diff --git a/Makefile b/Makefile index 35ba469..1e19e7a 100644 --- a/Makefile +++ b/Makefile @@ -7,6 +7,7 @@ SOURCES = \ admin.go \ api.go \ auth.go \ + common/authmethod.go \ common/cycle.go \ common/logger.go \ common/movie.go \ @@ -23,6 +24,7 @@ SOURCES = \ templates.go \ user.go \ util.go \ + oauth.go \ votes.go .PHONY: all data fmt server diff --git a/admin.go b/admin.go index d377551..492cefc 100644 --- a/admin.go +++ b/admin.go @@ -95,13 +95,14 @@ func (s *Server) adminDeleteUser(w http.ResponseWriter, r *http.Request, user *c s.l.Info("Deleting user %s", user) origName := user.Name user.Name = "[deleted]" - user.Password = "" - user.PassDate = time.Now() + for _, auth := range user.AuthMethods { + s.data.DeleteAuthMethod(auth.Id) + } + user.AuthMethods = []*common.AuthMethod{} user.Email = "" user.NotifyCycleEnd = false user.NotifyVoteSelection = false user.Privilege = 0 - user.RateLimitOverride = false err := s.data.UpdateUser(user) if err != nil { @@ -387,6 +388,20 @@ func (s *Server) handlerAdminConfig(w http.ResponseWriter, r *http.Request) { configValue{Key: ConfigMaxRemarksLength, Default: DefaultMaxRemarksLength, Type: ConfigInt}, configValue{Key: ConfigUnlimitedVotes, Default: DefaultUnlimitedVotes, Type: ConfigBool}, + + configValue{Key: ConfigLocalSignupEnabled, Default: DefaultLocalSignupEnabled, Type: ConfigBool}, + configValue{Key: ConfigTwitchOauthEnabled, Default: DefaultTwitchOauthEnabled, Type: ConfigBool}, + configValue{Key: ConfigTwitchOauthSignupEnabled, Default: DefaultTwitchOauthSignupEnabled, Type: ConfigBool}, + configValue{Key: ConfigTwitchOauthClientID, Default: DefaultTwitchOauthClientID, Type: ConfigString}, + configValue{Key: ConfigTwitchOauthClientSecret, Default: DefaultTwitchOauthClientSecret, Type: ConfigString}, + configValue{Key: ConfigDiscordOauthEnabled, Default: DefaultDiscordOauthEnabled, Type: ConfigBool}, + configValue{Key: ConfigDiscordOauthSignupEnabled, Default: DefaultDiscordOauthSignupEnabled, Type: ConfigBool}, + configValue{Key: ConfigDiscordOauthClientID, Default: DefaultDiscordOauthClientID, Type: ConfigString}, + configValue{Key: ConfigDiscordOauthClientSecret, Default: DefaultDiscordOauthClientSecret, Type: ConfigString}, + configValue{Key: ConfigPatreonOauthEnabled, Default: DefaultPatreonOauthEnabled, Type: ConfigBool}, + configValue{Key: ConfigPatreonOauthSignupEnabled, Default: DefaultPatreonOauthSignupEnabled, Type: ConfigBool}, + configValue{Key: ConfigPatreonOauthClientID, Default: DefaultPatreonOauthClientID, Type: ConfigString}, + configValue{Key: ConfigPatreonOauthClientSecret, Default: DefaultPatreonOauthClientSecret, Type: ConfigString}, }, TypeString: ConfigString, @@ -491,6 +506,79 @@ func (s *Server) handlerAdminConfig(w http.ResponseWriter, r *http.Request) { // Set this down here so the Notice Banner is updated data.dataPageBase = s.newPageBase("Admin - Config", w, r) + // Reload Oauth + err = s.initOauth() + + if err != nil { + data.ErrorMessage = append(data.ErrorMessage, err.Error()) + } + + // getting ALL the booleans + var localSignup, twitchSignup, patreonSignup, discordSignup, twitchOauth, patreonOauth, discordOauth bool + + for _, val := range data.Values { + bval, ok := val.Value.(bool) + if !ok && val.Type == ConfigBool { + data.ErrorMessage = append(data.ErrorMessage, "Could not parse field %s as boolean", val.Key) + break + } + switch val.Key { + case ConfigLocalSignupEnabled: + localSignup = bval + case ConfigTwitchOauthSignupEnabled: + twitchSignup = bval + case ConfigTwitchOauthEnabled: + twitchOauth = bval + case ConfigDiscordOauthSignupEnabled: + discordSignup = bval + case ConfigDiscordOauthEnabled: + discordOauth = bval + case ConfigPatreonOauthSignupEnabled: + patreonSignup = bval + case ConfigPatreonOauthEnabled: + patreonOauth = bval + } + } + + // Check that we have atleast ONE signup method enabled + if !(localSignup || twitchSignup || discordSignup || patreonSignup) { + data.ErrorMessage = append(data.ErrorMessage, "No Signup method is currently enabled, please ensure to enable atleast one method") + } + + // Check that the corresponding oauth for the signup is enabled + if twitchSignup && !twitchOauth { + data.ErrorMessage = append(data.ErrorMessage, "To enable twitch signup you need to also enable twitch Oauth (and fill the token/secret)") + } + + if discordSignup && !discordOauth { + data.ErrorMessage = append(data.ErrorMessage, "To enable discord signup you need to also enable discord Oauth (and fill the token/secret)") + } + + if patreonSignup && !patreonOauth { + data.ErrorMessage = append(data.ErrorMessage, "To enable patreon signup you need to also enable patreon Oauth (and fill the token/secret)") + } + + users, err := s.data.GetUsersWithAuth(common.AUTH_TWITCH, true) + if err, ok := err.(*common.ErrNoUsersFound); !ok || err == nil { + if (len(users) != 0) && !twitchOauth { + data.ErrorMessage = append(data.ErrorMessage, fmt.Sprintf("Disabling Twitch Oauth would cause %d users to be unable to login since they only have this auth method associated.", len(users))) + } + } + + users, err = s.data.GetUsersWithAuth(common.AUTH_PATREON, true) + if err, ok := err.(*common.ErrNoUsersFound); !ok || err == nil { + if (len(users) != 0) && !patreonOauth { + data.ErrorMessage = append(data.ErrorMessage, fmt.Sprintf("Disabling Patreon Oauth would cause %d users to be unable to login since they only have this auth method associated.", len(users))) + } + } + + users, err = s.data.GetUsersWithAuth(common.AUTH_DISCORD, true) + if err, ok := err.(*common.ErrNoUsersFound); !ok || err == nil { + if (len(users) != 0) && !discordOauth { + data.ErrorMessage = append(data.ErrorMessage, fmt.Sprintf("Disabling Discord Oauth would cause %d users to be unable to login since they only have this auth method associated.", len(users))) + } + } + if err := s.executeTemplate(w, "adminConfig", data); err != nil { s.l.Error("Error rendering template: %v", err) } diff --git a/auth.go b/auth.go index 3f4aac4..2c09d50 100644 --- a/auth.go +++ b/auth.go @@ -4,7 +4,6 @@ import ( "fmt" "net/http" "regexp" - //"strconv" "strings" "time" @@ -120,16 +119,24 @@ func (s *Server) handlerAuth(w http.ResponseWriter, r *http.Request) { return } - user.Password = s.hashPassword(pass1) - user.PassDate = time.Now() + var localAuth *common.AuthMethod + for _, auth := range user.AuthMethods { + if auth.Type == common.AUTH_LOCAL { + localAuth = auth + break + } + } + + localAuth.Password = s.hashPassword(pass1) + localAuth.Date = time.Now() - if err = s.data.UpdateUser(user); err != nil { - s.l.Error("Unable to save User with new password:", err) + if err = s.data.UpdateAuthMethod(localAuth); err != nil { + s.l.Error("Unable to save AuthMethod with new password:", err) s.doError(http.StatusInternalServerError, "Unable to update password", w, r) return } - if err = s.login(user, w, r); err != nil { + if err = s.login(user, common.AUTH_LOCAL, w, r); err != nil { s.l.Error("Unable to login to session:", err) s.doError(http.StatusInternalServerError, "Something went wrong :C", w, r) return diff --git a/cmd/migrateUsers.go b/cmd/migrateUsers.go new file mode 100644 index 0000000..349fca2 --- /dev/null +++ b/cmd/migrateUsers.go @@ -0,0 +1,131 @@ +package main + +import ( + "encoding/json" + "fmt" + "io/ioutil" + "os" + "time" + + "github.com/mitchellh/mapstructure" + mpc "github.com/zorchenhimer/MoviePolls/common" + mpd "github.com/zorchenhimer/MoviePolls/data" +) + +const jsonFilename string = "db/data.json" + +func main() { + err := loadOldDB() + if err != nil { + fmt.Printf("%v\n", err) + } +} + +type OldUser struct { + Id int + Name string + Password string + OAuthToken string + Email string + NotifyCycleEnd bool + NotifyVoteSelection bool + Privilege int + PassDate time.Time + RateLimitOverride bool + LastMovieAdd time.Time +} + +func loadOldDB() error { + + data, err := ioutil.ReadFile(jsonFilename) + if err != nil { + fmt.Println(err) + } + + var fullData map[string]interface{} + + json.Unmarshal(data, &fullData) + + // fullData now contains the whole db + jUsers := fullData["Users"].(map[string]interface{}) + oldUsers := []OldUser{} + for _, user := range jUsers { + ou := &OldUser{} + mapstructure.Decode(user, &ou) + // lets parse the fucking time by hand + if user.(map[string]interface{})["PassDate"] == nil { + fmt.Println("[ERROR] Could not parse field 'PassDate', was the database already converted?") + return nil + } + ou.PassDate, err = time.Parse(time.RFC3339, user.(map[string]interface{})["PassDate"].(string)) + if err != nil { + fmt.Println("[ERROR] Could not parse field 'PassDate', was the database already converted?") + return nil + } + oldUsers = append(oldUsers, *ou) + } + + delete(fullData, "Users") + + data, err = json.MarshalIndent(fullData, "", " ") + + // write a temporary file which contains the db without the "users" + err = ioutil.WriteFile("db/temp.json", data, 0666) + if err != nil { + return err + } + + l, err := mpc.NewLogger(mpc.LLDebug, "") + + if err != nil { + return err + } + + dc, err := mpd.GetDataConnector("json", "db/temp.json", l) + + if err != nil { + return err + } + + for _, oldUser := range oldUsers { + + // convert old movies to new ones + newUser := mpc.User{ + Id: oldUser.Id, + Name: oldUser.Name, + Email: oldUser.Email, + NotifyCycleEnd: oldUser.NotifyCycleEnd, + NotifyVoteSelection: oldUser.NotifyVoteSelection, + Privilege: mpc.PrivilegeLevel(oldUser.Privilege), + } + + // Do NOT build new entries for users with empty passwords (i.e. Deleted users) + if oldUser.Password != "" { + authMethod := &mpc.AuthMethod{ + Type: mpc.AUTH_LOCAL, + Password: oldUser.Password, + Date: oldUser.PassDate, + } + + newUser.AuthMethods = []*mpc.AuthMethod{} + + id, err := dc.AddAuthMethod(authMethod) + + if err != nil { + return err + } + + authMethod.Id = id + + newUser.AuthMethods = append(newUser.AuthMethods, authMethod) + } + dc.UpdateUser(&newUser) + } + + err = os.Rename("db/temp.json", jsonFilename) + if err != nil { + return err + } + + return nil +} diff --git a/common/authmethod.go b/common/authmethod.go new file mode 100644 index 0000000..a2d943c --- /dev/null +++ b/common/authmethod.go @@ -0,0 +1,22 @@ +package common + +import "time" + +type AuthType string + +const ( + AUTH_DISCORD = "Discord" + AUTH_TWITCH = "Twitch" + AUTH_PATREON = "Patreon" + AUTH_LOCAL = "Local" +) + +type AuthMethod struct { + Id int + ExtId string + Type AuthType + Password string + AuthToken string + RefreshToken string + Date time.Time +} diff --git a/common/error.go b/common/error.go new file mode 100644 index 0000000..bf9131b --- /dev/null +++ b/common/error.go @@ -0,0 +1,13 @@ +package common + +import ( + "fmt" +) + +type ErrNoUsersFound struct { + Auth AuthType +} + +func (e *ErrNoUsersFound) Error() string { + return fmt.Sprintf("No users found with AuthType %v", e.Auth) +} diff --git a/common/user.go b/common/user.go index 1f5bedd..a3773b7 100644 --- a/common/user.go +++ b/common/user.go @@ -2,7 +2,6 @@ package common import ( "fmt" - "time" ) type PrivilegeLevel int @@ -14,21 +13,15 @@ const ( ) type User struct { - Id int - Name string - Password string - OAuthToken string - Email string // nil if user didn't opt-in. + Id int + Name string + Email string // nil if user didn't opt-in. NotifyCycleEnd bool NotifyVoteSelection bool Privilege PrivilegeLevel - PassDate time.Time - - // Does this user ignore rate limit? (default true for mod/admin) - RateLimitOverride bool - LastMovieAdd time.Time + AuthMethods []*AuthMethod } func (u User) CheckPriv(lvl string) bool { @@ -50,15 +43,23 @@ func (u User) IsMod() bool { return u.Privilege >= PRIV_ADMIN } +func (u User) GetAuthMethod(method AuthType) (*AuthMethod, error) { + for _, auth := range u.AuthMethods { + if auth.Type == method { + return auth, nil + } + } + return nil, fmt.Errorf("No AuthMethod with type %s found for user %s.", method, u.Name) +} + func (u User) String() string { return fmt.Sprintf( - "User{Id:%d Name:%q Email:%q NotifyCycleEnd:%t NotifyVoteSelection:%t Privilege:%d PassDate:%s}", + "User{Id:%d Name:%q Email:%q NotifyCycleEnd:%t NotifyVoteSelection:%t Privilege:%d}", u.Id, u.Name, u.Email, u.NotifyCycleEnd, u.NotifyVoteSelection, u.Privilege, - u.PassDate, ) } diff --git a/data/connector.go b/data/connector.go index a125729..7e99f9d 100644 --- a/data/connector.go +++ b/data/connector.go @@ -29,25 +29,38 @@ func register(backend string, initFunc constructor) { } type DataConnector interface { - GetCurrentCycle() (*common.Cycle, error) // Return nil when no cycle is active. + + // ################## + // ##### CREATE ##### + // ################## + + // TODO: remove AddCycle() + AddCycle(plannedEnd *time.Time) (int, error) + AddOldCycle(cycle *common.Cycle) (int, error) + AddMovie(movie *common.Movie) (int, error) + AddUser(user *common.User) (int, error) + AddTag(tag *common.Tag) (int, error) + AddAuthMethod(authMethod *common.AuthMethod) (int, error) + AddLink(link *common.Link) (int, error) + AddVote(userId, movieId int) error + + // ###################### + // ##### READ (get) ##### + // ###################### GetCycle(id int) (*common.Cycle, error) + GetCurrentCycle() (*common.Cycle, error) // Return nil when no cycle is active. GetMovie(id int) (*common.Movie, error) - GetUser(id int) (*common.User, error) GetActiveMovies() ([]*common.Movie, error) - GetTag(id int) *common.Tag - GetLink(id int) *common.Link - - SearchMovieTitles(query string) ([]*common.Movie, error) - FindTag(name string) (int, error) - FindLink(url string) (int, error) - + GetUser(id int) (*common.User, error) + GetUsers(start, count int) ([]*common.User, error) GetUserVotes(userId int) ([]*common.Movie, error) GetUserMovies(userId int) ([]*common.Movie, error) - + GetUsersWithAuth(auth common.AuthType, exclusive bool) ([]*common.User, error) //GetMovieVotes(userId int) []*Movie - UserLogin(name, hashedPw string) (*common.User, error) - + GetTag(id int) *common.Tag + GetAuthMethod(id int) *common.AuthMethod + GetLink(id int) *common.Link // Return a list of past cycles. Start and end are an offset from // the current. Ie, a start of 0 and an end of 5 will get the last // finished cycle and the four preceding it. Currently active cycle will @@ -57,37 +70,55 @@ type DataConnector interface { // Get all the movies that belong to the given Cycle GetMoviesFromCycle(id int) ([]*common.Movie, error) - // TODO: remove AddCycle() - AddCycle(plannedEnd *time.Time) (int, error) - AddOldCycle(cycle *common.Cycle) (int, error) - AddMovie(movie *common.Movie) (int, error) - AddUser(user *common.User) (int, error) - AddTag(tag *common.Tag) (int, error) - AddLink(link *common.Link) (int, error) + // ####################### + // ##### READ (find) ##### + // ####################### + + FindTag(name string) (int, error) + FindLink(url string) (int, error) + + // ################## + // ##### UPDATE ##### + // ################## + + UpdateUser(user *common.User) error + UpdateMovie(movie *common.Movie) error + UpdateCycle(cycle *common.Cycle) error + UpdateAuthMethod(authMethod *common.AuthMethod) error + + // ################## + // ##### DELETE ##### + // ################## - AddVote(userId, movieId int) error DeleteVote(userId, movieId int) error DeleteTag(tagId int) + DeleteAuthMethod(authMethodId int) DeleteLink(linkId int) + RemoveMovie(movieId int) error + // Delete a user and their associated votes. Should this include votes for + // past cycles or just the current? (currently removes all) + PurgeUser(userId int) error // Removes votes older than age DecayVotes(age int) error - UpdateUser(user *common.User) error - UpdateMovie(movie *common.Movie) error - UpdateCycle(cycle *common.Cycle) error + // ################ + // ##### MISC ##### + // ################ + + UserLocalLogin(name, hashedPw string) (*common.User, error) + UserDiscordLogin(extid string) (*common.User, error) + UserTwitchLogin(extid string) (*common.User, error) + UserPatreonLogin(extid string) (*common.User, error) + + CheckOauthUsage(id string, authtype common.AuthType) bool + + SearchMovieTitles(query string) ([]*common.Movie, error) CheckMovieExists(title string) (bool, error) CheckUserExists(name string) (bool, error) UserVotedForMovie(userId, movieId int) (bool, error) - // Admin stuff - GetUsers(start, count int) ([]*common.User, error) - // Delete a user and their associated votes. Should this include votes for - // past cycles or just the current? (currently removes all) - PurgeUser(userId int) error - RemoveMovie(movieId int) error - // Configuration stuff // The default value must be passed in. If no key is found, the default // value *is not* saved here. diff --git a/data/connectors_test.go b/data/connectors_test.go index 74ba9b8..f7999b0 100644 --- a/data/connectors_test.go +++ b/data/connectors_test.go @@ -171,7 +171,6 @@ func Test_AddUser(t *testing.T) { Privilege: common.PRIV_MOD, PassDate: passDate, RateLimitOverride: true, - LastMovieAdd: passDate.Add(time.Hour), } uid, err := conn.AddUser(testUser) diff --git a/data/helpers_test.go b/data/helpers_test.go index ced5405..8d704e7 100644 --- a/data/helpers_test.go +++ b/data/helpers_test.go @@ -130,9 +130,6 @@ func compareUsers(a, b *common.User, t *testing.T) { // t.Fatalf("RateLimitOverride mismatch: %t vs %t", user.RateLimitOverride, loggedIn.RateLimitOverride) //} - //if user.LastMovieAdd != loggedIn.LastMovieAdd { - // t.Fatalf("LastMovieAdd mismatch: %s vs %s", user.LastMovieAdd, loggedIn.LastMovieAdd) - //} } func compareMovies(a, b *common.Movie, t *testing.T) { diff --git a/data/json.go b/data/json.go index 7879af5..5db6d78 100644 --- a/data/json.go +++ b/data/json.go @@ -99,6 +99,41 @@ func (j *jsonConnector) newJsonMovie(movie *common.Movie) jsonMovie { return jm } +type jsonUser struct { + Id int + Name string + Email string + + NotifyCycleEnd bool + NotifyVoteSelection bool + Privilege int + + AuthMethods []int +} + +func (j *jsonConnector) newJsonUser(user *common.User) jsonUser { + authMethods := []int{} + if user.AuthMethods != nil { + for _, auth := range user.AuthMethods { + authMethods = append(authMethods, auth.Id) + } + } + + id := j.nextUserId() + + ju := jsonUser{ + Id: id, + Name: user.Name, + Email: user.Email, + NotifyCycleEnd: user.NotifyCycleEnd, + NotifyVoteSelection: user.NotifyVoteSelection, + Privilege: int(user.Privilege), + AuthMethods: authMethods, + } + + return ju +} + type jsonVote struct { UserId int MovieId int @@ -139,12 +174,13 @@ type jsonConnector struct { filename string `json:"-"` lock *sync.RWMutex - Cycles map[int]jsonCycle - Movies map[int]jsonMovie - Users map[int]*common.User - Votes []jsonVote - Tags map[int]*common.Tag - Links map[int]*common.Link + Cycles map[int]jsonCycle + Movies map[int]jsonMovie + Users map[int]jsonUser + Votes []jsonVote + Tags map[int]*common.Tag + Links map[int]*common.Link + AuthMethods map[int]*common.AuthMethod //Settings Configurator Settings map[string]configValue @@ -178,12 +214,13 @@ func newJsonConnector(filename string, l *common.Logger) (*jsonConnector, error) lock: &sync.RWMutex{}, Settings: map[string]configValue{}, - Cycles: map[int]jsonCycle{}, - Movies: map[int]jsonMovie{}, - Users: map[int]*common.User{}, - Tags: map[int]*common.Tag{}, - Links: map[int]*common.Link{}, - l: l, + Cycles: map[int]jsonCycle{}, + Movies: map[int]jsonMovie{}, + Users: map[int]jsonUser{}, + Tags: map[int]*common.Tag{}, + Links: map[int]*common.Link{}, + AuthMethods: map[int]*common.AuthMethod{}, + l: l, } return j, j.save() @@ -210,7 +247,7 @@ func loadJson(filename string, l *common.Logger) (*jsonConnector, error) { } if data.Users == nil { - data.Users = make(map[int]*common.User) + data.Users = make(map[int]jsonUser) } if data.Votes == nil { @@ -233,6 +270,10 @@ func loadJson(filename string, l *common.Logger) (*jsonConnector, error) { data.Links = make(map[int]*common.Link) } + if data.AuthMethods == nil { + data.AuthMethods = make(map[int]*common.AuthMethod) + } + return data, nil } @@ -548,6 +589,31 @@ func (j *jsonConnector) movieFromJson(jMovie jsonMovie) *common.Movie { return movie } +func (j *jsonConnector) userFromJson(jUser jsonUser) *common.User { + + authMethods := []*common.AuthMethod{} + + for _, id := range jUser.AuthMethods { + a, ok := j.AuthMethods[id] + if ok { + authMethods = append(authMethods, a) + } + } + + user := &common.User{ + Id: jUser.Id, + Name: jUser.Name, + Email: jUser.Email, + + NotifyCycleEnd: jUser.NotifyCycleEnd, + NotifyVoteSelection: jUser.NotifyVoteSelection, + AuthMethods: authMethods, + Privilege: common.PrivilegeLevel(jUser.Privilege), + } + + return user +} + func (j *jsonConnector) GetMoviesFromCycle(id int) ([]*common.Movie, error) { j.lock.RLock() defer j.lock.RUnlock() @@ -573,24 +639,100 @@ func (j *jsonConnector) GetMoviesFromCycle(id int) ([]*common.Movie, error) { } // UserLogin returns a user if the given username and password match a user. -func (j *jsonConnector) UserLogin(name, hashedPw string) (*common.User, error) { +func (j *jsonConnector) UserLocalLogin(name, hashedPw string) (*common.User, error) { j.lock.RLock() defer j.lock.RUnlock() - name = strings.ToLower(name) - for _, user := range j.Users { - if strings.ToLower(user.Name) == name { - if hashedPw == user.Password { - return user, nil + user := j.findUserByName(name) + + if user != nil { + for _, auth := range user.AuthMethods { + if auth.Type == "Local" { + if hashedPw == auth.Password { + return user, nil + } + j.l.Info("Bad password for user %s\n", name) + return nil, fmt.Errorf("Invalid login credentials") } - j.l.Info("Bad password for user %s\n", name) - return nil, fmt.Errorf("Invalid login credentials") } + } j.l.Info("User with name %s not found\n", name) return nil, fmt.Errorf("Invalid login credentials") } +func (j *jsonConnector) UserDiscordLogin(extid string) (*common.User, error) { + j.lock.Lock() + defer j.lock.Unlock() + + //TODO refreshing + + var id int + for _, auth := range j.AuthMethods { + if auth.ExtId == extid { + id = auth.Id + break + } + } + + for _, user := range j.Users { + for _, auth := range user.AuthMethods { + if auth == id { + return j.findUser(user.Id), nil + } + } + } + return nil, fmt.Errorf("No user found with corresponding extid") +} + +func (j *jsonConnector) UserTwitchLogin(extid string) (*common.User, error) { + j.lock.Lock() + defer j.lock.Unlock() + + //TODO refreshing + + var id int + for _, auth := range j.AuthMethods { + if auth.ExtId == extid { + id = auth.Id + break + } + } + + for _, user := range j.Users { + for _, auth := range user.AuthMethods { + if auth == id { + return j.findUser(user.Id), nil + } + } + } + return nil, fmt.Errorf("No user found with corresponding extid") +} + +func (j *jsonConnector) UserPatreonLogin(extid string) (*common.User, error) { + j.lock.Lock() + defer j.lock.Unlock() + + //TODO refreshing + + var id int + for _, auth := range j.AuthMethods { + if auth.ExtId == extid { + id = auth.Id + break + } + } + + for _, user := range j.Users { + for _, auth := range user.AuthMethods { + if auth == id { + return j.findUser(user.Id), nil + } + } + } + return nil, fmt.Errorf("No user found with corresponding extid") +} + // Get the total number of users func (j *jsonConnector) GetUserCount() int { j.lock.RLock() @@ -744,7 +886,7 @@ func (j *jsonConnector) AddUser(user *common.User) (int, error) { defer j.lock.Unlock() if j.Users == nil { - j.Users = map[int]*common.User{} + j.Users = map[int]jsonUser{} } if _, exists := j.Users[user.Id]; exists { @@ -758,10 +900,10 @@ func (j *jsonConnector) AddUser(user *common.User) (int, error) { } } - user.Id = j.nextUserId() + u := j.newJsonUser(user) + j.Users[u.Id] = u - j.Users[user.Id] = user - return user.Id, j.save() + return u.Id, j.save() } func (j *jsonConnector) AddVote(userId, movieId int) error { @@ -819,6 +961,18 @@ func (j *jsonConnector) AddTag(tag *common.Tag) (int, error) { return id, j.save() } +func (j *jsonConnector) AddAuthMethod(authMethod *common.AuthMethod) (int, error) { + j.lock.Lock() + defer j.lock.Unlock() + + id := j.nextAuthMethodId() + + authMethod.Id = id + + j.AuthMethods[id] = authMethod + return id, j.save() +} + func (j *jsonConnector) FindTag(name string) (int, error) { j.lock.RLock() defer j.lock.RUnlock() @@ -839,6 +993,27 @@ func (j *jsonConnector) GetTag(id int) *common.Tag { return j.Tags[id] } +func (j *jsonConnector) GetAuthMethod(id int) *common.AuthMethod { + j.lock.RLock() + defer j.lock.RUnlock() + return j.AuthMethods[id] +} + +func (j *jsonConnector) UpdateAuthMethod(authMethod *common.AuthMethod) error { + j.lock.Lock() + defer j.lock.Unlock() + + _, ok := j.AuthMethods[authMethod.Id] + + if !ok { + return fmt.Errorf("No AuthMethod with Id %d found.", authMethod.Id) + } + + j.l.Debug("Setting AuthMethod with ID %d to %v", authMethod.Id, authMethod) + + j.AuthMethods[authMethod.Id] = authMethod + return j.save() +} func (j *jsonConnector) DeleteTag(id int) { j.lock.Lock() defer j.lock.Unlock() @@ -846,6 +1021,15 @@ func (j *jsonConnector) DeleteTag(id int) { delete(j.Tags, id) } +func (j *jsonConnector) DeleteAuthMethod(id int) { + j.lock.Lock() + defer j.lock.Unlock() + + delete(j.AuthMethods, id) + + j.save() +} + func (j *jsonConnector) nextTagId() int { highest := 0 for _, t := range j.Tags { @@ -856,6 +1040,16 @@ func (j *jsonConnector) nextTagId() int { return highest + 1 } +func (j *jsonConnector) nextAuthMethodId() int { + highest := 0 + for _, a := range j.AuthMethods { + if a.Id >= highest { + highest = a.Id + } + } + return highest + 1 +} + func (j *jsonConnector) AddLink(link *common.Link) (int, error) { j.lock.Lock() defer j.lock.Unlock() @@ -1041,7 +1235,16 @@ func (j *jsonConnector) findVotes(movie *common.Movie) []*common.Vote { func (j *jsonConnector) findUser(id int) *common.User { for _, u := range j.Users { if u.Id == id { - return u + return j.userFromJson(u) + } + } + return nil +} + +func (j *jsonConnector) findUserByName(name string) *common.User { + for _, u := range j.Users { + if strings.ToLower(u.Name) == strings.ToLower(name) { + return j.userFromJson(u) } } return nil @@ -1052,8 +1255,9 @@ func (j *jsonConnector) findUser(id int) *common.User { func (j *jsonConnector) UpdateUser(user *common.User) error { j.lock.Lock() defer j.lock.Unlock() - - j.Users[user.Id] = user + jUser := j.newJsonUser(user) + jUser.Id = user.Id + j.Users[user.Id] = jUser return j.save() } @@ -1258,6 +1462,11 @@ func (j *jsonConnector) PurgeUser(userId int) error { count++ } } + + for _, auth := range j.findUser(userId).AuthMethods { + delete(j.AuthMethods, auth.Id) + } + j.Votes = newVotes j.l.Info("Purged %d votes", count) @@ -1356,3 +1565,46 @@ func (j *jsonConnector) Test_GetUserVotes(userId int) ([]*common.Vote, error) { } return votes, nil } + +func (j *jsonConnector) CheckOauthUsage(id string, authType common.AuthType) bool { + j.lock.Lock() + defer j.lock.Unlock() + + for _, auth := range j.AuthMethods { + if auth.Type == authType { + if auth.ExtId == id { + return true + } + } + } + return false +} + +func (j *jsonConnector) GetUsersWithAuth(auth common.AuthType, exclusive bool) ([]*common.User, error) { + j.lock.Lock() + defer j.lock.Unlock() + + res := []*common.User{} + + for _, juser := range j.Users { + user := j.userFromJson(juser) + for _, authMethod := range user.AuthMethods { + if authMethod.Type == auth { + // user has atleast this auth method + if exclusive { + if len(user.AuthMethods) == 1 { + // user has ONLY this auth method + res = append(res, user) + } + } else { + res = append(res, user) + } + + } + } + } + if len(res) == 0 { + return nil, &common.ErrNoUsersFound{auth} + } + return res, nil +} diff --git a/go.mod b/go.mod index 15066da..8b4200c 100644 --- a/go.mod +++ b/go.mod @@ -8,4 +8,5 @@ require ( github.com/mitchellh/mapstructure v1.3.3 github.com/nfnt/resize v0.0.0-20180221191011-83c6a9932646 github.com/rivo/uniseg v0.1.0 + golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43 ) diff --git a/go.sum b/go.sum index 8fb9047..dbe0317 100644 --- a/go.sum +++ b/go.sum @@ -1,13 +1,370 @@ +cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= +cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= +cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU= +cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU= +cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY= +cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc= +cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0= +cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To= +cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4= +cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M= +cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc= +cloud.google.com/go v0.56.0/go.mod h1:jr7tqZxxKOVYizybht9+26Z/gUq7tiRzu+ACVAMbKVk= +cloud.google.com/go v0.57.0/go.mod h1:oXiQ6Rzq3RAkkY7N6t3TcE6jE+CIBBbA36lwQ1JyzZs= +cloud.google.com/go v0.62.0/go.mod h1:jmCYTdRCQuc1PHIIJ/maLInMho30T/Y0M4hTdTShOYc= +cloud.google.com/go v0.65.0/go.mod h1:O5N8zS7uWy9vkA9vayVHs65eM1ubvY4h553ofrNHObY= +cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o= +cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE= +cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc= +cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg= +cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc= +cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ= +cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= +cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk= +cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I= +cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw= +cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA= +cloud.google.com/go/pubsub v1.3.1/go.mod h1:i+ucay31+CNRpDW4Lu78I4xXG+O1r/MAHgjpRVR+TSU= +cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw= +cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos= +cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk= +cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs= +cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0= +dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= +github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= +github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= +github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= +github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI= +github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI= +github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU= +github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= +github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc= +github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= +github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= +github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= +github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= +github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= +github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= +github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= +github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= github.com/go-sql-driver/mysql v1.4.1 h1:g24URVg0OFbNUTx9qqY1IRZ9D9z3iPyi5zKhQZpNwpA= github.com/go-sql-driver/mysql v1.4.1/go.mod h1:zAC/RDZ24gD3HViQzih4MyKcchzm+sOG5ZlKdlhCg5w= +github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= +github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= +github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= +github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y= +github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= +github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= +github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw= +github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71h+4= +github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= +github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= +github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= +github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= +github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= +github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk= +github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8= +github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA= +github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs= +github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w= +github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0= +github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8= +github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI= +github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= +github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= +github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= +github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= +github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= +github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/go-cmp v0.4.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/go-cmp v0.5.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= +github.com/google/martian/v3 v3.0.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0= +github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= +github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= +github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/pprof v0.0.0-20200708004538-1a94d8640e99/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= +github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI= +github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg= +github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk= github.com/gorilla/securecookie v1.1.1 h1:miw7JPhV+b/lAHSXz4qd/nN9jRiAFV5FwjeKyCS8BvQ= github.com/gorilla/securecookie v1.1.1/go.mod h1:ra0sb63/xPlUeL+yeDciTfxMRAA+MP+HVt/4epWDjd4= github.com/gorilla/sessions v1.2.0 h1:S7P+1Hm5V/AT9cjEcUD5uDaQSX0OE577aCXgoaKpYbQ= github.com/gorilla/sessions v1.2.0/go.mod h1:dk2InVEVJ0sfLlnXv9EAgkf6ecYs/i80K/zI+bUmuGM= +github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= +github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= +github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= +github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= +github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk= +github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= +github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= +github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= +github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= github.com/mitchellh/mapstructure v1.3.3 h1:SzB1nHZ2Xi+17FP0zVQBHIZqvwRN9408fJO8h+eeNA8= github.com/mitchellh/mapstructure v1.3.3/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo= github.com/nfnt/resize v0.0.0-20180221191011-83c6a9932646 h1:zYyBkD/k9seD2A7fsi6Oo2LfFZAehjjQMERAvZLEDnQ= github.com/nfnt/resize v0.0.0-20180221191011-83c6a9932646/go.mod h1:jpp1/29i3P1S/RLdc7JQKbRpFeM1dOBd8T9ki5s+AY8= +github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= +github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= github.com/rivo/uniseg v0.1.0 h1:+2KBaVoUmb9XzDsrx/Ct0W/EYOSFf/nWTauy++DprtY= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= +github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= +github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= +github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= +github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= +github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= +github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/zorchenhimer/moviepolls v0.0.0-20191220220302-b92d292bcc8d h1:5lDzIViZdDSjMqrqHpPsAKznycH0gqfI/rsUGpEN0zI= +go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU= +go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8= +go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +go.opencensus.io v0.22.4/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw= +golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= +golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= +golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= +golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= +golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= +golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= +golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek= +golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY= +golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4= +golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM= +golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU= +golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= +golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= +golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= +golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= +golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= +golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= +golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs= +golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= +golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= +golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE= +golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= +golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc= +golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= +golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= +golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= +golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= +golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= +golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= +golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= +golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= +golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= +golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= +golang.org/x/net v0.0.0-20200501053045-e0ff5e5a1de5/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= +golang.org/x/net v0.0.0-20200506145744-7e3656a0809f/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= +golang.org/x/net v0.0.0-20200513185701-a91f0712d120/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= +golang.org/x/net v0.0.0-20200520182314-0ba52f642ac2/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= +golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA= +golang.org/x/net v0.0.0-20200707034311-ab3426394381/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA= +golang.org/x/net v0.0.0-20200822124328-c89045814202 h1:VvcQYSHwXgi7W+TpUR6A9g6Up98WAHf3f/ulnJ62IyA= +golang.org/x/net v0.0.0-20200822124328-c89045814202/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA= +golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= +golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= +golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43 h1:ld7aEMNHoBnnDAX15v1T6z31v8HwR2A9FYOuAhWqkwc= +golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= +golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20200317015054-43a5402ce75a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= +golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200331124033-c3d80250170d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200501052902-10377860bb8e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200511232937-7e40ca221e25/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200515095857-1151b9dac4a9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200803210538-64077c9b5642/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= +golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= +golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= +golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= +golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= +golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= +golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= +golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= +golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= +golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= +golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= +golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= +golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= +golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200227222343-706bc42d1f0d/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= +golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw= +golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw= +golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8= +golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= +golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= +golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= +golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= +golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA= +golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA= +golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA= +golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE= +google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M= +google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= +google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= +google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= +google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.19.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.22.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE= +google.golang.org/api v0.24.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE= +google.golang.org/api v0.28.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE= +google.golang.org/api v0.29.0/go.mod h1:Lcubydp8VUV7KeIHD9z2Bys/sm/vGKnG1UHuDBSrHWM= +google.golang.org/api v0.30.0/go.mod h1:QGmEvQ87FHZNiUVJkT14jQNYJ4ZJjdRF23ZXz5138Fc= +google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM= +google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= +google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= +google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0= +google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc= +google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc= +google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc= +google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= +google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= +google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= +google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8= +google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= +google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA= +google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200228133532-8c2c7df3a383/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200312145019-da6875a35672/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200331122359-1ee6d9798940/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200430143042-b979b6f78d84/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200511104702-f5ebc3bea380/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= +google.golang.org/genproto v0.0.0-20200515170657-fc4c6c6a6587/go.mod h1:YsZOwe1myG/8QRHRsmBRE1LrgQY60beZKjly0O1fX9U= +google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo= +google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7FcilCzHH/e9qn6dsT145K34l5v+OpcnNgKAAA= +google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= +google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= +google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= +google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= +google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= +google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= +google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= +google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY= +google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= +google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60= +google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk= +google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak= +google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak= +google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= +google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= +google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM= +google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE= +google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo= +google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= +google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= +google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= +google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4= +google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c= +gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= +gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= +gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= +gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= +honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= +honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= +honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= +honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= +rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= +rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= +rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= diff --git a/oauth.go b/oauth.go new file mode 100644 index 0000000..e7b3a77 --- /dev/null +++ b/oauth.go @@ -0,0 +1,1039 @@ +package moviepoll + +import ( + "encoding/json" + "fmt" + "io/ioutil" + "net/http" + u "net/url" + "strings" + + "github.com/zorchenhimer/MoviePolls/common" + "golang.org/x/oauth2" + "golang.org/x/oauth2/twitch" +) + +// just some global variables +var twitchOAuthConfig = &oauth2.Config{} +var discordOAuthConfig = &oauth2.Config{} +var patreonOAuthConfig = &oauth2.Config{} + +var openStates = []string{} + +// Welp we need to do the endpoints ourself i guess ... +var discordEndpoint = oauth2.Endpoint{ + AuthURL: "https://discord.com/api/oauth2/authorize", + TokenURL: "https://discord.com/api/oauth2/token", +} + +var patreonEndpoint = oauth2.Endpoint{ + AuthURL: "https://www.patreon.com/oauth2/authorize", + TokenURL: "https://www.patreon.com/api/oauth2/token", +} + +// Initiate the OAuth configs, this includes loading the ConfigValues into "memory" to be used in the login methods +// Returns: Error if a config value could not be retrieved +func (s *Server) initOauth() error { + + twitchOauthEnabled, err := s.data.GetCfgBool(ConfigTwitchOauthEnabled, DefaultTwitchOauthEnabled) + if err != nil { + return err + } + + discordOAuthEnabled, err := s.data.GetCfgBool(ConfigDiscordOauthEnabled, DefaultDiscordOauthEnabled) + if err != nil { + return err + } + + patreonOAuthEnabled, err := s.data.GetCfgBool(ConfigPatreonOauthEnabled, DefaultPatreonOauthEnabled) + if err != nil { + return err + } + + baseUrl, err := s.data.GetCfgString(ConfigHostAddress, "") + if err != nil { + return err + } + + if twitchOauthEnabled || discordOAuthEnabled || patreonOAuthEnabled { + if baseUrl == "" { + return fmt.Errorf("Config Value for HostAddress cannot be empty to use OAuth") + } + } + + if twitchOauthEnabled { + twitchClientID, err := s.data.GetCfgString(ConfigTwitchOauthClientID, DefaultTwitchOauthClientID) + if err != nil { + return err + } + if twitchClientID == "" { + return fmt.Errorf("Config Value for TwitchOauthClientID cannot be empty to use OAuth") + } + + twitchClientSecret, err := s.data.GetCfgString(ConfigTwitchOauthClientSecret, DefaultTwitchOauthClientSecret) + if err != nil { + return err + } + + if twitchClientSecret == "" { + return fmt.Errorf("Config Value for TwitchOauthClientSecret cannot be empty to use OAuth") + } + + twitchOAuthConfig = &oauth2.Config{ + RedirectURL: baseUrl + "/oauth/twitch/callback", + ClientID: twitchClientID, + ClientSecret: twitchClientSecret, + Scopes: []string{"user:read:email"}, + Endpoint: twitch.Endpoint, //this endpoint is predefined in the oauth2 package + } + } + + if discordOAuthEnabled { + discordClientID, err := s.data.GetCfgString(ConfigDiscordOauthClientID, DefaultDiscordOauthClientID) + if err != nil { + return err + } + + if discordClientID == "" { + return fmt.Errorf("Config Value for DiscordOauthClientID cannot be empty to use OAuth") + } + + discordClientSecret, err := s.data.GetCfgString(ConfigDiscordOauthClientSecret, DefaultDiscordOauthClientSecret) + if err != nil { + return err + } + + if discordClientSecret == "" { + return fmt.Errorf("Config Value for DiscordOauthClientSecret cannot be empty to use OAuth") + } + + discordOAuthConfig = &oauth2.Config{ + RedirectURL: baseUrl + "/oauth/discord/callback", + ClientID: discordClientID, + ClientSecret: discordClientSecret, + Scopes: []string{"email", "identify"}, + Endpoint: discordEndpoint, + } + } + + if patreonOAuthEnabled { + patreonClientID, err := s.data.GetCfgString(ConfigPatreonOauthClientID, DefaultPatreonOauthClientID) + if err != nil { + return err + } + + if patreonClientID == "" { + return fmt.Errorf("Config Value for PatreonOauthClientSecret cannot be empty to use OAuth") + } + + patreonClientSecret, err := s.data.GetCfgString(ConfigPatreonOauthClientSecret, DefaultPatreonOauthClientSecret) + if err != nil { + return err + } + + if patreonClientSecret == "" { + return fmt.Errorf("Config Value for PatreonOauthClientSecret cannot be empty to use OAuth") + } + + patreonOAuthConfig = &oauth2.Config{ + RedirectURL: baseUrl + "/oauth/patreon/callback", + ClientID: patreonClientID, + ClientSecret: patreonClientSecret, + Scopes: []string{"identity", "identity[email]"}, + Endpoint: patreonEndpoint, + } + } + + return nil +} + +// Removes the AuthType LOCAL AuthMethod from the currently logged in user +func (s *Server) handlerLocalAuthRemove(w http.ResponseWriter, r *http.Request) { + s.l.Debug("local remove") + + user := s.getSessionUser(w, r) + + auth, err := user.GetAuthMethod(common.AUTH_LOCAL) + + if err != nil { + s.l.Info("User %s does not have a password associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + if len(user.AuthMethods) == 1 { + s.l.Info("User %v only has the local Authmethod associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + user, err = s.RemoveAuthMethodFromUser(auth, user) + + if err != nil { + s.l.Info("Could not remove password from user. %s", err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + if err != nil { + s.l.Info("Could not update user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Logging the user out to ensure that he is logged in with an existing AuthMethod + err = s.logout(w, r) + if err != nil { + s.l.Info("Could not logout user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Logging the user back in + if _, err := user.GetAuthMethod(common.AUTH_TWITCH); err == nil { + err = s.login(user, common.AUTH_TWITCH, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_DISCORD); err == nil { + err = s.login(user, common.AUTH_DISCORD, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_PATREON); err == nil { + err = s.login(user, common.AUTH_PATREON, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return +} + +func (s *Server) handlerTwitchOAuth(w http.ResponseWriter, r *http.Request) { + action := r.URL.Query().Get("action") + + switch action { + case "login": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "login_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := twitchOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("twitch login") + + case "signup": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "signup_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := twitchOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("twitch sign up") + + case "add": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "add_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := twitchOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("twitch add") + + case "remove": + user := s.getSessionUser(w, r) + + auth, err := user.GetAuthMethod(common.AUTH_TWITCH) + + if err != nil { + s.l.Info("User %s does not have Twitch Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + if len(user.AuthMethods) == 1 { + s.l.Info("User %v only has Twitch Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + user, err = s.RemoveAuthMethodFromUser(auth, user) + + if err != nil { + s.l.Info("Could not remove Twitch Oauth from user. %s", err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + if err != nil { + s.l.Info("Could not update user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Log the user out to ensure he uses an existing AuthMethod + err = s.logout(w, r) + if err != nil { + s.l.Info("Could not logout user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Find a new AuthMethod to log the user back in + if _, err := user.GetAuthMethod(common.AUTH_LOCAL); err == nil { + err = s.login(user, common.AUTH_LOCAL, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_DISCORD); err == nil { + err = s.login(user, common.AUTH_DISCORD, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_PATREON); err == nil { + err = s.login(user, common.AUTH_PATREON, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } + + s.l.Debug("twitch remove") + + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } +} + +// This function handles all Twitch Callbacks (add/signup/login) +func (s *Server) handlerTwitchOAuthCallback(w http.ResponseWriter, r *http.Request) { + state := r.FormValue("state") + + ok := false + for _, expectedState := range openStates { + if state == expectedState { + ok = true + } + } + if !ok { + s.l.Info("Invalid/Unknown OAuth state string: '%s'", state) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + code := r.FormValue("code") + token, err := twitchOAuthConfig.Exchange(oauth2.NoContext, code) + if err != nil { + s.l.Info("Code exchange failed: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + // Request the User data from the API + req, err := http.NewRequest("GET", "https://api.twitch.tv/helix/users", nil) + req.Header.Add("Authorization", "Bearer "+token.AccessToken) + req.Header.Add("Client-Id", twitchOAuthConfig.ClientID) + + client := &http.Client{} + resp, err := client.Do(req) + if err != nil { + s.l.Info("Could not retrieve Userdata from Twitch API: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + + } + + if resp.StatusCode != 200 { + s.l.Info("Status Code is not 200, its %v", resp.Status) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + body, err := ioutil.ReadAll(resp.Body) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + var data map[string][]map[string]interface{} + + if err := json.Unmarshal(body, &data); err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + if strings.HasPrefix(state, "signup_") { + // Handle the sign up process + auth := &common.AuthMethod{ + Type: common.AUTH_TWITCH, + ExtId: data["data"][0]["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + // check if Twitch Auth is already used + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + // Create a new user + newUser := &common.User{ + Name: data["data"][0]["display_name"].(string), + Email: data["data"][0]["email"].(string), + NotifyCycleEnd: false, + NotifyVoteSelection: false, + } + + // add this new user to the database + newUser.Id, err = s.data.AddUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + // add the authmethod to the user + newUser, err = s.AddAuthMethodToUser(auth, newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + // update the user in the DB with the user having the AuthMethod associated + err = s.data.UpdateUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + s.l.Debug("logging in %v", newUser.Name) + s.login(newUser, common.AUTH_TWITCH, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else { + s.l.Debug("AuthMethod already used") + http.Redirect(w, r, "/user/new", http.StatusTemporaryRedirect) + } + } else if strings.HasPrefix(state, "login_") { + // Handle Twitch Login + user, err := s.data.UserTwitchLogin(data["data"][0]["id"].(string)) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + s.l.Debug("logging in %v", user.Name) + s.login(user, common.AUTH_TWITCH, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else if strings.HasPrefix(state, "add_") { + // Handle adding a Twitch AuthMethod to the logged in user + + // get the current user + user := s.getSessionUser(w, r) + + auth := &common.AuthMethod{ + Type: common.AUTH_TWITCH, + ExtId: data["data"][0]["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + // check if this oauth is already used + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + // check if the user already has an other Twitch OAuth connected + _, err = user.GetAuthMethod(auth.Type) + if err != nil { + _, err = s.AddAuthMethodToUser(auth, user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("User %s already has %s Oauth associated", user.Name, auth.Type) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("The provided Oauth login is already used") + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + return +} + +func (s *Server) handlerDiscordOAuth(w http.ResponseWriter, r *http.Request) { + + action := r.URL.Query().Get("action") + + switch action { + case "login": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "login_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := discordOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("discord login") + + case "signup": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "signup_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := discordOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("discord signup") + + case "add": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "add_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := discordOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("discord add") + + case "remove": + user := s.getSessionUser(w, r) + + auth, err := user.GetAuthMethod(common.AUTH_DISCORD) + + if err != nil { + s.l.Info("User %s does not have Discord Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + if len(user.AuthMethods) == 1 { + s.l.Info("User %v only has Discord Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + user, err = s.RemoveAuthMethodFromUser(auth, user) + + if err != nil { + s.l.Info("Could not remove Discord Oauth from user. %s", err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + if err != nil { + s.l.Info("Could not update user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Log the user out to ensure he is logged in with an existing AuthMethod + err = s.logout(w, r) + if err != nil { + s.l.Info("Could not logout user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + // Try to log the user back in + if _, err := user.GetAuthMethod(common.AUTH_TWITCH); err == nil { + err = s.login(user, common.AUTH_TWITCH, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_LOCAL); err == nil { + err = s.login(user, common.AUTH_LOCAL, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_PATREON); err == nil { + err = s.login(user, common.AUTH_PATREON, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } + + s.l.Debug("discord remove") + + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } +} + +// Handler for the Discord OAuth Callbacks (add/signup/login) +func (s *Server) handlerDiscordOAuthCallback(w http.ResponseWriter, r *http.Request) { + state := r.FormValue("state") + + ok := false + for _, expectedState := range openStates { + if state == expectedState { + ok = true + } + } + if !ok { + s.l.Info("Invalid/Unknown OAuth state string: '%s'", state) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + code := r.FormValue("code") + token, err := discordOAuthConfig.Exchange(oauth2.NoContext, code) + if err != nil { + s.l.Info("Code exchange failed: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + // Request the User data from the API + req, err := http.NewRequest("GET", "https://discord.com/api/users/@me", nil) + req.Header.Add("Authorization", "Bearer "+token.AccessToken) + + client := &http.Client{} + resp, err := client.Do(req) + if err != nil { + s.l.Info("Could not retrieve Userdata from Discord API: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + if resp.StatusCode != 200 { + s.l.Info("Status Code is not 200, its %v", resp.Status) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + body, err := ioutil.ReadAll(resp.Body) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + var data map[string]interface{} + + if err := json.Unmarshal(body, &data); err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + if strings.HasPrefix(state, "signup_") { + + auth := &common.AuthMethod{ + Type: common.AUTH_DISCORD, + ExtId: data["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + newUser := &common.User{ + Name: data["username"].(string), + Email: data["email"].(string), + NotifyCycleEnd: false, + NotifyVoteSelection: false, + } + + newUser.Id, err = s.data.AddUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + newUser, err = s.AddAuthMethodToUser(auth, newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + s.l.Debug("logging in %v", newUser.Name) + s.login(newUser, common.AUTH_DISCORD, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else { + s.l.Debug("AuthMethod already used") + http.Redirect(w, r, "/user/new", http.StatusTemporaryRedirect) + } + } else if strings.HasPrefix(state, "login_") { + user, err := s.data.UserDiscordLogin(data["id"].(string)) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + s.l.Debug("logging in %v", user.Name) + s.login(user, common.AUTH_DISCORD, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else if strings.HasPrefix(state, "add_") { + user := s.getSessionUser(w, r) + + auth := &common.AuthMethod{ + Type: common.AUTH_DISCORD, + ExtId: data["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + _, err = user.GetAuthMethod(auth.Type) + if err != nil { + _, err = s.AddAuthMethodToUser(auth, user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("User %s already has %s Oauth associated", user.Name, auth.Type) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("The provided Oauth login is already used") + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + return +} + +func (s *Server) handlerPatreonOAuth(w http.ResponseWriter, r *http.Request) { + action := r.URL.Query().Get("action") + + switch action { + case "login": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "login_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := patreonOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("patreon login") + + case "signup": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "signup_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := patreonOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("patreon signup") + + case "add": + // Generate a new state string for each login attempt and store it in the state list + oauthStateString := "add_" + getCryptRandKey(32) + openStates = append(openStates, oauthStateString) + + // Handle the Oauth redirect + url := patreonOAuthConfig.AuthCodeURL(oauthStateString) + http.Redirect(w, r, url, http.StatusTemporaryRedirect) + + s.l.Debug("patreon add") + + case "remove": + user := s.getSessionUser(w, r) + + auth, err := user.GetAuthMethod(common.AUTH_PATREON) + + if err != nil { + s.l.Info("User %s does not have Patreon Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + if len(user.AuthMethods) == 1 { + s.l.Info("User %v only has Patreon Oauth associated with him", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + user, err = s.RemoveAuthMethodFromUser(auth, user) + + if err != nil { + s.l.Info("Could not remove Patreon Oauth from user. %s", err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + if err != nil { + s.l.Info("Could not update user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.logout(w, r) + if err != nil { + s.l.Info("Could not logout user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + if _, err := user.GetAuthMethod(common.AUTH_TWITCH); err == nil { + err = s.login(user, common.AUTH_TWITCH, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_DISCORD); err == nil { + err = s.login(user, common.AUTH_DISCORD, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else if _, err := user.GetAuthMethod(common.AUTH_LOCAL); err == nil { + err = s.login(user, common.AUTH_LOCAL, w, r) + if err != nil { + s.l.Info("Could not login user %s", user.Name) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } + + s.l.Debug("patreon remove") + + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } +} + +func (s *Server) handlerPatreonOAuthCallback(w http.ResponseWriter, r *http.Request) { + state := r.FormValue("state") + + ok := false + for _, expectedState := range openStates { + if state == expectedState { + ok = true + } + } + if !ok { + s.l.Info("Invalid/Unknown OAuth state string: '%s'", state) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + code := r.FormValue("code") + token, err := patreonOAuthConfig.Exchange(oauth2.NoContext, code) + if err != nil { + s.l.Info("Code exchange failed: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + // Request the User data from the API + req, err := http.NewRequest("GET", "https://www.patreon.com/api/oauth2/v2/identity?fields"+u.QueryEscape("[user]")+"=email,first_name,full_name,last_name,vanity", nil) + req.Header.Add("Authorization", "Bearer "+token.AccessToken) + + client := &http.Client{} + resp, err := client.Do(req) + if err != nil { + s.l.Info("Could not retrieve Userdata from Patreon API: %s", err) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + + } + if resp.StatusCode != 200 { + s.l.Info("Status Code is not 200, its %v", resp.Status) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + body, err := ioutil.ReadAll(resp.Body) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + var data map[string]interface{} + + if err := json.Unmarshal(body, &data); err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + data = data["data"].(map[string]interface{}) + + if strings.HasPrefix(state, "signup_") { + + auth := &common.AuthMethod{ + Type: common.AUTH_PATREON, + ExtId: data["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + + newUser := &common.User{ + Name: data["attributes"].(map[string]interface{})["full_name"].(string), + Email: data["attributes"].(map[string]interface{})["email"].(string), + NotifyCycleEnd: false, + NotifyVoteSelection: false, + } + + newUser.Id, err = s.data.AddUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + newUser, err = s.AddAuthMethodToUser(auth, newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(newUser) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + + s.l.Debug("logging in %v", newUser.Name) + s.login(newUser, common.AUTH_PATREON, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else { + s.l.Info("AuthMethod already used") + http.Redirect(w, r, "/user/new", http.StatusTemporaryRedirect) + } + } else if strings.HasPrefix(state, "login_") { + user, err := s.data.UserPatreonLogin(data["id"].(string)) + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user/login", http.StatusTemporaryRedirect) + return + } + s.l.Debug("logging in %v", user.Name) + s.login(user, common.AUTH_PATREON, w, r) + http.Redirect(w, r, "/", http.StatusTemporaryRedirect) + } else if strings.HasPrefix(state, "add_") { + user := s.getSessionUser(w, r) + + auth := &common.AuthMethod{ + Type: common.AUTH_PATREON, + ExtId: data["id"].(string), + AuthToken: token.AccessToken, + RefreshToken: token.RefreshToken, + Date: token.Expiry, + } + + if !s.data.CheckOauthUsage(auth.ExtId, auth.Type) { + _, err = user.GetAuthMethod(auth.Type) + if err != nil { + _, err = s.AddAuthMethodToUser(auth, user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + + err = s.data.UpdateUser(user) + + if err != nil { + s.l.Info(err.Error()) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("User %s already has %s Oauth associated", user.Name, auth.Type) + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + } else { + s.l.Info("The provided Oauth login is already used") + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + http.Redirect(w, r, "/user", http.StatusTemporaryRedirect) + return + } + return +} diff --git a/server.go b/server.go index 0c40024..3ae4872 100644 --- a/server.go +++ b/server.go @@ -37,6 +37,20 @@ const ( DefaultMaxDescriptionLength int = 1000 DefaultMaxLinkLength int = 500 // length of all links combined DefaultMaxRemarksLength int = 200 + + DefaultLocalSignupEnabled bool = true + DefaultTwitchOauthEnabled bool = false + DefaultTwitchOauthSignupEnabled bool = false + DefaultTwitchOauthClientID string = "" + DefaultTwitchOauthClientSecret string = "" + DefaultDiscordOauthEnabled bool = false + DefaultDiscordOauthSignupEnabled bool = false + DefaultDiscordOauthClientID string = "" + DefaultDiscordOauthClientSecret string = "" + DefaultPatreonOauthEnabled bool = false + DefaultPatreonOauthSignupEnabled bool = false + DefaultPatreonOauthClientID string = "" + DefaultPatreonOauthClientSecret string = "" ) // configuration keys @@ -60,6 +74,20 @@ const ( ConfigMaxDescriptionLength string = "MaxDescriptionLength" ConfigMaxLinkLength string = "MaxLinkLength" ConfigMaxRemarksLength string = "MaxRemarksLength" + + ConfigLocalSignupEnabled string = "LocalSignupEnabled" + ConfigTwitchOauthEnabled string = "TwitchOauthEnabled" + ConfigTwitchOauthSignupEnabled string = "TwitchOauthSignupEnabled" + ConfigTwitchOauthClientID string = "TwitchOauthClientID" + ConfigTwitchOauthClientSecret string = "TwitchOauthSecret" + ConfigDiscordOauthEnabled string = "DiscordOauthEnabled" + ConfigDiscordOauthSignupEnabled string = "DiscordOauthSignupEnabled" + ConfigDiscordOauthClientID string = "DiscordOauthClientID" + ConfigDiscordOauthClientSecret string = "DiscordOauthClientSecret" + ConfigPatreonOauthEnabled string = "PatreonOauthEnabled" + ConfigPatreonOauthSignupEnabled string = "PatreonOauthSignupEnabled" + ConfigPatreonOauthClientID string = "PatreonOauthClientID" + ConfigPatreonOauthClientSecret string = "PatreonOauthClientSecret" ) type Options struct { @@ -169,6 +197,11 @@ func NewServer(options Options) (*Server, error) { fmt.Printf("Claim admin: %s/auth/%s Password: %s\n", host, urlKey.Url, urlKey.Key) } + err = server.initOauth() + if err != nil { + return nil, err + } + mux := http.NewServeMux() mux.Handle("/api/", apiHandler{}) mux.HandleFunc("/movie/", server.handlerMovie) @@ -179,10 +212,20 @@ func NewServer(options Options) (*Server, error) { // list of past cycles mux.HandleFunc("/history", server.handlerHistory) + mux.HandleFunc("/oauth/twitch", server.handlerTwitchOAuth) + mux.HandleFunc("/oauth/twitch/callback", server.handlerTwitchOAuthCallback) + + mux.HandleFunc("/oauth/discord", server.handlerDiscordOAuth) + mux.HandleFunc("/oauth/discord/callback", server.handlerDiscordOAuthCallback) + + mux.HandleFunc("/oauth/patreon", server.handlerPatreonOAuth) + mux.HandleFunc("/oauth/patreon/callback", server.handlerPatreonOAuthCallback) + mux.HandleFunc("/user", server.handlerUser) mux.HandleFunc("/user/login", server.handlerUserLogin) mux.HandleFunc("/user/logout", server.handlerUserLogout) mux.HandleFunc("/user/new", server.handlerUserNew) + mux.HandleFunc("/user/remove/local", server.handlerLocalAuthRemove) mux.HandleFunc("/vote/", server.handlerVote) mux.HandleFunc("/", server.handlerRoot) @@ -246,12 +289,6 @@ func (s *Server) CheckAdminExists() (bool, error) { return false, nil } -func (s *Server) AddUser(user *common.User) error { - user.Password = s.hashPassword(user.Password) - _, err := s.data.AddUser(user) - return err -} - func (s *Server) handlerFavicon(w http.ResponseWriter, r *http.Request) { if common.FileExists("data/favicon.ico") { http.ServeFile(w, r, "data/favicon.ico") diff --git a/session.go b/session.go index ea1dcbe..00ad747 100644 --- a/session.go +++ b/session.go @@ -18,26 +18,35 @@ func (s *Server) logout(w http.ResponseWriter, r *http.Request) error { return delSession(session, w, r) } -func (s *Server) login(user *common.User, w http.ResponseWriter, r *http.Request) error { +func (s *Server) login(user *common.User, authType common.AuthType, w http.ResponseWriter, r *http.Request) error { session, err := s.cookies.Get(r, SessionName) if err != nil { return fmt.Errorf("Unable to get session from store: %v", err) } - gobbed, err := user.PassDate.GobEncode() + auth, err := user.GetAuthMethod(authType) if err != nil { - return fmt.Errorf("Unable to gob PassDate") + return err } session.Values["UserId"] = user.Id - session.Values["PassDate"] = fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) + + gobbed, err := auth.Date.GobEncode() + if err != nil { + return fmt.Errorf("Unable to gob Date") + } + + session.Values["Date_"+string(auth.Type)] = fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) return session.Save(r, w) } func delSession(session *sessions.Session, w http.ResponseWriter, r *http.Request) error { delete(session.Values, "UserId") - delete(session.Values, "PassDate") + delete(session.Values, "Date_Local") + delete(session.Values, "Date_Discord") + delete(session.Values, "Date_Twitch") + delete(session.Values, "Date_Patreon") return session.Save(r, w) } @@ -75,15 +84,87 @@ func (s *Server) getSessionUser(w http.ResponseWriter, r *http.Request) *common. return nil } - passDate, _ := session.Values["PassDate"].(string) - gobbed, err := user.PassDate.GobEncode() + // I am sorry - CptPie + passDate, _ := session.Values["Date_Local"].(string) + refreshTwitch, _ := session.Values["Date_Twitch"].(string) + refreshDiscord, _ := session.Values["Date_Discord"].(string) + refreshPatreon, _ := session.Values["Date_Patreon"].(string) + + if passDate != "" { + localAuth, err := user.GetAuthMethod(common.AUTH_LOCAL) - if err != nil || fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) != passDate { - s.l.Info("User's PassDate did not match stored value") - err = delSession(session, w, r) if err != nil { - s.l.Error("Unable to delete cookie: %v", err) + s.l.Error(err.Error()) + return nil + } + + gobbed, err := localAuth.Date.GobEncode() + + if err != nil || fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) != passDate { + s.l.Info("User's Date_Local did not match stored value") + err = delSession(session, w, r) + if err != nil { + s.l.Error("Unable to delete cookie: %v", err) + } + return nil + } + } else if refreshTwitch != "" { + twitchAuth, err := user.GetAuthMethod(common.AUTH_TWITCH) + + if err != nil { + s.l.Error(err.Error()) + return nil + } + + gobbed, err := twitchAuth.Date.GobEncode() + + if err != nil || fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) != refreshTwitch { + s.l.Info("User's Date_Twitch did not match stored value") + err = delSession(session, w, r) + if err != nil { + s.l.Error("Unable to delete cookie: %v", err) + } + return nil + } + } else if refreshDiscord != "" { + discordAuth, err := user.GetAuthMethod(common.AUTH_DISCORD) + + if err != nil { + s.l.Error(err.Error()) + return nil + } + + gobbed, err := discordAuth.Date.GobEncode() + + if err != nil || fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) != refreshDiscord { + s.l.Info("User's Date_Discord did not match stored value") + err = delSession(session, w, r) + if err != nil { + s.l.Error("Unable to delete cookie: %v", err) + } + return nil + } + } else if refreshPatreon != "" { + patreonAuth, err := user.GetAuthMethod(common.AUTH_PATREON) + + if err != nil { + s.l.Error(err.Error()) + return nil + } + + gobbed, err := patreonAuth.Date.GobEncode() + + if err != nil || fmt.Sprintf("%X", sha256.Sum256([]byte(gobbed))) != refreshPatreon { + s.l.Info("User's Date_Patreon did not match stored value") + err = delSession(session, w, r) + if err != nil { + s.l.Error("Unable to delete cookie: %v", err) + } + return nil } + } else { + //WTF MAN + s.l.Error("No valid login method detected") return nil } diff --git a/templates.go b/templates.go index e04b8fa..2b36125 100644 --- a/templates.go +++ b/templates.go @@ -116,6 +116,10 @@ type dataLoginForm struct { dataPageBase ErrorMessage string Authed bool + OAuth bool + TwitchOAuth bool + DiscordOAuth bool + PatreonOAuth bool } type dataAddMovie struct { diff --git a/templates/account.html b/templates/account.html index 7edbada..6e50756 100644 --- a/templates/account.html +++ b/templates/account.html @@ -3,9 +3,9 @@ {{define "body"}}