You've already forked authentication-service
mirror of
https://github.com/matrix-org/matrix-authentication-service.git
synced 2025-08-07 17:03:01 +03:00
Add a GraphQL mutation to create arbitrary OAuth2 sessions.
This commit is contained in:
@@ -131,6 +131,13 @@ impl Requester {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn oauth2_session(&self) -> Option<&Session> {
|
||||||
|
match self {
|
||||||
|
Self::OAuth2Session(session, _) => Some(session),
|
||||||
|
Self::BrowserSession(_) | Self::Anonymous => None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// Returns true if the requester can access the resource.
|
/// Returns true if the requester can access the resource.
|
||||||
fn is_owner_or_admin(&self, resource: &impl OwnerId) -> bool {
|
fn is_owner_or_admin(&self, resource: &impl OwnerId) -> bool {
|
||||||
// If the requester is an admin, they can do anything.
|
// If the requester is an admin, they can do anything.
|
||||||
|
@@ -13,13 +13,19 @@
|
|||||||
// limitations under the License.
|
// limitations under the License.
|
||||||
|
|
||||||
use anyhow::Context as _;
|
use anyhow::Context as _;
|
||||||
use async_graphql::{Context, Enum, InputObject, Object, ID};
|
use async_graphql::{Context, Description, Enum, InputObject, Object, ID};
|
||||||
use mas_data_model::Device;
|
use chrono::Duration;
|
||||||
|
use mas_data_model::{Device, TokenType};
|
||||||
use mas_storage::{
|
use mas_storage::{
|
||||||
job::{DeleteDeviceJob, JobRepositoryExt},
|
job::{DeleteDeviceJob, JobRepositoryExt, ProvisionDeviceJob},
|
||||||
oauth2::OAuth2SessionRepository,
|
oauth2::{
|
||||||
|
OAuth2AccessTokenRepository, OAuth2ClientRepository, OAuth2RefreshTokenRepository,
|
||||||
|
OAuth2SessionRepository,
|
||||||
|
},
|
||||||
|
user::UserRepository,
|
||||||
RepositoryAccess,
|
RepositoryAccess,
|
||||||
};
|
};
|
||||||
|
use oauth2_types::scope::Scope;
|
||||||
|
|
||||||
use crate::{
|
use crate::{
|
||||||
model::{NodeType, OAuth2Session},
|
model::{NodeType, OAuth2Session},
|
||||||
@@ -31,6 +37,45 @@ pub struct OAuth2SessionMutations {
|
|||||||
_private: (),
|
_private: (),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// The input of the `createOauth2Session` mutation.
|
||||||
|
#[derive(InputObject)]
|
||||||
|
pub struct CreateOAuth2SessionInput {
|
||||||
|
/// The scope of the session
|
||||||
|
scope: String,
|
||||||
|
|
||||||
|
/// The ID of the user for which to create the session
|
||||||
|
user_id: ID,
|
||||||
|
|
||||||
|
/// Whether the session should issue a never-expiring access token
|
||||||
|
permanent: Option<bool>,
|
||||||
|
}
|
||||||
|
|
||||||
|
/// The payload of the `createOauth2Session` mutation.
|
||||||
|
#[derive(Description)]
|
||||||
|
pub struct CreateOAuth2SessionPayload {
|
||||||
|
access_token: String,
|
||||||
|
refresh_token: Option<String>,
|
||||||
|
session: mas_data_model::Session,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[Object(use_type_description)]
|
||||||
|
impl CreateOAuth2SessionPayload {
|
||||||
|
/// Access token for this session
|
||||||
|
pub async fn access_token(&self) -> &str {
|
||||||
|
&self.access_token
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Refresh token for this session, if it is not a permanent session
|
||||||
|
pub async fn refresh_token(&self) -> Option<&str> {
|
||||||
|
self.refresh_token.as_deref()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// The OAuth 2.0 session which was just created
|
||||||
|
pub async fn oauth2_session(&self) -> OAuth2Session {
|
||||||
|
OAuth2Session(self.session.clone())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// The input of the `endOauth2Session` mutation.
|
/// The input of the `endOauth2Session` mutation.
|
||||||
#[derive(InputObject)]
|
#[derive(InputObject)]
|
||||||
pub struct EndOAuth2SessionInput {
|
pub struct EndOAuth2SessionInput {
|
||||||
@@ -75,6 +120,93 @@ impl EndOAuth2SessionPayload {
|
|||||||
|
|
||||||
#[Object]
|
#[Object]
|
||||||
impl OAuth2SessionMutations {
|
impl OAuth2SessionMutations {
|
||||||
|
/// Create a new arbitrary OAuth 2.0 Session.
|
||||||
|
///
|
||||||
|
/// Only available for administrators.
|
||||||
|
async fn create_oauth2_session(
|
||||||
|
&self,
|
||||||
|
ctx: &Context<'_>,
|
||||||
|
input: CreateOAuth2SessionInput,
|
||||||
|
) -> Result<CreateOAuth2SessionPayload, async_graphql::Error> {
|
||||||
|
let state = ctx.state();
|
||||||
|
let user_id = NodeType::User.extract_ulid(&input.user_id)?;
|
||||||
|
let scope: Scope = input.scope.parse().context("Invalid scope")?;
|
||||||
|
let permanent = input.permanent.unwrap_or(false);
|
||||||
|
let requester = ctx.requester();
|
||||||
|
|
||||||
|
if !requester.is_admin() {
|
||||||
|
return Err(async_graphql::Error::new("Unauthorized"));
|
||||||
|
}
|
||||||
|
|
||||||
|
let session = requester
|
||||||
|
.oauth2_session()
|
||||||
|
.context("Requester should be a OAuth 2.0 client")?;
|
||||||
|
|
||||||
|
let mut repo = state.repository().await?;
|
||||||
|
let clock = state.clock();
|
||||||
|
let mut rng = state.rng();
|
||||||
|
|
||||||
|
let client = repo
|
||||||
|
.oauth2_client()
|
||||||
|
.lookup(session.client_id)
|
||||||
|
.await?
|
||||||
|
.context("Client not found")?;
|
||||||
|
|
||||||
|
let user = repo
|
||||||
|
.user()
|
||||||
|
.lookup(user_id)
|
||||||
|
.await?
|
||||||
|
.context("User not found")?;
|
||||||
|
|
||||||
|
// Generate a new access token
|
||||||
|
let access_token = TokenType::AccessToken.generate(&mut rng);
|
||||||
|
|
||||||
|
// Create the OAuth 2.0 Session
|
||||||
|
let session = repo
|
||||||
|
.oauth2_session()
|
||||||
|
.add(&mut rng, &clock, &client, Some(&user), None, scope)
|
||||||
|
.await?;
|
||||||
|
|
||||||
|
// Look for devices to provision
|
||||||
|
for scope in &*session.scope {
|
||||||
|
if let Some(device) = Device::from_scope_token(scope) {
|
||||||
|
repo.job()
|
||||||
|
.schedule_job(ProvisionDeviceJob::new(&user, &device))
|
||||||
|
.await?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let ttl = if permanent {
|
||||||
|
// XXX: that's lazy
|
||||||
|
Duration::days(365 * 50)
|
||||||
|
} else {
|
||||||
|
Duration::minutes(5)
|
||||||
|
};
|
||||||
|
let access_token = repo
|
||||||
|
.oauth2_access_token()
|
||||||
|
.add(&mut rng, &clock, &session, access_token, ttl)
|
||||||
|
.await?;
|
||||||
|
|
||||||
|
let refresh_token = if !permanent {
|
||||||
|
let refresh_token = TokenType::RefreshToken.generate(&mut rng);
|
||||||
|
|
||||||
|
let refresh_token = repo
|
||||||
|
.oauth2_refresh_token()
|
||||||
|
.add(&mut rng, &clock, &session, &access_token, refresh_token)
|
||||||
|
.await?;
|
||||||
|
|
||||||
|
Some(refresh_token)
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(CreateOAuth2SessionPayload {
|
||||||
|
session,
|
||||||
|
access_token: access_token.access_token,
|
||||||
|
refresh_token: refresh_token.map(|t| t.refresh_token),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
async fn end_oauth2_session(
|
async fn end_oauth2_session(
|
||||||
&self,
|
&self,
|
||||||
ctx: &Context<'_>,
|
ctx: &Context<'_>,
|
||||||
|
@@ -510,6 +510,7 @@ async fn test_oauth2_client_credentials(pool: PgPool) {
|
|||||||
mutation {
|
mutation {
|
||||||
addUser(input: {username: "alice"}) {
|
addUser(input: {username: "alice"}) {
|
||||||
user {
|
user {
|
||||||
|
id
|
||||||
username
|
username
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -519,15 +520,42 @@ async fn test_oauth2_client_credentials(pool: PgPool) {
|
|||||||
let response = state.request(request).await;
|
let response = state.request(request).await;
|
||||||
response.assert_status(StatusCode::OK);
|
response.assert_status(StatusCode::OK);
|
||||||
let response: GraphQLResponse = response.json();
|
let response: GraphQLResponse = response.json();
|
||||||
assert!(response.errors.is_empty());
|
assert!(response.errors.is_empty(), "{:?}", response.errors);
|
||||||
|
let user_id = &response.data["addUser"]["user"]["id"];
|
||||||
|
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
response.data,
|
response.data,
|
||||||
serde_json::json!({
|
serde_json::json!({
|
||||||
"addUser": {
|
"addUser": {
|
||||||
"user": {
|
"user": {
|
||||||
|
"id": user_id,
|
||||||
"username": "alice"
|
"username": "alice"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// We should now be able to create an arbitrary access token for the user
|
||||||
|
let request = Request::post("/graphql")
|
||||||
|
.bearer(&access_token)
|
||||||
|
.json(serde_json::json!({
|
||||||
|
"query": r#"
|
||||||
|
mutation CreateSession($userId: String!, $scope: String!) {
|
||||||
|
createOauth2Session(input: {userId: $userId, permanent: true, scope: $scope}) {
|
||||||
|
accessToken
|
||||||
|
refreshToken
|
||||||
|
}
|
||||||
|
}
|
||||||
|
"#,
|
||||||
|
"variables": {
|
||||||
|
"userId": user_id,
|
||||||
|
"scope": "urn:matrix:org.matrix.msc2967.client:device:AABBCCDDEE urn:matrix:org.matrix.msc2967.client:api:* urn:synapse:admin:*"
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
let response = state.request(request).await;
|
||||||
|
response.assert_status(StatusCode::OK);
|
||||||
|
let response: GraphQLResponse = response.json();
|
||||||
|
assert!(response.errors.is_empty(), "{:?}", response.errors);
|
||||||
|
assert!(response.data["createOauth2Session"]["refreshToken"].is_null());
|
||||||
|
assert!(response.data["createOauth2Session"]["accessToken"].is_string());
|
||||||
}
|
}
|
||||||
|
@@ -14,7 +14,7 @@
|
|||||||
|
|
||||||
use async_trait::async_trait;
|
use async_trait::async_trait;
|
||||||
use chrono::{DateTime, Utc};
|
use chrono::{DateTime, Utc};
|
||||||
use mas_data_model::{BrowserSession, Client, Session, SessionState};
|
use mas_data_model::{BrowserSession, Client, Session, SessionState, User};
|
||||||
use mas_storage::{
|
use mas_storage::{
|
||||||
oauth2::{OAuth2SessionFilter, OAuth2SessionRepository},
|
oauth2::{OAuth2SessionFilter, OAuth2SessionRepository},
|
||||||
Clock, Page, Pagination,
|
Clock, Page, Pagination,
|
||||||
@@ -133,24 +133,23 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#[tracing::instrument(
|
#[tracing::instrument(
|
||||||
name = "db.oauth2_session.add_from_browser_session",
|
name = "db.oauth2_session.add",
|
||||||
skip_all,
|
skip_all,
|
||||||
fields(
|
fields(
|
||||||
db.statement,
|
db.statement,
|
||||||
%user_session.id,
|
|
||||||
user.id = %user_session.user.id,
|
|
||||||
%client.id,
|
%client.id,
|
||||||
session.id,
|
session.id,
|
||||||
session.scope = %scope,
|
session.scope = %scope,
|
||||||
),
|
),
|
||||||
err,
|
err,
|
||||||
)]
|
)]
|
||||||
async fn add_from_browser_session(
|
async fn add(
|
||||||
&mut self,
|
&mut self,
|
||||||
rng: &mut (dyn RngCore + Send),
|
rng: &mut (dyn RngCore + Send),
|
||||||
clock: &dyn Clock,
|
clock: &dyn Clock,
|
||||||
client: &Client,
|
client: &Client,
|
||||||
user_session: &BrowserSession,
|
user: Option<&User>,
|
||||||
|
user_session: Option<&BrowserSession>,
|
||||||
scope: Scope,
|
scope: Scope,
|
||||||
) -> Result<Session, Self::Error> {
|
) -> Result<Session, Self::Error> {
|
||||||
let created_at = clock.now();
|
let created_at = clock.now();
|
||||||
@@ -172,8 +171,8 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
|
|||||||
VALUES ($1, $2, $3, $4, $5, $6)
|
VALUES ($1, $2, $3, $4, $5, $6)
|
||||||
"#,
|
"#,
|
||||||
Uuid::from(id),
|
Uuid::from(id),
|
||||||
Uuid::from(user_session.user.id),
|
user.map(|u| Uuid::from(u.id)),
|
||||||
Uuid::from(user_session.id),
|
user_session.map(|s| Uuid::from(s.id)),
|
||||||
Uuid::from(client.id),
|
Uuid::from(client.id),
|
||||||
&scope_list,
|
&scope_list,
|
||||||
created_at,
|
created_at,
|
||||||
@@ -186,62 +185,8 @@ impl<'c> OAuth2SessionRepository for PgOAuth2SessionRepository<'c> {
|
|||||||
id,
|
id,
|
||||||
state: SessionState::Valid,
|
state: SessionState::Valid,
|
||||||
created_at,
|
created_at,
|
||||||
user_id: Some(user_session.user.id),
|
user_id: user.map(|u| u.id),
|
||||||
user_session_id: Some(user_session.id),
|
user_session_id: user_session.map(|s| s.id),
|
||||||
client_id: client.id,
|
|
||||||
scope,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
#[tracing::instrument(
|
|
||||||
name = "db.oauth2_session.add_from_client_credentials",
|
|
||||||
skip_all,
|
|
||||||
fields(
|
|
||||||
db.statement,
|
|
||||||
%client.id,
|
|
||||||
session.id,
|
|
||||||
session.scope = %scope,
|
|
||||||
),
|
|
||||||
err,
|
|
||||||
)]
|
|
||||||
async fn add_from_client_credentials(
|
|
||||||
&mut self,
|
|
||||||
rng: &mut (dyn RngCore + Send),
|
|
||||||
clock: &dyn Clock,
|
|
||||||
client: &Client,
|
|
||||||
scope: Scope,
|
|
||||||
) -> Result<Session, Self::Error> {
|
|
||||||
let created_at = clock.now();
|
|
||||||
let id = Ulid::from_datetime_with_source(created_at.into(), rng);
|
|
||||||
tracing::Span::current().record("session.id", tracing::field::display(id));
|
|
||||||
|
|
||||||
let scope_list: Vec<String> = scope.iter().map(|s| s.as_str().to_owned()).collect();
|
|
||||||
|
|
||||||
sqlx::query!(
|
|
||||||
r#"
|
|
||||||
INSERT INTO oauth2_sessions
|
|
||||||
( oauth2_session_id
|
|
||||||
, oauth2_client_id
|
|
||||||
, scope_list
|
|
||||||
, created_at
|
|
||||||
)
|
|
||||||
VALUES ($1, $2, $3, $4)
|
|
||||||
"#,
|
|
||||||
Uuid::from(id),
|
|
||||||
Uuid::from(client.id),
|
|
||||||
&scope_list,
|
|
||||||
created_at,
|
|
||||||
)
|
|
||||||
.traced()
|
|
||||||
.execute(&mut *self.conn)
|
|
||||||
.await?;
|
|
||||||
|
|
||||||
Ok(Session {
|
|
||||||
id,
|
|
||||||
state: SessionState::Valid,
|
|
||||||
created_at,
|
|
||||||
user_id: None,
|
|
||||||
user_session_id: None,
|
|
||||||
client_id: client.id,
|
client_id: client.id,
|
||||||
scope,
|
scope,
|
||||||
})
|
})
|
||||||
|
@@ -140,6 +140,33 @@ pub trait OAuth2SessionRepository: Send + Sync {
|
|||||||
/// Returns [`Self::Error`] if the underlying repository fails
|
/// Returns [`Self::Error`] if the underlying repository fails
|
||||||
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
|
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
|
||||||
|
|
||||||
|
/// Create a new [`Session`] with the given parameters
|
||||||
|
///
|
||||||
|
/// Returns the newly created [`Session`]
|
||||||
|
///
|
||||||
|
/// # Parameters
|
||||||
|
///
|
||||||
|
/// * `rng`: The random number generator to use
|
||||||
|
/// * `clock`: The clock used to generate timestamps
|
||||||
|
/// * `client`: The [`Client`] which created the [`Session`]
|
||||||
|
/// * `user`: The [`User`] for which the session should be created, if any
|
||||||
|
/// * `user_session`: The [`BrowserSession`] of the user which completed the
|
||||||
|
/// authorization, if any
|
||||||
|
/// * `scope`: The [`Scope`] of the [`Session`]
|
||||||
|
///
|
||||||
|
/// # Errors
|
||||||
|
///
|
||||||
|
/// Returns [`Self::Error`] if the underlying repository fails
|
||||||
|
async fn add(
|
||||||
|
&mut self,
|
||||||
|
rng: &mut (dyn RngCore + Send),
|
||||||
|
clock: &dyn Clock,
|
||||||
|
client: &Client,
|
||||||
|
user: Option<&User>,
|
||||||
|
user_session: Option<&BrowserSession>,
|
||||||
|
scope: Scope,
|
||||||
|
) -> Result<Session, Self::Error>;
|
||||||
|
|
||||||
/// Create a new [`Session`] out of a [`Client`] and a [`BrowserSession`]
|
/// Create a new [`Session`] out of a [`Client`] and a [`BrowserSession`]
|
||||||
///
|
///
|
||||||
/// Returns the newly created [`Session`]
|
/// Returns the newly created [`Session`]
|
||||||
@@ -163,7 +190,17 @@ pub trait OAuth2SessionRepository: Send + Sync {
|
|||||||
client: &Client,
|
client: &Client,
|
||||||
user_session: &BrowserSession,
|
user_session: &BrowserSession,
|
||||||
scope: Scope,
|
scope: Scope,
|
||||||
) -> Result<Session, Self::Error>;
|
) -> Result<Session, Self::Error> {
|
||||||
|
self.add(
|
||||||
|
rng,
|
||||||
|
clock,
|
||||||
|
client,
|
||||||
|
Some(&user_session.user),
|
||||||
|
Some(user_session),
|
||||||
|
scope,
|
||||||
|
)
|
||||||
|
.await
|
||||||
|
}
|
||||||
|
|
||||||
/// Create a new [`Session`] for a [`Client`] using the client credentials
|
/// Create a new [`Session`] for a [`Client`] using the client credentials
|
||||||
/// flow
|
/// flow
|
||||||
@@ -186,7 +223,9 @@ pub trait OAuth2SessionRepository: Send + Sync {
|
|||||||
clock: &dyn Clock,
|
clock: &dyn Clock,
|
||||||
client: &Client,
|
client: &Client,
|
||||||
scope: Scope,
|
scope: Scope,
|
||||||
) -> Result<Session, Self::Error>;
|
) -> Result<Session, Self::Error> {
|
||||||
|
self.add(rng, clock, client, None, None, scope).await
|
||||||
|
}
|
||||||
|
|
||||||
/// Mark a [`Session`] as finished
|
/// Mark a [`Session`] as finished
|
||||||
///
|
///
|
||||||
@@ -234,6 +273,16 @@ pub trait OAuth2SessionRepository: Send + Sync {
|
|||||||
repository_impl!(OAuth2SessionRepository:
|
repository_impl!(OAuth2SessionRepository:
|
||||||
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
|
async fn lookup(&mut self, id: Ulid) -> Result<Option<Session>, Self::Error>;
|
||||||
|
|
||||||
|
async fn add(
|
||||||
|
&mut self,
|
||||||
|
rng: &mut (dyn RngCore + Send),
|
||||||
|
clock: &dyn Clock,
|
||||||
|
client: &Client,
|
||||||
|
user: Option<&User>,
|
||||||
|
user_session: Option<&BrowserSession>,
|
||||||
|
scope: Scope,
|
||||||
|
) -> Result<Session, Self::Error>;
|
||||||
|
|
||||||
async fn add_from_browser_session(
|
async fn add_from_browser_session(
|
||||||
&mut self,
|
&mut self,
|
||||||
rng: &mut (dyn RngCore + Send),
|
rng: &mut (dyn RngCore + Send),
|
||||||
|
@@ -367,6 +367,42 @@ type CompatSsoLoginEdge {
|
|||||||
cursor: String!
|
cursor: String!
|
||||||
}
|
}
|
||||||
|
|
||||||
|
"""
|
||||||
|
The input of the `createOauth2Session` mutation.
|
||||||
|
"""
|
||||||
|
input CreateOAuth2SessionInput {
|
||||||
|
"""
|
||||||
|
The scope of the session
|
||||||
|
"""
|
||||||
|
scope: String!
|
||||||
|
"""
|
||||||
|
The ID of the user for which to create the session
|
||||||
|
"""
|
||||||
|
userId: ID!
|
||||||
|
"""
|
||||||
|
Whether the session should issue a never-expiring access token
|
||||||
|
"""
|
||||||
|
permanent: Boolean
|
||||||
|
}
|
||||||
|
|
||||||
|
"""
|
||||||
|
The payload of the `createOauth2Session` mutation.
|
||||||
|
"""
|
||||||
|
type CreateOAuth2SessionPayload {
|
||||||
|
"""
|
||||||
|
Access token for this session
|
||||||
|
"""
|
||||||
|
accessToken: String!
|
||||||
|
"""
|
||||||
|
Refresh token for this session, if it is not a permanent session
|
||||||
|
"""
|
||||||
|
refreshToken: String
|
||||||
|
"""
|
||||||
|
The OAuth 2.0 session which was just created
|
||||||
|
"""
|
||||||
|
oauth2Session: Oauth2Session!
|
||||||
|
}
|
||||||
|
|
||||||
"""
|
"""
|
||||||
An object with a creation date.
|
An object with a creation date.
|
||||||
"""
|
"""
|
||||||
@@ -580,6 +616,14 @@ type Mutation {
|
|||||||
Lock a user. This is only available to administrators.
|
Lock a user. This is only available to administrators.
|
||||||
"""
|
"""
|
||||||
lockUser(input: LockUserInput!): LockUserPayload!
|
lockUser(input: LockUserInput!): LockUserPayload!
|
||||||
|
"""
|
||||||
|
Create a new arbitrary OAuth 2.0 Session.
|
||||||
|
|
||||||
|
Only available for administrators.
|
||||||
|
"""
|
||||||
|
createOauth2Session(
|
||||||
|
input: CreateOAuth2SessionInput!
|
||||||
|
): CreateOAuth2SessionPayload!
|
||||||
endOauth2Session(input: EndOAuth2SessionInput!): EndOAuth2SessionPayload!
|
endOauth2Session(input: EndOAuth2SessionInput!): EndOAuth2SessionPayload!
|
||||||
endCompatSession(input: EndCompatSessionInput!): EndCompatSessionPayload!
|
endCompatSession(input: EndCompatSessionInput!): EndCompatSessionPayload!
|
||||||
endBrowserSession(input: EndBrowserSessionInput!): EndBrowserSessionPayload!
|
endBrowserSession(input: EndBrowserSessionInput!): EndBrowserSessionPayload!
|
||||||
|
@@ -270,6 +270,27 @@ export type CompatSsoLoginEdge = {
|
|||||||
node: CompatSsoLogin;
|
node: CompatSsoLogin;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/** The input of the `createOauth2Session` mutation. */
|
||||||
|
export type CreateOAuth2SessionInput = {
|
||||||
|
/** Whether the session should issue a never-expiring access token */
|
||||||
|
permanent?: InputMaybe<Scalars["Boolean"]["input"]>;
|
||||||
|
/** The scope of the session */
|
||||||
|
scope: Scalars["String"]["input"];
|
||||||
|
/** The ID of the user for which to create the session */
|
||||||
|
userId: Scalars["ID"]["input"];
|
||||||
|
};
|
||||||
|
|
||||||
|
/** The payload of the `createOauth2Session` mutation. */
|
||||||
|
export type CreateOAuth2SessionPayload = {
|
||||||
|
__typename?: "CreateOAuth2SessionPayload";
|
||||||
|
/** Access token for this session */
|
||||||
|
accessToken: Scalars["String"]["output"];
|
||||||
|
/** The OAuth 2.0 session which was just created */
|
||||||
|
oauth2Session: Oauth2Session;
|
||||||
|
/** Refresh token for this session, if it is not a permanent session */
|
||||||
|
refreshToken?: Maybe<Scalars["String"]["output"]>;
|
||||||
|
};
|
||||||
|
|
||||||
/** An object with a creation date. */
|
/** An object with a creation date. */
|
||||||
export type CreationEvent = {
|
export type CreationEvent = {
|
||||||
/** When the object was created. */
|
/** When the object was created. */
|
||||||
@@ -384,6 +405,12 @@ export type Mutation = {
|
|||||||
addEmail: AddEmailPayload;
|
addEmail: AddEmailPayload;
|
||||||
/** Add a user. This is only available to administrators. */
|
/** Add a user. This is only available to administrators. */
|
||||||
addUser: AddUserPayload;
|
addUser: AddUserPayload;
|
||||||
|
/**
|
||||||
|
* Create a new arbitrary OAuth 2.0 Session.
|
||||||
|
*
|
||||||
|
* Only available for administrators.
|
||||||
|
*/
|
||||||
|
createOauth2Session: CreateOAuth2SessionPayload;
|
||||||
endBrowserSession: EndBrowserSessionPayload;
|
endBrowserSession: EndBrowserSessionPayload;
|
||||||
endCompatSession: EndCompatSessionPayload;
|
endCompatSession: EndCompatSessionPayload;
|
||||||
endOauth2Session: EndOAuth2SessionPayload;
|
endOauth2Session: EndOAuth2SessionPayload;
|
||||||
@@ -411,6 +438,11 @@ export type MutationAddUserArgs = {
|
|||||||
input: AddUserInput;
|
input: AddUserInput;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/** The mutations root of the GraphQL interface. */
|
||||||
|
export type MutationCreateOauth2SessionArgs = {
|
||||||
|
input: CreateOAuth2SessionInput;
|
||||||
|
};
|
||||||
|
|
||||||
/** The mutations root of the GraphQL interface. */
|
/** The mutations root of the GraphQL interface. */
|
||||||
export type MutationEndBrowserSessionArgs = {
|
export type MutationEndBrowserSessionArgs = {
|
||||||
input: EndBrowserSessionInput;
|
input: EndBrowserSessionInput;
|
||||||
|
@@ -680,6 +680,44 @@ export default {
|
|||||||
],
|
],
|
||||||
interfaces: [],
|
interfaces: [],
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
kind: "OBJECT",
|
||||||
|
name: "CreateOAuth2SessionPayload",
|
||||||
|
fields: [
|
||||||
|
{
|
||||||
|
name: "accessToken",
|
||||||
|
type: {
|
||||||
|
kind: "NON_NULL",
|
||||||
|
ofType: {
|
||||||
|
kind: "SCALAR",
|
||||||
|
name: "Any",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
args: [],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "oauth2Session",
|
||||||
|
type: {
|
||||||
|
kind: "NON_NULL",
|
||||||
|
ofType: {
|
||||||
|
kind: "OBJECT",
|
||||||
|
name: "Oauth2Session",
|
||||||
|
ofType: null,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
args: [],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "refreshToken",
|
||||||
|
type: {
|
||||||
|
kind: "SCALAR",
|
||||||
|
name: "Any",
|
||||||
|
},
|
||||||
|
args: [],
|
||||||
|
},
|
||||||
|
],
|
||||||
|
interfaces: [],
|
||||||
|
},
|
||||||
{
|
{
|
||||||
kind: "INTERFACE",
|
kind: "INTERFACE",
|
||||||
name: "CreationEvent",
|
name: "CreationEvent",
|
||||||
@@ -920,6 +958,29 @@ export default {
|
|||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "createOauth2Session",
|
||||||
|
type: {
|
||||||
|
kind: "NON_NULL",
|
||||||
|
ofType: {
|
||||||
|
kind: "OBJECT",
|
||||||
|
name: "CreateOAuth2SessionPayload",
|
||||||
|
ofType: null,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
args: [
|
||||||
|
{
|
||||||
|
name: "input",
|
||||||
|
type: {
|
||||||
|
kind: "NON_NULL",
|
||||||
|
ofType: {
|
||||||
|
kind: "SCALAR",
|
||||||
|
name: "Any",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "endBrowserSession",
|
name: "endBrowserSession",
|
||||||
type: {
|
type: {
|
||||||
|
Reference in New Issue
Block a user