2014-06-08 17:53:53 -04:00
|
|
|
// Copyright 2014 The Gogs Authors. All rights reserved.
|
2019-11-14 14:10:23 -05:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
2022-11-27 13:20:29 -05:00
|
|
|
// SPDX-License-Identifier: MIT
|
2014-05-05 05:32:47 -04:00
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
package auth
|
2014-04-26 02:21:04 -04:00
|
|
|
|
2014-05-02 22:48:14 -04:00
|
|
|
import (
|
2023-10-11 00:24:07 -04:00
|
|
|
"context"
|
2021-09-24 07:32:56 -04:00
|
|
|
"fmt"
|
2021-07-24 06:16:34 -04:00
|
|
|
"reflect"
|
2014-04-26 02:21:04 -04:00
|
|
|
|
2025-03-27 15:40:14 -04:00
|
|
|
"forgejo.org/models/db"
|
|
|
|
|
"forgejo.org/modules/log"
|
|
|
|
|
"forgejo.org/modules/optional"
|
|
|
|
|
"forgejo.org/modules/timeutil"
|
|
|
|
|
"forgejo.org/modules/util"
|
2019-08-15 10:46:21 -04:00
|
|
|
|
2023-11-02 21:41:00 -04:00
|
|
|
"xorm.io/builder"
|
2019-10-17 05:26:49 -04:00
|
|
|
"xorm.io/xorm"
|
2020-03-22 11:12:55 -04:00
|
|
|
"xorm.io/xorm/convert"
|
2014-05-02 22:48:14 -04:00
|
|
|
)
|
2014-04-26 02:21:04 -04:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// Type represents an login type.
|
|
|
|
|
type Type int
|
2014-06-08 17:53:53 -04:00
|
|
|
|
2016-08-31 04:22:41 -04:00
|
|
|
// Note: new type must append to the end of list to maintain compatibility.
|
2014-05-05 04:40:25 -04:00
|
|
|
const (
|
2021-09-24 07:32:56 -04:00
|
|
|
NoType Type = iota
|
|
|
|
|
Plain // 1
|
|
|
|
|
LDAP // 2
|
|
|
|
|
SMTP // 3
|
|
|
|
|
PAM // 4
|
|
|
|
|
DLDAP // 5
|
|
|
|
|
OAuth2 // 6
|
2025-03-07 19:43:41 -05:00
|
|
|
_ // 7 (was SSPI)
|
2024-02-25 05:32:59 -05:00
|
|
|
Remote // 8
|
2014-05-05 04:40:25 -04:00
|
|
|
)
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// String returns the string name of the LoginType
|
2021-09-24 07:32:56 -04:00
|
|
|
func (typ Type) String() string {
|
|
|
|
|
return Names[typ]
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-25 03:09:52 -04:00
|
|
|
// Int returns the int value of the LoginType
|
2021-09-24 07:32:56 -04:00
|
|
|
func (typ Type) Int() int {
|
2021-07-25 03:09:52 -04:00
|
|
|
return int(typ)
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// Names contains the name of LoginType values.
|
|
|
|
|
var Names = map[Type]string{
|
|
|
|
|
LDAP: "LDAP (via BindDN)",
|
|
|
|
|
DLDAP: "LDAP (simple auth)", // Via direct bind
|
|
|
|
|
SMTP: "SMTP",
|
|
|
|
|
PAM: "PAM",
|
|
|
|
|
OAuth2: "OAuth2",
|
2024-02-25 05:32:59 -05:00
|
|
|
Remote: "Remote",
|
2014-05-05 04:40:25 -04:00
|
|
|
}
|
2014-04-26 02:21:04 -04:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// Config represents login config as far as the db is concerned
|
|
|
|
|
type Config interface {
|
2021-07-24 06:16:34 -04:00
|
|
|
convert.Conversion
|
2014-04-26 02:21:04 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// SkipVerifiable configurations provide a IsSkipVerify to check if SkipVerify is set
|
|
|
|
|
type SkipVerifiable interface {
|
|
|
|
|
IsSkipVerify() bool
|
2016-07-07 19:25:09 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// HasTLSer configurations provide a HasTLS to check if TLS can be enabled
|
|
|
|
|
type HasTLSer interface {
|
|
|
|
|
HasTLS() bool
|
2014-05-11 03:49:36 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// UseTLSer configurations provide a HasTLS to check if TLS is enabled
|
|
|
|
|
type UseTLSer interface {
|
|
|
|
|
UseTLS() bool
|
2014-05-11 03:49:36 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// SSHKeyProvider configurations provide ProvidesSSHKeys to check if they provide SSHKeys
|
|
|
|
|
type SSHKeyProvider interface {
|
|
|
|
|
ProvidesSSHKeys() bool
|
2014-05-11 03:49:36 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// RegisterableSource configurations provide RegisterSource which needs to be run on creation
|
|
|
|
|
type RegisterableSource interface {
|
|
|
|
|
RegisterSource() error
|
|
|
|
|
UnregisterSource() error
|
2015-04-23 07:58:57 -04:00
|
|
|
}
|
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
var registeredConfigs = map[Type]func() Config{}
|
2015-04-23 07:58:57 -04:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// RegisterTypeConfig register a config for a provided type
|
|
|
|
|
func RegisterTypeConfig(typ Type, exemplar Config) {
|
2021-07-24 06:16:34 -04:00
|
|
|
if reflect.TypeOf(exemplar).Kind() == reflect.Ptr {
|
|
|
|
|
// Pointer:
|
2021-09-24 07:32:56 -04:00
|
|
|
registeredConfigs[typ] = func() Config {
|
|
|
|
|
return reflect.New(reflect.ValueOf(exemplar).Elem().Type()).Interface().(Config)
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
return
|
|
|
|
|
}
|
2019-11-22 18:33:31 -05:00
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
// Not a Pointer
|
2021-09-24 07:32:56 -04:00
|
|
|
registeredConfigs[typ] = func() Config {
|
|
|
|
|
return reflect.New(reflect.TypeOf(exemplar)).Elem().Interface().(Config)
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
2019-11-22 18:33:31 -05:00
|
|
|
}
|
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
// SourceSettable configurations can have their authSource set on them
|
|
|
|
|
type SourceSettable interface {
|
|
|
|
|
SetAuthSource(*Source)
|
|
|
|
|
}
|
2019-11-22 18:33:31 -05:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// Source represents an external way for authorizing users.
|
|
|
|
|
type Source struct {
|
2017-05-10 09:10:18 -04:00
|
|
|
ID int64 `xorm:"pk autoincr"`
|
2021-09-24 07:32:56 -04:00
|
|
|
Type Type
|
2020-03-22 11:12:55 -04:00
|
|
|
Name string `xorm:"UNIQUE"`
|
2021-07-24 06:16:34 -04:00
|
|
|
IsActive bool `xorm:"INDEX NOT NULL DEFAULT false"`
|
2020-03-22 11:12:55 -04:00
|
|
|
IsSyncEnabled bool `xorm:"INDEX NOT NULL DEFAULT false"`
|
|
|
|
|
Cfg convert.Conversion `xorm:"TEXT"`
|
2016-03-09 19:53:30 -05:00
|
|
|
|
2019-08-15 10:46:21 -04:00
|
|
|
CreatedUnix timeutil.TimeStamp `xorm:"INDEX created"`
|
|
|
|
|
UpdatedUnix timeutil.TimeStamp `xorm:"INDEX updated"`
|
2014-05-02 22:48:14 -04:00
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// TableName xorm will read the table name from this method
|
|
|
|
|
func (Source) TableName() string {
|
|
|
|
|
return "login_source"
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-19 07:49:59 -04:00
|
|
|
func init() {
|
2021-09-24 07:32:56 -04:00
|
|
|
db.RegisterModel(new(Source))
|
2021-09-19 07:49:59 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// BeforeSet is invoked from XORM before setting the value of a field of this object.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) BeforeSet(colName string, val xorm.Cell) {
|
2019-06-12 15:41:28 -04:00
|
|
|
if colName == "type" {
|
2022-01-02 08:12:35 -05:00
|
|
|
typ := Type(db.Cell2Int64(val))
|
2021-09-24 07:32:56 -04:00
|
|
|
constructor, ok := registeredConfigs[typ]
|
2021-07-24 06:16:34 -04:00
|
|
|
if !ok {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
source.Cfg = constructor()
|
2021-09-24 07:32:56 -04:00
|
|
|
if settable, ok := source.Cfg.(SourceSettable); ok {
|
2022-01-02 08:12:35 -05:00
|
|
|
settable.SetAuthSource(source)
|
2015-08-29 03:45:58 -04:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// TypeName return name of this login source type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) TypeName() string {
|
|
|
|
|
return Names[source.Type]
|
2014-05-05 04:40:25 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// IsLDAP returns true of this source is of the LDAP type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) IsLDAP() bool {
|
|
|
|
|
return source.Type == LDAP
|
2015-09-11 12:03:08 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// IsDLDAP returns true of this source is of the DLDAP type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) IsDLDAP() bool {
|
|
|
|
|
return source.Type == DLDAP
|
2015-09-11 12:03:08 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// IsSMTP returns true of this source is of the SMTP type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) IsSMTP() bool {
|
|
|
|
|
return source.Type == SMTP
|
2015-09-11 12:03:08 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// IsPAM returns true of this source is of the PAM type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) IsPAM() bool {
|
|
|
|
|
return source.Type == PAM
|
2015-09-11 12:03:08 -04:00
|
|
|
}
|
|
|
|
|
|
2017-02-22 02:14:37 -05:00
|
|
|
// IsOAuth2 returns true of this source is of the OAuth2 type.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) IsOAuth2() bool {
|
|
|
|
|
return source.Type == OAuth2
|
2017-02-22 02:14:37 -05:00
|
|
|
}
|
|
|
|
|
|
2024-02-25 05:32:59 -05:00
|
|
|
func (source *Source) IsRemote() bool {
|
|
|
|
|
return source.Type == Remote
|
|
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// HasTLS returns true of this source supports TLS.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) HasTLS() bool {
|
2021-07-24 06:16:34 -04:00
|
|
|
hasTLSer, ok := source.Cfg.(HasTLSer)
|
|
|
|
|
return ok && hasTLSer.HasTLS()
|
2016-07-07 19:25:09 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// UseTLS returns true of this source is configured to use TLS.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) UseTLS() bool {
|
2021-07-24 06:16:34 -04:00
|
|
|
useTLSer, ok := source.Cfg.(UseTLSer)
|
|
|
|
|
return ok && useTLSer.UseTLS()
|
2015-09-11 12:03:08 -04:00
|
|
|
}
|
|
|
|
|
|
2016-11-24 06:34:38 -05:00
|
|
|
// SkipVerify returns true if this source is configured to skip SSL
|
|
|
|
|
// verification.
|
2021-09-24 07:32:56 -04:00
|
|
|
func (source *Source) SkipVerify() bool {
|
2021-07-24 06:16:34 -04:00
|
|
|
skipVerifiable, ok := source.Cfg.(SkipVerifiable)
|
|
|
|
|
return ok && skipVerifiable.IsSkipVerify()
|
2019-11-22 18:33:31 -05:00
|
|
|
}
|
|
|
|
|
|
2022-01-02 08:12:35 -05:00
|
|
|
// CreateSource inserts a AuthSource in the DB if not already
|
2016-11-24 06:34:38 -05:00
|
|
|
// existing with the given name.
|
2023-10-11 00:24:07 -04:00
|
|
|
func CreateSource(ctx context.Context, source *Source) error {
|
|
|
|
|
has, err := db.GetEngine(ctx).Where("name=?", source.Name).Exist(new(Source))
|
2016-08-31 03:56:10 -04:00
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
} else if has {
|
2021-09-24 07:32:56 -04:00
|
|
|
return ErrSourceAlreadyExist{source.Name}
|
2016-08-31 03:56:10 -04:00
|
|
|
}
|
2021-07-08 07:38:13 -04:00
|
|
|
// Synchronization is only available with LDAP for now
|
2024-12-09 00:58:58 -05:00
|
|
|
if !source.IsLDAP() {
|
2017-05-10 09:10:18 -04:00
|
|
|
source.IsSyncEnabled = false
|
|
|
|
|
}
|
2016-08-31 03:56:10 -04:00
|
|
|
|
2023-10-11 00:24:07 -04:00
|
|
|
_, err = db.GetEngine(ctx).Insert(source)
|
2021-07-24 06:16:34 -04:00
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !source.IsActive {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
if settable, ok := source.Cfg.(SourceSettable); ok {
|
2022-01-02 08:12:35 -05:00
|
|
|
settable.SetAuthSource(source)
|
2021-07-25 03:09:52 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
registerableSource, ok := source.Cfg.(RegisterableSource)
|
|
|
|
|
if !ok {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = registerableSource.RegisterSource()
|
|
|
|
|
if err != nil {
|
2022-01-02 08:12:35 -05:00
|
|
|
// remove the AuthSource in case of errors while registering configuration
|
2023-11-12 02:38:45 -05:00
|
|
|
if _, err := db.GetEngine(ctx).ID(source.ID).Delete(new(Source)); err != nil {
|
2021-09-24 07:32:56 -04:00
|
|
|
log.Error("CreateSource: Error while wrapOpenIDConnectInitializeError: %v", err)
|
2017-05-01 09:26:53 -04:00
|
|
|
}
|
2017-02-22 02:14:37 -05:00
|
|
|
}
|
2014-06-08 17:53:53 -04:00
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
2023-11-02 21:41:00 -04:00
|
|
|
type FindSourcesOptions struct {
|
2023-11-23 22:49:41 -05:00
|
|
|
db.ListOptions
|
2024-03-02 10:42:31 -05:00
|
|
|
IsActive optional.Option[bool]
|
2023-11-02 21:41:00 -04:00
|
|
|
LoginType Type
|
2014-05-02 22:48:14 -04:00
|
|
|
}
|
|
|
|
|
|
2023-11-02 21:41:00 -04:00
|
|
|
func (opts FindSourcesOptions) ToConds() builder.Cond {
|
|
|
|
|
conds := builder.NewCond()
|
refactor: replace `Value()` from Option[T] with `Get()` & `ValueOrZeroValue()` (#11218)
`Option[T]` currently exposes a method `Value()` which is permitted to be called on an option that has a value, and an option that doesn't have a value. This API is awkward because the behaviour if the option doesn't have a value isn't clear to the caller, and, because almost all accesses end up being `.Has()?` then `OK, use .Value()`.
`Get() (bool, T)` is added as a better replacement, which both returns whether the option has a value, and the value if present. Most call-sites are rewritten to this form.
`ValueOrZeroValue()` is a direct replacement that has the same behaviour that `Value()` had, but describes the behaviour if the value is missing.
In addition to the current API being awkward, the core reason for this change is that `Value()` conflicts with the `Value()` function from the `driver.Valuer` interface. If this interface was implemented, it would allow `Option[T]` to be used to represent a nullable field in an xorm bean struct (requires: https://code.forgejo.org/xorm/xorm/pulls/66).
_Note:_ changes are extensive in this PR, but are almost all changes are easy, mechanical transitions from `.Has()` to `.Get()`. All of this work was performed by hand.
## Checklist
The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org).
### Tests
- I added test coverage for Go changes...
- [ ] in their respective `*_test.go` for unit tests.
- [ ] in the `tests/integration` directory if it involves interactions with a live Forgejo server.
- I added test coverage for JavaScript changes...
- [ ] in `web_src/js/*.test.js` if it can be unit tested.
- [ ] in `tests/e2e/*.test.e2e.js` if it requires interactions with a live Forgejo server (see also the [developer guide for JavaScript testing](https://codeberg.org/forgejo/forgejo/src/branch/forgejo/tests/e2e/README.md#end-to-end-tests)).
### Documentation
- [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change.
- [x] I did not document these changes and I do not expect someone else to do it.
### Release notes
- [ ] This change will be noticed by a Forgejo user or admin (feature, bug fix, performance, etc.). I suggest to include a release note for this change.
- [x] This change is not visible to a Forgejo user or admin (refactor, dependency upgrade, etc.). I think there is no need to add a release note for this change.
*The decision if the pull request will be shown in the release notes is up to the mergers / release team.*
The content of the `release-notes/<pull request number>.md` file will serve as the basis for the release notes. If the file does not exist, the title of the pull request will be used instead.
Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/11218
Reviewed-by: Otto <otto@codeberg.org>
Reviewed-by: Gusted <gusted@noreply.codeberg.org>
Co-authored-by: Mathieu Fenniak <mathieu@fenniak.net>
Co-committed-by: Mathieu Fenniak <mathieu@fenniak.net>
2026-02-10 10:41:21 -05:00
|
|
|
if has, value := opts.IsActive.Get(); has {
|
|
|
|
|
conds = conds.And(builder.Eq{"is_active": value})
|
2019-11-22 18:33:31 -05:00
|
|
|
}
|
2023-11-02 21:41:00 -04:00
|
|
|
if opts.LoginType != NoType {
|
|
|
|
|
conds = conds.And(builder.Eq{"`type`": opts.LoginType})
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
2023-11-02 21:41:00 -04:00
|
|
|
return conds
|
2021-07-24 06:16:34 -04:00
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// GetSourceByID returns login source by given ID.
|
2023-10-11 00:24:07 -04:00
|
|
|
func GetSourceByID(ctx context.Context, id int64) (*Source, error) {
|
2021-09-24 07:32:56 -04:00
|
|
|
source := new(Source)
|
2021-07-24 06:16:34 -04:00
|
|
|
if id == 0 {
|
2021-09-24 07:32:56 -04:00
|
|
|
source.Cfg = registeredConfigs[NoType]()
|
2021-07-24 06:16:34 -04:00
|
|
|
// Set this source to active
|
|
|
|
|
// FIXME: allow disabling of db based password authentication in future
|
|
|
|
|
source.IsActive = true
|
|
|
|
|
return source, nil
|
|
|
|
|
}
|
|
|
|
|
|
2023-10-11 00:24:07 -04:00
|
|
|
has, err := db.GetEngine(ctx).ID(id).Get(source)
|
2014-05-05 04:40:25 -04:00
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
2014-06-08 17:53:53 -04:00
|
|
|
} else if !has {
|
2021-09-24 07:32:56 -04:00
|
|
|
return nil, ErrSourceNotExist{id}
|
2014-05-05 04:40:25 -04:00
|
|
|
}
|
|
|
|
|
return source, nil
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// UpdateSource updates a Source record in DB.
|
2023-10-11 00:24:07 -04:00
|
|
|
func UpdateSource(ctx context.Context, source *Source) error {
|
2022-01-02 08:12:35 -05:00
|
|
|
var originalSource *Source
|
2017-05-01 09:26:53 -04:00
|
|
|
if source.IsOAuth2() {
|
|
|
|
|
// keep track of the original values so we can restore in case of errors while registering OAuth2 providers
|
|
|
|
|
var err error
|
2023-10-11 00:24:07 -04:00
|
|
|
if originalSource, err = GetSourceByID(ctx, source.ID); err != nil {
|
2017-05-01 09:26:53 -04:00
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2023-10-11 00:24:07 -04:00
|
|
|
has, err := db.GetEngine(ctx).Where("name=? AND id!=?", source.Name, source.ID).Exist(new(Source))
|
2023-03-31 10:32:18 -04:00
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
} else if has {
|
|
|
|
|
return ErrSourceAlreadyExist{source.Name}
|
|
|
|
|
}
|
|
|
|
|
|
2023-10-11 00:24:07 -04:00
|
|
|
_, err = db.GetEngine(ctx).ID(source.ID).AllCols().Update(source)
|
2021-07-24 06:16:34 -04:00
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !source.IsActive {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
if settable, ok := source.Cfg.(SourceSettable); ok {
|
2022-01-02 08:12:35 -05:00
|
|
|
settable.SetAuthSource(source)
|
2021-07-25 03:09:52 -04:00
|
|
|
}
|
|
|
|
|
|
2021-07-24 06:16:34 -04:00
|
|
|
registerableSource, ok := source.Cfg.(RegisterableSource)
|
|
|
|
|
if !ok {
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = registerableSource.RegisterSource()
|
|
|
|
|
if err != nil {
|
|
|
|
|
// restore original values since we cannot update the provider it self
|
2023-10-11 00:24:07 -04:00
|
|
|
if _, err := db.GetEngine(ctx).ID(source.ID).AllCols().Update(originalSource); err != nil {
|
2021-07-24 06:16:34 -04:00
|
|
|
log.Error("UpdateSource: Error while wrapOpenIDConnectInitializeError: %v", err)
|
2017-05-01 09:26:53 -04:00
|
|
|
}
|
2017-02-22 02:14:37 -05:00
|
|
|
}
|
2014-05-02 22:48:14 -04:00
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// ErrSourceNotExist represents a "SourceNotExist" kind of error.
|
|
|
|
|
type ErrSourceNotExist struct {
|
|
|
|
|
ID int64
|
|
|
|
|
}
|
2017-02-22 02:14:37 -05:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// IsErrSourceNotExist checks if an error is a ErrSourceNotExist.
|
|
|
|
|
func IsErrSourceNotExist(err error) bool {
|
|
|
|
|
_, ok := err.(ErrSourceNotExist)
|
|
|
|
|
return ok
|
|
|
|
|
}
|
2017-02-22 02:14:37 -05:00
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
func (err ErrSourceNotExist) Error() string {
|
|
|
|
|
return fmt.Sprintf("login source does not exist [id: %d]", err.ID)
|
2014-04-26 02:21:04 -04:00
|
|
|
}
|
2014-05-11 02:12:45 -04:00
|
|
|
|
2022-10-18 01:50:37 -04:00
|
|
|
// Unwrap unwraps this as a ErrNotExist err
|
|
|
|
|
func (err ErrSourceNotExist) Unwrap() error {
|
|
|
|
|
return util.ErrNotExist
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// ErrSourceAlreadyExist represents a "SourceAlreadyExist" kind of error.
|
|
|
|
|
type ErrSourceAlreadyExist struct {
|
|
|
|
|
Name string
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// IsErrSourceAlreadyExist checks if an error is a ErrSourceAlreadyExist.
|
|
|
|
|
func IsErrSourceAlreadyExist(err error) bool {
|
|
|
|
|
_, ok := err.(ErrSourceAlreadyExist)
|
|
|
|
|
return ok
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (err ErrSourceAlreadyExist) Error() string {
|
|
|
|
|
return fmt.Sprintf("login source already exists [name: %s]", err.Name)
|
|
|
|
|
}
|
|
|
|
|
|
2022-10-18 01:50:37 -04:00
|
|
|
// Unwrap unwraps this as a ErrExist err
|
|
|
|
|
func (err ErrSourceAlreadyExist) Unwrap() error {
|
|
|
|
|
return util.ErrAlreadyExist
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-24 07:32:56 -04:00
|
|
|
// ErrSourceInUse represents a "SourceInUse" kind of error.
|
|
|
|
|
type ErrSourceInUse struct {
|
|
|
|
|
ID int64
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// IsErrSourceInUse checks if an error is a ErrSourceInUse.
|
|
|
|
|
func IsErrSourceInUse(err error) bool {
|
|
|
|
|
_, ok := err.(ErrSourceInUse)
|
|
|
|
|
return ok
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (err ErrSourceInUse) Error() string {
|
|
|
|
|
return fmt.Sprintf("login source is still used by some users [id: %d]", err.ID)
|
2016-08-31 04:22:41 -04:00
|
|
|
}
|