@@ -26,7 +26,7 @@ import (
26
26
"github.com/horizoncd/horizon/pkg/oauth/models"
27
27
"github.com/horizoncd/horizon/pkg/token/generator"
28
28
tokenmodels "github.com/horizoncd/horizon/pkg/token/models"
29
- tokenstorage "github.com/horizoncd/horizon/pkg/token/storage "
29
+ tokenstore "github.com/horizoncd/horizon/pkg/token/store "
30
30
"github.com/horizoncd/horizon/pkg/util/log"
31
31
"golang.org/x/net/context"
32
32
"k8s.io/apimachinery/pkg/util/rand"
@@ -95,14 +95,14 @@ type Manager interface {
95
95
96
96
var _ Manager = & OauthManager {}
97
97
98
- func NewManager (oauthAppDAO oauthdao.DAO , tokenStorage tokenstorage. Storage ,
98
+ func NewManager (oauthAppDAO oauthdao.DAO , tokenStore tokenstore. Store ,
99
99
gen generator.CodeGenerator ,
100
100
authorizeCodeExpireTime ,
101
101
accessTokenExpireTime ,
102
102
refreshTokenExpireTime time.Duration ) * OauthManager {
103
103
return & OauthManager {
104
104
oauthAppDAO : oauthAppDAO ,
105
- tokenStorage : tokenStorage ,
105
+ tokenStore : tokenStore ,
106
106
authorizationCodeGenerator : gen ,
107
107
authorizeCodeExpireTime : authorizeCodeExpireTime ,
108
108
accessTokenExpireTime : accessTokenExpireTime ,
@@ -113,7 +113,7 @@ func NewManager(oauthAppDAO oauthdao.DAO, tokenStorage tokenstorage.Storage,
113
113
114
114
type OauthManager struct {
115
115
oauthAppDAO oauthdao.DAO
116
- tokenStorage tokenstorage. Storage
116
+ tokenStore tokenstore. Store
117
117
authorizationCodeGenerator generator.CodeGenerator
118
118
authorizeCodeExpireTime time.Duration
119
119
accessTokenExpireTime time.Duration
@@ -170,7 +170,7 @@ func (m *OauthManager) GetOAuthApp(ctx context.Context, clientID string) (*model
170
170
171
171
func (m * OauthManager ) DeleteOAuthApp (ctx context.Context , clientID string ) error {
172
172
// revoke all the token
173
- if err := m .tokenStorage .DeleteByClientID (ctx , clientID ); err != nil {
173
+ if err := m .tokenStore .DeleteByClientID (ctx , clientID ); err != nil {
174
174
return err
175
175
}
176
176
@@ -316,7 +316,7 @@ func (m *OauthManager) GenAuthorizeCode(ctx context.Context,
316
316
}
317
317
318
318
authorizationToken := m .NewAuthorizationToken (req )
319
- _ , err = m .tokenStorage .Create (ctx , authorizationToken )
319
+ _ , err = m .tokenStore .Create (ctx , authorizationToken )
320
320
return authorizationToken , err
321
321
}
322
322
@@ -339,7 +339,7 @@ func (m *OauthManager) GenOauthTokens(ctx context.Context, req *OauthTokensReque
339
339
}
340
340
341
341
// get authorize token, and check by it
342
- authorizationCodeToken , err := m .tokenStorage .GetByCode (ctx , req .Code )
342
+ authorizationCodeToken , err := m .tokenStore .GetByCode (ctx , req .Code )
343
343
if err != nil {
344
344
if _ , ok := perror .Cause (err ).(* herrors.HorizonErrNotFound ); ok {
345
345
return nil , perror .Wrap (err , "authorization code not exist" )
@@ -349,7 +349,7 @@ func (m *OauthManager) GenOauthTokens(ctx context.Context, req *OauthTokensReque
349
349
350
350
if err := m .checkByAuthorizationCode (req , authorizationCodeToken ); err != nil {
351
351
if perror .Cause (err ) == herrors .ErrOAuthCodeExpired {
352
- if delErr := m .tokenStorage .DeleteByCode (ctx , req .Code ); delErr != nil {
352
+ if delErr := m .tokenStore .DeleteByCode (ctx , req .Code ); delErr != nil {
353
353
log .Warningf (ctx , "delete expired code error, err = %v" , delErr )
354
354
}
355
355
}
@@ -358,21 +358,21 @@ func (m *OauthManager) GenOauthTokens(ctx context.Context, req *OauthTokensReque
358
358
359
359
// generate access token and store
360
360
accessToken := m .NewAccessToken (authorizationCodeToken , req )
361
- accessTokenInDB , err := m .tokenStorage .Create (ctx , accessToken )
361
+ accessTokenInDB , err := m .tokenStore .Create (ctx , accessToken )
362
362
if err != nil {
363
363
return nil , err
364
364
}
365
365
366
366
// generate refresh token, store and associate with the access token
367
367
refreshToken := m .NewRefreshToken (accessToken , req )
368
368
refreshToken .RefID = accessTokenInDB .ID
369
- refreshTokenInDB , err := m .tokenStorage .Create (ctx , refreshToken )
369
+ refreshTokenInDB , err := m .tokenStore .Create (ctx , refreshToken )
370
370
if err != nil {
371
371
return nil , err
372
372
}
373
373
374
374
// delete authorize code
375
- err = m .tokenStorage .DeleteByCode (ctx , req .Code )
375
+ err = m .tokenStore .DeleteByCode (ctx , req .Code )
376
376
if err != nil {
377
377
log .Warningf (ctx , "Delete Authorization token error, code = %s, error = %v" , req .Code , err )
378
378
}
@@ -409,7 +409,7 @@ func (m *OauthManager) RefreshOauthTokens(ctx context.Context,
409
409
Request : req .Request ,
410
410
})
411
411
refreshToken .RefID = accessToken .ID
412
- err = m .tokenStorage .UpdateByID (ctx , refreshToken .ID , refreshToken )
412
+ err = m .tokenStore .UpdateByID (ctx , refreshToken .ID , refreshToken )
413
413
if err != nil {
414
414
return nil , err
415
415
}
@@ -435,7 +435,7 @@ func (m *OauthManager) checkClientSecret(ctx context.Context, req *OauthTokensRe
435
435
436
436
func (m * OauthManager ) checkRefreshToken (ctx context.Context ,
437
437
refreshToken , redirectURL string ) (* tokenmodels.Token , error ) {
438
- token , err := m .tokenStorage .GetByCode (ctx , refreshToken )
438
+ token , err := m .tokenStore .GetByCode (ctx , refreshToken )
439
439
if err != nil {
440
440
if _ , ok := perror .Cause (err ).(* herrors.HorizonErrNotFound ); ok {
441
441
return nil , perror .Wrap (err , "refresh token not exist" )
@@ -454,7 +454,7 @@ func (m *OauthManager) checkRefreshToken(ctx context.Context,
454
454
455
455
func (m * OauthManager ) refreshAccessToken (ctx context.Context , refreshToken * tokenmodels.Token ,
456
456
req * OauthTokensRequest ) (* tokenmodels.Token , error ) {
457
- accessToken , err := m .tokenStorage .GetByID (ctx , refreshToken .RefID )
457
+ accessToken , err := m .tokenStore .GetByID (ctx , refreshToken .RefID )
458
458
accessTokenNotFound := false
459
459
if err != nil {
460
460
if _ , ok := perror .Cause (err ).(* herrors.HorizonErrNotFound ); ok {
@@ -471,7 +471,7 @@ func (m *OauthManager) refreshAccessToken(ctx context.Context, refreshToken *tok
471
471
Scope : refreshToken .Scope ,
472
472
UserID : refreshToken .UserID ,
473
473
}, req )
474
- accessToken , err = m .tokenStorage .Create (ctx , token )
474
+ accessToken , err = m .tokenStore .Create (ctx , token )
475
475
if err != nil {
476
476
return nil , err
477
477
}
@@ -482,7 +482,7 @@ func (m *OauthManager) refreshAccessToken(ctx context.Context, refreshToken *tok
482
482
Request : req .Request ,
483
483
})
484
484
accessToken .CreatedAt = time .Now ()
485
- err = m .tokenStorage .UpdateByID (ctx , accessToken .ID , accessToken )
485
+ err = m .tokenStore .UpdateByID (ctx , accessToken .ID , accessToken )
486
486
if err != nil {
487
487
return nil , err
488
488
}
0 commit comments