mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-27 02:24:30 +01:00
b5ee2174a8
wt_pending_invite property is set for every user on IdP. Avoid setting it when unnecessary.
742 lines
19 KiB
Go
742 lines
19 KiB
Go
package idp
|
|
|
|
import (
|
|
"bytes"
|
|
"compress/gzip"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// Auth0Manager auth0 manager client instance
|
|
type Auth0Manager struct {
|
|
authIssuer string
|
|
httpClient ManagerHTTPClient
|
|
credentials ManagerCredentials
|
|
helper ManagerHelper
|
|
}
|
|
|
|
// Auth0ClientConfig auth0 manager client configurations
|
|
type Auth0ClientConfig struct {
|
|
Audience string
|
|
AuthIssuer string
|
|
ClientID string
|
|
ClientSecret string
|
|
GrantType string
|
|
}
|
|
|
|
// auth0JWTRequest payload struct to request a JWT Token
|
|
type auth0JWTRequest struct {
|
|
Audience string `json:"audience"`
|
|
AuthIssuer string `json:"auth_issuer"`
|
|
ClientID string `json:"client_id"`
|
|
ClientSecret string `json:"client_secret"`
|
|
GrantType string `json:"grant_type"`
|
|
}
|
|
|
|
// Auth0Credentials auth0 authentication information
|
|
type Auth0Credentials struct {
|
|
clientConfig Auth0ClientConfig
|
|
helper ManagerHelper
|
|
httpClient ManagerHTTPClient
|
|
jwtToken JWTToken
|
|
mux sync.Mutex
|
|
}
|
|
|
|
// createUserRequest is a user create request
|
|
type createUserRequest struct {
|
|
Email string `json:"email"`
|
|
Name string `json:"name"`
|
|
AppMeta AppMetadata `json:"app_metadata"`
|
|
Connection string `json:"connection"`
|
|
Password string `json:"password"`
|
|
VerifyEmail bool `json:"verify_email"`
|
|
}
|
|
|
|
// userExportJobRequest is a user export request struct
|
|
type userExportJobRequest struct {
|
|
Format string `json:"format"`
|
|
Fields []map[string]string `json:"fields"`
|
|
}
|
|
|
|
// userExportJobResponse is a user export response struct
|
|
type userExportJobResponse struct {
|
|
Type string `json:"type"`
|
|
Status string `json:"status"`
|
|
ConnectionID string `json:"connection_id"`
|
|
Format string `json:"format"`
|
|
Limit int `json:"limit"`
|
|
Connection string `json:"connection"`
|
|
CreatedAt time.Time `json:"created_at"`
|
|
ID string `json:"id"`
|
|
}
|
|
|
|
// userExportJobStatusResponse is a user export status response struct
|
|
type userExportJobStatusResponse struct {
|
|
Type string `json:"type"`
|
|
Status string `json:"status"`
|
|
ConnectionID string `json:"connection_id"`
|
|
Format string `json:"format"`
|
|
Limit int `json:"limit"`
|
|
Location string `json:"location"`
|
|
Connection string `json:"connection"`
|
|
CreatedAt time.Time `json:"created_at"`
|
|
ID string `json:"id"`
|
|
}
|
|
|
|
// auth0Profile represents an Auth0 user profile response
|
|
type auth0Profile struct {
|
|
AccountID string `json:"wt_account_id"`
|
|
PendingInvite bool `json:"wt_pending_invite"`
|
|
UserID string `json:"user_id"`
|
|
Name string `json:"name"`
|
|
Email string `json:"email"`
|
|
CreatedAt string `json:"created_at"`
|
|
LastLogin string `json:"last_login"`
|
|
}
|
|
|
|
// NewAuth0Manager creates a new instance of the Auth0Manager
|
|
func NewAuth0Manager(config Auth0ClientConfig) (*Auth0Manager, error) {
|
|
|
|
httpTransport := http.DefaultTransport.(*http.Transport).Clone()
|
|
httpTransport.MaxIdleConns = 5
|
|
|
|
httpClient := &http.Client{
|
|
Timeout: 10 * time.Second,
|
|
Transport: httpTransport,
|
|
}
|
|
|
|
helper := JsonParser{}
|
|
|
|
if config.ClientID == "" || config.ClientSecret == "" || config.GrantType == "" || config.Audience == "" || config.AuthIssuer == "" {
|
|
return nil, fmt.Errorf("auth0 idp configuration is not complete")
|
|
}
|
|
|
|
if config.GrantType != "client_credentials" {
|
|
return nil, fmt.Errorf("auth0 idp configuration failed. Grant Type should be client_credentials")
|
|
}
|
|
|
|
if !strings.HasPrefix(strings.ToLower(config.AuthIssuer), "https://") {
|
|
return nil, fmt.Errorf("auth0 idp configuration failed. AuthIssuer should contain https://")
|
|
}
|
|
|
|
credentials := &Auth0Credentials{
|
|
clientConfig: config,
|
|
httpClient: httpClient,
|
|
helper: helper,
|
|
}
|
|
return &Auth0Manager{
|
|
authIssuer: config.AuthIssuer,
|
|
credentials: credentials,
|
|
httpClient: httpClient,
|
|
helper: helper,
|
|
}, nil
|
|
}
|
|
|
|
// jwtStillValid returns true if the token still valid and have enough time to be used and get a response from Auth0
|
|
func (c *Auth0Credentials) jwtStillValid() bool {
|
|
return !c.jwtToken.expiresInTime.IsZero() && time.Now().Add(5*time.Second).Before(c.jwtToken.expiresInTime)
|
|
}
|
|
|
|
// requestJWTToken performs request to get jwt token
|
|
func (c *Auth0Credentials) requestJWTToken() (*http.Response, error) {
|
|
var res *http.Response
|
|
reqURL := c.clientConfig.AuthIssuer + "/oauth/token"
|
|
|
|
p, err := c.helper.Marshal(auth0JWTRequest(c.clientConfig))
|
|
if err != nil {
|
|
return res, err
|
|
}
|
|
payload := strings.NewReader(string(p))
|
|
|
|
req, err := http.NewRequest("POST", reqURL, payload)
|
|
if err != nil {
|
|
return res, err
|
|
}
|
|
|
|
req.Header.Add("content-type", "application/json")
|
|
|
|
log.Debug("requesting new jwt token for idp manager")
|
|
|
|
res, err = c.httpClient.Do(req)
|
|
if err != nil {
|
|
return res, err
|
|
}
|
|
|
|
if res.StatusCode != 200 {
|
|
return res, fmt.Errorf("unable to get token, statusCode %d", res.StatusCode)
|
|
}
|
|
return res, nil
|
|
}
|
|
|
|
// parseRequestJWTResponse parses jwt raw response body and extracts token and expires in seconds
|
|
func (c *Auth0Credentials) parseRequestJWTResponse(rawBody io.ReadCloser) (JWTToken, error) {
|
|
jwtToken := JWTToken{}
|
|
body, err := io.ReadAll(rawBody)
|
|
if err != nil {
|
|
return jwtToken, err
|
|
}
|
|
|
|
err = c.helper.Unmarshal(body, &jwtToken)
|
|
if err != nil {
|
|
return jwtToken, err
|
|
}
|
|
if jwtToken.ExpiresIn == 0 && jwtToken.AccessToken == "" {
|
|
return jwtToken, fmt.Errorf("error while reading response body, expires_in: %d and access_token: %s", jwtToken.ExpiresIn, jwtToken.AccessToken)
|
|
}
|
|
data, err := jwt.DecodeSegment(strings.Split(jwtToken.AccessToken, ".")[1])
|
|
if err != nil {
|
|
return jwtToken, err
|
|
}
|
|
// Exp maps into exp from jwt token
|
|
var IssuedAt struct{ Exp int64 }
|
|
err = json.Unmarshal(data, &IssuedAt)
|
|
if err != nil {
|
|
return jwtToken, err
|
|
}
|
|
jwtToken.expiresInTime = time.Unix(IssuedAt.Exp, 0)
|
|
|
|
return jwtToken, nil
|
|
}
|
|
|
|
// Authenticate retrieves access token to use the Auth0 Management API
|
|
func (c *Auth0Credentials) Authenticate() (JWTToken, error) {
|
|
c.mux.Lock()
|
|
defer c.mux.Unlock()
|
|
|
|
// If jwtToken has an expires time and we have enough time to do a request return immediately
|
|
if c.jwtStillValid() {
|
|
return c.jwtToken, nil
|
|
}
|
|
|
|
res, err := c.requestJWTToken()
|
|
if err != nil {
|
|
return c.jwtToken, err
|
|
}
|
|
defer func() {
|
|
err = res.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing get jwt token response body: %v", err)
|
|
}
|
|
}()
|
|
|
|
jwtToken, err := c.parseRequestJWTResponse(res.Body)
|
|
if err != nil {
|
|
return c.jwtToken, err
|
|
}
|
|
|
|
c.jwtToken = jwtToken
|
|
|
|
return c.jwtToken, nil
|
|
}
|
|
|
|
func batchRequestUsersURL(authIssuer, accountID string, page int, perPage int) (string, url.Values, error) {
|
|
u, err := url.Parse(authIssuer + "/api/v2/users")
|
|
if err != nil {
|
|
return "", nil, err
|
|
}
|
|
q := u.Query()
|
|
q.Set("page", strconv.Itoa(page))
|
|
q.Set("search_engine", "v3")
|
|
q.Set("per_page", strconv.Itoa(perPage))
|
|
q.Set("q", "app_metadata.wt_account_id:"+accountID)
|
|
u.RawQuery = q.Encode()
|
|
|
|
return u.String(), q, nil
|
|
}
|
|
|
|
func requestByUserIDURL(authIssuer, userID string) string {
|
|
return authIssuer + "/api/v2/users/" + userID
|
|
}
|
|
|
|
// GetAccount returns all the users for a given profile. Calls Auth0 API.
|
|
func (am *Auth0Manager) GetAccount(accountID string) ([]*UserData, error) {
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var list []*UserData
|
|
|
|
// https://auth0.com/docs/manage-users/user-search/retrieve-users-with-get-users-endpoint#limitations
|
|
// auth0 limitation of 1000 users via this endpoint
|
|
resultsPerPage := 50
|
|
for page := 0; page < 20; page++ {
|
|
reqURL, query, err := batchRequestUsersURL(am.authIssuer, accountID, page, resultsPerPage)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req, err := http.NewRequest(http.MethodGet, reqURL, strings.NewReader(query.Encode()))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
req.Header.Add("authorization", "Bearer "+jwtToken.AccessToken)
|
|
req.Header.Add("content-type", "application/json")
|
|
|
|
res, err := am.httpClient.Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
body, err := io.ReadAll(res.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if res.StatusCode != 200 {
|
|
return nil, fmt.Errorf("failed requesting user data from IdP %s", string(body))
|
|
}
|
|
|
|
var batch []UserData
|
|
err = json.Unmarshal(body, &batch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Debugf("returned user batch for accountID %s on page %d, %v", accountID, page, batch)
|
|
|
|
err = res.Body.Close()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
for user := range batch {
|
|
list = append(list, &batch[user])
|
|
}
|
|
|
|
if len(batch) == 0 || len(batch) < resultsPerPage {
|
|
log.Debugf("finished loading users for accountID %s", accountID)
|
|
return list, nil
|
|
}
|
|
}
|
|
|
|
return list, nil
|
|
}
|
|
|
|
// GetUserDataByID requests user data from auth0 via ID
|
|
func (am *Auth0Manager) GetUserDataByID(userID string, appMetadata AppMetadata) (*UserData, error) {
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
reqURL := requestByUserIDURL(am.authIssuer, userID)
|
|
req, err := http.NewRequest(http.MethodGet, reqURL, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req.Header.Add("authorization", "Bearer "+jwtToken.AccessToken)
|
|
req.Header.Add("content-type", "application/json")
|
|
|
|
res, err := am.httpClient.Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
body, err := io.ReadAll(res.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var userData UserData
|
|
err = json.Unmarshal(body, &userData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
defer func() {
|
|
err = res.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing update user app metadata response body: %v", err)
|
|
}
|
|
}()
|
|
|
|
if res.StatusCode != 200 {
|
|
return nil, fmt.Errorf("unable to get UserData, statusCode %d", res.StatusCode)
|
|
}
|
|
|
|
return &userData, nil
|
|
}
|
|
|
|
// UpdateUserAppMetadata updates user app metadata based on userId and metadata map
|
|
func (am *Auth0Manager) UpdateUserAppMetadata(userID string, appMetadata AppMetadata) error {
|
|
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
reqURL := am.authIssuer + "/api/v2/users/" + userID
|
|
|
|
data, err := am.helper.Marshal(map[string]any{"app_metadata": appMetadata})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
payload := strings.NewReader(string(data))
|
|
|
|
req, err := http.NewRequest("PATCH", reqURL, payload)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
req.Header.Add("authorization", "Bearer "+jwtToken.AccessToken)
|
|
req.Header.Add("content-type", "application/json")
|
|
|
|
log.Debugf("updating IdP metadata for user %s", userID)
|
|
|
|
res, err := am.httpClient.Do(req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer func() {
|
|
err = res.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing update user app metadata response body: %v", err)
|
|
}
|
|
}()
|
|
|
|
if res.StatusCode != 200 {
|
|
return fmt.Errorf("unable to update the appMetadata, statusCode %d", res.StatusCode)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func buildCreateUserRequestPayload(email string, name string, accountID string) (string, error) {
|
|
invite := true
|
|
req := &createUserRequest{
|
|
Email: email,
|
|
Name: name,
|
|
AppMeta: AppMetadata{
|
|
WTAccountID: accountID,
|
|
WTPendingInvite: &invite,
|
|
},
|
|
Connection: "Username-Password-Authentication",
|
|
Password: GeneratePassword(8, 1, 1, 1),
|
|
VerifyEmail: true,
|
|
}
|
|
|
|
str, err := json.Marshal(req)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return string(str), nil
|
|
}
|
|
|
|
func buildUserExportRequest() (string, error) {
|
|
req := &userExportJobRequest{}
|
|
fields := make([]map[string]string, 0)
|
|
|
|
for _, field := range []string{"created_at", "last_login", "user_id", "email", "name"} {
|
|
fields = append(fields, map[string]string{"name": field})
|
|
}
|
|
|
|
fields = append(fields, map[string]string{
|
|
"name": "app_metadata.wt_account_id",
|
|
"export_as": "wt_account_id",
|
|
})
|
|
|
|
fields = append(fields, map[string]string{
|
|
"name": "app_metadata.wt_pending_invite",
|
|
"export_as": "wt_pending_invite",
|
|
})
|
|
|
|
req.Format = "json"
|
|
req.Fields = fields
|
|
|
|
str, err := json.Marshal(req)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return string(str), nil
|
|
}
|
|
|
|
func (am *Auth0Manager) createPostRequest(endpoint string, payloadStr string) (*http.Request, error) {
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
reqURL := am.authIssuer + endpoint
|
|
|
|
payload := strings.NewReader(payloadStr)
|
|
|
|
req, err := http.NewRequest("POST", reqURL, payload)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req.Header.Add("authorization", "Bearer "+jwtToken.AccessToken)
|
|
req.Header.Add("content-type", "application/json")
|
|
|
|
return req, nil
|
|
|
|
}
|
|
|
|
// GetAllAccounts gets all registered accounts with corresponding user data.
|
|
// It returns a list of users indexed by accountID.
|
|
func (am *Auth0Manager) GetAllAccounts() (map[string][]*UserData, error) {
|
|
payloadString, err := buildUserExportRequest()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
exportJobReq, err := am.createPostRequest("/api/v2/jobs/users-exports", payloadString)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
jobResp, err := am.httpClient.Do(exportJobReq)
|
|
if err != nil {
|
|
log.Debugf("Couldn't get job response %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
defer func() {
|
|
err = jobResp.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing update user app metadata response body: %v", err)
|
|
}
|
|
}()
|
|
if jobResp.StatusCode != 200 {
|
|
return nil, fmt.Errorf("unable to update the appMetadata, statusCode %d", jobResp.StatusCode)
|
|
}
|
|
|
|
var exportJobResp userExportJobResponse
|
|
|
|
body, err := io.ReadAll(jobResp.Body)
|
|
if err != nil {
|
|
log.Debugf("Coudln't read export job response; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
err = am.helper.Unmarshal(body, &exportJobResp)
|
|
if err != nil {
|
|
log.Debugf("Coudln't unmarshal export job response; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
if exportJobResp.ID == "" {
|
|
return nil, fmt.Errorf("couldn't get an batch id status %d, %s, response body: %v", jobResp.StatusCode, jobResp.Status, exportJobResp)
|
|
}
|
|
|
|
log.Debugf("batch id status %d, %s, response body: %v", jobResp.StatusCode, jobResp.Status, exportJobResp)
|
|
|
|
done, downloadLink, err := am.checkExportJobStatus(exportJobResp.ID)
|
|
if err != nil {
|
|
log.Debugf("Failed at getting status checks from exportJob; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
if done {
|
|
return am.downloadProfileExport(downloadLink)
|
|
}
|
|
|
|
return nil, fmt.Errorf("failed extracting user profiles from auth0")
|
|
}
|
|
|
|
// GetUserByEmail searches users with a given email. If no users have been found, this function returns an empty list.
|
|
// This function can return multiple users. This is due to the Auth0 internals - there could be multiple users with
|
|
// the same email but different connections that are considered as separate accounts (e.g., Google and username/password).
|
|
func (am *Auth0Manager) GetUserByEmail(email string) ([]*UserData, error) {
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
reqURL := am.authIssuer + "/api/v2/users-by-email?email=" + url.QueryEscape(email)
|
|
body, err := doGetReq(am.httpClient, reqURL, jwtToken.AccessToken)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
userResp := []*UserData{}
|
|
|
|
err = am.helper.Unmarshal(body, &userResp)
|
|
if err != nil {
|
|
log.Debugf("Coudln't unmarshal export job response; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
return userResp, nil
|
|
}
|
|
|
|
// CreateUser creates a new user in Auth0 Idp and sends an invite
|
|
func (am *Auth0Manager) CreateUser(email string, name string, accountID string) (*UserData, error) {
|
|
|
|
payloadString, err := buildCreateUserRequestPayload(email, name, accountID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req, err := am.createPostRequest("/api/v2/users", payloadString)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
resp, err := am.httpClient.Do(req)
|
|
if err != nil {
|
|
log.Debugf("Couldn't get job response %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
defer func() {
|
|
err = resp.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing create user response body: %v", err)
|
|
}
|
|
}()
|
|
if !(resp.StatusCode == 200 || resp.StatusCode == 201) {
|
|
return nil, fmt.Errorf("unable to create user, statusCode %d", resp.StatusCode)
|
|
}
|
|
|
|
var createResp UserData
|
|
|
|
body, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
log.Debugf("Coudln't read export job response; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
err = am.helper.Unmarshal(body, &createResp)
|
|
if err != nil {
|
|
log.Debugf("Coudln't unmarshal export job response; %v", err)
|
|
return nil, err
|
|
}
|
|
|
|
if createResp.ID == "" {
|
|
return nil, fmt.Errorf("couldn't create user: response %v", resp)
|
|
}
|
|
|
|
log.Debugf("created user %s in account %s", createResp.ID, accountID)
|
|
|
|
return &createResp, nil
|
|
}
|
|
|
|
// checkExportJobStatus checks the status of the job created at CreateExportUsersJob.
|
|
// If the status is "completed", then return the downloadLink
|
|
func (am *Auth0Manager) checkExportJobStatus(jobID string) (bool, string, error) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), 90*time.Second)
|
|
defer cancel()
|
|
retry := time.NewTicker(10 * time.Second)
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Debugf("Export job status stopped...\n")
|
|
return false, "", ctx.Err()
|
|
case <-retry.C:
|
|
jwtToken, err := am.credentials.Authenticate()
|
|
if err != nil {
|
|
return false, "", err
|
|
}
|
|
|
|
statusURL := am.authIssuer + "/api/v2/jobs/" + jobID
|
|
body, err := doGetReq(am.httpClient, statusURL, jwtToken.AccessToken)
|
|
if err != nil {
|
|
return false, "", err
|
|
}
|
|
|
|
var status userExportJobStatusResponse
|
|
err = am.helper.Unmarshal(body, &status)
|
|
if err != nil {
|
|
return false, "", err
|
|
}
|
|
|
|
log.Debugf("current export job status is %v", status.Status)
|
|
|
|
if status.Status != "completed" {
|
|
continue
|
|
}
|
|
|
|
return true, status.Location, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
// downloadProfileExport downloads user profiles from auth0 batch job
|
|
func (am *Auth0Manager) downloadProfileExport(location string) (map[string][]*UserData, error) {
|
|
body, err := doGetReq(am.httpClient, location, "")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
bodyReader := bytes.NewReader(body)
|
|
|
|
gzipReader, err := gzip.NewReader(bodyReader)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
decoder := json.NewDecoder(gzipReader)
|
|
|
|
res := make(map[string][]*UserData)
|
|
for decoder.More() {
|
|
profile := auth0Profile{}
|
|
err = decoder.Decode(&profile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if profile.AccountID != "" {
|
|
if _, ok := res[profile.AccountID]; !ok {
|
|
res[profile.AccountID] = []*UserData{}
|
|
}
|
|
res[profile.AccountID] = append(res[profile.AccountID],
|
|
&UserData{
|
|
ID: profile.UserID,
|
|
Name: profile.Name,
|
|
Email: profile.Email,
|
|
AppMetadata: AppMetadata{
|
|
WTAccountID: profile.AccountID,
|
|
WTPendingInvite: &profile.PendingInvite,
|
|
},
|
|
})
|
|
}
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
// Boilerplate implementation for Get Requests.
|
|
func doGetReq(client ManagerHTTPClient, url, accessToken string) ([]byte, error) {
|
|
req, err := http.NewRequest("GET", url, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if accessToken != "" {
|
|
req.Header.Add("authorization", "Bearer "+accessToken)
|
|
}
|
|
|
|
res, err := client.Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
defer func() {
|
|
err = res.Body.Close()
|
|
if err != nil {
|
|
log.Errorf("error while closing body for url %s: %v", url, err)
|
|
}
|
|
}()
|
|
body, err := io.ReadAll(res.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if res.StatusCode != 200 {
|
|
return nil, fmt.Errorf("unable to get %s, statusCode %d", url, res.StatusCode)
|
|
}
|
|
return body, nil
|
|
}
|