Skip to content

Commit 918b1f5

Browse files
committed
chore: fixup old references
1 parent 2c7a773 commit 918b1f5

File tree

8 files changed

+15
-21
lines changed

8 files changed

+15
-21
lines changed

coderd/coderdtest/oidctest/helper.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ package oidctest
33
import (
44
"context"
55
"database/sql"
6-
"encoding/json"
76
"net/http"
87
"net/url"
98
"testing"
@@ -89,7 +88,7 @@ func (*LoginHelper) ExpireOauthToken(t *testing.T, db database.Store, user *code
8988
OAuthExpiry: time.Now().Add(time.Hour * -1),
9089
UserID: link.UserID,
9190
LoginType: link.LoginType,
92-
DebugContext: json.RawMessage("{}"),
91+
Claims: database.UserLinkClaims{},
9392
})
9493
require.NoError(t, err, "expire user link")
9594

coderd/database/dbgen/dbgen.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -726,7 +726,7 @@ func UserLink(t testing.TB, db database.Store, orig database.UserLink) database.
726726
OAuthRefreshToken: takeFirst(orig.OAuthRefreshToken, uuid.NewString()),
727727
OAuthRefreshTokenKeyID: takeFirst(orig.OAuthRefreshTokenKeyID, sql.NullString{}),
728728
OAuthExpiry: takeFirst(orig.OAuthExpiry, dbtime.Now().Add(time.Hour*24)),
729-
DebugContext: takeFirstSlice(orig.DebugContext, json.RawMessage("{}")),
729+
Claims: orig.Claims,
730730
})
731731

732732
require.NoError(t, err, "insert link")

coderd/database/dbmem/dbmem.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7857,7 +7857,7 @@ func (q *FakeQuerier) InsertUserLink(_ context.Context, args database.InsertUser
78577857
OAuthRefreshToken: args.OAuthRefreshToken,
78587858
OAuthRefreshTokenKeyID: args.OAuthRefreshTokenKeyID,
78597859
OAuthExpiry: args.OAuthExpiry,
7860-
DebugContext: args.DebugContext,
7860+
Claims: args.Claims,
78617861
}
78627862

78637863
q.userLinks = append(q.userLinks, link)
@@ -9318,7 +9318,7 @@ func (q *FakeQuerier) UpdateUserLink(_ context.Context, params database.UpdateUs
93189318
link.OAuthRefreshToken = params.OAuthRefreshToken
93199319
link.OAuthRefreshTokenKeyID = params.OAuthRefreshTokenKeyID
93209320
link.OAuthExpiry = params.OAuthExpiry
9321-
link.DebugContext = params.DebugContext
9321+
link.Claims = params.Claims
93229322

93239323
q.userLinks[i] = link
93249324
return link, nil

coderd/httpmw/apikey.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ func ExtractAPIKey(rw http.ResponseWriter, r *http.Request, cfg ExtractAPIKeyCon
377377
OAuthExpiry: link.OAuthExpiry,
378378
// Refresh should keep the same debug context because we use
379379
// the original claims for the group/role sync.
380-
DebugContext: link.DebugContext,
380+
Claims: link.Claims,
381381
})
382382
if err != nil {
383383
return write(http.StatusInternalServerError, codersdk.Response{

coderd/provisionerdserver/provisionerdserver.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2083,7 +2083,7 @@ func obtainOIDCAccessToken(ctx context.Context, db database.Store, oidcConfig pr
20832083
OAuthRefreshToken: link.OAuthRefreshToken,
20842084
OAuthRefreshTokenKeyID: sql.NullString{}, // set by dbcrypt if required
20852085
OAuthExpiry: link.OAuthExpiry,
2086-
DebugContext: link.DebugContext,
2086+
Claims: link.Claims,
20872087
})
20882088
if err != nil {
20892089
return "", xerrors.Errorf("update user link: %w", err)

coderd/userauth.go

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ package coderd
33
import (
44
"context"
55
"database/sql"
6-
"encoding/json"
76
"errors"
87
"fmt"
98
"net/http"
@@ -966,7 +965,7 @@ func (api *API) userOAuth2Github(rw http.ResponseWriter, r *http.Request) {
966965
Username: username,
967966
AvatarURL: ghUser.GetAvatarURL(),
968967
Name: normName,
969-
DebugContext: OauthDebugContext{},
968+
UserClaims: database.UserLinkClaims{},
970969
GroupSync: idpsync.GroupParams{
971970
SyncEntitled: false,
972971
},
@@ -1324,7 +1323,7 @@ func (api *API) userOIDC(rw http.ResponseWriter, r *http.Request) {
13241323
OrganizationSync: orgSync,
13251324
GroupSync: groupSync,
13261325
RoleSync: roleSync,
1327-
DebugContext: OauthDebugContext{
1326+
UserClaims: database.UserLinkClaims{
13281327
IDTokenClaims: idtokenClaims,
13291328
UserInfoClaims: userInfoClaims,
13301329
},
@@ -1421,7 +1420,9 @@ type oauthLoginParams struct {
14211420
GroupSync idpsync.GroupParams
14221421
RoleSync idpsync.RoleParams
14231422

1424-
DebugContext OauthDebugContext
1423+
// UserClaims should only be populated for OIDC logins.
1424+
// It is used to save the user's claims on login.
1425+
UserClaims database.UserLinkClaims
14251426

14261427
commitLock sync.Mutex
14271428
initAuditRequest func(params *audit.RequestParams) *audit.Request[database.User]
@@ -1591,11 +1592,6 @@ func (api *API) oauthLogin(r *http.Request, params *oauthLoginParams) ([]*http.C
15911592
dormantConvertAudit.New = user
15921593
}
15931594

1594-
debugContext, err := json.Marshal(params.DebugContext)
1595-
if err != nil {
1596-
return xerrors.Errorf("marshal debug context: %w", err)
1597-
}
1598-
15991595
if link.UserID == uuid.Nil {
16001596
//nolint:gocritic // System needs to insert the user link (linked_id, oauth_token, oauth_expiry).
16011597
link, err = tx.InsertUserLink(dbauthz.AsSystemRestricted(ctx), database.InsertUserLinkParams{
@@ -1607,7 +1603,7 @@ func (api *API) oauthLogin(r *http.Request, params *oauthLoginParams) ([]*http.C
16071603
OAuthRefreshToken: params.State.Token.RefreshToken,
16081604
OAuthRefreshTokenKeyID: sql.NullString{}, // set by dbcrypt if required
16091605
OAuthExpiry: params.State.Token.Expiry,
1610-
DebugContext: debugContext,
1606+
Claims: params.UserClaims,
16111607
})
16121608
if err != nil {
16131609
return xerrors.Errorf("insert user link: %w", err)
@@ -1624,7 +1620,7 @@ func (api *API) oauthLogin(r *http.Request, params *oauthLoginParams) ([]*http.C
16241620
OAuthRefreshToken: params.State.Token.RefreshToken,
16251621
OAuthRefreshTokenKeyID: sql.NullString{}, // set by dbcrypt if required
16261622
OAuthExpiry: params.State.Token.Expiry,
1627-
DebugContext: debugContext,
1623+
Claims: params.UserClaims,
16281624
})
16291625
if err != nil {
16301626
return xerrors.Errorf("update user link: %w", err)

coderd/userauth_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -843,7 +843,7 @@ func TestUserOAuth2Github(t *testing.T) {
843843
OAuthAccessToken: "random",
844844
OAuthRefreshToken: "random",
845845
OAuthExpiry: time.Now(),
846-
DebugContext: []byte(`{}`),
846+
Claims: database.UserLinkClaims{},
847847
})
848848
require.ErrorContains(t, err, "Cannot create user_link for deleted user")
849849

coderd/users.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,7 @@ func (api *API) userDebugOIDC(rw http.ResponseWriter, r *http.Request) {
7070
return
7171
}
7272

73-
// This will encode properly because it is a json.RawMessage.
74-
httpapi.Write(ctx, rw, http.StatusOK, link.DebugContext)
73+
httpapi.Write(ctx, rw, http.StatusOK, link.Claims)
7574
}
7675

7776
// Returns whether the initial user has been created or not.

0 commit comments

Comments
 (0)