@@ -19,9 +19,8 @@ import (
1919// to avoid ambiguity please read: https://wiki.helpwave.de/doc/keycloak-jedzCcERwF
2020
2121var (
22- DEFAULT_OAUTH_ISSUER_URL = "https://accounts.helpwave.de/realms/helpwave"
23-
24- DEFAULT_OAUTH_CLIENT_ID = "helpwave-services"
22+ DefaultOAuthIssuerURL = "https://accounts.helpwave.de/realms/helpwave"
23+ DefaultOAuthClientID = "helpwave-services"
2524 onlyFakeAuthEnabled bool
2625 insecureFakeTokenEnable = false
2726 oauthConfig * oauth2.Config
@@ -40,22 +39,22 @@ type (
4039 organizationIDKey struct {}
4140)
4241
43- func GetOAuthIssuerUrl () string {
44- issuerUrl := hwutil .GetEnvOr ("OAUTH_ISSUER_URL" , DEFAULT_OAUTH_ISSUER_URL )
45- if issuerUrl != DEFAULT_OAUTH_ISSUER_URL {
42+ func GetOAuthIssuerURL () string {
43+ issuerURL := hwutil .GetEnvOr ("OAUTH_ISSUER_URL" , DefaultOAuthIssuerURL )
44+ if issuerURL != DefaultOAuthIssuerURL {
4645 zlog .Warn ().
47- Str ("OAUTH_ISSUER_URL" , issuerUrl ).
46+ Str ("OAUTH_ISSUER_URL" , issuerURL ).
4847 Msg ("using custom OAuth issuer url" )
4948 }
50- return issuerUrl
49+ return issuerURL
5150}
5251
53- func GetOAuthClientId () string {
54- clientId := hwutil .GetEnvOr ("OAUTH_CLIENT_ID" , DEFAULT_OAUTH_CLIENT_ID )
55- if clientId != DEFAULT_OAUTH_CLIENT_ID {
56- zlog .Warn ().Str ("OAUTH_CLIENT_ID" , clientId ).Msg ("using custom OAuth client id" )
52+ func GetOAuthClientID () string {
53+ clientID := hwutil .GetEnvOr ("OAUTH_CLIENT_ID" , DefaultOAuthClientID )
54+ if clientID != DefaultOAuthClientID {
55+ zlog .Warn ().Str ("OAUTH_CLIENT_ID" , clientID ).Msg ("using custom OAuth client id" )
5756 }
58- return clientId
57+ return clientID
5958}
6059
6160func IsOnlyFakeAuthEnabled () bool {
@@ -109,7 +108,7 @@ type IDTokenClaims struct {
109108}
110109
111110type OrganizationTokenClaim struct {
112- Id string `json:"id" validate:"required,uuid"`
111+ ID string `json:"id" validate:"required,uuid"`
113112 Name string `json:"name" validate:"required"`
114113}
115114
@@ -156,7 +155,7 @@ func VerifyFakeToken(ctx context.Context, token string) (*IDTokenClaims, *time.T
156155 }
157156
158157 claims := IDTokenClaims {}
159- if err := hwutil .ParseValidJson (plainToken , & claims ); err != nil {
158+ if err := hwutil .ParseValidJSON (plainToken , & claims ); err != nil {
160159 return nil , nil , fmt .Errorf ("VerifyFakeToken: cant parse json: %w" , err )
161160 }
162161
@@ -267,13 +266,13 @@ func SetupAuth(ctx context.Context, fakeOnly bool, passedInsecureFakeTokenEnable
267266
268267 insecureFakeTokenEnable = passedInsecureFakeTokenEnable
269268
270- provider , err := oidc .NewProvider (context .Background (), GetOAuthIssuerUrl ())
269+ provider , err := oidc .NewProvider (context .Background (), GetOAuthIssuerURL ())
271270 if err != nil {
272271 log .Fatal ().Err (err ).Send ()
273272 }
274273
275274 oauthConfig = & oauth2.Config {
276- ClientID : GetOAuthClientId (),
275+ ClientID : GetOAuthClientID (),
277276 Endpoint : provider .Endpoint (),
278277 }
279278
0 commit comments