2021-11-23 16:45:38 +07:00
package commands
import (
"context"
2022-04-25 15:49:18 +07:00
"database/sql"
2022-04-08 06:01:01 +07:00
"encoding/base32"
2021-11-23 16:45:38 +07:00
"errors"
"fmt"
2022-03-02 14:50:36 +07:00
"image"
"image/png"
2021-11-23 16:45:38 +07:00
"os"
2022-03-02 14:50:36 +07:00
"path/filepath"
2021-11-23 16:45:38 +07:00
"strings"
2022-04-09 14:13:19 +07:00
"github.com/google/uuid"
2021-11-23 16:45:38 +07:00
"github.com/spf13/cobra"
2022-04-08 06:01:01 +07:00
"github.com/spf13/pflag"
2022-04-09 14:13:19 +07:00
"gopkg.in/yaml.v3"
2021-11-23 16:45:38 +07:00
"github.com/authelia/authelia/v4/internal/configuration"
"github.com/authelia/authelia/v4/internal/configuration/schema"
"github.com/authelia/authelia/v4/internal/configuration/validator"
2022-03-06 12:47:40 +07:00
"github.com/authelia/authelia/v4/internal/model"
2021-11-23 16:45:38 +07:00
"github.com/authelia/authelia/v4/internal/storage"
2021-12-01 19:11:29 +07:00
"github.com/authelia/authelia/v4/internal/totp"
2022-03-02 14:50:36 +07:00
"github.com/authelia/authelia/v4/internal/utils"
2021-11-23 16:45:38 +07:00
)
func storagePersistentPreRunE ( cmd * cobra . Command , _ [ ] string ) ( err error ) {
2022-03-02 14:50:36 +07:00
var configs [ ] string
if configs , err = cmd . Flags ( ) . GetStringSlice ( "config" ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
sources := make ( [ ] configuration . Source , 0 , len ( configs ) + 3 )
if cmd . Flags ( ) . Changed ( "config" ) {
for _ , configFile := range configs {
if _ , err := os . Stat ( configFile ) ; os . IsNotExist ( err ) {
return fmt . Errorf ( "could not load the provided configuration file %s: %w" , configFile , err )
}
sources = append ( sources , configuration . NewYAMLFileSource ( configFile ) )
}
2022-02-10 05:07:53 +07:00
} else if _ , err := os . Stat ( configs [ 0 ] ) ; err == nil {
sources = append ( sources , configuration . NewYAMLFileSource ( configs [ 0 ] ) )
2021-11-23 16:45:38 +07:00
}
mapping := map [ string ] string {
2021-12-02 12:36:03 +07:00
"encryption-key" : "storage.encryption_key" ,
"sqlite.path" : "storage.local.path" ,
"mysql.host" : "storage.mysql.host" ,
"mysql.port" : "storage.mysql.port" ,
"mysql.database" : "storage.mysql.database" ,
"mysql.username" : "storage.mysql.username" ,
"mysql.password" : "storage.mysql.password" ,
"postgres.host" : "storage.postgres.host" ,
"postgres.port" : "storage.postgres.port" ,
"postgres.database" : "storage.postgres.database" ,
"postgres.schema" : "storage.postgres.schema" ,
"postgres.username" : "storage.postgres.username" ,
"postgres.password" : "storage.postgres.password" ,
"postgres.ssl.mode" : "storage.postgres.ssl.mode" ,
"postgres.ssl.root_certificate" : "storage.postgres.ssl.root_certificate" ,
"postgres.ssl.certificate" : "storage.postgres.ssl.certificate" ,
"postgres.ssl.key" : "storage.postgres.ssl.key" ,
2022-04-08 06:01:01 +07:00
"period" : "totp.period" ,
"digits" : "totp.digits" ,
"algorithm" : "totp.algorithm" ,
"issuer" : "totp.issuer" ,
"secret-size" : "totp.secret_size" ,
2021-11-23 16:45:38 +07:00
}
sources = append ( sources , configuration . NewEnvironmentSource ( configuration . DefaultEnvPrefix , configuration . DefaultEnvDelimiter ) )
sources = append ( sources , configuration . NewSecretsSource ( configuration . DefaultEnvPrefix , configuration . DefaultEnvDelimiter ) )
sources = append ( sources , configuration . NewCommandLineSourceWithMapping ( cmd . Flags ( ) , mapping , true , false ) )
val := schema . NewStructValidator ( )
config = & schema . Configuration { }
2022-03-02 14:50:36 +07:00
if _ , err = configuration . LoadAdvanced ( val , "" , & config , sources ... ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
if val . HasErrors ( ) {
var finalErr error
for i , err := range val . Errors ( ) {
if i == 0 {
finalErr = err
continue
}
finalErr = fmt . Errorf ( "%w, %v" , finalErr , err )
}
return finalErr
}
validator . ValidateStorage ( config . Storage , val )
2021-12-01 19:11:29 +07:00
validator . ValidateTOTP ( config , val )
2021-11-23 16:45:38 +07:00
if val . HasErrors ( ) {
var finalErr error
for i , err := range val . Errors ( ) {
if i == 0 {
finalErr = err
continue
}
finalErr = fmt . Errorf ( "%w, %v" , finalErr , err )
}
return finalErr
}
return nil
}
2021-11-25 08:56:58 +07:00
func storageSchemaEncryptionCheckRunE ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
2022-03-02 14:50:36 +07:00
verbose bool
ctx = context . Background ( )
2021-11-25 08:56:58 +07:00
)
provider = getStorageProvider ( )
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-03-02 14:50:36 +07:00
if verbose , err = cmd . Flags ( ) . GetBool ( "verbose" ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
if err = provider . SchemaEncryptionCheckKey ( ctx , verbose ) ; err != nil {
switch {
case errors . Is ( err , storage . ErrSchemaEncryptionVersionUnsupported ) :
fmt . Printf ( "Could not check encryption key for validity. The schema version doesn't support encryption.\n" )
case errors . Is ( err , storage . ErrSchemaEncryptionInvalidKey ) :
fmt . Printf ( "Encryption key validation: failed.\n\nError: %v.\n" , err )
default :
fmt . Printf ( "Could not check encryption key for validity.\n\nError: %v.\n" , err )
}
} else {
fmt . Println ( "Encryption key validation: success." )
}
return nil
}
func storageSchemaEncryptionChangeKeyRunE ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
2022-03-02 14:50:36 +07:00
key string
version int
ctx = context . Background ( )
2021-11-25 08:56:58 +07:00
)
provider = getStorageProvider ( )
defer func ( ) {
_ = provider . Close ( )
} ( )
if err = checkStorageSchemaUpToDate ( ctx , provider ) ; err != nil {
return err
}
2022-03-02 14:50:36 +07:00
if version , err = provider . SchemaVersion ( ctx ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
if version <= 0 {
return errors . New ( "schema version must be at least version 1 to change the encryption key" )
}
2022-03-02 14:50:36 +07:00
key , err = cmd . Flags ( ) . GetString ( "new-encryption-key" )
2021-11-25 08:56:58 +07:00
2022-03-02 14:50:36 +07:00
switch {
case err != nil :
return err
case key == "" :
2021-11-25 08:56:58 +07:00
return errors . New ( "you must set the --new-encryption-key flag" )
2022-03-02 14:50:36 +07:00
case len ( key ) < 20 :
return errors . New ( "the new encryption key must be at least 20 characters" )
2021-11-25 08:56:58 +07:00
}
if err = provider . SchemaEncryptionChangeKey ( ctx , key ) ; err != nil {
return err
}
fmt . Println ( "Completed the encryption key change. Please adjust your configuration to use the new key." )
return nil
}
2021-12-01 19:11:29 +07:00
func storageTOTPGenerateRunE ( cmd * cobra . Command , args [ ] string ) ( err error ) {
2021-11-25 08:56:58 +07:00
var (
2022-04-08 06:01:01 +07:00
provider storage . Provider
ctx = context . Background ( )
c * model . TOTPConfiguration
force bool
filename , secret string
file * os . File
img image . Image
2021-11-25 08:56:58 +07:00
)
provider = getStorageProvider ( )
2021-12-01 19:11:29 +07:00
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-04-08 06:01:01 +07:00
if force , filename , secret , err = storageTOTPGenerateRunEOptsFromFlags ( cmd . Flags ( ) ) ; err != nil {
2022-03-02 14:50:36 +07:00
return err
}
if _ , err = provider . LoadTOTPConfiguration ( ctx , args [ 0 ] ) ; err == nil && ! force {
2021-12-01 19:11:29 +07:00
return fmt . Errorf ( "%s already has a TOTP configuration, use --force to overwrite" , args [ 0 ] )
2022-04-08 06:01:01 +07:00
} else if err != nil && ! errors . Is ( err , storage . ErrNoTOTPConfiguration ) {
2021-12-01 19:11:29 +07:00
return err
}
totpProvider := totp . NewTimeBasedProvider ( config . TOTP )
2022-04-08 06:01:01 +07:00
if c , err = totpProvider . GenerateCustom ( args [ 0 ] , config . TOTP . Algorithm , secret , config . TOTP . Digits , config . TOTP . Period , config . TOTP . SecretSize ) ; err != nil {
2021-12-01 19:11:29 +07:00
return err
}
2022-03-02 14:50:36 +07:00
extraInfo := ""
if filename != "" {
if _ , err = os . Stat ( filename ) ; ! os . IsNotExist ( err ) {
return errors . New ( "image output filepath already exists" )
}
if file , err = os . Create ( filename ) ; err != nil {
return err
}
defer file . Close ( )
if img , err = c . Image ( 256 , 256 ) ; err != nil {
return err
}
if err = png . Encode ( file , img ) ; err != nil {
return err
}
extraInfo = fmt . Sprintf ( " and saved it as a PNG image at the path '%s'" , filename )
}
if err = provider . SaveTOTPConfiguration ( ctx , * c ) ; err != nil {
2021-12-01 19:11:29 +07:00
return err
}
2022-03-02 14:50:36 +07:00
fmt . Printf ( "Generated TOTP configuration for user '%s' with URI '%s'%s\n" , args [ 0 ] , c . URI ( ) , extraInfo )
2021-12-01 19:11:29 +07:00
return nil
}
2022-04-08 06:01:01 +07:00
func storageTOTPGenerateRunEOptsFromFlags ( flags * pflag . FlagSet ) ( force bool , filename , secret string , err error ) {
if force , err = flags . GetBool ( "force" ) ; err != nil {
return force , filename , secret , err
}
if filename , err = flags . GetString ( "path" ) ; err != nil {
return force , filename , secret , err
}
if secret , err = flags . GetString ( "secret" ) ; err != nil {
return force , filename , secret , err
}
secretLength := base32 . StdEncoding . WithPadding ( base32 . NoPadding ) . DecodedLen ( len ( secret ) )
if secret != "" && secretLength < schema . TOTPSecretSizeMinimum {
return force , filename , secret , fmt . Errorf ( "decoded length of the base32 secret must have " +
"a length of more than %d but '%s' has a decoded length of %d" , schema . TOTPSecretSizeMinimum , secret , secretLength )
}
return force , filename , secret , nil
}
2021-12-01 19:11:29 +07:00
func storageTOTPDeleteRunE ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
)
user := args [ 0 ]
provider = getStorageProvider ( )
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-03-02 14:50:36 +07:00
if _ , err = provider . LoadTOTPConfiguration ( ctx , user ) ; err != nil {
2021-12-01 19:11:29 +07:00
return fmt . Errorf ( "can't delete configuration for user '%s': %+v" , user , err )
}
2022-03-02 14:50:36 +07:00
if err = provider . DeleteTOTPConfiguration ( ctx , user ) ; err != nil {
2021-12-01 19:11:29 +07:00
return fmt . Errorf ( "can't delete configuration for user '%s': %+v" , user , err )
2021-11-25 08:56:58 +07:00
}
2021-12-01 19:11:29 +07:00
fmt . Printf ( "Deleted TOTP configuration for user '%s'." , user )
return nil
}
func storageTOTPExportRunE ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
2022-03-02 14:50:36 +07:00
provider storage . Provider
format , dir string
2022-03-06 12:47:40 +07:00
configurations [ ] model . TOTPConfiguration
2022-03-02 14:50:36 +07:00
img image . Image
ctx = context . Background ( )
2021-12-01 19:11:29 +07:00
)
provider = getStorageProvider ( )
2021-11-25 08:56:58 +07:00
defer func ( ) {
_ = provider . Close ( )
} ( )
if err = checkStorageSchemaUpToDate ( ctx , provider ) ; err != nil {
return err
}
2022-03-02 14:50:36 +07:00
if format , dir , err = storageTOTPExportGetConfigFromFlags ( cmd ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
limit := 10
for page := 0 ; true ; page ++ {
2022-03-02 14:50:36 +07:00
if configurations , err = provider . LoadTOTPConfigurations ( ctx , limit , page ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
2022-06-14 19:40:00 +07:00
if page == 0 && format == storageTOTPExportFormatCSV {
2021-11-25 08:56:58 +07:00
fmt . Printf ( "issuer,username,algorithm,digits,period,secret\n" )
}
for _ , c := range configurations {
switch format {
2022-06-14 19:40:00 +07:00
case storageTOTPExportFormatCSV :
2021-12-01 19:11:29 +07:00
fmt . Printf ( "%s,%s,%s,%d,%d,%s\n" , c . Issuer , c . Username , c . Algorithm , c . Digits , c . Period , string ( c . Secret ) )
2022-06-14 19:40:00 +07:00
case storageTOTPExportFormatURI :
2021-12-01 19:11:29 +07:00
fmt . Println ( c . URI ( ) )
2022-06-14 19:40:00 +07:00
case storageTOTPExportFormatPNG :
2022-03-02 14:50:36 +07:00
file , _ := os . Create ( filepath . Join ( dir , fmt . Sprintf ( "%s.png" , c . Username ) ) )
if img , err = c . Image ( 256 , 256 ) ; err != nil {
2022-03-17 12:53:07 +07:00
_ = file . Close ( )
2022-03-02 14:50:36 +07:00
return err
}
if err = png . Encode ( file , img ) ; err != nil {
2022-03-17 12:53:07 +07:00
_ = file . Close ( )
2022-03-02 14:50:36 +07:00
return err
}
2022-03-17 12:53:07 +07:00
_ = file . Close ( )
2021-11-25 08:56:58 +07:00
}
}
if len ( configurations ) < limit {
break
}
}
2022-06-14 19:40:00 +07:00
if format == storageTOTPExportFormatPNG {
2022-03-02 14:50:36 +07:00
fmt . Printf ( "Exported TOTP QR codes in PNG format in the '%s' directory\n" , dir )
}
2021-11-25 08:56:58 +07:00
return nil
}
2022-03-02 14:50:36 +07:00
func storageTOTPExportGetConfigFromFlags ( cmd * cobra . Command ) ( format , dir string , err error ) {
if format , err = cmd . Flags ( ) . GetString ( "format" ) ; err != nil {
return "" , "" , err
}
if dir , err = cmd . Flags ( ) . GetString ( "dir" ) ; err != nil {
return "" , "" , err
}
switch format {
2022-06-14 19:40:00 +07:00
case storageTOTPExportFormatCSV , storageTOTPExportFormatURI :
2022-03-02 14:50:36 +07:00
break
2022-06-14 19:40:00 +07:00
case storageTOTPExportFormatPNG :
2022-03-02 14:50:36 +07:00
if dir == "" {
dir = utils . RandomString ( 8 , utils . AlphaNumericCharacters , false )
}
if _ , err = os . Stat ( dir ) ; ! os . IsNotExist ( err ) {
return "" , "" , errors . New ( "output directory must not exist" )
}
if err = os . MkdirAll ( dir , 0700 ) ; err != nil {
return "" , "" , err
}
default :
return "" , "" , errors . New ( "format must be csv, uri, or png" )
}
return format , dir , nil
}
2021-11-23 16:45:38 +07:00
func storageMigrateHistoryRunE ( _ * cobra . Command , _ [ ] string ) ( err error ) {
var (
2022-03-02 14:50:36 +07:00
provider storage . Provider
version int
2022-03-06 12:47:40 +07:00
migrations [ ] model . Migration
2022-03-02 14:50:36 +07:00
ctx = context . Background ( )
2021-11-23 16:45:38 +07:00
)
2021-11-25 08:56:58 +07:00
provider = getStorageProvider ( )
if provider == nil {
return errNoStorageProvider
}
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-03-02 14:50:36 +07:00
if version , err = provider . SchemaVersion ( ctx ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
2021-11-25 08:56:58 +07:00
if version <= 0 {
fmt . Println ( "No migration history is available for schemas that not version 1 or above." )
return
}
2022-03-02 14:50:36 +07:00
if migrations , err = provider . SchemaMigrationHistory ( ctx ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
if len ( migrations ) == 0 {
return errors . New ( "no migration history found which may indicate a broken schema" )
}
fmt . Printf ( "Migration History:\n\nID\tDate\t\t\t\tBefore\tAfter\tAuthelia Version\n" )
for _ , m := range migrations {
fmt . Printf ( "%d\t%s\t%d\t%d\t%s\n" , m . ID , m . Applied . Format ( "2006-01-02 15:04:05 -0700" ) , m . Before , m . After , m . Version )
}
return nil
}
func newStorageMigrateListRunE ( up bool ) func ( cmd * cobra . Command , args [ ] string ) ( err error ) {
return func ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
2022-03-06 12:47:40 +07:00
migrations [ ] model . SchemaMigration
2021-11-23 16:45:38 +07:00
directionStr string
)
2021-11-25 08:56:58 +07:00
provider = getStorageProvider ( )
2021-11-23 16:45:38 +07:00
2021-11-25 08:56:58 +07:00
defer func ( ) {
_ = provider . Close ( )
} ( )
2021-11-23 16:45:38 +07:00
if up {
migrations , err = provider . SchemaMigrationsUp ( ctx , 0 )
directionStr = "Up"
} else {
migrations , err = provider . SchemaMigrationsDown ( ctx , 0 )
directionStr = "Down"
}
2021-11-25 08:56:58 +07:00
if err != nil && ! errors . Is ( err , storage . ErrNoAvailableMigrations ) && ! errors . Is ( err , storage . ErrMigrateCurrentVersionSameAsTarget ) {
2021-11-23 16:45:38 +07:00
return err
}
if len ( migrations ) == 0 {
fmt . Printf ( "Storage Schema Migration List (%s)\n\nNo Migrations Available\n" , directionStr )
} else {
fmt . Printf ( "Storage Schema Migration List (%s)\n\nVersion\t\tDescription\n" , directionStr )
for _ , migration := range migrations {
fmt . Printf ( "%d\t\t%s\n" , migration . Version , migration . Name )
}
}
return nil
}
}
func newStorageMigrationRunE ( up bool ) func ( cmd * cobra . Command , args [ ] string ) ( err error ) {
return func ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
2022-03-02 14:50:36 +07:00
target int
pre1 bool
ctx = context . Background ( )
2021-11-23 16:45:38 +07:00
)
2021-11-25 08:56:58 +07:00
provider = getStorageProvider ( )
2021-11-23 16:45:38 +07:00
2021-11-25 08:56:58 +07:00
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-03-02 14:50:36 +07:00
if target , err = cmd . Flags ( ) . GetInt ( "target" ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
switch {
case up :
switch cmd . Flags ( ) . Changed ( "target" ) {
case true :
return provider . SchemaMigrate ( ctx , true , target )
default :
return provider . SchemaMigrate ( ctx , true , storage . SchemaLatest )
}
default :
2022-03-02 14:50:36 +07:00
if pre1 , err = cmd . Flags ( ) . GetBool ( "pre1" ) ; err != nil {
2021-12-01 10:32:58 +07:00
return err
2021-11-23 16:45:38 +07:00
}
2021-12-01 10:32:58 +07:00
if ! cmd . Flags ( ) . Changed ( "target" ) && ! pre1 {
return errors . New ( "must set target" )
2021-11-23 16:45:38 +07:00
}
2021-12-01 10:32:58 +07:00
if err = storageMigrateDownConfirmDestroy ( cmd ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
switch {
case pre1 :
return provider . SchemaMigrate ( ctx , false , - 1 )
default :
return provider . SchemaMigrate ( ctx , false , target )
}
}
}
}
func storageMigrateDownConfirmDestroy ( cmd * cobra . Command ) ( err error ) {
2022-03-02 14:50:36 +07:00
var destroy bool
if destroy , err = cmd . Flags ( ) . GetBool ( "destroy-data" ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
if ! destroy {
fmt . Printf ( "Schema Down Migrations may DESTROY data, type 'DESTROY' and press return to continue: " )
var text string
_ , _ = fmt . Scanln ( & text )
if text != "DESTROY" {
return errors . New ( "cancelling down migration due to user not accepting data destruction" )
}
}
return nil
}
func storageSchemaInfoRunE ( _ * cobra . Command , _ [ ] string ) ( err error ) {
var (
2022-03-02 14:50:36 +07:00
upgradeStr , tablesStr string
provider storage . Provider
tables [ ] string
version , latest int
ctx = context . Background ( )
2021-11-23 16:45:38 +07:00
)
2021-11-25 08:56:58 +07:00
provider = getStorageProvider ( )
2021-11-23 16:45:38 +07:00
2021-11-25 08:56:58 +07:00
defer func ( ) {
_ = provider . Close ( )
} ( )
2022-03-02 14:50:36 +07:00
if version , err = provider . SchemaVersion ( ctx ) ; err != nil && err . Error ( ) != "unknown schema state" {
2021-11-23 16:45:38 +07:00
return err
}
2022-03-02 14:50:36 +07:00
if tables , err = provider . SchemaTables ( ctx ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
if len ( tables ) == 0 {
tablesStr = "N/A"
} else {
tablesStr = strings . Join ( tables , ", " )
}
2022-03-02 14:50:36 +07:00
if latest , err = provider . SchemaLatestVersion ( ) ; err != nil {
2021-11-23 16:45:38 +07:00
return err
}
if latest > version {
upgradeStr = fmt . Sprintf ( "yes - version %d" , latest )
} else {
upgradeStr = "no"
}
2021-11-25 08:56:58 +07:00
var encryption string
if err = provider . SchemaEncryptionCheckKey ( ctx , false ) ; err != nil {
if errors . Is ( err , storage . ErrSchemaEncryptionVersionUnsupported ) {
encryption = "unsupported (schema version)"
} else {
encryption = "invalid"
}
} else {
encryption = "valid"
}
fmt . Printf ( "Schema Version: %s\nSchema Upgrade Available: %s\nSchema Tables: %s\nSchema Encryption Key: %s\n" , storage . SchemaVersionToString ( version ) , upgradeStr , tablesStr , encryption )
return nil
}
func checkStorageSchemaUpToDate ( ctx context . Context , provider storage . Provider ) ( err error ) {
2022-03-02 14:50:36 +07:00
var version , latest int
if version , err = provider . SchemaVersion ( ctx ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
2022-03-02 14:50:36 +07:00
if latest , err = provider . SchemaLatestVersion ( ) ; err != nil {
2021-11-25 08:56:58 +07:00
return err
}
if version != latest {
return fmt . Errorf ( "schema is version %d which is outdated please migrate to version %d in order to use this command or use an older binary" , version , latest )
}
2021-11-23 16:45:38 +07:00
return nil
}
2022-04-09 14:13:19 +07:00
func storageUserIdentifiersExport ( cmd * cobra . Command , _ [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
file string
)
if file , err = cmd . Flags ( ) . GetString ( "file" ) ; err != nil {
return err
}
_ , err = os . Stat ( file )
switch {
case err == nil :
return fmt . Errorf ( "must specify a file that doesn't exist but '%s' exists" , file )
case ! os . IsNotExist ( err ) :
return fmt . Errorf ( "error occurred opening '%s': %w" , file , err )
}
provider = getStorageProvider ( )
var (
export model . UserOpaqueIdentifiersExport
data [ ] byte
)
if export . Identifiers , err = provider . LoadUserOpaqueIdentifiers ( ctx ) ; err != nil {
return err
}
if len ( export . Identifiers ) == 0 {
return fmt . Errorf ( "no data to export" )
}
if data , err = yaml . Marshal ( & export ) ; err != nil {
return fmt . Errorf ( "error occurred marshalling data to YAML: %w" , err )
}
if err = os . WriteFile ( file , data , 0600 ) ; err != nil {
return fmt . Errorf ( "error occurred writing to file '%s': %w" , file , err )
}
fmt . Printf ( "Exported %d User Opaque Identifiers to %s\n" , len ( export . Identifiers ) , file )
return nil
}
func storageUserIdentifiersImport ( cmd * cobra . Command , _ [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
file string
stat os . FileInfo
)
if file , err = cmd . Flags ( ) . GetString ( "file" ) ; err != nil {
return err
}
if stat , err = os . Stat ( file ) ; err != nil {
return fmt . Errorf ( "must specify a file that exists but '%s' had an error opening it: %w" , file , err )
}
if stat . IsDir ( ) {
return fmt . Errorf ( "must specify a file that exists but '%s' is a directory" , file )
}
var (
data [ ] byte
export model . UserOpaqueIdentifiersExport
)
if data , err = os . ReadFile ( file ) ; err != nil {
return err
}
if err = yaml . Unmarshal ( data , & export ) ; err != nil {
return err
}
if len ( export . Identifiers ) == 0 {
return fmt . Errorf ( "can't import a file with no data" )
}
provider = getStorageProvider ( )
for _ , opaqueID := range export . Identifiers {
if err = provider . SaveUserOpaqueIdentifier ( ctx , opaqueID ) ; err != nil {
return err
}
}
fmt . Printf ( "Imported User Opaque Identifiers from %s\n" , file )
return nil
}
2022-04-25 15:49:18 +07:00
func containsIdentifier ( identifier model . UserOpaqueIdentifier , identifiers [ ] model . UserOpaqueIdentifier ) bool {
for i := 0 ; i < len ( identifiers ) ; i ++ {
if identifier . Service == identifiers [ i ] . Service && identifier . SectorID == identifiers [ i ] . SectorID && identifier . Username == identifiers [ i ] . Username {
return true
}
}
return false
}
func storageUserIdentifiersGenerate ( cmd * cobra . Command , _ [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
users , services , sectors [ ] string
)
provider = getStorageProvider ( )
identifiers , err := provider . LoadUserOpaqueIdentifiers ( ctx )
if err != nil && ! errors . Is ( err , sql . ErrNoRows ) {
return fmt . Errorf ( "can't load the existing identifiers: %w" , err )
}
if users , err = cmd . Flags ( ) . GetStringSlice ( "users" ) ; err != nil {
return err
}
if services , err = cmd . Flags ( ) . GetStringSlice ( "services" ) ; err != nil {
return err
}
if sectors , err = cmd . Flags ( ) . GetStringSlice ( "sectors" ) ; err != nil {
return err
}
if len ( users ) == 0 {
return fmt . Errorf ( "must supply at least one user" )
}
if len ( sectors ) == 0 {
sectors = append ( sectors , "" )
}
if ! utils . IsStringSliceContainsAll ( services , validIdentifierServices ) {
return fmt . Errorf ( "one or more the service names '%s' is invalid, the valid values are: '%s'" , strings . Join ( services , "', '" ) , strings . Join ( validIdentifierServices , "', '" ) )
}
var added , duplicates int
for _ , service := range services {
for _ , sector := range sectors {
for _ , username := range users {
identifier := model . UserOpaqueIdentifier {
Service : service ,
SectorID : sector ,
Username : username ,
}
if containsIdentifier ( identifier , identifiers ) {
duplicates ++
continue
}
identifier . Identifier , err = uuid . NewRandom ( )
if err != nil {
return fmt . Errorf ( "failed to generate a uuid: %w" , err )
}
if err = provider . SaveUserOpaqueIdentifier ( ctx , identifier ) ; err != nil {
return fmt . Errorf ( "failed to save identifier: %w" , err )
}
added ++
}
}
}
fmt . Printf ( "Successfully added %d opaque identifiers and %d duplicates were skipped\n" , added , duplicates )
return nil
}
2022-04-09 14:13:19 +07:00
func storageUserIdentifiersAdd ( cmd * cobra . Command , args [ ] string ) ( err error ) {
var (
provider storage . Provider
ctx = context . Background ( )
service , sector string
)
if service , err = cmd . Flags ( ) . GetString ( "service" ) ; err != nil {
return err
}
if service == "" {
service = identifierServiceOpenIDConnect
2022-04-25 15:49:18 +07:00
} else if ! utils . IsStringInSlice ( service , validIdentifierServices ) {
return fmt . Errorf ( "the service name '%s' is invalid, the valid values are: '%s'" , service , strings . Join ( validIdentifierServices , "', '" ) )
2022-04-09 14:13:19 +07:00
}
if sector , err = cmd . Flags ( ) . GetString ( "sector" ) ; err != nil {
return err
}
opaqueID := model . UserOpaqueIdentifier {
Service : service ,
Username : args [ 0 ] ,
SectorID : sector ,
}
if cmd . Flags ( ) . Changed ( "identifier" ) {
var identifierStr string
if identifierStr , err = cmd . Flags ( ) . GetString ( "identifier" ) ; err != nil {
return err
}
if opaqueID . Identifier , err = uuid . Parse ( identifierStr ) ; err != nil {
return fmt . Errorf ( "the identifier provided '%s' is invalid as it must be a version 4 UUID but parsing it had an error: %w" , identifierStr , err )
}
if opaqueID . Identifier . Version ( ) != 4 {
return fmt . Errorf ( "the identifier providerd '%s' is a version %d UUID but only version 4 UUID's accepted as identifiers" , identifierStr , opaqueID . Identifier . Version ( ) )
}
} else {
if opaqueID . Identifier , err = uuid . NewRandom ( ) ; err != nil {
return err
}
}
provider = getStorageProvider ( )
if err = provider . SaveUserOpaqueIdentifier ( ctx , opaqueID ) ; err != nil {
return err
}
fmt . Printf ( "Added User Opaque Identifier:\n\tService: %s\n\tSector: %s\n\tUsername: %s\n\tIdentifier: %s\n\n" , opaqueID . Service , opaqueID . SectorID , opaqueID . Username , opaqueID . Identifier )
return nil
}