2019-11-16 17:38:21 +07:00
package storage
import (
"database/sql"
"fmt"
2019-11-17 17:47:07 +07:00
"github.com/clems4ever/authelia/internal/configuration/schema"
"github.com/clems4ever/authelia/internal/logging"
2019-11-16 17:38:21 +07:00
_ "github.com/go-sql-driver/mysql" // Load the MySQL Driver used in the connection string.
)
// MySQLProvider is a MySQL provider
type MySQLProvider struct {
SQLProvider
}
2019-11-17 02:50:58 +07:00
// NewMySQLProvider a MySQL provider
func NewMySQLProvider ( configuration schema . MySQLStorageConfiguration ) * MySQLProvider {
2019-11-16 17:38:21 +07:00
connectionString := configuration . Username
if configuration . Password != "" {
connectionString += fmt . Sprintf ( ":%s" , configuration . Password )
}
if connectionString != "" {
connectionString += "@"
}
address := configuration . Host
if configuration . Port > 0 {
address += fmt . Sprintf ( ":%d" , configuration . Port )
}
connectionString += fmt . Sprintf ( "tcp(%s)" , address )
if configuration . Database != "" {
connectionString += fmt . Sprintf ( "/%s" , configuration . Database )
}
db , err := sql . Open ( "mysql" , connectionString )
if err != nil {
logging . Logger ( ) . Fatalf ( "Unable to connect to SQL database: %v" , err )
}
2019-11-17 02:50:58 +07:00
provider := MySQLProvider {
SQLProvider {
sqlGetPreferencesByUsername : fmt . Sprintf ( "SELECT second_factor_method FROM %s WHERE username=?" , preferencesTableName ) ,
sqlUpsertSecondFactorPreference : fmt . Sprintf ( "REPLACE INTO %s (username, second_factor_method) VALUES (?, ?)" , preferencesTableName ) ,
sqlTestIdentityVerificationTokenExistence : fmt . Sprintf ( "SELECT EXISTS (SELECT * FROM %s WHERE token=?)" , identityVerificationTokensTableName ) ,
sqlInsertIdentityVerificationToken : fmt . Sprintf ( "INSERT INTO %s (token) VALUES (?)" , identityVerificationTokensTableName ) ,
sqlDeleteIdentityVerificationToken : fmt . Sprintf ( "DELETE FROM %s WHERE token=?" , identityVerificationTokensTableName ) ,
sqlGetTOTPSecretByUsername : fmt . Sprintf ( "SELECT secret FROM %s WHERE username=?" , totpSecretsTableName ) ,
sqlUpsertTOTPSecret : fmt . Sprintf ( "REPLACE INTO %s (username, secret) VALUES (?, ?)" , totpSecretsTableName ) ,
2019-12-08 00:14:26 +07:00
sqlDeleteTOTPSecret : fmt . Sprintf ( "DELETE FROM %s WHERE username=?" , totpSecretsTableName ) ,
2019-11-17 02:50:58 +07:00
2019-11-17 08:05:46 +07:00
sqlGetU2FDeviceHandleByUsername : fmt . Sprintf ( "SELECT keyHandle, publicKey FROM %s WHERE username=?" , u2fDeviceHandlesTableName ) ,
sqlUpsertU2FDeviceHandle : fmt . Sprintf ( "REPLACE INTO %s (username, keyHandle, publicKey) VALUES (?, ?, ?)" , u2fDeviceHandlesTableName ) ,
2019-11-17 02:50:58 +07:00
sqlInsertAuthenticationLog : fmt . Sprintf ( "INSERT INTO %s (username, successful, time) VALUES (?, ?, ?)" , authenticationLogsTableName ) ,
sqlGetLatestAuthenticationLogs : fmt . Sprintf ( "SELECT successful, time FROM %s WHERE time>? AND username=? ORDER BY time DESC" , authenticationLogsTableName ) ,
} ,
}
2019-11-16 17:38:21 +07:00
if err := provider . initialize ( db ) ; err != nil {
logging . Logger ( ) . Fatalf ( "Unable to initialize SQL database: %v" , err )
}
return & provider
}