Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changes from zvelo #636

Merged
merged 9 commits into from
Oct 25, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion cmd/keys_create.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,6 @@ var keysCreateCmd = &cobra.Command{

func init() {
keysCmd.AddCommand(keysCreateCmd)
keysCreateCmd.Flags().StringP("alg", "a", "", "REQUIRED name that identifies the algorithm intended for use with the key. Supports: RS256, ES521, HS256")
keysCreateCmd.Flags().StringP("alg", "a", "", "REQUIRED name that identifies the algorithm intended for use with the key. Supports: RS256, ES256, ES521, HS256")

}
42 changes: 29 additions & 13 deletions docs/api.swagger.json
Original file line number Diff line number Diff line change
Expand Up @@ -1487,8 +1487,8 @@
"tags": [
"warden"
],
"summary": "Find groups by member",
"operationId": "findGroupsByMember",
"summary": "List groups",
"operationId": "listGroups",
"security": [
{
"oauth2": [
Expand All @@ -1504,11 +1504,27 @@
"name": "member",
"in": "query",
"required": true
},
{
"type": "integer",
"format": "int64",
"x-go-name": "Offset",
"description": "The offset from where to start looking if member isn't specified.",
"name": "offset",
"in": "query"
},
{
"type": "integer",
"format": "int64",
"x-go-name": "Limit",
"description": "The maximum amount of policies returned if member isn't specified.",
"name": "limit",
"in": "query"
}
],
"responses": {
"200": {
"$ref": "#/responses/findGroupsByMemberResponse"
"$ref": "#/responses/listGroupsResponse"
},
"401": {
"$ref": "#/responses/genericError"
Expand Down Expand Up @@ -2167,7 +2183,7 @@
],
"properties": {
"alg": {
"description": "The algorithm to be used for creating the key. Supports \"RS256\", \"ES521\" and \"HS256\"",
"description": "The algorithm to be used for creating the key. Supports \"RS256\", \"ES256\", \"ES521\" and \"HS256\"",
"type": "string",
"x-go-name": "Algorithm"
},
Expand Down Expand Up @@ -3015,15 +3031,6 @@
"emptyResponse": {
"description": "An empty response"
},
"findGroupsByMemberResponse": {
"description": "A list of groups the member is belonging to",
"schema": {
"type": "array",
"items": {
"$ref": "#/definitions/group"
}
}
},
"genericError": {
"description": "The standard error format",
"schema": {
Expand Down Expand Up @@ -3088,6 +3095,15 @@
"$ref": "#/definitions/oAuth2TokenIntrospection"
}
},
"listGroupsResponse": {
"description": "A list of groups the member is belonging to",
"schema": {
"type": "array",
"items": {
"$ref": "#/definitions/group"
}
}
},
"oAuth2ClientList": {
"description": "A list of clients.",
"schema": {
Expand Down
4 changes: 4 additions & 0 deletions jwk/generator_hs256.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,10 @@ func (g *HS256Generator) Generate(id string) (*jose.JSONWebKeySet, error) {
return nil, errors.WithStack(err)
}

if id == "" {
id = "shared"
}

var sliceKey = key[:]

return &jose.JSONWebKeySet{
Expand Down
3 changes: 2 additions & 1 deletion jwk/handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ func (h *Handler) GetGenerators() map[string]KeyGenerator {
if h.Generators == nil || len(h.Generators) == 0 {
h.Generators = map[string]KeyGenerator{
"RS256": &RS256Generator{},
"ES256": &ECDSA256Generator{},
"ES521": &ECDSA521Generator{},
"HS256": &HS256Generator{},
"HS512": &HS512Generator{},
Expand All @@ -52,7 +53,7 @@ func (h *Handler) SetRoutes(r *httprouter.Router) {

// swagger:model jsonWebKeySetGeneratorRequest
type createRequest struct {
// The algorithm to be used for creating the key. Supports "RS256", "ES521", "HS512", and "HS256"
// The algorithm to be used for creating the key. Supports "RS256", "ES256", "ES521", "HS256" and "HS512"
// required: true
// in: body
Algorithm string `json:"alg"`
Expand Down
2 changes: 1 addition & 1 deletion jwk/handler_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func init() {
},
)
router := httprouter.New()
IDKS, _ = testGenerator.Generate("")
IDKS, _ = testGenerators["RS256"].Generate("")

h := Handler{
Manager: &MemoryManager{},
Expand Down
43 changes: 29 additions & 14 deletions jwk/manager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var managers = map[string]Manager{
"memory": new(MemoryManager),
}

var testGenerator = &RS256Generator{}
var testGenerators = (&Handler{}).GetGenerators()

var encryptionKey, _ = RandomBytes(32)

Expand Down Expand Up @@ -53,22 +53,37 @@ func connectToMySQL() {
}

func TestManagerKey(t *testing.T) {
ks, _ := testGenerator.Generate("")

for name, m := range managers {
t.Run(fmt.Sprintf("case=%s", name), func(t *testing.T) {
TestHelperManagerKey(m, ks)(t)
})
for algo, testGenerator := range testGenerators {
if algo == "HS256" {
// this is a symmetrical algorithm
continue
}

ks, err := testGenerator.Generate("")
if err != nil {
t.Fatal(err)
}

for name, m := range managers {
t.Run(fmt.Sprintf("case=%s/%s", algo, name), func(t *testing.T) {
TestHelperManagerKey(m, algo, ks)(t)
})
}
}
}

func TestManagerKeySet(t *testing.T) {
ks, _ := testGenerator.Generate("")
ks.Key("private")

for name, m := range managers {
t.Run(fmt.Sprintf("case=%s", name), func(t *testing.T) {
TestHelperManagerKeySet(m, ks)(t)
})
for algo, testGenerator := range testGenerators {
ks, err := testGenerator.Generate("")
if err != nil {
t.Fatal(err)
}
ks.Key("private")

for name, m := range managers {
t.Run(fmt.Sprintf("case=%s/%s", algo, name), func(t *testing.T) {
TestHelperManagerKeySet(m, algo, ks)(t)
})
}
}
}
30 changes: 15 additions & 15 deletions jwk/manager_test_helpers.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,57 +19,57 @@ func RandomBytes(n int) ([]byte, error) {
return bytes, nil
}

func TestHelperManagerKey(m Manager, keys *jose.JSONWebKeySet) func(t *testing.T) {
func TestHelperManagerKey(m Manager, name string, keys *jose.JSONWebKeySet) func(t *testing.T) {
pub := keys.Key("public")
priv := keys.Key("private")

return func(t *testing.T) {
_, err := m.GetKey("faz", "baz")
_, err := m.GetKey(name+"faz", "baz")
assert.NotNil(t, err)

err = m.AddKey("faz", First(priv))
err = m.AddKey(name+"faz", First(priv))
assert.Nil(t, err)

got, err := m.GetKey("faz", "private")
got, err := m.GetKey(name+"faz", "private")
assert.Nil(t, err)
assert.Equal(t, priv, got.Keys)

err = m.AddKey("faz", First(pub))
err = m.AddKey(name+"faz", First(pub))
assert.Nil(t, err)

got, err = m.GetKey("faz", "private")
got, err = m.GetKey(name+"faz", "private")
assert.Nil(t, err)
assert.Equal(t, priv, got.Keys)

got, err = m.GetKey("faz", "public")
got, err = m.GetKey(name+"faz", "public")
assert.Nil(t, err)
assert.Equal(t, pub, got.Keys)

err = m.DeleteKey("faz", "public")
err = m.DeleteKey(name+"faz", "public")
assert.Nil(t, err)

_, err = m.GetKey("faz", "public")
_, err = m.GetKey(name+"faz", "public")
assert.NotNil(t, err)
}
}

func TestHelperManagerKeySet(m Manager, keys *jose.JSONWebKeySet) func(t *testing.T) {
func TestHelperManagerKeySet(m Manager, name string, keys *jose.JSONWebKeySet) func(t *testing.T) {
return func(t *testing.T) {
_, err := m.GetKeySet("foo")
_, err := m.GetKeySet(name + "foo")
require.Error(t, err)

err = m.AddKeySet("bar", keys)
err = m.AddKeySet(name+"bar", keys)
assert.Nil(t, err)

got, err := m.GetKeySet("bar")
got, err := m.GetKeySet(name + "bar")
assert.Nil(t, err)
assert.Equal(t, keys.Key("public"), got.Key("public"))
assert.Equal(t, keys.Key("private"), got.Key("private"))

err = m.DeleteKeySet("bar")
err = m.DeleteKeySet(name + "bar")
assert.Nil(t, err)

_, err = m.GetKeySet("bar")
_, err = m.GetKeySet(name + "bar")
assert.NotNil(t, err)
}
}
16 changes: 12 additions & 4 deletions warden/group/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,19 +4,27 @@
package group

// A list of groups the member is belonging to
// swagger:response findGroupsByMemberResponse
type swaggerFindGroupsByMemberResponse struct {
// swagger:response listGroupsResponse
type swaggerListGroupsResponse struct {
// in: body
// type: array
Body []Group
}

// swagger:parameters findGroupsByMember
type swaggerFindGroupsByMemberParameters struct {
// swagger:parameters listGroups
type swaggerListGroupsParameters struct {
// The id of the member to look up.
// in: query
// required: true
Member string `json:"member"`

// The offset from where to start looking if member isn't specified.
// in: query
Offset int `json:"offset"`

// The maximum amount of policies returned if member isn't specified.
// in: query
Limit int `json:"limit"`
}

// swagger:parameters createGroup
Expand Down
49 changes: 43 additions & 6 deletions warden/group/handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ import (
"encoding/json"
"fmt"
"net/http"
"strconv"

"github.com/julienschmidt/httprouter"
"github.com/ory/herodot"
Expand Down Expand Up @@ -41,9 +42,9 @@ func (h *Handler) SetRoutes(r *httprouter.Router) {
r.DELETE(GroupsHandlerPath+"/:id/members", h.RemoveGroupMembers)
}

// swagger:route GET /warden/groups warden findGroupsByMember
// swagger:route GET /warden/groups warden listGroups
//
// Find groups by member
// List groups
//
// The subject making the request needs to be assigned to a policy containing:
//
Expand All @@ -67,23 +68,50 @@ func (h *Handler) SetRoutes(r *httprouter.Router) {
// oauth2: hydra.groups
//
// Responses:
// 200: findGroupsByMemberResponse
// 200: listGroupsResponse
// 401: genericError
// 403: genericError
// 500: genericError
func (h *Handler) FindGroupNames(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
var ctx = r.Context()
var member = r.URL.Query().Get("member")

if _, err := h.W.TokenAllowed(ctx, h.W.TokenFromRequest(r), &firewall.TokenAccessRequest{
accessReq := &firewall.TokenAccessRequest{
Resource: GroupsResource,
Action: "list",
}, Scope); err != nil {
}

if _, err := h.W.TokenAllowed(ctx, h.W.TokenFromRequest(r), accessReq, Scope); err != nil {
h.H.WriteError(w, r, err)
return
}

groups, err := h.Manager.FindGroupsByMember(member)
if member != "" {
groups, err := h.Manager.FindGroupsByMember(member)

if err != nil {
h.H.WriteError(w, r, err)
return
}

h.H.Write(w, r, groups)
return
}

limit, err := intFromQuery(r, "limit", 500)
if err != nil {
h.H.WriteError(w, r, errors.WithStack(err))
return
}

offset, err := intFromQuery(r, "offset", 0)
if err != nil {
h.H.WriteError(w, r, errors.WithStack(err))
return
}

groups, err := h.Manager.ListGroups(limit, offset)

if err != nil {
h.H.WriteError(w, r, err)
return
Expand All @@ -92,6 +120,15 @@ func (h *Handler) FindGroupNames(w http.ResponseWriter, r *http.Request, _ httpr
h.H.Write(w, r, groups)
}

func intFromQuery(r *http.Request, key string, def int64) (int64, error) {
val := r.URL.Query().Get(key)
if val == "" {
return def, nil
}

return strconv.ParseInt(val, 10, 64)
}

// swagger:route POST /warden/groups warden createGroup
//
// Create a group
Expand Down
1 change: 1 addition & 0 deletions warden/group/manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,5 +19,6 @@ type Manager interface {
AddGroupMembers(group string, members []string) error
RemoveGroupMembers(group string, members []string) error

ListGroups(limit, offset int64) ([]Group, error)
FindGroupsByMember(subject string) ([]Group, error)
}
Loading