GetSAMLManager() *SAMLManager
- func (s *Service) GetUserByAnyProviderID(ctx context.Context, providerUserID string) (User, error)
- func (s *Service) GetUserByEmail(ctx context.Context, email string) (User, error)
- func (s *Service) GetUserByID(ctx context.Context, id string) (User, error)
- func (s *Service) GetUserByProviderAndEmail(ctx context.Context, provider, email string) (User, error)
- func (s *Service) GetUserByProviderID(ctx context.Context, provider, providerUserID string) (User, error)
- func (s *Service) GetUserProviders(ctx context.Context, userID string) ([]UserProvider, error)
- func (s *Service) HandleClientCredentialsGrant(ctx context.Context, clientID, clientSecret string) (*TokenPair, error)
- func (s *Service) InvalidateUserCache(ctx context.Context, user User) error
- func (s *Service) InvalidateUserSessions(ctx context.Context, userID string) error
- func (s *Service) ListClientCredentialsByOwner(ctx context.Context, ownerUUID uuid.UUID) ([]*ClientCredential, error)
- func (s *Service) RefreshToken(ctx context.Context, refreshToken string) (TokenPair, error)
- func (s *Service) RevokeToken(ctx context.Context, refreshToken string) error
- func (s *Service) SetClaimsEnricher(enricher ClaimsEnricher)
- func (s *Service) SetProviderRegistry(registry ProviderRegistry)
- func (s *Service) TransferOwnership(ctx context.Context, sourceUserUUID, targetUserUUID string) (*TransferResult, error)
- func (s *Service) UpdateClientCredentialLastUsed(ctx context.Context, id uuid.UUID) error
- func (s *Service) UpdateUser(ctx context.Context, user User) error
- func (s *Service) ValidateDeletionChallenge(ctx context.Context, userEmail, challengeText string) error
- func (s *Service) ValidateToken(tokenString string) (*Claims, error)
- type StateStore
- type TestHelper
- type TestProvider
- func (p *TestProvider) ExchangeCode(ctx context.Context, code string) (*TokenResponse, error)
- func (p *TestProvider) GetAuthorizationURL(state string) string
- func (p *TestProvider) GetUserInfo(ctx context.Context, accessToken string) (*UserInfo, error)
- func (p *TestProvider) ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
- type TokenBlacklist
- type TokenIntrospectionResponse
- type TokenPair
- type TokenResponse
- type TokenTestCase
- type TransferResult
- type User
- type UserGroupInfo
- type UserGroupsFetcher
- type UserInfo
- type UserInfoEndpoint
- type UserProvider
Constants ¶
const ( // AccessTokenCookieName is the cookie name for the JWT access token AccessTokenCookieName = "tmi_access_token" // RefreshTokenCookieName is the cookie name for the refresh token RefreshTokenCookieName = "tmi_refresh_token" //nolint:gosec // G101 - cookie name constant, not a credential // MaxCookieSize is the practical browser cookie size limit MaxCookieSize = 4093 )
const ( // MinVerifierLength is the minimum length for a code verifier (43 characters) MinVerifierLength = 43 // MaxVerifierLength is the maximum length for a code verifier (128 characters) MaxVerifierLength = 128 // VerifierByteLength is the number of random bytes to generate (32 bytes = 43 base64url chars) VerifierByteLength = 32 )
PKCE constants per RFC 7636
const DefaultProviderCacheTTL = 60 * time.Second
DefaultProviderCacheTTL is the default TTL for the database provider cache.
const ( // UserCacheTTL defines how long user data is cached UserCacheTTL = 15 * time.Minute )
const (
// UserContextKey is the key for the user in the Gin context
UserContextKey contextKey = "user"
)
Variables ¶
var DefaultClaimMappings = map[string]string{
"subject_claim": "sub",
"email_claim": "email",
"name_claim": "name",
"given_name_claim": "given_name",
"family_name_claim": "family_name",
"picture_claim": "picture",
"email_verified_claim": "email_verified",
"groups_claim": "groups",
}
DefaultClaimMappings provides standard claim names for common OAuth providers
var TestUsers = struct { Admin User Regular User External User }{ Admin: User{ InternalUUID: "admin-internal-uuid", Provider: "tmi", ProviderUserID: "admin@example.com", Email: "admin@example.com", Name: "Admin User", EmailVerified: true, Groups: []string{"admins"}, IsAdmin: true, CreatedAt: time.Now(), ModifiedAt: time.Now(), }, Regular: User{ InternalUUID: "regular-internal-uuid", Provider: "tmi", ProviderUserID: "user@example.com", Email: "user@example.com", Name: "Regular User", EmailVerified: true, Groups: []string{}, IsAdmin: false, CreatedAt: time.Now(), ModifiedAt: time.Now(), }, External: User{ InternalUUID: "external-internal-uuid", Provider: "google", ProviderUserID: "external@gmail.com", Email: "external@gmail.com", Name: "External User", EmailVerified: true, Groups: []string{}, IsAdmin: false, CreatedAt: time.Now(), ModifiedAt: time.Now(), }, }
TestUsers provides standard test user identities for auth testing
Functions ¶
func AssembleOAuthProviders ¶
func AssembleOAuthProviders(settings []ProviderSetting) map[string]OAuthProviderConfig
AssembleOAuthProviders groups settings by provider ID and assembles OAuthProviderConfig structs. Exported so the api package can use it for enable-validation.
func AssembleSAMLProviders ¶
func AssembleSAMLProviders(settings []ProviderSetting) map[string]SAMLProviderConfig
AssembleSAMLProviders groups settings by provider ID and assembles SAMLProviderConfig structs. Exported so the api package can use it for enable-validation.
func ClearTokenCookies ¶
func ClearTokenCookies(c *gin.Context, opts CookieOptions)
ClearTokenCookies clears both token cookies by setting MaxAge=-1. Cookie attributes (Path, Domain, HttpOnly, Secure, SameSite) must match the values used when setting for browsers to clear correctly.
func ComputeS256Challenge ¶
ComputeS256Challenge computes the S256 code challenge from a code verifier Returns base64url(SHA256(codeVerifier))
func ExpectUserCreate ¶
ExpectUserCreate sets up mock expectation for user creation
func ExpectUserDelete ¶
ExpectUserDelete sets up mock expectation for user deletion
func ExpectUserQuery ¶
ExpectUserQuery sets up mock expectation for a user query by email
func ExpectUserUpdate ¶
ExpectUserUpdate sets up mock expectation for user update
func ExtractAccessTokenFromCookie ¶
ExtractAccessTokenFromCookie returns the access token from the request cookie, or empty string if not present.
func ExtractRefreshTokenFromCookie ¶
ExtractRefreshTokenFromCookie returns the refresh token from the request cookie, or empty string if not present.
func GenerateCodeVerifier ¶
GenerateCodeVerifier generates a cryptographically secure random code verifier Returns a 43-character base64url-encoded string (32 random bytes)
func GetDatabaseManager
deprecated
func IntegrationExample ¶
func IntegrationExample()
IntegrationExample shows how to integrate the authentication system with the main application
func MockEmptyUserRows ¶
MockEmptyUserRows returns empty rows for user queries
func MockUserRow ¶
MockUserRow returns mock SQL rows for a user query
func SetTokenCookies ¶
func SetTokenCookies(c *gin.Context, tokenPair TokenPair, opts CookieOptions)
SetTokenCookies sets HttpOnly cookies for access and refresh tokens on the response. Both cookies are HttpOnly to prevent JavaScript access (XSS protection). The access token cookie uses SameSite=Lax (safe for REST APIs that don't mutate on GET). The refresh token cookie uses SameSite=Strict with Path=/oauth2 for maximum protection.
func SetupMockDB ¶
SetupMockDB creates a mock SQL database for testing
func SetupMockRedis ¶
SetupMockRedis creates a mock Redis client using miniredis
func ValidateCodeChallenge ¶
ValidateCodeChallenge validates that a code verifier matches the code challenge Uses constant-time comparison to prevent timing attacks
func ValidateCodeChallengeFormat ¶
ValidateCodeChallengeFormat validates the format of a code challenge
func ValidateCodeVerifierFormat ¶
ValidateCodeVerifierFormat validates the format of a code verifier
func ValidateOAuthProvider ¶
func ValidateOAuthProvider(p OAuthProviderConfig) []string
ValidateOAuthProvider checks that required fields are present for an enabled OAuth provider. Returns a list of missing field names, or nil if valid.
func ValidateSAMLProvider ¶
func ValidateSAMLProvider(p SAMLProviderConfig) []string
ValidateSAMLProvider checks that required fields are present for an enabled SAML provider. Returns a list of missing field names, or nil if valid.
Types ¶
type AdminChecker ¶
type AdminChecker interface {
IsAdmin(ctx context.Context, userInternalUUID *string, provider string, groupUUIDs []string) (bool, error)
IsSecurityReviewer(ctx context.Context, userInternalUUID *string, provider string, groupUUIDs []string) (bool, error)
GetGroupUUIDsByNames(ctx context.Context, provider string, groupNames []string) ([]string, error)
}
AdminChecker is an interface for checking if a user is an administrator or security reviewer
type AuthScenario ¶
type AuthScenario struct {
Name string
User User
RequiredRole string
ExpectedAccess bool
SetupContext func(context.Context) context.Context
}
AuthScenario represents an authorization test scenario
type BaseProvider ¶
type BaseProvider struct {
// contains filtered or unexported fields
}
BaseProvider provides common functionality for all providers
func NewBaseProvider ¶
func NewBaseProvider(config OAuthProviderConfig, callbackURL string) (*BaseProvider, error)
NewBaseProvider creates a new base OAuth provider
func (*BaseProvider) ExchangeCode ¶
func (p *BaseProvider) ExchangeCode(ctx context.Context, code string) (*TokenResponse, error)
ExchangeCode exchanges an authorization code for tokens
func (*BaseProvider) GetAuthorizationURL ¶
func (p *BaseProvider) GetAuthorizationURL(state string) string
GetAuthorizationURL returns the authorization URL with the given state
func (*BaseProvider) GetOAuth2Config ¶
func (p *BaseProvider) GetOAuth2Config() *oauth2.Config
GetOAuth2Config returns the OAuth2 configuration
func (*BaseProvider) GetUserInfo ¶
GetUserInfo gets user information from the provider
func (*BaseProvider) ValidateIDToken ¶
func (p *BaseProvider) ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
ValidateIDToken validates an ID token
type Claims ¶
type Claims struct {
Email string `json:"email"`
EmailVerified bool `json:"email_verified,omitempty"`
Name string `json:"name"`
IdentityProvider string `json:"idp,omitempty"` // Identity provider
Groups []string `json:"groups,omitempty"` // User's groups from IdP
IsAdministrator *bool `json:"tmi_is_administrator,omitempty"` // TMI Administrators group membership
IsSecurityReviewer *bool `json:"tmi_is_security_reviewer,omitempty"` // TMI Security Reviewers group membership
jwt.RegisteredClaims
}
Claims represents the JWT claims
type ClaimsEnricher ¶
type ClaimsEnricher interface {
// EnrichClaims checks built-in group membership for a user.
// Returns whether the user is an administrator and/or security reviewer.
EnrichClaims(ctx context.Context, userInternalUUID string, provider string, groupNames []string) (isAdmin bool, isSecurityReviewer bool, err error)
}
ClaimsEnricher enriches JWT claims with application-specific data (e.g., group membership) that cannot be directly accessed from the auth package without creating circular dependencies.
type ClientCredential ¶
type ClientCredential struct {
ID uuid.UUID
OwnerUUID uuid.UUID
ClientID string
ClientSecretHash string
Name string
Description string
IsActive bool
LastUsedAt *time.Time
CreatedAt time.Time
ModifiedAt time.Time
ExpiresAt *time.Time
}
ClientCredential represents an OAuth 2.0 client credential for machine-to-machine authentication
func CreateTestClientCredential ¶
func CreateTestClientCredential(ownerUUID uuid.UUID, name string) *ClientCredential
CreateTestClientCredential creates a test client credential
type ClientCredentialCreateParams ¶
type ClientCredentialCreateParams struct {
OwnerUUID uuid.UUID
ClientID string
ClientSecretHash string
Name string
Description string
ExpiresAt *time.Time
}
ClientCredentialCreateParams contains parameters for creating a new client credential
type ClientCredentialTestCase ¶
type ClientCredentialTestCase struct {
Name string
ClientID string
ClientSecret string //nolint:gosec // G117 - test helper struct for client credentials
ExpectSuccess bool
ExpectedError string
SetupMock func(sqlmock.Sqlmock)
VerifyResult func(*testing.T, *TokenPair)
}
ClientCredentialTestCase represents a test case for client credential operations
type Config ¶
type Config struct {
Database DatabaseConfig // Database config with URL-based connection string
Redis RedisConfig
JWT JWTConfig
OAuth OAuthConfig
SAML SAMLConfig
BuildMode string // dev, test, or production
}
Config holds all authentication configuration
func ConfigFromUnified ¶
ConfigFromUnified converts unified config to auth-specific config
func LoadConfig ¶
LoadConfig loads configuration from environment variables. This uses DATABASE_URL as the primary database configuration method.
func (*Config) GetEnabledProviders ¶
func (c *Config) GetEnabledProviders() []OAuthProviderConfig
GetEnabledProviders returns a slice of enabled OAuth providers
func (*Config) GetJWTDuration ¶
GetJWTDuration returns the JWT expiration duration
func (*Config) GetProvider ¶
func (c *Config) GetProvider(providerID string) (OAuthProviderConfig, bool)
GetProvider returns a specific OAuth provider configuration
func (*Config) ToGormConfig ¶
func (c *Config) ToGormConfig() db.GormConfig
ToGormConfig converts Config to db.GormConfig for GORM database connections. It parses the DATABASE_URL to extract connection parameters.
func (*Config) ToRedisConfig ¶
func (c *Config) ToRedisConfig() db.RedisConfig
ToRedisConfig converts Config to db.RedisConfig
func (*Config) ValidateConfig ¶
ValidateConfig validates the configuration
type CookieOptions ¶
type CookieOptions struct {
Domain string // Cookie domain (hostname)
Secure bool // Require HTTPS
Enabled bool // Whether cookie-based auth is enabled
ExpiresIn int // Access token cookie MaxAge in seconds
RefreshTTL int // Refresh token cookie MaxAge in seconds
}
CookieOptions holds configuration for session cookie operations
type DatabaseConfig ¶
type DatabaseConfig struct {
URL string // DATABASE_URL - contains all connection parameters
OracleWalletLocation string // path to Oracle wallet for ADB (cannot be in URL)
// Connection pool configuration
MaxOpenConns int // Maximum open connections (default: 10)
MaxIdleConns int // Maximum idle connections (default: 2)
ConnMaxLifetime int // Max connection lifetime in seconds (default: 240)
ConnMaxIdleTime int // Max idle time in seconds (default: 30)
}
DatabaseConfig holds unified database configuration. Database type is determined from the URL scheme (postgres://, mysql://, etc.)
type DefaultProviderRegistry ¶
type DefaultProviderRegistry struct {
// contains filtered or unexported fields
}
DefaultProviderRegistry merges immutable config/env providers with mutable database-sourced providers assembled from system_settings rows.
func NewDefaultProviderRegistry ¶
func NewDefaultProviderRegistry( configOAuth map[string]OAuthProviderConfig, configSAML map[string]SAMLProviderConfig, settings ProviderSettingsReader, ) *DefaultProviderRegistry
NewDefaultProviderRegistry creates a new DefaultProviderRegistry with the given config/env providers and a settings reader for database-sourced providers.
func (*DefaultProviderRegistry) GetEnabledOAuthProviders ¶
func (r *DefaultProviderRegistry) GetEnabledOAuthProviders() map[string]OAuthProviderConfig
GetEnabledOAuthProviders returns all enabled OAuth providers from all sources. Config/env providers shadow database-sourced providers with the same ID.
func (*DefaultProviderRegistry) GetEnabledSAMLProviders ¶
func (r *DefaultProviderRegistry) GetEnabledSAMLProviders() map[string]SAMLProviderConfig
GetEnabledSAMLProviders returns all enabled SAML providers from all sources. Config/env providers shadow database-sourced providers with the same ID.
func (*DefaultProviderRegistry) GetOAuthProvider ¶
func (r *DefaultProviderRegistry) GetOAuthProvider(id string) (OAuthProviderConfig, bool)
GetOAuthProvider returns the OAuth provider configuration for the given ID. Config/env providers take precedence over database-sourced providers.
func (*DefaultProviderRegistry) GetSAMLProvider ¶
func (r *DefaultProviderRegistry) GetSAMLProvider(id string) (SAMLProviderConfig, bool)
GetSAMLProvider returns the SAML provider configuration for the given ID. Config/env providers take precedence over database-sourced providers.
func (*DefaultProviderRegistry) InvalidateCache ¶
func (r *DefaultProviderRegistry) InvalidateCache()
InvalidateCache marks the database provider cache as dirty so it will be refreshed on the next access.
type DeletionChallenge ¶
type DeletionChallenge struct {
ChallengeText string `json:"challenge_text"`
ExpiresAt time.Time `json:"expires_at"`
}
DeletionChallenge contains challenge information for user deletion
type DeletionResult ¶
type DeletionResult struct {
ThreatModelsTransferred int `json:"threat_models_transferred"`
ThreatModelsDeleted int `json:"threat_models_deleted"`
UserEmail string `json:"user_email"`
}
DeletionResult contains statistics about the user deletion operation
type GenericOIDCProvider ¶
type GenericOIDCProvider struct {
BaseProvider
// contains filtered or unexported fields
}
GenericOIDCProvider is a generic OIDC provider
func NewGenericOIDCProvider ¶
func NewGenericOIDCProvider(config OAuthProviderConfig, callbackURL string) (*GenericOIDCProvider, error)
NewGenericOIDCProvider creates a new generic OIDC provider
func (*GenericOIDCProvider) ValidateIDToken ¶
func (p *GenericOIDCProvider) ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
ValidateIDToken validates an ID token
type GroupDeletionResult ¶
type GroupDeletionResult struct {
ThreatModelsDeleted int `json:"threat_models_deleted"`
ThreatModelsRetained int `json:"threat_models_retained"`
GroupName string `json:"group_name"`
}
GroupDeletionResult contains statistics about the group deletion operation
type Handlers ¶
type Handlers struct {
// contains filtered or unexported fields
}
Handlers provides HTTP handlers for authentication
func InitAuthWithConfig
deprecated
InitAuthWithConfig initializes the auth system with unified configuration.
Deprecated: Use InitAuthWithDB for explicit dependency injection. This function creates its own database manager internally, which can lead to duplicate initialization and DRY violations. Prefer passing a pre-initialized db.Manager to InitAuthWithDB instead.
func InitAuthWithDB ¶
InitAuthWithDB initializes the auth system with an existing database manager. This is the preferred initialization method for explicit dependency injection. The caller is responsible for initializing the database connections before calling this function.
func NewHandlers ¶
NewHandlers creates new authentication handlers
func (*Handlers) Exchange ¶
Exchange exchanges an authorization code for tokens (legacy endpoint, delegates to handleAuthorizationCodeGrant)
func (*Handlers) GetOAuthAuthorizationServerMetadata ¶
GetOAuthAuthorizationServerMetadata returns OAuth 2.0 Authorization Server metadata
func (*Handlers) GetOAuthProtectedResourceMetadata ¶
GetOAuthProtectedResourceMetadata returns OAuth 2.0 protected resource metadata as per RFC 9728
func (*Handlers) GetOpenIDConfiguration ¶
GetOpenIDConfiguration returns OpenID Connect Discovery metadata
func (*Handlers) GetProviders ¶
GetProviders returns the available OAuth providers
func (*Handlers) GetSAMLMetadata ¶
GetSAMLMetadata returns SAML service provider metadata
func (*Handlers) GetSAMLProviders ¶
GetSAMLProviders returns the available SAML providers
func (*Handlers) InitiateSAMLLogin ¶
InitiateSAMLLogin starts SAML authentication flow
func (*Handlers) IntrospectToken ¶
IntrospectToken handles token introspection requests per RFC 7662
func (*Handlers) Logout ¶
Logout is deprecated - use RevokeToken for RFC 7009 compliance or MeLogout for self-logout Kept for backward compatibility, delegates to MeLogout
func (*Handlers) MeLogout ¶
MeLogout revokes the caller's own JWT token This is a convenience endpoint that doesn't require passing the token in the body
func (*Handlers) ProcessSAMLLogout ¶
ProcessSAMLLogout handles SAML single logout
func (*Handlers) ProcessSAMLResponse ¶
func (h *Handlers) ProcessSAMLResponse(c *gin.Context, providerID string, samlResponse string, relayState string)
ProcessSAMLResponse handles SAML assertion consumer service
func (*Handlers) RevokeToken ¶
RevokeToken revokes a token per RFC 7009 OAuth 2.0 Token Revocation The token to revoke is passed in the request body, not the Authorization header. Authentication: Bearer token OR client credentials (client_id/client_secret)
func (*Handlers) SetAdminChecker ¶
func (h *Handlers) SetAdminChecker(checker AdminChecker)
SetAdminChecker sets the admin checker for the handlers
func (*Handlers) SetCookieOptions ¶
func (h *Handlers) SetCookieOptions(opts CookieOptions)
SetCookieOptions sets the cookie configuration for session cookie management
func (*Handlers) SetProviderRegistry ¶
func (h *Handlers) SetProviderRegistry(registry ProviderRegistry)
SetProviderRegistry sets the provider registry for unified provider lookup.
func (*Handlers) SetUserGroupsFetcher ¶
func (h *Handlers) SetUserGroupsFetcher(fetcher UserGroupsFetcher)
SetUserGroupsFetcher sets the user groups fetcher for the handlers
type IDTokenClaims ¶
type IDTokenClaims struct {
Subject string `json:"sub"`
Email string `json:"email,omitempty"`
EmailVerified bool `json:"email_verified,omitempty"`
Name string `json:"name,omitempty"`
GivenName string `json:"given_name,omitempty"`
FamilyName string `json:"family_name,omitempty"`
Picture string `json:"picture,omitempty"`
Locale string `json:"locale,omitempty"`
Issuer string `json:"iss"`
Audience string `json:"aud"`
ExpiresAt int64 `json:"exp"`
IssuedAt int64 `json:"iat"`
}
IDTokenClaims contains the claims from an ID token
type InMemoryStateStore ¶
type InMemoryStateStore struct {
// contains filtered or unexported fields
}
InMemoryStateStore implements StateStore using in-memory storage
func NewInMemoryStateStore ¶
func NewInMemoryStateStore() *InMemoryStateStore
NewInMemoryStateStore creates a new in-memory state store
func (*InMemoryStateStore) Close ¶
func (s *InMemoryStateStore) Close()
Close stops the cleanup goroutine
func (*InMemoryStateStore) DeletePKCEChallenge ¶
func (s *InMemoryStateStore) DeletePKCEChallenge(ctx context.Context, state string) error
DeletePKCEChallenge removes PKCE challenge from store
func (*InMemoryStateStore) DeleteState ¶
func (s *InMemoryStateStore) DeleteState(ctx context.Context, state string) error
DeleteState removes a state from the store
func (*InMemoryStateStore) GetCallbackURL ¶
GetCallbackURL retrieves the callback URL for a state
func (*InMemoryStateStore) GetPKCEChallenge ¶
func (s *InMemoryStateStore) GetPKCEChallenge(ctx context.Context, state string) (challenge, method string, err error)
GetPKCEChallenge retrieves PKCE code challenge and method for a state
func (*InMemoryStateStore) StoreCallbackURL ¶
func (s *InMemoryStateStore) StoreCallbackURL(ctx context.Context, state, callbackURL string, ttl time.Duration) error
StoreCallbackURL stores a callback URL with a state
func (*InMemoryStateStore) StorePKCEChallenge ¶
func (s *InMemoryStateStore) StorePKCEChallenge(ctx context.Context, state, codeChallenge, challengeMethod string, ttl time.Duration) error
StorePKCEChallenge stores PKCE code challenge with associated method
func (*InMemoryStateStore) StoreState ¶
func (s *InMemoryStateStore) StoreState(ctx context.Context, state, data string, ttl time.Duration) error
StoreState stores state with associated data
func (*InMemoryStateStore) ValidateState ¶
ValidateState validates state and returns associated data
type JWK ¶
type JWK struct {
KeyType string `json:"kty"`
Use string `json:"use,omitempty"`
KeyOps []string `json:"key_ops,omitempty"`
KeyID string `json:"kid,omitempty"`
Algorithm string `json:"alg,omitempty"`
// RSA parameters
N string `json:"n,omitempty"` // RSA modulus
E string `json:"e,omitempty"` // RSA exponent
// ECDSA parameters
Curve string `json:"crv,omitempty"` // Elliptic curve
X string `json:"x,omitempty"` // X coordinate
Y string `json:"y,omitempty"` // Y coordinate
}
JWK represents a JSON Web Key
type JWKSResponse ¶
type JWKSResponse struct {
Keys []JWK `json:"keys"`
}
JWKSResponse represents a JSON Web Key Set response
type JWTConfig ¶
type JWTConfig struct {
Secret string //nolint:gosec // G117 - JWT signing secret for HS256
ExpirationSeconds int
SigningMethod string // HS256, RS256, ES256
KeyID string // Key ID for JWKS (defaults to "1")
RefreshTokenDays int // Refresh token TTL in days (default: 7)
SessionLifetimeDays int // Absolute session lifetime in days (default: 7)
// RSA Keys (for RS256)
RSAPrivateKeyPath string // Path to RSA private key file
RSAPublicKeyPath string // Path to RSA public key file
RSAPrivateKey string // RSA private key as string (alternative to file path)
RSAPublicKey string // RSA public key as string (alternative to file path)
// ECDSA Keys (for ES256)
ECDSAPrivateKeyPath string // Path to ECDSA private key file
ECDSAPublicKeyPath string // Path to ECDSA public key file
ECDSAPrivateKey string // ECDSA private key as string (alternative to file path)
ECDSAPublicKey string // ECDSA public key as string (alternative to file path)
}
JWTConfig holds JWT configuration
type JWTKeyManager ¶
type JWTKeyManager struct {
// contains filtered or unexported fields
}
JWTKeyManager manages JWT signing and verification keys
func NewJWTKeyManager ¶
func NewJWTKeyManager(config JWTConfig) (*JWTKeyManager, error)
NewJWTKeyManager creates a new JWT key manager
func SetupTestKeyManager ¶
func SetupTestKeyManager(t *testing.T) *JWTKeyManager
SetupTestKeyManager creates a key manager for testing
func (*JWTKeyManager) CreateToken ¶
func (m *JWTKeyManager) CreateToken(claims jwt.Claims) (string, error)
CreateToken creates a new JWT token with the configured signing method
func (*JWTKeyManager) GetPublicKey ¶
func (m *JWTKeyManager) GetPublicKey() any
GetPublicKey returns the public key for JWKS endpoint (for asymmetric methods)
func (*JWTKeyManager) GetSigningMethod ¶
func (m *JWTKeyManager) GetSigningMethod() string
GetSigningMethod returns the current signing method
func (*JWTKeyManager) VerifyToken ¶
VerifyToken verifies a JWT token using the configured verification key
type OAuthAuthorizationServerMetadata ¶
type OAuthAuthorizationServerMetadata struct {
Issuer string `json:"issuer"`
AuthorizationEndpoint string `json:"authorization_endpoint"`
TokenEndpoint string `json:"token_endpoint"`
JWKSURI string `json:"jwks_uri,omitempty"`
ScopesSupported []string `json:"scopes_supported,omitempty"`
ResponseTypesSupported []string `json:"response_types_supported"`
ResponseModesSupported []string `json:"response_modes_supported,omitempty"`
GrantTypesSupported []string `json:"grant_types_supported,omitempty"`
TokenEndpointAuthMethodsSupported []string `json:"token_endpoint_auth_methods_supported,omitempty"`
CodeChallengeMethodsSupported []string `json:"code_challenge_methods_supported,omitempty"`
IntrospectionEndpoint string `json:"introspection_endpoint,omitempty"`
RevocationEndpoint string `json:"revocation_endpoint,omitempty"`
}
OAuthAuthorizationServerMetadata represents OAuth 2.0 Authorization Server Metadata
type OAuthConfig ¶
type OAuthConfig struct {
CallbackURL string
Providers map[string]OAuthProviderConfig
}
OAuthConfig holds OAuth configuration
type OAuthProtectedResourceMetadata ¶
type OAuthProtectedResourceMetadata struct {
Resource string `json:"resource"`
ScopesSupported []string `json:"scopes_supported,omitempty"`
AuthorizationServers []string `json:"authorization_servers,omitempty"`
JWKSURI string `json:"jwks_uri,omitempty"`
BearerMethodsSupported []string `json:"bearer_methods_supported,omitempty"`
ResourceName string `json:"resource_name,omitempty"`
ResourceDocumentation string `json:"resource_documentation,omitempty"`
TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens"`
}
OAuthProtectedResourceMetadata represents OAuth 2.0 protected resource metadata as defined in RFC 9728
type OAuthProviderConfig ¶
type OAuthProviderConfig struct {
ID string `json:"id"`
Name string `json:"name"`
Enabled bool `json:"enabled"`
Icon string `json:"icon"`
ClientID string `json:"client_id"`
ClientSecret string `json:"client_secret"` //nolint:gosec // G117 - OAuth provider client secret
AuthorizationURL string `json:"authorization_url"`
TokenURL string `json:"token_url"`
UserInfo []UserInfoEndpoint `json:"userinfo"`
Issuer string `json:"issuer"`
JWKSURL string `json:"jwks_url"`
Scopes []string `json:"scopes"`
AdditionalParams map[string]string `json:"additional_params"`
AuthHeaderFormat string `json:"auth_header_format,omitempty"` // Default: "Bearer %s"
AcceptHeader string `json:"accept_header,omitempty"` // Default: "application/json"
}
OAuthProviderConfig holds configuration for an OAuth provider
type OpenIDConfiguration ¶
type OpenIDConfiguration struct {
Issuer string `json:"issuer"`
AuthorizationEndpoint string `json:"authorization_endpoint"`
TokenEndpoint string `json:"token_endpoint"`
UserInfoEndpoint string `json:"userinfo_endpoint"`
JWKSURI string `json:"jwks_uri"`
ScopesSupported []string `json:"scopes_supported"`
ResponseTypesSupported []string `json:"response_types_supported"`
ResponseModesSupported []string `json:"response_modes_supported,omitempty"`
GrantTypesSupported []string `json:"grant_types_supported,omitempty"`
SubjectTypesSupported []string `json:"subject_types_supported"`
IDTokenSigningAlgValuesSupported []string `json:"id_token_signing_alg_values_supported"`
TokenEndpointAuthMethodsSupported []string `json:"token_endpoint_auth_methods_supported,omitempty"`
ClaimsSupported []string `json:"claims_supported,omitempty"`
CodeChallengeMethodsSupported []string `json:"code_challenge_methods_supported,omitempty"`
IntrospectionEndpoint string `json:"introspection_endpoint,omitempty"`
RevocationEndpoint string `json:"revocation_endpoint,omitempty"`
}
OpenIDConfiguration represents the OpenID Connect Discovery metadata
type Provider ¶
type Provider interface {
// GetOAuth2Config returns the OAuth2 configuration
GetOAuth2Config() *oauth2.Config
// GetAuthorizationURL returns the authorization URL with the given state
GetAuthorizationURL(state string) string
// ExchangeCode exchanges an authorization code for tokens
ExchangeCode(ctx context.Context, code string) (*TokenResponse, error)
// GetUserInfo gets user information from the provider
GetUserInfo(ctx context.Context, accessToken string) (*UserInfo, error)
// ValidateIDToken validates an ID token
ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
}
Provider is the interface for OAuth providers
func NewProvider ¶
func NewProvider(config OAuthProviderConfig, callbackURL string) (Provider, error)
NewProvider creates a new OAuth provider based on the provider ID
type ProviderInfo ¶
type ProviderInfo struct {
ID string `json:"id"`
Name string `json:"name"`
Icon string `json:"icon"`
AuthURL string `json:"auth_url"`
TokenURL string `json:"token_url"`
RedirectURI string `json:"redirect_uri"`
ClientID string `json:"client_id"`
}
ProviderInfo contains information about an OAuth provider
type ProviderRegistry ¶
type ProviderRegistry interface {
GetOAuthProvider(id string) (OAuthProviderConfig, bool)
GetEnabledOAuthProviders() map[string]OAuthProviderConfig
GetSAMLProvider(id string) (SAMLProviderConfig, bool)
GetEnabledSAMLProviders() map[string]SAMLProviderConfig
InvalidateCache()
}
ProviderRegistry provides unified access to OAuth and SAML provider configurations from all sources (config, environment, database).
type ProviderSetting ¶
ProviderSetting is a minimal representation of a setting key/value pair.
type ProviderSettingsReader ¶
type ProviderSettingsReader interface {
ListByPrefix(ctx context.Context, prefix string) ([]ProviderSetting, error)
}
ProviderSettingsReader is a minimal interface defined in the auth package to avoid a circular dependency on the api package. The api.SettingsService satisfies this interface via the ProviderSettingsReaderAdapter.
type RedisConfig ¶
type RedisConfig struct {
Host string
Port string
Password string //nolint:gosec // G117 - Redis connection password
DB int
}
RedisConfig holds Redis configuration
type SAMLConfig ¶
type SAMLConfig struct {
Enabled bool `json:"enabled"`
Providers map[string]SAMLProviderConfig `json:"providers"`
}
SAMLConfig holds SAML configuration
type SAMLManager ¶
type SAMLManager struct {
// contains filtered or unexported fields
}
SAMLManager manages SAML providers
func NewSAMLManager ¶
func NewSAMLManager(service *Service) *SAMLManager
NewSAMLManager creates a new SAML manager
func (*SAMLManager) EnsureProvider ¶
func (m *SAMLManager) EnsureProvider(id string, config SAMLProviderConfig) error
EnsureProvider lazily initializes a SAML provider if not already initialized. Idempotent: if the provider is already initialized, returns immediately. Thread-safe: uses the manager's mutex to prevent concurrent initialization.
func (*SAMLManager) GetProvider ¶
func (m *SAMLManager) GetProvider(id string) (*saml.SAMLProvider, error)
GetProvider returns a SAML provider by ID
func (*SAMLManager) InitializeProviders ¶
func (m *SAMLManager) InitializeProviders(config SAMLConfig, stateStore StateStore) error
InitializeProviders initializes all configured SAML providers
func (*SAMLManager) IsProviderInitialized ¶
func (m *SAMLManager) IsProviderInitialized(id string) bool
IsProviderInitialized checks if a SAML provider was successfully initialized
func (*SAMLManager) ListProviders ¶
func (m *SAMLManager) ListProviders() []string
ListProviders returns a list of configured SAML provider IDs
type SAMLProviderConfig ¶
type SAMLProviderConfig struct {
ID string `json:"id"`
Name string `json:"name"`
Enabled bool `json:"enabled"`
Icon string `json:"icon"`
EntityID string `json:"entity_id"`
MetadataURL string `json:"metadata_url"`
MetadataXML string `json:"metadata_xml"`
ACSURL string `json:"acs_url"`
SLOURL string `json:"slo_url"`
SPPrivateKey string `json:"sp_private_key"`
SPPrivateKeyPath string `json:"sp_private_key_path"`
SPCertificate string `json:"sp_certificate"`
SPCertificatePath string `json:"sp_certificate_path"`
IDPMetadataURL string `json:"idp_metadata_url"`
IDPMetadataB64XML string `json:"idp_metadata_b64xml"`
AllowIDPInitiated bool `json:"allow_idp_initiated"`
ForceAuthn bool `json:"force_authn"`
SignRequests bool `json:"sign_requests"`
NameIDAttribute string `json:"name_id_attribute"`
EmailAttribute string `json:"email_attribute"`
NameAttribute string `json:"name_attribute"`
GroupsAttribute string `json:"groups_attribute"`
}
SAMLProviderConfig holds configuration for a SAML provider
type SAMLProviderInfo ¶
type SAMLProviderInfo struct {
ID string `json:"id"`
Name string `json:"name"`
Icon string `json:"icon"`
AuthURL string `json:"auth_url"`
MetadataURL string `json:"metadata_url"`
EntityID string `json:"entity_id"`
ACSURL string `json:"acs_url"`
SLOURL string `json:"slo_url,omitempty"`
Initialized bool `json:"initialized"`
}
SAMLProviderInfo contains public information about a SAML provider
type Service ¶
type Service struct {
// contains filtered or unexported fields
}
Service provides authentication and authorization functionality
func NewService ¶
NewService creates a new authentication service
func (*Service) BlacklistToken ¶
BlacklistToken adds a JWT token to the blacklist so it can no longer be used. This should be called when a user is deleted or logs out to invalidate their tokens.
func (*Service) CacheUserGroups ¶
CacheUserGroups caches user groups in Redis for the session duration
func (*Service) ClearUserGroups ¶
ClearUserGroups clears cached user groups from Redis (used on logout)
func (*Service) CreateClientCredential ¶
func (s *Service) CreateClientCredential(ctx context.Context, params ClientCredentialCreateParams) (*ClientCredential, error)
CreateClientCredential creates a new client credential in the database
func (*Service) CreateUser ¶
CreateUser creates a new user
func (*Service) DeactivateClientCredential ¶
func (s *Service) DeactivateClientCredential(ctx context.Context, id uuid.UUID, ownerUUID uuid.UUID) error
DeactivateClientCredential deactivates a client credential (soft delete)
func (*Service) DeleteClientCredential ¶
func (s *Service) DeleteClientCredential(ctx context.Context, id uuid.UUID, ownerUUID uuid.UUID) error
DeleteClientCredential permanently deletes a client credential
func (*Service) DeleteGroupAndData ¶
func (s *Service) DeleteGroupAndData(ctx context.Context, internalUUID string) (*GroupDeletionResult, error)
DeleteGroupAndData deletes a TMI-managed group by internal UUID and handles threat model cleanup Uses internal_uuid for precise identification to avoid issues with duplicate group_names
func (*Service) DeleteUser ¶
DeleteUser deletes a user by internal UUID
func (*Service) DeleteUserAndData ¶
DeleteUserAndData deletes a user by email and handles ownership transfer for threat models. Used by the self-deletion flow (DELETE /me) where identity comes from JWT email.
func (*Service) DeleteUserByInternalUUID ¶
func (s *Service) DeleteUserByInternalUUID(ctx context.Context, internalUUID string) (*DeletionResult, error)
DeleteUserByInternalUUID deletes a user by internal UUID and handles ownership transfer. Used by admin deletion to avoid multi-hop identity resolution that can target the wrong user.
func (*Service) GenerateDeletionChallenge ¶
func (s *Service) GenerateDeletionChallenge(ctx context.Context, userEmail string) (*DeletionChallenge, error)
GenerateDeletionChallenge creates a challenge token for user deletion
func (*Service) GenerateTokens ¶
GenerateTokens generates a new JWT token pair for a user
func (*Service) GenerateTokensWithUserInfo ¶
func (s *Service) GenerateTokensWithUserInfo(ctx context.Context, user User, userInfo *UserInfo) (TokenPair, error)
GenerateTokensWithUserInfo generates a new JWT token pair for a user with optional provider UserInfo
func (*Service) GetCachedGroups ¶
GetCachedGroups retrieves cached user groups from Redis
func (*Service) GetCachedUserByEmail ¶
GetCachedUserByEmail retrieves a user from cache by email
func (*Service) GetCachedUserByID ¶
GetCachedUserByID retrieves a user from cache by internal UUID
func (*Service) GetCachedUserByProvider ¶
func (s *Service) GetCachedUserByProvider(ctx context.Context, provider, providerUserID string) (*User, error)
GetCachedUserByProvider retrieves a user from cache by provider and provider user ID
func (*Service) GetClientCredentialByClientID ¶
func (s *Service) GetClientCredentialByClientID(ctx context.Context, clientID string) (*ClientCredential, error)
GetClientCredentialByClientID retrieves a client credential by its client_id
func (*Service) GetKeyManager ¶
func (s *Service) GetKeyManager() *JWTKeyManager
GetKeyManager returns the JWT key manager (getter for unexported field)
func (*Service) GetPrimaryProviderID ¶
GetPrimaryProviderID gets the provider user ID for a user Note: In the new architecture, each user has exactly one provider stored directly on the users table
func (*Service) GetSAMLManager ¶
func (s *Service) GetSAMLManager() *SAMLManager
GetSAMLManager returns the SAML manager (getter for unexported field)
func (*Service) GetUserByAnyProviderID ¶
GetUserByAnyProviderID gets a user by provider ID across all providers This allows provider-independent authorization using IdP user IDs NOTE: This can return ambiguous results if the same provider_user_id exists for multiple providers
func (*Service) GetUserByEmail ¶
GetUserByEmail gets a user by email
func (*Service) GetUserByID ¶
GetUserByID gets a user by internal UUID
func (*Service) GetUserByProviderAndEmail ¶
func (s *Service) GetUserByProviderAndEmail(ctx context.Context, provider, email string) (User, error)
GetUserByProviderAndEmail gets a user by provider and email address This is used as a fallback when provider_user_id doesn't match but same provider + email does
func (*Service) GetUserByProviderID ¶
func (s *Service) GetUserByProviderID(ctx context.Context, provider, providerUserID string) (User, error)
GetUserByProviderID gets a user by provider and provider user ID
func (*Service) GetUserProviders ¶
GetUserProviders gets the OAuth provider for a user Note: In the new architecture, each user has exactly one provider
func (*Service) HandleClientCredentialsGrant ¶
func (s *Service) HandleClientCredentialsGrant(ctx context.Context, clientID, clientSecret string) (*TokenPair, error)
HandleClientCredentialsGrant processes OAuth 2.0 Client Credentials Grant (RFC 6749 Section 4.4) Returns an access token for machine-to-machine authentication
func (*Service) InvalidateUserCache ¶
InvalidateUserCache removes a user from all cache keys
func (*Service) InvalidateUserSessions ¶
InvalidateUserSessions invalidates all sessions for a user
func (*Service) ListClientCredentialsByOwner ¶
func (s *Service) ListClientCredentialsByOwner(ctx context.Context, ownerUUID uuid.UUID) ([]*ClientCredential, error)
ListClientCredentialsByOwner retrieves all client credentials for a given owner
func (*Service) RefreshToken ¶
RefreshToken refreshes an access token using a refresh token. Implements single-use rotation (old token deleted) and absolute session expiration.
func (*Service) RevokeToken ¶
RevokeToken revokes a refresh token
func (*Service) SetClaimsEnricher ¶
func (s *Service) SetClaimsEnricher(enricher ClaimsEnricher)
SetClaimsEnricher sets the claims enricher for JWT token generation
func (*Service) SetProviderRegistry ¶
func (s *Service) SetProviderRegistry(registry ProviderRegistry)
SetProviderRegistry sets the provider registry for unified provider lookup.
func (*Service) TransferOwnership ¶
func (s *Service) TransferOwnership(ctx context.Context, sourceUserUUID, targetUserUUID string) (*TransferResult, error)
TransferOwnership transfers all owned threat models and survey responses from one user to another. The source user retains "writer" access.
func (*Service) UpdateClientCredentialLastUsed ¶
UpdateClientCredentialLastUsed updates the last_used_at timestamp for a client credential
func (*Service) UpdateUser ¶
UpdateUser updates an existing user
type StateStore ¶
type StateStore interface {
// StoreState stores state with associated data and expiration
StoreState(ctx context.Context, state, data string, ttl time.Duration) error
// ValidateState checks if state is valid and returns associated data
ValidateState(ctx context.Context, state string) (string, error)
// GetCallbackURL retrieves the callback URL associated with a state
GetCallbackURL(ctx context.Context, state string) (string, error)
// StoreCallbackURL stores a callback URL with a state
StoreCallbackURL(ctx context.Context, state, callbackURL string, ttl time.Duration) error
// DeleteState removes state from store
DeleteState(ctx context.Context, state string) error
// StorePKCEChallenge stores PKCE code challenge with associated method
StorePKCEChallenge(ctx context.Context, state, codeChallenge, challengeMethod string, ttl time.Duration) error
// GetPKCEChallenge retrieves PKCE code challenge and method for a state
GetPKCEChallenge(ctx context.Context, state string) (challenge, method string, err error)
// DeletePKCEChallenge removes PKCE challenge from store
DeletePKCEChallenge(ctx context.Context, state string) error
}
StateStore is an interface for storing and retrieving state information
type TestHelper ¶
type TestHelper struct {
DB *sql.DB
Mock sqlmock.Sqlmock
Redis *redis.Client
MiniRedis *miniredis.Miniredis
KeyManager *JWTKeyManager
StateStore StateStore
TestContext context.Context
}
TestHelper provides utilities for testing auth package functionality
func NewTestHelper ¶
func NewTestHelper(t *testing.T) *TestHelper
NewTestHelper creates a new test helper with mocked dependencies
func (*TestHelper) Cleanup ¶
func (h *TestHelper) Cleanup()
Cleanup releases all resources held by the test helper
func (*TestHelper) FastForwardRedis ¶
func (h *TestHelper) FastForwardRedis(duration time.Duration)
FastForwardRedis advances time in miniredis for TTL testing
func (*TestHelper) FlushRedis ¶
func (h *TestHelper) FlushRedis()
FlushRedis clears all keys in miniredis
func (*TestHelper) GetRedisKey ¶
func (h *TestHelper) GetRedisKey(key string) (string, error)
GetRedisKey gets a key from miniredis for testing
func (*TestHelper) SetRedisKey ¶
func (h *TestHelper) SetRedisKey(key, value string, expiration time.Duration) error
SetRedisKey sets a key in miniredis for testing
type TestProvider ¶
type TestProvider struct {
*BaseProvider
// contains filtered or unexported fields
}
TestProvider implements the TMI internal OAuth provider In dev/test builds (TMI_BUILD_MODE=dev|test): supports Authorization Code flow with ephemeral user creation In production builds: Only supports Client Credentials Grant for machine-to-machine authentication
func NewTestProvider ¶
func NewTestProvider(config OAuthProviderConfig, callbackURL string) *TestProvider
NewTestProvider creates a new test OAuth provider
func (*TestProvider) ExchangeCode ¶
func (p *TestProvider) ExchangeCode(ctx context.Context, code string) (*TokenResponse, error)
ExchangeCode validates the authorization code and returns tokens only for valid codes
func (*TestProvider) GetAuthorizationURL ¶
func (p *TestProvider) GetAuthorizationURL(state string) string
GetAuthorizationURL returns the test authorization URL For the test provider, we'll create a direct callback URL instead of an external redirect
func (*TestProvider) GetUserInfo ¶
GetUserInfo returns fake user information
func (*TestProvider) ValidateIDToken ¶
func (p *TestProvider) ValidateIDToken(ctx context.Context, idToken string) (*IDTokenClaims, error)
ValidateIDToken validates the test ID token (always succeeds)
type TokenBlacklist ¶
type TokenBlacklist struct {
// contains filtered or unexported fields
}
TokenBlacklist manages blacklisted JWT tokens using Redis
func NewTokenBlacklist ¶
func NewTokenBlacklist(redisClient *redis.Client, keyManager *JWTKeyManager) *TokenBlacklist
NewTokenBlacklist creates a new token blacklist service
func (*TokenBlacklist) BlacklistToken ¶
func (tb *TokenBlacklist) BlacklistToken(ctx context.Context, tokenString string) error
BlacklistToken adds a JWT token to the blacklist
func (*TokenBlacklist) CleanupExpiredTokens ¶
func (tb *TokenBlacklist) CleanupExpiredTokens(ctx context.Context) error
CleanupExpiredTokens removes expired entries from the blacklist This is handled automatically by Redis TTL, but this method can be used for monitoring or manual cleanup if needed
func (*TokenBlacklist) IsTokenBlacklisted ¶
IsTokenBlacklisted checks if a JWT token is blacklisted
type TokenIntrospectionResponse ¶
type TokenIntrospectionResponse struct {
Active bool `json:"active"`
Sub string `json:"sub,omitempty"`
Email string `json:"email,omitempty"`
Name string `json:"name,omitempty"`
Iat int64 `json:"iat,omitempty"`
Exp int64 `json:"exp,omitempty"`
Aud string `json:"aud,omitempty"`
Iss string `json:"iss,omitempty"`
TokenType string `json:"token_type,omitempty"`
Scope string `json:"scope,omitempty"`
}
TokenIntrospectionResponse represents the response from token introspection
type TokenPair ¶
type TokenPair struct {
AccessToken string `json:"access_token"` //nolint:gosec // G117 - OAuth token pair field
RefreshToken string `json:"refresh_token"` //nolint:gosec // G117 - OAuth token pair field
ExpiresIn int `json:"expires_in"`
TokenType string `json:"token_type"`
}
TokenPair contains an access token and a refresh token
type TokenResponse ¶
type TokenResponse struct {
AccessToken string `json:"access_token"` //nolint:gosec // G117 - OAuth token response field
TokenType string `json:"token_type"`
RefreshToken string `json:"refresh_token,omitempty"` //nolint:gosec // G117 - OAuth token response field
ExpiresIn int `json:"expires_in"`
IDToken string `json:"id_token,omitempty"`
}
TokenResponse contains the response from the token endpoint
type TokenTestCase ¶
type TokenTestCase struct {
Name string
User User
ExpectedError bool
ExpectedClaims func(*testing.T, *Claims)
}
TokenTestCase represents a test case for token operations
type TransferResult ¶
type TransferResult struct {
ThreatModelIDs []string `json:"threat_model_ids"`
SurveyResponseIDs []string `json:"survey_response_ids"`
}
TransferResult contains statistics about the ownership transfer operation
type User ¶
type User struct {
InternalUUID string `json:"internal_uuid"` // Internal system UUID (cached but excluded from API responses via convertUserToAPIResponse)
Provider string `json:"provider"` // OAuth provider: "tmi", "google", "github", "microsoft", "azure"
ProviderUserID string `json:"provider_user_id"` // Provider's user ID (from JWT sub claim)
Email string `json:"email"`
Name string `json:"name"` // Display name for UI presentation
EmailVerified bool `json:"email_verified"`
AccessToken *string `json:"-"` // OAuth access token (not exposed in JSON) - nullable
RefreshToken *string `json:"-"` // OAuth refresh token (not exposed in JSON) - nullable
TokenExpiry *time.Time `json:"-"` // Token expiration time (not exposed in JSON) - nullable
Groups []string `json:"groups,omitempty"` // Groups from identity provider (not stored in DB)
IsAdmin bool `json:"is_admin"` // Whether user has administrator privileges
IsSecurityReviewer bool `json:"is_security_reviewer"` // Whether user is a security reviewer
Automation *bool `json:"automation,omitempty"` // Whether this is an automation/service account (server-managed, nullable)
CreatedAt time.Time `json:"created_at"`
ModifiedAt time.Time `json:"modified_at"`
LastLogin *time.Time `json:"last_login,omitempty"` // nullable - may be NULL for auto-created admin users
}
User represents a user in the system
func CreateTestUser ¶
CreateTestUser creates a test user with default values
func CreateTestUserWithGroups ¶
CreateTestUserWithGroups creates a test user with specific groups
func CreateTestUserWithRole ¶
CreateTestUserWithRole creates a test user with specific admin status
type UserGroupInfo ¶
type UserGroupInfo struct {
InternalUUID string `json:"internal_uuid"`
GroupName string `json:"group_name"`
Name string `json:"name,omitempty"`
}
UserGroupInfo represents a TMI-managed group that a user belongs to
type UserGroupsFetcher ¶
type UserGroupsFetcher interface {
GetUserGroups(ctx context.Context, userInternalUUID string) ([]UserGroupInfo, error)
}
UserGroupsFetcher retrieves TMI-managed group memberships for a user
type UserInfo ¶
type UserInfo struct {
ID string `json:"id,omitempty"`
Email string `json:"email,omitempty"`
EmailVerified bool `json:"email_verified,omitempty"`
Name string `json:"name,omitempty"`
GivenName string `json:"given_name,omitempty"`
FamilyName string `json:"family_name,omitempty"`
Picture string `json:"picture,omitempty"`
Locale string `json:"locale,omitempty"`
IdP string `json:"idp,omitempty"` // Identity provider ID
Groups []string `json:"groups,omitempty"` // Groups from identity provider
}
UserInfo contains user information from the provider
func CreateTestUserInfo ¶
CreateTestUserInfo creates UserInfo for testing OAuth responses
type UserInfoEndpoint ¶
UserInfoEndpoint represents a single userinfo endpoint and its claim mappings
type UserProvider ¶
type UserProvider struct {
ID string `json:"id"`
UserID string `json:"user_id"`
Provider string `json:"provider"`
ProviderUserID string `json:"provider_user_id"`
Email string `json:"email"`
IsPrimary bool `json:"is_primary"`
CreatedAt time.Time `json:"created_at"`
LastLogin time.Time `json:"last_login"`
}
UserProvider represents a user's OAuth provider
Source Files
¶
- claim_extractor.go
- client_credentials.go
- config.go
- config_adapter.go
- cookies.go
- default_provider_prod.go
- group_deletion.go
- handlers.go
- handlers_helpers.go
- handlers_oauth.go
- handlers_oauth_user.go
- handlers_openid.go
- handlers_providers.go
- handlers_revocation.go
- handlers_saml.go
- handlers_token.go
- handlers_user.go
- integration_example.go
- jwt_key_manager.go
- main.go
- ownership_transfer.go
- pkce.go
- provider.go
- provider_prod.go
- provider_registry.go
- saml_manager.go
- service.go
- service_test_helpers.go
- state_store.go
- test_provider.go
- token_blacklist.go
- user_deletion.go
- utils.go
Directories
¶
| Path | Synopsis |
|---|---|
|
Package repository provides database repository interfaces and implementations for the auth service.
|
Package repository provides database repository interfaces and implementations for the auth service. |