| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| |
| package auth |
| |
| import ( |
| "context" |
| "encoding/json" |
| "github.com/apache/answer/internal/service/auth" |
| |
| "github.com/apache/answer/internal/base/constant" |
| "github.com/apache/answer/internal/base/data" |
| "github.com/apache/answer/internal/base/reason" |
| "github.com/apache/answer/internal/entity" |
| "github.com/segmentfault/pacman/errors" |
| "github.com/segmentfault/pacman/log" |
| ) |
| |
| // authRepo auth repository |
| type authRepo struct { |
| data *data.Data |
| } |
| |
| // NewAuthRepo new repository |
| func NewAuthRepo(data *data.Data) auth.AuthRepo { |
| return &authRepo{ |
| data: data, |
| } |
| } |
| |
| // GetUserCacheInfo get user cache info |
| func (ar *authRepo) GetUserCacheInfo(ctx context.Context, accessToken string) (userInfo *entity.UserCacheInfo, err error) { |
| userInfoCache, exist, err := ar.data.Cache.GetString(ctx, constant.UserTokenCacheKey+accessToken) |
| if err != nil { |
| return nil, errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| if !exist { |
| return nil, nil |
| } |
| userInfo = &entity.UserCacheInfo{} |
| _ = json.Unmarshal([]byte(userInfoCache), userInfo) |
| return userInfo, nil |
| } |
| |
| // SetUserCacheInfo set user cache info |
| func (ar *authRepo) SetUserCacheInfo(ctx context.Context, |
| accessToken, visitToken string, userInfo *entity.UserCacheInfo) (err error) { |
| userInfo.VisitToken = visitToken |
| userInfoCache, err := json.Marshal(userInfo) |
| if err != nil { |
| return err |
| } |
| err = ar.data.Cache.SetString(ctx, constant.UserTokenCacheKey+accessToken, |
| string(userInfoCache), constant.UserTokenCacheTime) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| if err := ar.AddUserTokenMapping(ctx, userInfo.UserID, accessToken); err != nil { |
| log.Error(err) |
| } |
| if len(visitToken) == 0 { |
| return nil |
| } |
| if err := ar.data.Cache.SetString(ctx, constant.UserVisitTokenCacheKey+visitToken, |
| accessToken, constant.UserTokenCacheTime); err != nil { |
| log.Error(err) |
| } |
| return nil |
| } |
| |
| // GetUserVisitCacheInfo get user visit cache info |
| func (ar *authRepo) GetUserVisitCacheInfo(ctx context.Context, visitToken string) (accessToken string, err error) { |
| accessToken, exist, err := ar.data.Cache.GetString(ctx, constant.UserVisitTokenCacheKey+visitToken) |
| if err != nil { |
| return "", errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| if !exist { |
| return "", nil |
| } |
| return accessToken, nil |
| } |
| |
| // RemoveUserCacheInfo remove user cache info |
| func (ar *authRepo) RemoveUserCacheInfo(ctx context.Context, accessToken string) (err error) { |
| err = ar.data.Cache.Del(ctx, constant.UserTokenCacheKey+accessToken) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // RemoveUserVisitCacheInfo remove visit token cache |
| func (ar *authRepo) RemoveUserVisitCacheInfo(ctx context.Context, visitToken string) (err error) { |
| err = ar.data.Cache.Del(ctx, constant.UserVisitTokenCacheKey+visitToken) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // SetUserStatus set user status |
| func (ar *authRepo) SetUserStatus(ctx context.Context, userID string, userInfo *entity.UserCacheInfo) (err error) { |
| userInfoCache, err := json.Marshal(userInfo) |
| if err != nil { |
| return err |
| } |
| err = ar.data.Cache.SetString(ctx, constant.UserStatusChangedCacheKey+userID, |
| string(userInfoCache), constant.UserStatusChangedCacheTime) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // GetUserStatus get user status |
| func (ar *authRepo) GetUserStatus(ctx context.Context, userID string) (userInfo *entity.UserCacheInfo, err error) { |
| userInfoCache, exist, err := ar.data.Cache.GetString(ctx, constant.UserStatusChangedCacheKey+userID) |
| if err != nil { |
| return nil, errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| if !exist { |
| return nil, nil |
| } |
| userInfo = &entity.UserCacheInfo{} |
| _ = json.Unmarshal([]byte(userInfoCache), userInfo) |
| return userInfo, nil |
| } |
| |
| // RemoveUserStatus remove user status |
| func (ar *authRepo) RemoveUserStatus(ctx context.Context, userID string) (err error) { |
| err = ar.data.Cache.Del(ctx, constant.UserStatusChangedCacheKey+userID) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // GetAdminUserCacheInfo get admin user cache info |
| func (ar *authRepo) GetAdminUserCacheInfo(ctx context.Context, accessToken string) (userInfo *entity.UserCacheInfo, err error) { |
| userInfoCache, exist, err := ar.data.Cache.GetString(ctx, constant.AdminTokenCacheKey+accessToken) |
| if err != nil { |
| err = errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| return |
| } |
| if !exist { |
| return nil, nil |
| } |
| userInfo = &entity.UserCacheInfo{} |
| _ = json.Unmarshal([]byte(userInfoCache), userInfo) |
| return userInfo, nil |
| } |
| |
| // SetAdminUserCacheInfo set admin user cache info |
| func (ar *authRepo) SetAdminUserCacheInfo(ctx context.Context, accessToken string, userInfo *entity.UserCacheInfo) (err error) { |
| userInfoCache, err := json.Marshal(userInfo) |
| if err != nil { |
| return err |
| } |
| |
| err = ar.data.Cache.SetString(ctx, constant.AdminTokenCacheKey+accessToken, string(userInfoCache), |
| constant.AdminTokenCacheTime) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // RemoveAdminUserCacheInfo remove admin user cache info |
| func (ar *authRepo) RemoveAdminUserCacheInfo(ctx context.Context, accessToken string) (err error) { |
| err = ar.data.Cache.Del(ctx, constant.AdminTokenCacheKey+accessToken) |
| if err != nil { |
| return errors.InternalServer(reason.DatabaseError).WithError(err).WithStack() |
| } |
| return nil |
| } |
| |
| // AddUserTokenMapping add user token mapping |
| func (ar *authRepo) AddUserTokenMapping(ctx context.Context, userID, accessToken string) (err error) { |
| key := constant.UserTokenMappingCacheKey + userID |
| resp, _, err := ar.data.Cache.GetString(ctx, key) |
| if err != nil { |
| return err |
| } |
| mapping := make(map[string]bool, 0) |
| if len(resp) > 0 { |
| _ = json.Unmarshal([]byte(resp), &mapping) |
| } |
| mapping[accessToken] = true |
| content, _ := json.Marshal(mapping) |
| return ar.data.Cache.SetString(ctx, key, string(content), constant.UserTokenCacheTime) |
| } |
| |
| // RemoveUserTokens Log out all users under this user id |
| func (ar *authRepo) RemoveUserTokens(ctx context.Context, userID string, remainToken string) { |
| key := constant.UserTokenMappingCacheKey + userID |
| resp, _, err := ar.data.Cache.GetString(ctx, key) |
| if err != nil { |
| return |
| } |
| mapping := make(map[string]bool, 0) |
| if len(resp) > 0 { |
| _ = json.Unmarshal([]byte(resp), &mapping) |
| log.Debugf("find %d user tokens by user id %s", len(mapping), userID) |
| } |
| |
| for token := range mapping { |
| if token == remainToken { |
| continue |
| } |
| if err := ar.RemoveUserCacheInfo(ctx, token); err != nil { |
| log.Error(err) |
| } else { |
| log.Debugf("del user %s token success", userID) |
| } |
| } |
| if err := ar.RemoveUserStatus(ctx, userID); err != nil { |
| log.Error(err) |
| } |
| if err := ar.data.Cache.Del(ctx, key); err != nil { |
| log.Error(err) |
| } |
| } |